"How men are worked with": Gender roles in men's informal learning
- Authors: Golding, Barry , Foley, Annette
- Date: 2008
- Type: Text , Conference paper
- Relation: Paper presented at 38th Annual SCUTREA Conference, University of Edinburgh, Edinburgh, UK : 2nd-4th July 2008 p. 198-207
- Full Text:
- Description: Our paper critically analyses and theorises the role of women as coordinators and participants in community-based organizations where men comprise the majority of participants. Literature, interview and survey data lead us to suggest that it is "how men are worked with" that determines the effectiveness of women's involvement (author abstract)
- Description: 2003006466
'Postcards from practice': development of an innovative learner-centred online interprofessional learning program
- Authors: Stupans, Ieva , Paliadelis, Penny , Jarrott, Helen Mary
- Date: 2013
- Type: Text , Conference paper
- Relation: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education
- Full Text: false
- Reviewed:
- Description: This paper reports on the design and development of an innovative online learning program for clinical educators in Australia. The design was based on a story telling framework to engage learners. Each story had links to relevant multi-media resources to support and enhance skill development. The program featured some didactic resources; however there was a heavy emphasis on reflective activities. The program home page was developed as a series of attractive 'postcards from practice'. The program design which used a learner focused eclectic storytelling framework is potentially adaptable to other learner groups.
'The national custodian': How interest groups and academics combine to restrict access of working people to qualifications
- Authors: Smith, Erica
- Date: 2012
- Type: Text , Conference paper
- Relation: The value and voice of VET research for individuals, industry, community and the nation
- Full Text: false
- Reviewed:
- Description: An Australian ‘Expert Panel on apprenticeships’ worked during 2010-11 to propose sweeping changes to the Australian apprenticeship and training system which would have removed the access of workers in large segments of the economy to publicly-funded training. One suggestion was the establishment of a ‘national custodian’ who would decide which occupations were to get funded training and which were not. The eventual policy outcomes of this attempt, by a combination of interest groups and academics, to ‘guard’ access to funded training, are not yet known. However a minor policy change has already removed employers’ incentive payments for Certificate II qualifications. A similar process has been taking place during 2011 in England, where similar alliances are opposing the expansion of the apprenticeship system to broader sections of the economy. This paper analyses policy documents, and statements by academics and people from other research institutions, to examine, and attempt to theorise, their attempts to deny funded training to workers. These arguments are tested against the broader apprenticeship literature and the implications of these seemingly elitist arguments on the policy objective of social inclusion through VET.
.comUnity : ICT innovation in a regional Tourism Network
- Authors: Braun, Patrice
- Date: 2003
- Type: Text , Conference paper
- Relation: Paper presented at the 2003 Sustainable Economic Growth in Regional Australia (SEGRA) Conference, Brisbane : 14th - 17th September, 2003
- Full Text: false
- Reviewed:
- Description: E1
- Description: 2003000572
12.22 : Seismic performance of high capacity hybrid beam‐columns : comprising of high strength steel tubes subjected to lateral cyclic loading
- Authors: Javidan, Fatemeh , Heidarpour, Amin , Zhao, Xiao‐Ling , Al‐Mahaidi, Riadh
- Date: 2017
- Type: Text , Conference paper
- Relation: EUROSTEEL 2017, September 13–15, 2017, Copenhagen, Denmark Vol. 1, p. 3661-3670
- Full Text: false
- Reviewed:
- Description: ABSTRACT High strength and ultra‐high strength materials are widely used in industrial applications significantly increasing the load bearing capacity and reducing the overall weight and cost. The present study continues a series of experimental investigations on innovative fabricated hybrid sections consisting of high strength steel tubes welded to mild steel plates. This type of innovative section is proposed with the aim of promoting the application of high and ultra‐high tensile steel in construction, taking advantage of the load‐bearing capacity of these materials along with the coupled effect of ductile mild steel plates. Large‐scale hybrid columns are tested under a combination of axial load and lateral cyclic load using a multi‐axis substructure testing (MAST) facility. Lateral cyclic loadings are applied along with constant axial loads of which the hysteretic curves are obtained for various grades of steel tubes, namely, mild steel tube (grade 300), high strength steel tube (grade 800) and ultra‐high strength steel tube (grade1200). Test results are analysed to examine the seismic performance of these proposed innovative sections and obtain the combined axial and lateral cyclic capacities, drifts, strains and plastic hinge distributions along the beam‐columns. The effect of tube material is considered and the axial shortening observations are compared to constant compression. The experimental outcomes of this paper can be incorporated in nonlinear modelling of structures consisting of ultra‐high strength steel tubes.
