122 resultados para ISO 14001 certification
Resumo:
Listening skill is allocated inadequate consideration in English language instruction and learning in Iran. At the school level, listening skill is not taught but reading and writing skills are taught traditionally. At the college level, reading skill is emphasised. For students seeking IELTS certification, institutes teach listening skill within the framework of a Communicative Language Teaching (CLT) approach. Nonetheless, despite the official syllabus, many teachers tend to test rather than teach listening skill. Currently, listening skill in the curriculum is embedded in an oral comprehension teaching approach through multiple choice written responses in the institutes. Therefore, the process of explicitly teaching listening is overlooked with a strong emphasis on the post hoc assessment of the products of listening. This study used a mixed methods approach to investigate the relationship between metacognitive strategy instruction and listening performance, metacognitive awareness and use of metacognitive strategies in listening. Three research questions were addressed in this study: - Is there a relationship between metacognitive strategy instruction (planning, monitoring and evaluation) and Iranian High Intermediate students¡¦ listening? „ - Is there a relationship between metacognitive strategy instruction and Iranian High Intermediate students¡¦ metacognitive awareness of listening? - Does metacognitive strategy instruction help Iranian High Intermediate students¡¦ use of metacognitive strategies during listening? A single group (N = 30) of High Intermediate level tertiary students in Iran were guided through a metacognitive strategy instruction over one semester (10 weeks). The first research question was measured through IELTS listening tests, which tracked any change of students’ listening performance. The second research question was analysed through results of a Metacognitive Awareness Listening Questionnaire (MALQ) to survey students’ awareness of metacognitive strategies in listening. Finally, the third research question was analysed through interviews, which explored students’ use of metacognitive strategies in listening. Results indicate that High Intermediate students developed listening performance, but there were no significant changes in metacognitive awareness in listening. Students reported in the interviews that they used multiple strategies (cognitive and metacognitive) to approach listening. Implications for English teaching in Iran and other contexts are discussed.
Resumo:
The portfolio can be loosely defined as a collection or collation of achievements, artefacts, creative works or examples of competencies, usually for the purpose of demonstrating a person’s capabilities in a specific field of endeavour. People make and share their portfolios for many reasons: social or cultural recognition, employment, accreditation, and educational qualification. It is this latter purpose that this chapter addresses; the creation and use of a portfolio for educational development and certification.
Resumo:
The following proposal is submitted by the AICA's credentialling and certification subcommittee for your consideration. It outlines a process and procedure for interim credentialling of infection control practitioners. In submitting this proposal, the subcommittee acknowledges that, while competency-based education is the preferred process for credentialling, there are clinicians who, in the absence of educational opportunities, have developed a specialist level of competency in infection control practice through self education and experience. Committee members also recognise the need for self-regulation of accrediting processes, to maintain standards in practice and support members in their clinical roles. We ask you to review the following proposal and invite your comments and critique, to be received by the last week in January 1998.
Resumo:
This book identifies the fundamental legal principles and the governance requirements of sustainable forest management. An analytical model for assessing forest regulation is created which identifies the doctrinal concepts that underpin forest regulation (justice, property, sovereignty and governance). It also highlights the dominant public international institutions involved in forest regulation (UNFF, UNFCCC and WB) which is followed by analysis of non-state international forest regulation (forest certification and ecosystem markets). The book concludes by making a number of practical recommendations for reform of global forest governance arrangements and suggested reforms for individual international forest institutions.
Resumo:
Evaluating the validity of formative variables has presented ongoing challenges for researchers. In this paper we use global criterion measures to compare and critically evaluate two alternative formative measures of System Quality. One model is based on the ISO-9126 software quality standard, and the other is based on a leading information systems research model. We find that despite both models having a strong provenance, many of the items appear to be non-significant in our study. We examine the implications of this by evaluating the quality of the criterion variables we used, and the performance of PLS when evaluating formative models with a large number of items. We find that our respondents had difficulty distinguishing between global criterion variables measuring different aspects of overall System Quality. Also, because formative indicators “compete with one another” in PLS, it may be difficult to develop a set of measures which are all significant for a complex formative construct with a broad scope and a large number of items. Overall, we suggest that there is cautious evidence that both sets of measures are valid and largely equivalent, although questions still remain about the measures, the use of criterion variables, and the use of PLS for this type of model evaluation.
Resumo:
Numerous environmental rating tools have developed around the world over the past decade or so, in an attempt to increase awareness of the impact buildings have on the environment. Whilst many of these tools can be applied across a variety of building types, the majority focus mainly on the commercial building sector. Only recently have some of the better known environmental rating tools become adaptable to the land development sector, where arguably the most visible environmental impacts are made. EnviroDevelopment is one such tool that enables rating of residential land development in Australia. This paper seeks to quantify the environmental benefits achieved by the environmental rating tool EnviroDevelopment, using data from its certified residential projects across Australia. This research will identify the environmental gains achieved in the residential land development sector that can be attributed to developers aspiring to gain certification under this rating tool.
