992 resultados para OpenOffice. org
Resumo:
The term self-selected (i.e., individual or comfortable walking pace or speed) is commonly used in the literature (Frost, Dowling, Bar-Or, & Dyson, 1997; Jeng, Liao, Lai, & Hou, 1997; Wergel-Kolmert & Wohlfart, 1999; Maltais, Bar-Or, Pienynowski, & Galea, 2003; Browning & Kram, 2005; Browning, Baker, Herron, & Kram, 2006; Hills, Byrne, Wearing, & Armstrong, 2006) and is identified as the most efficient walking speed, with increased efficiency defined by lower oxygen uptake (VO^sub 2^) per unit mechanical work (Hoyt & Taylor, 1981; Taylor, Heglund, & Maloiy, 1982; Hreljac, 1993). [...] assessing individual and group differences in metabolic energy expenditure using oxygen uptake requires individuals to be comfortable with, and able to accommodate to, the equipment.
Resumo:
The purpose of this study was to verify within- and between-day repeatability and variability in children's oxygen uptake (VO^sub 2^), gross economy (GE; VO^sub 2^ divided by speed) and heart rate (HR) during treadmill walking based on self-selected speed (SS). Fourteen children (10.1 ± 1.4 years) undertook three testing sessions over 2 days in which four walking speeds, including SS were tested. Within- and between-day repeatability were assessed using the Bland and Altman method, and coefficients of variability (CV) were determined for each child across exercise bouts and averaged to obtain a mean group CV value for VO^sub 2^, GE, and HR per speed. Repeated measures analysis of variance showed no statistically significant differences in within- or between-day CV for VO^sub 2^, GE, or HR at any speed. Repeatability within- and between-day for VO^sub 2^, GE, and HR for all speeds was verified. These results suggest that submaximal VO^sub 2^ during treadmill walking is stable and reproducible at a range of speeds based on children's SS.
Resumo:
The social tags in web 2.0 are becoming another important information source to profile users' interests and preferences to make personalized recommendations. To solve the problem of low information sharing caused by the free-style vocabulary of tags and the long tails of the distribution of tags and items, this paper proposes an approach to integrate the social tags given by users and the item taxonomy with standard vocabulary and hierarchical structure provided by experts to make personalized recommendations. The experimental results show that the proposed approach can effectively improve the information sharing and recommendation accuracy.
Resumo:
The assessment of intellectual ability is a core competency in psychology. The results of intelligence tests have many potential implications and are used frequently as the basis for decisions about educational placements, eligibility for various services, and admission to specific groups. Given the importance of intelligence test scores, accurate test administration and scoring are essential; yet there is evidence of unacceptably high rates of examiner error. This paper discusses competency and postgraduate training in intelligence testing and presents a training model for postgraduate psychology students. The model aims to achieve high levels of competency in intelligence testing through a structured method of training, practice and feedback that incorporates peer support, self-reflection and multiple methods for evaluating competency.
Resumo:
In what follows, I put forward an argument for an analytical method for social science that operates at the level of genre. I argue that generic convergence, generic hybridity, and generic instability provide us with a powerful perspectives on changes in political, cultural, and economic relationships, most specifically at the level of institutions. Such a perspective can help us identify the transitional elements, relationships, and trajectories that define the place of our current system in history, thereby grounding our understanding of possible futures.1 In historically contextualising our present with this method, my concern is to indicate possibilities for the future. Systemic contradictions indicate possibility spaces within which systemic change must and will emerge. We live in a system currently dominated by many fully-expressed contradictions, and so in the presence of many possible futures. The contradictions of the current age are expressed most overtly in the public genres of power politics. Contemporary public policy—indeed politics in general-is an excellent focus for any investigation of possible futures, precisely because of its future-oriented function. It is overtly hortatory; it is designed ‘to get people to do things’ (Muntigl in press: 147). There is no point in trying to get people to do things in the past. Consequently, policy discourse is inherently oriented towards creating some future state of affairs (Graham in press), along with concomitant ways of being, knowing, representing, and acting (Fairclough 2000).
Resumo:
In this paper, a two-dimensional non-continuous seepage flow with fractional derivatives (2D-NCSF-FD) in uniform media is considered, which has modified the well known Darcy law. Using the relationship between Riemann-Liouville and Grunwald-Letnikov fractional derivatives, two modified alternating direction methods: a modified alternating direction implicit Euler method and a modified Peaceman-Rachford method, are proposed for solving the 2D-NCSF-FD in uniform media. The stability and consistency, thus convergence of the two methods in a bounded domain are discussed. Finally, numerical results are given.
Resumo:
For over a decade, IT expenditure in China and Malaysia has shown a significant increase, as organisations in these countries are increasingly dependent on information systems (IS) for achieving strategic advantages and business benefits. However, there have been numerous reports of dissatisfaction with IS, and in some cases the effectiveness of the information systems have yet to be reviewed. Two exploratory case studies reported in this paper are the first phase of an overall research in validating the IS-Impact model introduced by Gable, Sedera and Chan in two countries: China and Malaysia. This validation research aims to produce a standard measuring model across different contexts. The purpose of this paper is to present preliminary findings from two exploratory case studies, attempt to test the feasibility of the research design and to investigate applicability of the IS-Impact model in Chinese and Malaysian organisations. Twenty-nine respondents from a Chinese private company and seventeen respondents from a state government in Malaysia were involved in these studies. Findings indicated that most of existing IS-Impact measures are applicable in the study contexts, however, there are some new measures informed by the respondents. Feedback from the case studies also suggested necessary modifications to the Mandarin instrument.
