277 resultados para message acceptance
Resumo:
Learning management systems (LMS) have become the norm in recent years in higher education to further engage students and lecturers. The e-learning tools within LMS provide knowledge sharing and community building opportunities that can support both critical thinking and higher order learning skills through conversation and collaboration. However, the mere existence of tools does not guarantee users’ adoption and acceptance. Several effective arrangements are required to engage users. This paper focuses on different aspects of lecturers’ attitude that impact user engagement with LMS tools reporting on findings from 74 interviews with students and lecturers from different disciplines within a major Australian university. Results indicate that lecturers’ teaching style and habits, active participation in online activities as well as designing appropriate tasks and assessment procedure are important determinants of lecturers’ attitude in engaging students with LMS tools.
Resumo:
While mobile phones have become ubiquitous in modern society, the use of mobile phones while driving is increasing at an alarming rate despite the associated crash risks. A significant safety concern is that driving while distracted by a mobile phone is more prevalent among young drivers, a less experienced driving cohort with elevated crash risk. The objective of this study was to examine the gap acceptance behavior of distracted young drivers at roundabouts. The CARRS-Q Advanced Driving Simulator was used to test participants on a simulated gap acceptance scenario at roundabouts. Conflicting traffic from the right approach of a four-legged roundabout were programmed to have a series of vehicles having the gaps between them proportionately increased from two to six seconds. Thirty-two licensed young drivers drove the simulator under three phone conditions: baseline (no phone conversation), hands-free and handheld phone conversations. Results show that distracted drivers started responding to the gap acceptance scenario at a distance closer to the roundabout and approached the roundabout at slower speeds. They also decelerated at faster rates to reduce their speeds prior to gap acceptance compared to non-distracted drivers. Although accepted gap sizes were not significantly different across phone conditions, differences in the safety margins at various gap sizes—measured by Post Encroachment Time (PET) between the driven vehicle and the conflicting vehicle—were statistically significant across phone conditions. PETs for distracted drivers were smaller across different gap sizes, suggesting a lower safety margin taken by distracted drivers compared to non-distracted drivers. The results aid in understanding how cognitive distraction resulting from mobile phone conversations while driving influences driving behavior during gap acceptance at roundabouts.
Resumo:
We propose a keyless and lightweight message transformation scheme based on the combinatorial design theory for the confidentiality of a message transmitted in multiple parts through a network with multiple independent paths, or for data stored in multiple parts by a set of independent storage services such as the cloud providers. Our combinatorial scheme disperses a message into v output parts so that (k-1) or less parts do not reveal any information about any message part, and the message can only be recovered by the party who possesses all v output parts. Combinatorial scheme generates an xor transformation structure to disperse the message into v output parts. Inversion is done by applying the same xor transformation structure on output parts. The structure is generated using generalized quadrangles from design theory which represents symmetric point and line incidence relations in a projective plane. We randomize our solution by adding a random salt value and dispersing it together with the message. We show that a passive adversary with capability of accessing (k-1) communication links or storage services has no advantage so that the scheme is indistinguishable under adaptive chosen ciphertext attack (IND-CCA2).
Resumo:
There have only been a small number of applications of consumer decision set theory to holiday destination choice, and these studies have tended to rely on a single cross sectional snapshot of research participants’ stated preferences. Very little has been reported on the relationship between stated destination preferences and actual travel, or changes in decision set composition over time. The paper presents a rare longitudinal examination of destination decision sets, in the context of short break holidays by car in Queensland, Australia. Two questionnaires were administered, three months apart. The first identified destination preferences while the second examined actual travel and revisited destination preferences. In relation to the conference theme, there was very little change in consumer preferences towards the competitive set of destinations over the three month period. A key implication for the destination of interest, which, in an attempt to change market perceptions, launched a new brand campaign during the period of the project, is that a long term investment in a consistent brand message will be required to change market perceptions. The results go some way to support the proposition that the positioning of a destination into a consumer’s decision set represents a source of competitive advantage.
