803 resultados para Codes and repertoires of language
Resumo:
While the need to increase numbers of Indigenous teachers has been highlighted for many years, Aboriginal and Torres Strait Islander teachers are still significantly underrepresented in Australia making up less that 1% of teachers in schools. Nationally, little has changed since the 1980s when Hughes and Wilmot (1992) called for ‘1000 Indigenous teachers by 1990’. This paper reports on an initial literature review of teacher education as related to the preparation of Aboriginal and Torres Strait Islanders. Alongside the scholarly literature, the review to date includes analysis of over twenty policy documents and government reports as well as web-based descriptions of historical and current models of Indigenous teacher education including both mainstream Education programs and cohort-based and community models. While the literature provides examples of successful models of Indigenous teacher education it also illuminates the longstanding and interrelated factors that continue to impact on the success or failure of teacher education for Aboriginal and Torres Strait Islanders
Resumo:
There are no population studies of prevalence or incidence of child maltreatment in Australia. Child protection data gives some understanding but is restricted by system capacity and definitional issues across jurisdictions. Child protection data currently suggests that numbers of reports are increasing yearly, and the child protection system then becomes focussed on investigating all reports and diluting available resources for those children who are most in need of intervention. A public health response across multiple agencies enables responses to child safety across the entire population. All families are targeted at the primary level; examples include ensuring all parents know the dangers of shaking a baby or teaching children to say no if a situation makes them uncomfortable. The secondary level of prevention targets families with a number of risk factors, for example subsidised child care so children aren't left unsupervised after school when both parents have to be at work or home visiting for drug-addicted parents to ensure children are cared for. The tertiary response then becomes the responsibility of the child protection system and is reserved for those children where abuse and neglect are identified. This model requires that child safety is seen in a broader context than just the child protection system, and increasingly health professionals are being identified as an important component in the public health framework. If all injury is viewed as preventable and considered along a continuum of 'accidental' through to 'inflicted', it becomes possible to conceptualise child maltreatment in an injury context. Parental intent may not be to cause harm to the child, but by lack of insight or concern about risk, the potential for injury is high. The mechanisms for unintentional and intentional injury overlap and some suggest that by segregating child abuse (with the possible exception of sexual abuse) from unintentional injury, child abuse is excluded from the broader injury prevention initiative that is gaining momentum in the community. This research uses a public health perspective, specifically that of injury prevention, to consider the problem of child abuse. This study employed a mixed method design that incorporates secondary data analysis, data linkage and structured interviews of different professional groups. Datasets from the Queensland Injury Surveillance Unit (QISU) and The Department of Child Safety (DCS) were evaluated. Coded injury data was grouped according to intent of injury according to those with a code that indicated the ED presentation was due to child abuse, a code indicating that the injury was possibly due to abuse or, in the third group, the intent code indicated that the injury was unintentional and not due to abuse. Primary data collection from ED records was undertaken and information recoded to assess reliability and completeness. Emergency department data (QISU) was linked to Department of Child Safety Data to examine concordance and data quality. Factors influencing the collection and collation of these data were identified through structured interview methodology and analysed using qualitative methods. Secondary analysis of QISU data indicated that codes lacking specific information on the injury event were more likely to also have an intent code indicating abuse than those records where there was specific information on the injury event. Codes for abuse appeared in only 1.2% of the 84,765 records analysed. Unintentional injury was the most commonly coded intent (95.3%). In the group with a definite abuse code assigned at triage, 83% linked to a record with DCS and cases where documentation indicated police involvement were significantly more likely to be associated with a DCS record than those without such documentation. In those coded with an unintentional injury code, 22% linked to a DCS record with cases assigned an urgent triage category more likely to link than those with a triage category for resuscitation and children who presented to regional or remote hospitals more likely to link to a DCS record than those presenting to urban hospitals. Twenty-nine per cent of cases with a code indicating possible abuse linked to a DCS record. In documentation that indicated police involvement in the case, a code for unspecified activity when compared to cases with a code indicating involvement in a sporting activity and children less than 12 months of age compared to those in the 13-17 year old age group were all variables significantly associated with linkage to a DCS record. Only 13% of records contained documentation indicating that child abuse and neglect were considered in the diagnosis of the injury despite almost half of the sample having a code of abuse or possible abuse. Doctors and nurses were confident in their knowledge of the process of reporting child maltreatment but less confident about identifying child abuse and neglect and what should be reported. Many were concerned about implications of reporting, for the child and family and for themselves. A number were concerned about the implications of not reporting, mostly for the wellbeing of the child and a few in terms of their legal obligations as mandatory reporters. The outcomes of this research will help improve the knowledge of barriers to effective surveillance of child abuse in emergency departments. This will, in turn, ensure better identification and reporting practises; more reliable official statistical collections and the potential of flagging high-risk cases to ensure adequate departmental responses have been initiated.
