469 resultados para Solution Space
Resumo:
Background: Previous attempts at costing infection control programmes have tended to focus on accounting costs rather than economic costs. For studies using economic costs, estimates tend to be quite crude and probably underestimate the true cost. One of the largest costs of any intervention is staff time, but this cost is difficult to quantify and has been largely ignored in previous attempts. Aim: To design and evaluate the costs of hospital-based infection control interventions or programmes. This article also discusses several issues to consider when costing interventions, and suggests strategies for overcoming these issues. Methods: Previous literature and techniques in both health economics and psychology are reviewed and synthesized. Findings: This article provides a set of generic, transferable costing guidelines. Key principles such as definition of study scope and focus on large costs, as well as pitfalls (e.g. overconfidence and uncertainty), are discussed. Conclusion: These new guidelines can be used by hospital staff and other researchers to cost their infection control programmes and interventions more accurately.
Resumo:
Literacy studies have begun to examine the spatial dimension of literacy practices in a way that foregrounds space, and that considers space as constitutive to human relations and practices. This chapter provides an introduction to spatial literacy research, providing a guide to key theorists, themes, and studies that have shaped historical and new developments in spatial approaches to literacy practice and pedagogy. It begins by reconceptualising socio-spatial approaches to literacy research and defines terms. Intersections with related social theories are examined, with an emphasis on critical approaches and the politics of space. It clarifies the relationship between socio-spatial and socio-cultural paradigms, revisiting the spatial in seminal socio-cultural research. It covers new ground,including networks, flows, and deterritorialisation of literacy practice. The chapter concludes with challenges and recommendations for future language research and educational practice.
Resumo:
This paper presents practical vision-based collision avoidance for objects approximating a single point feature. Using a spherical camera model, a visual predictive control scheme guides the aircraft around the object along a conical spiral trajectory. Visibility, state and control constraints are considered explicitly in the controller design by combining image and vehicle dynamics in the process model, and solving the nonlinear optimization problem over the resulting state space. Importantly, range is not required. Instead, the principles of conical spiral motion are used to design an objective function that simultaneously guides the aircraft along the avoidance trajectory, whilst providing an indication of the appropriate point to stop the spiral behaviour. Our approach is aimed at providing a potential solution to the See and Avoid problem for unmanned aircraft and is demonstrated through a series.
Resumo:
The first of three articles in this issue addressing the public space topic considers public space and young people in the light of a range of papers delivered at the 27th International Conference on 'Making Cities Livable', held in Vienna, Austria, in July 2000. Under the overarching concept of the "liveable city" the conference themes of 'Rediscovery of public space' and 'Cities for the wellbeing of children' attracted a broad mix of those interested in the planning, design and management of urban space. A number of themes percolated through the conference which stimulated the writers to examine the nexus between urban development, young people and public space. There is an ongoing need to examine the meaning of public space in the face of powerful urban development trends. A model of public space practice is required which incorporates a vision of inclusive public spaces, fosters the interactivity of design, planning, social policy and management, and resources for greater communication and strategic action between stake holders from the most local of levels to those at state and international levels. The speed and magnitude of contemporary urban development makes community input and influence difficult, particularly for those impacted on by the exclusionary tendencies of much urban development. It is critical that a range of meaningful and sustainable mechanisms are developed which allow young people’s conceptions of what constitutes youth-friendly space to be directly made and taken account of.
Resumo:
“The Cube” is a unique facility that combines 48 large multi-touch screens and very large-scale projection surfaces to form one of the world’s largest interactive learning and engagement spaces. The Cube facility is part of the Queensland University of Technology’s (QUT) newly established Science and Engineering Centre, designed to showcase QUT’s teaching and research capabilities in the STEM (Science, Technology, Engineering, and Mathematics) disciplines. In this application paper we describe, the Cube, its technical capabilities, design rationale and practical day-to-day operations, supporting up to 70,000 visitors per week. Essential to the Cube’s operation are five interactive applications designed and developed in tandem with the Cube’s technical infrastructure. Each of the Cube’s launch applications was designed and delivered by an independent team, while the overall vision of the Cube was shepherded by a small executive team. The diversity of design, implementation and integration approaches pursued by these five teams provides some insight into the challenges, and opportunities, presented when working with large distributed interaction technologies. We describe each of these applications in order to discuss the different challenges and user needs they address, which types of interactions they support and how they utilise the capabilities of the Cube facility.
