925 resultados para UNDERSTANDING MECHANISMS
Resumo:
Recent literature in project management has urged a re-conceptualisation of projects as a value co-creation process. Contrary to the traditional output-focused project methodology, the value creation perspective argues for the importance of creating new knowledge, processes, and systems for suppliers and customers. Stakeholder involvement is important in this new perspective, as the balancing of competing needs of stakeholders in mega projects becomes a major challenge in managing the value co-creation process. In this study we present interview data from three Australian defence mega projects to demonstrate that senior executives have a more complex understanding of project success than traditional iron triangle measures. In these mega defence projects, customers and other stakeholders actively engage in the value creation process, and over time both content and process value are created to increase defence and national capability. Value created and captured during and post projects are the key to true success.
Resumo:
Despite increasingly stringent energy performance regulations for new homes, southeast Queensland has a high and growing penetration of, and reliance on, air conditioners to provide thermal comfort to housing inhabitants. This reliance impacts on electricity infrastructure investment which is the key driving force behind rising electricity prices. This paper reports initial findings of a research project that seeks to better understand three key issues: (i) how families manage their thermal comfort in summer and how well their homes limit overheating; (ii) the extent to which the homes have been constructed according to the building approval documentation; and (iii) the impact that these issues have on urban design, especially in relation to electricity infrastructure in urban developments.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Since the discovery of the first receptor tyrosine kinase (RTK) proteins in the late 1970s and early 1980s, many scientists have explored the functions of these important cell signaling molecules. The finding that these proteins are often deregulated or mutated in diseases such as cancers and diabetes, together with their potential as clinical therapeutic targets, has further highlighted the necessity for understanding the signaling functions of these important proteins. The mechanisms of RTK regulation and function have been recently reviewed by Lemmon & Schlessinger (2010) but in this review we instead focus on the results of several recent studies that show receptor tyrosine kinases can function from subcellular localisations, including in particular the nucleus, in addition to their classical plasma membrane location. Nuclear localisation of receptor tyrosine kinases has been demonstrated to be important for normal cell function but is also believed to contribute to the pathogenesis of several human diseases.
Resumo:
Internationally there has been a move towards standards-referenced assessment with countries such as Australia developing a National Curriculum and Achievement Standards, New Zealand adopting National Standards for literacy and numeracy that involve schools making and reporting judgements about the reading, writing and mathematics achievement of children up to Year 8 (the end of primary school) and in Canada, classroom assessment standards aimed at the improvement of assessment practice of K-12 education are being formulated. Standards-driven reform has major implications for teachers’ work. The consequences of adopting a standards-driven approach to educational change by systems are often under-estimated with the unintended effects not fully understood by either the policy writers, and the public, including parents. It is for these reasons that the contention developed in this article relates to the teacher’s role, which it is argued remains central to policy focused on the improvement of the quality of education and educational standards.
Resumo:
The Bouncing Back Project, which began after the Queensland flood event in January 2011, has organically grown through a number of reiterations as per the diagram above. In the August 2011 it resulted in the physical construction of an Emergency Shelter [designed by GreenLeaf Engineers] in Sydney at the Customs House in Circular Quay and a conference paper publication at the AASA conference. To date this research has progressed without any research grant funding and has resulted in significant media interest. During the construction of the Emergency Shelter we collected a wide range of multimedia data which is being compilled into a documentary focusing on the architecture students’ experience throughout the iterations of Bouncing Back.
Resumo:
Responding to the individual needs of the person affected by cancer is a fundamental tenet of nursing care. The evidence base to enable highly personalized approaches to the way we provide care has grown enormously in recent years. Today, we have a much better understanding of the mechanisms underpinning health needs of people with cancer, as well as the wide range of environmental, sociocultural, psychological, and biological influences on these needs. This growing evidence base enables us to better target and tailor interventions in increasingly sophisticated ways.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
Lankes and Silverstein (2006) introduced the “participatory library” and suggested that the nature and form of the library should be explored. In the last several years, some attempts have been made in order to develop contemporary library models that are often known as Library 2.0. However, little research has been based on empirical data and such models have had a strong focus on technical aspects but less focus on participation. The research presented in this paper fills this gap. A grounded theory approach was adopted for this study. Six librarians were involved in in-depth individual interviews. As a preliminary result, five main factors of the participatory library emerged including technological, human, educational, social-economic, and environmental. Five factors influencing the participation in libraries were also identified: finance, technology, education, awareness, and policy. The study’s findings provide a fresh perspective on contemporary library and create a basis for further studies on this area.