Resumo:
Deterministic computer simulation of physical experiments is now a common technique in science and engineering. Often, physical experiments are too time consuming, expensive or impossible to conduct. Complex computer models or codes, rather than physical experiments lead to the study of computer experiments, which are used to investigate many scientific phenomena. A computer experiment consists of a number of runs of the computer code with different input choices. The Design and Analysis of Computer Experiments is a rapidly growing technique in statistical experimental design. This paper aims to discuss some practical issues when designing a computer simulation and/or experiments for manufacturing systems. A case study approach is reviewed and presented.
Resumo:
Deterministic computer simulations of physical experiments are now common techniques in science and engineering. Often, physical experiments are too time consuming, expensive or impossible to conduct. Complex computer models or codes, rather than physical experiments lead to the study of computer experiments, which are used to investigate many scientific phenomena of this nature. A computer experiment consists of a number of runs of the computer code with different input choices. The Design and Analysis of Computer Experiments is a rapidly growing technique in statistical experimental design. This thesis investigates some practical issues in the design and analysis of computer experiments and attempts to answer some of the questions faced by experimenters using computer experiments. In particular, the question of the number of computer experiments and how they should be augmented is studied and attention is given to when the response is a function over time.
Resumo:
Cold-formed steel members are increasingly used as primary structural elements in the building industries around the world due to the availability of thin and high strength steels and advanced cold-forming technologies. Cold-formed lipped channel beams (LCB) are commonly used as flexural members such as floor joists and bearers. However, their shear capacities are determined based on conservative design rules. Current practice in flooring systems is to include openings in the web element of floor joists or bearers so that building services can be located within them. Shear behaviour of LCBs with web openings is more complicated while their shear strengths are considerably reduced by the presence of web openings. However, limited research has been undertaken on the shear behaviour and strength of LCBs with web openings. Hence a detailed experimental study involving 40 shear tests was undertaken to investigate the shear behaviour and strength of LCBs with web openings. Simply supported test specimens of LCBs with aspect ratios of 1.0 and 1.5 were loaded at midspan until failure. This paper presents the details of this experimental study and the results of their shear capacities and behavioural characteristics. Experimental results showed that the current design rules in cold-formed steel structures design codes are very conservative for the shear design of LCBs with web openings. Improved design equations have been proposed for the shear strength of LCBs with web openings based on the experimental results from this study.
Resumo:
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.
Resumo:
Literacy studies have begun to examine the spatial dimension of literacy practices in a way that foregrounds space, and that considers space as constitutive to human relations and practices. This chapter provides an introduction to spatial literacy research, providing a guide to key theorists, themes, and studies that have shaped historical and new developments in spatial approaches to literacy practice and pedagogy. It begins by reconceptualising socio-spatial approaches to literacy research and defines terms. Intersections with related social theories are examined, with an emphasis on critical approaches and the politics of space. It clarifies the relationship between socio-spatial and socio-cultural paradigms, revisiting the spatial in seminal socio-cultural research. It covers new ground,including networks, flows, and deterritorialisation of literacy practice. The chapter concludes with challenges and recommendations for future language research and educational practice.
