785 resultados para Knowledge Identification
Resumo:
The design-build (DB) system has been demonstrated as an effective delivery method and has gained popularity worldwide. However it is observed that a number of operational variations of DB system have emerged since the last decade to cater for different client’s requirements. After the client decides to procure his project through the DB system, he still has to choose an appropriate configuration to deliver their projects optimally. However, there is little research on the selection of DB operational variations. One of the main reasons for this is the lack of evaluation criteria for determining the appropriateness of each operational variation. To obtain such criteria, a three-round Delphi survey has been conducted with 20 construction experts in the People’s Republic of China (PRC). Seven top selection criteria were identified. These are: (1) availability of competent design-builders; (2) client’s capabilities; (3) project complexity; (4) client’s control of project; (5) early commencement & short duration; (6) reduced responsibility or involvement; and (7) clearly defined end user’s requirements. These selection criteria were found to have a statistically significant agreement. These findings may furnish various stakeholders, DB clients in particular, with better insight to understand and compare the different operational variations of the DB system.
Resumo:
Design-builders play a vital role in the success of DB projects. In the construction market of the People’s Republic of China, most of the design-builders, however, lack adequate competences to conduct the DB projects successfully. The objective of this study is, therefore, to identify the key competences that design-builders should possess to not only ensure the success of DB projects but also acquire the competitive advantages in the DB market. Five semi-structured face-to-face interviews and two rounds of Delphi questionnaire survey were conducted to identify the key competences of design-builders. Rankings have been assigned to these key competences on the basis of their relative importance. Six ranked key competences of design-builders have been identified, which are, namely, (1) experience with similar DB projects; (2) capability of corporate management; (3) combination of building techniques and design expertise; (4) financial capability for DB projects; (5) enterprise qualification and scale; and (6) credit records and reputation in the industry. The design-builders can make use of the research findings as guidelines to improve their DB competence. These research findings will also be useful to clients during the selection of design-builders.
Resumo:
The design-build system has been demonstrated as an effective delivery method and gained popularity worldwide. Although there are an increasing number of clients adopting DB method in China, most of them remain inexperienced with method. The objective of this study is therefore to identify the key competences that a client or its consultant should possess to ensure the success of DB projects. Face-to-face interviews and a two-round Delphi questionnaire survey were conducted to find the following six key competences of clients, which include the (1) ability to clearly articulate project scope and objectives; (2) financial capacity for DB projects; (3) capability in contract management; (4) adequate staff or consulting team; (5) effective coordination with contractors and (6) experience with similar DB projects. This study will hopefully provide clients with measures to evaluate their DB competence and further promote their understanding of DB system in the PRC.
Resumo:
This paper reports one aspect of a study of 28 young adults (18–26 years) engaging with the uncertain (contested) science of a television news report about recent research into mobile phone health risks. The aim of the study was to examine these young people’s ‘accounts of scientific knowledge’ in this context. Seven groups of friends responded to the news report, initially in focus group discussions. Later in semi-structured interviews they elaborated their understanding of the nature of science through their explanations of the scientists’ disagreement and described their mobile phone safety risk assessments. This paper presents their accounts in terms of their views of the nature of science and their concept understanding. Discussions were audio-recorded then analysed by coding the talk in terms of issues raised, which were grouped into themes and interpreted in terms of a moderate social constructionist theoretical framing. In this context, most participants expressed a ‘common sense’ view of the nature of science, describing it as an atheoretical, technical procedure of scientists testing their personal opinions on the issue, subject to the influence of funding sponsors. The roles of theory and data interpretation were largely ignored. It is argued that the nature of science understanding is crucial to engagement with contemporary socioscientific issues, particularly the roles of argumentation, theory, data interpretation, and the distinction of science from common sense. Implications for school science relate primarily to nature of science teaching and the inclusion of socioscientific issues in school science curricula. Future research directions are considered.
