958 resultados para other-regarding preferences


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: A key element of graduated driver licensing systems is the level of support provided by parents. In mid-2007 changes were made to Queensland’s graduated driver licensing system, including amendments to the learner licence with one of the more significant changes requiring learners to record 100 hours of supervised driving practice in a logbook. Prior to mid-2007, there was no minimum supervision requirement. Aims: The aim of this study was to document the experiences of the supervisors of Queensland learner drivers after the changes made to the graduated driver licensing system in mid-2007. Methods: The sample of 552 supervisors of learner drivers was recruited using a combination of convenience and snowball sampling techniques. The internet survey was open for completion between July 2009 and May 2010 and took approximately 15 to 20 minutes for participants to complete. Results: For 59.7 per cent of the participants, this was the first time that they had supervised a learner driver. For 63.2 per cent, they classified themselves as the main supervisor for the learner driver. Participants provided an average of 79.62 hours of supervision (sd = 92.38), while other private supervisors provided 34.89 hours of supervision (sd = 41.74) to the same learner and professional driving instructors 18.55 hours of supervision (sd = 27.54). The vast majority of supervisors recorded all or most of the practice that they provided their learner driver in their log book with most supervisors indicating that they believed that the hours recorded in the learner’s logbook were either accurate or very accurate. While many supervisors stated that they did not receive any advice regarding the supervision of learner drivers, some had received advice from others such as friends or through discussions with a professional driving instructor. Discussion and conclusions: While graduated driver licensing systems implicitly encourage the involvement of parents and other private supervisors, these people tend not to be systematically involved. As demonstrated in this study, private supervisors provide a significant amount of supervised practice and seek to record this practice accurately and honestly in the learner’s logbook. However, even though a significant number of participants reported that this was the first time that they had supervised a learner driver, they accessed little support or guidance for their role. This suggests a need to more overtly encourage and support the role of private supervisors for learner drivers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: Increased car dependency amongst Australia's ageing population may result in increased social isolation and other health impacts associated with the cessation of driving. While public transport represents an alternative to car usage, patronage remains low amongst senior cohorts. This study investigates the facilitators and barriers to public transport patronage and the nature of car dependence among older Australians. Method: Data was gathered from a sample of 24 adults (mean = 70.33 years) through a combination of quantitative (remote behavioural observation) and qualitative (interviews) investigation. Results: Findings suggest factors of relative convenience, affordability and health/mobility dictate choices of transport mode. The car is considered more convenient for the majority of suburban trips irrespective of the availability of public transport. Conclusion: Policy attention should focus on providing better education and information regarding driving cessation and addressing aged-specific social aspects of public transport including the accommodation of various health and mobility issues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whether the community is looking for “scapegoats” to blame, or seeking more radical and deeper causes, health care managers are in the firing line whenever there are woes in the health care sector. The public has a right to question whether ethics have much influence on the everyday decision making of health care managers. This thesis explores, through a series of published papers, the influence of ethics and other factors on the decision making of health care managers in Australia. Critical review of over 40 years of research on ethical decision making has revealed a large number of influencing factors, but there is a demonstrable lack of a multidimensional approach that measures the combined influences of these factors on managers. This thesis has developed an instrument, the Managerial Ethical Profile (MEP) scale, based on a multidimensional model combining a large number of influencing factors. The MEP scale measures the range of influences on individual managers, and describes the major tendencies by developing a number of empirical profiles derived from a hierarchical cluster analysis. The instrument was developed and refined through a process of pilot studies on academics and students (n=41) and small-business managers (n=41), and then was administered to the larger sample of health care managers (n=441). Results from this study indicate that Australian health care managers draw on a range of ethical frameworks in their everyday decision making, forming the basis of five MEPs (Knights, Guardian Angels, Duty Followers, Defenders, and Chameleons). Results from the study also indicate that the range of individual, organisational, and external factors that influence decision making can be grouped into three major clusters or functions. Cross referencing these functions and other demographic data to the MEPs provides analytical insight into the characteristics of the MEPs. These five profiles summarise existing strengths and weaknesses in managerial ethical decision making. Therefore identifying these profiles not only can contribute to increasing organisational knowledge and self-awareness, but also has clear implications for the design and implementation of ethics education and training in large scale organisations in the health care industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Humankind has been dealing with all kinds of disasters since the dawn of time. The risk and impact of disasters producing mass casualties worldwide is increasing, due partly to global warming as well as to increased population growth, increased density and the aging population. China, as a country with a large population, vast territory, and complex climatic and geographical conditions, has been plagued by all kinds of disasters. Disaster health management has traditionally been a relatively arcane discipline within public health. However, SARS, Avian Influenza, and earthquakes and floods, along with the need to be better prepared for the Olympic Games in China has brought disasters, their management and their potential for large scale health consequences on populations to the attention of the public, the government and the international community alike. As a result significant improvements were made to the disaster management policy framework, as well as changes to systems and structures to incorporate an improved disaster management focus. This involved the upgrade of the Centres for Disease Control and Prevention (CDC) throughout China to monitor and better control the health consequences particularly of infectious disease outbreaks. However, as can be seen in the Southern China Snow Storm and Wenchuan Earthquake in 2008, there remains a lack of integrated disaster management and efficient medical rescue, which has been costly in terms of economics and health for China. In the context of a very large and complex country, there is a need to better understand whether these changes have resulted in effective management of the health impacts of such incidents. To date, the health consequences of disasters, particularly in China, have not been a major focus of study. The main aim of this study is to analyse and evaluate disaster health management policy in China and in particular, its ability to effectively manage the health consequences of disasters. Flood has been selected for this study as it is a common and significant disaster type in China and throughout the world. This information will then be used to guide conceptual understanding of the health consequences of floods. A secondary aim of the study is to compare disaster health management in China and Australia as these countries differ in their length of experience in having a formalised policy response. The final aim of the study is to determine the extent to which Walt and Gilson’s (1994) model of policy explains how disaster management policy in China was developed and implemented after SARS in 2003 to the present day. This study has utilised a case study methodology. A document analysis and literature search of Chinese and English sources was undertaken to analyse and produce a chronology of disaster health management policy in China. Additionally, three detailed case studies of flood health management in China were undertaken along with three case studies in Australia in order to examine the policy response and any health consequences stemming from the floods. A total of 30 key international disaster health management experts were surveyed to identify fundamental elements and principles of a successful policy framework for disaster health management. Key policy ingredients were identified from the literature, the case-studies and the survey of experts. Walt and Gilson (1994)’s policy model that focuses on the actors, content, context and process of policy was found to be a useful model for analysing disaster health management policy development and implementation in China. This thesis is divided into four parts. Part 1 is a brief overview of the issues and context to set the scene. Part 2 examines the conceptual and operational context including the international literature, government documents and the operational environment for disaster health management in China. Part 3 examines primary sources of information to inform the analysis. This involves two key studies: • A comparative analysis of the management of floods in China and Australia • A survey of international experts in the field of disaster management so as to inform the evaluation of the policy framework in existence in China and the criteria upon which the expression of that policy could be evaluated Part 4 describes the key outcomes of this research which include: • A conceptual framework for describing the health consequences of floods • A conceptual framework for disaster health management • An evaluation of the disaster health management policy and its implementation in China. The research outcomes clearly identified that the most significant improvements are to be derived from improvements in the generic management of disasters, rather than the health aspects alone. Thus, the key findings and recommendations tend to focus on generic issues. The key findings of this research include the following: • The health consequences of floods may be described in terms of time as ‘immediate’, ‘medium term’ and ‘long term’ and also in relation to causation as ‘direct’ and ‘indirect’ consequences of the flood. These two aspects form a matrix which in turn guides management responses. • Disaster health management in China requires a more comprehensive response throughout the cycle of prevention, preparedness, response and recovery but it also requires a more concentrated effort on policy implementation to ensure the translation of the policy framework into effective incident management. • The policy framework in China is largely of international standard with a sound legislative base. In addition the development of the Centres for Disease Control and Prevention has provided the basis for a systematic approach to health consequence management. However, the key weaknesses in the current system include: o The lack of a key central structure to provide the infrastructure with vital support for policy development, implementation and evaluation. o The lack of well-prepared local response teams similar to local government based volunteer groups in Australia. • The system lacks structures to coordinate government action at the local level. The result of this is a poorly coordinated local response and lack of clarity regarding the point at which escalation of the response to higher levels of government is advisable. These result in higher levels of risk and negative health impacts. The key recommendations arising from this study are: 1. Disaster health management policy in China should be enhanced by incorporating disaster management considerations into policy development, and by requiring a disaster management risk analysis and disaster management impact statement for development proposals. 