623 resultados para Zann, Greg
Resumo:
Australian screen classics are seminal for a range of reasons: whether it is a particular title’s popularity and impact upon popular culture, its cultural and textual meaning, or what the film tells us about the social, political and cultural climate from which it emerged. Wolf Creek (Greg McLean, 2005) is undoubtedly an Australian screen classic. The film was an impressive low-budget breakout success, which played a big part in the renaissance of contemporary Australian genre cinema by opening doors for genre filmmakers targeting international markets in ways that haven’t been seen in Australia since the 1980s. Wolf Creek has become the quintessential Australian horror movie. It has captured collective national fears and anxieties about the Australian outback – the isolation, the repressive desolation, the idea that the landscape itself is your enemy. It challenges traditional representations of Australian masculinity and the “ocker larrikin” to show a negative image of the rural ocker which dominated Australian screen in the 1970s and, to lesser extent, the 1980s.
Resumo:
Prefabricated construction is regarded by many as an effective and efficient approach to improving construction processes and productivity, ensuring construction quality and reducing time and cost in the construction industry. However, many problems occur with this approach in practice, including higher risk levels and cost or time overruns. In order to solve such problems, it is proposed that the IKEA model of the manufacturing industry and VP technology are introduced into a prefabricated construction process. The concept of the IKEA model is identified in detail and VP technology is briefly introduced. In conjunction with VP technology, the applications of the IKEA model are presented in detail, i.e. design optimization, production optimization and installation optimization. Furthermore, through a case study of a prefabricated hotel project in Hong Kong, it is shown that the VP-based IKEA model can improve the efficiency and safety of prefabricated construction as well as reducing cost and time.
Resumo:
Construction is undoubtedly the most dangerous industry in Hong Kong, being responsible for 76 percent of all fatal accidents in industry in the region – around twenty times more than any other industry. In this paper, it is argued that while this rate can be largely reduced by improved production practices in isolation from the project’s physical design, there is some scope for the design team to contribute to site safety. A new safety assessment method, the Virtual Safety Assessment System (VSAS), is described which offers assistance. This involves individual construction workers being presented with 3D virtual risky scenarios of their project and a range of possible actions for selection. The method provides an analysis of results, including an assessment of the correctness or otherwise of the user’s selections, contributing to an iterative process of retraining and testing until a satisfactory level of knowledge and skill is achieved.
Resumo:
The next generation of SOA needs to scale for flexible service consumption, beyond organizational boundaries and current B2B applications, into communities, eco-systems, and business networks. In the wider and, ultimately, global settings, new capabilities are needed so that business partners can efficiently and reliably enable, adapt, and expose services where they can be discovered, ordered, consumed, metered, and paid for, through new applications and opportunities, driven by third parties in the global "village". This trend is already underway, in different ways, through various early adopter market segments. For the small medium enterprises segment, Google, Intuit-Microsoft, and others have launched appstores, through which an open-ended array of hosted applications are sourced from the development community and procured as maketplace commondities. In the corporate sector, the marketplace model and business network hubs are being put in place on top of connectivity and network orchestration investments for capitalizing services as tradable assets, seen in banking/finance (e.g. American Express Intelligent Marketplace), logistics (e.g., the E2open hub), and the public sector (e.g., UK DirectGov whole-of-government citizen services delivery).
Resumo:
The emergence of semantic technologies to deal with the underlying meaning of things, instead of a purely syntactical representation, has led to new developments in various fields, including business process modeling. Inspired by artificial intelligence research, technologies for semantic Web services have been proposed and extended to process modeling. However, the applicablility of semantic Web services for semantic business processes is limited because business processes encompass wider requirements of business than Web services. In particular, processes are concerned with the composition of tasks, that is, in which order activities are carried out, regardless of their implementation details; resources assigned to carry out tasks, such as machinery, people, and goods; data exchange; and security and compliance concerns.
Resumo:
I put my abstract in for this conference back in March, based on some evaluation work I had been doing in 2010 with my colleague Professor Greg Hearn for the 3C Regional Writing NeoGreography Project. I had been swapping notes with a colleague from the Smithsonian’s Centre for Folklife and Cultural Heritage about their evaluation work, and stuck inside during the rains of January, I decided to apply for a Qld Smithsonian fellowship based on the quandary of evaluation-particular in public histories (oral histories) and digital storytelling. In July I was awarded the fellowship, so I have tweaked my presentation to talk about what we hope to do with this collaboration, to propel the importance placed on evaluation in public arts programs in Qld and beyond.
Resumo:
The Australian taxation system encourages charitable giving through tax deductibility for donations made by individuals and companies, and via tax exemption for income distributed to charities through charitable trusts. Other means of giving, such as through bequests enjoy little tax concessions...
