912 resultados para coded wire tags
Resumo:
Stress corrosion cracking (SCC) is a well known form of environmental attack in low carat gold jewellery. It is desirable to have a quick, easy and cost effective way to detect SCC in alloys and prevent them from being used and later failing in their application. A facile chemical method to investigate SCC of 9 carat gold alloys is demonstrated. It involves a simple application of tensile stress to a wire sample in a corrosive environment such as 1–10 % FeCl3 which induces failure in less than 5 minutes. In this study three quaternary (Au, Ag, Cu and Zn) 9 carat gold alloy compositions were investigated for their resistance to SCC and the relationship between time to failure and processing conditions is studied. It is envisaged that the use of such a rapid and facile screening procedure at the production stage may readily identify alloy treatments that produce jewellery that will be susceptible to SCC in its lifetime.
Resumo:
This study was conducted within the context of a flexible education institution where conventional educational assessment practices and tests fail to recognise and assess the creativity and cultural capital of a cohort of marginalised young people. A new assessment model which included an electronic-portfolio-social-networking system (EPS) was developed and trialled to identify and exhibit evidence of students' learning. The study aimed to discern unique forms of cultural capital (Bourdieu, 1986) possessed by students who attend the Edmund Rice Education Australia Flexible Learning Centre Network (EREAFLCN). The EPS was trialled at the case study schools in an intervention and developed a space where students could make evident culturally specific forms of capital and funds of knowledge (Gonzalez, Moll, & Amanti, 2005). These resources were evaluated, modified and developed through dialogic processes utilising assessment for learning approaches (Qualifications and Curriculum Development Agency, 2009) in online and classroom settings. Students, peers and staff engaged in the recognition, judgement, revision and evaluation of students' cultural capital in a subfield of exchange (Bourdieu, 1990). The study developed the theory of assessment for learning as a field of exchange incorporating an online system as a teaching and assessment model. The term efield has been coined to describe this particular capital exchange model. A quasi-ethnographic approach was used to develop a collective case study (Stake, 1995). This case study involved an in-depth exploration of five students' forms of cultural capital and the ways in which this capital could be assessed and exchanged using the efield model. A comparative analysis of the five cases was conducted to identify the emergent issues of students' recognisable cultural capital resources and the processes of exchange that can be facilitated to acquire legitimate credentials for these students in the Australian field of education. The participants in the study were young people at two EREAFLC schools aged between 12 and 18 years. Data was collected through interviews, observations and examination of documents made available by the EREAFLCN. The data was coded and analysed using a theoretical framework based on Bourdieu's analytical tools and a sociocultural psychology theoretical perspective. Findings suggest that processes based on dialogic relationships can identify and recognise students' forms of cultural capital that are frequently misrecognised in mainstream school environments. The theory of assessment for learning as a field of exchange was developed into praxis and integrated in an intervention. The efield model was found to be an effective sociocultural tool in converting and exchanging students' capital resources for legitimated cultural and symbolic capital in the field of education.
Resumo:
Issue addressed: Although increases in cycling in Brisbane are encouraging, bicycle mode share to work in the state of Queensland remains low. The aim of this qualitative study was to draw upon the lived experiences of Queensland cyclists to understand the main motivators for utility cycling (cycling as a means to get to and from places) and compare motivators between utility cyclists (those who cycle for utility as well as for recreation) and non-utility cyclists (those who cycle only for recreation). Methods: For an online survey, members of a bicycle group (831 utility cyclists and 931 non-utility cyclists, aged 18-90 years) were asked to describe, unprompted, what would motivate them to engage in utility cycling (more often). Responses were coded into themes within four levels of an ecological model. Results: Within an ecological model, built environment influences on motivation were grouped according to whether they related to appeal (safety), convenience (accessibility) or attractiveness (more amenities) and included adequate infrastructure for short trips, bikeway connectivity, end-of-trip facilities at public locations and easy and safe bicycle access to destinations outside of cities. A key social-cultural influence related to improved interactions among different road users. Conclusions: The built and social-cultural environments need to be more supportive of utility cycling before even current utility and non-utility cyclists will be motivated to engage (more often) in utility cycling. So what?: Additional government strategies and more and better infrastructure that support utility cycling beyond commuter cycling may encourage a utility cycling culture.
