98 resultados para MODEL (Computer program language)
Resumo:
Context The School of Information Technology at QUT has recently undertaken a major restructuring of their Bachelor of Information Technology (BIT) course. Some of the aims of this restructuring include a reduction in first year attrition and to provide an attractive degree course that meets both student and industry expectations. Emphasis has been placed on the first semester in the context of retaining students by introducing a set of four units that complement one another and provide introductory material on technology, programming and related skills, and generic skills that will aid the students throughout their undergraduate course and in their careers. This discussion relates to one of these four fist semester units, namely Building IT Systems. The aim of this unit is to create small Information Technology (IT) systems that use programming or scripting, databases as either standalone applications or web applications. In the prior history of teaching introductory computer programming at QUT, programming has been taught as a stand alone subject and integration of computer applications with other systems such as databases and networks was not undertaken until students had been given a thorough grounding in those topics as well. Feedback has indicated that students do not believe that working with a database requires programming skills. In fact, the teaching of the building blocks of computer applications have been compartmentalized and taught in isolation from each other. The teaching of introductory computer programming has been an industry requirement of IT degree courses as many jobs require at least some knowledge of the topic. Yet, computer programming is not a skill that all students have equal capabilities of learning (Bruce et al., 2004) and this is clearly shown by the volume of publications dedicated to this topic in the literature over a broad period of time (Eckerdal & Berglund, 2005; Mayer, 1981; Winslow, 1996). The teaching of this introductory material has been done pretty much the same way over the past thirty years. During this period of time that introductory computer programming courses have been taught at QUT, a number of different programming languages and programming paradigms have been used and different approaches to teaching and learning have been attempted in an effort to find the golden thread that would allow students to learn this complex topic. Unfortunately, computer programming is not a skill that can be learnt in one semester. Some basics can be learnt but it can take many years to master (Norvig, 2001). Faculty data typically has shown a bimodal distribution of results for students undertaking introductory programming courses with a high proportion of students receiving a high mark and a high proportion of students receiving a low or failing mark. This indicates that there are students who understand and excel with the introductory material while there is another group who struggle to understand the concepts and practices required to be able to translate a specification or problem statement into a computer program that achieves what is being requested. The consequence of a large group of students failing the introductory programming course has been a high level of attrition amongst first year students. This attrition level does not provide good continuity in student numbers in later years of the degree program and the current approach is not seen as sustainable.
Resumo:
Bananas are susceptible to a diverse range of biotic and abiotic stresses, many of which cause serious production constraints worldwide. One of the most destructive banana diseases is Fusarium wilt caused by the soil-borne fungus, Fusarium oxysporum f. sp. cubense (Foc). No effective control strategy currently exists for this disease which threatens global banana production. Although disease resistance exists in some wild bananas, attempts to introduce resistance into commercially acceptable bananas by conventional breeding have been hampered by low fertility, long generation times and association of poor agronomical traits with resistance genes. With the advent of reliable banana transformation protocols, molecular breeding is now regarded as a viable alternative strategy to generate disease-resistant banana plants. Recently, a novel strategy involving the expression of anti-apoptosis genes in plants was shown to result in resistance against several necrotrophic fungi. Further, the transgenic plants showed increased resistance to a range of abiotic stresses. In this thesis, the use of anti-apoptosis genes to generate transgenic banana plants with resistance to Fusarium wilt was investigated. Since water stress is an important abiotic constraint to banana production, the resistance of the transgenic plants to water stress was also examined. Embryogenic cell suspensions (ECS) of two commercially important banana cultivars, Grand Naine (GN) and Lady Finger (LF), were transformed using Agrobacterium with the anti-apoptosis genes, Bcl-xL, Bcl-xL G138A, Ced-9 and Bcl- 2 3’ UTR. An interesting, and potentially important, outcome was that