Resumo:
This presentation discusses topics and issues that connect closely with the Conference Themes and themes in the ARACY Report Card. For example, developing models of public space that are safe, welcoming and relevant to children and young people will impact on their overall wellbeing and may help to prevent many of the tensions occurring in Australia and elsewhere around the world. This area is the subject of ongoing international debate, research and policy formation, relevant to concerns in the ARACY Report Card about children and young people’s health and safety, participation, behaviours and risks and peer and family relationships.
Resumo:
This paper explores the concept of social exclusion as it impacts on young people within their local communities and the wider British, European and Australian context in terms of surveillance and other control measures.
Resumo:
A recent Guest Editorial by Parenti & Ebach (2013, Journal of Biogeography, 40, 813–820) disagrees with the methods or interpretations in two of our recent papers. In addition, the authors open a debate on biogeographical concepts, and present an alternative philosophy for biogeographical research in the context of their recently described biogeographical subregion called ‘Pandora’. We disagree with their approach and conclusions, and comment on several issues related to our differing conceptual approaches for biogeographical research; namely, our use of molecular phylogenetic analyses, including time estimates; and Parenti & Ebach's reliance on taxon/general area cladograms. Finally, we re-examine their ‘tests’ supporting the existence of ‘Pandora’.
Resumo:
This paper presents the results from a study of information behaviors, with specific focus on information organisation-related behaviours conducted as part of a larger daily diary study with 34 participants. The findings indicate that organization of information in everyday life is a problematic area due to various factors. The self-evident one is the inter-subjectivity between the person who may have organized the information and the person looking for that same information (Berlin et. al., 1993). Increasingly though, we are not just looking for information within collections that have been designed by someone else, but within our own personal collections of information, which frequently include books, electronic files, photos, records, documents, desktops, web bookmarks, and portable devices. The passage of time between when we categorized or classified the information, and the time when we look for the same information, poses several problems of intra-subjectivity, or the difference between our own past and present perceptions of the same information. Information searching, and hence the retrieval of information from one's own collection of information in everyday life involved a spatial and temporal coordination with one's own past selves in a sort of cognitive and affective time travel, just as organizing information is a form of anticipatory coordination with one's future information needs. This has implications for finding information and also on personal information management.
Resumo:
This thesis developed and evaluated strategies for social and ubiquitous computing designs that can enhance connected learning and networking opportunities for users in coworking spaces. Based on a social and a technical design intervention deployed at the State Library of Queensland, the research findings illustrate the potential of combining social, spatial and digital affordances in order to nourish peer-to-peer learning, creativity, inspiration, and innovation. The study proposes a hybrid notion of placemaking as a new way of thinking about the design of coworking and interactive learning spaces.
Resumo:
We propose a cluster ensemble method to map the corpus documents into the semantic space embedded in Wikipedia and group them using multiple types of feature space. A heterogeneous cluster ensemble is constructed with multiple types of relations i.e. document-term, document-concept and document-category. A final clustering solution is obtained by exploiting associations between document pairs and hubness of the documents. Empirical analysis with various real data sets reveals that the proposed meth-od outperforms state-of-the-art text clustering approaches.
Resumo:
We developed a novel technique involving knitting and electrospinning to fabricate a composite scaffold for ligament tissue engineering. Knitted structures were coated with poly(L-lactic-co-e-caprolactone) (PLCL) and then placed onto a rotating cylinder and a PLCL solution was electrospun onto the structure. Highly aligned 2-μm-diameter microfibers covered the space between the stitches and adhered to the knitted scaffolds. The stress–strain tensile curves exhibited an initial toe region similar to the tensile behavior of ligaments. Composite scaffolds had an elastic modulus (150 ± 14 MPa) similar to the modulus of human ligaments. Biological evaluation showed that cells proliferated on the composite scaffolds and they spontaneously orientated along the direction of microfiber alignment. The microfiber architecture also induced a high level of extracellular matrix secretion, which was characterized by immunostaining. We found that cells produced collagen type I and type III, two main components found in ligaments. After 14 days of culture, collagen type III started to form a fibrous network. We fabricated a composite scaffold having the mechanical properties of the knitted structure and the morphological properties of the aligned microfibers. It is difficult to seed a highly macroporous structure with cells, however the technique we developed enabled an easy cell seeding due to presence of the microfiber layer. Therefore, these scaffolds presented attractive properties for a future use in bioreactors for ligament tissue engineering.
Resumo:
This thesis is a study of how the contents of volatile memory on the Windows operating system can be better understood and utilised for the purposes of digital forensic investigations. It proposes several techniques to improve the analysis of memory, with a focus on improving the detection of unknown code such as malware. These contributions allow the creation of a more complete reconstruction of the state of a computer at acquisition time, including whether or not the computer has been infected by malicious code.