994 resultados para Opportunity Recognition
Resumo:
Integrated care pathways are documents which outline the essential steps of multidisciplinary care in addressing a specific clinical problem (Rotter et al., 2010). They can be used to introduce clinical guidelines and systematic audits of clinical practice, and to ensure that the most appropriate management occurs at the most appropriate time and that it is provided by the most appropriate health professional. The Liverpool Care Pathway (LCP) is an example of an integrated care pathway, designed in the 1990s to guide care for people who are in their last days of life (Ellershaw et al., 1997, Ellershaw and Ward, 2003)...
Resumo:
The benefits of reflective practice have been well established in the literature (Rogers, 2001), as have models to embed reflective thinking in higher education curriculum (Ryan and Ryan, 2012). Reflection is commonly envisaged as a textual practice, through which students ‘reflect in and on action’ (Schön 1983), and articulate their experiences, learning and outcomes in written portfolios, journals, or blogs. While such approaches to individual written reflection are undoubtedly beneficial for deepening insight and self-criticality, reflection can also provide other benefits when approached as a collaborative, oral activity. This poster presents a dialogic model of reflective practice that affords the opportunity for developing presentation skills, critique, community and professional identity formation. This dialogic approach to reflection is illustrated by a first year subject (‘KIB101 Visual Communication’ at QUT), in which students apply visual theory (presented in lectures) to communication and graphic design problems in the studio. In regular (fortnightly) presentations, they critically reflect upon their work in progress by aligning it with the concepts, design principles and professional language of the lectures. This iterative process facilitates responsive peer feedback, similarly couched in the formal terms of the discipline. This ‘mirrored reflection’ not only provides opportunities to incrementally improve, it also sets designs in a theoretical frame; provides the opportunity for comparative analysis (to see design principles applied by peers in different ways); to practice formal design language and presentation techniques of the discipline and; because peer critique is framed as an act of generosity; it affords the development of a supportive community of practice. In these ways, dialogic reflection helps students develop a professional voice and identity from first year. Evidence of impact is provided by quantitative and qualitative student feedback over several years, as well as institutional feedback and recognition.
Resumo:
In this paper, we explore the effectiveness of patch-based gradient feature extraction methods when applied to appearance-based gait recognition. Extending existing popular feature extraction methods such as HOG and LDP, we propose a novel technique which we term the Histogram of Weighted Local Directions (HWLD). These 3 methods are applied to gait recognition using the GEI feature, with classification performed using SRC. Evaluations on the CASIA and OULP datasets show significant improvements using these patch-based methods over existing implementations, with the proposed method achieving the highest recognition rate for the respective datasets. In addition, the HWLD can easily be extended to 3D, which we demonstrate using the GEV feature on the DGD dataset, observing improvements in performance.
Resumo:
A significant amount of speech is typically required for speaker verification system development and evaluation, especially in the presence of large intersession variability. This paper introduces a source and utterance duration normalized linear discriminant analysis (SUN-LDA) approaches to compensate session variability in short-utterance i-vector speaker verification systems. Two variations of SUN-LDA are proposed where normalization techniques are used to capture source variation from both short and full-length development i-vectors, one based upon pooling (SUN-LDA-pooled) and the other on concatenation (SUN-LDA-concat) across the duration and source-dependent session variation. Both the SUN-LDA-pooled and SUN-LDA-concat techniques are shown to provide improvement over traditional LDA on NIST 08 truncated 10sec-10sec evaluation conditions, with the highest improvement obtained with the SUN-LDA-concat technique achieving a relative improvement of 8% in EER for mis-matched conditions and over 3% for matched conditions over traditional LDA approaches.
Resumo:
Australia is currently experiencing a resources boom and jobs in the male dominated fields of construction and engineering are at a premium. Employment in the construction industry, historically and today, is overwhelmingly male and, with an ageing population this predominately older male workforce will be retiring in greater numbers in the coming decade. Despite more that 25 years of anti- discrimination legislation and equal opportunity legislation these industries still employ few women in operational roles. This paper investigates the issue of the low representation of women in the construction industry. Our investigation involves the analysis of 95 organisation progress reports on the equal opportunity strategic programs in the construction industry. Findings indicate that this industry is not engaging with equal employment opportunity programs and further that equity outcomes for women in the industry are not evident.
