620 resultados para online discussion environments
Resumo:
Education in the 21st century demands a model for understanding a new culture of learning in the face of rapid change, open access data and geographical diversity. Teachers no longer need to provide the latest information because students themselves are taking an active role in peer collectives to help create it. This paper examines, through an Australian case study entitled ‘Design Minds’, the development of an online design education platform as a key initiative to enact a government priority for state-wide cultural change through design-based curriculum. Utilising digital technology to create a supportive community, ‘Design Minds’ recognises that interdisciplinary learning fostered through engagement will empower future citizens to think, innovate, and discover. This paper details the participatory design process undertaken with multiple stakeholders to create the platform. It also outlines a proposed research agenda for future measurement of its value in creating a new learning culture, supporting regional and remote communities, and revitalising frontline services. It is anticipated this research will inform ongoing development of the online platform, and future design education and research programs in K-12 schools in Australia.
Resumo:
Several major human pathogens, including the filoviruses, paramyxoviruses, and rhabdoviruses, package their single-stranded RNA genomes within helical nucleocapsids, which bud through the plasma membrane of the infected cell to release enveloped virions. The virions are often heterogeneous in shape, which makes it difficult to study their structure and assembly mechanisms. We have applied cryo-electron tomography and sub-tomogram averaging methods to derive structures of Marburg virus, a highly pathogenic filovirus, both after release and during assembly within infected cells. The data demonstrate the potential of cryo-electron tomography methods to derive detailed structural information for intermediate steps in biological pathways within intact cells. We describe the location and arrangement of the viral proteins within the virion. We show that the N-terminal domain of the nucleoprotein contains the minimal assembly determinants for a helical nucleocapsid with variable number of proteins per turn. Lobes protruding from alternate interfaces between each nucleoprotein are formed by the C-terminal domain of the nucleoprotein, together with viral proteins VP24 and VP35. Each nucleoprotein packages six RNA bases. The nucleocapsid interacts in an unusual, flexible "Velcro-like" manner with the viral matrix protein VP40. Determination of the structures of assembly intermediates showed that the nucleocapsid has a defined orientation during transport and budding. Together the data show striking architectural homology between the nucleocapsid helix of rhabdoviruses and filoviruses, but unexpected, fundamental differences in the mechanisms by which the nucleocapsids are then assembled together with matrix proteins and initiate membrane envelopment to release infectious virions, suggesting that the viruses have evolved different solutions to these conserved assembly steps.
Resumo:
Words and Silences is the official on-line journal of the International Oral History Association. It is an internationally peer reviewed, high quality forum for oral historians from a wide range of disciplines and a means for the professional community to share projects and current trends of oral history from around the world. We are extremely pleased to release the first online issue of Word &Silences. This e-journal is the result of long standing discussion and debate about the best way to publish a quality bilingual oral history journal (including a blind peer reviewed section) as a viable solution to mounting difficulties associated with publishing in print. We have discovered that an online version is also not without its challenges and requires tremendous labor intensive dedication. We strongly encourage members to assist us with small review process tasks in the future, so that we can ensure the sustainability of an annual W&S publication for our members and beyond.
Resumo:
Changing environments present a number of challenges to mobile robots, one of the most significant being mapping and localisation. This problem is particularly significant in vision-based systems where illumination and weather changes can cause feature-based techniques to fail. In many applications only sections of an environment undergo extreme perceptual change. Some range-based sensor mapping approaches exploit this property by combining occasional place recognition with the assumption that odometry is accurate over short periods of time. In this paper, we develop this idea in the visual domain, by using occasional vision-driven loop closures to infer loop closures in nearby locations where visual recognition is difficult due to extreme change. We demonstrate successful map creation in an environment in which change is significant but constrained to one area, where both the vanilla CAT-Graph and a Sum of Absolute Differences matcher fails, use the described techniques to link dissimilar images from matching locations, and test the robustness of the system against false inferences.
