846 resultados para Schon (1983), calling this ‘knowing-in-action’
Resumo:
Purpose: To investigate the influence of accommodation upon axial length (and a comprehensive range of ocular biometric parameters), in populations of young adult myopic and emmetropic subjects. Methods: Forty young adult subjects had ocular biometry measured utilizing a non-contact optical biometer (Lenstar LS 900) based upon the principle of optical low coherence reflectometry, under three different accommodation demands (0 D, 3 D and 6 D). Subjects were classified as emmetropes (n=19) or myopes (n=21) based upon their spherical equivalent refraction (mean emmetropic refraction -0.05 ± 0.27DS and mean myopic refraction -1.82 ± 0.84 DS). Results: Axial length changed significantly with accommodation, with a mean increase of 11.9 ± 12.3 µm and 24.1 ± 22.7 µm for the 3 D and 6 D accommodation stimuli respectively. A significant axial elongation associated with accommodation was still evident even following correction of the axial length data for potential error due to lens thickness change. The mean ‘corrected’ increase in axial length was 5.2 ± 11.2 µm, and 7.4 ± 18.9 µm for the 3 D and 6 D stimuli respectively. There was no significant difference between the myopic and emmetropic populations in terms of the magnitude of change in axial length with accommodation, regardless of whether the data were corrected or not. A number of other ocular biometric parameters, such as anterior chamber depth, lens thickness and vitreous chamber depth also exhibited significant change with accommodation. The myopic and emmetropic populations also exhibited no significant difference in the magnitude of change in these parameters with accommodation. Conclusions: The eye undergoes a significant axial elongation associated with a brief period of accommodation, and the magnitude of this change in eye length increases for larger accommodation demands, however there is no significant difference in the magnitude of eye elongation in myopic and emmetropic subjects.
Resumo:
This chapter aims to situate values education as a core component of social science pre-service teacher education. In particular, it reflects on an experiment in embedding a values laden Global Education perspective in a fourth year social science curriculum method unit. This unit was designed and taught by the researcher on the assumption that beginning social science teachers need to be empowered with pedagogical skills and new dispositions to deal with value laden emerging global and regional concerns in their secondary school classrooms. Moreover, it was assumed that when pre-service teachers engage in dynamic and interactive learning experiences in their curriculum unit, they commence the process of ‘capacity building’ those skills which prepare them for their own lifelong professional learning. This approach to values education also aimed at providing pre-service teachers with opportunities to ‘create deep understandings of teaching and learning’ (Barnes, 1989, p. 17) by reflecting on the ways in which ‘pedagogy can be transformative’ (Lovat and Toomey, 2011 add page no from Chapter One). It was assumed that this tertiary experience would foster the sine qua non of teaching – a commitment to students and their learning. Central to fostering new ‘dispositions’ through this approach, was the belief in the power of pedagogy to make the difference in enhancing student participation and learning. In this sense, this experiment in values education in secondary social science pre-service teacher education aligns with the Troika metaphor for a paradigm change, articulated by Lovat and Toomey (2009) in Chapter One.
Resumo:
The term “cloud computing” has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the user. The security of the cloud computing environment is a new research area requiring further development by both the academic and industrial research communities. Today, there are many diverse and uncoordinated efforts underway to address security issues in cloud computing and, especially, the identity management issues. This paper introduces an architecture for a new approach to necessary “mutual protection” in the cloud computing environment, based upon a concept of mutual trust and the specification of definable profiles in vector matrix form. The architecture aims to achieve better, more generic and flexible authentication, authorization and control, based on a concept of mutuality, within that cloud computing environment.
Resumo:
The need to better understand and deal with workplace stress has major implications for the construction industry, especially on a project level, because of its potential to directly impact on site productivity and safety, and ultimately, the achievement of project objectives. While there has been some understanding of the effect of workplace stress within the construction industry, the majority of these studies have explored individual determinants of workplace stress among construction professionals such as architects, engineers, quantity surveyors etc. To date, very little research has focused on workplace stress as encountered by construction site operatives. This is an important research deficiency as construction site operatives typically make up a significant percentage of on-site workforce and contribute most directly to project success. To address this imbalance in research, this paper proposes a theoretical framework to better understand site operatives’ experience of stress from a cultural perspective on three levels: individual, project and organizational which has been largely neglected in previous studies.
