470 resultados para Group process


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research investigated the impact of Education Queensland's employment policy and practices for beginning secondary teachers appointed on temporary engagement. The context was the public secondary school sector within the state of Queensland, Australia. The study was set within a context of the changing nature of work from full-time permanent employment towards casual, fixed-term contracts, temporary and part-time employment, a trend reflected in the employment patterns for teachers within Australia. Two broad categories of literature relating to the research problem of this thesis were reviewed, namely the beginning teacher and permanency or tenure. The focus in the research literature on beginning teachers was the professional experiences of teachers within the classroom and school. There was a paucity of research that considered the working and industrial conditions of temporary employment for beginning teachers or the personal and professional implications of this form of employment. The review of the context and literature was conceptualised as a Beginning Temporary Teacher Theoretical Framework which served to inform the study. Using a qualitative case study methodology, the research techniques employed for the thesis were semi-structured interview and document analysis. A simultaneously conducted research project in which the researcher participated entitled 'Winning the Lottery? Beginning Teachers on Temporary Engagement' foregrounded this thesis in terms of refining the research question, contributing to the literature and in the selection of the participants. For this case study the perspectives of four distinct yet inter-related categories of professionals were sought. These included four beginning secondary teachers, three school administrators, a Senior Personnel Officer with Education Queensland, and a representative from the Queensland Teachers' Union. The research findings indicated that none of the beginning teachers or other professionals viewed starting a career in teaching on temporary engagement as the ideal. The negative features identified were the differential treatment received and the high level of uncertainty associated with temporary employment. Differential treatment tended to indicate 'less' entitlements, in terms of access to induction and professional development, recreational and sick leave, acceptance by and expectations of other colleagues, and avenues of redress in grievance cases. Moreover, interviews indicated a high level of uncertainty in terms of starting within the teaching profession, commencing at a new school, and a regular income. In addition, frequent changes in schools and/or cohorts of students exacerbated levels of uncertainty. The beginning teachers reported significantly decreased motivation, self-esteem and sense of belonging, and increased stress levels. There was an even more marked negative impact on those beginning teachers who had experienced a higher number of temporary engagements and schools in their first year of teaching. Conversely, strong staff support and a reasonable length of time in the one school improved the quality of the beginning teachers' experiences. The overall impact of being on temporary engagement resulted in delayed permanent position appointments, decreased commitment to particular schools and to Education Queensland as the employing authority, and for two of the beginning teachers, it produced a desire to seek alternative employment. The implementation of Education Queensland's policies relating to working conditions and entitlements for these temporary beginning teachers at the school level was revealed to be less than satisfactory. There was a tendency towards 'just-in- time' management of the beginning teacher on temporary engagement. The beginning teachers received 'less-than-messages' about access to and use of departmental documentation, support through induction and professional development, and their transition from temporary to permanent employment. To ensure a more systematic, supportive and inclusive process for managing the temporary beginning teacher, a conceptual framework entitled 'Continuums of Tension' was developed. The four continuums included permanent employment - temporary employment; system perspective - individual perspective; teaching as a profession - teaching as a job; and the permanent beginning teacher - university graduate. The general principles of the human resource policies of Education Queensland were based on a commitment to permanent employment, a system's perspective, viewing teaching as a profession and a homogeneous group of permanent beginning teachers. Contrasting with this, the beginning teacher on temporary engagement tended to operate from the position of temporary employment and a perspective that was individually based. Their priorities therefore included the 'occupational' aspects of being a temporary teacher striving to become permanent. Thus there existed a tension or contradiction between the general principles of human resource policies within Education Queensland and the employment experiences of beginning teachers on temporary engagement. The study proposed three actions for resolution to address the aforementioned tensions. The actions included: (a) the effective provision and targeted communication of information; (b) support, induction and professional development; and (c) a coordinated approach between Education Queensland, Queensland Teachers' Union, the Universities and the beginning teacher. These actions are fm1her refined to include: (a) an induction kit to suppm1 the individual through the pre-employment to permanent employee phases, (b) an extrapolation of the roles and responsibilities of Education Queensland personnel charged with supporting the beginning temporary teacher, and (c) a series of recommendations to effect a coordinated approach amongst the key stakeholders. The theoretical and conceptual frameworks have provided a means of addressing the identified needs of the beginning teacher on temporary engagement. As such, this study has contributed to the research literature on teacher employment and professionalism and aims to provide a beginning temporary teacher with managed professional and occupational support.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The focus of this study is the celebration of Eucharist in Catholic primary schools within the Archdiocese of Brisbane. The context of the contemporary Australian Catholic primary school embodies certain 'problematical realities' in relation to the time-honoured way in which school Eucharistic rituals have been celebrated. These contemporary realities raise a number of issues that impact on school celebrations of Eucharist. The purpose of this study is to explore administrators' differing conceptions of school Eucharistic rituals in an attempt to investigate some of these issues and assist members of individual school communities as they strive to make celebrations of Eucharist appropriate and meaningful for the group gathered. The phenomenographic research approach was adopted, as it is well suited to the purpose of this study and the nature of the research question. Phenomenography is essentially a study of variation. It attempts to map the 'whole' phenomenon under investigation by describing on equal terms all conceptions of the phenomenon and establishing an ordered relationship among them. The purpose of this study and the nature of the research question necessitate an approach that allows the identification and description of the different ways in which administrators' experience school Eucharistic rituals. Accordingly, phenomenography was selected. Members of the Administration Team, namely the principal, the APRE (Assistant to the Principal Religious Education) and, in larger primary schools, the AP A (Assistant to the Principal Administration) share responsibility for leading change in Catholic primary schools in the Archdiocese of Brisbane. In practice, however, principals delegate the role of leading the development of the school's religion program and providing leadership in the