the use of anti-apoptosis genes resulted in up to a 50-fold increase in Agrobacterium-mediated transformation efficiency of both LF and GN cells over vector controls. Regenerated plants were subjected to a complete molecular characterisation in order to detect the presence of the transgene (PCR), transcript (RT-PCR) and gene product (Western blot) and to determine the gene copy number (Southern blot). A total of 36 independently-transformed GN lines (8 x Bcl-xL, 5 x Bcl-xL G138A, 15 x Ced-9 and 8 x Bcl-2 3’ UTR) and 41 independently-transformed LF lines (8 x Bcl-xL, 7 x BclxL G138A, 13 x Ced-9 and 13 x Bcl-2 3’ UTR) were identified. The 41 transgenic LF lines were multiplied and clones from each line were acclimatised and grown under glasshouse conditions for 8 weeks to allow monitoring for phenotypic abnormalities. Plants derived from 3 x Bcl-xL, 2 x Ced-9 and 5 x Bcl-2 3’ UTR lines displayed a variety of aberrant phenotypes. However, all but one of these abnormalities were off-types commonly observed in tissue-cultured, non-transgenic banana plants and were therefore unlikely to be transgene-related. Prior to determining the resistance of the transgenic plants to Foc race 1, the apoptotic effects of the fungus on both wild-type and Bcl-2 3’ UTR-transgenic LF banana cells were investigated using rapid in vitro root assays. The results from these assays showed that apoptotic-like cell death was elicited in wild-type banana root cells as early as 6 hours post-exposure to fungal spores. In contrast, these effects were attenuated in the root cells of Bcl-2 3’ UTR-transgenic lines that were exposed to fungal spores. Thirty eight of the 41 transgenic LF lines were subsequently assessed for resistance to Foc race 1 in small-plant glasshouse bioassays. To overcome inconsistencies in rating the internal (vascular discolouration) disease symptoms, a MatLab-based computer program was developed to accurately and reliably assess the level of vascular discolouration in banana corms. Of the transgenic LF banana lines challenged with Foc race 1, 2 x Bcl-xL, 3 x Ced-9, 2 x Bcl-2 3’ UTR and 1 x Bcl-xL G138A-transgenic line were found to show significantly less external and internal symptoms than wild-type LF banana plants used as susceptible controls at 12 weeks post-inoculation. Of these lines, Bcl-2 3’ UTR-transgenic line #6 appeared most resistant, displaying very mild symptoms similar to the wild-type Cavendish banana plants that were included as resistant controls. This line remained resistant for up to 23 weeks post-inoculation. Since anti-apoptosis genes have been shown to confer resistance to various abiotic stresses in other crops, the ability of these genes to confer resistance against water stress in banana was also investigated. Clonal plants derived from each of the 38 transgenic LF banana plants were subjected to water stress for a total of 32 days. Several different lines of transgenic plants transformed with either Bcl-xL, Bcl-xL G138A, Ced-9 or Bcl-2 3’ UTR showed a delay in visual water stress symptoms compared with the wild-type control plants. These plants all began producing new growth from the pseudostem following daily rewatering for one month. In an attempt to determine whether the protective effect of anti-apoptosis genes in transgenic banana plants was linked with reactive oxygen species (ROS)-associated programmed cell death (PCD), the effect of the chloroplast-targeting, ROS-inducing herbicide, Paraquat, on wild-type and transgenic LF was investigated. When leaf discs from wild-type LF banana plants were exposed to 10 ìM Paraquat, complete decolourisation occurred after 48 hours which was confirmed to be associated with cell death and ROS production by trypan blue and 3,3-diaminobenzidine (DAB) staining, respectively. When leaf discs from the transgenic lines were exposed to Paraquat, those derived from some lines showed a delay in decolourisation, suggesting only a weak protective effect from the transgenes. Finally, the protective effect of anti-apoptosis genes against juglone, a ROS-inducing phytotoxin produced by the causal agent of black Sigatoka, Mycosphaerella fijiensis, was investigated. When leaf discs from wild-type LF banana plants were exposed to 25 ppm juglone, complete decolourisation occurred after 48 hours which was again confirmed to be associated with cell death and ROS production by trypan blue and DAB staining, respectively. Further, TdT-mediated dUTP nick-end labelling (TUNEL) assays on these discs suggested that the cell death was apoptotic. When leaf discs from the transgenic lines were exposed to juglone, discs from some lines showed a clear delay in decolourisation, suggesting a protective effect. Whether these plants are resistant to black Sigatoka is unknown and will require future glasshouse and field trials. The work presented in this thesis provides the first report of the use of anti-apoptosis genes as a strategy to confer resistance to Fusarium wilt and water stress in a nongraminaceous monocot, banana. Such a strategy may be exploited to generate resistance to necrotrophic pathogens and abiotic stresses in other economically important crop plants.
