332 resultados para other topics

em Queensland University of Technology - ePrints Archive


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The solution of linear ordinary differential equations (ODEs) is commonly taught in first year undergraduate mathematics classrooms, but the understanding of the concept of a solution is not always grasped by students until much later. Recognising what it is to be a solution of a linear ODE and how to postulate such solutions, without resorting to tables of solutions, is an important skill for students to carry with them to advanced studies in mathematics. In this study we describe a teaching and learning strategy that replaces the traditional algorithmic, transmission presentation style for solving ODEs with a constructive, discovery based approach where students employ their existing skills as a framework for constructing the solutions of first and second order linear ODEs. We elaborate on how the strategy was implemented and discuss the resulting impact on a first year undergraduate class. Finally we propose further improvements to the strategy as well as suggesting other topics which could be taught in a similar manner.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This thesis examines the culture of contemporary writers’ festivals in an international context. In the last five decades writers’ festivals have emerged in cities across the world, and during this time they have expanded their literary discussions and debates to include numerous other topics of broad interest to society. To examine the expanded popularity and function of writers’ festivals, this thesis establishes a new vantage point for theorising the content now typically generated by these events using concepts in urban festivals and public culture research. Importantly, the new vantage point addresses the limitations of current commentary on writers’ festivals which routinely claim they trivialize literature, and more generally, contribute to the decline of public culture. The thesis presents two case studies: one on the Brisbane Writers Festival in Australia and the other on the International Festival of Authors in Toronto, Canada. The first case study, which focuses on the 2007 Brisbane Writers Festival, illustrates the many overlapping and often conflicting discourses as well as opinions productively discussed and debated at writers’ festivals. Key topic discussed and debated at the Festival include local topics about the host city—its history, literature and politics, as well as broader literary, political and celebrity culture topics. The diversity of topics discussed at the 2007 Brisbane Writers Festival is typical of the majority of writers’ festivals similarly located outside the largest geographic centres of global literary production and circulation, and designated as ‘peripheral’ festivals in this research. The second case study on Toronto’s International Festival of Authors examines the ways in which the 2006 Festival almost exclusively focussed on literary and celebrity culture discourses, and promoted itself on these terms. The 2006 International Festival of Authors’ discussion and debate of a narrow range of topics is typical of the few writers’ festivals located in global centres of literary production and circulation, and unlike ‘peripheral’ festivals they are not experiencing the same growth in number or popularity. The aim of these ‘international’ Festivals is not to democratise their elite literary beginnings, but rather to promote ‘literature’ as a niche brand for quality writing that is valid on a global scale. This thesis will assert that while all writers’ festivals are influenced by the marketing desires of publishing companies, the aim of international writers’ festivals in marketing to a virtually and globally connected elite literary audience makes them more susceptible to experiencing declines in audience and author participation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper presents a review of studies on natural convection heat transfer in the triangular enclosure namely, in attic-shaped space. Much research activity has been devoted to this topic over the last three decades with a view to providing thermal comfort to the occupants in attic-shaped buildings and to minimising the energy costs associated with heating and air-conditioning. Two basic thermal boundary conditions of attic are considered to represent hot and cold climates or day and night time. This paper also reports on a significant number of studies which have been performed recently on other topics related to the attic space, for example, attics subject to localized heating and attics filled with porous media.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The article discusses the issues of resistance; that is resistance by prisoners to the various manifestations of power operating in high security prisons, as well as that of attempted shifts in the regime from physical to psychological control. Other topics highlighted include legitimacy and 'official discourse', mourning and the construction of 'ungrievable lives' and the importance of finding a way out of the cycle of violence, which high security regimes perpetuate.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This is a case study of a young university striving to generate and sustain a vibrant Research Training culture. The university’s research training framework is informed by a belief in a project management approach to achieving successful research candidature. This has led to the definition and reporting of key milestones during candidature. In turn, these milestones have generated a range of training programs to support Higher Degree Research (HDR) students to meet these milestones in a timely fashion. Each milestone focuses on a specific set of skills blended with supporting the development of different parts of the doctoral thesis. Data on student progress and completion has provided evidence in highlighting the role that the milestones and training are playing in supporting timely completion. A university-wide reporting cycle generated data on the range of workshops and training provided to Higher Degree Research students and supervisors. The report provided details of thesis topic and format, as well as participation in research training events and participant evaluation of those events. Analysis of the data led to recommendations and comments on the strengths and weaknesses of the current research training program. Discussion considered strategies and drivers for enhancements into the future. In particular, the paper reflects on the significant potential role of centrally curated knowledge systems to support HDR student and supervisor access, and engagement and success. The research training program was developed using blended learning as a model. It covered face-to-face workshops as well as online modules. These were supplemented by web portals that offered a range of services to inform and educate students and supervisors and included opportunities for students to interact with each other. Topics ranged from the research life cycle, writing and publication, ethics, managing research data, managing copyright, and project management to use of software and the University’s Code of Conduct for Research. The challenges discussed included: How to reach off campus students and those studying in external modes? How best to promote events to potential participants? How long and what format is best for face-to-face sessions? What online resources best supplement face-to-face offerings? Is there a place for peer-based learning and what form should this take? These questions are raised by a relatively young university seeking to build and sustain a vibrant research culture. The rapid growth in enrolments in recent years has challenged previous one-to-one models of support. This review of research training is timely in seeking strategies to address changing research training support capacity and student needs. Part of the discussion will focus on supervisory training, noting that good supervision is the one remaining place where one-to-one support is provided. Ensuring that supervisors are appropriately equipped to address student expectations is considered in the context of the research training provisions. The paper concludes with reflection on the challenges faced, and recommended ways forward as the number of research students grows into the future.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Child sexual abuse is a serious problem that has received increased attention in recent years. From an ecological perspective, in which social problems are viewed in the context of characteristics of individuals, families, and broader societal systems (Prilleltensky, Peirson, & Nelson, 2001), preventing child sexual abuse involves strengthening capacity to intervene at individual, family/relationship, school, and community levels. School-based education programs have been developed in efforts to prevent child sexual abuse before it happens and to provide children who may already be experiencing it with help seeking information. Use of these programs must be based on evidence rather than ideology. Evaluations of these programs have demonstrated that sexual abuse prevention education can provide children with improved knowledge and skills for responding to and reporting potential sexual abuse. However, this learning does not seem to be maintained over time which means further attention should be given to repeated learning, opportunities for concept reinforcement and integration with other topics. School-based programs typically present information to children by presenting a series of core concepts and messages which are delivered using engaging pedagogical strategies such as multi-media technologies, animations, theatre and songs, puppets, picture books, and games. This chapter will outline the key characteristics of effective child sexual abuse prevention programs, and will provide directions for future research and practice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Twitter and other social networking sites play an ever more present role in the spread of current events. The dynamics of information dissemination through digital network structures are still relatively unexplored, however. At what time an issue is taken up by whom? Who forwards a message when to whom else? What role do individual communication participants, existing digital communities or the technical foundations of each network platform play in the spread of news? In this chapter we discuss, using the example of a video on a current sociopolitical issue in Australia that was shared on Twitter, a number of new methods for the dynamic visualisation and analysis of communication processes. Our method combines temporal and spatial analytical approaches and provides new insights into the spread of news in digital networks. [Social media dienen immer häufger als Disseminationsmechanismen für Medieninhalte. Auf Twitter ermöglicht besonders die Retweet-Funktion den schnellen und weitläufgen Transfer von Nachrichten. In diesem Beitrag etablieren neue methodische Ansätze zur Erfassung, Visualisierung und Analyse von Retweet-Ketten. Insbesondere heben wir hervor, wie bestehende Netzwerkanalysemethoden ergänzt werden können, um den Ablauf der Weiterleitung sowohl temporal als auch spatial zu erfassen. Unsere Fallstudie demonstriert die verbreitung des videoclips einer am 9. Oktober 2012 spontan gehaltenen Wutrede der australischen Premierministerin Julia Gillard, in der sie Oppositionsführer Tony Abbott als Frauenhasser brandmarkte. Durch die Erfassung von Hintergrunddaten zu den jeweiligen NutzerInnen, die sich an der Weiterleitung des Videoclips beteiligten, erstellen wir ein detailliertes Bild des Disseminationsablaufs im vorliegenden Fall. So lassen sich die wichtigsten AkteurInnen und der Ablauf der Weiterleitung darstellen und analysieren. Daraus entstehen Einblicke in die allgemeinen verbreitungsmuster von Nachrichten auf Twitter].

