874 resultados para Proverbial style
Resumo:
A significant number of patients diagnosed with primary brain tumours report unmet information needs. Using concept mapping methodology, this study aimed to identify strategies for improving information provision, and to describe factors that health professionals understood to influence their provision of information to patients with brain tumours and their families. Concept mapping is a mixed methods approach that uses statistical methods to represent participants’ perceived relationships between elements as conceptual maps. These maps, and results of associated data collection and analyses, are used to extract concepts involved in information provision to these patients. Thirty health professionals working across a range of neuro-oncology roles and settings participated in the concept mapping process. Participants rated a care coordinator as the most important strategy for improving brain tumour care, with psychological support as a whole rated as the most important element of care. Five major themes were identified as facilitating information provision: health professionals’ communication skills, style and attitudes; patients’ needs and preferences; perceptions of patients’ need for protection and initiative; rapport and continuity between patients and health professionals; and the nature of the health care system. Overall, health professionals conceptualised information provision as ‘individualised’, dependent on these interconnected personal and environmental factors.
Resumo:
This paper discusses users’ query reformulation behaviour while searching information on the Web. Query reformulations have emerged as an important component of Web search behaviour and human-computer interaction (HCI) because a user’s success of information retrieval (IR) depends on how he or she formulates queries. There are various factors, such as cognitive styles, that influence users’ query reformulation behaviour. Understanding how users with different cognitive styles formulate their queries while performing Web searches can help HCI researchers and information systems (IS) developers to provide assistance to the users. This paper aims to examine the effects of users’ cognitive styles on their query reformation behaviour. To achieve the goal of the study, a user study was conducted in which a total of 3613 search terms and 872 search queries were submitted by 50 users who engaged in 150 scenario-based search tasks. Riding’s (1991) Cognitive Style Analysis (CSA) test was used to assess users’ cognitive style as wholist or analytic, and verbaliser or imager. The study findings show that users’ query reformulation behaviour is affected by their cognitive styles. The results reveal that analytic users tended to prefer Add queries while all other users preferred New queries. A significant difference was found among wholists and analytics in the manner they performed Remove query reformulations. Future HCI researchers and IS developers can utilize the study results to develop interactive and user-cantered search model, and to provide context-based query suggestions for users.
Resumo:
Chapter 9 provides strategies for revising professional writing style typically used in formal reports and proposals.
Resumo:
Chapter 12 explains the structure and style of formal report and proposal documents.
Resumo:
Ghassan Hage asserts the “core element of Australia’s colonial paranoia is a fear of loss of Europeanness or Whiteness and the lifestyle and privileges that are seen to emanate directly from them. This is a combination of the fragility of White European colonial identity in general and the specificity of the Australian situation” (419). This ‘White paranoia’ can be traced through a range of popular cultural formations, including contemporary Australian children’s literature. The Children’s Book Council of Australia (CBCA) awards an annual prize for “outstanding books which have the prime intention of documenting factual material with consideration given to imaginative presentation, interpretation and variation of style” (“Awards”) published in the preceding year. Although not often included in critical debates, non-fictional texts overtly seek to shape young readers’ understandings of their national context and their own location as national subjects. Thus, the books named as winners and honours of this prize from 2001-2010 provide a snapshot of which facts and whose fictions are salient in shaping the Australian nation in the twenty-first century. Using Hage’s concept of Australian colonial paranoia, this paper considers the relationship between ‘factual material’ and ‘imaginative presentation’ in the ongoing revision and renewal of national myths in award-winning Australian non-fiction for children.
Resumo:
The Balanced method was introduced as a class of quasi-implicit methods, based upon the Euler-Maruyama scheme, for solving stiff stochastic differential equations. We extend the Balanced method to introduce a class of stable strong order 1. 0 numerical schemes for solving stochastic ordinary differential equations. We derive convergence results for this class of numerical schemes. We illustrate the asymptotic stability of this class of schemes is illustrated and is compared with contemporary schemes of strong order 1. 0. We present some evidence on parametric selection with respect to minimising the error convergence terms. Furthermore we provide a convergence result for general Balanced style schemes of higher orders.