Resumo:
This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.
Resumo:
In some parts of Australia, people wanting to learn to ride a motorcycle are required to complete an off-road training course before they are allowed to practice on the road. In the state of Queensland, they are only required to pass a short multiple-choice road rules knowledge test. This paper describes an analysis of police-reported crashes involving learner riders in Queensland that was undertaken as part of research investigating whether pre-learner training is needed and, if so, the issues that should be addressed in training.. The crashes of learner riders and other riders were compared to identify whether there are particular situations or locations in which learner motorcyclists are over-involved in crashes, which could then be targeted in the pre-learner package. The analyses were undertaken separately for riders aged under 25 (330 crashes) versus those aged 25 and over (237 crashes) to provide some insight into whether age or riding inexperience are the more important factors, and thus to indicate whether there are merits in having different licensing or training approaches for younger and older learner riders. Given that the average age of learner riders was 33 years, under 25 was chosen to provide a sufficiently large sample of younger riders. Learner riders appeared to be involved in more severe crashes and to be more often at fault than fully-licensed riders but this may reflect problems in reporting, rather than real differences. Compared to open licence holders, both younger and older learner riders had relatively more crashes in low speed zones and relatively fewer in high speed zones. Riders aged under 25 had elevated percentages of night-time crashes and fewer single unit (potentially involving rider error only) crashes regardless of the type of licence held. The contributing factors that were more prevalent in crashes of learner riders than holders of open licences were: inexperience (37.2% versus 0.5%), inattention (21.5% versus 15.6%), alcohol or drugs (12.0% versus 5.1%) and drink riding (9.9% versus 3.1%). The pattern of contributing factors was generally similar for younger and older learner riders, although younger learners were (not surprisingly) more likely to have inexperience coded as a contributing factor (49.7% versus 19.8%). Some of the differences in crashes between learner riders and fully-licensed riders appear to reflect relatively more riding in urban areas by learners, rather than increased risks relating to inexperience. The analysis of contributing factors in learner rider crashes suggests that hazard perception and risk management (in terms of speed and alcohol and drugs) should be included in a pre-learner program. Currently, most learner riders in Queensland complete pre-licence training and become licensed within one month of obtaining their learner permit. If the introduction of pre-learner training required that the learner permit was held for a minimum duration, then the immediate effect might be more learners riding (and crashing). Thus, it is important to consider how training and licensing initiatives work together in order to improve the safety of new riders (and how this can be evaluated).
Resumo:
In this paper we will examine passenger actions and activities at the security screening points of Australian domestic and international airports. Our findings and analysis provide a more complete understanding of the current airport passenger security screening experience. Data in this paper is comprised of field studies conducted at two Australian airports, one domestic and one international. Video data was collected by cameras situated either side of the security screening point. A total of one hundred and ninety-six passengers were observed. Two methods of analysis are used. First, the activities of passengers are coded and analysed to reveal the common activities at domestic and international security regimes and between quiet and busy periods. Second, observation of passenger activities is used to reveal uncommon aspects. The results show that passengers do more at security screening that being passively scanned. Passengers queue, unpack the required items from their bags and from their pockets, walk through the metal-detector, re-pack and occasionally return to be re-screened. For each of these activities, passengers must understand the procedures at the security screening point and must co-ordinate various actions and objects in time and space. Through this coordination passengers are active participants in making the security checkpoint function – they are co-producers of the security screening process.
