918 resultados para eXtensible Catalog


Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter approaches resilience from an evolutionary psychology (socio-biological) perspective. It argues that the internal constitution and mental toughness of the individual will provide a core protection for life’s inevitable tests in the innumerable micro and macro environments humans find themselves. The many descriptors of the construct of resilience used in various studies are explored. Finally, the difference psychologists can make in the therapy of clients whose resilience is being tested, is examined by means of case examples.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Airports represent the epitome of complex systems with multiple stakeholders, multiple jurisdictions and complex interactions between many actors. The large number of existing models that capture different aspects of the airport are a testament to this. However, these existing models do not consider in a systematic sense modelling requirements nor how stakeholders such as airport operators or airlines would make use of these models. This can detrimentally impact on the verification and validation of models and makes the development of extensible and reusable modelling tools difficult. This paper develops from the Concept of Operations (CONOPS) framework a methodology to help structure the review and development of modelling capabilities and usage scenarios. The method is applied to the review of existing airport terminal passenger models. It is found that existing models can be broadly categorised according to four usage scenarios: capacity planning, operational planning and design, security policy and planning, and airport performance review. The models, the performance metrics that they evaluate and their usage scenarios are discussed. It is found that capacity and operational planning models predominantly focus on performance metrics such as waiting time, service time and congestion whereas performance review models attempt to link those to passenger satisfaction outcomes. Security policy models on the other hand focus on probabilistic risk assessment. However, there is an emerging focus on the need to be able to capture trade-offs between multiple criteria such as security and processing time. Based on the CONOPS framework and literature findings, guidance is provided for the development of future airport terminal models.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The study shows an alternative solution to existing efforts at solving the problem of how to centrally manage and synchronise users’ Multiple Profiles (MP) across multiple discrete social networks. Most social network users hold more than one social network account and utilise them in different ways depending on the digital context (Iannella, 2009a). They may, for example, enjoy friendly chat on Facebook1, professional discussion on LinkedIn2, and health information exchange on PatientsLikeMe3 In this thesis the researcher proposes a framework for the management of a user’s multiple online social network profiles. A demonstrator, called Multiple Profile Manager (MPM), will be showcased to illustrate how effective the framework will be. The MPM will achieve the required profile management and synchronisation using a free, open, decentralized social networking platform (OSW) that was proposed by the Vodafone Group in 2010. The proposed MPM will enable a user to create and manage an integrated profile (IP) and share/synchronise this profile with all their social networks. The necessary protocols to support the prototype are also proposed by the researcher. The MPM protocol specification defines an Extensible Messaging and Presence Protocol (XMPP) extension for sharing vCard and social network accounts information between the MPM Server, MPM Client, and social network sites (SNSs). . Therefore many web users need to manage disparate profiles across many distributed online sources. Maintaining these profiles is cumbersome, time-consuming, inefficient, and may lead to lost opportunity. The writer of this thesis adopted a research approach and a number of use cases for the implementation of the project. The use cases were created to capture the functional requirements of the MPM and to describe the interactions between users and the MPM. In the research a development process was followed in establishing the prototype and related protocols. The use cases were subsequently used to illustrate the prototype via the screenshots taken of the MPM client interfaces. The use cases also played a role in evaluating the outcomes of the research such as the framework, prototype, and the related protocols. An innovative application of this project is in the area of public health informatics. The researcher utilised the prototype to examine how the framework might benefit patients and physicians. The framework can greatly enhance health information management for patients and more importantly offer a more comprehensive personal health overview of patients to physicians. This will give a more complete picture of the patient’s background than is currently available and will prove helpful in providing the right treatment. The MPM prototype and related protocols have a high application value as they can be integrated into the real OSW platform and so serve users in the modern digital world. They also provide online users with a real platform for centrally storing their complete profile data, efficiently managing their personal information, and moreover, synchronising the overall complete profile with each of their discrete profiles stored in their different social network sites.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter’s interest in fiction’s relationship to truth, lies, and secrecy is not so much a matter of how closely fiction resembles or mirrors the world (its mimetic quality), or what we can learn from fiction (its epistemological value). Rather, the concern is both literary and philosophical: a literary concern that takes into account how texts that thematise secrecy work to withhold and to disclose their secrets as part of the process of narrating and sequencing; and a philosophical concern that considers how survival is contingent on secrets and other forms of concealment such as lies, deception, and half-truths. The texts selected for examination are: Secrets (2002), Skim (2008), and Persepolis: The Story of a Childhood (2003). These texts draw attention to the ways in which the lies and secrets of the female protagonists are part of the intricate mechanism of survival, and demonstrate the ways in which fiction relies upon concealment and revelation as forms of truth-telling.