Resumo:
Occupant injury comprises the largest proportion of child road crash trauma in most highly motorised countries. In Australia, road crashes are the primary cause of death for children aged 1-14 years and are among the top three causes of serious injury to this age group. For this reason considerable research attention has been focused on understanding the contributing factors and the most effective ways of improving children’s safety as car passengers. Australia has been particularly active in this area, with well regarded work being conducted on levels of use of dedicated child restraints, restraint crash performance in laboratory conditions, examination of real world restraint crash performance (case review), and studies of psychosocial factors influencing perceptions about restraints and their use (Brown & Bilston, 2006; Brown, McCaskill, Henderson & Bilston, 2006; Edwards, Anderson & Hutchinson, 2006; Lennon, 2005, 2007). New legislation for the restraint of children as vehicle passengers was enacted in Queensland in March 2010. This new legislation recognises the importance of dedicated restraint use for children up to at least age 7 years and the protective benefits of rear seating position in the event of a crash. As part of improving children’s safety and addressing key priority areas, the Queensland Injury Prevention Council (QIPC) and Department of Transport and Main Roads (TMR) commissioned the Centre for Accident Research and Road Safety, Queensland (CARRS-Q) to evaluate the impact of the new legislation. Although at the time of commencing the research the legislation had only been in force for 14 months, it was deemed critical to review its effectiveness in guiding parental choices and compliance in order to inform the design and focus of further supporting initiatives and interventions. Specifically, the research sought clear evidence of exactly what impact, if any, the legislation has had on compliance levels and what difficulties (if any) parents/carers experience in relation to interpreting as well as complying with the requirements of the new law. Knowledge about these barriers or difficulties will allow any future changes or improvements to the legislation to address such barriers and thus improve its effectiveness. Moreover, better information about how the legislation has affected parents will provide a basis to plan non-legislative comprehensive multi-strategy interventions such as community, educational or behavioural interventions with parents/carers and other stakeholder groups. In addition, it will allow identification of the most effective aspects of the legislation and those areas in need of extra attention to improve effectiveness/compliance and thus better protect children travelling in cars and improve their health and safety. This report presents the findings from the four components of the research: the literature review; observational study; intercept interviews and focus group with parents; and the interviews with key stakeholders.
Resumo:
In this article we identify how computational automation achieved through programming has enabled a new class of music technologies with generative music capabilities. These generative systems can have a degree of music making autonomy that impacts on our relationships with them; we suggest that this coincides with a shift in the music-equipment relationship from tool use to a partnership. This partnership relationship can occur when we use technologies that display qualities of agency. It raises questions about the kinds of skills and knowledge that are necessary to interact musically in such a partnership. These are qualities of musicianship we call eBility. In this paper we seek to define what eBility might consist of and how consideration of it might effect music education practice. The 'e' in eBility refers not only to the electronic nature of computing systems but also to the ethical, enabling, experiential and educational dimensions of the creative relationship with technologies with agency. We hope to initiate a discussion around differentiating what we term representational technologies from those with agency and begin to uncover the implications of these ideas for music educators in schools and communities. We hope also to elucidate the emergent theory and practice that has enabled the development of strategies for optimising this kind of eBility where the tool becomes partner. The identification of musical technologies with agency adds to the authors’ list of metaphors for technology use in music education that previously included tool, medium and instrument. We illustrate these ideas with examples and with data from our work with the jam2jam interactive music system. In this discussion we will outline our experiences with jam2jam as an example of a technology with agency and describe the aspects of eBility that interaction with it promotes.
Resumo:
Transcending traditional national borders, the Internet is an evolving technology that has opened up many new international market opportunities. However, ambiguity remains, with limited research and understanding of how the Internet influences the firm’s internationalisation process components. As a consequence, there has been a call for further investigation of the phenomenon. Thus, the purpose of this study was to investigate the Internet’s impact on the internationalisation process components, specifically, information availability, information usage, interactive communication and international market growth. Analysis was undertaken using structural equation modelling. Findings highlight the mediating impact of the Internet on information and knowledge transference in the internationalisation process. Contributions of the study test conceptualisations and give statistical validation of interrelationships, while illuminating the Internet’s impact on firm internationalisation.
Resumo:
In most materials, short stress waves are generated during the process of plastic deformation, phase transformation, crack formation and crack growth. These phenomena are applied in acoustic emission (AE) for the detection of material defects in wide spectrum areas, ranging from non-destructive testing for the detection of materials defects to monitoring of microeismical activity. AE technique is also used for defect source identification and for failure detection. AE waves consist of P waves (primary/longitudinal waves), S waves (shear/transverse waves) and Rayleight (surface) waves as well as reflected and diffracted waves. The propagation of AE waves in various modes has made the determination of source location difficult. In order to use the acoustic emission technique for accurate identification of source location, an understanding of wave propagation of the AE signals at various locations in a plate structure is essential. Furthermore, an understanding of wave propagation can also assist in sensor location for optimum detection of AE signals. In real life, as the AE signals radiate from the source it will result in stress waves. Unless the type of stress wave is known, it is very difficult to locate the source when using the classical propagation velocity equations. This paper describes the simulation of AE waves to identify the source location in steel plate as well as the wave modes. The finite element analysis (FEA) is used for the numerical simulation of wave propagation in thin plate. By knowing the type of wave generated, it is possible to apply the appropriate wave equations to determine the location of the source. For a single plate structure, the results show that the simulation algorithm is effective to simulate different stress waves.
