957 resultados para explicit formulas
Resumo:
Design researchers have an important role to play when engaged with user-driven design projects in industry. Design researchers can craft ethnographic material to facilitate transfers of user-knowledge to industry, and demonstrate how this material can be used in the design of new products and services. However, ethnographic findings can reveal issues that are in tension with conceptions of the project members from industry. Instead of brushing these tensions aside, we propose provotyping (provocative prototyping) as an approach to constructively build on them as a resource for change. Provotypes are ethnographically rooted, technically working, robust artefacts that deliberately challenge stakeholder conceptions by reifying and exposing tensions that surround a field of organisational interest. The daily and local experience of provotypes aims to stir dialectical processes of reflection on how conceptions currently are, and fuel the front end of a development process by speculating how conceptions could be different. In this article we start by making explicit the relation between provotypes, practices of critical design and organisational sense-making. We then illustrate, through a multi-stakeholder project concerning the field of indoor climate, how provotypes facilitate transfers of user knowledge to industry, and how they contribute to the development of new products and services. We end by framing the role of the design researcher and discuss the politics that are inherent to design provocations.
Resumo:
Objective: The nature of contemporary cancer therapy means that patients are faced with difficult treatment decisions about surgery, chemotherapy and radiotherapy. For some, this process may also involve consideration of therapies that sit outside the biomedical approach to cancer treatment, in our research, traditional Chinese medicine (TCM). Thus, it is important to explore how cancer patients in Taiwan incorporate TCM into their cancer treatment journey. This paper aims to explore of the patterns of combining the use of TCM and Western medicine into cancer treatment journey in Taiwanese people with cancer. Methods: The sampling was purposive and the data collected through in-depth interviews. Data collection occurred over an eleven month. The research was grounded in the premises of symbolic interactionism and adopted the methods of grounded theory. Twenty four participants who were patients receiving cancer treatment were recruited from two health care settings in Taiwan. Results: The study findings suggest that perceptions of health and illness are mediated through ongoing interactions with different forms of therapy. The participants in this study had a clear focus on “process and patterns of using TCM and Western medicine”. Further, ‘different importance in Western medicine and TCM’, ‘taken for granted to use TCM’, ‘each has specialized skills in Western medicine and TCM’ and ‘different symptoms use different approaches (Western medicine or TCM)’ may explicit how the participants in this study see CAM and Western medicine. Conclusions/Implications for practice: The descriptive frame of the study suggests that TCM and Western medicine occupy quite distinct domains in terms of decision making over their use. People used TCM based on interpretations of the present and against a background of an enduring cultural legacy grounded in Chinese philosophical beliefs about health and healthcare. The increasingly popular term of 'integrative medicine' obscures the complex contexts of the patterns of use of both therapeutic modalities. It is this latter point that is worthy of further exploration.
Resumo:
The rapid growth of services available on the Internet and exploited through ever globalizing business networks poses new challenges for service interoperability. New services, from consumer “apps”, enterprise suites, platform and infrastructure resources, are vying for demand with quickly evolving and overlapping capabilities, and shorter cycles of extending service access from user interfaces to software interfaces. Services, drawn from a wider global setting, are subject to greater change and heterogeneity, demanding new requirements for structural and behavioral interface adaptation. In this paper, we analyze service interoperability scenarios in global business networks, and propose new patterns for service interactions, above those proposed over the last 10 years through the development of Web service standards and process choreography languages. By contrast, we reduce assumptions of design-time knowledge required to adapt services, giving way to run-time mismatch resolutions, extend the focus from bilateral to multilateral messaging interactions, and propose declarative ways in which services and interactions take part in long-running conversations via the explicit use of state.
Resumo:
This paper gives a review of recent progress in the design of numerical methods for computing the trajectories (sample paths) of solutions to stochastic differential equations. We give a brief survey of the area focusing on a number of application areas where approximations to strong solutions are important, with a particular focus on computational biology applications, and give the necessary analytical tools for understanding some of the important concepts associated with stochastic processes. We present the stochastic Taylor series expansion as the fundamental mechanism for constructing effective numerical methods, give general results that relate local and global order of convergence and mention the Magnus expansion as a mechanism for designing methods that preserve the underlying structure of the problem. We also present various classes of explicit and implicit methods for strong solutions, based on the underlying structure of the problem. Finally, we discuss implementation issues relating to maintaining the Brownian path, efficient simulation of stochastic integrals and variable-step-size implementations based on various types of control.