religious life of the school community to the APRE (Brisbane Catholic Education, 1997). Informants in this study are nineteen APREs from a variety of Catholic primary schools in the Archdiocese of Brisbane. These APREs come from schools across the archdiocese, rather than from within one particular region. Several significant findings resulted from this study. Firstly, the data show that there are significant differences in how APREs' experience school Eucharistic rituals, although the number of these qualitatively different conceptions is quite limited. The study identifies and describes six distinct yet related conceptions of school Eucharistic rituals. The logical relationship among these conceptions (the outcome space) is presented in the form of a diagram with accompanying explication. The variation among the conceptions is best understood and described in terms of three dimensions of the role of Eucharist in the Catholic primary school and is represented on the model of the outcome space. Individual transcripts suggest that individual APREs tend to emphasise some conceptions more than others. It is the contention of the present study that change in the practice of school Eucharistic rituals is unlikely to occur until all of a school community's conceptions are brought out into the open and articulated. As leaders of change, APREs need to be alerted to their own biases and become aware of alternative ways of conceiving school Eucharistic ritual. It is proposed that the different categories of description and dimensions, represented by the model of the outcome space, can be used to help in the process of articulating a school community's conceptions of Eucharist, with the APRE as facilitator of this process. As a result, the school community develops a better understanding of why their particular school does what it does in relation to school Eucharistic rituals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Queensland Coal Industry Employees Health Scheme was implemented in 1993 to provide health surveillance for all Queensland coal industry workers. Tt1e government, mining employers and mining unions agreed that the scheme should operate for seven years. At the expiry of the scheme, an assessment of the contribution of health surveillance to meet coal industry needs would be an essential part of determining a future health surveillance program. This research project has analysed the data made available between 1993 and 1998. All current coal industry employees have had at least one health assessment. The project examined how the centralised nature of the Health Scheme benefits industry by identi~)jng key health issues and exploring their dimensions on a scale not possible by corporate based health surveillance programs. There is a body of evidence that indicates that health awareness - on the scale of the individual, the work group and the industry is not a part of the mining industry culture. There is also growing evidence that there is a need for this culture to change and that some change is in progress. One element of this changing culture is a growth in the interest by the individual and the community in information on health status and benchmarks that are reasonably attainable. This interest opens the way for health education which contains personal, community and occupational elements. An important element of such education is the data on mine site health status. This project examined the role of health surveillance in the coal mining industry as a tool for generating the necessary information to promote an interest in health awareness. The Health Scheme Database provides the material for the bulk of the analysis of this project. After a preliminary scan of the data set, more detailed analysis was undertaken on key health and related safety issues that include respiratory disorders, hearing loss and high blood pressure. The data set facilitates control for confounding factors such as age and smoking status. Mines can be benchmarked to identify those mines with effective health management and those with particular challenges. While the study has confirmed the very low prevalence of restrictive airway disease such as pneu"moconiosis, it has demonstrated a need to examine in detail the emergence of obstructive airway disease such as bronchitis and emphysema which may be a consequence of the increasing use of high dust longwall technology. The power of the Health Database's electronic data management is demonstrated by linking the health data to other data sets such as injury data that is collected by the Department of l\1mes and Energy. The analysis examines serious strain -sprain injuries and has identified a marked difference between the underground and open cut sectors of the industry. The analysis also considers productivity and OHS data to examine the extent to which there is correlation between any pairs ofJpese and previously analysed health parameters. This project has demonstrated that the current structure of the Coal Industry Employees Health Scheme has largely delivered to mines and effective health screening process. At the same time, the centralised nature of data collection and analysis has provided to the mines, the unions and the government substantial statistical cross-sectional data upon which strategies to more effectively manage health and relates safety issues can be based.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A review of the main rolling models is conducted to assess their suitability for modelling the foil rolling process. Two such models are Fleck and Johnson's Hertzian model and Fleck, Johnson, Mear and Zhang's Influence Function model. Both of these models are approximated through the use of perturbation methods. Decrease in the computation time resulted when compared with the numerical solution. The Hertzian model was approximated using the ratio of the yield stress of the strip to the plane-strain Young's Modulus of the rolls as the small perturbation parameter. The Influence Function model approximation takes advantage of the solution of the well-known Aerofoil Integral Equation to gain an insight into how the choice of interior boundary points affects the stability of numerical solution of the model's equations. These approximations require less computation than their full models and, in the case of the Hertzian approximation, only introduces a small error in the predictions of roll force roll torque. Hence the Hertzian approximate method is suitable for on-line control. The predictions from the Influence Function approximation underestimates the predictions from the numerical results. Better approximation of the pressure in the plastic reduction regions is the main source of this error.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present paper focuses on some interesting classes of process-control games, where winning essentially means successfully controlling the process. A master for one of these games is an agent who plays a winning strategy. In this paper we investigate situations in which even a complete model (given by a program) of a particular game does not provide enough information to synthesize—even incrementally—a winning strategy. However, if in addition to getting a program, a machine may also watch masters play winning strategies, then the machine is able to incrementally learn a winning strategy for the given game. Studied are successful learning from arbitrary masters and from pedagogically useful selected masters. It is shown that selected masters are strictly more helpful for learning than are arbitrary masters. Both for learning from arbitrary masters and for learning from selected masters, though, there are cases where one can learn programs for winning strategies from masters but not if one is required to learn a program for the master's strategy itself. Both for learning from arbitrary masters and for learning from selected masters, one can learn strictly more by watching m+1 masters than one can learn by watching only m. Last, a simulation result is presented where the presence of a selected master reduces the complexity from infinitely many semantic mind changes to finitely many syntactic ones.