Resumo:
This report presents the top-line findings of the Australian Screen Producer survey conducted in December 2011. The report was prepared by Bergent Research and commissioned by the ARC Centre of Excellence for Creative Industries and Innovation (CCI), Queensland University of Technology, with assistance from the Centre for Screen Business, Australian Film Television and Radio School (AFTRS). The 2011 producer survey was a national study of the demographics, motivations, sentiments and activities of screen producers across four industry segments: Film, Television, Commercial and Digital Media. This survey is the second Australian Screen Producer survey and builds upon research undertaken in the Australian Screen Content Producer Survey conducted in 2009. The 2011 study is referred to in this report as Wave 2 and the 2009 study is referred to as Wave 1.
Resumo:
Research shows that Indigenous Australians suspicion and fear of being ‘locked up’ may influence mental health service avoidance. Given this, the aim of this study was to explore, by qualitative analysis of in depth interviews (N = 3), how three Indigenous people experienced the controversial practice of seclusion Hans-Georg Gadamer’s phenomenology guided analysis of the material, and allowed narrated experiences to be understood within their cultural and historical context. Participants viewed seclusion negatively: police involvement in psychiatric care; perceptions of being punished and powerless; occasions of extreme use of force; and lack of care were prominent themes throughout the interviews. While power imbalances inherent in seclusion are problematic for all mental health clients, the distinguishing factor in the Indigenous clients’ experience is that seclusion is continuous with the discriminatory and degrading treatment by governments, police and health services that many Indigenous people have experienced since colonisation. The participants’ experiences echoed Goffman’s (1961) findings that institutional practices act to degrade and dehumanise clients whose resulting conformity eases the work of nursing staff. While some nurses perceive that seclusion reduces clients’ agitation (Meehan, Bergen & Fjeldsoe, 2004; Wynaden et al., 2001), one must ask at what cost to clients’ dignity, humanity and basic human rights.
Resumo:
Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.
Resumo:
Introduction QC and EQA are integral to good pathology laboratory practice. Medical Laboratory Science students undertake a project exploring internal QC and EQA procedures used in chemical pathology laboratories. Each student represents an individual lab and the class group represents the peer group of labs performing the same assay using the same method. Methods Using a manual BCG assay for serum albumin, normal and abnormal controls are run with a patient sample over 7 weeks. The QC results are assessed each week using calculated z-scores and both 2S & 3S control rules to determine whether a run is ‘in control’. At the end of the 7 weeks a completed LJ chart is assessed using the Westgard Multirules. Students investigate causes of error and the implications for both lab practice and patient care if runs are not ‘in control’. Twice in the 7 weeks two EQA samples (with target values unknown) are assayed alongside the weekly QC and patient samples. Results from each student are collated and form the basis of an EQA program. ALP are provided and students complete a Youden Plot, which is used to analyse the performance of each ‘lab’ and the method to identify bias. Students explore the concept of possible clinical implications of a biased method and address the actions that should be taken if a lab is not in consensus with the peer group. Conclusion This project is a model of ‘real world’ practice in which student demonstrate an understanding of the importance of QC procedures in a pathology laboratory, apply and interpret statistics and QC rules and charts, apply critical thinking and analytical skills to quality performance data to make recommendations for further practice and improve their technical competence and confidence.
Resumo:
The focus of knowledge management (KM) in the construction industry is moving towards capability building for value creation. The study reported by this paper is motivated by recent assertions about the genesis and evolution of knowledge management capability (KMC) in the strategic management field. It attempts to shed light on the governance of learning mechanisms that develop KMC within the context of construction firms. A questionnaire survey was administered to a sample of construction contractors operating in the very dynamic Hong Kong market to elicit opinions on the learning mechanisms and business outcomes of targeted firms. On the basis of a total of 149 usable responses, structural equation modeling (SEM) analysis identified relationships among knowledge-governance mechanisms, knowledge processes, and business performance, thereby supporting the existence of strategic learning loops. The study findings provide evidence from the construction context for capability assertions that knowledge-governance mechanisms and processes form learning mechanisms that carry out strategic learning to create value, effect performance outcomes, and ultimately drive the evolution of KMC. The findings imply that it is feasible for managing construction firms to govern learning mechanisms through managing the capability-based holistic KM system, thereby reconfiguring KMC to match needs in the dynamic market environment over time.