Resumo:
Objectives: The Nurse Researcher Project (NRP) was initiated to support development of a nursing research and evidence based practice culture in Cancer Care Services (CCS) in a large tertiary hospital in Australia. The position was established and evaluated to inform future directions in the organisation.---------- Background: The demand for quality cancer care has been expanding over the past decades. Nurses are well placed to make an impact on improving health outcomes of people affected by cancer. At the same time, there is a robust body of literature documenting the barriers to undertaking and utilising research by and for nurses and nursing. A number of strategies have been implemented to address these barriers including a range of staff researcher positions but there is scant attention to evaluating the outcomes of these strategies. The role of nurse researcher has been documented in the literature with the aim to provide support to nurses in the clinical setting. There is, to date, little information in relation to the design, implementation and evaluation of this role.---------- Design: The Donabedian’s model of program evaluation was used to implement and evaluate this initiative.---------- Methods: The ‘NRP’ outlined the steps needed to implement the nurse researcher role in a clinical setting. The steps involved the design of the role, planning for the support system for the role, and evaluation of outcomes of the role over two years.---------- Discussion: This paper proposes an innovative and feasible model to support clinical nursing research which would be relevant to a range of service areas.---------- Conclusion: Nurse researchers are able to play a crucial role in advancing nursing knowledge and facilitating evidence based practice, especially when placed to support a specialised team of nurses at a service level. This role can be implemented through appropriate planning of the position, building a support system and incorporating an evaluation plan.
Resumo:
Environmental education is a field which has only come of age since the late nineteen sixties. While its content and practice have been widely debated and researched, its leadership has been minimally studied and, therefore, is only partially understood. The role of mentoring in the development of leaders has been alluded to, but has attracted scant research. Therefore, this study explores the importance of mentoring during the personal and professional development of leaders in environmental education. Four major research questions were investigated. Firstly, have leaders been men to red during their involvement with environmental education? Secondly, when and how has that mentoring taken place? Thirdly, what was the personal and professional effectiveness of the mentoring relationship? Fourthly, is there any continuation of the mentoring process which might be appropriate for professional development within the field of environmental education? Leaders were solicited from a broad field of environmental educators including teachers, administrators, academics, natural resource personnel, business and community persons. They had to be recognized as active leaders across several environmental education networks. The research elicited qualitative and quantitative survey data from fifty seven persons in Queensland, Australia and Colorado, USA. Seventeen semi-structured interviews were subsequently conducted with selected leaders who had nominated their mentors. This led to a further thirteen 'linked interviews' with some of the mentors' mentors and new mentorees. The interview data is presented as four cases reflecting pairs, triads, chains and webs of relationships- a major finding of the research process. The analysis of the data from the interviews and the surveys was conducted according to a grounded theory approach and was facilitated by NUD.IST, a computer program for non-numerical text analysis. The findings of the study revealed many variations on the classical mentoring patterns found in the literature. Gender and age were not seen as mportant factors, as there were examples of contemporaries in age, older men to younger women, older women to younger men, and women to women. Personal compatibility, professional respect and philosophical congruence were critical. Mentoring was initiated from early, mid and late career stages with the average length of the relationship being fourteen years. There was seldom an example of the mentoree using the mentor for hierarchical career climbing, although frequent career changes were made. However, leadership actions were found to increase after the intervention of a mentoring relationship. Three major categories of informal mentoring were revealed - perceived,acknowledged and deliberate. Further analysis led to the evolution of the core concept, a 'cascade of influence'. The major finding of this study was that this sample of leaders, mentors and new mentorees moved from the perception of having been mentored to the acknowledgment of these relationships and an affirmation of their efficacy for both personal and professional growth. Hence, the participants were more likely to continue future mentoring, not as a serendipitous happening, but through a deliberate choice. Heightened awareness and more frequent 'cascading' of mentoring have positive implications for the professional development of future leaders in environmental education in both formal and informal settings. Effective mentoring in environmental education does not seek to create 'clones' of the mentors, but rather to foster the development of autonomous mentorees who share a philosophical grounding. It is a deliberate invitation to 'join the clan'.