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Twitter’s hashtag functionality is now used for a very wide variety of purposes, from covering crises and other breaking news events through gathering an instant community around shared media texts (such as sporting events and TV broadcasts) to signalling emotive states from amusement to despair. These divergent uses of the hashtag are increasingly recognised in the literature, with attention paid especially to the ability for hashtags to facilitate the creation of ad hoc or hashtag publics. A more comprehensive understanding of these different uses of hashtags has yet to be developed, however. Previous research has explored the potential for a systematic analysis of the quantitative metrics that could be generated from processing a series of hashtag datasets. Such research found, for example, that crisis-related hashtags exhibited a significantly larger incidence of retweets and tweets containing URLs than hashtags relating to televised events, and on this basis hypothesised that the information-seeking and -sharing behaviours of Twitter users in such different contexts were substantially divergent. This article updates such study and their methodology by examining the communicative metrics of a considerably larger and more diverse number of hashtag datasets, compiled over the past five years. This provides an opportunity both to confirm earlier findings, as well as to explore whether hashtag use practices may have shifted subsequently as Twitter’s userbase has developed further; it also enables the identification of further hashtag types beyond the “crisis” and “mainstream media event” types outlined to date. The article also explores the presence of such patterns beyond recognised hashtags, by incorporating an analysis of a number of keyword-based datasets. This large-scale, comparative approach contributes towards the establishment of a more comprehensive typology of hashtags and their publics, and the metrics it describes will also be able to be used to classify new hashtags emerging in the future. In turn, this may enable researchers to develop systems for automatically distinguishing newly trending topics into a number of event types, which may be useful for example for the automatic detection of acute crises and other breaking news events.

Relevância:

20.00% 20.00%

Publicador: