4 resultados para rooms
em Aston University Research Archive
Resumo:
The aims of the work reported in this thesis are: (1) To investigate the application of a Wave Analysis Approach in the study of the acoustics of small rooms where the conditions for a Geometrical Statistical Analysis are not valid.
Resumo:
This research thesis is concerned with the human factors aspects of industrial alarm systems within human supervisory control tasks. Typically such systems are located in central control rooms, and the information may be presented via visual display units. The thesis develops a human, rather than engineering, centred approach to the assessment, measurement and analysis of the situation. A human factors methodology was employed to investigate the human requirements through: interviews, questionnaires, observation and controlled experiments. Based on the analysis of current industrial alarm systems in a variety of domains (power generation, manufacturing and coronary care), it is suggested that often designers do not pay due considerations to the human requirements. It is suggested that most alarm systems have severe shortcomings in human factors terms. The interviews, questionnaire and observations led to the proposal of 'alarm initiated activities' as a framework for the research to proceed. The framework comprises of six main stages: observe, accept, analyse, investigate, correct and monitor. This framework served as a basis for laboratory research into alarm media. Under consideration were speech-based alarm displays and visual alarm displays. Non-speech auditory displays were the subject of a literature review. The findings suggest that care needs to be taken when selecting the alarm media. Ideally it should be chosen to support the task requirements of the operator, rather than being arbitrarily assigned. It was also indicated that there may be some interference between the alarm initiated activities and the alarm media, i.e. information that supports one particular stage of alarm handling may interfere with another.
Resumo:
In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.
Resumo:
Actual text: I was recently at the Spanish College of Optometry biennial conference and attended a meeting of contact lens lecturers from around Spain and Portugal. We discussed various ideas, mainly about how to share good practice and improve standards. What came to my mind was ‘is there a blueprint for training trainers?’ Well probably not but there are many things that we need to acknowledge such as the way students learn for example. Many educators themselves were taught by lecturers who would write on a blackboard or use acetate on an overhead projector, then came the 35 mm slide era followed by the Powerpoint era. More recently there is a move towards a much more integrated approach of various teaching methods. At my university our contact lens and anterior eye lectures generally follow a format where a narrated Powerpoint lecture is uploaded onto our internal virtual learning environment. This narrated version of the slides is designed to give the didactic element of the topic. The students listen to that before attending an interactive seminar on that topic. The seminar is also recorded so that students can listen to that afterwards. The seminar is designed to give additional information, such as case reports, or to clarify key points or for live demonstrations. It is a good way of doubling the contact time with the students without imposing further on an already packed formal timetable as the students can work in their own time. One problem that we noticed with this approach was that attendance can vary. If the students feel that they will gain something from the interactive seminar then they are more likely to attend – exam tips usually win them over! At the Spanish meeting the educators decided that they wanted to have regular meetings. The industry colleagues in attendance said that they were happy to help but could not necessarily give money, but they could offer meeting rooms, pay for lunch and evening meals. They even said that that they were happy to host meetings and invite other companies too (except to manufacturing plants). In the UK the British Committee of Contact Lens Educators (BUCCLE) meets for one day on three occasions in the year. The American Optometric Contact Lens Educators (AOCLE) meets annually at a three day event. Both these organisations get some help from industry. BUCCLE usually has one of its meetings at a university, one at a company training centre/manufacturing plant/national headquarters and one meeting the day before the BCLA annual conference. BUCCLE usually has its pre-BCLA meeting in conjunction with the International Association of Contact Lens Educators (IACLE). So when educators meet what would they discuss; well probably the focus should be on education rather than actual contact lens knowledge. For example sharing ideas on how to teach toric lens fitting would be better than discussing the actual topic of toric lenses itself. Most universities will have an education department with an expert who could share ideas on how to use the internet in teaching or how to structure lectures or assessments etc. In the past I have helped with similar training programmes in other countries and sharing good practice in pedagogy is always a popular topic. Anyone who is involved in education in the field of contact lenses should look at the IACLE web page and look out for the IACLE World Congress in 2015 in the days preceding the BCLA. Finally, IACLE, AOCLE and BUCCLE all exist as a result of generous educational grants from contact lens companies and anyone interested in finding out more about should refer to their respective web pages.