874 resultados para practical turn
Resumo:
This reports a study that seeks to explore the experience of students majoring in technology and design in an undergraduate education degree. It examines their experiences in finding and using information for a practical assignment. In mapping the variation of the students' experience, the study uses a qualitative, interpretive approach to analyse the data, which was collected via one-to-one interviews. The analysis yielded five themes through which technology education students find and use information: interaction with others; experience (past and new); formal educational learning; the real world; and incidental occurrences. The intentions and strategies that form the students' approaches to finding and using information are discussed. So too are the implications for teaching practice.
Resumo:
The broad aim of of this thesis is to contribute to understanding how the relationships between culture, employment and education can help Tanzania's young people secure jobs, and survive in the creative workforce so as to better their future. Based on a range of interviews and other data in Tanzania, the study considers how to integrate cultural expressions into arts education (education in art and education through art) as a tool for nurturing young people's creative talents for their future sustainable employment in Tanzania.
Resumo:
Successful biodiversity conservation requires safeguarding viable populations of species. To work with this challenge Sweden has introduced a concept of Action Plans, which focus on the recovery of one or more species; while keeping in mind the philosophy of addressing ecosystems in a more comprehensive way, following the umbrella concept. In this paper we investigate the implementationprocess of the ActionPlanfor one umbrella species, the White-backed Woodpecker (WBW) Dendrocopos leucotos. We describe the plan's organisation and goals, and investigate its implementation and accomplishment of particular targets, based on interviewing and surveying the key actors. The achievement of the targets in 2005-2008 was on average much lower than planned, explained partially by the lack of knowledge/data, experienced workers, and administrative flexibility. Surprisingly, the perceived importance of particular conservation measures, the investment priority accorded to them, the money available and various practical obstacles all failed to kg? explain the target levels achieved. However qualitative data from both the interviews and the survey highlight possible implementation obstacles: competing interests with other conservation actions and the level of engagement of particular implementing actors. Therefore we suggest that for successful implementation of recovery plans, there is aneed for initial and inclusive scoping prior to embarking on the plan, where not only issues like ecological knowledge and practical resources are considered, but also possible conflicts and synergies with other conservation actions. An adaptive approach with regular review of the conservation process is essential, particularly in the case of such complex action plans as the one for the WBW.
Resumo:
The field of design research is a marketplace of methodological diversity. It isn't just that there are many different research methods in the field, but that there are many different methodological 'foundations' - principles for how research can and should be done, for how contributions to knowledge ought to be pursued. This is not particularly surprising given how broadly 'design' is often conceptualised. Herbert Simon (1996) suggested "the proper study of mankind is the science of design"; Nigel Cross has identified a principal difference between humankind and the animal kingdom to be our ability to design. In light of such encompassing notions of design it is difficult to imagine how the field of design research should exhibit any less diversity than that found within and among the arts, humanities, the human and social sciences.
Resumo:
The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.
Resumo:
The finite element method in principle adaptively divides the continuous domain with complex geometry into discrete simple subdomain by using an approximate element function, and the continuous element loads are also converted into the nodal load by means of the traditional lumping and consistent load methods, which can standardise a plethora of element loads into a typical numerical procedure, but element load effect is restricted to the nodal solution. It in turn means the accurate continuous element solutions with the element load effects are merely restricted to element nodes discretely, and further limited to either displacement or force field depending on which type of approximate function is derived. On the other hand, the analytical stability functions can give the accurate continuous element solutions due to element loads. Unfortunately, the expressions of stability functions are very diverse and distinct when subjected to different element loads that deter the numerical routine for practical applications. To this end, this paper presents a displacement-based finite element function (generalised element load method) with a plethora of element load effects in the similar fashion that never be achieved by the stability function, as well as it can generate the continuous first- and second-order elastic displacement and force solutions along an element without loss of accuracy considerably as the analytical approach that never be achieved by neither the lumping nor consistent load methods. Hence, the salient and unique features of this paper (generalised element load method) embody its robustness, versatility and accuracy in continuous element solutions when subjected to the great diversity of transverse element loads.
