879 resultados para SHARED EPITOPE
Resumo:
In 2009, Australia celebrated the introduction of a national Early Years Learning Framework. This is a critical component in a series of education reforms designed to support quality pedagogy and practice in early childhood education and care (ECEC) and successful transition to school. As with any policy change, success in real terms relies upon building shared understanding and the capacity of educators to apply new knowledge and support change and improved practice within their service. With these outcomes in mind, a collaborative research project is investigating the efficacy of a new approach to professional learning in ECEC: the professional conversation. This paper reports on the trial and evaluation of a series of professional conversations on the Early Years Learning Framework, and their capacity to promote collaborative reflective practice, shared understanding, and improved practice in ECEC. The paper details the professional conversation approach, key challenges and critical success factors, and the learning outcomes for conversation participants. Findings support the efficacy of this approach to professional learning in ECEC, and its capacity to support policy reform and practice change in ECEC.
Resumo:
This paper investigates the use of visual artifacts to represent a complex adaptive system (CAS). The integrated master schedule (IMS) is one of those visuals widely used in complex projects for scheduling, budgeting, and project management. In this paper, we discuss how the IMS outperforms the traditional timelines and acts as a ‘multi-level and poly-temporal boundary object’ that visually represents the CAS. We report the findings of a case study project on the way the IMS mapped interactions, interdependencies, constraints and fractal patterns in a complex project. Finally, we discuss how the IMS was utilised as a complex boundary object by eliciting commitment and development of shared mental models, and facilitating negotiation through the layers of multiple interpretations from stakeholders.
Resumo:
This study examined the everyday practices of families within the context of family mealtime to investigate how members accomplished mealtime interactions. Using an ethnomethodological approach, conversation analysis and membership categorization analysis, the study investigated the interactional resources that family members used to assemble their social orders moment by moment during family mealtimes. While there is interest in mealtimes within educational policy, health research and the media, there remain few studies that provide fine-grained detail about how members produce the social activity of having a family meal. Findings from this study contribute empirical understandings about families and family mealtime. Two families with children aged 2 to 10 years were observed as they accomplished their everyday mealtime activities. Data collection took place in the family homes where family members video recorded their naturally occurring mealtimes. Each family was provided with a video camera for a one-month period and they decided which mealtimes they recorded, a method that afforded participants greater agency in the data collection process and made available to the analyst a window into the unfolding of the everyday lives of the families. A total of 14 mealtimes across the two families were recorded, capturing 347 minutes of mealtime interactions. Selected episodes from the data corpus, which includes centralised breakfast and dinnertime episodes, were transcribed using the Jeffersonian system. Three data chapters examine extended sequences of family talk at mealtimes, to show the interactional resources used by members during mealtime interactions. The first data chapter explores multiparty talk to show how the uniqueness of the occasion of having a meal influences turn design. It investigates the ways in which members accomplish two-party talk within a multiparty setting, showing how one child "tells" a funny story to accomplish the drawing together of his brothers as an audience. As well, this chapter identifies the interactional resources used by the mother to cohort her children to accomplish the choralling of grace. The second data chapter draws on sequential and categorical analysis to show how members are mapped to a locally produced membership category. The chapter shows how the mapping of members into particular categories is consequential for social order; for example, aligning members who belong to the membership category "had haircuts" and keeping out those who "did not have haircuts". Additional interactional resources such as echoing, used here to refer to the use of exactly the same words, similar prosody and physical action, and increasing physical closeness, are identified as important to the unfolding talk particularly as a way of accomplishing alignment between the grandmother and grand-daughter. The third and final data analysis chapter examines topical talk during family mealtimes. It explicates how members introduce topics of talk with an orientation to their co-participant and the way in which the take up of a topic is influenced both by the sequential environment in which it is introduced and the sensitivity of the topic. Together, these three data chapters show aspects of how family members participated in family mealtimes. The study contributes four substantive themes that emerged during the analytic process and, as such, the themes reflect what the members were observed to be doing. The first theme