840 resultados para Wil Lou Gray Opportunity School
Resumo:
This article argues for an interdisciplinary approach to mathematical problem solving at the elementary school, one that draws upon the engineering domain. A modeling approach, using engineering model eliciting activities, might provide a rich source of meaningful situations that capitalize on and extend students’ existing mathematical learning. The study reports on the developments of 48 twelve-year old students who worked on the Bridge Design activity. Results revealed that young students, even before formal instruction, have the capacity to deal with complex interdisciplinary problems. A number of students created quite appropriate models by developing the necessary mathematical constructs to solve the problem. Students’ difficulties in mathematizing the problem, and in revising and documenting their models are presented and analysed, followed by a discussion on the appropriateness of a modeling approach as a means for introducing complex problems to elementary school students.
Resumo:
Game jams provide design researchers with extraordinary opportunity to watch creative teams in action and recent years have seen a number of projects which seek to illuminate the design process as seen in these events. For example, Gaydos, Harris and Martinez discuss the opportunity of the jam to expose students to principles of design process and design spaces (2011). Rouse muses on the game jam ‘as radical practice’ and a ‘corrective to game creation as it is normally practiced’. His observations about his own experience in a jam emphasise the same artistic endeavour forefronted earlier, where the experience is about creation that is divorced from the instrumental motivations of commercial game design (Rouse 2011) and where the focus is on process over product. Other participants remark on the social milieu of the event as a critical factor and the collaborative opportunity as a rich site to engage participants in design processes (Shin et al, 2012). Shin et al are particularly interested in the notion of the site of the process and the ramifications of participants being in the same location. They applaud the more localized event where there is an emphasis on local participation and collaboration. For other commentators, it is specifically the social experience in the place of the jam is the most important aspect (See Keogh 2011), not the material site but rather the physical embodied experience of ‘being there’ and being part of the event. Participants talk about game jams they have attended in a similar manner to those observations made by Dourish where the experience is layered on top of the physical space of the event (Dourish 2006). It is as if the event has taken on qualities of place where we find echoes of Tuan’s description of a particular site having an aura of history that makes it a very different place, redolent and evocative (Tuan 1977). Re-presenting the experience in place has become the goal of the data visualisation project that has become the focus of our own curated 48hr game jam. Taking our cue from the work of Tim Ingold on embodied practice, we have now established the 48hr game making challenge as a site for data visualisation research in place.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Boracite is a magnesium borate mineral with formula: Mg3B7O13Cl and occurs as blue green, colorless, gray, yellow to white crystals in the orthorhombic – pyramidal crystal system. An intense Raman band at 1009 cm−1 was assigned to the BO stretching vibration of the B7O13 units. Raman bands at 1121, 1136, 1143 cm−1 are attributed to the in-plane bending vibrations of trigonal boron. Four sharp Raman bands observed at 415, 494, 621 and 671 cm−1 are simply defined as trigonal and tetrahedral borate bending modes. The Raman spectrum clearly shows intense Raman bands at 3405 and 3494 cm−1, thus indicating that some Cl anions have been replaced with OH units. The molecular structure of a natural boracite has been assessed by using vibrational spectroscopy.
Resumo:
This research examines the entrepreneurship phenomenon, and the question: Why are some venture attempts more successful than others? This question is not a new one. Prior research has answered this by describing those that engage in nascent entrepreneurship. Yet, this approach yielded little consensus and offers little comfort for those newly considering venture creation (Gartner, 1988). Rather, this research considers the process of venture creation, by focusing on the actions of nascent entrepreneurs. However, the venture creation process is complex (Liao, Welsch, & Tan, 2005), and multi-dimensional (Davidsson, 2004). The process can vary in the amount of action engaged by the entrepreneur; the temporal dynamics of how action is enacted (Lichtenstein, Carter, Dooley, and Gartner 2007); or the sequence in which actions are undertaken. And little is known about whether any, or all three, of these dimensions matter. Further, there exists scant general knowledge about how the venture creation process influences venture creation outcomes (Gartner & Shaver, 2011). Therefore, this research conducts a systematic study of what entrepreneurs do as they create a new venture. The primary goal is to develop general principles so that advice may be offered on how to ‘proceed’, rather than how to ‘be’. Three integrated empirical studies were conducted that separately focus on each of the interrelated dimensions. The basis for this was a randomly sampled, longitudinal panel, of nascent ventures. Upon recruitment these ventures were in the process of being created, but yet to be established as new businesses. The ventures were tracked one year latter to follow up on outcomes. Accordingly, this research makes the following original contributions to knowledge. First, the findings suggest that all three of the dimensions play an important role: action, dynamics, and sequence. This implies that future research should take a multi-dimensional view of the venture creation process. Failing to do so can only result in a limited understanding of a complex phenomenon. Second, action is the fundamental means through which venture creation is achieved. Simply put, more active venture creation efforts are more likely more successful. Further, action is the medium which allows resource endowments their effect upon venture outcomes. Third, the dynamics of how venture creation plays out over time is also influential. Here, a process with a high rate of action which increases in intensity will more likely achieve positive outcomes. Forth, sequence analysis, suggests that the order in which actions are taken will also drive outcomes. Although venture creation generally flows in sequence from discovery toward exploitation (Shane & Venkataraman, 2000; Eckhardt & Shane, 2003; Shane, 2003), processes that actually proceed in this way are less likely to be realized. Instead, processes which specifically intertwine discovery and exploitation action together in symbiosis more likely achieve better outcomes (Sarasvathy, 2001; Baker, Miner, & Eesley, 2003). Further, an optimal venture creation order exists somewhere between these sequential and symbiotic process archetypes. A process which starts out as symbiotic discovery and exploitation, but switches to focus exclusively on exploitation later on is most likely to achieve venture creation. These sequence findings are unique, and suggest future integration between opposing theories for order in venture creation.
Resumo:
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.
Resumo:
Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.
Collaborative research into the affordances of place for primary school children’s literacy learning
Resumo:
In the context of culturally diverse high poverty areas of Australia, we have conducted collaborative research with teachers and students in a primary school for more than a decade. Teachers have been exploring the affordances of place‐based pedagogies (Gruenewald & Smith, 2008) for the development of students’ spatial literacies and their understandings of the politics of places and built environments (Comber, Nixon, Ashmore, Loo & Cook, 2006; Comber, Thomson and Wells, 2001). This paper reports on a project in which the affordances of placedbased pedagogy are being explored through teacher inquiries and classroom‐based design experiments (Cobb, Confrey, di Sessa, Lehrer & Schauble, 2003). Located within a large‐scale urban renewal project in which houses are being demolished and families relocated, the original school has been replaced by a larger school that serves a population from a wider area. In this paper we draw on the study to consider the challenges of working with teachers and primary school students to study innovative ideas and practices in educational research. Specifically we consider issues raised by collaborative studies of the affordances of cross curricular projects focusing on social and environmental change to engage students in academic learning and expand their literate repertoires in a changing policy climate.
Resumo:
In nation states and regions including Australia, Hong Kong, other countries of Asia, the European Economic Community and elsewhere, Civics and Citizenship education (CCE) is a contested concept. The development of The Australian Curriculum is providing a national opportunity for educators to rethink curriculum priorities and to decide on new emphases for learning in Australian schools, but policy documents have emphasized the importance of CCE for all young Australians. In this paper we discuss the notion of citizenship education as ‘national education’ in Australia. We suggest that while the development of CCE in Australia does include elements of ‘national education’, the new curriculum provides an opportunity to frame the civil, political and social components of CC for young Australians in ways that include local, national and global understandings. We argue that CCE should broaden young peoples’ world views and their passion and capacity to express their own identity, so they can be active and engaged citizens in diverse communities that include their own communities, the nation and beyond.