Resumo:
The high degree of variability and inconsistency in cash flow study usage by property professionals demands improvement in knowledge and processes. Until recently limited research was being undertaken on the use of cash flow studies in property valuations but the growing acceptance of this approach for major investment valuations has resulted in renewed interest in this topic. Studies on valuation variations identify data accuracy, model consistency and bias as major concerns. In cash flow studies there are practical problems with the input data and the consistency of the models. This study will refer to the recent literature and identify the major factors in model inconsistency and data selection. A detailed case study will be used to examine the effects of changes in structure and inputs. The key variable inputs will be identified and proposals developed to improve the selection process for these key variables. The variables will be selected with the aid of sensitivity studies and alternative ways of quantifying the key variables explained. The paper recommends, with reservations, the use of probability profiles of the variables and the incorporation of this data in simulation exercises. The use of Monte Carlo simulation is demonstrated and the factors influencing the structure of the probability distributions of the key variables are outline. This study relates to ongoing research into functional performance of commercial property within an Australian Cooperative Research Centre.
Resumo:
In a range test, one party holds a ciphertext and needs to test whether the message encrypted in the ciphertext is within a certain interval range. In this paper, a range test protocol is proposed, where the party holding the ciphertext asks another party holding the private key of the encryption algorithm to help him. These two parties run the protocol to implement the test. The test returns TRUE if and only if the encrypted message is within the certain interval range. If the two parties do not conspire, no information about the encrypted message is revealed from the test except what can be deduced from the test result. Advantages of the new protocol over the existing related techniques are that it achieves correctness, soundness, °exibility, high e±ciency and privacy simultaneously.
Resumo:
In Service-Oriented Architectures (SOAs), software systems are decomposed into independent units, namely services, that interact with one another through message exchanges. To promote reuse and evolvability, these interactions are explicitly described right from the early phases of the development lifecycle. Up to now, emphasis has been placed on capturing structural aspects of service interactions. Gradually though, the description of behavioral dependencies between service interactions is gaining increasing attention as a means to push forward the SOA vision. This paper deals with the description of these behavioral dependencies during the analysis and design phases. The paper outlines a set of requirements that a language for modeling service interactions at this level should fulfill, and proposes a language whose design is driven by these requirements.
Resumo:
This paper compares perceptions of integrated marketing communication (IMC) to establish whether consumers perceive integration in the same way as the literature. It begins by reviewing the literature to identify shared assumptions about integration and factors thought to contribute to the integration of marketing communication and, in an experiment, compares these with the perceptions of consumers. Many of the shared assumptions in the literature have been supported by the findings of this study. Integration has been demonstrated to be both a strategy and a tactic. The strategic side is part of a management process and is unable to be observed by consumers from the marketing communication output. Consumers can, however, identify the tactics and are able to recall a number of integration factors such as logo, corporate colours and image. Consumers in the total message integration groups perceived the messages they received as more integrated than those in partial integration or no integration groups.
Resumo:
Sounds of the Suburb was a commissioned public art proposal based upon a brief set by Queensland Rail for the major redevelopment at their Brunswick Street Railway Station, Fortitude Valley, Brisbane. I proposed a large scale, electronic artwork to be distributed across the glass fronted structure of their station’s new concourse building. It was designed as a network of LED based ‘tracking’ - along which would travel electronically animated, ‘trains’ of text synchronised to the actual train timetables. Each message packet moved endlessly through a complex spatial network of ‘tracks’ and ‘stations’ set both inside, outside and via the concourse. The design was underpinned by large scale image of sound waves etched onto the architecture’s glass and was accompanied by two inset monitors each presenting ghosted images of passenger movements within the concourse, time-delay recorded and then cross-combined in realtime to form new composites.----- Each moving, reprogrammable phrase was conceived as a ‘train of thought’ and ostensibly contained an idea or concept about popular cultures surrounding contemporary music – thereby meeting the brief that the work should speak to the diverse musical cultures central to Fortitude Valley’s image as an entertainment hub. These cultural ‘memes’, gathered from both passengers and the music press were situated alongside quotes from philosophies of networking, speed and digital ecologies. These texts would continually propagate, replicate and cross fertlise as they moved throughout the ‘network’, thereby writing a constantly evolving ‘textual soundcape’ of that place. This idea was further cemented through the pace, scale and rhythm of passenger movements continually recorded and re-presented on the smaller screens.
