978 resultados para State-Derivative Feedback
Resumo:
Many industrialised nations have changing demographic profiles, as increased longevity and decreased birth rates lead to an ageing population. This presents significant challenges for workforces, as older employees retire and there are insufficient numbers of younger employees to take their place. This leads to skills shortages, and strong competition for those who are available. This paper considers these issues in the context of Queensland, the third largest state of Australia. The Queensland Government is addressing the issues for all industries in the state, primarily through a Skills Plan and an Experience Pays Awareness Strategy. As the largest employer in the state, the Queensland Government has commenced implementing the Experience Pays Awareness Strategy within its own workforce. The approach touches on many facets of HRM. The HRM policy framework and tools are examined for their potential to support increased participation of older employees. A range of issues are addressed for older workers, including their competence and health and safety issues. Issues for managers include addressing myths and subtle discrimination against older workers, as well as managing cross-generational workforce. Other strategies and methods are targeted at cultural factors, such as the expectations of older workers, and the myths and discrimination against older workers. Yet other strategies are aimed at organisational issues such retention of knowledge and succession planning.
Resumo:
This paper proposes a new prognosis model based on the technique for health state estimation of machines for accurate assessment of the remnant life. For the evaluation of health stages of machines, the Support Vector Machine (SVM) classifier was employed to obtain the probability of each health state. Two case studies involving bearing failures were used to validate the proposed model. Simulated bearing failure data and experimental data from an accelerated bearing test rig were used to train and test the model. The result obtained is very encouraging and shows that the proposed prognostic model produces promising results and has the potential to be used as an estimation tool for machine remnant life prediction.
Resumo:
Over 3000 cases of child sexual abuse are identified every year in Australia, but the real incidence is higher still. As a strategy to identify child sexual abuse, Australian States and Territories have enacted legislation requiring members of selected professions, including teachers, to report suspected cases. In addition, policy-based reporting obligations have been developed by professions, including the teaching profession. These legislative and industry-based developments have occurred in a context of growing awareness of the incidence and consequences of child sexual abuse. Teachers have frequent contact and close relationships with children, and possess expertise in monitoring changes in children’s behaviour. Accordingly, teachers are seen as being well-placed to detect and report suspected child sexual abuse. To date, however, there has been little empirical research into the operation of these reporting duties. The extent of teachers’ awareness of their duties to report child sexual abuse is unknown. Further, there is little evidence about teachers’ past reporting practice. Teachers’ duties to report sexual abuse, especially those in legislation, differ between States, and it is not known whether or how these differences affect reporting practice. This article presents results from the first large-scale Australian survey of teachers in three States with different reporting laws: New South Wales, Queensland, and Western Australia. The results indicate levels of teacher knowledge of reporting duties, reveal evidence about past reporting practice, and provide insights into anticipated future reporting practice and legal compliance. The findings have implications for reform of legislation and policy, training of teachers about the reporting of child sexual abuse, and enhancement of child protection.
Resumo:
It has been argued that intentional first year curriculum design has a critical role to play in enhancing first year student engagement, success and retention (Kift, 2008). A fundamental first year curriculum objective should be to assist students to make the successful transition to assessment in higher education. Scott (2006) has identified that ‘relevant, consistent and integrated assessment … [with] prompt and constructive feedback’ are particularly relevant to student retention generally; while Nicol (2007) suggests that ‘lack of clarity regarding expectations in the first year, low levels of teacher feedback and poor motivation’ are key issues in the first year. At the very minimum, if we expect first year students to become independent and self-managing learners, they need to be supported in their early development and acquisition of tertiary assessment literacies (Orrell, 2005). Critical to this attainment is the necessity to alleviate early anxieties around assessment information, instructions, guidance, and performance. This includes, for example: inducting students thoroughly into the academic languages and assessment genres they will encounter as the vehicles for evidencing learning success; and making expectations about the quality of this evidence clear. Most importantly, students should receive regular formative feedback of their work early in their program of study to aid their learning and to provide information to both students and teachers on progress and achievement. Leveraging research conducted under an ALTC Senior Fellowship that has sought to articulate a research-based 'transition pedagogy' (Kift & Nelson, 2005) – a guiding philosophy for intentional first year curriculum design and support that carefully scaffolds and mediates the first year learning experience for contemporary heterogeneous cohorts – this paper will discuss theoretical and practical strategies and examples that should be of assistance in implementing good assessment and feedback practices across a range of disciplines in the first year.