3-HOP: a high-compression indexing scheme for reachability query
- Authors: Jin, Ruoming , Yang, Xiang , Ruan, Ning , Fuhry, David
- Date: 2009
- Type: Text , Conference paper
- Relation: SIGMOD '09 Proceedings of the 2009 ACM SIGMOD International Conference on Management of data p. 813-826
- Full Text: false
- Reviewed:
- Description: Reachability queries on large directed graphs have attracted much attention recently. The existing work either uses spanning structures, such as chains or trees, to compress the complete transitive closure, or utilizes the 2-hop strategy to describe the reachability. Almost all of these approaches work well for very sparse graphs. However, the challenging problem is that as the ratio of the number of edges to the number of vertices increases, the size of the compressed transitive closure grows very large. In this paper, we propose a new 3-hop indexing scheme for directed graphs with higher density. The basic idea of 3-hop indexing is to use chain structures in combination with hops to minimize the number of structures that must be indexed. Technically, our goal is to find a 3-hop scheme over dense DAGs (directed acyclic graphs) with minimum index size. We develop an efficient algorithm to discover a transitive closure contour, which yields near optimal index size. Empirical studies show that our 3-hop scheme has much smaller index size than state-of-the-art reachability query schemes such as 2-hop and path-tree when DAGs are not very sparse, while our query time is close to path-tree, which is considered to be one of the best reachability query schemes.
3D graphics rendering engine introduction and application in choreography
- Authors: Xiong, Likun , Sun, Peng , Tian, Xiangmao , Liu, Xinxin , Chen, Feifei
- Date: 2014
- Type: Text , Conference paper
- Relation: Electronics, Communications and Networks IV: Proceedings of the 4th International Conference on Electronics, Communications and Networks (CECNET IV) p. 1231-1235
- Full Text: false
- Reviewed:
- Description: With the rapid development of computer hardware and software, the application of computer graphics has also got rapid development in all walks of life. Development of graphics has gone through a few decades, and now the computer has already entered a three-dimensional era. The three-dimensional graphics can be seen everywhere in real life. Scientific visualization, computer animation and virtual reality technology have become hot topics in recent years. Researches in the field of computer graphics hierarchy deepen gradually and grow fast. This article describes three common systems of graphics rendering engine, as well as discusses how to use the engine to create a three-dimensional graphics system, and introduces the binding and application of 3D graphics rendering and stage design.
[Dis]Abling discourses
- Authors: Camilleri, Marg , Taylor, Caroline
- Date: 2006
- Type: Text , Conference paper
- Relation: Paper presented at the SAANZ Conference 2006: Connections and Disconnections, Hamilton, New Zealand : 22nd November, 2006
- Full Text: false
- Reviewed:
- Description: Women who have a cognitive impairment (CI) (including mental illness, dementia, intellectual disability and acquired brain injury) are particularly vulnerable to sexual assault, yet very few assaults are reported to police. Once reported very few cases find their way through the justice system. The discourse of stereotyping and its impact on access to justice for victim/survivors is central to this research project which examines the uptake and exit stages of reports of sexual assault by persons with a cognitive impairment to police in Victoria, Australia. Data collection involves focus group interviews, analysis of police records of reports of sexual assault by persons with a cognitive impairment across a finite period of time (2002-2004) and one in-depth case study of a victim of rape with a cognitive impairment who successfully accessed the legal system to a completed trial. This paper discusses the results of preliminary analysis of data collected from focus group discussions held across Victoria including rural, regional and metropolitan locations with police, sexual assault counsellors and advocates for sexual assault victims with a CI. Data have been analysed using a modified Grounded Theory framework and ‘interpretative repertoire’ analysis. These methods of analysis have been used to identify commonly held perceptions of sexual assault victims who have cognitive impairments. Early findings indicate that police and advocates alike, draw on commonly held stereotypes about victims with cognitive impairments. These include whether their word can be believed and assumptions that ‘they cannot stand up to the rigors of the justice system’. Potentially these views have a significant effect on the depth and quality of service the victims receive from their advocate as well as the continued pathway of the report through the justice system.