Resumo:
Organisations face increasing competition from new firms in emerging markets and their past superior products may no longer provide competitive advantage in markets based on different cost and value differentials. A shift in design practices from product solutions to health services which are accessible and affordable by all is required. This paper explores a design led approach to innovation to assist medical device companies develop new services and experiences and reshape their notions of the nature, development and deployment of health care services. This approach uses design tools and methodologies that are grounded in the authentic understandings of stakeholder experiences, to assist an organisation create a vision of likely future health care scenarios. Through this process, organisations can explore the complexities in the delivery of future health care services in new and emerging markets allowing them to tailor product and service solutions which focus on being accessible and affordable by all. The industry based case study for the design of health services in carried out in emerging economies. The contribution of this work in advancing research into design innovation and future research directions are also presented.
Resumo:
This chapter outlines: a brief history of Australian Aboriginal health and health policy and then moves on to demonstrate how the Victorian Aboriginal Community Controlled Health Organisation (VACCHO) undertakes its work and is an example of 'decolonizing policy in action'. Moreover, it highlights how Aboriginal participation in the development of policy and in the planning, delivery, management and evaluation of health programs enables policies and programs to respond effectively to the needs of Aboriginal people and to change future health outcomes for them. It showcases how Aboriginal decision-making has gone some way to decolonizing policymaking and has addressed the power imbalance - both of which have been critical in the improvement in Aboriginal health outcomes.
Resumo:
Type unions, pointer variables and function pointers are a long standing source of subtle security bugs in C program code. Their use can lead to hard-to-diagnose crashes or exploitable vulnerabilities that allow an attacker to attain privileged access over classified data. This paper describes an automatable framework for detecting such weaknesses in C programs statically, where possible, and for generating assertions that will detect them dynamically, in other cases. Exclusively based on analysis of the source code, it identifies required assertions using a type inference system supported by a custom made symbol table. In our preliminary findings, our type system was able to infer the correct type of unions in different scopes, without manual code annotations or rewriting. Whenever an evaluation is not possible or is difficult to resolve, appropriate runtime assertions are formed and inserted into the source code. The approach is demonstrated via a prototype C analysis tool.
Resumo:
The Rudd Labour Government rode to power in Australia on the education promise of 'an education revolution'. The term 'education revolution' carries all the obligatory marketing metaphors that an aspirant government might want recognised by the general public on the eve government came to power however in revolutionary terms it fades into insignificance in comparison to the real revolution in Australian education. This revolution simply put is to elevate Indigenous Knowledge Systems, in Australian Universities. In the forty three years since the nation setting Referendum of 1967 a generation has made a beach head on the educational landscape. Now a further generation who having made it into the field of higher degrees yearn for the ways and means to authentically marshal Indigenous knowledge? The Institute of Koorie Education at Deakin has for over twenty years not only witnessed the transition but is also a leader in the field. With the appointment of two Chairs of Indigenous Knowledge Systems to build on to its already established research profile the Institute moved towards what is the 'real revolution' in education – the elevation of Indigenous Knowledge as a legitimate knowledge system. This paper lays out the Institute of Koorie Education‘s Research Plan and the basis of an argument put to the academy that will be the driver for this pursuit.
Resumo:
This paper investigates how to interface the wireless application protocol (WAP) architecture to the SCADA system running distributed network protocol (DNP) in a power process plant. DNP is a well-developed protocol to be applied in the supervisory control and data acquisition (SCADA) system but the system control centre and remote terminal units (RTUs) are presently connected through a local area network. The conditions in a process plant are harsh and the site is remote. Resources for data communication are difficult to obtain under these conditions, thus, a wireless channel communication through a mobile phone is practical and efficient in a process plant environment. The mobile communication industries and the public have a strong interest in the WAP technology application in mobile phone networks and the WAP application programming interface (API) in power industry applications is one area that requires extensive investigation.
