736 resultados para sequences analysis technology
Resumo:
Kuwait is an oil rich country planning for a future that is not dependent on exploiting natural resources. A major policy initiative has been the introduction of Information Communication and Technology (ICT) to schools. However, contextual issues and teacher capabilities in the use of ICT have limited the success of this initiative. The study examines the leadership strategies of two secondary school principals whose schools have achieved this goal. The case study draws on intensive data collected through interviews of the principals, and teachers supported by document analysis and observations. Analysis was guided by theoretical perspectives drawn from the literature which identified a range of strategies used by the principals to manage change. The principals of Schools A and B employed three key strategies to maximise the impact on the teaching staff incorporating ICT into their teaching and learning practices. These strategies were: (a) encouragement for teaching staff to implement ICT in their teaching; (b) support to meet the material and human needs of teaching staff using ICT; and (c) provision of instructions and guidance for teaching staff in how and why such behaviours and practices should be performed. The outcome of this study proposes an innovative change leadership model that informs emerging countries, which are also undergoing major change related to ICT. However, the study also revealed limitations in the implementation of ICT in the classroom and provides insights into further strategies that principals need to adopt.
Resumo:
BACKGROUND There is increasing enrolment of international students in the Engineering and Information Technology disciplines and anecdotal evidence of a need for additional understanding and support for these students and their supervisors due to differences both in academic and social cultures. While there is a growing literature on supervisory styles and guidelines on effective supervision, there is little on discipline-specific, cross-cultural supervision responding to the growing diversity. In this paper, we report findings from a study of Engineering and Information technology Higher Degree Research (HDR)students and supervision in three Australian universities. PURPOSE The aim was to assess perceptions of students and supervisors of factors influencing success that are particular to international or culturally and linguistically diverse (CaLD) HDR students in Engineering and Information technology. DESIGN/METHOD Online survey and qualitative data was collected from international and CaLD HDR students and supervisors at the three universities. Bayesian network analysis, inferential statistics, and qualitative analysis provided the main findings. RESULTS Survey results indicate that both students and supervisors are positive about their experiences, and do not see language or culture as particularly problematic. The survey results also reveal strong consistency between the perceptions of students and supervisors on most factors influencing success. Qualitative analysis of critical supervision incidents has provided rich data that could help improve support services. CONCLUSIONS In contrast with anecdotal evidence, HDR completion data from the three universities reveal that international students, on average, complete in shorter time periods than domestic students. The analysis suggests that success is linked to a complex set of factors involving the student, supervision, the institution and broader community.
Resumo:
In this thesis, I contribute to the study of how arrangements are made in social interaction. Using conversation analysis, I examine a corpus of 375 telephone calls between employees and clients of three Community Home Care (CHC) service agencies in metropolitan Adelaide, South Australia. My analysis of the CHC data corpus draws upon existing empirical findings within conversation analysis in order to generate novel findings about how people make arrangements with one another, and some of the attendant considerations that parties to such an activity can engage in: Prospective informings as remote proposals for a future arrangement – Focusing on how employees make arrangements with clients, I show how the employees in the CHC data corpus use ‘prospective informings’ to detail a future course of action that will involve the recipient of that informing. These informings routinely occasion a double-paired sequence, where informers pursue a response to their informing. This pursuit often occurs even after recipients have provided an initial response. This practice for making arrangements has been previously described by Houtkoop (1987) as ‘remote proposing.’ I develop Houtkoop’s analysis to show how an informing of a future arrangement can be recompleted, with response solicitation, as a proposal that is contingent upon a recipient’s acceptance. Participants’ understanding of references to non-present third parties – In the process of making arrangements, references are routinely made to non-present third parties. In the CHC data corpus, these third parties are usually care workers. Prior research (e.g., Sacks & Schegloff, 1979; Schegloff, 1996b) explains how the use of ‘recognitional references’ (such as the bare name ‘Kerry’), conveys to recipients that they should be able to locate the referent from amongst their acquaintances. Conversely, the use of ‘non-recognitional references’ (such as the description ‘a lady called Kerry’), conveys that recipients are unacquainted with the referent. I examine instances where the selection of a recognitional or non-recognitional reference form is followed by a recipient initiating repair on that reference. My analysis provides further evidence thatthe existing analytic account of these references corresponds to the way in which participants themselves make sense of them. My analysis also advances an understanding of how repair can be used, by recipients, to indicate the inappositeness of a prior turn. Post-possible-completion accounts – In a case study of a problematic interaction, I examine a misunderstanding that is not resolved within the repair space, the usual defence of intersubjectivity in interaction (cf. Schegloff, 1992b). Rather, I explore how the source of trouble is addressed, outside of the sequence of its production, with a ‘post-possible-completion account.’ This account specifies the basis of a misunderstanding and yet, unlike repair, does so without occasioning a revised response to a trouble-source turn. By considering various aspects of making arrangements in social interaction, I highlight some of the rich order that underpins the maintenance of human relationships across time. In the concluding section of this thesis I review this order, while also discussing practical implications of this analysis for CHC practice.