Resumo:
While entrepreneurship research has taken firm formation to be the predominant mode of opportunity exploitation, entrepreneurship can take place through many other types of organizational arrangements. In the present article, we consider one such alternative arrangement, namely the formation of inter-organizational projects (IOPs). We propose a multi-level contingency model that suggests that uncertainty both at the level of the firm and at the level of the environment makes the exploitation of opportunities through IOPs more likely. The model is tested by telephone survey data collected amongst a panel of 1725 SMEs and longitudinal industry data. Our findings provide strong support for the industry-level part of the model, but interestingly, only partial support for the firm level part of the model. This indicates that the effects of uncertainty need to be dissected into different levels of analysis to understand the conditions under which alternative modes of opportunity exploitation can be a prominent entrepreneurial alternative to new firm formation.
Resumo:
Submission recommended addition of a new 'self-enacting' preamble and enacting words to the Commownealth Constitution, and replacement of the 'race power' by a series of more specific powers relating to the recognition of native title and laws of the indigenous people.
Resumo:
We welcome Olga Kanitsaki’s comments on our paper ‘Rethinking cultural sensitivity’ (Nursing Inquiry 1996 3: 3-10) and appreciate the opportunity to respond. The main point we seek to emphasize here is the fundamental difference between our position and that of Kanitsaki. Our analysis is based on the recognition that the term ‘culture’ is historically and politically grounded. Its meaning changes over time and its contemporary usage (and popularity) thus demands explanation. The analytical task we undertook in our work was to emphasize the politics of culture rather than posing the political as one of a number of cultural dimensions (alongside the social, religious or technological)...
Resumo:
Raven and Song Scope are two automated sound anal-ysis tools based on machine learning technique for en-vironmental monitoring. Many research works have been conducted upon them, however, no or rare explo-ration mentions about the performance and comparison between them. This paper investigates the comparisons from six aspects: theory, software interface, ease of use, detection targets, detection accuracy, and potential application. Through deep exploration one critical gap is identified that there is a lack of approach to detect both syllables and call structures, since Raven only aims to detect syllables while Song Scope targets call structures. Therefore, a Timed Probabilistic Automata (TPA) system is proposed which separates syllables first and clusters them into complex structures after.
Resumo:
GO423 was initiated in 2012 as part of a community effort to ensure the vitality of the Queensland Games Sector. In common with other industrialised nations, the game industry in Australia is a reasonably significant contributor to Gross National Product (GNP). Games are played in 92% of Australian homes and the average adult player has been playing them for at least twelve years with 26% playing for more than thirty years (Brand, 2011). Like the games and interactive entertainment industries in other countries, the Australian industry has its roots in the small team model of the 1980s. So, for example, Beam Software, which was established in Melbourne in 1980, was started by two people and Krome Studios was started in 1999 by three. Both these companies grew to employing over 100 people in their heydays (considered large by Antipodean standards), not by producing their own intellectual property (IP) but by content generation for off shore parent companies. Thus our bigger companies grew on a model of service provision and tended not to generate their own IP (Darchen, 2012). There are some no-table exceptions where IP has originated locally and been ac-quired by international companies but in the case of some of the works of which we are most proud, the Australian company took on the role of “Night Elf” – a convenience due to affordances of the time zone which allowed our companies to work while the parent companies slept in a different time zone. In the post GFC climate, the strong Australian dollar and the vulnerability of such service provision means that job security is virtually non-existent with employees invariably being on short-term contracts. These issues are exacerbated by the decline of middle-ground games (those which fall between the triple-A titles and the smaller games often produced for a casual audience). The response to this state of affairs has been the change in the Australian games industry to new recognition of its identity as a wider cultural sector and the rise (or return) of an increasing number of small independent game development companies. ’In-dies’ consist of small teams, often making games for mobile and casual platforms, that depend on producing at least one if not two games a year and who often explore more radical definitions of games as designed cultural objects. The need for innovation and creativity in the Australian context is seen as a vital aspect of the current changing scene where we see the emphasis on the large studio production model give way to an emerging cultural sector model where small independent teams are engaged in shorter design and production schedules driven by digital distribution. In terms of Quality of Life (QoL) this new digital distribution brings with it the danger of 'digital isolation' - a studio can work from home and deliver from home. Community events thus become increasingly important. The GO423 Symposium is a response to these perceived needs and the event is based on the understanding that our new small creative teams depend on the local community of practice in no small way. GO423 thus offers local industry participants the opportunity to talk to each other about their work, to talk to potential new members about their work and to show off their work in a small intimate situation, encouraging both feedback and support.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
