50 resultados para Streeter, Sebastian, 1783-1867.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Living City 2010 was a three-day place-based urban design immersion workshop program held at Logan Road Conference Centre, Stones Corner, for 30 self-selected Year 11 Visual Art Students and 4 Teachers drawn from 11 state and private Brisbane Secondary Schools, that focused on the active Brisbane City Council redevelopment site of Stones Corner, specifically Logan Road, public spaces at Stones Corner Library and rehabilitation of the nearby creek corridor. The workshop, framed within notions of ecological, economic, social and cultural sustainability, aimed to raise awareness of the layered complexity and perspectives involved in the design of shared city spaces and to encourage young people to voice their own concerns as future citizens about the shape and direction of their city. On Day 1, Brisbane City Council Public Art Officers Brendan Doherty and Genevieve Searle, local landscape architect Peter Boyle (Verge) and artists Malcolm Enright and Barbara Heath provided students with an overview of the historic and future context of the area including proposed design and public art interventions, followed by a site walk. The afternoon session, led by Natalie Wright and QUT design staff and students, focused on design tools to assist in the tackling of the redesign of the Stones Corner library precinct, where students worked on ideas. On Day 2, students were mentored by artist Liam Key to participate in a computer animation activity using the built environment as a canvas, and by artist Sebastian Moody to participate in an activity using red helium balloons as a playful catalyst for interaction to activate and create new public space. Later, students worked in teams on their ideas for redevelopment of the site in preparation for their Day 3 presentations. The workshop culminated in an exchange of planning ideas with Georgina Aitchison from Brisbane City Council's Urban Renewal Division. Students were introduced to design methodology, team thinking strategies, the scope of design practices and professions, presentation skills and post-secondary pathways, while participating teachers acquired content and design learning strategies transferable in many other contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The literature on recruiting and/or retaining health professionals in rural areas focuses primarily on the development of recruitment and retention strategies and assessing whether such strategies are effective. The objective of this article is to argue that it is important for all stakeholders involved in rural recruitment and/or retention processes to consider their decisions and actions from an ethics perspective. Recruitment and/or retention processes are not value neutral and it is important to understand their ethical dimensions. Methods: From the literature, elements of the recruitment and/or retention strategies that have been employed were identified and organised in respect of levels of governance (namely, the levels of health system/government, community, and individual health professionals). The elements identified in these levels were subjected to analysis to identify their ethical dimensions and to determine whether a clash or complement of values arose at each level of governance or between governance levels. Results: There is very little literature in this area that considers the ethical dimensions of rural recruitment and/or retention processes. However, all policies and practices have ethical dimensions that need to be identified and understood as they may have significant implications for recruitment and/or retention processes. Conclusion: This article recommends the application of an ethics perspective when reflecting on rural recruitment and/or retention strategies. The collective decisions of all involved in rural recruitment and/or retention processes may fundamentally influence the 'health' (broadly understood) of rural communities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a strategy for delayed research method selection in a qualitative interpretivist research. An exemplary case details how explorative interviews were designed and conducted in accordance with a paradigm prior to deciding whether to adopt grounded theory or phenomenology for data analysis. The focus here is to determine the most appropriate research strategy in this case the methodological framing to conduct research and represent findings, both of which are detailed. Research addressing current management issues requires both a flexible framework and the capability to consider the research problem from various angles, to derive tangible results for academia with immediate application to business demands. Researchers, and in particular novices, often struggle to decide on an appropriate research method suitable to address their research problem. This often applies to interpretative qualitative research where it is not always immediately clear which is the most appropriate method to use, as the research objectives shift and crystallize over time. This paper uses an exemplary case to reveal how the strategy for delayed research method selection contributes to deciding whether to adopt grounded theory or phenomenology in the initial phase of a PhD research project. In this case, semi-structured interviews were used for data generation framed in an interpretivist approach, situated in a business context. Research questions for this study were thoroughly defined and carefully framed in accordance with the research paradigm‟s principles, while at the same time ensuring that the requirements of both potential research methods were met. The grounded theory and phenomenology methods were compared and contrasted to determine their suitability and whether they meet the research objectives based on a pilot study. The strategy proposed in this paper is an alternative to the more „traditional‟ approach, which initially selects the methodological formulation, followed by data generation. In conclusion, the suggested strategy for delayed research method selection intends to help researchers identify and apply the most appropriate method to their research. This strategy is based on explorations of data generation and analysis in order to derive