Hepatitis C, mental health and equity of access to antiviral therapy : a systematic narrative review
Resumo:
Introduction Access to hepatitis C (hereafter HCV) antiviral therapy has commonly excluded populations with mental health and substance use disorders because they were considered as having contraindications to treatment, particularly due to the neuropsychiatric effects of interferon that can occur in some patients. In this review we examined access to HCV interferon antiviral therapy by populations with mental health and substance use problems to identify the evidence and reasons for exclusion. Methods We searched the following major electronic databases for relevant articles: PsycINFO, Medline, CINAHL, Scopus, Google Scholar. The inclusion criteria comprised studies of adults aged 18 years and older, peer-reviewed articles, date range of (2002--2012) to include articles since the introduction of pegylated interferon with ribarvirin, and English language. The exclusion criteria included articles about HCV populations with medical co-morbidities, such as hepatitis B (hereafter HBV) and human immunodeficiency virus (hereafter HIV), because the clinical treatment, pathways and psychosocial morbidity differ from populations with only HCV. We identified 182 articles, and of these 13 met the eligibility criteria. Using an approach of systematic narrative review we identified major themes in the literature. Results Three main themes were identified including: (1) pre-treatment and preparation for antiviral therapy, (2) adherence and treatment completion, and (3) clinical outcomes. Each of these themes was critically discussed in terms of access by patients with mental health and substance use co-morbidities demonstrating that current research evidence clearly demonstrates that people with HCV, mental health and substance use co-morbidities have similar clinical outcomes to those without these co-morbidities. Conclusions While research evidence is largely supportive of increased access to interferon by people with HCV, mental health and substance use co-morbidities, there is substantial further work required to translate evidence into clinical practice. Further to this, we conclude that a reconsideration of the appropriateness of the tertiary health service model of care for interferon management is required and exploration of the potential for increased HCV care in primary health care settings.
Resumo:
The scientific job market has evolved to a truly globalized market. This is epitomized not only by the English language being the de facto scientific language but also by the increasing share of native language journals that are being offered in multiple languages or have or will fully converted to English (such as, for example, the BISE journal in 2015). Similarly, a plethora of exchange programs exists that allow students and academic staff to visit other institutions and exchange knowledge, ideas, and learning opportunities. While student migration across scientific institutions is an established phenomenon (Gribble, 2008) with ample structures, policies, and schemes such as ERASMUS1 in place, academic staff migration between countries is still a challenge, even if exchange programs exist (Enders, 1998). One reason may be that different career paths, varying teaching loads and different evaluation schemes for what constitutes scientific excellence are notable. This also influences the decision of where to start and continue an academic career. While the university systems themselves have been examined previously (Galliers and Whitley, 2007; Lyytinen et al., 2007) and while there is knowledge about career requirements in different university systems (Dennis et al., 2006; Dean et al., 2011; Loos et al., 2013; Recker, 2013), we still do not know much about individual and contextual decisions of academics that either consider or execute a migration between university systems.
Resumo:
Cold-formed steel members are increasingly used as primary structural elements in buildings due to the availability of thin and high strength steels and advanced cold-forming technologies. Cold-formed lipped channel beams (LCB) are commonly used as flexural members such as floor joists and bearers. Many research studies have been carried out to evaluate the behaviour and design of LCBs subject to pure bending actions. However, limited research has been undertaken on the shear behaviour and strength of LCBs. Hence a numerical study was undertaken to investigate the shear behaviour and strength of LCBs. Finite element models of simply supported LCBs with aspect ratios of 1.0 and 1.5 were considered under a mid-span load. They were then validated by comparing their results with test results and used in a detailed parametric study based on the validated finite element models. Numerical studies were conducted to investigate the shear buckling and post-buckling behaviour of LCBs. Experimental and numerical results showed that the current design rules in cold-formed steel structures design codes are very conservative for the shear design of LCBs. Improved design equations were therefore proposed for the shear strength of LCBs. This paper presents the details of this numerical study of LCBs and the results.