2. China should transform existing organizations to establish a central organisation similar to the Federal Emergency Management Agency (FEMA) in the USA or the Emergency Management Australia (EMA) in Australia. This organization would be responsible for leading nationwide preparedness through planning, standards development, education and incident evaluation and to provide operational support to the national and local government bodies in the event of a major incident. 3. China should review national and local plans to reflect consistency in planning, and to emphasize the advantages of the integrated planning process. 4. Enhance community resilience through community education and the development of a local volunteer organization. China should develop a national strategy which sets direction and standards in regard to education and training, and requires system testing through exercises. Other initiatives may include the development of a local volunteer capability with appropriate training to assist professional response agencies such as police and fire services in a major incident. An existing organisation such as the Communist Party may be an appropriate structure to provide this response in a cost effective manner. 5. Continue development of professional emergency services, particularly ambulance, to ensure an effective infrastructure is in place to support the emergency response in disasters. 6. Funding for disaster health management should be enhanced, not only from government, but also from other sources such as donations and insurance. It is necessary to provide a more transparent mechanism to ensure the funding is disseminated according to the needs of the people affected. 7. Emphasis should be placed on prevention and preparedness, especially on effective disaster warnings. 8. China should develop local disaster health management infrastructure utilising existing resources wherever possible. Strategies for enhancing local infrastructure could include the identification of local resources (including military resources) which could be made available to support disaster responses. It should develop operational procedures to access those resources. Implementation of these recommendations should better position China to reduce the significant health consequences experienced each year from major incidents such as floods and to provide an increased level of confidence to the community about the country’s capacity to manage such events.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Raman spectroscopy complimented with infrared spectroscopy has been used to study the rare earth based mineral decrespignyite (Y,REE)4Cu(CO3)4Cl(OH)5•2(H2O) and compared with the Raman spectra of a series of selected natural halogenated carbonates from different origins including bastnasite, parisite and northupite. The Raman spectrum of decrespignyite displays three bands are at 1056, 1070 and 1088 cm-1 attributed to the CO32- symmetric stretching vibration. The observation of three symmetric stretching vibrations is very unusual. The position of CO32- symmetric stretching vibration varies with mineral composition. Raman bands of decrespignyite show bands at 1391, 1414, 1489 and 1547 cm-1. Raman spectra of bastnasite, parisite and northupite show a single band at 1433, 1420 and 1554 cm-1 assigned to the ν3 (CO3)2- antisymmetric stretching mode. The observation of additional Raman bands for the ν3 modes for some halogenated carbonates is significant in that it shows distortion of the carbonate anion in the mineral structure. Four Raman bands are observed at 791, 815, 837 and 849 cm-1and assigned to the (CO3)2- ν2 bending modes. Raman bands are observed for decrespignyite at 694, 718 and 746 cm-1 and are assigned to the (CO3)2- ν4 bending modes. Raman bands are observed for the carbonate ν4 in phase bending modes at 722 cm-1 for bastnasite, 736 and 684 cm-1 for parisite, 714 cm-1 for northupite. Multiple bands are observed in the OH stretching region for decrespignyite, bastnasite and parisite indicating the presence of water and OH units in the mineral structure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modelling an environmental process involves creating a model structure and parameterising the model with appropriate values to accurately represent the process. Determining accurate parameter values for environmental systems can be challenging. Existing methods for parameter estimation typically make assumptions regarding the form of the Likelihood, and will often ignore any uncertainty around estimated values. This can be problematic, however, particularly in complex problems where Likelihoods may be intractable. In this paper we demonstrate an Approximate Bayesian Computational method for the estimation of parameters of a stochastic CA. We use as an example a CA constructed to simulate a range expansion such as might occur after a biological invasion, making parameter estimates using only count data such as could be gathered from field observations. We demonstrate ABC is a highly useful method for parameter estimation, with accurate estimates of parameters that are important for the management of invasive species such as the intrinsic rate of increase and the point in a landscape where a species has invaded. We also show that the method is capable of estimating the probability of long distance dispersal, a characteristic of biological invasions that is very influential in determining spread rates but has until now proved difficult to estimate accurately.