851 resultados para Collaborative bibliographic revision
Resumo:
The traditional model of visual arts practice is one that privileges highly individuated reflection and research on studio based, predominately material outcomes. This archetypal approach to thinking about cultural production tends to overlook all of the conceptual and contextual collaborations that take place, both informally and formally in the process of making artworks. The aim of this practice-led research project is to creatively and critically explore the potential for actively engaging in a collaborative process for making artworks. It will focus on this approach to research and making through performance and video based works made in conjunction with Kate Woodcroft. Through doing this it aims to explore the possibilities for thinking and working beyond singular, materially based practices and develop new understandings for this as a model for generating new and unexpected creative outcomes. Key departure points for this discussion include; tertiary performance, conceptual art, and humour.
Resumo:
Background: Greater research utilisation in cancer nursing practice is needed, in order to provide well-informed and effective nursing care to people affected by cancer. This paper aims to report on the implementation of evidence-based practice in a tertiary cancer centre. Methods: Using a case report design, this paper reports on the use of the Collaborative Model for Evidence Based Practice (CMEBP) in an Australian tertiary cancer centre. The clinical case is the uptake of routine application of chlorhexidine-impregnated sponge dressings for preventing centrally inserted catheter-related bloodstream infections. In this case report, a number of processes that resulted in a service-wide practice change are described. Results: This model was considered a feasible method for successful research utilisation. In this case report, chlorhexidine-impregnated sponge dressings were proposed and implemented in the tertiary cancer centre with an aim of reducing the incidence of centrally inserted catheter-related bloodstream infections and potentially improving patient health outcomes. Conclusion: The CMEBP is feasible and effective for implementing clinical evidence into cancer nursing practice. Cancer nurses and health administrators need to ensure a supportive infrastructure and environment for clinical inquiry and research utilisation exists, in order to enable successful implementation of evidence-based practice in their cancer centres.
Resumo:
In various industrial and scientific fields, conceptual models are derived from real world problem spaces to understand and communicate containing entities and coherencies. Abstracted models mirror the common understanding and information demand of engineers, who apply conceptual models for performing their daily tasks. However, most standardized models in Process Management, Product Lifecycle Management and Enterprise Resource Planning lack of a scientific foundation for their notation. In collaboration scenarios with stakeholders from several disciplines, tailored conceptual models complicate communication processes, as a common understanding is not shared or implemented in specific models. To support direct communication between experts from several disciplines, a visual language is developed which allows a common visualization of discipline-specific conceptual models. For visual discrimination and to overcome visual complexity issues, conceptual models are arranged in a three-dimensional space. The visual language introduced here follows and extends established principles of Visual Language science.
Resumo:
In this research we used inductive reasoning through design to understand how stakeholders in the Waterfall Way (New South Wales, Australia) perceive the relationships between themselves and the place they live in. This paper describes a collaborative design methodology used to release information about local identities, which guided the regional brand exercise. The methodology is explicit about the uncertainties and complexities of the design process and of its reception system. As such, it aims to engage with local stakeholders and experts in order to help elicit tacit knowledge and identify system patterns and trends that would possibly not be visible if a top-down expert-based process was used. Through collective design, local people were drawn together in search for a symbol to represent the meaning attached to their places/region in relation to sustainable tourism activity.
Resumo:
BACKGROUND Collaborative and active learning have been clearly identified as ways students can engage in learning with each other and the academic staff. Traditional tier based lecture theatres and the didactic style they engender are not popular with students today as evidenced by the low attendance rates for lectures. Many universities are installing spaces designed with tables for group interaction with evolutions on spaces such as the TEAL (Technology Enabled Active Learning) (Massachusetts Institute of Technology, n.d.) and SCALE-UP (Student-Centred Activities for Large-Enrolment Undergraduate Programs) (North Carolina State University, n.d.) models. Technology advances in large screen computers and applications have also aided the move to these collaborative spaces. How well have universities structured learning using these spaces and how have students engaged with the content, technology, space and each other? This paper investigates the application of collaborative learning in such spaces for a cohort of 800+ first year engineers in the context of learning about and developing professional skills representative of engineering practice. PURPOSE To determine whether moving from tiers to tables enhances the student experience. Does utilising technology rich, activity based, collaborative learning spaces lead to positive experiences and active engagement of first year undergraduate engineering students? In developing learning methodology and approach in new learning spaces, what needs to change from a more traditional lecture and tutorial configuration? DESIGN/METHOD A post delivery review and analysis of outcomes was undertaken to determine how well students and tutors engaged with learning in new collaborative learning spaces. Data was gathered via focus group and survey of tutors, students survey and attendance observations. The authors considered the unit delivery approach along with observed and surveyed outcomes then conducted further review to produce the reported results. RESULTS Results indicate high participation in the collaborative sessions while the accompanying lectures were poorly attended. Students reported a high degree of satisfaction with the learning experience; however more investigation is required to determine the degree of improvement in retained learning outcomes. Survey feedback from tutors found that students engaged well in the activities during tutorials and there was an observed improvement in the quality of professional practice modelled by students during sessions. Student feedback confirmed the positive experiences in these collaborative learning spaces with 30% improvement in satisfaction ratings from previous years. CONCLUSIONS It is concluded that the right mix of space, technology and appropriate activities does engage students, improve participation and create a rich experience to facilitate potential for improved learning outcomes. The new Collaborative Teaching Spaces, together with integrated technology and tailored activities, has transformed the delivery of this unit and improved student satisfaction in tutorials significantly.