identified how family knowledge was relevant and consequential for initiating and sustaining interaction during mealtime with, for example, members buying into the talk of other members or being requested to help out with knowledge about a shared experience. Knowledge about members and their activities was evident with the design of questions evidencing an orientation to coparticipant’s knowledge. The second theme found how members used topic as a resource for social interaction. The third theme concerned the way in which members utilised membership categories for producing and making sense of social action. The fourth theme, evident across all episodes selected for analysis, showed how children’s competence is an ongoing interactional accomplishment as they manipulated interactional resources to manage their participation in family mealtime. The way in which children initiated interactions challenges previous understandings about children’s restricted rights as conversationalists. As well as making a theoretical contribution, the study offers methodological insight by working with families as research participants. The study shows the procedures involved as the study moved from one where the researcher undertook the decisions about what to videorecord to offering this decision making to the families, who chose when and what to videorecord of their mealtime practices. Evident also are the ways in which participants orient both to the video-camera and to the absent researcher. For the duration of the mealtime the video-camera was positioned by the adults as out of bounds to the children; however, it was offered as a "treat" to view after the mealtime was recorded. While situated within family mealtimes and reporting on the experiences of two families, this study illuminates how mealtimes are not just about food and eating; they are social. The study showed the constant and complex work of establishing and maintaining social orders and the rich array of interactional resources that members draw on during family mealtimes. The family’s interactions involved members contributing to building the social orders of family mealtime. With mealtimes occurring in institutional settings involving young children, such as long day care centres and kindergartens, the findings of this study may help educators working with young children to see the rich interactional opportunities mealtimes afford children, the interactional competence that children demonstrate during mealtimes, and the important role/s that adults may assume as co-participants in interactions with children within institutional settings.
Resumo:
Purpose – This study examines the nature of consumers’ perceptions of the value they derive from the everyday experiential consumption of mobile phones and how mobile marketing (m-marketing) can potentially enhance these value perceptions. Methodology – Q methodology is used to examine how consumers’ subjective perceptions and opinions are shared at a collective level. Forty participants undertook two Q sorts and the data was analysed using PQ-method. Findings – The first Q sort identified three profiles of perceived value: the Mobile Pragmatists, the Mobile Connectors and the Mobile Revellers. The second Q sort identified two profiles of perceived value of m-marketing: one emerging from the shared opinions of the Mobile Pragmatists and the Mobile Connectors, and the second from the Mobile Revellers. Implications/limitations – The findings show how consumers can be segmented based on their contextualised perceived value of consuming mobile phones and how the potential for m-marketing is perceived in ways that can enhance these value perceptions. Limitations relate to deriving statements for the Q sorts and the generalisability of the results. Practical implications – The findings highlight ways to tailor m-marketing strategies to complement consumers’ perceptions of the value offered through their mobile phones. Originality/value of paper – The study contributes to the literature through using Q methodology to examine two subjective areas of consumer behaviour, experiential consumption and consumer perceived value. Keywords mobile phones, mobile phone marketing, consumer perceived value, Q methodology, experiential consumption Classification Research paper
Resumo:
Mentors (cooperating classroom teachers) have a shared responsibility with universities for developing preservice teachers’ pedagogical practices, particularly towards becoming reflective practitioners. Preservice teachers need to participate actively in their own learning, by reflecting and acting on the mentor’s constructive feedback provided during planning and feedback dialogue sessions. This case study uses feedback practices outlined within a five-factor mentoring model to analyse dialogue between a mentor and her respective mentee during different stages in their school-based programs (first practicum). This investigation uses multiple data sources such as video and audio-recorded interviews, archival documents from participants such as lesson plans, reflections and reports to examine preservice teacher’s reflections and implementations of practice as a result of her mentor’s feedback (e.g., establish expectations, review lesson plans, observe teaching then provide oral and written feedback, and evaluate progress). Findings indicated that reflective thinking was more apparent when the mentor did not dominate conversations but instead asked astute pedagogical knowledge questions to facilitate the mentee’s reflections on practice.
