954 resultados para Critical incident technique


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A simple and effective down-sample algorithm, Peak-Hold-Down-Sample (PHDS) algorithm is developed in this paper to enable a rapid and efficient data transfer in remote condition monitoring applications. The algorithm is particularly useful for high frequency Condition Monitoring (CM) techniques, and for low speed machine applications since the combination of the high sampling frequency and low rotating speed will generally lead to large unwieldy data size. The effectiveness of the algorithm was evaluated and tested on four sets of data in the study. One set of the data was extracted from the condition monitoring signal of a practical industry application. Another set of data was acquired from a low speed machine test rig in the laboratory. The other two sets of data were computer simulated bearing defect signals having either a single or multiple bearing defects. The results disclose that the PHDS algorithm can substantially reduce the size of data while preserving the critical bearing defect information for all the data sets used in this work even when a large down-sample ratio was used (i.e., 500 times down-sampled). In contrast, the down-sample process using existing normal down-sample technique in signal processing eliminates the useful and critical information such as bearing defect frequencies in a signal when the same down-sample ratio was employed. Noise and artificial frequency components were also induced by the normal down-sample technique, thus limits its usefulness for machine condition monitoring applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article traces the lineage of critical literacy from Freire through critical pedagogies and discourse analysis. The author discusses the need for a contingent definition of critical literacy, as a situated and contextual response to political economies, institutional and cultural relations of power.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is a reflection on a design teaching project that endeavours to establish a culture of critical design thinking in a tertiary game design course. In the first instance, the ‘performing design’ project arose as a response to contemporary issues and tensions in the Australian games industry and game design education, in essence, the problem of how to scaffold undergraduate students from their entry point as ‘players’ (the impressed) into becoming designers. The performing design project therefore started as a small-scale intervention to inspire reflection in a wider debate that includes: the potential evolution of the contemporary games industry; the purpose of game design education; and the positioning of game design as a design discipline. Our position is that designing interactive playful works or games is victim of a tendency to simplify the discipline and view it from either the perspective of science or art. In this paper we look at some of the historical discussions on the distinct identity of games. Then we present an overview of the typical state of play in contemporary game design education which inspires the performing design project as an intervention or teaching technique. This leads us to question understandings of education and training and creativity and innovation. Finally we reflect on insights arising from the performing design project which lead us to support Archer’s call for a ‘third area’ that balances the monolithic practices of the two major academic disciplines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

GLBTI (gay, lesbian, bisexual, transgender, intersex) police liaison programs have been an important part of policing these communities for a number of decades now. In fact, this model appears to dominate approaches as the preferred way to manage relationships between GLBTI communities and police. Interestingly, while this model dominates, research on the effectiveness of this model, and the services that align with it, is limited. To date, only few studies have asked critical questions about the effectiveness of GLBTI police liaison services. For instance, we know that over 70% of GLBTI communities are aware of police liaison services, but only 4% of those victimised access them (Berman & Robinson, 2010). This paper critically examines existing literature about GLBTI police liaison services to demonstrate key themes and omissions. It argues that police liaison services as a preferred model has been taken for granted as the correct way of engaging with GLBTI communities in ways that may exclude other forms of engagement, and suggests that further research into these liaison programs is necessary if the relationships between GLBTI communities and the police are to be strengthened.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Invited book review of Carolyn Carpan, 2009, Sisters, Schoolgirls and Sleuths : Girls' Series Books in America, MD: Scarecrow Press