Resumo:
Fire safety has become an important part in structural design due to the ever increasing loss of properties and lives during fires. Fire rating of load bearing wall systems made of Light gauge Steel Frames (LSF) is determined using fire tests based on the standard time-temperature curve given in ISO 834. However, modern residential buildings make use of thermoplastic materials, which mean considerably high fuel loads. Hence a detailed fire research study into the performance of load bearing LSF walls was undertaken using a series of realistic design fire curves developed based on Eurocode parametric curves and Barnett’s BFD curves. It included both full scale fire tests and numerical studies of LSF walls without any insulation, and the recently developed externally insulated composite panels. This paper presents the details of fire tests first, and then the numerical models of tested LSF wall studs. It shows that suitable finite element models can be developed to predict the fire rating of load bearing walls under real fire conditions. The paper also describes the structural and fire performances of externally insulated LSF walls in comparison to the non-insulated walls under real fires, and highlights the effects of standard and real fire curves on fire performance of LSF walls.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
In the absence of a benchmarking mechanism specifically designed for local requirements and characteristics, a carbon dioxide footprint assessment and labelling scheme for construction materials is urgently needed to promote carbon dioxide reduction in the construction industry. This paper reports on a recent interview survey of 18 senior industry practitioners in Hong Kong to elicit their knowledge and opinions concerning the potential of such a carbon dioxide labelling scheme. The results of this research indicate the following. A well-designed carbon dioxide label could stimulate demand for low carbon dioxide construction materials. The assessment of carbon dioxide emissions should be extended to different stages of material lifecycles. The benchmarks for low carbon dioxide construction materials should be based on international standards but without sacrificing local integrity. Administration and monitoring of the carbon dioxide labelling scheme could be entrusted to an impartial and independent certification body. The implementation of any carbon dioxide labelling schemes should be on a voluntary basis. Cost, functionality, quality and durability are unlikely to be replaced by environmental considerations in the absence of any compelling incentives or penalties. There are difficulties in developing and operating a suitable scheme, particularly in view of the large data demands involved, reluctance in using low carbon dioxide materials and limited environmental awareness.
Resumo:
"Rogue Flows brings together some of the best and most knowledgeable writers on consumption and cultural theory to chart the under-explored field of cultural flows and consumption across different regions in Asia, and the importance of these flows in creating contemporary Asian national identities. It offers innovative possibilities for envisioning how the transfer of popular and consumer culture (such as TV, music, film, advertising and commodities) across Asian countries has produced a new form of cross-cultural fertilisation within Asian societies, which does not merely copy Western counterparts." "Rogue Flows is unique in its investigation of how "Asianness" is being exploited by Asian transnational cultural industries and how it is involved in the new power relations of the region. It is an important contribution to the literature of Asian cultural studies."--BOOK JACKET.
Resumo:
In 2003, the Green Building Council of Australia (GBCA) launched their Green Star rating tools for various types of buildings in order to promote green building practice in Australia. Of these, the Green Star-Office Interior rating tool is designed for building owners, tenants and interior designers to assess the environmental impact of an interior fitout. It covers a number of categories, including Management, Indoor Environment Quality, Energy, Transport, Water, Materials, Land Use and Ecology, Emissions, and Innovation. This paper reviews the usage of the Green Star system in Australian office tenancy fitouts and the potential challenges associated with Green Star-Office Interior implementation. This involves the analysis of score sheets of 66 office interior projects across Australia that achieved Green Star certification. The percentage of green star points obtained within each category and sub-categories (credits) for each project are investigated to illustrate the achievement of credits. The results show that Emission-related credits and Innovation related credits are the easiest and most difficult respectively to obtain. It is also found that 6 Green Star office interior projects perform especially better in the categories of Energy and Ecology than 4 and 5 Star projects. The investigation of point frequency in each category provides prospective Green Star applicants with insights into credit achievement for future projects.
Resumo:
The green building trend has increased rapidly worldwide in recent decades as a means of addressing growing concerns over climate change and global warming and to reduce the impact of the building industry on the environment. A significant contribution in Australia is the use of a series of rating tools by the Green Building Council Australia (GBCA) for the certification of various types of buildings. This paper reviews the use of the Green Star system in Australian building construction, and investigates the potential challenges involved in acquiring the certification of Australian buildings by critically analysing a database of most recently certified GBCA projects. The results show that management-related credits and innovation-related credits are the easiest and most difficult respectively to obtain. Additionally, 6-Star green buildings achieve significantly higher points than other certified buildings in the Energy category. In contrast, 4 Star green buildings achieve more points in the Material category than 5 and 6 Star buildings. The study offers a useful reference for both property developers and project teams to obtain a better understanding of the rating scheme and consequently the effective preparation of certification documentation.
Resumo:
Health care is an information-intensive business. Sharing information in health care processes is a smart use of data enabling informed decision-making whilst ensuring. the privacy and security of patient information. To achieve this, we propose data encryption techniques embedded Information Accountability Framework (IAF) that establishes transitions of the technological concept, thus enabling understanding of shared responsibility, accessibility, and efficient cost effective informed decisions between health care professionals and patients. The IAF results reveal possibilities of efficient informed medical decision making and minimisation of medical errors. Of achieving this will require significant cultural changes and research synergies to ensure the sustainability, acceptability and durability of the IAF
Resumo:
Web-based social networking applications have become increasingly important in recent years. The current applications in the healthcare sphere can support the health management, but to date there is no patient-controlled integrator. This paper proposes a platform called Multiple Profile Manager (MPM) that enables a user to create and manage an integrated profile that can be shared across numerous social network sites. Moreover, it is able to facilitate the collection of personal healthcare data, which makes a contribution to the development of public health informatics. Here we want to illustrate how patients and physicians can be benefited from enabling the platform for online social network sites. The MPM simplifies the management of patients' profiles and allows health professionals to obtain a more complete picture of the patients' background so that they can provide better health care. To do so, we demonstrate a prototype of the platform and describe its protocol specification, which is an XMPP (Extensible Messaging and Presence Protocol) [1] extension, for sharing and synchronising profile data (vCard²) between different social networks.