Resumo:
In this paper we propose a new method for utilising phase information by complementing it with traditional magnitude-only spectral subtraction speech enhancement through Complex Spectrum Subtraction (CSS). The proposed approach has the following advantages over traditional magnitude-only spectral subtraction: (a) it introduces complementary information to the enhancement algorithm; (b) it reduces the total number of algorithmic parameters, and; (c) is designed for improving clean speech magnitude spectra and is therefore suitable for both automatic speech recognition (ASR) and speech perception applications. Oracle-based ASR experiments verify this approach, showing an average of 20% relative word accuracy improvements when accurate estimates of the phase spectrum are available. Based on sinusoidal analysis and assuming stationarity between observations (which is shown to be better approximated as the frame rate is increased), this paper also proposes a novel method for acquiring the phase information called Phase Estimation via Delay Projection (PEDEP). Further oracle ASR experiments validate the potential for the proposed PEDEP technique in ideal conditions. Realistic implementation of CSS with PEDEP shows performance comparable to state of the art spectral subtraction techniques in a range of 15-20 dB signal-to-noise ratio environments. These results clearly demonstrate the potential for using phase spectra in spectral subtractive enhancement applications, and at the same time highlight the need for deriving more accurate phase estimates in a wider range of noise conditions.
Resumo:
This paper describes results of a study evaluating the content, functionality and design features of an innovative online website called the Doorway to Research (http://rsc.acid.net.au/Main.aspx) , which was developed to support international graduate students studying at universities in Australia. First, the key features of the website are described. Second, the result of a pilot study involving 12 students and faculty members who tested key aspects of the design, content and functionality of the website and provided written and oral feedback base on task-based questions and focus group discussions are explored. Finally, recommendations for future development are presented. Results of the study indicate general student satisfaction with the website and its design, content and functionality, with specific areas identified for further development.
Resumo:
Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.
Resumo:
This article places the 6 June 2012 transit of Venus in the context of James Cook’s voyage from England to the South Pacific to observe the 1769 transit of Venus. A description is given on how to use a computer program called Stellarium to ‘observe’ the 1769 transit of Venus exactly as Cook saw it from the island of Tahiti in the South Pacific.
Resumo:
At the core of our uniquely human cognitive abilities is the capacity to see things from different perspectives, or to place them in a new context. We propose that this was made possible by two cognitive transitions. First, the large brain of Homo erectus facilitated the onset of recursive recall: the ability to string thoughts together into a stream of potentially abstract or imaginative thought. This hypothesis is sup-ported by a set of computational models where an artificial society of agents evolved to generate more diverse and valuable cultural outputs under conditions of recursive recall. We propose that the capacity to see things in context arose much later, following the appearance of anatomically modern humans. This second transition was brought on by the onset of contextual focus: the capacity to shift between a minimally contextual analytic mode of thought, and a highly contextual associative mode of thought, conducive to combining concepts in new ways and ‘breaking out of a rut’. When contextual focus is implemented in an art-generating computer program, the resulting artworks are seen as more creative and appealing. We summarize how both transitions can be modeled using a theory of concepts which high-lights the manner in which different contexts can lead to modern humans attributing very different meanings to the interpretation of one concept.