Less but more : weaving disparate disciplines together for learners to construct their own knowledge
Resumo:
This paper reports on a Professional Learning Program conducted in China with 140 general technology teachers. It aimed to integrate robotics technology across and within the disciplines of science, technology, engineering and mathematics. With the help of university facilitators teachers developed General Technology lessons that seamlessly integrated with rich learning content across disciplines. Teachers engaged in seminars and workshops, which provided the opportunities for them to actively couch sound principles of learning in their daily work. They gained first-hand experience in applying an aligned system of assessments, standards and quality learning experiences geared to the needs of each student. Teachers worked collaboratively in teams to create inquiry, design and collaborative learning activities that aligned with their curriculum and which dealt with real world problems, issues and challenges. They continually discussed and reflected deeply on the activities and shared the newly developed resources online with teachers across the entire country. It is evident from the preliminary analysis of data that teachers are beginning to apply rich pedagogical practices and are becoming ‘adaptive’ in their approach when using LEGO® robotic tools to design, redesign, create and re-create learning activities for their students.
Resumo:
The “political” dynamics and the details of conducting criminological research on a day-to-day basis are examined. The role of government and commercial contracts in contemporary criminological scholarship are explored, as well as the various obstacles that criminologists must negotiate during the completion of a research project. The criminological implications of the ways in which academic environments are changing under new managerialist philosophies are examined. The ways in which notions of “critique” have become subordinate to the politics of existing governing rationalities are also examined. Chapter 1 details the questions, contours, and methods of “deviant knowledge.” Chapter 2 discusses the contours of criminological knowledge, including early criminological developments, international reconstruction and developments in criminological research following World War II, the United Nations, and the rise of critical genres. Chapter 3 explores criminology, government, and public policy, including the policies of the Home Office of England and Wales; the National Institute of Justice in Washington, DC; and the Australian Institute of Criminology in Canberra. The politics and control of criminological knowledge are discussed in chapter 4, along with ethical and legal issues, gathering and accessing data, and publishing results of research. Chapter 5 describes the “War on Terror” and government intolerance and suppression of free speech. Chapter 6 examines the new modes of governance and the commercialization of criminological knowledge. Chapter 7 discusses intellectual independence and collective concern, and the value of critique. 3 appendices, 546 references, index
Resumo:
This chapter proposes a conceptual model for optimal development of needed capabilities for the contemporary knowledge economy. We commence by outlining key capability requirements of the 21st century knowledge economy, distinguishing these from those suited to the earlier stages of the knowledge economy. We then discuss the extent to which higher education currently caters to these requirements and then put forward a new model for effective knowledge economy capability learning. The core of this model is the development of an adaptive and adaptable career identity, which is created through a reflective process of career self-management, drawing upon data from the self and the world of work. In turn, career identity drives the individual’s process of skill and knowledge acquisition, including deep disciplinary knowledge. The professional capability learning thus acquired includes disciplinary skill and knowledge sets, generic skills, and also skills for the knowledge economy, including disciplinary agility, social network capability, and enterprise skills. In the final part of this chapter, we envision higher education systems that embrace the model, and suggest steps that could be taken toward making the development of knowledge economy capabilities an integral part of the university experience.