Resumo:
Short-term traffic flow data is characterized by rapid and dramatic fluctuations. It reflects the nature of the frequent congestion in the lane, which shows a strong nonlinear feature. Traffic state estimation based on the data gained by electronic sensors is critical for much intelligent traffic management and the traffic control. In this paper, a solution to freeway traffic estimation in Beijing is proposed using a particle filter, based on macroscopic traffic flow model, which estimates both traffic density and speed.Particle filter is a nonlinear prediction method, which has obvious advantages for traffic flows prediction. However, with the increase of sampling period, the volatility of the traffic state curve will be much dramatic. Therefore, the prediction accuracy will be affected and difficulty of forecasting is raised. In this paper, particle filter model is applied to estimate the short-term traffic flow. Numerical study is conducted based on the Beijing freeway data with the sampling period of 2 min. The relatively high accuracy of the results indicates the superiority of the proposed model.
Resumo:
Background/objectives The provision of the patient bed-bath is a fundamental nursing care activity yet few quantitative data and no qualitative data are available on registered nurses’ (RNs) clinical practice in this domain in the intensive care unit (ICU). The aim of this study was to describe ICU RNs current practice with respect to the timing, frequency and duration of the patient bed-bath and the cleansing and emollient agents used. Methods The study utilised a two-phase sequential explanatory mixed method design. Phase one used a questionnaire to survey RNs and phase two employed semi-structured focus group (FG) interviews with RNs. Data was collected over 28 days across four Australian metropolitan ICUs. Ethical approval was granted from the relevant hospital and university human research ethics committees. RNs were asked to complete a questionnaire following each episode of care (i.e. bed-bath) and then to attend one of three FG interviews: RNs with less than 2 years ICU experience; RNs with 2–5 years ICU experience; and RNs with greater than 5 years ICU experience. Results During the 28-day study period the four ICUs had 77.25 beds open. In phase one a total of 539 questionnaires were returned, representing 30.5% of episodes of patient bed-baths (based on 1767 bed occupancy and one bed-bath per patient per day). In 349 bed-bath episodes 54.7% patients were mechanically ventilated. The bed-bath was given between 02.00 and 06.00 h in 161 episodes (30%), took 15–30 min to complete (n = 195, 36.2%) and was completed within the last 8 h in 304 episodes (56.8%). Cleansing agents used were predominantly pH balanced soap or liquid soap and water (n = 379, 71%) in comparison to chlorhexidine impregnated sponges/cloths (n = 86, 16.1%) or other agents such as pre-packaged washcloths (n = 65, 12.2%). In 347 episodes (64.4%) emollients were not applied after the bed-bath. In phase two 12 FGs were conducted (three FGs at each ICU) with a total of 42 RN participants. Thematic analysis of FG transcripts across the three levels of RN ICU experience highlighted a transition of patient hygiene practice philosophy from shades of grey – falling in line for inexperienced clinicians to experienced clinicians concrete beliefs about patient bed-bath needs. Conclusions This study identified variation in process and products used in patient hygiene practices in four ICUs. Further study to improve patient outcomes is required to determine the appropriate timing of patient hygiene activities and cleansing agents used to improve skin integrity.
Resumo:
Instrumental music performance is a well-established case of real-time interaction with technology and, when extended to ensembles, of interaction with others. However, these interactions are fleeting and the opportunities to reflect on action is limited, even though audio and video recording has recently provided important opportunities in this regard. In this paper we report on research to further extend these reflective opportunities through the capture and visualization of gestural data collected during collaborative virtual performances; specifically using the digital media instrument Jam2jam AV and the specifically-developed visualization software Jam2jam AV Visualize. We discusses how such visualization may assist performance development and understanding. The discussion engages with issues of representation, authenticity of virtual experiences, intersubjectivity and wordless collaboration, and creativity support. Two usage scenarios are described showing that collaborative intent is evident in the data visualizations more clearly than in audio-visual recordings alone, indicating that the visualization of performance gestures can be an efficient way of identifying deliberate and co-operative performance behaviours.