Resumo:
iTRAQ (isobaric tags for relative or absolute quantitation) is a mass spectrometry technology that allows quantitative comparison of protein abundance by measuring peak intensities of reporter ions released from iTRAQ-tagged peptides by fragmentation during MS/MS. However, current data analysis techniques for iTRAQ struggle to report reliable relative protein abundance estimates and suffer with problems of precision and accuracy. The precision of the data is affected by variance heterogeneity: low signal data have higher relative variability; however, low abundance peptides dominate data sets. Accuracy is compromised as ratios are compressed toward 1, leading to underestimation of the ratio. This study investigated both issues and proposed a methodology that combines the peptide measurements to give a robust protein estimate even when the data for the protein are sparse or at low intensity. Our data indicated that ratio compression arises from contamination during precursor ion selection, which occurs at a consistent proportion within an experiment and thus results in a linear relationship between expected and observed ratios. We proposed that a correction factor can be calculated from spiked proteins at known ratios. Then we demonstrated that variance heterogeneity is present in iTRAQ data sets irrespective of the analytical packages, LC-MS/MS instrumentation, and iTRAQ labeling kit (4-plex or 8-plex) used. We proposed using an additive-multiplicative error model for peak intensities in MS/MS quantitation and demonstrated that a variance-stabilizing normalization is able to address the error structure and stabilize the variance across the entire intensity range. The resulting uniform variance structure simplifies the downstream analysis. Heterogeneity of variance consistent with an additive-multiplicative model has been reported in other MS-based quantitation including fields outside of proteomics; consequently the variance-stabilizing normalization methodology has the potential to increase the capabilities of MS in quantitation across diverse areas of biology and chemistry.
Resumo:
Acoustic sensors are increasingly used to monitor biodiversity. They can remain deployed in the environment for extended periods to passively and objectively record the sounds of the environment. The collected acoustic data must be analyzed to identify the presence of the sounds made by fauna in order to understand biodiversity. Citizen scientists play an important role in analyzing this data by annotating calls and identifying species. This paper presents our research into bioacoustic annotation techniques. It describes our work in defining a process for managing, creating, and using tags that are applied to our annotations. This paper includes a detailed description of our methodology for correcting and then linking our folksonomic tags to taxonomic data sources. Providing tools and processes for maintaining species naming consistency is critical to the success of a project designed to generate scientific data. We demonstrate that cleaning the folksonomic data and providing links to external taxonomic authorities enhances the scientific utility of the tagging efforts of citizen scientists.
Resumo:
In this age of rapidly evolving technology, teachers are encouraged to adopt ICTs by government, syllabus, school management, and parents. Indeed, it is an expectation that teachers will incorporate technologies into their classroom teaching practices to enhance the learning experiences and outcomes of their students. In particular, regarding the science classroom, a subject that traditionally incorporates hands-on experiments and practicals, the integration of modern technologies should be a major feature. Although myriad studies report on technologies that enhance students’ learning outcomes in science, there is a dearth of literature on how teachers go about selecting technologies for use in the science classroom. Teachers can feel ill prepared to assess the range of available choices and might feel pressured and somewhat overwhelmed by the avalanche of new developments thrust before them in marketing literature and teaching journals. The consequences of making bad decisions are costly in terms of money, time and teacher confidence. Additionally, no research to date has identified what technologies science teachers use on a regular basis, and whether some purchased technologies have proven to be too problematic, preventing their sustained use and possible wider adoption. The primary aim of this study was to provide research-based guidance to teachers to aid their decision-making in choosing technologies for the science classroom. The study unfolded in several phases. The first phase of the project involved survey and interview data from teachers in relation to the technologies they currently use in their science classrooms and the frequency of their use. These data were coded and analysed using Grounded Theory of Corbin and Strauss, and resulted in the development of a PETTaL model that captured the salient factors of the data. This model incorporated usability theory from the Human Computer Interaction literature, and education theory and models such as Mishra and Koehler’s (2006) TPACK model, where the grounded data indicated these issues. The PETTaL model identifies Power (school management, syllabus etc.), Environment (classroom / learning setting), Teacher (personal characteristics, experience, epistemology), Technology (usability, versatility etc.,) and Learners (academic ability, diversity, behaviour etc.,) as fields that can impact the use of technology in science classrooms. The