Resumo:
The benefits of applying tree-based methods to the purpose of modelling financial assets as opposed to linear factor analysis are increasingly being understood by market practitioners. Tree-based models such as CART (classification and regression trees) are particularly well suited to analysing stock market data which is noisy and often contains non-linear relationships and high-order interactions. CART was originally developed in the 1980s by medical researchers disheartened by the stringent assumptions applied by traditional regression analysis (Brieman et al. [1984]). In the intervening years, CART has been successfully applied to many areas of finance such as the classification of financial distress of firms (see Frydman, Altman and Kao [1985]), asset allocation (see Sorensen, Mezrich and Miller [1996]), equity style timing (see Kao and Shumaker [1999]) and stock selection (see Sorensen, Miller and Ooi [2000])...
Resumo:
This book was written to serve two functions. First it is an exploration of what I have called Socratic pedagogy, a collaborative inquiry-based approach to teaching and learning suitable not only to formal educational settings such as the school classroom but to all educational settings. The term is intended to capture a variety of philosophical approaches to classroom practice that could broadly be described Socratic in form. The term ‘philosophy in schools’ is ambiguous and could refer to teaching university style philosophy to high school students or to the teaching of philosophy and logic or critical reasoning in senior years of high school. It is also used to describe the teaching of philosophy in schools generally. In the early and middle phases of schooling the term philosophy for children is often used. But this too is ambiguous as the name was adopted from Matthew Lipman’s Philosophy for Children curriculum that he and his colleagues at the Institute for the Advancement of Philosophy for Children developed. In Britain the term ‘philosophy with children’ is sometimes employed to mark two methods of teaching that have Socratic roots but have distinct differences, namely Philosophy for Children and Socratic Dialogue developed by Leonard Nelson. The use of the term Socratic pedagogy and its companion term Socratic classroom (to refer to the kind of classroom that employs Socratic teaching) avoids the problem of distinguishing between various approaches to philosophical inquiry in the Socratic tradition but also separates it from the ‘study of philosophy’, such as university style philosophy or other approaches which place little or no emphasis on collaborative inquiry based teaching and learning. The second function builds from the first. It is to develop an effective framework for understanding the relationship between what I call the generative, evaluative and connective aspects of communal dialogue, which I think are necessary to the Socratic notion of inquiry. In doing so it is hoped that this book offers some way to show how philosophy as inquiry can contribute to educational theory and practice, while also demonstrating how it can be an effective way to approach teaching and learning. This has meant striking a balance between speaking to philosophers and to teachers and educators together, with the view that both see the virtues of such a project. In the strictest sense this book is not philosophy of education, insofar as its chief focus is not on the analysis of concepts or formulation of definitions specific to education with the aim of formulating directives that guide educational practice. It relinquishes the role of philosopher as ‘spectator’, to one of philosopher ‘immersed in matter’ – in this case philosophical issues in education, specifically those related to philosophical inquiry, pedagogy and classroom practice. Put another way, it is a book about philosophical education.
Resumo:
Subtle is not a word that is normally associated with Sonya Hartnett’s style. Rather, she is known for her stark, bold approach. However, when it comes to the Australian environment, Hartnett is indeed subtle in her approach. Hartnett has set in play a new, almost posthumanist style of writing about the nonhuman. The Australian landscape and environment has always figured prominently in Australian literature for both adults and children but Hartnett has taken this writing in a totally different direction. This article looks at two of Hartnett's novels, Forest and The Midnight Zoo, and examines how Hartnett offers new and exciting avenues of thought regarding the place of humans in that environment.
Resumo:
New types of control devices for videogames have emerged and expanded the demographics of the game playing public, yet little is known about which populations of gamers prefer which style of interaction and why. This paper presents data from a study that seeks to clarify the influence the control interface has on the play experience. Three commercial control devices were categorised using an existing typology, according to how the interface maps physical control inputs with the virtual gameplay actions. The devices were then used in a within-groups experimental design aimed at measuring differences in play experience across 64 participants. Descriptive analysis is undertaken on the performance, play experience and preference results for each device. Potential explanations for these results are discussed, as well as the direction of future work.