Resumo:
In this paper, general order conditions and a global convergence proof are given for stochastic Runge Kutta methods applied to stochastic ordinary differential equations ( SODEs) of Stratonovich type. This work generalizes the ideas of B-series as applied to deterministic ordinary differential equations (ODEs) to the stochastic case and allows a completely general formalism for constructing high order stochastic methods, either explicit or implicit. Some numerical results will be given to illustrate this theory.
Resumo:
In recent years considerable attention has been paid to the numerical solution of stochastic ordinary differential equations (SODEs), as SODEs are often more appropriate than their deterministic counterparts in many modelling situations. However, unlike the deterministic case numerical methods for SODEs are considerably less sophisticated due to the difficulty in representing the (possibly large number of) random variable approximations to the stochastic integrals. Although Burrage and Burrage [High strong order explicit Runge-Kutta methods for stochastic ordinary differential equations, Applied Numerical Mathematics 22 (1996) 81-101] were able to construct strong local order 1.5 stochastic Runge-Kutta methods for certain cases, it is known that all extant stochastic Runge-Kutta methods suffer an order reduction down to strong order 0.5 if there is non-commutativity between the functions associated with the multiple Wiener processes. This order reduction down to that of the Euler-Maruyama method imposes severe difficulties in obtaining meaningful solutions in a reasonable time frame and this paper attempts to circumvent these difficulties by some new techniques. An additional difficulty in solving SODEs arises even in the Linear case since it is not possible to write the solution analytically in terms of matrix exponentials unless there is a commutativity property between the functions associated with the multiple Wiener processes. Thus in this present paper first the work of Magnus [On the exponential solution of differential equations for a linear operator, Communications on Pure and Applied Mathematics 7 (1954) 649-673] (applied to deterministic non-commutative Linear problems) will be applied to non-commutative linear SODEs and methods of strong order 1.5 for arbitrary, linear, non-commutative SODE systems will be constructed - hence giving an accurate approximation to the general linear problem. Secondly, for general nonlinear non-commutative systems with an arbitrary number (d) of Wiener processes it is shown that strong local order I Runge-Kutta methods with d + 1 stages can be constructed by evaluated a set of Lie brackets as well as the standard function evaluations. A method is then constructed which can be efficiently implemented in a parallel environment for this arbitrary number of Wiener processes. Finally some numerical results are presented which illustrate the efficacy of these approaches. (C) 1999 Elsevier Science B.V. All rights reserved.
Resumo:
The fungal genera Ustilago, Sporisorium and Macalpinomyces represent an unresolved complex. Taxa within the complex often possess characters that occur in more than one genus, creating uncertainty for species placement. Previous studies have indicated that the genera cannot be separated by morphology alone. Here we chronologically review the history of the Ustilago-Sporisorium-Macalpinomyces complex, argue for its resolution and suggest methods to accomplish a stable taxonomy. A combined molecular and morphological approach is required to identify synapomorphic characters that underpin a new classification. Ustilago, Sporisorium and Macalpinomyces require explicit re-description and new genera, based on monophyletic groups, are needed to accommodate taxa that no longer fit the emended descriptions. A resolved classification will end the taxonomic confusion that surrounds generic placement of these smut fungi.
Resumo:
In the field of face recognition, Sparse Representation (SR) has received considerable attention during the past few years. Most of the relevant literature focuses on holistic descriptors in closed-set identification applications. The underlying assumption in SR-based methods is that each class in the gallery has sufficient samples and the query lies on the subspace spanned by the gallery of the same class. Unfortunately, such assumption is easily violated in the more challenging face verification scenario, where an algorithm is required to determine if two faces (where one or both have not been seen before) belong to the same person. In this paper, we first discuss why previous attempts with SR might not be applicable to verification problems. We then propose an alternative approach to face verification via SR. Specifically, we propose to use explicit SR encoding on local image patches rather than the entire face. The obtained sparse signals are pooled via averaging to form multiple region descriptors, which are then concatenated to form an overall face descriptor. Due to the deliberate loss spatial relations within each region (caused by averaging), the resulting descriptor is robust to misalignment & various image deformations. Within the proposed framework, we evaluate several SR encoding techniques: l1-minimisation, Sparse Autoencoder Neural Network (SANN), and an implicit probabilistic technique based on Gaussian Mixture Models. Thorough experiments on AR, FERET, exYaleB, BANCA and ChokePoint datasets show that the proposed local SR approach obtains considerably better and more robust performance than several previous state-of-the-art holistic SR methods, in both verification and closed-set identification problems. The experiments also show that l1-minimisation based encoding has a considerably higher computational than the other techniques, but leads to higher recognition rates.