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Heat transfer through an attic space into or out of buildings is an important issue for attic-shaped houses in both hot and cold climates. One of the important objectives for design and construction of houses is to provide thermal comfort for occupants. In the present energy-conscious society, it is also a requirement for houses to be energy efficient, i.e. the energy consumption for heating or air-conditioning houses must be minimized. Relevant to these objectives, research into heat transfer in attics has been conducted for about three decades. The transient behaviour of an attic space is directly relevant to our daily life. Certain periods of the day or night may be considered as having a constant ambient temperature (e.g. during 11am - 2pm or 11pm - 2am). However, at other times during the day or night the ambient temperature changes with time (e.g. between 5am - 9am or 5pm - 9pm). Therefore, the analysis of steady state solution is not sufficient to describe the fluid flow and heat transfer in the attic space. The discussion of the transient development of the boundary is required. A theoretical understanding of the transient behaviour of the flow in the enclosure is performed through scaling analysis for sudden and ramp heating conditions. A proper identification of the timescales, the velocity and the thickness relevant to the flow that develops inside the cavity makes it possible to predict theoretically the basic flow features that will survive once the thermal flow in the enclosure reaches a steady state. Those scaling predictions have been verified by a series of numerical simulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Motorcycles are overrepresented in road traffic crashes and particularly vulnerable at signalized intersections. ‘Motorcycle safety at signalized intersections’ provides an in-depth understanding of hazards of motorcycles at signalized intersections and suggests some targeted countermeasures to alleviate the problem. Motorcycle safety has been examined by establishing innovative statistical models with detailed investigation on specific maneuver behavior of motorcycles at intersections. Results indicate that motorcyclists are over exposed at signalized intersections and the excess exposure is one of main contributors to their vulnerability at intersections. The presence of red light cameras at intersections not only lower motorcycle crashes due to reduced red-light running in the conflicting stream but also decrease their exposure and hence crashes due to a more restrained discharge pattern of motorcycles. Targeted countermeasures should include deployment of red-light cameras, improvement in motorcyclist visibility and increased awareness on motorcyclist vulnerability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Navigational collisions are one of the major safety concerns for many seaports. Continuing growth of shipping traffic in number and sizes is likely to result in increased number of traffic movements, which consequently could result higher risk of collisions in these restricted waters. This continually increasing safety concern warrants a comprehensive technique for modeling collision risk in port waters, particularly for modeling the probability of collision events and the associated consequences (i.e., injuries and fatalities). A number of techniques have been utilized for modeling the risk qualitatively, semi-quantitatively and quantitatively. These traditional techniques mostly rely on historical collision data, often in conjunction with expert judgments. However, these techniques are hampered by several shortcomings, such as randomness and rarity of collision occurrence leading to obtaining insufficient number of collision counts for a sound statistical analysis, insufficiency in explaining collision causation, and reactive approach to safety. A promising alternative approach that overcomes these shortcomings is the navigational traffic conflict technique (NTCT), which uses traffic conflicts as an alternative to the collisions for modeling the probability of collision events quantitatively. This article explores the existing techniques for modeling collision risk in port waters. In particular, it identifies the advantages and limitations of the traditional techniques and highlights the potentials of the NTCT in overcoming the limitations. In view of the principles of the NTCT, a structured method for managing collision risk is proposed. This risk management method allows safety analysts to diagnose safety deficiencies in a proactive manner, which consequently has great potential for managing collision risk in a fast, reliable and efficient manner.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Queensland University of Technology (QUT) was one of the first universities in Australia to establish an institutional repository. Launched in November 2003, the repository (QUT ePrints) uses the EPrints open source repository software (from Southampton) and has enjoyed the benefit of an institutional deposit mandate since January 2004. Currently (April 2012), the repository holds over 36,000 records, including 17,909 open access publications with another 2,434 publications embargoed but with mediated access enabled via the ‘Request a copy’ button which is a feature of the EPrints software. At QUT, the repository is managed by the library.QUT ePrints (http://eprints.qut.edu.au) The repository is embedded into a number of other systems at QUT including the staff profile system and the University’s research information system. It has also been integrated into a number of critical processes related to Government reporting and research assessment. Internally, senior research administrators often look to the repository for information to assist with decision-making