faithful results from the data generated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Cooperative Collision Warning System (CCWS) is an active safety techno- logy for road vehicles that can potentially reduce traffic accidents. It provides a driver with situational awareness and early warnings of any possible colli- sions through an on-board unit. CCWS is still under active research, and one of the important technical problems is safety message dissemination. Safety messages are disseminated in a high-speed mobile environment using wireless communication technology such as Dedicated Short Range Communication (DSRC). The wireless communication in CCWS has a limited bandwidth and can become unreliable when used inefficiently, particularly given the dynamic nature of road traffic conditions. Unreliable communication may significantly reduce the performance of CCWS in preventing collisions. There are two types of safety messages: Routine Safety Messages (RSMs) and Event Safety Messages (ESMs). An RSM contains the up-to-date state of a vehicle, and it must be disseminated repeatedly to its neighbouring vehicles. An ESM is a warning message that must be sent to all the endangered vehi- cles. Existing RSM and ESM dissemination schemes are inefficient, unscalable, and unable to give priority to vehicles in the most danger. Thus, this study investigates more efficient and scalable RSM and ESM dissemination schemes that can make use of the context information generated from a particular traffic scenario. Therefore, this study tackles three technical research prob- lems, vehicular traffic scenario modelling and context information generation, context-aware RSM dissemination, and context-aware ESM dissemination. The most relevant context information in CCWS is the information about possible collisions among vehicles given a current vehicular traffic situation. To generate the context information, this study investigates techniques to model interactions among multiple vehicles based on their up-to-date motion state obtained via RSM. To date, there is no existing model that can represent interactions among multiple vehicles in a speciffic region and at a particular time. The major outcome from the first problem is a new interaction graph model that can be used to easily identify the endangered vehicles and their danger severity. By identifying the endangered vehicles, RSM and ESM dis- semination can be optimised while improving safety at the same time. The new model enables the development of context-aware RSM and ESM dissemination schemes. To disseminate RSM efficiently, this study investigates a context-aware dis- semination scheme that can optimise the RSM dissemination rate to improve safety in various vehicle densities. The major outcome from the second problem is a context-aware RSM dissemination protocol. The context-aware protocol can adaptively adjust the dissemination rate based on an estimated channel load and danger severity of vehicle interactions given by the interaction graph model. Unlike existing RSM dissemination schemes, the proposed adaptive scheme can reduce channel congestion and improve safety by prioritising ve- hicles that are most likely to crash with other vehicles. The proposed RSM protocol has been implemented and evaluated by simulation. The simulation results have shown that the proposed RSM protocol outperforms existing pro- tocols in terms of efficiency, scalability and safety. To disseminate ESM efficiently, this study investigates a context-aware ESM dissemination scheme that can reduce unnecessary transmissions and deliver ESMs to endangered vehicles as fast as possible. The major outcome from the third problem is a context-aware ESM dissemination protocol that uses a multicast routing strategy. Existing ESM protocols use broadcast rout- ing, which is not efficient because ESMs may be sent to a large number of ve- hicles in the area. Using multicast routing improves efficiency because ESMs are sent only to the endangered vehicles. The endangered vehicles can be identified using the interaction graph model. The proposed ESM protocol has been implemented and evaluated by simulation. The simulation results have shown that the proposed ESM protocol can prevent potential accidents from occurring better than existing ESM protocols. The context model and the RSM and ESM dissemination protocols can be implemented in any CCWS development to improve the communication and safety performance of CCWS. In effect, the outcomes contribute to the realisation of CCWS that will ultimately improve road safety and save lives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nowadays, Workflow Management Systems (WfMSs) and, more generally, Process Management Systems (PMPs) are process-aware Information Systems (PAISs), are widely used to support many human organizational activities, ranging from well-understood, relatively stable and structures processes (supply chain management, postal delivery tracking, etc.) to processes that are more complicated, less structured and may exhibit a high degree of variation (health-care, emergency management, etc.). Every aspect of a business process involves a certain amount of knowledge which may be complex depending on the domain of interest. The adequate representation of this knowledge is determined by the modeling language used. Some processes behave in a way that is well understood, predictable and repeatable: the tasks are clearly delineated and the control flow is straightforward. Recent discussions, however, illustrate the increasing demand for solutions for knowledge-intensive processes, where these characteristics are less applicable. The actors involved in the conduct of a knowledge-intensive process have to deal with a high degree of uncertainty. Tasks may be hard to perform and the order in which they need to be performed may be highly variable. Modeling knowledge-intensive processes can be complex as it may be hard to capture at design-time what knowledge is available at run-time. In realistic environments, for example, actors lack important knowledge at execution time or this knowledge can become obsolete as the process progresses. Even if each actor (at some point) has perfect knowledge of the world, it may not be certain of its beliefs at later points in time, since