Resumo:
Purpose This study investigates the effects of service innovation exploration-exploitation on financial performance through the delivery of quality services. Additional emphasis is also given to examining the extent to which employee empowerment and slack resources enhance or suppress the performance benefits of service firms engaging in service innovation exploration versus exploitation. Design/methodology/approach Data were drawn from a multi-informant survey of service firms using a drop-and-collect approach. The survey gathered data from managers, customer service employees and customers to test the hypotheses. Findings The results show that excelling at both exploitative and exploratory innovation helps enhance the quality of services, which in turn yield superior financial performance. Further, empowering employees enhances the relationship between exploratory and exploitative service innovation and service quality. We also show that the extent managers’ perceived their market to be competitive influences in the pursuit of high levels of both service innovation exploration and exploitation and that this relationship is impacted by the extent they believe they have available slack resources. Practical implications The findings suggest that service firms need to pursue both exploitation and exploration at high levels simultaneously and empower their employees to stay ahead of competitors in delivering quality services, which ultimately contribute to the achievement of superior financial outcomes. Also, the findings highlight the importance of employee empowerment, market competitiveness and slack resources in the pursuit of high levels of both service innovation exploration and exploitation. Originality/value These findings and our theory indicate that this study is the first to empirically examine organizational ambidexterity in the context of service innovation exploration – exploitation adopting the principles of combined and balanced innovation. The study provides insights into the critical role of customers’ perceptions of service quality in contributing to firms’ financial performance. Our insights are unique in that the study incorporates managers, employees and customers in an integrated service innovation model.
Resumo:
Affect is an important feature of multimedia content and conveys valuable information for multimedia indexing and retrieval. Most existing studies for affective content analysis are limited to low-level features or mid-level representations, and are generally criticized for their incapacity to address the gap between low-level features and high-level human affective perception. The facial expressions of subjects in images carry important semantic information that can substantially influence human affective perception, but have been seldom investigated for affective classification of facial images towards practical applications. This paper presents an automatic image emotion detector (IED) for affective classification of practical (or non-laboratory) data using facial expressions, where a lot of “real-world” challenges are present, including pose, illumination, and size variations etc. The proposed method is novel, with its framework designed specifically to overcome these challenges using multi-view versions of face and fiducial point detectors, and a combination of point-based texture and geometry. Performance comparisons of several key parameters of relevant algorithms are conducted to explore the optimum parameters for high accuracy and fast computation speed. A comprehensive set of experiments with existing and new datasets, shows that the method is effective despite pose variations, fast, and appropriate for large-scale data, and as accurate as the method with state-of-the-art performance on laboratory-based data. The proposed method was also applied to affective classification of images from the British Broadcast Corporation (BBC) in a task typical for a practical application providing some valuable insights.
Resumo:
Purpose The purpose of this paper is to examine consumer perceptions of value of financial institutions using social media to interact with consumers; if overall perceived value predicts a consumer’s intention to adopt, and if intention predicts self-reported adoption of social media to interact with a financial institution; and if perceptions of value in using social media to interact with a financial institution changes over time. Design/methodology/approach Self-administered surveys were run at two time points; 2010 and 2014. Data were analyzed using multiple and mediated regressions, and t-tests. Comparisons are made between the two time points. Findings Perceived usefulness, economic value, and social value predicted overall perceived value, which in turn predicted a consumer’s intention to adopt social media to interact with a financial institution. At Time 2, adoption intention predicted self-reported usage behavior. Finally, there were significant differences between perceptions across Time 1 and 2. Research limitations/implications The implications of the research highlight the importance of overall perceived value in the role of adoption intention, and that at Time 2, adoption intention predicted self-reported adoption to read and share content. A reduction in perceptions of value and intentions from Time 1 to Time 2 could be explained by perceptions of technology insecurity. In future studies, the authors recommend examining inhibitors to adoption including hedonic value. Practical implications The findings suggest that consumers will use social media if the sector creates and clearly articulates consumer value from using social media. The sector also needs to address technology security perceptions to increase usage of social media. Originality/value This paper is one of the first to investigate the consumer’s perspective in social media adoption by financial institutions, by exploring the role of value in consumer adoption and usage of social media.
Resumo:
This research was developed between Australia and Papua New Guinea (PNG) over two years investigating ways in which theatre for development could be held accountable for the claims it makes especially in PNG. The motivation to improve theatre for development (TfD) practice was triggered by the desire to enhance the democratic processes of collaboration and co–creativity often lacking in TfD activity in Papua New Guinea. Through creative practice as research and reflective processes, working with established and experienced local community theatre practitioners, a new form of theatre for development, Theatre in Conversations evolved. This form integrated three related genres of TfD including process drama, community theatre and community conversations. The suitability and impact of Theatre in Conversations was tested in three remote villages in PNG. Findings and outputs from the study have the potential to be used by theatre for development practitioners in other countries.