PETTaL model was used to create a Predictive Evaluation Tool (PET): a tool designed to assist teachers in choosing technologies, particularly for science teaching and learning. The evolution of the PET was cyclical (employing agile development methodology), involving repeated testing with in-service and pre-service teachers at each iteration, and incorporating their comments i ii in subsequent versions. Once no new suggestions were forthcoming, the PET was tested with eight in-service teachers, and the results showed that the PET outcomes obtained by (experienced) teachers concurred with their instinctive evaluations. They felt the PET would be a valuable tool when considering new technology, and it would be particularly useful as a means of communicating perceived value between colleagues and between budget holders and requestors during the acquisition process. It is hoped that the PET could make the tacit knowledge acquired by experienced teachers about technology use in classrooms explicit to novice teachers. Additionally, the PET could be used as a research tool to discover a teachers’ professional development needs. Therefore, the outcomes of this study can aid a teacher in the process of selecting educationally productive and sustainable new technology for their science classrooms. This study has produced an instrument for assisting teachers in the decision-making process associated with the use of new technologies for the science classroom. The instrument is generic in that it can be applied to all subject areas. Further, this study has produced a powerful model that extends the TPACK model, which is currently extensively employed to assess teachers’ use of technology in the classroom. The PETTaL model grounded in data from this study, responds to the calls in the literature for TPACK’s further development. As a theoretical model, PETTaL has the potential to serve as a framework for the development of a teacher’s reflective practice (either self evaluation or critical evaluation of observed teaching practices). Additionally, PETTaL has the potential for aiding the formulation of a teacher’s personal professional development plan. It will be the basis for further studies in this field.
Resumo:
Agile learning spaces have the potential to afford flexible and innovative pedagogic practice. However there is little known about the experiences of teachers and learners in newly designed learning spaces, and whether the potential for reimagined pedagogies is being realised. This paper uses data from a recent study into the experiences of teacher-librarians, teachers, students and leaders of seven Queensland school libraries built with Building the Education Revolution (BER) funding, to explore the question, “how does the physical environment of school libraries influence pedagogic practices?” This paper proposes that teachers explored new pedagogies within the spaces when there was opportunity for flexibility and experimentation and the spaces sufficiently supported their beliefs about student learning. The perspectives of a range of library users were gathered through an innovative research design incorporating student drawings, videoed library tours and reflections, and interviews. The research team collected qualitative data from school libraries throughout 2012. The libraries represented a variety of geographic locations, socioeconomic conditions and both primary and secondary campuses. The use of multiple data sources, and also the perspectives of the multiple researchers who visited the sites and then coded the data, enabled complementary insights and synergies to emerge. Principles of effective teacher learning that can underpin school wide learning about the potential for agile learning spaces to enhance student learning, are identified. The paper concludes that widespread innovative use of the new library spaces was significantly enhanced when the school leadership fostered whole school discussions about the type of learning the spaces might provoke. This research has the potential to inform school designers, teachers and teacher-librarians to make the most of the transformative potential of next generation learning spaces.
On the advanced analysis of steel frames allowing for flexural, local and lateral-torsional buckling
Resumo:
Detailed procedure for second-order analysis has been coded in the newest Eurocode 3 and the Hong Kong steel code (2005). The effective length method has been noted to be inapplicable to analysis of shallow domes of imperfect members exhibiting snap-through buckling, to portals with leaning columns and others. On the other hand, the advanced analysis is not limited to buckling design of these structures. This paper demonstrates its application to the design of a simple plane sway portal and a three diminsional non-sway steel building. The results by the advanced analysis and the first-order linear analysis are compared and the technique for practical second-order analysis steel structures is described. It is observed that the use of a straight element by itself cannot model the buckling resistance of columns governed by different buckling curves for hot-rolled and cold-formed sections of various shapes like I, H, hollow etc. Also the curvature of the conventional cubic Hermite element is not varied by the external axial force and thus it cannot simulate the response of a buckling column. Thus its use for second-order analysis is basically unacceptable. A technique for additional checking of beams undergoing lateral-torsional buckling is also suggested making the advanced analysis a complete design tool for conventional steel frames.