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigated critical beliefs to target in interventions aimed at improving sun-protective behaviours of Australian adults, a population at risk for skin cancer. Participants (N = 816) completed a Theory of Planned Behaviour belief-based questionnaire and a 1-week follow-up of sun-protective behaviour. A range of behavioural, normative and control beliefs correlated with sun-protective behaviour, with no and only minimal differences observed in correlations between beliefs and behaviour by gender and age, respectively. A range of key beliefs made independent contributions to behaviour; however, the behavioural belief about being less likely to tan (β = 0.09); normative belief about friends (β = 0.20); and control beliefs about forgetfulness (β = −0.14), inconvenience (β = −0.17), knowing I will be in the sun for a long time (β = 0.16) and more fashionable sun-protective clothing (β = 0.13) were significant critical beliefs guiding people’s sun-protective behaviour. Our study fills a gap in the literature by investigating an at-risk population for skin cancer and using an established theoretical framework to identify critical beliefs that guide Australian adults’ decisions to sun protect. Attention to these critical beliefs will assist health campaigns and interventions aimed at combating the increasing rates of skin cancer for adults.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key strategy in facilitating learning in Open Disclosure training is the use of hypothetical, interactive scenarios called ‘simulations’. According to Clapper (2010), the ‘advantages of using simulation are numerous and include the ability to help learners make meaning of complex tasks, while also developing critical thinking and cultural skills’. Simulation, in turn, functions largely through improvisation and role-play, in which participants ‘act out’ particular roles and characters according to a given scenario, without recourse to a script. To maximise efficacy in the Open Disclosure training context, role-play requires the specialist skills of professionally trained actors. Core capacities that professional actors bring to the training process include (among others) believability, an observable and teachable skill which underpins the western traditions of actor training; and flexibility, which pertains to the actor’s ability to vary performance strategies according to the changing dynamics of the learning situation. The Patient Safety and Quality Improvement Service of Queensland Health utilises professional actors as a key component of their Open Disclosure Training Program. In engaging actors in this work, it is essential that Facilitators of Open Disclosure training have a solid understanding of the acting process: what acting is; how actors work to a brief; how they improvise; and how they sustainably manage a wide range of emotional states. In the simulation context, the highly skilled actor can optimise learning outcomes by adopting or enacting – in collaboration with the Facilitator - a pedagogical function.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An iterative based strategy is proposed for finding the optimal rating and location of fixed and switched capacitors in distribution networks. The substation Load Tap Changer tap is also set during this procedure. A Modified Discrete Particle Swarm Optimization is employed in the proposed strategy. The objective function is composed of the distribution line loss cost and the capacitors investment cost. The line loss is calculated using estimation of the load duration curve to multiple levels. The constraints are the bus voltage and the feeder current which should be maintained within their standard range. For validation of the proposed method, two case studies are tested. The first case study is the semi-urban 37-bus distribution system which is connected at bus 2 of the Roy Billinton Test System which is located in the secondary side of a 33/11 kV distribution substation. The second case is a 33 kV distribution network based on the modification of the 18-bus IEEE distribution system. The results are compared with prior publications to illustrate the accuracy of the proposed strategy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article critically analyses the role that criminological theory and specific policy formulations of culture play in the New Zealand state’s response to the over-representation of Māori in the criminal justice system. Part one provides an overview of the changing criminological explanations of, and responses to, Māori offending in New Zealand from the 1980s onwards and how these understandings extended colonialist approaches to Māori and crime into the neo-colonial context. In particular, we chart the shift in policy development from theorising Māori offending as attributable to loss of cultural identity to a focus on socio-economic and institutional antecedents and, finally, through the risk factors, assessment, and criminogenic needs approaches that have gained prominence in the current policy context. In part two, the focus moves to the strategies employed by members of the academy to elevate their own epistemological constructions of Māori social reality within the policy development process. In particular, the critique scrutinises recent attempts to portray Indigenous responses to social harm as “unscientific” and, in part, responsible for the continuing over-representation of Māori in New Zealand’s criminal justice system. The purpose of this analysis is to focus the critical, criminological gaze firmly on the activities of policy makers and administrative criminologists, to examine how their policies and approaches impact on Māori as an Indigenous people.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 1991, McNabb introduced the concept of mean action time (MAT) as a finite measure of the time required for a diffusive process to effectively reach steady state. Although this concept was initially adopted by others within the Australian and New Zealand applied mathematics community, it appears to have had little use outside this region until very recently, when in 2010 Berezhkovskii and coworkers rediscovered the concept of MAT in their study of morphogen gradient formation. All previous work in this area has been limited to studying single–species differential equations, such as the linear advection–diffusion–reaction equation. Here we generalise the concept of MAT by showing how the theory can be applied to coupled linear processes. We begin by studying coupled ordinary differential equations and extend our approach to coupled partial differential equations. Our new results have broad applications including the analysis of models describing coupled chemical decay and cell differentiation processes, amongst others.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producing Java source code for the generated design of a given program. This source code can then be compiled and the resulting Java bytecode program can be used by the tool to assess the program's overall security based on our security metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This handbook chapter explores the relationship between critical theory and seminal studies of literacy which investigate inequities in education. It identifies new research questions to explore the connections between literacy and power, but go beyond promises of emancipation.