Resumo:
Banana leaf streak disease, caused by several species of Banana streak virus (BSV), is widespread in East Africa. We surveyed for this disease in Uganda and Kenya, and used rolling-circle amplification (RCA) to detect the presence of BSV in banana. Six distinct badnavirus sequences, three from Uganda and three from Kenya, were amplified for which only partial sequences were previously available. The complete genomes were sequenced and characterised. The size and organisation of all six sequences was characteristic of other badnaviruses, including conserved functional domains present in the putative polyprotein encoded by open reading frame (ORF) 3. Based on nucleotide sequence analysis within the reverse transcriptase/ribonuclease H-coding region of open reading frame 3, we propose that these sequences be recognised as six new species and be designated as Banana streak UA virus, Banana streak UI virus, Banana streak UL virus, Banana streak UM virus, Banana streak CA virus and Banana streak IM virus. Using PCR and species-specific primers to test for the presence of integrated sequences, we demonstrated that sequences with high similarity to BSIMV only were present in several banana cultivars which had tested negative for episomal BSV sequences.
Resumo:
The economiser is a critical component for efficient operation of coal-fired power stations. It consists of a large system of water-filled tubes which extract heat from the exhaust gases. When it fails, usually due to erosion causing a leak, the entire power station must be shut down to effect repairs. Not only are such repairs highly expensive, but the overall repair costs are significantly affected by fluctuations in electricity market prices, due to revenue lost during the outage. As a result, decisions about when to repair an economiser can alter the repair costs by millions of dollars. Therefore, economiser repair decisions are critical and must be optimised. However, making optimal repair decisions is difficult because economiser leaks are a type of interactive failure. If left unfixed, a leak in a tube can cause additional leaks in adjacent tubes which will need more time to repair. In addition, when choosing repair times, one also needs to consider a number of other uncertain inputs such as future electricity market prices and demands. Although many different decision models and methodologies have been developed, an effective decision-making method specifically for economiser repairs has yet to be defined. In this paper, we describe a Decision Tree based method to meet this need. An industrial case study is presented to demonstrate the application of our method.
Resumo:
The present rate of technological advance continues to place significant demands on data storage devices. The sheer amount of digital data being generated each year along with consumer expectations, fuels these demands. At present, most digital data is stored magnetically, in the form of hard disk drives or on magnetic tape. The increase in areal density (AD) of magnetic hard disk drives over the past 50 years has been of the order of 100 million times, and current devices are storing data at ADs of the order of hundreds of gigabits per square inch. However, it has been known for some time that the progress in this form of data storage is approaching fundamental limits. The main limitation relates to the lower size limit that an individual bit can have for stable storage. Various techniques for overcoming these fundamental limits are currently the focus of considerable research effort. Most attempt to improve current data storage methods, or modify these slightly for higher density storage. Alternatively, three dimensional optical data storage is a promising field for the information storage needs of the future, offering very high density, high speed memory. There are two ways in which data may be recorded in a three dimensional optical medium; either bit-by-bit (similar in principle to an optical disc medium such as CD or DVD) or by using pages of bit data. Bit-by-bit techniques for three dimensional storage offer high density but are inherently slow due to the serial nature of data access. Page-based techniques, where a two-dimensional page of data bits is written in one write operation, can offer significantly higher data rates, due to their parallel nature. Holographic Data Storage (HDS) is one such page-oriented optical memory technique. This field of research has been active for several decades, but with few commercial products presently available. Another page-oriented optical memory technique involves recording pages of data as phase masks in a photorefractive medium. A photorefractive material is one by which the refractive index can be modified by light of the appropriate wavelength and intensity, and this property can be used to store information in these materials. In phase mask storage, two dimensional pages of data are recorded into a photorefractive crystal, as refractive index changes in the medium. A low-intensity readout beam propagating through the medium will have its intensity profile modified by these refractive index changes and a CCD camera can be used to monitor the readout beam, and thus read the stored data. The main aim of this research