849 resultados para group process
Resumo:
The soda process was the first chemical pulping method and was patented in 1845. Soda pulping led to kraft pulping, which involves the combined use of sodium hydroxide and sodium sulfide. Today, kraft pulping dominates the chemical pulping industry. However, about 10% of the total chemical pulp produced in the world is made using non-wood material, such as bagasse and wheat straw. The soda process is the preferred method of chemical pulping of non-wood materials, because it is considered to be economically viable on a small scale and for bagasse is compatible with sugarcane processing. With recent developments, the soda process can be designed to produce minimal effluent discharge and the fouling of evaporators by silica precipitation. The aim of this work is to produce bagasse fibres suitable for papermaking and allied applications and to produce sulfur-free lignin for use in specialty applications. A preliminary economic analysis of the soda process for producing commodity silica, lignin and pulp for papermaking is presented.
Resumo:
Why Fundamentalism? was an exhibition proposal and critical writing project developed from concept phase through to detailed proposal. It included an edited video document that lay out its core ideas and presented the diverse voices of each collaborator. A number of key themes were engaged around the hot-button (and much misunderstood) concept of Fundamentalism. The proposal included an exhibition layout, developed test imagery, ideas and animations, proposed forms for future works and a process whereby design briefs would lead to subsequent commissions. Two major grant applications were submitted to the Australia Council and Arts Queensland, with the support of State Library of Queensland, the University of Adelaide and numerous others. The project remains at the developed proposal stage awaiting suitable funding----- Critically the show became an active vehicle for drawing and exploring a line of distinction between ideas of ‘what is fundamental’ and ‘fundamentalism’ as it rested in the popular imagination, as well as in political and philosophical debates. It teased out and engaged with a number of key questions that included The Problem of Ungroundedness, A Politics of Finitude, The Post-modern/Pluralist Problem, Silent Fundamentalisms (Voices of Reason and Neo-con Religions), Fundamentalism as a Media Construct, The Pre and Post Cold-war Other, The Pressing Need for Foundations in the West and Islam as Foundationalism (rather than fundamentalism).
Resumo:
Background: Noise is a significant barrier to sleep for acute care hospital patients, and sleep has been shown to be therapeutic for health, healing and recovery. Scheduled quiet time interventions to promote inpatient rest and sleep have been successfully trialled in critical care but not in acute care settings. Objectives: The study aim was to evaluate as cheduled quiet time intervention in an acute care setting. The study measured the effect of a scheduled quiet time on noise levels, inpatients’ rest and sleep behaviour, and wellbeing. The study also examined the impact of the intervention on patients’, visitors’ and health professionals’ satisfaction, and organisational functioning. Design: The study was a multi-centred non-randomised parallel group trial. Settings: The research was conducted in the acute orthopaedic wards of two major urban public hospitals in Brisbane, Australia. Participants: All patientsadmitted to the two wards in the5-month period of the study were invited to participate, withafinalsample of 299 participants recruited. This sample produced an effect size of 0.89 for an increase in the number of patients asleep during the quiet time. Methods: Demographic data were collected to enable comparison between groups. Data for noise level, sleep status, sleepiness and well being were collected using previously validated instruments: a Castle Model 824 digital sound level indicator; a three point sleep status scale; the Epworth Sleepiness Scale; and the SF12 V2 questionnaire. The staff, patient and visitor surveys on the experimental ward were adapted from published instruments. Results: Significant differences were found between the two groups in mean decibel level and numbers of patients awake and asleep. The difference in mean measured noise levels between the two environments corresponded to a ‘perceived’ difference of 2 to 1. There were significant correlations between average decibel level and number of patients awake and asleep in the experimental group, and between average decibel level and number of patients awake in the control group. Overall, patients, visitors and health professionals were satisfied with the quiet time intervention. Conclusions: The findings show that a quiet time intervention on an acute care hospital ward can affect noise level and patient sleep/wake patterns during the intervention period. The overall strongly positive response from surveys suggests that scheduled quiet time would be a positively perceived intervention with therapeutic benefit.
Resumo:
Business process modeling has undoubtedly emerged as a popular and relevant practice in Information Systems. Despite being an actively researched field, anecdotal evidence and experiences suggest that the focus of the research community is not always well aligned with the needs of industry. The main aim of this paper is, accordingly, to explore the current issues and the future challenges in business process modeling, as perceived by three key stakeholder groups (academics, practitioners, and tool vendors). We present the results of a global Delphi study with these three groups of stakeholders, and discuss the findings and their implications for research and practice. Our findings suggest that the critical areas of concern are standardization of modeling approaches, identification of the value proposition of business process modeling, and model-driven process execution. These areas are also expected to persist as business process modeling roadblocks in the future.
Resumo:
People increasingly communicate over multiple channels, such as SMS, email and IM. Choosing the channel for interaction is typically a considered action and shapes the message itself. In order to explore how people make sense of communication mediums and more generally, social group behaviour, we developed a multichannel communication prototype. Preliminary results indicate that multichannel communication was considered very useful in the group context even considering the increased quantity of messages while it was little used for person-to-person interaction.
Resumo:
This paper explores how game authoring tools can teach processes that transform everyday places into engaging learning spaces. It discusses the motivation inherent in playing games and creating games for others, and how this stimulates an iterative process of creation and reflection and evokes a natural desire to engage in learning. The use of MiLK at the Adelaide Botanic Gardens is offered as a case in point. MiLK is an authoring tool that allows students and teachers to create and share SMS games for mobile phones. A group of South Australian high school students used MiLK to play a game, create their own games and play each other’s games during a day at the gardens. This paper details the learning processes involved in these activities and how the students, without prompting, reflected on their learning, conducted peer assessment, and engaged in a two-way discussion with their teacher about new technologies and their implications for learning. The paper concludes with a discussion of the needs and requirements of 21st century learners and how MiLK can support constructivist and connectivist teaching methods that engage learners and will produce an appropriately skilled future workforce.
Resumo:
This paper outlines results from the long-term deployment of a system for mobile group socialization which utilizes a variety of mundane technologies to support cross-media notifications and messaging. We focus here on the results as they pertain to usage of mundane technologies, particularly the use of such technologies within the context of a cross-media system. We introduce “Rhub”, our prototype, which was designed to support coordination, communication and sharing amongst informal social groups. We also describe and discuss the usage of the “console,” a text-based syntax to enable consistent use across text messaging, instant messaging, email and the web. The prototype has been in active use for over 18 months by over 170 participants, who have used it on an everyday basis for their own socializing requirements.
Resumo:
The paper describes the process in whcih a multi-disciplinary group of design students propose a redevelopment of individual and group camping facilities at Springbrook national Park. A romantic and fairyland atmosphere is developed to enhance the natural educational potential of the site and heighten the experience of the transient community, the campers.
Resumo:
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
Internationally, recognition of the role of assessment to inform the learning process has received much attention in recent years. Assessment for learning, not just of learning is being supported by an increasing body of literature providing strategies that teachers and their students can incorporate to support the learning process (Assessment Reform Group, 2002; Broadfoot & Black, 2004; James, 2006). Concurrently there has been an increase internationally in systemic accountability requirements of schools in terms of student results. The convergence of these two movements has resulted in some education systems promoting standards-driven reform involving authentic assessment and a re-examination of the relationship between the teacher and the student in the learning process. In this context standards are intended to be used as the basis for judgements of student achievement; while the results from assessment tasks are meant to both inform the teaching/learning process, and to report and track student progress. In such system, the role and reliability of teacher judgement takes centre stage.