141 research outputs found
Strengthening OA practice: using intervention logic to support drives for change
The aim of the JISC Open Access (OA) Pathfinder programme is to “develop shareable models of good
practice with regard to implementation of research funders’ OA requirements”. With the sector-wide
shift to OA and with growing funders’ OA mandates, the Pathfinder scheme reflects a real need to
enhance compliance with the agenda. Fundamental to this project is understanding how people
approach OA, and how processes can be designed to address this. This brief paper summarises an
approach to building stronger institutional approaches to Open Access using intervention logic. The
process, drawn from a behaviour change intervention framework supports research management and
library staff to explore the key areas of change needed and consider how best to address these. The intervention mapping tool which was first trialled at a workshop on Uncovering researcher behaviours at Oxford Brookes on 20 May 2015 is supplied at the end of this document to support this process
Sierra Leone Police Reform: the role of the UK government
ć”żć˛»ĺ¦ / Political Science and International RelationsSierra Leone’s civil war left development urgently needing security and security urgently needing reform. The initial UK response was un-coordinated until the Poverty Reduction Strategy 2004 which highlighted the importance of security. The SSR review, in response, made the security-development link explicit and all state security providers together with the judiciary, oversight mechanisms and relevant NGOs were brought together under the Justice Sector Development Programme. This review of police reform, questions its understanding of the political context; the wisdom of ignoring chiefs and commercial security; and the poorly conceived community policing programme. Overall the UK’s most important police reform programme proved too ambitious.Prepared for the GRIPS State Building Workshop 2010: Organizing Police Forces in Post-Conflict Peace-Support Operations, January 27-28th, 201
Possible mechanism behind the hard-to-swallow property of oil seed pastes
Roasted and crushed oil-rich seeds, such as sesame paste and peanut butter, both share a common structure and elicit an apparent sensation of thickening in the mouth. Working with sesame paste, as an example, the force needed to compress sesame paste:water mixtures peaked at 25% added water. The adhesive force required to pull a plunger from the surface was bimodal with peaks at around 15 and 25% hydration. It is postulated that when introduced to the mouth, water from the saliva is absorbed by the paste leading to a hard, adhesive material that sticks to the palate and the tongue, making these materials hard to swallow. It is hypothesized that the shared hard-to-swallow behaviour exhibited by other oil seed pastes/butters is due to a similar hydration process in the mouth
Illegal Fishing and Fisheries Crime as a Transnational Organized Crime in Indonesia
Illegal, unreported and unregulated (IUU) fishing is increasingly drawing international attention and coastal states strengthen their efforts to address it as a matter of priority due to its severe implications for food, economic, environmental and social security. As the largest archipelagic country in the world, this is especially problematic for Indonesia. In this already complex geographical and security environment, the authors test the hypothesis that IUU fishing and fisheries crime(s) classify as transnational organized criminal activities. The article argues that IUU fishing is much more than simply a fisheries management issue, since it goes hand in hand with fisheries crime. As a result, although the two concepts are quite distinct, they are so closely interlinked and interrelated throughout the entire value chain of marine fisheries, that they can only be managed effectively collectively by understanding them both within the framework of transnational organized crime. To make this argument, the research utilizes qualitative and quantitative data collected from approximately two thousand trafficked fishers, rescued in 2015 from slavery conditions while stranded in two remote Indonesian locations: Benjina on Aru island and on Ambon island. The article’s findings also unveil new trends relating to the inner workings of the illegal fishing industry, in four different, yet interlinked categories: recruitment patterns and target groups; document forgery; forced labor and abuse; and fisheries violations. The paper concludes by confirming the hypothesis and highlights that IUU fishing provides the ideal (illegal) environment for fisheries crimes and other forms of transnational organized crimes to flourish
Dataset supporting the paper: Truth table invariant cylindrical algebraic decomposition
The files in this data set support the following paper:
##########################################################################################
Truth table invariant cylindrical algebraic decomposition.
Russel Bradford, James H. Davenport, Matthew England, Scott McCallum and David Wilson.
http://opus.bath.ac.uk/38146/
##########################################################################################
Please find included the following:
##############################
1a) A Maple worksheet: Section1to7-Maple.mw
1b) A pdf printout of the worksheet: Section1to7-Maple.pdf
1c) A Maple Library file: ProjectionCAD.mpl
These files concern the Maple results for the worked examples throughout Sections 1-7 of the paper.
To run the Maple worksheet you will need a copy of the commercial computer algebra software Maple. This is currently available from:
http://www.maplesoft.com/products/maple/
The examples were run in Maple 16 (released Spring 2012). It is likely that the same results would be obtained in Maple 17, 18, 2015 and future versions, but this cannot be guaranteed.