Resumo:
Within the communicative space online Social Network Sites (SNS) afford, Niche Social Networks Sites (NSNS) have emerged around particular geographic, demographic or topic-based communities to provide what broader SNS do not: specified and targeted content for an engaged and interested community. Drawing on a research project developed at the Queensland University of Technology in conjunction with the Australian Smart Services Cooperative Research Centre that produced an NSNS based around Adventure Travel, this paper outlines the main drivers for community creation and sustainability within NSNS. The paper asks what factors motivate users to join and stay with these sites and what, if any, common patterns can be noted in their formation. It also outlines the main barriers to online participation and content creation in NSNS, and the similarities and differences in SNS and NSNS business models. Having built a community of 100 registered members, the staywild.com.au project was a living laboratory, enabling us to document the steps taken in producing a NSNS and cultivating and retaining active contributors. The paper incorporates observational analysis of user-generated content (UGC) and user profile submissions, statistical analysis of site usage, and findings from a survey of our membership pool in noting areas of success and of failure. In drawing on our project in this way we provide a template for future iterations of NSNS initiation and development across various other social settings: not only niche communities, but also the media and advertising with which they engage and interact. Positioned within the context of online user participation and UGC research, our paper concludes with a discussion of the ways in which the tools afforded by NSNS extend earlier understandings of online ‘communities of interest’. It also outlines the relevance of our research to larger questions about the diversity of the social media ecology.
Resumo:
Online travel reviews are emerging as a powerful source of information affecting tourists' pre-purchase evaluation of a hotel organization. This trend has highlighted the need for a greater understanding of the impact of online reviews on consumer attitudes and behaviors. In view of this need, we investigate the influence of online hotel reviews on consumers' attributions of service quality and firms' ability to control service delivery. An experimental design was used to examine the effects of four independent variables: framing; valence; ratings; and target. The results suggest that in reviews evaluating a hotel, remarks related to core services are more likely to induce positive service quality attributions. Recent reviews affect customers' attributions of controllability for service delivery, with negative reviews exerting an unfavorable influence on consumers' perceptions. The findings highlight the importance of managing the core service and the need for managers to act promptly in addressing customer service problems.
Resumo:
Smartphones become very critical part of our lives as they offer advanced capabilities with PC-like functionalities. They are getting widely deployed while not only being used for classical voice-centric communication. New smartphone malwares keep emerging where most of them still target Symbian OS. In the case of Symbian OS, application signing seemed to be an appropriate measure for slowing down malware appearance. Unfortunately, latest examples showed that signing can be bypassed resulting in new malware outbreak. In this paper, we present a novel approach to static malware detection in resource-limited mobile environments. This approach can be used to extend currently used third-party application signing mechanisms for increasing malware detection capabilities. In our work, we extract function calls from binaries in order to apply our clustering mechanism, called centroid. This method is capable of detecting unknown malwares. Our results are promising where the employed mechanism might find application at distribution channels, like online application stores. Additionally, it seems suitable for directly being used on smartphones for (pre-)checking installed applications.
Resumo:
This chapter provides a theoretically and empirically grounded discussion of participatory research methodologies with respect to investigating the dynamic and evolving phenomenon of young people constructing identities and social relations in “iScapes”. We coin the term iScapes to refer to the online/offline interconnectedness of spaces in the fabric of everyday life. Specifically, we offer a critical analysis of the participatory research methods we used in our own research project to understand the ways in which high school students use new media and information communication technologies (ICTs) to construct identities, form social relations, and engage in creative practices as part of their everyday lives. The chapter concludes with reflexive deliberations on our approach to participatory research that may benefit other researchers who share a similar interest in youth and new media.
Resumo:
In a critical but sympathetic reading of Habermas’s work (1984, 1987a, 1987b, 2003), Luke Goode (2005) recently sought to rework his theory of deliberative democracy in an age of mediated and increasingly digital public spheres. Taking a different approach, Alan McKee (2005) challenged the culture- and class-bound strictures of Habermasian rationalism, instead pursuing a more radically pluralist account of postmodern public spheres. The editors of this special section of Media, Culture & Society invited us to discuss our differing approaches to the public sphere. Goode holds that the institutional bases of contemporary public spheres (political parties, educational institutions or public media) remain of critical importance, albeit in the context of a kaleidoscopic array of unofficial and informal micro-publics, both localized and de-territorialized. In contrast, McKee sustains a ‘hermeneutics of suspicion’ toward the official, hegemonic institutions of the public sphere since they tend to exclude and delegitimize discourses and practices that challenge their polite middle-class norms. McKee’s recent research has focused on sexual cultures, particularly among youth (McKee, 2011). Goode’s recent work has examined new social media spaces, particularly in relation to news and public debate (e.g. Goode, 2009; Goode et al., 2011). Consequently, our discussion turned to a domain which links our interests: after Goode discussed some of his recent research on (in)civility on YouTube as a new media public sphere, McKee challenged him to consider the case of pornographic websites modelled on social media sites.1 He identifies a greater degree of ‘civility’ in these pornographic sibling sites than on YouTube, requiring careful consideration of what constitutes a ‘public sphere’ in contemporary digital culture. Such sites represent an environment that shatters the opposition of public and private interest, affording public engagement on matters of the body, of intimacy, of gender politics, of pleasure and desire – said by many critics to be ruled out of court in Habermasian theory. Such environments also trouble traditional binaries between the cognitive and the affective, and between the performative and the deliberative. In what follows we explore the differences between our approaches in the form of a dialogue. As is often the case, our approaches seemed less at odds after engaging in conversation than may have initially appeared. But important differences of emphasis remain.
