981 resultados para Accessible
Resumo:
Universities often struggle to satisfy students’ need for feedback. This is an area where student satisfaction with courses of study can be low. Yet it is clear that one of the properties of good teaching is giving the highest quality feedback on student work. The term ‘feedback’ though is most commonly associated with summative assessment given by a teacher after work is completed. The student can often be a passive participant in the process. This paper looks at the implementation of a web based interactive scenario completed by students prior to summative assessment. It requires students to participate actively to develop and improve their legal problem solving skills. Traditional delivery of legal education focuses on print and an instructor who conveys the meaning of the written word to students. Today, mixed modes of teaching are often preferred and they can provide enhanced opportunities for feeding forward with greater emphasis on what students do. Web based activities allow for flexible delivery; they are accessible off campus, at a time that suits the student and may be completed by students at their own pace. This paper reports on an online interactive activity which provides valuable formative feedback necessary to allow for successful completion of a final problem solving assignment. It focuses on how the online activity feeds forward and contributes to the development of legal problem solving skills. Introduction to Law is a unit designed and introduced for completion by undergraduate students from faculties other than law but is focused most particularly on students enrolled in the Bachelor of Entertainment Industries degree, a joint initiative of the faculties of Creative Industries, Business and Law at the Queensland University of Technology in Australia. The final (and major) assessment for the unit is an assignment requiring students to explain the legal consequences of particular scenarios. A number of cost effective web based interactive scenarios have been developed to support the unit’s classroom activities. The tool commences with instruction on problem solving method. Students then view the stimulus which is a narrative produced in the form of a music video clip. A series of questions are posed which guide students through the process and they can compare their responses with sample answers provided. The activity clarifies the problem solving method and expectations for the summative assessment and allows students to practise the skill. The paper reports on the approach to teaching and learning taken in the unit including the design process and implementation of the activity. It includes an evaluation of the activity with respect to its effectiveness as a tool to feed forward and reflects on the implications for the teaching of law in higher education.
Resumo:
New Voices, New Visions brings together a collection of papers that engage with the ideas of nation, identity and place. The title New Voices, New Visions harks back to earlier scholarship that endeavoured to explore these issues. It therefore makes links between old and new stories of Australian identity, tracing the continuities, shifts and changes in how Australia is imagined. The collection is deliberately interdisciplinary, gathering work by historians, literary and film scholars, communication and cultural theorists, political scientists and sociologists. This mixed perspectives enables the reader to trace ideas, concepts and theories across a range of disciplines and understand the distinctive ways in which different disciplines engage with ideas of nation, space and Australian identity. The book is written in an engaging and accessible manner, making it an excellent text for undergraduate and postgraduate students in the fields of Australian Studies. It will be especially useful for the growing number of students living outside Australia who engage with Australian literature and culture. The book provides a range of topics that introduces students to key issues and concepts. It also situates these ideas in historical context. New Voices, New Visions engages with key contemporary issues in everyday Australian life: environment and climate change, immigration, consumerism, travel and cities. It explores these various topics by considering case studies, both contemporary and historical. For example the issue of attitudes to Asia are analysed through art; the topic of national symbols through the case of the crocodile; approaches to immigration via a popular reality television programme.
Resumo:
BACKGROUND The work described in this paper has emerged from an ALTC/OLT funded project, Exploring Intercultural Competency in Engineering. The project indentified many facets of culture and intercultural competence that go beyond a culture-as-nationality paradigm. It was clear from this work that resources were needed to help engineering educators introduce students to the complex issues of culture as they relate to engineering practice. A set of learning modules focussing on intercultural competence in engineering practice were developed early on in the project. Through the OLT project, these modules have been expanded into a range of resources covering various aspects of culture in engineering. Supporting the resources, an eBook detailing the ins and outs of intercultural competency has also been developed to assist engineering educators to embed opportunities for students to develop skills in unpacking and managing cross-cultural challenges in engineering practice. PURPOSE This paper describes the key principles behind the development of the learning modules, the areas they cover and the eBook developed to support the modules. The paper is intended as an introduction to the approaches and resources and extends an invitation to the community to draw from, and contribute to this initial work. DESIGN/METHOD A key aim of this project was to go beyond the culture-as-nationality approach adopted in much of the work around intercultural competency (Deardorff, 2011). The eBook explores different dimensions of culture such as workplace culture, culture’s influence on engineering design, and culture in the classroom. The authors describe how these connect to industry practice and explore what they mean for engineering education. The packaged learning modules described here have been developed as a matrix of approaches moving from familiar known methods through complicated activities relying to some extent on expert knowledge. Some modules draw on the concept of ‘complex un-order’ as described in the ‘Cynefin domains’ proposed by Kurtz and Snowden (2003). RESULTS Several of the modules included in the eBook have already been trialled at a variety of institutions. Feedback from staff has been reassuringly positive so far. Further trials are planned for second semester 2012, and version 1 of the eBook and learning modules, Engineering Across Cultures, is due to be released in late October 2012. CONCLUSIONS The Engineering Across Cultures eBook and learning modules provide a useful and ready to employ resource to help educators tackle the complex issue of intercultural competency in engineering education. The book is by no means exhaustive, and nor are the modules, they instead provide an accessible, engineering specific guide to bringing cultural issues into the engineering classroom.