tasks by other actors may change the world without those changes being perceived. Typically, a knowledge-intensive process cannot be adequately modeled by classical, state of the art process/workflow modeling approaches. In some respect there is a lack of maturity when it comes to capturing the semantic aspects involved, both in terms of reasoning about them. The main focus of the 1st International Workshop on Knowledge-intensive Business processes (KiBP 2012) was investigating how techniques from different fields, such as Artificial Intelligence (AI), Knowledge Representation (KR), Business Process Management (BPM), Service Oriented Computing (SOC), etc., can be combined with the aim of improving the modeling and the enactment phases of a knowledge-intensive process. The 1st International Workshop on Knowledge-intensive Business process (KiBP 2012) was held as part of the program of the 2012 Knowledge Representation & Reasoning International Conference (KR 2012) in Rome, Italy, in June 2012. The workshop was hosted by the Dipartimento di Ingegneria Informatica, Automatica e Gestionale Antonio Ruberti of Sapienza Universita di Roma, with financial support of the University, through grant 2010-C26A107CN9 TESTMED, and the EU Commission through the projects FP7-25888 Greener Buildings and FP7-257899 Smart Vortex. This volume contains the 5 papers accepted and presented at the workshop. Each paper was reviewed by three members of the internationally renowned Program Committee. In addition, a further paper was invted for inclusion in the workshop proceedings and for presentation at the workshop. There were two keynote talks, one by Marlon Dumas (Institute of Computer Science, University of Tartu, Estonia) on "Integrated Data and Process Management: Finally?" and the other by Yves Lesperance (Department of Computer Science and Engineering, York University, Canada) on "A Logic-Based Approach to Business Processes Customization" completed the scientific program. We would like to thank all the Program Committee members for the valuable work in selecting the papers, Andrea Marrella for his valuable work as publication and publicity chair of the workshop, and Carola Aiello and the consulting agency Consulta Umbria for the organization of this successful event.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Road traffic accidents can be reduced by providing early warning to drivers through wireless ad hoc networks. When a vehicle detects an event that may lead to an imminent accident, the vehicle disseminates emergency messages to alert other vehicles that may be endangered by the accident. In many existing broadcast-based dissemination schemes, emergency messages may be sent to a large number of vehicles in the area and can be propagated to only one direction. This paper presents a more efficient context aware multicast protocol that disseminates messages only to endangered vehicles that may be affected by the emergency event. The endangered vehicles can be identified by calculating the interaction among vehicles based on their motion properties. To ensure fast delivery, the dissemination follows a routing path obtained by computing a minimum delay tree. The multicast protocol uses a generalized approach that can support any arbitrary road topology. The performance of the multicast protocol is compared with existing broadcast protocols by simulating chain collision accidents on a typical highway. Simulation results show that the multicast protocol outperforms the other protocols in terms of reliability, efficiency, and latency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vehicular safety applications, such as cooperative collision warning systems, rely on beaconing to provide situational awareness that is needed to predict and therefore to avoid possible collisions. Beaconing is the continual exchange of vehicle motion-state information, such as position, speed, and heading, which enables each vehicle to track its neighboring vehicles in real time. This work presents a context-aware adaptive beaconing scheme that dynamically adapts the beaconing repetition rate based on an estimated channel load and the danger severity of the interactions among vehicles. The safety, efficiency, and scalability of the new scheme is evaluated by simulating vehicle collisions caused by inattentive drivers under various road traffic densities. Simulation results show that the new scheme is more efficient and scalable, and is able to improve safety better than the existing non-adaptive and adaptive rate schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Psychosis is a mental disorder that affects 1-2% of the population at some point in their lives. One of the main causes of psychosis is the mental illness schizophrenia. Sufferers of this illness often have terrifying symptoms such as hallucinations, delusions, and thought disorder. This project aims to develop a virtual environment to simulate the experience of psychosis, focusing on re-creating auditory and visual hallucinations. A model of a psychiatric ward was created and the psychosis simulation software was written to re-create the auditory and visual hallucinations of one particular patient. The patient was very impressed with the simulation, and commented that it effectively re-created the same emotions that she experienced on a day-to-day basis during her psychotic episodes. It is hoped that this work will result in a useful educational tool about schizophrenia, leading to improved training of clinicians, and fostering improved understanding and empathy toward sufferers of schizophrenia in the community, ultimately improving the quality of life and chances of recovery of patients.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose The aim was to assess the effects of a Tai Chi based program on health related quality of life (HR-QOL) in people with elevated blood glucose or diabetes who were not on medication for glucose control. Method 41 participants were randomly allocated to either a Tai Chi intervention group (N = 20) or a usual medical care control group (N = 21). The Tai Chi group involved 3 x 1.5 hour supervised and group-based training sessions per week for 12 weeks. Indicators of HR-QOL were assessed by self-report survey immediately prior to and after the intervention. Results There were significant improvements in favour of the Tai Chi group for the SF36 subscales of physical functioning (mean difference = 5.46, 95% CI = 1.35-9.57, P < 0.05), role physical (mean difference = 18.60, 95% CI = 2.16-35.05, P < 0.05), bodily pain (mean difference = 9.88, 95%CI = 2.06-17.69, P < 0.05) and vitality (mean difference = 9.96, 95% CI = 0.77-19.15, P < 0.05). Conclusions The findings show that this Tai Chi program improved indicators of HR-QOL including physical functioning, role physical, bodily pain and vitality in people with elevated blood glucose or diabetes who were not on diabetes medication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