An additional code package, developed at the University of Bath, is required. To use it we need to read the Maple Library file within Maple as follows:
>>> read("ProjectionCAD.mpl"):
>>> with(ProjectionCAD):
More details on this Maple package are available in the technical report at http://opus.bath.ac.uk/43911/ and in the following publication:
M. England, D. Wilson, R. Bradford and J.H. Davenport. Using the Regular Chains Library to build cylindrical algebraic decompositions by projecting and lifting. Proc ICMS 2014 (LNCS 8593). DOI: 10.1007/978-3-662-44199-2_69
If you do not have a copy of Maple you can still read the pdf printout of the worksheet.
##############################
2) A zipped directory WorkedExamples-Qepcad.zip
This directory also concerns the worked examples from Sections 1-7 of the paper, this time when studied with Qepcad-B.
Qepcad-B is a free piece of software for Linux which can be obtained from:
http://www.usna.edu/CS/qepcadweb/B/QEPCAD.html
All the files in the zipped directory end in either "-in.txt" or "-out.txt". The former give input for Qepcad and the latter record output. Hence readers without access to Qepcad (e.g. on a Windows system) can still observe the output in the latter files.
To verify the output readers should use the following bash command to run a Qepcad input file "Ex-in.txt" and record the output in "Ex-out.txt".
>>> qepcad +N500000000 +L200000 Ex-out.txt
Windows users without Linux access can still read the existing output files in the folder.
##############################
3a) The text file: Section82-ExampleSet.txt
3b) A Maple worksheet: Section82-ExampleSet.mw
3b) A pdf printout of the worksheet: Section82-ExampleSet.pdf
The textfile defines the example set which is the subject of the experiments in Section 8.2, whose results were summarised in Table 2. Within the file the 29 examples are defined in the following syntax:
(a) First a line starting with "#" giving the full example name followed in brackets by the shortened name used in Table 2.
(b) Then a second line in which the example is defined as a list of two sublists:
i) The first sublist defines the polynomials used. They are sorted into further lists, one for each formulae in the example. Each of these has two entries:
--- The first is either a polynomial defining an equational constraint (EC); a list of polynomials defining multiple ECs; or an empty list (signalling no ECs).
--- The second is a list of any non ECs.
ii) The second sublist is the variable ordering from highest (eliminate first in projection) to lowest. Note that Maple algorithms use this order by Qepcad the reverse.
This is the syntax used by the TTICAD algorithm that is the subject of the paper.
The text file doubles as a Maple function definition. When read into Maple the command GenerateInput is defined which can provide the input in formats suitable for the three Maple algorithms tested. An example is given in the Maple worksheet / pdf. We note that the timings reported in the paper were from running Maple in command line mode. See also the notes for files (1) above.
The same example set was tested in Qepcad. Here explicit ECs for a parent formula were entered in dynamically as products of the individual sub-formulae ECs, in cases where an explicit EC exists. See also Qepcad notes for file (2) above.
Finally, the example set was also tested in Mathematica. Mathematica's CAD command does not return cell counts - these were obtained upon request to a Mathematica developer. Hence they are not recreatable using the information here (something outside the control of the present authors).
##############################
4a) A Maple worksheet: Section83-Maple.mw
4b) A pdf printout of the worksheet: Section83-Maple.pdf
This shows how the numbers in Table 3 from Maple were obtained.
See also notes for files (1) above.
##############################
5a) A zipped directory Section83-Qepcad.zipped
This shows how the numbers in Table 3 from Qepcad were obtained.
See also notes for file (2) above.Cell counts and timings of various CAD algorithms
Involving Local Fishing Communities in Policy Making: Addressing Illegal Fishing in Indonesia
Illegal, Unreported and Unregulated (IUU) fishing has been identified by the UN as one of the
seven major threats to global maritime security; it causes loss of economic revenue, severe
environmental damage, and far-reaching livelihood implications for coastal communities.
Indonesia, by far the biggest archipelagic state, faces enormous challenges in all aspects of
IUU fishing and addressing those is one of the current Indonesian Government’s top priorities.
This article addresses the under-researched dimension of how IUU fishing affects fishing
communities. With the use of collage making focus groups with fishermen from different
Indonesian fishing communities, the research highlights the interrelated environmental
(depletion of resources), socio-economic (unbridled illegal activities at sea), cultural
(favouritism) and political (weak marine governance) dimensions of IUU fishing as
experienced at the local level. However, the research also indicates a strong will by fishermen
to be seen as knowledge agents who can help solve the problem by better dissemination of
information and cooperation between the local government(s) and the fishing communities.
The article concludes by arguing for the involvement of local fishing communities in national
and international policy making that addresses IUU fishing
- …