- Description: E1
- Description: 2003001907
A bi-objective dynamic model for multi-state weighted k-out-of-n system reliability
- Authors: Khorshidi, Hadi , Gunawan, Indra , Ibrahim, Yousef
- Date: 2015
- Type: Text , Conference paper
- Relation: 25th European Safety and Reliability Conference, ESREL 2015; Zurich, Switzerland; 7th-10th September 2015 p. 2229-2234
- Full Text: false
- Reviewed:
- Description: Nowadays, improving system reliability is becoming an important criterion for engineering industries. Many studies have been developed to evaluate the reliability of the systems which is the first step in system improvement. Most of these studies have been done in non-dynamic conditions in which the components have the constant reliability values during functioning periods. However, the components' reliability level varies over time due to both failures and maintenance actions. Therefore, time dimension should be added into system reliability evaluation. In this paper, a dynamic assessment is presented for multi-state weighted k-out-of-n systems. The k-out-of-n system is a popular structure in fault-tolerant systems in which n components work in parallel form with a pre-defined k as a condition. This dynamic assessment considers the reliability variation of the components over finite and discrete time periods. It provides an opportunity to assign decision variables for each functioning period, and analyze the impact of each decision on the whole system reliability. In addition, the income generated during each period is defined as an importance weight of the components. Therefore, the present value of the system is obtained by Universal Generating Function (UGF) and engineering economics' tools. Furthermore, an optimization model is developed to find optimal decisions based on system reliability and cost. Since the system reliability is estimated by money, the expected profit of the system can be as the objective function. As a result, the objective function can maximize system reliability and minimize system cost simultaneously. A Matlab programming is created for a numerical example to illustrate the proposed model. © 2015 Taylor & Francis Group, London.
A blockchain based privacy-preserving system for electric vehicles through local communication
- Authors: Yahaya, Adamu , Javaid, Nadeem , Khalid, Rabiya , Imran, Muhammad , Naseer, Nidal
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, 7 to 11 June, IEEE International Conference on Communications Vol. 2020-June
- Full Text: false
- Reviewed:
- Description: In this study, we propose a privacy preservation and efficient distributed searching and matching of Electric Vehicles (EVs) charging demander with suppliers based on reputation. Partially homomorphic encryption-based on reputation computation using local communication is used in the implementation, while hiding EVs users' location. A private blockchain is incorporated in the system to verify and permit secure trading of energy among the EVs' demander and suppliers. The results of the simulation show that the proposed privacy preserved algorithm converges more faster as compared to Bichromatic Mutual Nearest Neighbor (BMNN) algorithm. © 2020 IEEE.
A blockchain model for fair data sharing in deregulated smart grids
- Authors: Samuel, Omaji , Javaid, Nadeem , Awais, Muhammad , Ahmed, Zeeshan , Imran, Muhammad , Guizani, Mohsen
- Date: 2019
- Type: Text , Conference paper
- Relation: 2019 IEEE Global Communications Conference, GLOBECOM 2019, Waikoloa 9-13 December 2019
- Full Text: false
- Reviewed:
- Description: The emergence of smart home appliances has generated a high volume of data on smart meters belonging to different customers. However, customers can not share their data in deregulated smart grids due to privacy concern. Although, these data are important for the service provider in order to provide an efficient service. To encourage the customers' participation, this paper proposes an access control mechanism by fairly compensating customers for their participation in data sharing via blockchain using the concept of differential privacy. We addressed the computational issues of existing ethereum blockchain by proposing a proof of authority consensus protocol through the Pagerank mechanism in order to derive the reputation scores. Experimental results show the efficiency of the proposed model to minimize privacy risk, and maximize aggregator's profit. In addition, gas consumption, as well as the cost of the computational resources, is reduced. © 2019 IEEE.
A blockchain-based decentralized energy management in a P2P trading system
- Authors: Khalid, Rabiya , Javaid, Nadeem , Javaid, Sakeena , Imran, Muhammad , Naseer, Nidal
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, 7 to 11 June, IEEE International Conference on Communications Vol. 2020-June
- Full Text: false
- Reviewed:
- Description: Local energy generation and peer to peer (P2P) energy trading in the local market can reduce energy consumption cost, emission of harmful gases (as renewable energy sources (RESs) are used to generate energy at user's premises) and increase smart grid resilience. In this paper, to implement a hybrid P2P energy trading market, a blockchain-based solution is proposed. A blockchain-based system is fully decentralized and it allows the market members to interact with each other and trade energy without involving any third party. Smart contracts play a very important role in the blockchain-based energy trading market. They contain all the necessary rules for energy trading. We have proposed three smart contracts to implement the hybrid electricity trading market. The market members interact with main smart contract which requests P2P smart contract and prosumer to grid (P2G) smart contract for further processing. The main objectives of this paper are to propose a model to implement an efficient hybrid energy trading market while reducing cost and peak to average ratio (PAR) of electricity. © 2020 IEEE.