Resumo:
In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
University learning increasingly includes online learning experiences embedded within teaching with the dual policy intentions of increasing flexibility and learner engagement. In this research project, three university lecturers from different teaching contexts selected technologies for online learning to enhance learner engagement by encouraging peer learning. A sociocultural view of learning was used to conceptualise the technological and social affordances that might enable student peer participation and engagement. The research explored the question: “What are the benefits and barriers experienced by students engaging in online peer collaboration?” Students reported benefits including a sense of belonging that enhanced motivation, and professional identity. This article also reports on some of the challenges for students and University academics when engaging in online learning communities.
Resumo:
This report, prepared by QUT Social Work and Human Services, in collaboration with key sector stakeholders, identifies the current and potentially expanded uses of Simulated Learning Environments (SLE) as part of the Health Workforce Australia (HWA) National Project. An expert Reference Group guided the project, facilitated the data collection, and provided feedback and support on the findings and broad recommendations.
Resumo:
Good daylighting design in buildings not only provides a comfortable luminous environment, but also delivers energy savings and comfortable and healthy environments for building occupants. Yet, there is still no consensus on how to assess what constitutes good daylighting design. Currently amongst building performance guidelines, Daylighting factors (DF) or minimum illuminance values are the standard; however, previous research has shown the shortcomings of these metrics. New computer software for daylighting analysis contains new more advanced metrics for daylighting (Climate Base Daylight Metrics-CBDM). Yet, these tools (new metrics or simulation tools) are not currently understood by architects and are not used within architectural firms in Australia. A survey of architectural firms in Brisbane showed the most relevant tools used by industry. The purpose of this paper is to assess and compare these computer simulation tools and new tools available architects and designers for daylighting. The tools are assessed in terms of their ease of use (e.g. previous knowledge required, complexity of geometry input, etc.), efficiency (e.g. speed, render capabilities, etc.) and outcomes (e.g. presentation of results, etc. The study shows tools that are most accessible for architects, are those that import a wide variety of files, or can be integrated into the current 3d modelling software or package. These software’s need to be able to calculate for point in times simulations, and annual analysis. There is a current need in these software solutions for an open source program able to read raw data (in the form of spreadsheets) and show that graphically within a 3D medium. Currently, development into plug-in based software’s are trying to solve this need through third party analysis, however some of these packages are heavily reliant and their host program. These programs however which allow dynamic daylighting simulation, which will make it easier to calculate accurate daylighting no matter which modelling platform the designer uses, while producing more tangible analysis today, without the need to process raw data.
Resumo:
In practical cases for active noise control (ANC), the secondary path has usually a time varying behavior. For these cases, an online secondary path modeling method that uses a white noise as a training signal is required to ensure convergence of the system. The modeling accuracy and the convergence rate are increased when a white noise with a larger variance is used. However, the larger variance increases the residual noise, which decreases performance of the system and additionally causes instability problem to feedback structures. A sudden change in the secondary path leads to divergence of the online secondary path modeling filter. To overcome these problems, this paper proposes a new approach for online secondary path modeling in feedback ANC systems. The proposed algorithm uses the advantages of white noise with larger variance to model the secondary path, but the injection is stopped at the optimum point to increase performance of the algorithm and to prevent the instability effect of the white noise. In this approach, instead of continuous injection of the white noise, a sudden change in secondary path during the operation makes the algorithm to reactivate injection of the white noise to correct the secondary path estimation. In addition, the proposed method models the secondary path without the need of using off-line estimation of the secondary path. Considering the above features increases the convergence rate and modeling accuracy, which results in a high system performance. Computer simulation results shown in this paper indicate effectiveness of the proposed method.