Resumo:
Purpose: Tacit knowledge is perceived as the most strategically important resource of the construction organisation, and the only renewable and sustainable base for its activities and competitiveness. Knowledge management (KM) activities that deal with tacit knowledge are essential in helping an organisation to achieve its long-term organisational objectives. The purpose of this paper is to provide empirical evidence for the stronger strategic role of tacit KM in comparison to explicit KM. Design/methodology/approach: A questionnaire survey was administered in 2005 to a sample of construction contractors operating in Hong Kong to elicit opinions on the internal business environment, intensity of KM activities as executed by targeted organisations, and contribution of these activities to business performance (BP). A total of 149 usable responses were received from 99 organisations representing about 38 per cent of the sampling frame. The statistical analyses helped to map the reported KM activities into two groups that, respectively, deal with tacit and explicit knowledge. The sensitivity to variations of organisational policies and strength of association with BP in relation to the two groups of KM activities were also compared empirically. A total of 15 interviews with the managerial and professional staff of leading contractors was undertaken to provide insightful narratives of KM implementations. Findings: The effective implementation of organisational policies, such as encouraging innovations and strengthening strategic guidance for KM, would facilitate human interactions of tacit KM. Higher intensity of activities in managing tacit knowledge would ultimately help the organisations to achieve economic gain in the long run. Originality/value: The stronger strategic role of tacit KM is empirically investigated and established within the context of construction organisations.
Resumo:
Teachers need professional development to keep current with teaching practices, although costs for extensive professional development can be prohibitive across an education system. Mentoring provides one way for embedding cost-effective professional development. This mixed-method study includes surveying mentor teachers (n = 101) on a five-part Likert scale and interviews with experienced mentors (n = 10) to investigate professional development for mentors as a result of the mentoring process. Quantitative data were analysed through a pedagogical knowledge framework and qualitative data were collated into themes. Survey data showed that although mentoring of pedagogical knowledge was variable, mentoring pedagogical knowledge practices occurs with the majority of mentors, which requires mentors to evaluate and articulate teaching practices. Qualitative data showed that mentoring acted as professional development and led towards enhancing communication skills, developing leadership roles (problem-solving and building capacity) and advancing pedagogical knowledge. Providing professional development to teachers on mentoring can help to build capacity in two ways: quality mentoring of preservice teachers through explicit mentoring practices, and reflecting and deconstructing teaching practices for mentors’ own pedagogical advancements.
Resumo:
Teacher assessment literacy is a phrase that is often used but rarely defined. Yet understanding teacher assessment literacy is important in an international curriculum and assessment reform context that continues to challenge teachers’ assessment practices. In this article situated examples of classroom assessment literacies are analysed using Bernstein’s (Pedagogy, symbolic control and identity: Theory, research and critique, Taylor and Francis, London, 1996; Br J Sociol Educ 20(2):157–173, 1999) theoretical tools of vertical and horizontal discourses, classification and framing. Drawing on a sociocultural view of learning, the authors define teacher assessment literacies as dynamic social practices which are context dependent and which involve teachers in articulating and negotiating classroom and cultural knowledges with one another and with learners, in the initiation, development and practice of assessment to achieve the learning goals of students. This conceptualisation of assessment literacy aims to make explicit some underpinning theoretical constructs of assessment literacy to inform dialogue and decision making for policy and practice to benefit student learning and achievement.