and planning. While some statistics could be drawn from the advanced search feature and the existing download statistics feature, they were rarely at the level of granularity or aggregation required. Getting the information from the ‘back end’ of the repository was very time-consuming for the Library staff. In 2011, the Library funded a project to enhance the range of statistics which would be available from the public interface of QUT ePrints. The repository team conducted a series of focus groups and individual interviews to identify and prioritise functionality requirements for a new statistics ‘dashboard’. The participants included a mix research administrators, early career researchers and senior researchers. The repository team identified a number of business criteria (eg extensible, support available, skills required etc) and then gave each a weighting. After considering all the known options available, five software packages (IRStats, ePrintsStats, AWStats, BIRT and Google Urchin/Analytics) were thoroughly evaluated against a list of 69 criteria to determine which would be most suitable. The evaluation revealed that IRStats was the best fit for our requirements. It was deemed capable of meeting 21 out of the 31 high priority criteria. Consequently, IRStats was implemented as the basis for QUT ePrints’ new statistics dashboards which were launched in Open Access Week, October 2011. Statistics dashboards are now available at four levels; whole-of-repository level, organisational unit level, individual author level and individual item level. The data available includes, cumulative total deposits, time series deposits, deposits by item type, % fulltexts, % open access, cumulative downloads, time series downloads, downloads by item type, author ranking, paper ranking (by downloads), downloader geographic location, domains, internal v external downloads, citation data (from Scopus and Web of Science), most popular search terms, non-search referring websites. The data is displayed in charts, maps and table format. The new statistics dashboards are a great success. Feedback received from staff and students has been very positive. Individual researchers have said that they have found the information to be very useful when compiling a track record. It is now very easy for senior administrators (including the Deputy Vice Chancellor-Research) to compare the full-text deposit rates (i.e. mandate compliance rates) across organisational units. This has led to increased ‘encouragement’ from Heads of School and Deans in relation to the provision of full-text versions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Child abuse and neglect is prevalent and entails significant costs to children, families and society. Teachers are responsible for significant proportions of official notifications to statutory child protection agencies. Hence, their accurate and appropriate reporting is crucial for well-functioning child protection systems. Approximately one-quarter of Australian teachers indicate never detecting a case of child maltreatment across their careers, while a further 13-15% admit to not reporting suspected cases in some circumstances. The detection and reporting of child abuse and neglect are complex decision-making behaviors, influenced by: the nature of the maltreatment itself; the characteristics of the teacher; the school environment; and the broader legislative and policy environment. In this chapter, the authors provide a background to teachers’ involvement in detecting and reporting child abuse and neglect, and an overview of the role of teachers is provided. Results are presented from three Australian studies that examine the unique contributions of: case; teacher; and contextual characteristics to detection and reporting behaviors. The authors conclude by highlighting the key implications for enhancing teacher training in child abuse and neglect, and outline future research directions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book involves a comprehensive study of the learning environment by adopting Grounded Theory methodology in a qualitative comparative way.It explores the limitations and benefits of a face-to-face and a virtual design studio as experienced by architecture students and educators at an Australian university in order to find the optimal combination for a blended environment to enhance the students’ experience. The main outcome:holistic multidimensional blended learning model,that through the various modalities,provides adaptive capacity in a range of settings.The model facilitates learning through self-determination,self-management,and the personalisation of the learning environment. Another outcome:a conceptual design education framework,provides a basic tool for educators to evaluate existing learning environments and to develop new learning environments with enough flexibility to respond effectively to a highly dynamic and increasingly technological world.The provision of a practical framework to assist design schools to improve their educational settings according to a suitable pedagogy that meets today’s needs and accommodates tomorrow’s changes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The author aims at developing a better understanding of unstructured strategic decision making processes and the conditions for achieving successful decision outcomes. Specifically he investigates the processes used to make CRE (Corporate Real Estate) decisions. To reveal the fundamental differences between CRE decision-making in practice and the prescriptive ‘best practice’ advocated in the CRE literature, a study of seven leading Italian management consulting firms is undertaken addressing the aspects of content and process of decisions. This research makes its primary contribution by identifying the importance and difficulty of finding the right balance between problem complexity, process richness and cohesion to ensure a decision-making process that is sufficiently rich and yet quick enough to deliver a prompt outcome. While doing so, the study also provides more empirical evidence to some of the most established theories of decision-making, while reinterpreting their mono-dimensional arguments in a multi-dimensional model of successful decision-making.