509 resultados para Airwedge technology
Resumo:
Governments have recognised that the technological trades rely on knowledge embedded traditionally in science, technology, engineering and mathematics (STEM) disciplines. However, there is substantial evidence that students are turning away from these subjects in schools because the school curriculum is seen as irrelevant, with clear implications for not just vocational education but also higher education. In this paper, we report preliminary findings on the development of two curricula that attempt to integrate science and mathematics with workplace knowledge and practices. We argue that these curricula provide educational opportunities for students to pursue their preferred career pathways. These curricula were co-developed by industry and educational personnel across three industry sectors, namely, mining industry, aerospace and wine tourism. The aim was to provide knowledge appropriate for students moving from school to the workplace as trade apprentices in the respective industries. The analysis of curriculum and associated policy documents reveals that the curricula adopt applied learning orientations through teaching strategies and assessment practices which focus on practical skills. However, although key theoretical science and maths concepts have been well incorporated, the extent to which knowledge deriving from workplace practices is included varies across the curricula. The extent to which applications of concepts are included in the models depends on a number of factors not least the relevant expertise of the teacher as a practitioner in the industry. Our findings highlight the importance of teachers having substantial practical industry experience and the role that whole school policies play in attempts to align the range of learning experiences with the needs of industry.
Resumo:
As we race towards a new era, rapid change of conventional models has become the norm. Just as technology has etched itself to the core of society, the sheer quantity of student devices connecting to university networks presents a sector wide challenge coinciding almost perfectly with many universities creating technology rich learning spaces. New fears include future proofing. It is not just a matter of technology becoming outdated. In seeking to accommodate the teaching styles and experience of staff across diverse faculties, is this technology simply too vanilla to meet their needs as they become increasingly skilled and inspired by technology’s potential? Through the early findings of a study into staff use of technology within Queensland University of Technology's next generation collaborative learning spaces, this paper explores whether the answers lie in a model presented by students equipping themselves with the tools they need to learn in the 21st century.
Resumo:
This thesis studied technology’s role in promoting and supporting active lifestyles through behavioural strategies to reduce sedentary time and increase physical activity. The five studies included (1) development of a self-report instrument quantifying daily sedentary behaviour and light-intensity physical activity; (2) establishment of instrument validity and reliability; (3) use of an online personal activity monitor to successfully reduce sedentary time and increase physical activity; (4) identification of positive differences in total wellness as related to high/low levels of sitting time combined with insufficient/sufficient physical activity; and (5) improvement of total wellness through positive changes in sedentary behaviour and physical activity.
Resumo:
Through practice-led research, TESSA SMALLHORN examines the influence of digital technology on the performance space. From the mechanisation of modernist culture to the digitalisation of present day, technology acts as response material for scenographers investigating the stage as machine. The interactive, real-time tools of digital culture encourage a systems-orientated approach that challenges user and operator alike. This article explores the studio practice and critical theory that was combined to offer a functional model of a digital stage machine.
Resumo:
This study addresses the research question: ‘What are the diffusion determinants for extreme weather-proofing technology in the Australian built environment?’ In order to effectively identify diffusion determinants, a synthesis of literature in both technical and management fields was conducted from a system-wide perspective. Review results where then interpreted through an innovation system framework, drawn from innovation systems literature, in order to map the current state of extreme weather-proofing technology diffusion in the Australian built environment industry. Drivers and obstacles to optimal diffusion are presented. Results show the important role to be played by Australian governments in facilitating improved weather proofing technology diffusion. This applies to governments in their various roles, but particularly as regulators, clients/owners and investors in research & development and education. In the role as regulators, findings suggest Australian governments should be encouraging the application of innovative finance options and positive end-user incentives to promote the uptake of weather proofing technology. Additionally, in their role as clients/owners, diffusion can be improved by adjusting building and infrastructure specifications to encourage designers and constructors to incorporate extreme weather proofing technology in new and redeveloped built assets. Finally, results suggest greater investment is required in research and development and improved knowledge sharing across the construction supply chain to further mitigate risks associated with greater incidences of extreme weather events.
Resumo:
Technology has advanced in such a manner that the world can now communicate in means previously never thought possible. These new technologies have not been overlooked by transnational organized crime groups and networks of corruption, and have been exploited for criminal success. This text explores the use of communication interception technology (CIT), such as phone taps or email interception, and its potential to cause serious disruption to these criminal enterprises. Exploring the placement of communication interception technology within differing policing frameworks, and how they integrate in a practical manner, the authors demonstrate that CIT is best placed within a proactive, intelligence-led policing framework. They also indicate that if law enforcement agencies in Western countries are serious about fighting transnational organized crime and combating corruption, there is a need to re-evaluate the constraints of interception technology, and the sceptical culture that surrounds intelligence in policing. Policing Transnational Organized Crime and Corruption will appeal to scholars of Law, Criminal Justice and Police Science as well as intelligence analysts and police and security intelligence professionals.
Resumo:
A large proportion (over 12 per cent) of international and non-English speaking background (NESB) postgraduate research students enrol in engineering and information technology (IT) programs in Australian universities. They find themselves in an advanced research culture, and are technically and scientifically challenged early in their programs. This is in addition to cultural, social and religious isolation and linguistic barriers they have to contend with. The project team surveyed this cohort at QUT and UWA, on the hypothesis that they face challenges that are more discipline-specific. The results of the survey indicate that existing supervisory frameworks which are limited to linguistic contexts are not fully assisting these students and supervisors to achieve high quality research. The goal of this project is to extend these supervisory frameworks to a holistic model that will address the unique needs and supervisory issues these students face in engineering and IT disciplines. The model will be useable by all other Australian universities.