Resumo:
In an increasingly business technology (BT) dependent world, the impact of the extraordinary changes brought about by the nexus of mobile and cloud technologies, social media and big data is increasingly being felt in the board room. As leaders of enterprises of every type and size, board directors can no longer afford to ignore, delegate or avoid BT-related decisions. Competitive, financial and reputational risk is increased if boards fail to recognize their role in governing technology as an asset and in removing barriers to improving enterprise business technology governance (EBTG). Directors’ awareness of the need for EBTG is increasing. However, industry research shows that board level willingness to rectify the gap between awareness and action is very low or non-existent. This literature review-based research identifies barriers to EBTG effectiveness. It provides a practical starting point for board analysis. We offer four outcomes that boards might focus on to ensure the organizations they govern are not left behind by those led by the upcoming new breed of technology-savvy leaders. Most extant research looks backward for examples, examining data pre-2010, the time when a tipping point in the personal and business use of multimedia and mobile-internet devices significantly deepened the impacts of the identified nexus technology forces, and began rapidly changing the way many businesses engage with their customers, employees and stakeholders. We situate our work amidst these nexus forces, discuss the board’s role in EBTG in this context, and modernize current definitions of enterprise technology governance. The primary limitation faced is the lack of scholarly research relating to EBTG in the rapidly changing digital economy. Although we have used recent (2011 - 2013) industry surveys, the volume of these surveys and congruence across them is significant in terms of levels of increased awareness and calls for increased board attention and competency in EBTG and strategic information use. Where possible we have used scholarly research to illustrate or discuss industry findings.
Resumo:
In recent years, enterprise architecture (EA) has captured increasing interest as a means to systematically consolidate and manage various enterprise artefacts in order to provide holistic decision support for business/IT alignment and business/IT landscapes management. To provide a holistic perspective on the enterprise over time, EA frameworks need to co-evolve with the changes in the enterprise and its IT over time. In this paper we focus on the emergence of Service-Oriented Architecture (SOA). There is a need to integrate SOA with EA to keep EA relevant and to use EA products to help drive successful SOA. This paper investigates and compares the integration of SOA elements in five widely used EA frameworks: Archimate, The Open Group Architecture Framework (TOGAF), Federal Enterprise Architecture Framework (FEAF), Department of Defence Architecture Framework (DoDAF) and the Ministry of Defence Architecture Framework (MODAF). It identifies what SOA elements are considered and their relative position in the overall structure. The results show that services and related elements are far from being well-integrated constructs in current EA frameworks and that the different EA frameworks integrated SOA elements in substantially different ways. Our results can support the academic EA and SOA communities with a closer and more consistent integration of EA and SOA and support practitioners in identifying an EA framework that provides the SOA support that matches their requirements.
Resumo:
This paper presents the idea of a compendium of process technologies, i.e., a concise but comprehensive collection of techniques for process model analysis that support research on the design, execution, and evaluation of processes. The idea originated from observations on the evolution of process-related research disciplines. Based on these observations, we derive design goals for a compendium. Then, we present the jBPT library, which addresses these goals by means of an implementation of common analysis techniques in an open source codebase.
Analysis and optimisation of the preferences of decision-makers in black-start group decision-making
Resumo:
As the first stage of power system restoration after a blackout, an optimal black-start scheme is very important for speeding up the whole restoration procedure. Up to now, much research work has been done on generating or selecting an optimal black-start scheme by a single round of decision-making. However, less attention has been paid for improving the final decision-making results through a multiple-round decision-making procedure. In the group decision-making environment, decision-making results evaluated by different black-start experts may differ significantly with each other. Thus, the consistency of black-start decision-making results could be deemed as an important indicator in assessing the black-start group decision-making results. Given this background, an intuitionistic fuzzy distance-based method is presented to analyse the consistency of black-start group decision-making results. Moreover, the weights of black-start indices as well as the weights of decision-making experts are modified in order to optimise the consistency of black-start group decision-making results. Finally, an actual example is served for demonstrating the proposed method.