Resumo:
Human survival depends on human ingenuity in using resources at hand to sustain human life. The historical record – in wrings and archaeological artefacts – provides evidence of the growth and collapse of political organisations and societies. In the institutions of Western civilisation, some traditions have endured over millennia where the roles of monarchs and public officials have been organised in perpetual succession. These roles were developed as conventions in the British Parliament after 1295 and provided the models of corporate governance in both public and private enterprise that have been continuously refined to the present day. In 2011, the Queensland Parliament legislated to introduce a new and more open system of scrutiny of legislation through a system of portfolio-based parliamentary committees. The committees began to function more actively in July 2012 and have inviting submissions from stakeholders and experts in a structured way to consider the government’s priorities in its legislative programme. The questions now are whether the Surveying and Spatial Sciences can respond expertly to address the terms of reference and meet the timetables of the various parliamentary committees. This paper discusses some of the more important and urgent issues that deserve debate that the profession needs to address in becoming more responsive to matters of public policy.
Resumo:
Organisations are constantly seeking efficiency improvements for their business processes in terms of time and cost. Management accounting enables reporting of detailed cost of operations for decision making purpose, although significant effort is required to gather accurate operational data. Business process management is concerned with systematically documenting, managing, automating, and optimising processes. Process mining gives valuable insight into processes through analysis of events recorded by an IT system in the form of an event log with the focus on efficient utilisation of time and resources, although its primary focus is not on cost implications. In this paper, we propose a framework to support management accounting decisions on cost control by automatically incorporating cost data with historical data from event logs for monitoring, predicting and reporting process-related costs. We also illustrate how accurate, relevant and timely management accounting style cost reports can be produced on demand by extending open-source process mining framework ProM.
Resumo:
The University of Newcastle (UoN) offers various access and support programs for a range of students through the English Language and Foundation Studies Centre and a University orientation for students. At UoN, students are required to engage in a learning experience, meet program outcomes and demonstrate the core attributes of the University at each graduation point. For a University with a strong focus on access is there a missing facet to the access programs where students are required to study within a teaching delivery style which may be vastly different to their previous educational experience? This paper will describe a pedagogical orientation program currently delivered at UoN School of Architecture and Built Environment in 2005 to assist in the transition of students from different cultural and pedagogical backgrounds into “Problem Based Learning” as delivered by this School. Furthermore the paper will analyse how this program has enabled students from diverse backgrounds to understand and successfully embrace the new learning opportunities.
Resumo:
Touch keyboarding as a vocational skill is disappearing at a time when students and educators across alleducational sectors are expected to use a computer keyboard on a regular basis. there is documentation surrounding the embedding of Information and Communication Technology (ICT) within the curricula and yet within the National Training Packages touch keyboarding, previously considered a core component, is now an elective in the Business Services framework. This situation is an odds with current practice overseas where touch keyboarding is a component of primary and secondary curricula. From Rhetoric to Practice explores the current issues and practice in teaching and learning touch keyboarding in primary, secondary and tertiary institutions. Through structured interview participants detailed current practice of teachers and their students. Further, tertiary students participated in a training program aimed at achquiring touch keyboarding as a skill to enhance their studies. The researcher's background experience of fifteen years teaching touch keyboarding and computer literacty to adults and 30 years in Business Services trade provides a strong basis for this project. The teaching experience is enhanced by industry experience in administration, course coordination in technical, community and tertiary institutions and a strong commitment to the efficient usage of a computer by all. The findings of this project identified coursework expectations requiring all students from kindergarten to tertiary to use a computer keyboard on a weekly basis and that neither teaching nor learning tough keyboarding appears in the primary, secondary and tertiary curricula in New South Wales. Further, teachers recognised tough keyboarding as the prefered style over 'hunt and peck' keyboarding while acknowledging the teaching and learning difficulties of time constraints, the need for qualified touch keyboarding teachers and issues arising when retraining students from existing poor habits. In conclusion, this project recommends that computer keyboarding be defined as a writing tool for education, vocation and life, with early instruction set in primary schooling area and embedding touch keyboarding with the secondary, technical and tertiary areas and finally to draw the attention of educational authorities to the Duty Of Care aspects associated with computer keyboarding in the classroom.
Resumo:
Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security.