Resumo:
Demands for delivering high instantaneous power in a compressed form (pulse shape) have widely increased during recent decades. The flexible shapes with variable pulse specifications offered by pulsed power have made it a practical and effective supply method for an extensive range of applications. In particular, the release of basic subatomic particles (i.e. electron, proton and neutron) in an atom (ionization process) and the synthesizing of molecules to form ions or other molecules are among those reactions that necessitate large amount of instantaneous power. In addition to the decomposition process, there have recently been requests for pulsed power in other areas such as in the combination of molecules (i.e. fusion, material joining), gessoes radiations (i.e. electron beams, laser, and radar), explosions (i.e. concrete recycling), wastewater, exhausted gas, and material surface treatments. These pulses are widely employed in the silent discharge process in all types of materials (including gas, fluid and solid); in some cases, to form the plasma and consequently accelerate the associated process. Due to this fast growing demand for pulsed power in industrial and environmental applications, the exigency of having more efficient and flexible pulse modulators is now receiving greater consideration. Sensitive applications, such as plasma fusion and laser guns also require more precisely produced repetitive pulses with a higher quality. Many research studies are being conducted in different areas that need a flexible pulse modulator to vary pulse features to investigate the influence of these variations on the application. In addition, there is the need to prevent the waste of a considerable amount of energy caused by the arc phenomena that frequently occur after the plasma process. The control over power flow during the supply process is a critical skill that enables the pulse supply to halt the supply process at any stage. Different pulse modulators which utilise different accumulation techniques including Marx Generators (MG), Magnetic Pulse Compressors (MPC), Pulse Forming Networks (PFN) and Multistage Blumlein Lines (MBL) are currently employed to supply a wide range of applications. Gas/Magnetic switching technologies (such as spark gap and hydrogen thyratron) have conventionally been used as switching devices in pulse modulator structures because of their high voltage ratings and considerably low rising times. However, they also suffer from serious drawbacks such as, their low efficiency, reliability and repetition rate, and also their short life span. Being bulky, heavy and expensive are the other disadvantages associated with these devices. Recently developed solid-state switching technology is an appropriate substitution for these switching devices due to the benefits they bring to the pulse supplies. Besides being compact, efficient, reasonable and reliable, and having a long life span, their high frequency switching skill allows repetitive operation of pulsed power supply. The main concerns in using solid-state transistors are the voltage rating and the rising time of available switches that, in some cases, cannot satisfy the application’s requirements. However, there are several power electronics configurations and techniques that make solid-state utilisation feasible for high voltage pulse generation. Therefore, the design and development of novel methods and topologies with higher efficiency and flexibility for pulsed power generators have been considered as the main scope of this research work. This aim is pursued through several innovative proposals that can be classified under the following two principal objectives. • To innovate and develop novel solid-state based topologies for pulsed power generation • To improve available technologies that have the potential to accommodate solid-state technology by revising, reconfiguring and adjusting their structure and control algorithms. The quest to distinguish novel topologies for a proper pulsed power production was begun with a deep and through review of conventional pulse generators and useful power electronics topologies. As a result of this study, it appears that efficiency and flexibility are the most significant demands of plasma applications that have not been met by state-of-the-art methods. Many solid-state based configurations were considered and simulated in order to evaluate their potential to be utilised in the pulsed power area. Parts of this literature review are documented in Chapter 1 of this thesis. Current source topologies demonstrate valuable advantages in supplying the loads with capacitive characteristics such as plasma applications. To investigate the influence of switching transients associated with solid-state devices on rise time of pulses, simulation based studies have been undertaken. A variable current source is considered to pump different current levels to a capacitive load, and it was evident that dissimilar dv/dts are produced at the output. Thereby, transient effects on pulse rising time are denied regarding the evidence acquired from this examination. A detailed report of this study is given in Chapter 6 of this thesis. This study inspired the design of a solid-state based topology that take advantage of both current and voltage sources. A series of switch-resistor-capacitor units at the output splits the produced voltage to lower levels, so it can be shared by the switches. A smart but complicated switching strategy is also designed to discharge the residual energy after each supply cycle. To prevent reverse power flow and to reduce the complexity of the control algorithm in this system, the resistors in common paths of units are substituted with diode rectifiers (switch-diode-capacitor). This modification not only gives the feasibility of stopping the load supply process to the supplier at any stage (and consequently saving energy), but also enables the converter to operate in a two-stroke mode with asymmetrical capacitors. The components’ determination and exchanging energy calculations are