Now showing items 2147-2166 of 11329

  • Current singularities at finitely compressible three-dimensional magnetic null points

    Dmitruk, Pablo; Matthaeus, William H.; Oughton, Sean (American Institute of Physics, 2005-07-15)
    The formation of current singularities at line-tied two- and three-dimensional (2D and 3D, respectively) magnetic null points in a nonresistive magnetohydrodynamic environment is explored. It is shown that, despite the ...
  • Current singularities at Quasi-separatrix layers and three-dimensional magnetic nulls

    Craig, Ian J.D.; Effenberger, Frederic (IOP PUBLISHING LTD, 2014-11-10)
    The open problem of how singular current structures form in line-tied, three-dimensional magnetic fields is addressed. A Lagrangian magneto-frictional relaxation method is employed to model the field evolution toward the ...
  • Current singularities in line-tied three-dimensional magnetic fields

    Craig, Ian J.D.; Pontin, D.I. (IOP PUBLISHING LTD, 2014-06-20)
    This paper considers the current distributions that derive from finite amplitude perturbations of line-tied magnetic fields comprising hyperbolic field structures. The initial equilibrium on which we principally focus is ...
  • Current singularities in planar magnetic X points of finite compressibility

    Craig, Ian J.D.; Litvinenko, Yuri E. (American Institute of Physics, 2005-07-15)
    The formation of current singularities in nonresistive, line-tied magnetic X points is addressed. It is pointed out that, although gas pressure suppresses the current singularity development when strictly antiparallel, ...
  • Current techniques for measuring and modeling ATM traffic

    Pearson, Murray W.; Cleary, John G.; Unger, Brian; Williamson, Carey (1996-06)
    ATM has now been widely accepted as the leading contender for the implementation of broadband communications networks (Brinkmann, Lavrijsen, Louis, et al, 1995) ATM networks are no longer restricted to research laboratories, ...
  • Curriculum implementation exploratory studies: Final report

    Cowie, Bronwen; Hipkins, Rosemary; Boyd, Sally; Bull, Ally; Keown, Paul Ashley; McGee, Clive; Cooper, Beverley; Ferrier-Kerr, Jenny L.; Hume, Anne Christine; McKim, Anne M.; Moreland, Judy; Morrison, Michele; Bolstad, Rachel; Spiller, Lorraine; Taylor, Merilyn; Yates, Russell (Ministry of Education, 2009)
    Throughout the history of schooling in New Zealand the national curriculum has been revised at fairly regular intervals. Consequently, schools are periodically faced with having to accommodate to new curriculum. In between ...
  • Curriculum integration as treaty praxis.

    Fraser, Deborah; Parah, Hokimate (Faculty of Education, University of Waikato, 2002)
    The article discusses the significance of curriculum integration on the promotion of principles of the Treaty of Waitangi, an agreement signed in 1840 by the Maori and the Crown people in New Zealand. It explores the ...
  • Curriculum integration: What it is and is not.

    Fraser, Deborah (NZCER Press, 2000)
    Curriculum integration is much misunderstood. As a curriculum design and a pedagogy, it requires a commitment to power sharing when making curriculum decisions with students. When teachers negotiate curriculum with students, ...
  • Curriculum, learning and effective pedagogy in science education for New Zealand: introduction to special issue

    Jones, Alister; Baker, Robyn (Taylor and Francis, 2005)
    This paper describes the way in which a major literature review on curriculum, learning and effective pedagogy in science education was undertaken in New Zealand, and introduces the other papers in this issue. The review ...
  • Curst Shrews and Venomous Scolds: The Societal and Legal Reactive Processes to Dangerous and Unideal Female Speech in Early Modern England

    Rhodes, Athena (University of Waikato, 2016)
    This thesis argues that in seventeenth century England, the tongue, or more specifically the female tongue, was understood as a fleshy weapon wielded to inflict misery and chaos on men. In response, early modern society ...
  • The customer engagement/value interface: An exploratory investigation

    Hollebeek, Linda D. (Elsevier, 2012)
    After generating significant interest among marketing practitioners, the customer engagement (CE) concept is rapidly gaining traction in the academic marketing literature. Although pioneering research has provided foundational ...
  • Customer perceptions of service quality in luxury hotels in New Delhi, India: an exploratory study

    Mohsin, Asad; Lockyer, Tim (Emerald Group Publishing, 2010)
    Purpose – The aim of the study is to assess the service quality perception of customers of luxury hotels, New Delhi in India and to help the hotel management identify areas that need attention to meet and exceed customer ...
  • Customizing digital library interfaces with Greenstone

    Witten, Ian H. (IEEE Computer Society, 2003)
    Digital libraries are organized, focused collections of information. They are focused on a particular topic or theme—and good digital libraries will articulate the principles governing what is included. They are organized ...
  • Cutting the hedge: Exporters' dynamic currency hedging behaviour

    Fabling, Richard; Grimes, Arthur (Elsevier, 2010)
    We use a dataset that includes all New Zealand merchandise export transactions to analyse exporters' dynamic currency hedging behaviour. We focus on whether exporters change their hedging behaviour (“selectively hedge”) ...
  • Cyanolichens can have both cyanobacteria and green algae in a common layer as major contributors to photosynthesis

    Henskens, Frieda L.; Green, T.G. Allan; Wilkins, Alistair L. (Oxford University Press, 2012)
    BACKGROUND AND AIMS: Cyanolichens are usually stated to be bipartite (mycobiont plus cyanobacterial photobiont). Analyses revealed green algal carbohydrates in supposedly cyanobacterial lichens (in the genera Pseudocyphellaria, ...
  • Cyber Security Visualization Effectiveness

    Garae, Jeffery (The University of Waikato, 2019)
    Security visualization utilises predefined data attributes and translates them into visual nodes to form images for the purpose of communicating critical security information to targeted audiences. It is commonly used for ...
  • Cyber security vulnerabilities in Tonga

    Laulaupea'alu, Siuta; Keegan, Te Taka Adrian Gregory (2019)
    A research project undertaken in Tonga in 2016 showed that Tonga's computer systems are susceptible and can be easily exploited by cybercriminals. This paper builds on that research by identifying areas of vulnerability ...
  • Cybersecurity, moral panics and the law of confidential information

    Kingsbury, Anna (2015)
    This paper is about the trend to criminalisation of the protection of confidential information, and its justifications. In New Zealand as elsewhere, fears of foreign hackers and of breaches of national cybersecurity have ...
  • Cyborg Art: An Explorative and Critical Inquiry into Corporeal Human-Technology Convergence

    Borst, Elizabeth Margaretha (The University of Waikato, 2009)
    This thesis introduces and examines the undervalued concept of corporeal human-technology interface art, or 'cyborg art', which describes literal, figural and metaphorical representations of increasing body and technology ...
  • Cycles of negotiation and reflection: a negotiated intervention to promote online teacher development

    Khoo, Elaine G.L.; Cowie, Bronwen (Routledge, 2011)
    This paper reports on the use and impact of a negotiated intervention for teacher development adopted for facilitating the teaching and learning in a semester-long fully online graduate course in a tertiary institution in ...