Resumo:
Many accidents occur world-wide in the use of construction plant and equipment, and safety training is considered by many to be one of the best approaches to their prevention. However, current safety training methods/tools are unable to provide trainees with the hands-on practice needed. Game technology-based safety training platforms have the potential to overcome this problem in a virtual environment. One such platform is described in this paper - its characteristics are analysed and its possible contribution to safety training identified. This is developed and tested by means of a case study involving three major pieces of construction plant, which successfully demonstrates that the platform can improve the process and performance of the safety training involved in their operation. This research not only presents a new and useful solution to the safety training of construction operations, but illustrates the potential use of advanced technologies in solving construction industry problems in general.
Resumo:
Description ‘The second volume of the Handbook on the Knowledge Economy is a worthy companion to the highly successful original volume published in 2005, extending its theoretical depth and developing its coverage. Together the two volumes provide the single best work and reference point for knowledge economy studies. The second volume with fifteen original essays by renowned scholars in the field, provides insightful and robust analyses of the development potential of the knowledge economy in all its aspects, forms and manifestations.’ – Michael A. Peters, University of Illinois, US
Resumo:
The purpose of this study was to investigate whether an approach to developing word lists centred on etymological roots would improve the spelling performance of older primary school students. Participants were 46 students in the last year of primary school in south-east Queensland (31 girls and 15 boys) across three classes, with two classes being assigned to control conditions. Students were evaluated pre- and post-intervention on three dependent measures: British Spelling Test Series spelling, spelling in writing and writing. The results of this intervention revealed improvements in spelling for girls but not for boys. The implications for improved teaching methods are discussed.
Resumo:
Facebook is approaching ubiquity in the social habits and practice of many students. However, its use in higher education has been criticised (Maranto & Barton, 2010) because it can remove or blur academic boundaries. Despite these concerns, there is strong potential to use Facebook to support new students to communicate and interact with each other (Cheung, Chiu, & Lee, 2010). This paper shows how Facebook can be used by teaching staff to communicate more effectively with students. Further, it shows how it can provide a way to represent and include beginning students’ thoughts, opinions and feedback as an element of the learning design and responsive feed-forward into lectures and tutorial activities. We demonstrate how an embedded social media strategy can be used to complement and enhance the first year curriculum experience by functioning as a transition device for student support and activating Kift’s (2009) organising principles for first year curriculum design.
Resumo:
Virtual world platforms such as Second Life have been successfully used in educational contexts to motivate and engage learners. This article reports on an exploratory workshop involving a group of high school students using Second Life for an urban planning project. Young people are traditionally an under-represented demographic when it comes to participating in urban planning and decision making processes. The research team developed activities that combined technology with a constructivist approach to learning. Real world experiences and purposes ensured that the workshop enabled students to see the relevance of their learning. Our design also ensured that play remained an important part of the learning. By conceiving of the workshop as a ‘serious playground’ we investigated the ludic potential of learning in a virtual world.
Resumo:
Tower crane dismantling is one of the most dangerous activities in the construction industry. Tower crane erection and dismantlement causes 10–12% of the fatalities of all crane accidents. The nature of the task is such that off-the-job training is not practicable, and the knowledge and expertise needed has to be gained on the job. However, virtual trainers such as Microsoft Flight Simulator for airplane pilots and mission rehearsal exercise (MRE) for army personnel have been developed and are known to provide a highly successful means of overcoming the risks involved in such on-the-job learning and clearly have potential in construction situations. This paper describes the newly developed multiuser virtual safety training system (MVSTS) aimed at providing a similar learning environment for those involved in tower crane dismantlement. The proposed training system is developed by modifying an existing game engine. Within the close-to-reality virtual environment, trainees can participate in a virtual dismantling process. During the process, they learn the correct dismantling procedure and working location and to cooperate with other trainees by virtually dismantling the crane. The system allows the trainees to experience the complete procedure in a risk-free environment. A case study is provided to demonstrate how the system works and its practical application. The proposed system was evaluated by interviews with 30 construction experts with different backgrounds, divided into three groups according to their experience and trained by the traditional and virtual methods, respectively. The results indicate that the trainees of the proposed system generally learned better than those using the traditional method. The ratings also indicate that the system generally has great potential as a training platform.
Resumo:
Security cues found in web browsers are meant to alert users to potential online threats, yet many studies demonstrate that security indicators are largely ineffective in this regard. Those studies have depended upon self-reporting of subjects' use or aggregate experimentation that correlate responses to sites with and without indicators. We report on a laboratory experiment using eye-tracking to follow the behavior of self-identified computer experts as they share information across popular social media websites. The use of eye-tracking equipment allows us to explore possible behavioral differences in the way experts perceive web browser security cues, as opposed to non-experts. Unfortunately, due to the use of self-identified experts, technological issues with the setup, and demographic anomalies, our results are inconclusive. We describe our initial experimental design, lessons learned in our experimentation, and provide a set of steps for others to follow in implementing experiments using unfamiliar technologies, eye-tracking specifically, subjects with different experience with the laboratory tasks, as well as individuals with varying security expertise. We also discuss recruitment and how our design will address the inherent uncertainties in recruitment, as opposed to design for an ideal population. Some of these modifications are generalizable, together they will allow us to run a larger 2x2 study, rather than a study of only experts using two different single sign-on systems.