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a comprehensive study to find the most efficient bitrate requirement to deliver mobile video that optimizes bandwidth, while at the same time maintains good user viewing experience. In the study, forty participants were asked to choose the lowest quality video that would still provide for a comfortable and long-term viewing experience, knowing that higher video quality is more expensive and bandwidth intensive. This paper proposes the lowest pleasing bitrates and corresponding encoding parameters for five different content types: cartoon, movie, music, news and sports. It also explores how the lowest pleasing quality is influenced by content type, image resolution, bitrate, and user gender, prior viewing experience, and preference. In addition, it analyzes the trajectory of users’ progression while selecting the lowest pleasing quality. The findings reveal that the lowest bitrate requirement for a pleasing viewing experience is much higher than that of the lowest acceptable quality. Users’ criteria for the lowest pleasing video quality are related to the video’s content features, as well as its usage purpose and the user’s personal preferences. These findings can provide video providers guidance on what quality they should offer to please mobile users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reviews the methods used in cross-cultural studies of menopausal symptoms with the goal of formulating recommendations to facilitate comparisons of menopausal symptoms across cultures. It provides an overview of existing approaches and serves to introduce four separate reviews of vasomotor, psychological, somatic, and sexual symptoms at midlife. Building on an earlier review of cross-cultural studies of menopause covering time periods until 2004, these reviews are based on searches of Medline, PsycINFO, CINAHL and Google Scholar for English-language articles published from 2004 to 2010 using the terms “cross cultural comparison” and “menopause.” Two major criteria were used: a study had to include more than one culture, country, or ethnic group and to have asked about actual menopausal symptom experience. We found considerable variation across studies in age ranges, symptom lists, reference period for symptom recall, variables included in multivariate analyses, and the measurement of factors (e.g., menopausal status and hormonal factors, demographic, anthropometric, mental/physical health, and lifestyle measures) that influence vasomotor, psychological, somatic and sexual symptoms. Based on these reviews, we make recommendations for future research regarding age range, symptom lists, reference/recall periods, and measurement of menopausal status. Recommendations specific to the cross-cultural study of vasomotor, psychological, somatic, and sexual symptoms are found in the four reviews that follow this introduction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Demands for delivering high instantaneous power in a compressed form (pulse shape) have widely increased during recent decades. The flexible shapes with variable pulse specifications offered by pulsed power have made it a practical and effective supply method for an extensive range of applications. In particular, the release of basic subatomic particles (i.e. electron, proton and neutron) in an atom (ionization process) and the synthesizing of molecules to form ions or other molecules are among those reactions that necessitate large amount of instantaneous power. In addition to the decomposition process, there have recently been requests for pulsed power in other areas such as in the combination of molecules (i.e. fusion, material joining), gessoes radiations (i.e. electron beams, laser, and radar), explosions (i.e. concrete recycling), wastewater, exhausted gas, and material surface treatments. These pulses are widely employed in the silent discharge process in all types of materials (including gas, fluid and solid); in some cases, to form the plasma and consequently accelerate the associated process. Due to this fast growing demand for pulsed power in industrial and environmental applications, the exigency of having more efficient and flexible pulse modulators is now receiving greater consideration. Sensitive applications, such as plasma fusion and laser guns also require more precisely produced repetitive pulses with a higher quality. Many research studies are being conducted in different areas that need a flexible pulse modulator to vary pulse features to investigate the influence of these variations on the application. In addition, there is the need to prevent the waste of a considerable amount of energy caused by the arc phenomena that frequently occur after the plasma process. The control over power flow during the supply process is a critical skill that enables the pulse supply to halt the supply process at any stage. Different pulse modulators which utilise different accumulation techniques including Marx Generators (MG), Magnetic Pulse Compressors (MPC), Pulse Forming Networks (PFN) and Multistage Blumlein Lines (MBL) are currently employed to supply a wide range of applications. Gas/Magnetic switching technologies (such as spark gap and hydrogen thyratron) have conventionally been used as switching devices in pulse modulator structures because of their high voltage ratings and considerably low rising times. However, they also suffer from serious drawbacks such as, their low efficiency, reliability and repetition rate, and also their short life span. Being bulky, heavy and expensive are the other disadvantages associated with these devices. Recently developed solid-state switching technology is an appropriate substitution for these switching devices due to the benefits they bring to the pulse supplies. Besides being compact, efficient, reasonable and reliable, and having a long life span, their high frequency switching skill allows repetitive operation of pulsed power supply. The main concerns in using solid-state transistors are the voltage rating and the rising time of