accomplished with respect to application specifications and demands. Both topologies were simply modelled and simulation studies have been carried out with the simplified models. Experimental assessments were also executed on implemented hardware and the approaches verified the initial analysis. Reports on details of both converters are thoroughly discussed in Chapters 2 and 3 of the thesis. Conventional MGs have been recently modified to use solid-state transistors (i.e. Insulated gate bipolar transistors) instead of magnetic/gas switching devices. Resistive insulators previously used in their structures are substituted by diode rectifiers to adjust MGs for a proper voltage sharing. However, despite utilizing solid-state technology in MGs configurations, further design and control amendments can still be made to achieve an improved performance with fewer components. Considering a number of charging techniques, resonant phenomenon is adopted in a proposal to charge the capacitors. In addition to charging the capacitors at twice the input voltage, triggering switches at the moment at which the conducted current through switches is zero significantly reduces the switching losses. Another configuration is also introduced in this research for Marx topology based on commutation circuits that use a current source to charge the capacitors. According to this design, diode-capacitor units, each including two Marx stages, are connected in cascade through solid-state devices and aggregate the voltages across the capacitors to produce a high voltage pulse. The polarity of voltage across one capacitor in each unit is reversed in an intermediate mode by connecting the commutation circuit to the capacitor. The insulation of input side from load side is provided in this topology by disconnecting the load from the current source during the supply process. Furthermore, the number of required fast switching devices in both designs is reduced to half of the number used in a conventional MG; they are replaced with slower switches (such as Thyristors) that need simpler driving modules. In addition, the contributing switches in discharging paths are decreased to half; this decrease leads to a reduction in conduction losses. Associated models are simulated, and hardware tests are performed to verify the validity of proposed topologies. Chapters 4, 5 and 7 of the thesis present all relevant analysis and approaches according to these topologies.
Resumo:
Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.
Resumo:
The formation of a venture relies, in part, upon the participants reaching a shared understanding of purpose and process. Yet in circumstances of great complexity and uncertainty how can such a shared understanding be created? If the response to complexity and uncertainty is to seek simplicity in order to find commonality then what is lost and what is at risk? Can shared understandings of purpose and process be arrived at by embracing complexity and uncertainty and if so how? These questions led us to explore the process of dialogue and communication of a team in its formative stages. Our interests were not centred upon the behavioural characteristics of the individuals in the 'forming' stage of group dynamics but rather the process of cognitive and linguistic turns, the wax and wan of ideas and, the formation of shared meaning. This process of cognitive and linguistic turns was focused thematically on the areas of foresight, innovation, entrepreneurship, and public policy. This cross disciplinary exploration sought to explore potential synergies between these domains, in particular in developing a conceptual basis for long term thinking that can inform wiser public policy.
Resumo:
This paper summarises some of the recent studies on various types of learning approaches that have utilised some form of Web 2.0 services in curriculum design to enhance learning. A generic implementation model of this integration will then be presented to illustrate the overall learning implementation process. Recently, the integration of Web 2.0 technologies into learning curriculum has begun to get a wide acceptance among teaching instructors across various higher learning institutions. This is evidenced by numerous studies which indicate the implementation of a range of Web 2.0 technologies into their learning design to improve learning delivery. Moreover, recent studies also have shown that the ability of current students to embrace Web 2.0 technologies is better than students using existing learning technology. Despite various attempts made by teachers in relation to the integration, researchers have noted a lack of integration standard to help in curriculum design. The absence of this standard will restrict the capacity of Web 2.0 adaptation into learning and adding more the complexity to provide meaningful learning. Therefore, this paper will attempt to draw a conceptual integration model which is being generated to reflect how learning activities with some facilitation of Web 2.0 is currently being implemented. The design of this model is based on shared experiences by many scholars as well as feedback gathered from two separate surveys conducted on teachers and a group of 180 students. Furthermore, this paper also recognizes some key components that generally engage in the design of a Web 2.0 teaching and learning which need to be addressed accordingly. Overall, the content of this paper will be organised as follows. The first part of the paper will introduce the importance of Web 2.0 implementation in teaching and learning from the perspective of higher education institutions and those challenges surrounding this area. The second part summarizes related works done in this field and brings forward the concept of designing learning with the incorporation of Web 2.0 technology. The next part presents the results of analysis derived from the two student and teachers surveys on using Web 2.0 during learning activities. This paper concludes by presenting a model that reflects several key entities that may be involved during the learning design.