Resumo:
A retrospective, descriptive analysis of a sample of children under 18 years presenting to a hospital emergency department (ED) for treatment of an injury was conducted. The aim was to explore characteristics and identify differences between children assigned abuse codes and children assigned unintentional injury codes using an injury surveillance database. Only 0.1% of children had been assigned the abuse code and 3.9% a code indicating possible abuse. Children between 2-5 years formed the largest proportion of those coded to abuse. Superficial injury and bruising were the most common types of injury seen in children in the abuse group and the possible abuse group (26.9% and 18.8% respectively), whereas those with unintentional injury were most likely to present with open wounds (18.4%). This study demonstrates that routinely collected injury surveillance data can be a useful source of information for describing injury characteristics in children assigned abuse codes compared to those assigned no abuse codes.
Resumo:
Aims: To compare different methods for identifying alcohol involvement in injury-related emergency department presentation in Queensland youth, and to explore the alcohol terminology used in triage text. Methods: Emergency Department Information System data were provided for patients aged 12-24 years with an injury-related diagnosis code for a 5 year period 2006-2010 presenting to a Queensland emergency department (N=348895). Three approaches were used to estimate alcohol involvement: 1) analysis of coded data, 2) mining of triage text, and 3) estimation using an adaptation of alcohol attributable fractions (AAF). Cases were identified as ‘alcohol-involved’ by code and text, as well as AAF weighted. Results: Around 6.4% of these injury presentations overall had some documentation of alcohol involvement, with higher proportions of alcohol involvement documented for 18-24 year olds, females, indigenous youth, where presentations occurred on a Saturday or Sunday, and where presentations occurred between midnight and 5am. The most common alcohol terms identified for all subgroups were generic alcohol terms (eg. ETOH or alcohol) with almost half of the cases where alcohol involvement was documented having a generic alcohol term recorded in the triage text. Conclusions: Emergency department data is a useful source of information for identification of high risk sub-groups to target intervention opportunities, though it is not a reliable source of data for incidence or trend estimation in its current unstandardised form. Improving the accuracy and consistency of identification, documenting and coding of alcohol-involvement at the point of data capture in the emergency department is the most desirable long term approach to produce a more solid evidence base to support policy and practice in this field.
Resumo:
A home is an embodiment of human privacy, apart from providing shelter, security and several other functions. Achieving the desired level of privacy at home is very important in Muslim societies. Privacy is intended to protect the female members of the family from strangers, especially while entertaining guests at home. One way of controlling levels of exposure of the domestic domains to strangers is by controlling privacy levels. This research will investigate perceptions of privacy among Australian Muslims when entertaining guests at their homes. This research will also investigate the extent that modesty (achieved through both appearance and design) acts as the balancing factor in achieving a family’s desired levels of privacy while also affording them the capacity to be hospitable to guests. This research will use a qualitative approach to investigate Australian Muslim homes around Queensland, predominantly in the Brisbane area. A total number of 20 to 60 participants (10 to 30 males, 10 to 30 females) ranging from 25 to 55 years old will be interviewed. Ideally, participants will be those who have children or extended families (parents or siblings) living in the house. The data will be coded and analysed for the purpose of generating new knowledge for architects and designers when designing Muslim homes. It will also extend the current body of knowledge related to privacy mechanisms in housing designs, thereby benefitting architects and designers in the future.
Resumo:
Background: This paper describes research conducted with Big hART, Australia's most awarded participatory arts company. It considers three projects, LUCKY, GOLD and NGAPARTJI NGAPARTJI across separate sites in Tasmania, Western NSW and Northern Territory, respectively, in order to understand project impact from the perspective of project participants, Arts workers, community members and funders. Methods: Semi-structured interviews were conducted with 29 respondents. The data were coded thematically and analysed using the constant comparative method of qualitative data analysis. Results: Seven broad domains of change were identified: psychosocial health; community; agency and behavioural change; the Art; economic effect; learning and identity. Conclusions: Experiences of participatory arts are interrelated in an ecology of practice that is iterative, relational, developmental, temporal and contextually bound. This means that questions of impact are contingent, and there is no one path that participants travel or single measure that can adequately capture the richness and diversity of experience. Consequently, it is the productive tensions between the domains of change that are important and the way they are animated through Arts practice that provides sign posts towards the impact of Big hART projects.