Resumo:
Whisper Our Futures was an invited design proposal to produce a major public artwork for the State of Queensland’s 150th Anniversary Celebrations. It involved a network of 100 individual scrolling digital text boxes each with individual audio systems arranged together in a tessellated format. This form (specified by the originating brief) both mimicked the soaring gothic arches typical of Queensland cathedrals and was also suggestive of their stained glass windows. Each text module presented a message in both visual and audible forms for Queenslanders living 150 years hence - spoken both by the general public aw well as prominent figures. In this way the work was designed as a focus of future hope, historical reflection and inspiration to visitors to Queensland cathedrals throughout the entire year of celebrations (2009). The work was planned to premiere at Brisbane’s main Anglican Cathedral and then tour to nine other state cathedrals throughout 2009.---- Two staged proposals and budgets were invited throughout 2007. After the second successful proposal stage the State Premier and cabinet changed, ultimately leading the public art components to be dropped from the program. The proposal currently remains on file at the Queensland Premiers Office.
Resumo:
Through the Clock’s Workings is a world first: a remixed and remixable anthology of literature.----- Prominent Australian authors have written new short stories and released them under a Creative Commons Attribution Non-Commercial ShareAlike licence. What that means is you can remix the stories, but only if you acknowledge the author, the remix is not for commercial use, and your new work is available for others to remix. The authors’ stories were made available on our website and new and emerging writers were invited to create their own remixes to be posted on the website and considered for publication in the print anthology alongside the original stories.----- The result is a world first: a remixed and remixable anthology of literature. Buy your copy now from the Sydney University Press eStore or download the electronic version.----- So how do you use a remixable anthology? Simple.----- Step 1 - Read. Thumb your way through the pages at will. Find the stories you love, the ones you hate, the ones that could be better.----- Step 2 - Re/create. Each story is yours to share and to remix. Use only one paragraph or character or just make subtle changes. Change the genre, alter its formal or stylistic characteristics, or revise its message. Use as little or as much as you like - as long as it works.----- Step 3 - Share. Be part of a growing community of literature remixing. Email your remix to us and start sharing. The entire anthology can be remixed - the original stories, the remixes, and even the fonts.----- Through the Clock’s Workings is Read&Write!
Resumo:
OBJECTIVE The aim of this research project was to obtain an understanding of the barriers to and facilitators of providing palliative care in neonatal nursing. This article reports the first phase of this research: to develop and administer an instrument to measure the attitudes of neonatal nurses to palliative care. METHODS The instrument developed for this research (the Neonatal Palliative Care Attitude Scale) underwent face and content validity testing with an expert panel and was pilot tested to establish temporal stability. It was then administered to a population sample of 1285 neonatal nurses in Australian NICUs, with a response rate of 50% (N 645). Exploratory factor-analysis techniques were conducted to identify scales and subscales of the instrument. RESULTS Data-reduction techniques using principal components analysis were used. Using the criteria of eigenvalues being 1, the items in the Neonatal Palliative Care Attitude Scale extracted 6 factors, which accounted for 48.1% of the variance among the items. By further examining the questions within each factor and the Cronbach’s of items loading on each factor, factors were accepted or rejected. This resulted in acceptance of 3 factors indicating the barriers to and facilitators of palliative care practice. The constructs represented by these factors indicated barriers to and facilitators of palliative care practice relating to (1) the organization in which the nurse practices, (2) the available resources to support a palliative model of care, and (3) the technological imperatives and parental demands. CONCLUSIONS The subscales identified by this analysis identified items that measured both barriers to and facilitators of palliative care practice in neonatal nursing. While establishing preliminary reliability of the instrument by using exploratory factor-analysis techniques, further testing of this instrument with different samples of neonatal nurses is necessary using a confirmatory factor-analysis approach.