was to investigate data storage using phase masks in the photorefractive crystal, lithium niobate (LiNbO3). Firstly the experimental methods for storing the two dimensional pages of data (a set of vertical stripes of varying lengths) in the medium are presented. The laser beam used for writing, whose intensity profile is modified by an amplitudemask which contains a pattern of the information to be stored, illuminates the lithium niobate crystal and the photorefractive effect causes the patterns to be stored as refractive index changes in the medium. These patterns are read out non-destructively using a low intensity probe beam and a CCD camera. A common complication of information storage in photorefractive crystals is the issue of destructive readout. This is a problem particularly for holographic data storage, where the readout beam should be at the same wavelength as the beam used for writing. Since the charge carriers in the medium are still sensitive to the read light field, the readout beam erases the stored information. A method to avoid this is by using thermal fixing. Here the photorefractive medium is heated to temperatures above 150�C; this process forms an ionic grating in the medium. This ionic grating is insensitive to the readout beam and therefore the information is not erased during readout. A non-contact method for determining temperature change in a lithium niobate crystal is presented in this thesis. The temperature-dependent birefringent properties of the medium cause intensity oscillations to be observed for a beam propagating through the medium during a change in temperature. It is shown that each oscillation corresponds to a particular temperature change, and by counting the number of oscillations observed, the temperature change of the medium can be deduced. The presented technique for measuring temperature change could easily be applied to a situation where thermal fixing of data in a photorefractive medium is required. Furthermore, by using an expanded beam and monitoring the intensity oscillations over a wide region, it is shown that the temperature in various locations of the crystal can be monitored simultaneously. This technique could be used to deduce temperature gradients in the medium. It is shown that the three dimensional nature of the recording medium causes interesting degradation effects to occur when the patterns are written for a longer-than-optimal time. This degradation results in the splitting of the vertical stripes in the data pattern, and for long writing exposure times this process can result in the complete deterioration of the information in the medium. It is shown in that simply by using incoherent illumination, the original pattern can be recovered from the degraded state. The reason for the recovery is that the refractive index changes causing the degradation are of a smaller magnitude since they are induced by the write field components scattered from the written structures. During incoherent erasure, the lower magnitude refractive index changes are neutralised first, allowing the original pattern to be recovered. The degradation process is shown to be reversed during the recovery process, and a simple relationship is found relating the time at which particular features appear during degradation and recovery. A further outcome of this work is that the minimum stripe width of 30 ìm is required for accurate storage and recovery of the information in the medium, any size smaller than this results in incomplete recovery. The degradation and recovery process could be applied to an application in image scrambling or cryptography for optical information storage. A two dimensional numerical model based on the finite-difference beam propagation method (FD-BPM) is presented and used to gain insight into the pattern storage process. The model shows that the degradation of the patterns is due to the complicated path taken by the write beam as it propagates through the crystal, and in particular the scattering of this beam from the induced refractive index structures in the medium. The model indicates that the highest quality pattern storage would be achieved with a thin 0.5 mm medium; however this type of medium would also remove the degradation property of the patterns and the subsequent recovery process. To overcome the simplistic treatment of the refractive index change in the FD-BPM model, a fully three dimensional photorefractive model developed by Devaux is presented. This model shows significant insight into the pattern storage, particularly for the degradation and recovery process, and confirms the theory that the recovery of the degraded patterns is possible since the refractive index changes responsible for the degradation are of a smaller magnitude. Finally, detailed analysis of the pattern formation and degradation dynamics for periodic patterns of various periodicities is presented. It is shown that stripe widths in the write beam of greater than 150 ìm result in the formation of different types of refractive index changes, compared with the stripes of smaller widths. As a result, it is shown that the pattern storage method discussed in this thesis has an upper feature size limit of 150 ìm, for accurate and reliable pattern storage.