973 resultados para territorial (re)configuration
Resumo:
Risk factors for repeat drink driving, an important road safety issue, are well known, but estimates of Australian recidivism rates by risk factors, apart from a recent NSW study, are not. Driving records of a cohort of Queensland drink drivers matched by age, region, BAC level and prior offence to participants in a drink driving rehabilitation program were used to estimate sex-specific two- and five-year re-offence rates overall and by these factors. Estimates of the proportion of Queensland drink drivers with a prior DD offence in 2004 were used to standardise rates to the Queensland drink driving population. Rates were higher in remote areas, as were rates in males, young drivers, drivers with high BAC levels and in drivers with one and especially with at least two prior DD convictions. Five-year rates for Queensland were estimated as 21.8% in males and 16.4% in females, appreciably higher than in NSW.
Resumo:
Evaluation of the Get REAL programme in an inclusive primary school setting has indicated its effectiveness in promoting pro-social behaviour for children with high functioning Autism. However, two children with co-morbid diagnoses and complex personal circumstances showed less consistent improvements. In order to explain their unique trajectories, not readily derived from quantitative studies, an exploratory case study approach was used to examine contextual influences on patterns of progress. Multiple data sources included coded video footage from the Get REAL programme, school reports on conduct, and parents and classroom teacher reports using the Strengths and Difficulties Questionnaire. While results provide support for the efficacy of the Get REAL programme for the two children, they also highlight the value of co-ordinated strategies and collaborative individualised approaches in more complex cases. This paper outlines the Get REAL intervention and a range of other school and support agency strategies impacting progress.
Resumo:
The making of the modern world has long been fuelled by utopian images that are blind to ecologi- cal reality. Botanical gardens are but one example – who typically portray themselves as miniature, isolated 'edens on earth', whereas they are now in many cases self-evidently also the vital ‘lungs’ of crowded cities, as well as critical habitats for threat- ened biodiversity. In 2010 the 'Remnant Emergency Art lab' set out to question utopian thinking through a creative provocation called the 'Botanical Gardens ‘X-Tension’ - an imagined city-wide, distributed, network of 'ecological gardens' suited to both bat and human needs, in order to ask, what now needs to be better understood, connected and therefore ultimately conserved.
Resumo:
In this paper, we report on how peer scaffolding was used to effect change in tertiary teaching practice and academic disposition in the use of Information and Communication Technology (ICT) in Science teaching and learning. We present a small-scale case study investigating the practice of one of this paper’s authors. It is told through two salient episodes which narratively describe the scaffolding used to support a teaching experiment. This was made possible through the national Teaching Teachers for the Future Project (2011-2012) which aimed to enhance the technological pedagogical capability of pre-service teachers across Australia. The outcome was a demonstrable shift in the academic’s disposition towards the use and benefits of ICT in teaching science and an increase in skills and confidence for both the academic and his students. This study and its outcomes fit within the contemporary push to “re-imagine” the teaching of Science, and more broadly of STEM, in schools.
Resumo:
In this paper, we report on how peer scaffolding was used to effect change in tertiary teaching practice and academic disposition in the use of Information and Communication Technology (ICT) in Science teaching and learning. We present a small-scale case study investigating the practice of one of this paper’s authors. It is told through two salient episodes which narratively describe the scaffolding used to support a teaching experiment. This was made possible through the national Teaching Teachers for the Future Project (2011-2012) which aimed to enhance the technological pedagogical capability of pre-service teachers across Australia. The outcome was a demonstrable shift in the academic’s disposition towards the use and benefits of ICT in teaching science and an increase in skills and confidence for both the academic and his students. This study and its outcomes fit within the contemporary push to “re-imagine” the teaching of Science, and more broadly of STEM, in schools.
Resumo:
Human papillomaviruses (HPVs) cause cervical cancer and some other types of epithelial cancers. HPV types from the phylogenic beta genus (beta-PVs), formerly known as epidermodysplasia verruciformis–associated HPV types, are frequently detected in nonmelanoma skin cancers, especially in squamous cell carcinomas (SCCs). An etiologic relationship with beta-PV infection is suspected...
Resumo:
This creative work is the outcome of preliminary experiments through practice aiming to explore the collaboration of a Dancer/choreographer with an Animator, along with enquiry into the intergeneration of motion capture technologies within the work-flow. The animated visuals derived from the motion capture data is not aimed at just re-targeting of movement from one source to another but looks at describing the thought and emotions of the choreographed dance through visual aesthetics.