available switches that, in some cases, cannot satisfy the application’s requirements. However, there are several power electronics configurations and techniques that make solid-state utilisation feasible for high voltage pulse generation. Therefore, the design and development of novel methods and topologies with higher efficiency and flexibility for pulsed power generators have been considered as the main scope of this research work. This aim is pursued through several innovative proposals that can be classified under the following two principal objectives. • To innovate and develop novel solid-state based topologies for pulsed power generation • To improve available technologies that have the potential to accommodate solid-state technology by revising, reconfiguring and adjusting their structure and control algorithms. The quest to distinguish novel topologies for a proper pulsed power production was begun with a deep and through review of conventional pulse generators and useful power electronics topologies. As a result of this study, it appears that efficiency and flexibility are the most significant demands of plasma applications that have not been met by state-of-the-art methods. Many solid-state based configurations were considered and simulated in order to evaluate their potential to be utilised in the pulsed power area. Parts of this literature review are documented in Chapter 1 of this thesis. Current source topologies demonstrate valuable advantages in supplying the loads with capacitive characteristics such as plasma applications. To investigate the influence of switching transients associated with solid-state devices on rise time of pulses, simulation based studies have been undertaken. A variable current source is considered to pump different current levels to a capacitive load, and it was evident that dissimilar dv/dts are produced at the output. Thereby, transient effects on pulse rising time are denied regarding the evidence acquired from this examination. A detailed report of this study is given in Chapter 6 of this thesis. This study inspired the design of a solid-state based topology that take advantage of both current and voltage sources. A series of switch-resistor-capacitor units at the output splits the produced voltage to lower levels, so it can be shared by the switches. A smart but complicated switching strategy is also designed to discharge the residual energy after each supply cycle. To prevent reverse power flow and to reduce the complexity of the control algorithm in this system, the resistors in common paths of units are substituted with diode rectifiers (switch-diode-capacitor). This modification not only gives the feasibility of stopping the load supply process to the supplier at any stage (and consequently saving energy), but also enables the converter to operate in a two-stroke mode with asymmetrical capacitors. The components’ determination and exchanging energy calculations are accomplished with respect to application specifications and demands. Both topologies were simply modelled and simulation studies have been carried out with the simplified models. Experimental assessments were also executed on implemented hardware and the approaches verified the initial analysis. Reports on details of both converters are thoroughly discussed in Chapters 2 and 3 of the thesis. Conventional MGs have been recently modified to use solid-state transistors (i.e. Insulated gate bipolar transistors) instead of magnetic/gas switching devices. Resistive insulators previously used in their structures are substituted by diode rectifiers to adjust MGs for a proper voltage sharing. However, despite utilizing solid-state technology in MGs configurations, further design and control amendments can still be made to achieve an improved performance with fewer components. Considering a number of charging techniques, resonant phenomenon is adopted in a proposal to charge the capacitors. In addition to charging the capacitors at twice the input voltage, triggering switches at the moment at which the conducted current through switches is zero significantly reduces the switching losses. Another configuration is also introduced in this research for Marx topology based on commutation circuits that use a current source to charge the capacitors. According to this design, diode-capacitor units, each including two Marx stages, are connected in cascade through solid-state devices and aggregate the voltages across the capacitors to produce a high voltage pulse. The polarity of voltage across one capacitor in each unit is reversed in an intermediate mode by connecting the commutation circuit to the capacitor. The insulation of input side from load side is provided in this topology by disconnecting the load from the current source during the supply process. Furthermore, the number of required fast switching devices in both designs is reduced to half of the number used in a conventional MG; they are replaced with slower switches (such as Thyristors) that need simpler driving modules. In addition, the contributing switches in discharging paths are decreased to half; this decrease leads to a reduction in conduction losses. Associated models are simulated, and hardware tests are performed to verify the validity of proposed topologies. Chapters 4, 5 and 7 of the thesis present all relevant analysis and approaches according to these topologies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smart metering presents opportunities for business model creation. However the viability of many potential business models in a smart metering scenario may be dictated by privacy regulation and data sharing arrangements. An understanding by businesses of customers’ preferences for the visualisation of their electricity consumption and the degree to which they are willing to share it, is valuable. We present results from two interviews exploring data visualisation and willingness to share personal electricity consumption information. Participants displayed a high willingness to share and a preference for access to additional information when visualising