Resumo:
The numerical analysis method of cracking in cast-in-place reinforced concrete slabs is presented. T he results agree w ell with the actual conditions. T he current state of knowledge and some new research findings on crack-control are introduced such as increasing the quantities of the distribution steel, adopting fibre reinforced concrete etc. Some recommended crack-control procedures used in design construction is presented based on the investigation and study of cracking in a frame structure.
Resumo:
Deterministic computer simulations of physical experiments are now common techniques in science and engineering. Often, physical experiments are too time consuming, expensive or impossible to conduct. Complex computer models or codes, rather than physical experiments lead to the study of computer experiments, which are used to investigate many scientific phenomena of this nature. A computer experiment consists of a number of runs of the computer code with different input choices. The Design and Analysis of Computer Experiments is a rapidly growing technique in statistical experimental design. This thesis investigates some practical issues in the design and analysis of computer experiments and attempts to answer some of the questions faced by experimenters using computer experiments. In particular, the question of the number of computer experiments and how they should be augmented is studied and attention is given to when the response is a function over time.
Resumo:
Related-party (RP) transactions are said to be commonly used opportunistically in business and contribute to corporate failures. While periodic disclosure is widely accepted as an effective means of monitoring such transactions, research is scant, particularly in countries where business dealings may be more susceptible to corruption. This study investigates the nature and extent of corporate RP disclosures across six countries in the Asia-Pacific region. The key finding indicates that companies in countries with stronger regulatory enforcement, shareholders’ protection, and control for corruption, have more transparent RP disclosures. This evidence potentially contributes to reforms aimed at strengthening RP disclosure and compliance.
Resumo:
This thesis used Critical Discourse Analysis to investigate how a government policy and the newsprint media constructed discussion about young people’s participation in education or employment. The study found that a continuous narrative across both sites about government as a noble agent taking action to redress the social disruption caused by young people’s disengagement. Unlike the education policy, the newsprint media blamed young people who were disengaged and failed to recognise the barriers they often face. The study points to possibilities for utilising the power of narrative to build a more fair and rigorous discussion of issues in the public sphere.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Pedagogical styles, methods, models, practices or strategies are valued for what they claim they can achieve. In recent times curriculum documents and governments have called for a range of teaching approaches to meet the variety of learner differences and allow students to make more independent decision making in physical education (Hardy and Mawer, 1999). One well known system of categorizing teaching styles is the Mosston and Ashworth’s Spectrum of Teaching Styles (2002). In Queensland, prior to 2005, no research had been conducted on the teaching styles used by teachers of Physical Education. However, many teachers self-reported that they employed a variety of teaching styles depending on the aims and content of the material to be taught (Cothran, et al., 2005). This research, for the first time, collected teacher’s self-reported use of teaching styles and through observations verify the styles that were being used to teach Senior Physical Education in Queensland. More specifically the aims of the research were to determine: a) What teaching styles teachers of Senior Physical Education in Queensland believe they use? i) Were they using a range of teaching styles? ii) Were teachers of Senior Physical Education in Queensland using teaching styles that the Queensland Senior Physical Education Syllabus (2004) required? b) If Mosston and Ashworth’s (2002) Spectrum of Teaching Styles were used to categorise styles observed during the teaching of Senior Physical Education did the styles being used provide opportunities for evaluating as described by the Queensland Senior Physical Education Syllabus (2004)? The research was conducted in two phases. Part A involved use of a questionnaire to determine the teaching styles Queensland teachers of Senior Physical Education reported using and how often they reported using them. The questionnaire was administered to 110 teachers throughout Queensland. The sample was determined from 346 schools teaching Senior Physical Education (in 2006) across the state of Queensland, Australia. 286 questionnaires were sent to 77 non-randomised schools. There were 66 male and 44 female respondents in the sample. A wide range of teaching styles were reportedly used by teachers of Senior Physical Education with Practice Style-Style B, Command Style-Style A and Divergent Discovery Style-Style H, the most reportedly used. The Self-Teaching Style-Style K was reportedly used the least by teachers involved in this study. From the respondents a group of teachers were identified to form the participants for Part B. Part B of the study involved observation of a group of volunteer participants (from those who had completed the questionnaire) who displayed many of the ‘typical’ characteristics, and a cross-section of backgrounds, of teachers of Senior Physical Education in Queensland. In the case of this study, the criteria used to select the group of teachers to be observed teaching were, teaching experience (number of years: 0-4, 5-10 and 11 years and over), gender, geographical location of schools (focused on Brisbane and near area for travel/access purposes), profile of the students at schools (girls, boys or