A blockchain-based privacy-preserving mechanism with aggregator as common communication point
- Authors: Yahaya, Adamu , Javaid, Nadeem , Khalid, Rabiya , Imran, Muhammad , Guizani, Mohsen
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, 7 to 11 June, IEEE International Conference on Communications Vol. 2020-June
- Full Text: false
- Reviewed:
- Description: The high penetration of renewable energy resources into the distributed system and their intermittent behavior of the non-dispatchable generation causes issues of demand supply mismatch and serious security and privacy concerned in the system. It is believed that incorporating blockchain will reduce costs, enhance data security, and improve the system efficiency. However, privacy issues are not completely eliminated and can hinder the wide applications of blockchain. In the study, we present a Reputation Based Starvation Free Energy Allocation Policy (Reputation-SFEAP) in a decentralized and distributed blockchain-based energy trading; while keeping Aggregator as Common Communication Point. In addition, Identity-Based encryption (ID-Based encryption) technique is added that improves transactional information privacy. According to the research analysis, it is observed that the proposed system model has optimal and fair energy allocation algorithms, which prevent all the energy users from energy starvation and share the available energy accordingly. Moreover, the incorporated encryption system has greater security-privacy level, which protects passive attacker and disguises attacker from penetration. © 2020 IEEE.
A boundary element analysis of non-load-carrying cruciform welded joints strengthened with FRP materials
- Authors: Chen, Tao , Zhao, Xiao , Gu, Xianglin , Xiao, Zhigang
- Date: 2012
- Type: Text , Conference paper
- Relation: International Conferences on Advances in Steel Structures 2012 p. 1405 - 1412
- Full Text: false
- Reviewed:
A brief guide to multi-objective reinforcement learning and planning JAAMAS track
- Authors: Hayes, Conor , Bargiacchi, Eugenio , Källström, Johan , Macfarlane, Matthew , Reymond, Mathieu , Verstraeten, Timothy , Zintgraf, Luisa , Dazeley, Richard , Heintz, Frederik , Howley, Enda , Irissappane, Aathirai , Mannion, Patrick , Nowé, Ann , Ramos, Gabriel , Restelli, Marcello , Vamplew, Peter , Roijers, Diederik
- Date: 2023
- Type: Text , Conference paper
- Relation: 22nd International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2023, London, 29 May to 2 June 2023, Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS Vol. 2023-May, p. 1988-1990
- Full Text:
- Reviewed:
- Description: Real-world sequential decision-making tasks are usually complex, and require trade-offs between multiple - often conflicting - objectives. However, the majority of research in reinforcement learning (RL) and decision-theoretic planning assumes a single objective, or that multiple objectives can be handled via a predefined weighted sum over the objectives. Such approaches may oversimplify the underlying problem, and produce suboptimal results. This extended abstract outlines the limitations of using a semi-blind iterative process to solve multi-objective decision making problems. Our extended paper [4], serves as a guide for the application of explicitly multi-objective methods to difficult problems. © 2023 International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved.
A CAD system using clustering and novel feature extraction technique
- Authors: Ghosh, Ranadhir , Ghosh, Moumita , Yearwood, John
- Date: 2005
- Type: Text , Conference paper
- Relation: Paper presented at CISTM 2005, Gurgaon, India : 24th - 26th July, 2005
- Full Text: false
- Reviewed:
- Description: Many previous efforts have utilized many different approaches for recognition in breast cancer detection using various ANN classifier-modelling techniques. Most of the previous work was concentred mostly on the classification of the damaged areas with the help of doctor’s suggestion. Doctors use to mark the suspicious areas area in the mammogram and the classifier only extract those marked areas and tries to classify it. An intelligent automatic diagnosis system can be very helpful for radiologist in diagnosing Breast cancer. In this research we are applying a local search gradient free clustering algorithm to find out the suspicious / damaged area. We compare our results with the doctor’s marking. Also it has been observed that, beyond a certain point, the inclusion of additional features leads to a worse rather than better performance. Moreover, the choice of features to represent the patterns affects several aspects of pattern recognition problems such as accuracy, required learning time and a necessary number of samples. A common problem with the multi-category feature classification is the conflict between the categories. None of the feasible solutions allow simultaneous optimal solution for all categories. In order to find an optimal solution the search space can be divided based on an individual category in each sub region and finally merging them through decision spport system. Combining the feature selection with the classifier has been a major challenge for the researchers. A similar technique employed in both the levels often worsens their performance. Some preliminary studies has revealed that while using traditional canonical GA has been a good choice for feature selection modules, however under perform for the classifier level module. An evolutionary based algorithm for the classifier level provides a much better solution for this purpose. In this paper we propose a hybrid canonical based feature extraction technique with a combination of evolutionary algorithm based classifier using a feed forward MLP model.