Resumo:
The 2011 floods illustrated once again Queensland’s vulnerability to flooding and similar disasters. Climate change will increase the frequency and magnitude of such events and will have a variety of other impacts. To deal with these impacts governments at all levels need to be prepared and work together. Like the rest of the nation most of the population of the state is located in the coastal areas and these areas are more vulnerable to the impacts of climate change. This paper examines climate change adaptation efforts in coastal Queensland. The aim is increasing local disaster resilience of people and property through fostering coordination between local and state government planning activities in coastal high hazard areas. By increasing the ability of local governments and state agencies to coordinate planning activities, we can help adapt to impacts of climate change. Towards that end, we will look at the ways that these groups currently interact, especially with regard to issues involving uncertainty related to climate change impacts. Through an examination of climate change related activities by Queensland’s coastal local governments and state level planning agencies and how they coordinate their planning activities at different levels we aim to identify the weaknesses of the current planning system in responding to the challenges of climate change adaptation and opportunities for improving the ways we plan and coordinate planning, and make recommendations to improve resilience in advance of disasters so as to help speed up recovery when they occur.
Resumo:
This article explores the role of principal leadership in creating a thinking school. It contributes to the school leadership literature by exploring the intersection of two important areas of study in education - school leadership and education for thinking - which is a particularly apt area of study, because effective school leadership is crucial if students are to learn to be critical and creative thinkers, yet this connection has not be widely investigated. We describe how one principal, Hinton, turned around an underperforming school by using critical and creative philosophical thinking as the focus for students, staff and parents. Then, drawing on the school leadership literature, the article describes seven attributes of school leadership beginning with four articulated by Leithwood and colleagues (2006) (building vision and setting direction; redesigning the organisation; understanding and developing people; managing the teaching and learning program), and adding three others (influence; self-development; and responding to context). This framework is then used in a case study format in a collaboration between practitioner and researchers to first explore evidence from empirical studies and personal reflection about Hinton's leadership of Buranda State School, and second to illuminate how these general features of school leadership apply to creating a thinking school. Based on the case study and using the general characteristics of school leadership, a framework for leading a thinking school is described. Because the framework is based on a turnaround school, this framework has wide applicability: to schools that are doing well as an indication of how to implement a contemporary approach to curriculum and pedagogy; and to schools that are underperforming and want a rigorous, high expectation and contemporary way to improve student learning.
Resumo:
This Australian study explores the mentoring of pre-service teachers in selecting and implementing teaching strategies to meet students‟ learning needs. Two case studies involving 28 mentor teachers in a professional development program and a mentor-mentee partnership during a four week practicum provided data about mentoring teaching strategies for differentiated learning. Findings showed that contexts for learning about differentiation occurred at the pre action, in-action, and post-action stages. Central to each stage were pedagogical knowledge practices such as planning, preparation, classroom management, assessment, and problem solving (reflection-in-action to present solutions to problems) as key to in-action strategising and the mentoring processes. Mentoring pre-service teachers on how to devise teaching strategies for differentiated learning needs to be researched with a wider range of mentors and pre-service teachers, including those at different stages of development.
Resumo:
Aim The development of competent future allied health professionals through academic programmes, professional support and practical education is continually evolving. The aim of this study was to explore the feelings of newly graduated occupational therapists in Australia and Aotearoa/New Zealand regarding their education and work preparedness. Methods Newly graduated occupational therapists from Australia (n = 178) and Aotearoa/New Zealand (n = 53) who had completed their occupational therapy studies in 2007 were recruited. Participants completed an online survey which explored their preparedness for work; based on professional competencies. Results Most newly graduated occupational therapists felt somewhat prepared for practice. However, only 17.1% of Australian new graduates, and even fewer (8.5%) of Aotearoa/New Zealand new graduates felt very well prepared. Participants felt more prepared for the competencies required for ‘managing inwards’ (including interpersonal skills) and less prepared for those required for ‘managing outwards’ (including evidence-based practice). Conclusions This study provides the first international comparison into the feelings of competence and preparedness for practice of new graduates of occupational therapy from Australia and Aotearoa/New Zealand. Given the importance of competencies, such as evidence-based practice to the progress of the profession, there is a need to further explore methods to increase feelings of preparedness in these areas.