Resumo:
Significant numbers of children are severely abused and neglected by parents and caregivers. Infants and very young children are the most vulnerable and are unable to seek help. To identify these situations and enable child protection and the provision of appropriate assistance, many jurisdictions have enacted ‘mandatory reporting laws’ requiring designated professionals such as doctors, nurses, police and teachers to report suspected cases of severe child abuse and neglect. Other jurisdictions have not adopted this legislative approach, at least partly motivated by a concern that the laws produce dramatic increases in unwarranted reports, which, it is argued, lead to investigations which infringe on people’s privacy, cause trauma to innocent parents and families, and divert scarce government resources from deserving cases. The primary purpose of this paper is to explore the extent to which opposition to mandatory reporting laws is valid based on the claim that the laws produce ‘overreporting’. The first part of this paper revisits the original mandatory reporting laws, discusses their development into various current forms, explains their relationship with policy and common law reporting obligations, and situates them in the context of their place in modern child protection systems. This part of the paper shows that in general, contemporary reporting laws have expanded far beyond their original conceptualisation, but that there is also now a deeper understanding of the nature, incidence, timing and effects of different types of severe maltreatment, an awareness that the real incidence of maltreatment is far higher than that officially recorded, and that there is strong evidence showing the majority of identified cases of severe maltreatment are the result of reports by mandated reporters. The second part of this paper discusses the apparent effect of mandatory reporting laws on ‘overreporting’ by referring to Australian government data about reporting patterns and outcomes, with a particular focus on New South Wales. It will be seen that raw descriptive data about report numbers and outcomes appear to show that reporting laws produce both desirable consequences (identification of severe cases) and problematic consequences (increased numbers of unsubstantiated reports). Yet, to explore the extent to which the data supports the overreporting claim, and because numbers of unsubstantiated reports alone cannot demonstrate overreporting, this part of the paper asks further questions of the data. Who makes reports, about which maltreatment types, and what are the outcomes of those reports? What is the nature of these reports; for example, to what extent are multiple numbers of reports made about the same child? What meaning can be attached to an ‘unsubstantiated’ report, and can such reports be used to show flaws in reporting effectiveness and problems in reporting laws? It will be suggested that available evidence from Australia is not sufficiently detailed or strong to demonstrate the overreporting claim. However, it is also apparent that, whether adopting an approach based on public health and or other principles, much better evidence about reporting needs to be collected and analyzed. As well, more nuanced research needs to be conducted to identify what can reasonably be said to constitute ‘overreports’, and efforts must be made to minimize unsatisfactory reporting practice, informed by the relevant jurisdiction’s context and aims. It is also concluded that, depending on the jurisdiction, the available data may provide useful indicators of positive, negative and unanticipated effects of specific components of the laws, and of the strengths, weaknesses and needs of the child protection system.
Resumo:
This article explores the influence of new modes of governance on the production of criminological knowledge. In doing so, it examines the rise of discourses on risk and critiques the ways in which academic environments are changing under new managerialist philosophies. The article further explores the increasing 'commodification of criminological knowledge' and analyses its effect on contemporary criminological scholarship. Finally, this article examines the contours of critical criminological scholarship and advocates for a criminology of resistance.
Resumo:
In this paper, we report on many phosphate containing natural minerals found in the Jenolan Caves - Australia. Such minerals are formed by the reaction of bat guano and clays from the caves. Among these cave minerals is the montgomeryite mineral [Ca4MgAl4(PO4)6.(OH)4.12H2O]. The presence of montgomeryite in deposits of the Jenolan Caves - Australia has been identified by X-ray diffraction (XRD). Raman spectroscopy complimented with infrared spectroscopy has been used to characterize the crystal structure of montgomeryite. The Raman spectrum of a standard montgomeryite mineral is identical to that of the Jenolan Caves sample. Bands are assigned to H2PO4-, OH and NH stretching vibrations. By using a combination of XRD and Raman spectroscopy, the existence of montgomeryite in the Jenolan Caves - Australia has been proven. A mechanism for the formation of montgomeryite is proposed.
Resumo:
Purpose: The construction industry is well known for its high accident rate and many practitioners consider a preventative approach to be the most important means of bringing about improvements. This paper addresses previous research and the weaknesses of existing preventative approaches and a new application is described and illustrated involving the use of a multi-dimensional simulation tool - Construction Virtual Prototyping (CVP). Methodology: A literature review was conducted to investigate previous studies of hazard identification and safety management and to develop the new approach. Due to weaknesses in current practice, the research study explored the use of computer simulation techniques to create virtual environments where users can explore and identify construction hazards. Specifically, virtual prototyping technology was deployed to develop typical construction scenarios in which unsafe or hazardous incidents occur. In a case study, the users’ performance was evaluated their responses to incidents within the virtual environment and the effectiveness of the computer simulation system established though interviews with the safety project management team. Findings: The opinions and suggestions provided by the interviewees led to the initial conclusion that the simulation tool was useful in assisting the safety management team’s hazard identification process during the early design stage. Originality: The research introduces an innovative method to support the management teams’ reviews of construction site safety. The system utilises three-dimensional modelling and four-dimensional simulation of worker behaviour, a configuration that has previously not been employed in construction simulations. An illustration of the method’s use is also provided, together with a consideration of its strengths and weaknesses.