At present, for mechanical power transmission, Cycloidal drives are most preferred - for compact, high transmission ratio speed reduction, especially for robot joints and manipulator applications. Research on drive-train dynamics of Cycloidal drives is not well-established. This paper presents a testing rig for Cycloidal drives, which would produce data for development of mathematical models and investigation of drive-train dynamics, further aiding in optimising its design

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Retaining customers is a relevant topic throughout all service industries. However, only limited attention has been directed towards studying the antecedents of subscription renewal in the context of operational cloud enterprise systems. Cloud services have historically been offered as subscription-based services with the (theoretical) possibility of seamless service cancellation, in contrast to classical IT-Outsourcing contracts or license-based software installations of on-premise enterprise systems. In this work, we investigate the central concept of subscription renewal by focusing on different facets of IS success and their relevance for distinct employee cohorts. Analyzing inter-cohort differences has strong practical implications, as it helps IT vendors to focus on specific IT-related factors when trying to retain customers. Therefore an empirical study was undertaken. The hypotheses were developed on an individual level and tested using survey responses of IT decision makers within companies which adopted cloud enterprise systems. Gathered data was then analyzed using PLS. The results show that subscription renewal intention of the strategic cohort is mainly based on perceived system quality, whereas information quality explains most of the variance of subscription renewal in the management cohort. Beneath the cloud enterprise systems specific contributions, the work adds to the theoretical body of research related to IS success and IS continuation, as well as stakeholder perspectives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Presently organisations engage in what is termed as Global Business Transformation Projects [GBTPs], for consolidating, innovating, transforming and restructuring their processes and business strategies while undergoing fundamental change. Culture plays an important role in global business transformation projects as these involve people of different cultural backgrounds and span across countries, industries and disciplinary boundaries. Nevertheless, there is scant empirical research on how culture is conceptualised beyond national and organisational cultures but also on how culture is to be taken into account and dealt with within global business transformation projects. This research is situated in a business context and discovers a theory that aids in describing and dealing with culture. It draws on the lived experiences of thirty-two senior management practitioners, reporting on more than sixty-one global business transformation projects in which they were actively involved. The research method used is a qualitative and interpretive one and applies a grounded theory approach, with rich data generated through interviews. In addition, vignettes were developed to illustrate the derived theoretical models. The findings from this study contribute to knowledge in multiple ways. First, it provides a holistic account of global business transformation projects that describe the construct of culture by the elements of culture types, cultural differences and cultural diversity. A typology of culture types has been developed which enlarges the view of culture beyond national and organisational culture including an industry culture, professional service firm culture and 'theme' culture. The amalgamation of the culture types instantiated in a global business transformation project compromises its project culture. Second, the empirically grounded process for managing culture in global business transformation projects integrates the stages of recognition, understanding and management as well as the enablement providing a roadmap for dealing with culture in global business transformation projects. Third, this study identified contextual variables to global business transformation projects, which provide the means of describing the environment global business transformation projects are situated, influence the construct of culture and inform the process for managing culture. Fourth, the contribution to the research method is the positioning of interview research as a strategy for data generation and the detailed documentation applying grounded theory to discover theory.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this small-scale study was to assess what knowledge senior nurses within a general intensive care unit (GICU) had in relation to intra-arterial blood pressure (IABP) waveform analysis. Its core objective was: To assess what knowledge was held by the senior nursing team with regard to arterial waveform interpretation, arterial waveform morphology and the technical aspects associated with arterial waveform monitoring.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The double Friedel–Crafts acylation of readily accessible biaryls with oxalyl chloride delivers the respective phenanthrene-9,10-diones, providing an alternative to the traditional methods, which require harsh oxidizing conditions and multistep sequences. This simple method allows the synthesis of various symmetrical and non-symmetrical targets, and is even effective for the synthesis of the parent ring system from (unactivated) biphenyl.