Resumo:
Background This study evaluated the effect of a “move and learn” curriculum on physical activity (PA) in 3- to 5-year-olds attending a half-day preschool program. Methods Classrooms were randomized to receive an 8-week move and learn program or complete their usual curriculum. In intervention classes, opportunities for PA were integrated into all aspects of the preschool curriculum, including math, science, language arts, and nutrition education. Changes in PA were measured objectively using accelerometry and direct observation. Results At the completion of the 8-week intervention, children completing the move and learn curriculum exhibited significantly higher levels of classroom moderate-to-vigorous physical activity (MVPA) than children completing their usual curriculum. Significant differences were also noted for classroom VPA over the final 2 weeks. Conclusion The results suggest that integrating movement experiences into an existing early childhood curriculum is feasible and a potentially effective strategy for promoting PA in preschool children.
Resumo:
The critical role that family plays in Chinese Heritage Language learning has gained increasing attention from psychological, political and sociological scholarship. Guided by Bourdieu’s notion of ‘habitus’, our mixed methods sociological study firstly addresses the need for quantitative evidence on the relationship between family support and Chinese Heritage Language proficiency through a survey of 230 young Chinese Australians; and then explores the dynamics of family support of Chinese Heritage Language learning through multiple interviews with five participants. The interview data demonstrate ongoing intergenerational reproduction of Chinese Heritage Language through various forms of family inculcation. Learners’ transition from resistance to commitment is a focus of the analysis. Extant research struggles to theorise the reasons behind this transition. We offer a Bourdieusian explanation that construes the transition as ‘habitus realisation’. Our study has implications for Chinese Heritage Language researchers, Chinese immigrant parents and Chinese teachers.
Resumo:
Background Parental fever phobia and overuse of antipyretics to control fever is increasing. Little is known about childhood fever management among Arab parents. No scales to measure parents’ fever management practices in Palestine are available. Aims The aims of this study were to translate and examine the psychometric properties of the Arabic version of the Parent Fever Management Scale (PFMS). Methods A standard “forward–backward” procedure was used to translate PFMS into Arabic language. It was then validated on a convenience sample of 402 parents between July and October 2012. Descriptive statistics were used, and instrument reliability was assessed for internal consistency using Cronbach's alpha coefficient. Validity was confirmed using convergent and known group validation. Results Applying the recommended scoring method, the median (interquartile range) score of the PFMS was 26 (23-30). Acceptable internal consistency was found (Cronbach’s alpha = 0.733) and the test–retest reliability value was 0.92 (P < 0.001). The chi-squared (χ2) test showed a significant relationship between PFMS groups and frequent daily administration of antipyretic groups (χ2 = 52.86; P < 0.001). The PFMS sensitivity and specificity were 77.67% and 57.75%, respectively. The positive and negative predictive values were 67.89% and 32.11%, respectively. Conclusions The findings of this validation study indicate that the Arabic version of the PFMS is a reliable and valid measure which can be used as a useful tool for health professionals to identify parents’ fever management practices and thus provide targeted education to reduce the unnecessary burden of care they place on themselves when concerned for a febrile child.
Resumo:
Many educators are currently interested in using computer-mediated communications (CMCs) to support learning and creative practice. In my work I have been looking at how we might create drama through using cyberspaces, working with teachers and students in secondary school contexts. In trying to understand issues that have arisen and ways of working with the data I have found a number of frameworks helpful for analysing the online interactions. These frameworks draw from O'Toole's work on contexts negotiated in the creation of drama and other frameworks drawn from Wertsch, Bakhtin and Vygotsky's work on speech utterances, dialogic processes and internalisation of learning. The contexts and factors which must be negotiated in online communications within learning contexts are quite complex and educators may need to provide parameters and protocols to ensure appropriate languages, genres and utterances are utilised. The paper explores some of the types of languages, genres and utterances that emerged from a co-curricula drama project and issues that arose, including the importance of establishing processes for giving and receiving critical feedback This paper is of relevance to those whose research strategies may involve the use of computer-mediated communications as well as those utilising cyberspaces in educational contexts.