Resumo:
Many organisations, companies and libraries started to use participatory webs to extend their services and engage more users. However, some librarians are still hesitated to implement participatory webs in their libraries, particularly in developing countries. This paper explores the advantages and disadvantages of participatory webs focusing on collaborative tagging. This paper draws from the literature of published articles discussing topics but not limited to participatory webs, participatory libraries, collaborative tagging, folksonomy and taxonomy. The advantages of implementation of the participatory webs in the library outweigh the disadvantages of it. Participatory webs do not necessarily mean the death of information organisation but it can supplement and improves information organisation in the library. This paper may help to broaden knowledge of LIS professionals in the implementation of participatory webs in the library.
Resumo:
Collaboration between nurses in clinical and educational settings has been advocated as a means of ensuring nursing research is both practice oriented and scientifically valid. This paper describes a model, jointly developed by colleagues from the Nursing Departments of Alfred Hospital and La Trobe University, to foster collaborative research and steer research projects generated by clinical nurses from conceptualisation to publication.
Resumo:
Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.
Resumo:
“Our students have changed radically. Today’s students are no longer the people our educational system was designed to teach” (Prensky, 2001, p. 1). The influx of available new technology has helped to democratise knowledge, transforming when, where and how learning takes place, and changing perceptions of traditional learning landscapes (JISC, 2006; Neary et al., 2010). Mobile computers combined with wireless technology, have completely transformed the educational world; students have turned nomad[ic], engaging in conversations and thinking across traditional campus spaces (Alexander, 2004; Fisher, 2005). In this workshop we will be attempting to de-mystify a facet of mobile learning, by working in small groups to set up and kick start a number of social media sites, which can be used for collaboration and information exchange, in the design studio.
Resumo:
A video detailing our new virtual world BPMN process modelling tool developed by Erik Poppe. Enables better situational awareness via use of remotely connected avatars and a shared 3D process diagram.
Resumo:
This paper reports the findings of an in-depth literature review, which was designed as the first phase of a study that ultimately aims to rank the importance of key governance mechanisms on collaborative construction projects, in terms of impact on value-for-money. The absence of such information in the global knowledge base has prompted the current study. Seminal research completed recently concluded that deductive evidence with regard to the performance outcomes of collaborative procurement mechanisms is currently limited (Eriksson and Westerberg 2011). The authors aim to address this gap in current understanding. The literature review identifies key features of both formal and informal mechanisms which have been applied within collaborative contracting contexts. The literature review lays a solid foundation for designing a deductive research strategy to be implemented in the second phase of the study, which will employ a large-scale quantitative survey to shed light on the governance structures of collaborative contracts, and the ways in which they impact on realisation of VfM during project delivery in the Australian infrastructure industry. The current paper aims to identify the main categories of formal and informal governance mechanisms currently being employed globally. This will provide structure for the development of the survey in the second phase of the study.
Resumo:
The three genera of smut fungi, Ustilago, Sporisorium and Macalpinomyces, form a complex that has eluded resolution by morphology (Langdon & Fullerton 1975, Vánky 1991, Piepenbring et al. 1998) and molecular phylogenetic analysis (Stoll et al. 2003, 2005). Two suggestions to reconcile the taxonomy of the complex have been proposed. The first was to break up the current taxa into several smaller genera and subgenera, and the second to unify the three genera into a single genus, Ustilago (Vánky 2002, Piepenbring 2004). The former solution is dependent on finding morphological synapomorphies that can delimit the genera, and the latter solution dismisses the wide morphological diversity within the group (McTaggart et al. 2012b). Synapomorphic morphological characters and host plant classification delimited clades in the Ustilago-Sporisorium-Macalpinomyces complex (McTaggart et al. 2012a). The current study defines these synapomorphic characters and proposes a new classification for many species currently placed in Ustilago, Sporisorium and Macalpinomyces. This approach preserves the well-known genera Ustilago, Sporisorium and Macalpinomyces, and enables the classification to reflect morphological diversity in the complex.
Resumo:
The aim of this study was to perform a biomechanical analysis of the cement-in-cement (c-in-c) technique for fixation of selected Vancouver Type B1 femoral periprosthetic fractures and to assess the degree of cement interposition at the fracture site. Six embalmed cadaveric femora were implanted with a cemented femoral stem. Vancouver Type B1 fractures were created by applying a combined axial and rotational load to failure. The femora were repaired using the c-in-c technique and reloaded to failure. The mean primary fracture torque was 117 Nm (SD 16.6, range 89–133). The mean revision fracture torque was 50 Nm (SD 16.6, range 29–74), which is above the torque previously observed for activities of daily living. Cement interposition at the fracture site was found to be minimal.
Resumo:
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.
Resumo:
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.