their electricity consumption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is widespread argument that traditional organisations and industries with a predominantly older workforce who are not using computers as an integral part of their work, are unlikely to embrace the opportunities afforded by e-learning. However, the challenge remains to engage a younger generation of learners who seem comfortable learning with technology, whilst not alienating those older learners who may prefer to learn in more traditional ways. This paper analyses data from five case organisations within the Australian rail industry to identify how the potential of e-learning can be realised whilst acknowledging the technological divide between younger and older workers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is a big challenge to guarantee the quality of discovered relevance features in text documents for describing user preferences because of the large number of terms, patterns, and noise. Most existing popular text mining and classification methods have adopted term-based approaches. However, they have all suffered from the problems of polysemy and synonymy. Over the years, people have often held the hypothesis that pattern-based methods should perform better than term- based ones in describing user preferences, but many experiments do not support this hypothesis. This research presents a promising method, Relevance Feature Discovery (RFD), for solving this challenging issue. It discovers both positive and negative patterns in text documents as high-level features in order to accurately weight low-level features (terms) based on their specificity and their distributions in the high-level features. The thesis also introduces an adaptive model (called ARFD) to enhance the exibility of using RFD in adaptive environment. ARFD automatically updates the system's knowledge based on a sliding window over new incoming feedback documents. It can efficiently decide which incoming documents can bring in new knowledge into the system. Substantial experiments using the proposed models on Reuters Corpus Volume 1 and TREC topics show that the proposed models significantly outperform both the state-of-the-art term-based methods underpinned by Okapi BM25, Rocchio or Support Vector Machine and other pattern-based methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Virtual environments can provide, through digital games and online social interfaces, extremely exciting forms of interactive entertainment. Because of their capability in displaying and manipulating information in natural and intuitive ways, such environments have found extensive applications in decision support, education and training in the health and science domains amongst others. Currently, the burden of validating both the interactive functionality and visual consistency of a virtual environment content is entirely carried out by developers and play-testers. While considerable research has been conducted in assisting the design of virtual world content and mechanics, to date, only limited contributions have been made regarding the automatic testing of the underpinning graphics software and hardware. The aim of this thesis is to determine whether the correctness of the images generated by a virtual environment can be quantitatively defined, and automatically measured, in order to facilitate the validation of the content. In an attempt to provide an environment-independent definition of visual consistency, a number of classification approaches were developed. First, a novel model-based object description was proposed in order to enable reasoning about the color and geometry change of virtual entities during a play-session. From such an analysis, two view-based connectionist approaches were developed to map from geometry and color spaces to a single, environment-independent, geometric transformation space; we used such a mapping to predict the correct visualization of the scene. Finally, an appearance-based aliasing detector was developed to show how incorrectness too, can be quantified for debugging purposes. Since computer games heavily rely on the use of highly complex and interactive virtual worlds, they provide an excellent test bed against which to develop, calibrate and validate our techniques. Experiments were conducted on a game engine and other virtual worlds prototypes to determine the applicability and effectiveness of our algorithms. The results show that quantifying visual correctness in virtual scenes is a feasible enterprise, and that effective automatic bug detection can be performed through the techniques we have developed. We expect these techniques to find application in large 3D games and virtual world studios that require a scalable solution to testing their virtual world software and digital content.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the final report of an Australian Learning and Teaching Council Teaching Fellowship which addressed the needs of two separate groups of learners: (1) final year law students studying ethics and (2) law academics and other interested educators in higher education wishing to use information and communication technologies (ICT) to create engaging learning environments for their students but lacking the capacity to do so. The Fellowship resulted in final year law students being infused with an improved appreciation of ethical practice than they receive from traditional lecture/tutorial means by the development of an integrated program of blended learning including an online program entitled "Entry into Valhalla". This "ethics capstone‟ utilises multimedia produced using cost effective resources (including the "Second Life" virtual environment) to create engaging, contextualised learning experiences. The Fellowship also constructed the knowledge of producing cost-effective multimedia projects in other law academics and other educators in higher education by staff development activities comprising workshops, conference presentations and an interactive website using the "Entry into Valhalla" program as a case study exemplar.