Resumo:
In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.
Resumo:
Mesothelioma is a rare malignancy arising from mesothelial cells lining the pleura and peritoneum. Advances in modern technology have allowed the development of array based approaches to the study of disease allowing researchers the opportunity to study many genes or proteins in a high-throughput fashion. This review describes the current knowledge surrounding array based approaches with respect to mesothelioma research. © 2009 by the International Association for the Study of Lung Cancer.
Resumo:
This study uses the well-known social networking site, Facebook (FB), for a study of differences in perceptions on the use of technologies in the classroom around the world. This study is part of a larger project exploring telecollaboration and the use of online discussions between graduate students in an online masters program based in Australia and students in the graduate education program at a regional university in Greece. Postings reveal more similarities between the situations and perceptions of the participants from the different countries than differences. Most participants indicated that while they and their students had access in general to computers and the internet, they did not necessarily have this access in the classroom. Even when technologies were available in schools, participants identified a critical need for professional development to increase teachers’ use of ICT. These findings are relevant to educators and policy development in terms of implementation of ICT or social networking in the language classroom.
Resumo:
We examine the role of politico-economic influences on macroeconomic performance within the framework of an endogenous growth model with costly technology adoption and uncertainty. The model is aimed at understanding the diversity in growth and inequality experiences across countries. Agents adopt either of two risky technologies, one of which is only available through financial intermediaries, who are able to alleviate some of this risk. The entry cost of financial intermediation depends on the proportion of government revenue that is allocated towards cost-reducing financial development expenditure, and agents vote on this proportion. The results show that agents at the top and bottom ends of the distribution prefer alternative means of re-distribution, thereby effectively blocking the allocation of resources towards cost-reducing financial development expenditure. Thus political factors have a role in delaying financial and capital deepening and economic development. Furthermore, the model provides a political-economy perspective on the Kuznets curve; uncertainty interacts with the political economy mechanism to produce transitional inequality patterns that, depending on initial conditions, can unearth the Kuznets-curve experience. Finally, the political outcomes are inefficient relative to policies aimed at maximizing the collective welfare of agents in the economy.
Resumo:
This thesis examined the influence of mobile digital technology on the brand identity of luxury brands. Specifically it focused on the use of mobile applications by automobile, hotel and beauty brands and compared the perceptions of marketing managers with consumers on how mobile applications influenced luxury brand identity and image. Outcomes of this research included a model to depict the ongoing process between mobile-mediated luxury brand identity and image, and a typology of luxury brand mobile applications listing key features of mobile-mediated luxemosphere. Overall findings suggest that the influence of mobile applications on luxury brand identity has been negative, as their brand image appeared to be degraded, resulting in diminishing the brand identity.
Resumo:
In plants, double-stranded RNA (dsRNA) is an effective trigger of RNA silencing, and several classes of endogenous small RNA (sRNA), processed from dsRNA substrates by DICER-like (DCL) endonucleases, are essential in controlling gene expression. One such sRNA class, the microRNAs (miRNAs) control the expression of closely related genes to regulate all aspects of plant development, including the determination of leaf shape, leaf polarity, flowering time, and floral identity. A single miRNA sRNA silencing signal is processed from a long precursor transcript of nonprotein-coding RNA, termed the primary miRNA (pri-miRNA). A region of the pri-miRNA is partially self-complementary allowing the transcript to fold back onto itself to form a stem-loop structure of imperfectly dsRNA. Artificial miRNA (amiRNA) technology uses endogenous pri-miRNAs, in which the miRNA and miRNA*(passenger strand of the miRNA duplex) sequences have been replaced with corresponding amiRNA/ amiRNA*sequences that direct highly efficient RNA silencing of the targeted gene. Here, we describe the rules for amiRNA design, as well as outline the PCR and bacterial cloning procedures involved in the construction of an amiRNA plant expression vector to control target gene expression in Arabidopsis thaliana. © 2014 Springer Science+Business Media New York.
Australian Research to Encourage School Students’ Positive Use of Technology to Reduce Cyberbullying
Resumo:
Information and Communications Technology (ICT) has spread rapidly in Australia. Mobile phones, which increasingly have advanced capabilities including Internet access, mobile television and multimedia storage, are owned by 22% of Australian children aged 9-11 years and 73% of those aged 12-14 years (Australian Bureau of Statistics, 2012b), as well as by over 90% of Australians aged 15 years and over(Australian Communications and Media Authority (ACMA), 2010). Nearly 80% of Australian households have access to the Internet and 73% have a broadband Internet connection, ensuring that Internet access is typically reliable and high-speed (Australian Bureau of Statistics, 2012a). Ninety percent of Australian children aged 5-14 years (comprising 79% of 5-8 year olds; 96% of 9-11 year olds; and 98% of 12-14 year olds) reported having accessed the Internet during 2011-2012, a significant increase from 79% in 2008-2009 (Australian Bureau of Statistics, 2012b). Approximately 90% of 5-14 year olds have accessed the Internet both from home and from school, with close to 49% accessing the Internet from other places (Australian Bureau of Statistics, 2012b). Young people often make use of borrowed Internet access (e.g. in friends’ homes), commercial access (e.g. cybercafés), public access (e.g. libraries), and mobile device access in areas offering free Wi-Fi (Lim, 2009).