Resumo:
Kimberlite terminology remains problematic because both descriptive and genetic terms are mixed together in most existing terminology schemes. In addition, many terms used in existing kimberlite terminology schemes are not used in mainstream volcanology, even though kimberlite bodies are commonly the remains of kimberlite volcanic vents and edifices. We build on our own recently published approach to kimberlite facies terminology, involving a systematic progression from descriptive to genetic. The scheme can be used for both coherent kimberlite (i.e. kimberlite that was emplaced without undergoing any fragmentation processes and therefore preserving coherent igneous textures) and fragmental kimberlites. The approach involves documentation of components, textures and assessing the degree and effects of alteration on both components and original emplacement textures. This allows a purely descriptive composite component, textural and compositional petrological rock or deposit name to be constructed first, free of any biases about emplacement setting and processes. Then important facies features such as depositional structures, contact relationships and setting are assessed, leading to a composite descriptive and genetic name for the facies or rock unit that summarises key descriptive characteristics, emplacement processes and setting. Flow charts summarising the key steps in developing a progressive descriptive to genetic terminology are provided for both coherent and fragmental facies/deposits/rock units. These can be copied and used in the field, or in conjunction with field (e.g. drill core observations) and petrographic data. Because the approach depends heavily on field scale observations, characteristics and process interpretations, only the first descriptive part is appropriate where only petrographic observations are being made. Where field scale observations are available the progression from developing descriptive to interpretative terminology can be used, especially where some petrographic data also becomes available.
Resumo:
The Canadian Best Practice Recommendations for Stroke Care are intended to reduce variations in stroke care and facilitate closure of the gap between evidence and practice (Lindsay et al., 2010). The publication of best practice recommendations is only the beginning of this process. The guidelines themselves are not sufficient to change practice and increase consistency in care. Therefore, a key objective of the Canadian Stroke Network (CSN) Best Practices Working Group (BPWG) is to encourage and facilitate ongoing professional development and training for health care professionals providing stroke care. This is addressed through a multi-factorial approach to the creation and dissemination of inter-professional implementation tools and resources. The resources developed by CSN span pre-professional education, ongoing professional development, patient education and may be used to inform systems change. With a focus on knowledge translation, several inter-professional point-of-care tools have been developed by the CSN in collaboration with numerous professional organizations and expert volunteers. These resources are used to facilitate awareness, understanding and applications of evidence-based care across stroke care settings. Similar resources are also developed specifically for stroke patients, their families and informal caregivers, and the general public. With each update of the Canadian Best Practice Recommendations for Stroke Care, the BPWG and topic-specific writing groups propose priority areas for ongoing resource development. In 2010, two of these major educational initiatives were undertaken and recently completed—one to support continuing education for health care professionals regarding secondary stroke prevention and the other to educate families, informal caregivers and the public about pediatric stroke. This paper presents an overview of these two resources, and we encourage health care professionals to integrate these into their personal learning plans and tool kits for patients.
Resumo:
In Mineral Resources Engineering Services Pty Ltd as Trustee for the Meakin Investment Trust v Commonwealth Bank of Australia: Hay v Commonwealth Bank of Australia [2015] QSC 62 Philip McMurdo J considered challenges to amended statements of claim in two related actions. The amendments were potentially time-barred and his Honour considered in particular the date from which the amendments should take effect.
Resumo:
Purpose This paper aims to understand how experiential value can generate awareness, image, perceived quality and loyalty to the moderate drinking brand. Electronic games are increasingly used by social marketers in an attempt to support target audiences uptake of social behaviours. However, little is known of the value this creates for target audiences and its impact on the uptake of a social behaviour brand. Design/methodology/approach A survey of male adolescents (n = 137) was conducted to test proposed relationships between experiential value and consumer-based brand equity dimensions. The research tested the game “Don’t Turn a Night Out into a Nightmare” that was developed by the Australian Federal Government as part of a social marketing campaign. Data were analysed using linear regression and MANCOVA. Findings The findings indicate that there are significant relationships between consumer-based brand equity dimensions for the social behaviour brand of moderate drinking, indicating relevance of a commercial marketing theory for social marketing. Furthermore, findings show that different combinations of experiential value dimensions have an impact on different components of consumer-based brand equity. These findings indicate that when social marketers are developing electronic games, they must create different combinations of value in game play to achieve awareness, positive image, high perceived quality and, ultimately, loyalty to a behaviour. Practical implications Social marketers seeking to use electronic games to influence the uptake of behaviour brands such as moderate drinking must provide a more complete value package. Originality/value This paper is the first to examine how experiential value can influence the creation of brand equity for a social behaviour brand.
Resumo:
Young workers are over-represented in workplace injury statistics and there is growing interest in addressing their vulnerability and safety exposure. Such concerns have been raised within a broader discursive framework of responsibilisation which has seen a transfer of responsibility for workplace safety from employer to worker. This article examines the potential for self-advocacy as a strategy for improving the safety of young workers through the provision of resources to articulate and act on workplace rights. The study utilises data derived from 48 group interviews involving 216 high school students (13–16 years of age) at 19 high schools in Queensland, Australia, who were asked to discuss their knowledge and experience of workplace rights and responsibilities. The limitations of the safety self-advocacy approach are explored, including the social, developmental and organisational issues that might affect the ability or willingness of school-aged workers to self-advocate. The findings reveal that the notion of self-advocacy is internalised by young people before they even enter the formal labour market but that in practice, attempts by young people to enact rights to safety are often dismissed or undermined.