Resumo:
The Restrung New Chamber Festival was a practice-led research project which explored the intricacies of musical relationships. Specifically, it investigated the relationships between new music ensembles and pop-oriented bands inspired by the new music genre. The festival, held at the Brisbane Powerhouse (28 February-2 March 2009) comprised 17 diverse groups including the Brodsky Quartet, Topology, Wood, Fourplay and CODA. Restrung used a new and distinctive model which presented new music and syncretic musical genres within an immersive environment. Restrung brought together approaches used in both contemporary classical and popular music festivals, using musical, visual and spatial aspects to engage audiences. Interactivity was encouraged through video and sound installations, workshops and forums. This paper will investigate some of the issues surrounding the conception and design of the Restrung model, within the context of an overview of European new music trends. It includes a discussion of curating such an event in a musically sensitive and effective way, and approaches to identifying new and receptive audiences. As a guide to programming Restrung, I formulated a working definition of new music, further developed by interviews with specialists in Australia and Europe, and this will be outlined below.
Resumo:
Issue addressed: Australia records the highest incidence of skin cancer in the world. In response to this public education campaigns have incorporated messages about reducing sun exposure and avoiding sunburn. This study sought to describe the prevalence of and factors associated with sunburn in Queensland residents. Methods: The Queensland Cancer Risk Study was a population-based, cross-sectional survey of 9,298 respondents conducted via computer-assisted telephone interview during 2004. Sunburn prevalence and its association with sociodemographics and skin cancer risk variables were examined. Results: More than two-thirds (70.4%) of respondents reported at least one episode of sunburn in the past 12 months, and one in ten respondents reported at least one episode of sever sunburn in the past 12 months. Experiences of sunburn on two or more occasions were reported more frequently by males than females (57.6% versus 46.5%, p < 0.001), and by nearly two-thirds (65.8%) of those aged 20-39 years compared to 48.0% of 40-59 year olds, and 26.7% of 60-75 year olds (p < 0.001). Episodes of sunburn were strongly associated with being male (OR=2.20 95%CI 1.84-2.63) and being aged 20 to 39 years compared to 60 to 75 years (OR=9.79, 95%CI=7.66-12.50). Conclusions: Sunburn remains highly prevalent among Queensland residents particularly among men and in the younger age groups. So what? More effective strategies and methods may be required to extend the influence of health promotion campaigns.
Resumo:
Jordan is adopting Enterprise Resource Planning (ERP) systems in both its public and private sectors. Jordan's emerging private sector has historically close ties to the public sector; though a global market orientation requires a shift in its organisational culture. ERPs however embed business processes which do not necessarily fit with traditional cultural practices, and implementation success is not assured. This study looks at the perceptions of both public and private sector ERP implementations in Jordan and assesses these on various measures of success. There were few differences between public and private sectors, but the benefits actually realised in Jordanian ERPs fell short of claims made for the technology in other cultures.
Resumo:
The study addresses known limitations of what may be the most important dependent variable in Information Systems (IS) research; IS-Success or IS-Impact. The study is expected to force a deeper understanding of the broad notions of IS success and impact. The aims of the research are to: (1) enhance the robustness and minimize limitations of the IS-Impact model, and (2) introduce and operationalise a more rigorously validated IS Impact measurement model to Universities, as a reliable model for evaluating different Administrative Systems. In extending and further generalizing the IS-Impact model, the study will address contemporary validation issues.
Resumo:
In response to a range of contextual drivers, the worldwide adoption of ERP Systems in Higher Education Institutions (HEIs) has increased substantially over the past decade. Though the difficulties and high failure rate in implementing ERP systems at university environments have been cited in the literature, research on critical success factors (CSFs) for ERP implementations in this context is rare and fragmented. This paper is part of a larger research effort that aims to contribute to understanding the phenomenon of ERP implementations and evaluations in HEIs in the Australasian region; it identifies, previously reported, critical success factors (CSFs) in relation to ERP system implementations and discusses the importance of these factors.
Resumo:
Traditionally, conceptual modelling of business processes involves the use of visual grammars for the representation of, amongst other things, activities, choices and events. These grammars, while very useful for experts, are difficult to understand by naive stakeholders. Annotations of such process models have been developed to assist in understanding aspects of these grammars via map-based approaches, and further work has looked at forms of 3D conceptual models. However, no one has sought to embed the conceptual models into a fully featured 3D world, using the spatial annotations to explicate the underlying model clearly. In this paper, we present an approach to conceptual process model visualisation that enhances a 3D virtual world with annotations representing process constructs, facilitating insight into the developed model. We then present a prototype implementation of a 3D Virtual BPMN Editor that embeds BPMN process models into a 3D world. We show how this gives extra support for tasks performed by the conceptual modeller, providing better process model communication to stakeholders..
Resumo:
The Australian horror film is a fascinating specimen. While a tradition has antecedents in the silent era of cinema, and at times has produced popular and commercially successful titles, Australian horror films have existed among the shadows of Australian cinema. Within a national cinema funded by public subsidy to foster a sense of national identity, emphasizing ‘quality’ cultural films and refusing to recognize popular movie genres in attempt to differentiate itself from Hollywood, generic and low-culture horror films have been in opposition to these objectives. Consequently, horror movies have been heavily marginalized within public funding environments and mainstream film culture, and either ignored or despised by mainstream critics. The chapter provides a historical introduction to Australian horror cinema before reviewing a selection of recent Aussie horror titles, namely: Wolf Creek, Undead, Black Water, Dying Breed, Lost Things, Prey, Cut, Rogue and Storm Warning.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. AE is potentially more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message and in a separate pass, providing integrity protection by generating a Message Authentication Code (MAC) tag. This paper presents results on the analysis of three AE stream ciphers submitted to the recently completed eSTREAM competition. We classify the ciphers based on the methods the ciphers use to provide authenticated encryption and discuss possible methods for mounting attacks on these ciphers.