Resumo:
Developing an effective impact evaluation framework, managing and conducting rigorous impact evaluations, and developing a strong research and evaluation culture within development communication organisations presents many challenges. This is especially so when both the community and organisational context is continually changing and the outcomes of programs are complex and difficult to clearly identify.----- This paper presents a case study from a research project being conducted from 2007-2010 that aims to address these challenges and issues, entitled Assessing Communication for Social Change: A New Agenda in Impact Assessment. Building on previous development communication projects which used ethnographic action research, this project is developing, trailing and rigorously evaluating a participatory impact assessment methodology for assessing the social change impacts of community radio programs in Nepal. This project is a collaboration between Equal Access – Nepal (EAN), Equal Access – International, local stakeholders and listeners, a network of trained community researchers, and a research team from two Australian universities. A key element of the project is the establishment of an organisational culture within EAN that values and supports the impact assessment process being developed, which is based on continuous action learning and improvement. The paper describes the situation related to monitoring and evaluation (M&E) and impact assessment before the project began, in which EAN was often reliant on time-bound studies and ‘success stories’ derived from listener letters and feedback. We then outline the various strategies used in an effort to develop stronger and more effective impact assessment and M&E systems, and the gradual changes that have occurred to date. These changes include a greater understanding of the value of adopting a participatory, holistic, evidence-based approach to impact assessment. We also critically review the many challenges experienced in this process, including:----- • Tension between the pressure from donors to ‘prove’ impacts and the adoption of a bottom-up, participatory approach based on ‘improving’ programs in ways that meet community needs and aspirations.----- • Resistance from the content teams to changing their existing M&E practices and to the perceived complexity of the approach.----- • Lack of meaningful connection between the M&E and content teams.----- • Human resource problems and lack of capacity in analysing qualitative data and reporting results.----- • The contextual challenges, including extreme poverty, wide cultural and linguistic diversity, poor transport and communications infrastructure, and political instability.----- • A general lack of acceptance of the importance of evaluation within Nepal due to accepting everything as fate or ‘natural’ rather than requiring investigation into a problem.
Resumo:
Ordinary desktop computers continue to obtain ever more resources – in-creased processing power, memory, network speed and bandwidth – yet these resources spend much of their time underutilised. Cycle stealing frameworks harness these resources so they can be used for high-performance computing. Traditionally cycle stealing systems have used client-server based architectures which place significant limits on their ability to scale and the range of applica-tions they can support. By applying a fully decentralised network model to cycle stealing the limits of centralised models can be overcome. Using decentralised networks in this manner presents some difficulties which have not been encountered in their previous uses. Generally decentralised ap-plications do not require any significant fault tolerance guarantees. High-performance computing on the other hand requires very stringent guarantees to ensure correct results are obtained. Unfortunately mechanisms developed for traditional high-performance computing cannot be simply translated because of their reliance on a reliable storage mechanism. In the highly dynamic world of P2P computing this reliable storage is not available. As part of this research a fault tolerance system has been created which provides considerable reliability without the need for a persistent storage. As well as increased scalability, fully decentralised networks offer the ability for volunteers to communicate directly. This ability provides the possibility of supporting applications whose tasks require direct, message passing style communication. Previous cycle stealing systems have only supported embarrassingly parallel applications and applications with limited forms of communication so a new programming model has been developed which can support this style of communication within a cycle stealing context. In this thesis I present a fully decentralised cycle stealing framework. The framework addresses the problems of providing a reliable fault tolerance sys-tem and supporting direct communication between parallel tasks. The thesis includes a programming model for developing cycle stealing applications with direct inter-process communication and methods for optimising object locality on decentralised networks.