co-educational), nature of school (Government or Private) and the physical activities being taught in a school (activities to reflect all the areas of physical activity outlined within the syllabus). A total of 27 questionnaire respondents from Part A indicated that they were willing to be observed teaching practical lessons. The respondents who volunteered to be involved in Part B of the study came from different regions across the state of Queensland and was not confined to the Brisbane metropolitan area or large cities. From the group of people who volunteered for Part B four came from outside Brisbane and 23 from the Brisbane area. The final observation group of nine participants included eight teachers from the Brisbane area and one from a rural area. The characteristics of the final group included three females and six males from private and public schools with a range of teaching experience in years and a range of physical activities. Four year 12 and five year 11 teachers and their classes were videoed on three occasions as they progressed through an eight – nine week unit of work. This resulted in 24 hours 48 minutes and 20 seconds (or 4465 observations) of video teaching data which was subsequently coded by several researchers (99% interobserver reliability) to determine the teaching styles employed by the participants. This research indicated that, based on Mosston and Ashworth’s (2002) Spectrum of Teaching Styles, teachers of Senior Physical Education in Queensland used predominantly one style to teach 27 observed lessons. This is in sharp contrast to the variety of styles 110 teachers self- reportedly used and in spite of the Queensland Senior Physical Education Syllabus (2004) suggesting a range of specific styles be used. These results are discussed in the context of the Queensland Senior Physical Education Syllabus (2004), teacher knowledge of teaching styles and high-stakes curriculum and external pressures such as national testing and the publication of data from schools in tabloid newspapers. The data and findings in this research provide a rationale for improving teacher knowledge regarding teaching styles and the need for a clear definition of terminology in syllabus documents. Careful examination of the effects that the publishing of school data may have on teaching styles is advised. This research not only collected teacher’s perceptions of the teaching styles they believed they used it also verified these claims through direct observations of the teachers while teaching. These findings are relevant to syllabus writers, teacher educators, policy makers within education and teachers.
Resumo:
Information and communications technologies are a significant component of the healthcare domain and electronic health records play a major role within it. As a result, it is important that they are accepted en masse by healthcare professionals. How healthcare professionals perceive the usefulness of electronic health records and their attitudes towards them have been shown to have significant effects on their overall acceptance. This paper investigates the role of perceived usefulness and attitude on the intention to use electronic health records by future healthcare professionals using polynomial regression with response surface analysis. Results show that the relationship is more complex than predicted in prior research. The paper concludes that the predicting properties of the above determinants must be further investigated to clearly understand their role in predicting the intention to use electronic health records and in designing systems that are better adopted by healthcare professionals of the future.
Resumo:
The sheep (Ovis aries) is commonly used as a large animal model in skeletal research. Although the sheep genome has been sequenced there are still only a limited number of annotated mRNA sequences in public databases. A complementary DNA (cDNA) library was constructed to provide a generic resource for further exploration of genes that are actively expressed in bone cells in sheep. It was anticipated that the cDNA library would provide molecular tools for further research into the process of fracture repair and bone homeostasis, and add to the existing body of knowledge. One of the hallmarks of cDNA libraries has been the identification of novel genes and in this library the full open reading frame of the gene C12orf29 was cloned and characterised. This gene codes for a protein of unknown function with a molecular weight of 37 kDa. A literature search showed that no previous studies had been conducted into the biological role of C12orf29, except for some bioinformatics studies that suggested a possible link with cancer. Phylogenetic analyses revealed that C12orf29 had an ancient pedigree with a homologous gene found in some bacterial taxa. This implied that the gene was present in the last common eukaryotic ancestor, thought to have existed more than 2 billion years ago. This notion was further supported by the fact that the gene is found in taxa belonging to the two major eukaryotic branches, bikonts and unikonts. In the bikont supergroup a C12orf29-like gene was found in the single celled protist Naegleria gruberi, whereas in the unikont supergroup, encompassing the metazoa, the gene is universal to all chordate and, therefore, vertebrate species. It appears to have been lost to the majority of cnidaria and protostomes taxa; however, C12orf29-like genes have been found in the cnidarian freshwater hydra and the protostome Pacific oyster. The experimental data indicate that C12orf29 has a structural role in skeletal development and tissue homeostasis, whereas in silico analysis of the human C12orf29 promoter region suggests that its expression is potentially under the control of the NOTCH, WNT and TGF- developmental pathways, as well SOX9 and BAPX1; pathways that are all heavily involved in skeletogenesis. Taken together, this investigation provides strong evidence that C12orf29 has a very important role in the chordate body plan, in early skeletal development, cartilage homeostasis, and also a possible link with spina bifida in humans.