Resumo:
Context The School of Information Technology at QUT has recently undertaken a major restructuring of their Bachelor of Information Technology (BIT) course. Some of the aims of this restructuring include a reduction in first year attrition and to provide an attractive degree course that meets both student and industry expectations. Emphasis has been placed on the first semester in the context of retaining students by introducing a set of four units that complement one another and provide introductory material on technology, programming and related skills, and generic skills that will aid the students throughout their undergraduate course and in their careers. This discussion relates to one of these four fist semester units, namely Building IT Systems. The aim of this unit is to create small Information Technology (IT) systems that use programming or scripting, databases as either standalone applications or web applications. In the prior history of teaching introductory computer programming at QUT, programming has been taught as a stand alone subject and integration of computer applications with other systems such as databases and networks was not undertaken until students had been given a thorough grounding in those topics as well. Feedback has indicated that students do not believe that working with a database requires programming skills. In fact, the teaching of the building blocks of computer applications have been compartmentalized and taught in isolation from each other. The teaching of introductory computer programming has been an industry requirement of IT degree courses as many jobs require at least some knowledge of the topic. Yet, computer programming is not a skill that all students have equal capabilities of learning (Bruce et al., 2004) and this is clearly shown by the volume of publications dedicated to this topic in the literature over a broad period of time (Eckerdal & Berglund, 2005; Mayer, 1981; Winslow, 1996). The teaching of this introductory material has been done pretty much the same way over the past thirty years. During this period of time that introductory computer programming courses have been taught at QUT, a number of different programming languages and programming paradigms have been used and different approaches to teaching and learning have been attempted in an effort to find the golden thread that would allow students to learn this complex topic. Unfortunately, computer programming is not a skill that can be learnt in one semester. Some basics can be learnt but it can take many years to master (Norvig, 2001). Faculty data typically has shown a bimodal distribution of results for students undertaking introductory programming courses with a high proportion of students receiving a high mark and a high proportion of students receiving a low or failing mark. This indicates that there are students who understand and excel with the introductory material while there is another group who struggle to understand the concepts and practices required to be able to translate a specification or problem statement into a computer program that achieves what is being requested. The consequence of a large group of students failing the introductory programming course has been a high level of attrition amongst first year students. This attrition level does not provide good continuity in student numbers in later years of the degree program and the current approach is not seen as sustainable.
Resumo:
A method for determination of lactose in food samples by Osteryoung square wave voltammetry (OSWV) was developed. It was based on the nucleophilic addition reaction between lactose and aqua ammonia. The carbonyl group of lactose can be changed into imido group, and this increases the electrochemical activity in reduction and the sensitivity. The optimal condition for the nucleophilic addition reaction was investigated and it was found that in NH4Cl–NH3 buffer of pH 10.1, the linear range between the peak current and the concentration of lactose was 0.6–8.4 mg L−1, and the detection limits was 0.44 mg L−1. The proposed method was applied to the determination of lactose in food samples and satisfactory results were obtained.
Resumo:
The neXus2 research project has sought to investigate the library and information services (LIS) workforce in Australia, from the institutional or employer perspective. The study builds on the neXus1 study, which collected data from individuals in the LIS workforce in order to present a snapshot of the profession in 2006, highlighting the demographics, educational background and career details of library and information professionals in Australia. To counterbalance this individual perspective, library institutions were invited to participate in a survey to contribute further data as employers. This final report on the neXus2 project compares the findings from the different library sectors, ie academic libraries, TAFE libraries, the National and State libraries, public libraries, special libraries and school libraries.