Resumo:
This article examines the philosophy and practice of open-source technology in the development of the jam2jam XO software for the One Laptop Per Child (OLPC) computer. It explores how open-source software principles, pragmatist philosophy, improvisation and constructionist epistemologies are operationalized in the design and development of music software, and how such reflection reveals both the strengths and weaknesses of the open-source software development paradigm. An overview of the jam2jam XO platform, its development processes and music educational uses is provided and resulting reflections on the strengths and weaknesses of open-source development for music education are discussed. From an educational and software development perspective, the act of creating open-source software is shown to be a valuable enterprise, however, just because the source code, creative content and experience design are accessible and 'open' to be changed, does not guarantee that educational practices in the use of that software will change. Research around the development and use of jam2jam XO suggests that open-source software development principles can have an impact beyond software development and on to aspects of experience design and learning relationships.
Resumo:
Ghrelin is a multifunctional hormone, with roles in stimulating appetite and regulating energy balance, insulin secretion and glucose homeostasis. The ghrelin gene locus (GHRL) is highly complex and gives rise to a range of novel transcripts derived from alternative first exons and internally spliced exons. The wild-type transcript encodes a 117 amino acid preprohormone that is processed to yield the 28 amino acid peptide ghrelin. Here, we identified insulin-responsive transcription corresponding to cryptic exons in intron 2 of the human ghrelin gene. A transcript, termed in2c-ghrelin (intron 2-cryptic), was cloned from the testis and the LNCaP prostate cancer cell line. This transcript may encode an 83 AA preproghrelin isoform that codes for the ghrelin, but not obestatin. It is expressed in a limited number of normal tissues and in tumours of the prostate, testis, breast and ovary. Finally, we confirmed that in2c-ghrelin transcript expression, as well as the recently described in1-ghrelin transcript, is significantly upregulated by insulin in cultured prostate cancer cells. Metabolic syndrome and hyperinsulinaemia has been associated with prostate cancer risk and progression. This may be particularly significant after androgen deprivation therapy for prostate cancer, which induces hyperinsulinaemia, and this could contribute to castrate resistant prostate cancer growth. We have previously demonstrated that ghrelin stimulates prostate cancer cell line proliferation in vitro. This study is the first description of insulin regulation of a ghrelin transcript in cancer, and should provide further impetus for studies into the expression, regulation and function of ghrelin gene products.
Resumo:
The fourth edition of Contract Law provides a comprehensive review of the principles of contract law. Complex topics are explained in a clear and accessible style that and illustrated by succinct cases. This text is also available with a casebook which gives students access to an expanded selection of primary and secondary materials.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Digital Stories are short autobiographical documentaries, often illustrated with personal photographs and narrated in the first person, and typically produced in group workshops. As a media form they offer ‘ordinary people’ the opportunity to represent themselves to audiences of their choosing; and this amplification of hitherto unheard voices has significant repercussions for their social participation. Many of the storytellers involved in the ‘Rainbow Family Tree’ case study that is the subject of this paper can be characterised as ‘everyday’ activists for their common desire to use their personal stories to increase social acceptance of marginalised identity categories. However, in conflict with their willingness to share their personal stories, many fear the risks and ramifications of distributing them in public spaces (especially online) to audiences both intimate and unknown. Additionally, while technologies for production and distribution of rich media products have become more accessible and user-friendly, many obstacles remain. For many people there are difficulties with technological access and aptitude, personal agency, cultural capital, and social isolation, not to mention availability of the time and energy requisite to Digital Storytelling. Additionally, workshop context, facilitation and distribution processes all influence the content of stories. This paper explores the many factors that make ‘authentic’ self-representation far from straight forward. I use qualitative data drawn from interviews, Digital Story texts and ethnographic observation of GLBTQIS participants in a Digital Storytelling initiative that combined face-to-face and online modes of participation. I consider mediating influences in practice and theory and draw on strategies put forth in cultural anthropology and narrative therapy to propose some practical tools for nuanced and sensitive facilitation of Digital Storytelling workshops and webspaces. Finally, I consider the implications of these facilitation strategies for voice, identity and social participation.