- Description: E1
- Description: 2003001369
A case for causal loop diagrams to model electronic health records ecosystems
- Authors: Hashmi, Mustafa , McInnes, Angelique , Sahama, Tony , Stranieri, Andrew
- Date: 2023
- Type: Text , Conference paper
- Relation: 2023 Australasian Computer Science Week, ACSW 2023, Melbourne, Australia, 31 January-3 February 2023, ACSW '23: Proceedings of the 2023 Australasian Computer Science Week p. 238-239
- Full Text: false
- Reviewed:
- Description: Causal loop diagrams (CLD) that emerged from systems thinking disciplines have been used to simulate complex inter-dependencies between causal factors in diverse phenomena. This paper highlights a process for generating a casual loop diagrams to represent the quality of electronic health record (EHR) ecosystem in a medical context. The quality inherent in the use of electronic health records for specific clinical purposes is taken to depend on factors including data integrity, reliability, relevance, timeliness and completeness. By improving the electronic health record ecosystem quality, health care providers can enhance their data sharing practices, and personalised patient care, while reducing the probabilities of medical errors. Ultimately the CLD can be used to run multiple simulations for several clinical case scenarios to understand the impact of various case phenomena on the quality of the electronic health record ecosystem. © 2023 ACM.
A case study : Social marketing
- Authors: Binney, Wayne , Hall, John , Oppenheim, Peter
- Date: 2003
- Type: Text , Conference paper
- Relation: Paper presented at the 2003 CIM Australian Conference, Sydney : 20th August, 2003
- Full Text: false
- Reviewed:
- Description: E1
- Description: 2003000576
A case study of Chinese contingent self-esteem
- Authors: Jiang, Xiaoli
- Date: 2002
- Type: Text , Conference paper
- Relation: Paper presented at the 2nd Biennial SELF Research Centre International Conference, Sydney : 6th - 8th August, 2002
- Full Text:
- Reviewed:
- Description: The research reported here utilised in depth interviews to investigate the contingent element of self-esteem and its underlying reasons in one Chinese individual living in a collectivist orientated culture. The results suggest this individual demonstrated some characteristics of contingent self-esteem. This may be attributed to such influences as: parents and significant others, educational experiences and the collectivist culture. It reveals a connection between a highly controlling parenting style and education in a collective culture and the development of the contingent part of self-esteem. Both positive and negative effects are identified in relation to the development of the contingent part of self-esteem. The interviewee is revealed as a person who has a strong sense of discipline, obligation and responsibility to his family and society, and who simultaneously experiences a substantial mental challenge and stress, due to constant external social comparisons and evaluations of self.
- Description: E1
- Description: 2003000080
A case study of clustering in regional Australia : Public policies and private action
- Authors: Lowe, Julian , Thompson, Helen , Lynch, David , Braun, Patrice
- Date: 2006
- Type: Text , Conference paper
- Relation: Paper presented at the 30th annual conference of the Australian and New Zealand Regional Science Association International, Beechworth, Victoria : 26th September, 2006
- Full Text:
- Reviewed:
- Description: The paper starts with an evaluation of a group of ICT organizations in a regional Victorian town and using a range of qualitative and quantitative data evaluates whether there is a cluster emerging and if so what are the processes of clustering that underpin this. Using archival and interview data the paper then examines key events and turning points in the development of what might be identified as a nascent cluster (Rosenfeld, 1997). In the context of current public policy that directly or indirectly supports ‘clustering’, the paper then assesses the effectiveness of public policy versus private action in the development of regional agglomerations of organisations and institutions that may be called clusters.
- Description: E1
- Description: 2003001802