Resumo:
The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis investigates issues of existing approaches to access control in allocating optimal level of access to users and proposes solutions in the form of new access control models. These issues are most evident when uncertainty surrounding users’ access needs, incentive to misuse and accountability are considered, hence the title of the thesis. We first analyse access control in environments where the administrator is unable to identify the users who may need access to resources. To resolve this uncertainty an administrative model with delegation support is proposed. Further, a detailed technical enforcement mechanism is introduced to ensure delegated resources cannot be misused. Then we explicitly consider that users are self-interested and capable of misusing resources if they choose to. We propose a novel game theoretic access control model to reason about and influence the factors that may affect users’ incentive to misuse. Next we study access control in environments where neither users’ access needs can be predicted nor they can be held accountable for misuse. It is shown that by allocating budget to users, a virtual currency through which they can pay for the resources they deem necessary, the need for a precise pre-allocation of permissions can be relaxed. The budget also imposes an upper-bound on users’ ability to misuse. A generalised budget allocation function is proposed and it is shown that given the context information the optimal level of budget for users can always be numerically determined. Finally, Role Based Access Control (RBAC) model is analysed under the explicit assumption of administrators’ uncertainty about self-interested users’ access needs and their incentives to misuse. A novel Budget-oriented Role Based Access Control (B-RBAC) model is proposed. The new model introduces the notion of users’ behaviour into RBAC and provides means to influence users’ incentives. It is shown how RBAC policy can be used to individualise the cost of access to resources and also to determine users’ budget. The implementation overheads of B-RBAC is examined and several low-cost sub-models are proposed.
Resumo:
We develop a fast Poisson preconditioner for the efficient numerical solution of a class of two-sided nonlinear space fractional diffusion equations in one and two dimensions using the method of lines. Using the shifted Gr¨unwald finite difference formulas to approximate the two-sided(i.e. the left and right Riemann-Liouville) fractional derivatives, the resulting semi-discrete nonlinear systems have dense Jacobian matrices owing to the non-local property of fractional derivatives. We employ a modern initial value problem solver utilising backward differentiation formulas and Jacobian-free Newton-Krylov methods to solve these systems. For efficient performance of the Jacobianfree Newton-Krylov method it is essential to apply an effective preconditioner to accelerate the convergence of the linear iterative solver. The key contribution of our work is to generalise the fast Poisson preconditioner, widely used for integer-order diffusion equations, so that it applies to the two-sided space fractional diffusion equation. A number of numerical experiments are presented to demonstrate the effectiveness of the preconditioner and the overall solution strategy.
Resumo:
The disparity that exists between the highest and lowest achievers together with deficit approaches to teaching, learning and assessment raise serious equity issues related to fairness, validity, culture and access, which were analysed in a recent Australian Research Council funded project. This chapter explores the potential that exists for teachers to work with Indigenous Teacher Assistants (ITAs) to secure cultural connectedness in teaching, learning and assessment of Indigenous students. The study was a design experiment, which was conducted in seven Catholic and Independent primary schools in northern Queensland and involved semi-structured focus group interviews with Year 4 and 6 Indigenous students, principals, teachers and Indigenous Teacher Assistants. Classroom observations and document analyses were also conducted. This corpus of data was analysed using a sociocultural theoretical lens. The use of a sociocultural analysis helped to identify cultural influences, Indigenous students’ funds of knowledge and values. The information from this analysis was made explicit to teachers to demonstrate how they could enhance their pedagogic and assessment practices by embracing and extending the cultural spaces for learning and teaching of Indigenous students. The way in which teachers construct their interactions for greater cultural connectedness and enhanced learning would appear to rely on relationship building with Indigenous staff, Indigenous students’ cultural knowledge, and improved understanding of assessment and related equity issues.
Resumo:
The book documents new findings on the contribution of migrant young people to Australia’s urban life. The essays collected traces teenagers within a world of city suburbs and P plates, shopping malls and chat rooms and text messages. Proud of their migrant backgrounds, they are moving away from explicit ethnically defined cultural groups to focus on their place in contemporary Australian society. These young people through their every day activities are redefining what it means to be an Australian The book is edited by widely published cultural researchers Melissa Butcher from the University of Sydney and Mandy Thomas from the Australian National University who together worked on the GENERATE project. It is far too common for our youth to be portrayed as not belonging to our dominant or mainstream culture. In Ingenious, the editors study the kaleidoscope of influences and environments our youth move within - online networks, dance parties and more - to paint a flexible, innovative generation.