Resumo:
Creative writing has become a highly professionalised academic discipline, with popular courses and prestigious degree programmes worldwide. This book is a must for all students and teachers of creative writing, indeed for anyone who aspires to be a published writer. It engages with a complex art in an accessible manner, addressing concepts important to the rapidly growing field of creative writing, while maintaining a strong craft emphasis, analysing exemplary models of writing and providing related writing exercises. Written by professional writers and teachers of writing, the chapters deal with specific genres or forms – ranging from the novel to new media – or with significant topics that explore the cutting edge state of creative writing internationally (including creative writing and science, contemporary publishing and new workshop approaches).
Resumo:
Studies of Heritage Language learners‟ commitment and their ethnic identity are increasing, yet there is scant sociological research addressing topics relating to Chinese Heritage Language learners. Drawing on Bourdieu‟s signature notions of „habitus‟, „capital‟, and „field‟, this mixed methods study investigates two problems: (1) impacts of “Chineseness” and accessible resources on Chinese Heritage Language proficiency of young Chinese Australian adults in urban Australia; and (2) the meanings of Chinese Heritage Language to these young people.
Resumo:
This paper presents an efficient face detection method suitable for real-time surveillance applications. Improved efficiency is achieved by constraining the search window of an AdaBoost face detector to pre-selected regions. Firstly, the proposed method takes a sparse grid of sample pixels from the image to reduce whole image scan time. A fusion of foreground segmentation and skin colour segmentation is then used to select candidate face regions. Finally, a classifier-based face detector is applied only to selected regions to verify the presence of a face (the Viola-Jones detector is used in this paper). The proposed system is evaluated using 640 x 480 pixels test images and compared with other relevant methods. Experimental results show that the proposed method reduces the detection time to 42 ms, where the Viola-Jones detector alone requires 565 ms (on a desktop processor). This improvement makes the face detector suitable for real-time applications. Furthermore, the proposed method requires 50% of the computation time of the best competing method, while reducing the false positive rate by 3.2% and maintaining the same hit rate.
Resumo:
Deploying networked control systems (NCSs) over wireless networks is becoming more and more popular. However, the widely-used transport layer protocols, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), are not designed for real-time applications. Therefore, they may not be suitable for many NCS application scenarios because of their limitations on reliability and/or delay performance, which real-control systems concern. Considering a typical type of NCSs with periodic and sporadic real-time traffic, this paper proposes a highly reliable transport layer protocol featuring a packet loss-sensitive retransmission mechanism and a prioritized transmission mechanism. The packet loss-sensitive retransmission mechanism is designed to improve the reliability of all traffic flows. And the prioritized transmission mechanism offers differentiated services for periodic and sporadic flows. Simulation results show that the proposed protocol has better reliability than UDP and improved delay performance than TCP over wireless networks, particularly when channel errors and congestions occur.
Resumo:
Reliable communications is one of the major concerns in wireless sensor networks (WSNs). Multipath routing is an effective way to improve communication reliability in WSNs. However, most of existing multipath routing protocols for sensor networks are reactive and require dynamic route discovery. If there are many sensor nodes from a source to a destination, the route discovery process will create a long end-to-end transmission delay, which causes difficulties in some time-critical applications. To overcome this difficulty, the efficient route update and maintenance processes are proposed in this paper. It aims to limit the amount of routing overhead with two-tier routing architecture and introduce the combination of piggyback and trigger update to replace the periodic update process, which is the main source of unnecessary routing overhead. Simulations are carried out to demonstrate the effectiveness of the proposed processes in improvement of total amount of routing overhead over existing popular routing protocols.
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.
Resumo:
Allyson Reynolds, for many years now, has been a keen student of nature. Nature’s forms have always been important to her work, but it would be wrong to see Reynolds as simply transcribing directly from the natural world. For this artist, nature and the natural world represents an elusive invitation and so Reynolds doesn’t so much paint from nature, although resemblance and imitation are clearly evident, as work to render visually and emotionally tangible this invitation. And for a viewer this is no small thing as the invitation is to become attuned and connect with nature as it exists in ourselves, that is to see as nature. Reynolds’ is inviting us as viewers to connect and participate with the nature of nature that is evident in ourselves through the act of perceiving. Reynolds’ work can do this because it is a work born of deep evocation. The sensibility from which it emerges or is transacted is poetic, intensely so, but more than that it works to make of viewing an act of poetry, through a celebration of seeing. Reynolds evocation is born of a deep feeling towards and contemplation of the natural world - it is as though the world lives in her and is now a seamless part of her creative vocabulary. In such personal work there is a profoundly felt and revealed sense of the intimate and like true intimacy it revels in both its dark and quiet, as well as its playful and light, aspects. What is special about Reynolds’ visual poetry is that it able to render this intimacy so accessible. It is an accessibility that is available for the viewer who is able to not only look but also surrender to that looking, accepting and working with the flow of thoughts and associations it occasions...