Purpose. To compare the on-road driving performance of visually impaired drivers using bioptic telescopes with age-matched controls. Methods. Participants included 23 persons (mean age = 33 ± 12 years) with visual acuity of 20/63 to 20/200 who were legally licensed to drive through a state bioptic driving program, and 23 visually normal age-matched controls (mean age = 33 ± 12 years). On-road driving was assessed in an instrumented dual-brake vehicle along 14.6 miles of city, suburban, and controlled-access highways. Two backseat evaluators independently rated driving performance using a standardized scoring system. Vehicle control was assessed through vehicle instrumentation and video recordings used to evaluate head movements, lane-keeping, pedestrian detection, and frequency of bioptic telescope use. Results. Ninety-six percent (22/23) of bioptic drivers and 100% (23/23) of controls were rated as safe to drive by the evaluators. There were no group differences for pedestrian detection, or ratings for scanning, speed, gap judgments, braking, indicator use, or obeying signs/signals. Bioptic drivers received worse ratings than controls for lane position and steering steadiness and had lower rates of correct sign and traffic signal recognition. Bioptic drivers made significantly more right head movements, drove more often over the right-hand lane marking, and exhibited more sudden braking than controls. Conclusions. Drivers with central vision loss who are licensed to drive through a bioptic driving program can display proficient on-road driving skills. This raises questions regarding the validity of denying such drivers a license without the opportunity to train with a bioptic telescope and undergo on-road evaluation.
Resumo:
1. Expert knowledge continues to gain recognition as a valuable source of information in a wide range of research applications. Despite recent advances in defining expert knowledge, comparatively little attention has been given to how to view expertise as a system of interacting contributory factors, and thereby, to quantify an individual’s expertise. 2. We present a systems approach to describing expertise that accounts for many contributing factors and their interrelationships, and allows quantification of an individual’s expertise. A Bayesian network (BN) was chosen for this purpose. For the purpose of illustration, we focused on taxonomic expertise. The model structure was developed in consultation with professional taxonomists. The relative importance of the factors within the network were determined by a second set of senior taxonomists. This second set of experts (i.e. supra-experts) also provided validation of the model structure. Model performance was then assessed by applying the model to hypothetical career states in the discipline of taxonomy. Hypothetical career states were used to incorporate the greatest possible differences in career states and provide an opportunity to test the model against known inputs. 3. The resulting BN model consisted of 18 primary nodes feeding through one to three higher-order nodes before converging on the target node (Taxonomic Expert). There was strong consistency among node weights provided by the supra-experts for some nodes, but not others. The higher order nodes, “Quality of work” and “Total productivity”, had the greatest weights. Sensitivity analysis indicated that although some factors had stronger influence in the outer nodes of the network, there was relatively equal influence of the factors leading directly into the target node. Despite differences in the node weights provided by our supra-experts, there was remarkably good agreement among assessments of our hypothetical experts that accurately reflected differences we had built into them. 4. This systems approach provides a novel way of assessing the overall level of expertise of individuals, accounting for multiple contributory factors, and their interactions. Our approach is adaptable to other situations where it is desirable to understand components of expertise.
Resumo:
The central thesis in the article is that the venture creation process is different for innovative versus imitative ventures. This holds up; the pace of the process differs by type of venture as do, in line with theory-based hypotheses, the effects of certain human capital (HC) and social capital (SC) predictors. Importantly, and somewhat unexpectedly, the theoretically derived models using HC, SC, and certain controls are relatively successful explaining progress in the creation process for the minority of innovative ventures, but achieve very limited success for the imitative majority. This may be due to a rationalistic bias in conventional theorizing and suggests that there is need for considerable theoretical development regarding the important phenomenon of new venture creation processes. Another important result is that the building up of instrumental social capital, which we assess comprehensively and as a time variant construct, is important for making progress with both types of ventures, and increasingly, so as the process progresses. This result corroborates with stronger operationalization and more appropriate analysis method what previously published research has only been able to hint at.
Resumo:
The battered women’s movement in the United States contributed to a sweeping change in the recognition of men’s violence against female intimate partners. Naming the problem and arguing in favour of its identification as a serious problem meriting a collective response were key aspects of this effort. Criminal and civil laws have been written and revised in an effort to answer calls to take such violence seriously. Scholars have devoted significant attention to the consequences of this reframing of violence, especially around the unintended outcomes of the incorporation of domestic violence into criminal justice regimes. Family law, however, has remained largely unexamined by criminologists. This paper calls for criminological attention to family law responses to domestic violence and provides directions for future research.