Resumo:
It is a big challenge to clearly identify the boundary between positive and negative streams. Several attempts have used negative feedback to solve this challenge; however, there are two issues for using negative relevance feedback to improve the effectiveness of information filtering. The first one is how to select constructive negative samples in order to reduce the space of negative documents. The second issue is how to decide noisy extracted features that should be updated based on the selected negative samples. This paper proposes a pattern mining based approach to select some offenders from the negative documents, where an offender can be used to reduce the side effects of noisy features. It also classifies extracted features (i.e., terms) into three categories: positive specific terms, general terms, and negative specific terms. In this way, multiple revising strategies can be used to update extracted features. An iterative learning algorithm is also proposed to implement this approach on RCV1, and substantial experiments show that the proposed approach achieves encouraging performance.
Resumo:
Over the years, people have often held the hypothesis that negative feedback should be very useful for largely improving the performance of information filtering systems; however, we have not obtained very effective models to support this hypothesis. This paper, proposes an effective model that use negative relevance feedback based on a pattern mining approach to improve extracted features. This study focuses on two main issues of using negative relevance feedback: the selection of constructive negative examples to reduce the space of negative examples; and the revision of existing features based on the selected negative examples. The former selects some offender documents, where offender documents are negative documents that are most likely to be classified in the positive group. The later groups the extracted features into three groups: the positive specific category, general category and negative specific category to easily update the weight. An iterative algorithm is also proposed to implement this approach on RCV1 data collections, and substantial experiments show that the proposed approach achieves encouraging performance.
Resumo:
Construction projects can involve a diverse range of stakeholders and the success of the project depends very much on fulfilling their needs and expectations. It is important, therefore, to identify and recognize project stakeholders and develop a rigorous stakeholder management process. However, limited research has investigated the impact of stakeholders on construction projects in developing countries. A stakeholder impact analysis (SIA), based on an approach developed by Olander (2007), was adopted to investigate the stakeholders' impact on state-owned civil engineering projects in Vietnam. This involved the analysis of a questionnaire survey of 57 project managers to determine the relative importance of different stakeholders. The results show the client to have the highest level of impact on the projects, followed by project managers and the senior management of state-owned engineering firms. The SIA also provides suggestions to project managers in developing and evaluating the stakeholder management process.
Resumo:
For over a decade, IT expenditure in China and Malaysia has shown a significant increase, as organisations in these countries are increasingly dependent on information systems (IS) for achieving strategic advantages and business benefits. However, there have been numerous reports of dissatisfaction with IS, and in some cases the effectiveness of the information systems have yet to be reviewed. Two exploratory case studies reported in this paper are the first phase of an overall research in validating the IS-Impact model introduced by Gable, Sedera and Chan in two countries: China and Malaysia. This validation research aims to produce a standard measuring model across different contexts. The purpose of this paper is to present preliminary findings from two exploratory case studies, attempt to test the feasibility of the research design and to investigate applicability of the IS-Impact model in Chinese and Malaysian organisations. Twenty-nine respondents from a Chinese private company and seventeen respondents from a state government in Malaysia were involved in these studies. Findings indicated that most of existing IS-Impact measures are applicable in the study contexts, however, there are some new measures informed by the respondents. Feedback from the case studies also suggested necessary modifications to the Mandarin instrument.
Resumo:
The results of a numerical investigation into the errors for least squares estimates of function gradients are presented. The underlying algorithm is obtained by constructing a least squares problem using a truncated Taylor expansion. An error bound associated with this method contains in its numerator terms related to the Taylor series remainder, while its denominator contains the smallest singular value of the least squares matrix. Perhaps for this reason the error bounds are often found to be pessimistic by several orders of magnitude. The circumstance under which these poor estimates arise is elucidated and an empirical correction of the theoretical error bounds is conjectured and investigated numerically. This is followed by an indication of how the conjecture is supported by a rigorous argument.
Resumo:
Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.