Resumo:
Intellectual Property - group of rights used to protect literary, artistic and industrial property. Generally separated into the categories of: • Copyright • Trade marks • Designs • Patents But also extends to specific subject matter of plant variety rights and circuit layouts and general information that is confidential such as trade secrets and protection of goodwill and reputation through the action of passing off. New information, be it a new computer program or novel device, developed by an organisation is valuable to it. So too is the organisation name and reputation. While some protection is automatic, like copyright, other protection and rights must be obtained under various legislation. When dealing with employees and third parties, ownership of existing and new rights needs to be clearly established so that rights are not lost. Obligations in relation to the use of certain property and any confidential information must also be clearly established...
Resumo:
The act of computer programming is generally considered to be temporally removed from a computer program's execution. In this paper we discuss the idea of programming as an activity that takes place within the temporal bounds of a real-time computational process and its interactions with the physical world. We ground these ideas within the con- text of livecoding -- a live audiovisual performance practice. We then describe how the development of the programming environment "Impromptu" has addressed our ideas of programming with time and the notion of the programmer as an agent in a cyber-physical system.
Resumo:
Motivation: Unravelling the genetic architecture of complex traits requires large amounts of data, sophisticated models and large computational resources. The lack of user-friendly software incorporating all these requisites is delaying progress in the analysis of complex traits. Methods: Linkage disequilibrium and linkage analysis (LDLA) is a high-resolution gene mapping approach based on sophisticated mixed linear models, applicable to any population structure. LDLA can use population history information in addition to pedigree and molecular markers to decompose traits into genetic components. Analyses are distributed in parallel over a large public grid of computers in the UK. Results: We have proven the performance of LDLA with analyses of simulated data. There are real gains in statistical power to detect quantitative trait loci when using historical information compared with traditional linkage analysis. Moreover, the use of a grid of computers significantly increases computational speed, hence allowing analyses that would have been prohibitive on a single computer. © The Author 2009. Published by Oxford University Press. All rights reserved.
Resumo:
The invention relates to a method for monitoring user activity on a mobile device, comprising an input and an output unit, comprising the following steps preferably in the following order: detecting and / or logging user activity on said input unit, identifying a foreground running application, hashing of a user-interface-element management list of the foreground running application, and creating a screenshot comprising items displayed on said input unit. The invention also relates to a method for analyzing user activity at a server, comprising the following step: obtaining at least one of an information about detected and / or logged user activity, an information about a foreground running application, a hashed user-interface-element management list and a screenshot from a mobile device. Further, a computer program product is provided, comprising one or more computer readable media having computer executable instructions for performing the steps of at least one of the aforementioned methods.
Resumo:
Charcot-Marie-Tooth neuropathy type 1 (CMT1) is an autosomal dominant disorder originally localized to chromosome 1 by linkage to the Duffy blood group. Studies have since shown that the disorder may be heterogeneous, as not all families show this linkage. We tested genetic heterogeneity by the HOMOG computer program in 15 CMT1 pedigrees informative for Duffy. We detected no evidence for heterogeneity in this sample, but when we combined results with previously published lod scores, heterogeneity was statistically significant. Twelve of the 15 families studied did not show linkage to Duffy. We found six of these families to be informative for a chromosome 19 marker, apolipoprotein CII(ApoC2). Despite a previous report showing probable linkage of a non-Duffy-linked CMT1 pedigree to two chromosome 19 markers, we did not detect significant linkage of ApoC2 to CMT1 in these families.
Resumo:
Motivation: Gene silencing, also called RNA interference, requires reliable assessment of silencer impacts. A critical task is to find matches between silencer oligomers and sites in the genome, in accordance with one-to-many matching rules (G-U matching, with provision for mismatches). Fast search algorithms are required to support silencer impact assessments in procedures for designing effective silencer sequences.Results: The article presents a matching algorithm and data structures specialized for matching searches, including a kernel procedure that addresses a Boolean version of the database task called the skyline search. Besides exact matches, the algorithm is extended to allow for the location-specific mismatches applicable in plants. Computational tests show that the algorithm is significantly faster than suffix-tree alternatives. © The Author 2010. Published by Oxford University Press. All rights reserved.