Resumo:
Bi-2212 tapes are prepared by a combination of dip-coating and partial melt processing. We investigate the effect of re-melting of those tapes by partial melting followed by slow cooling on the structure and superconducting properties. Microstructural studies of re-melted samples show that they have the same overall composition as partially melted tapes. However, the fractional volumes of the secondary phases differ and the amounts and distribution of the secondary phases have a significant effect on the critical current. Critical current of Bi-2212/Ag tapes strongly depends on the maximum processing temperature. Initial J(c)'s of the tapes, which are partially melted, then slowly solidified at optimum conditions and finally post-annealed in an inert atmosphere, are up to 10.4 x 10(3) A/cm(2). It is found that the maximum processing temperature at initial partial melting has an influence on the optimum re-heat treatment conditions for the tapes. Re-melted tapes processed at optimum conditions recover superconducting properties after post-annealing in an inert atmosphere: the J(c) values of the tapes are about 80-110% of initial J(c)'s of those tapes.
Resumo:
Discourses of public education reform, like that exemplified within the Queensland Government’s future vision document, Queensland State Education-2010 (QSE-2010), position schooling as a panacea to pervasive social instability and a means to achieve a new consensus. However, in unravelling the many conflicting statements that conjoin to form education policy and inform related literature (Ball, 1993), it becomes clear that education reform discourse is polyvalent (Foucault, 1977). Alongside visionary statements that speak of public education as a vehicle for social justice are the (re)visionary or those reflecting neoliberal individualism and a conservative politics. In this paper, it is argued that the latter coagulate to form strategic discursive practices which work to (re)secure dominant relations of power. Further, discussion of the characteristics needed by the “ideal” future citizen of Queensland reflect efforts to ‘tame change through the making of the child’ (Popkewitz, 2004, p.201). The casualties of this (re)vision and the refusal to investigate the pathologies of “traditional” schooling are the children who, for whatever reason, do not conform to the norm of the desired school child as an “ideal” citizen-in-the-making and who become relegated to alternative educational settings.
Resumo:
Many construction industry decision-makers believe there is a lack of off-site manufacture (OSM) adoption for non-residential construction in Australia. Identification of construction business process was considered imperative in order to assist decision-makers to increase OSM utilisation. The premise that domain knowledge can be re-used to provide an intervention point in the construction process led a team of researchers to construct simple base-line process models for the complete construction process, segmented into six phases. Sixteen domain knowledge industry experts were asked to review the construction phase base-line models to answer the question “Where in the process illustrated by this base-line model phase is an OSM task?”. Through an iterative and generative process a number of off-site manufacture intervention points were identified and integrated into the process models. The re-use of industry expert domain knowledge provided suggestions for new ways to do basic tasks thus facilitating changes to current practice. It is expected that implementation of the new processes will lead to systemic industry change and thus a growth in productivity due to increased adoption of OSM.
Resumo:
Modern mobile computing devices are versatile, but bring the burden of constant settings adjustment according to the current conditions of the environment. While until today, this task has to be accomplished by the human user, the variety of sensors usually deployed in such a handset provides enough data for autonomous self-configuration by a learning, adaptive system. However, this data is not fully available at certain points in time, or can contain false values. Handling potentially incomplete sensor data to detect context changes without a semantic layer represents a scientific challenge which we address with our approach. A novel machine learning technique is presented - the Missing-Values-SOM - which solves this problem by predicting setting adjustments based on context information. Our method is centered around a self-organizing map, extending it to provide a means of handling missing values. We demonstrate the performance of our approach on mobile context snapshots, as well as on classical machine learning datasets.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
The main aim of this paper is to describe an adaptive re-planning algorithm based on a RRT and Game Theory to produce an efficient collision free obstacle adaptive Mission Path Planner for Search and Rescue (SAR) missions. This will provide UAV autopilots and flight computers with the capability to autonomously avoid static obstacles and No Fly Zones (NFZs) through dynamic adaptive path replanning. The methods and algorithms produce optimal collision free paths and can be integrated on a decision aid tool and UAV autopilots.
Resumo:
Despite significant research, there is still little agreement over how to define safety culture or of what it is comprised. Due to this lack of agreement, much of the safety culture research has little more than safety management strategies in common. There is, however, a degree of acceptance of the close relationship between safety culture and organisational culture. Organisational culture can be described using traditional views of culture drawn from the anthropology and cultural psychology literature. However, the safety culture literature rarely ventures beyond organisational culture into discussions of these more traditional concepts of culture. There is a need to discuss how these concepts of culture can be applied to safety culture to provide greater understanding of safety culture and additional means by which to approach safety in the workplace. This review explores how three traditional conceptualisations of culture; the normative, anthropological and pragmatist conceptualisations, can and have been be applied to safety culture. Finally the review proposes a synthesised conceptualisation of safety culture which can be used to provide greater depth and practical applicability of safety culture, by increasing our understanding of the interactions between cultural and contextual variables in a given workplace and the effect they have on safety.