Less but more : weaving disparate disciplines together for learners to construct their own knowledge
Resumo:
This paper reports on a Professional Learning Program conducted in China with 140 general technology teachers. It aimed to integrate robotics technology across and within the disciplines of science, technology, engineering and mathematics. With the help of university facilitators teachers developed General Technology lessons that seamlessly integrated with rich learning content across disciplines. Teachers engaged in seminars and workshops, which provided the opportunities for them to actively couch sound principles of learning in their daily work. They gained first-hand experience in applying an aligned system of assessments, standards and quality learning experiences geared to the needs of each student. Teachers worked collaboratively in teams to create inquiry, design and collaborative learning activities that aligned with their curriculum and which dealt with real world problems, issues and challenges. They continually discussed and reflected deeply on the activities and shared the newly developed resources online with teachers across the entire country. It is evident from the preliminary analysis of data that teachers are beginning to apply rich pedagogical practices and are becoming ‘adaptive’ in their approach when using LEGO® robotic tools to design, redesign, create and re-create learning activities for their students.
Resumo:
Purpose: Young novice drivers continue to be overrepresented in fatalities and injuries arising from crashes even with the introduction of countermeasures such as graduated driver licensing (GDL). Enhancing countermeasures requires a better understanding of the variables influencing risky driving. One of the most common risky behaviours performed by drivers of all ages is speeding, which is particularly risky for young novice drivers who, due to their driving inexperience, have difficulty in identifying and responding appropriately to road hazards. Psychosocial theory can improve our understanding of contributors to speeding, thereby informing countermeasure development and evaluation. This paper reports an application of Akers’ social learning theory (SLT), augmented by Gerrard and Gibbons’ prototype/willingness model (PWM), in addition to personal characteristics of age, gender, car ownership, and psychological traits/states of anxiety, depression, sensation seeking propensity and reward sensitivity, to examine the influences on self-reported speeding of young novice drivers with a Provisional (intermediate) licence in Queensland, Australia. Method: Young drivers (n = 378) recruited in 2010 for longitudinal research completed two surveys containing the Behaviour of Young Novice Drivers Scale, and reported their attitudes and behaviours as pre-Licence/Learner (Survey 1) and Provisional (Survey 2) drivers and their sociodemographic characteristics. Results: An Akers’ measurement model was created. Hierarchical multiple regressions revealed that (1) personal characteristics (PC) explained 20.3%; (2) the combination of PC and SLT explained 41.1%; and (3) the combination of PC, SLT and PWM explained 53.7% of variance in self-reported speeding. Whilst there appeared to be considerable shared variance, the significant predictors in the final model included gender, car ownership, reward sensitivity, depression, personal attitudes, and Learner speeding. Conclusions: These results highlight the capacity for psychosocial theory to improve our understanding of speeding by young novice drivers, revealing relationships between previous behaviour, attitudes, psychosocial characteristics and speeding. The findings suggest multi-faceted countermeasures should target the risky behaviour of Learners, and Learner supervisors should be encouraged to monitor their Learners’ driving speed. Novice drivers should be discouraged from developing risky attitudes towards speeding.
Resumo:
As organizations reach higher levels of business process management maturity, they often find themselves maintaining very large process model repositories, representing valuable knowledge about their operations. A common practice within these repositories is to create new process models, or extend existing ones, by copying and merging fragments from other models. We contend that if these duplicate fragments, a.k.a. ex- act clones, can be identified and factored out as shared subprocesses, the repository’s maintainability can be greatly improved. With this purpose in mind, we propose an indexing structure to support fast detection of clones in process model repositories. Moreover, we show how this index can be used to efficiently query a process model repository for fragments. This index, called RPSDAG, is based on a novel combination of a method for process model decomposition (namely the Refined Process Structure Tree), with established graph canonization and string matching techniques. We evaluated the RPSDAG with large process model repositories from industrial practice. The experiments show that a significant number of non-trivial clones can be efficiently found in such repositories, and that fragment queries can be handled efficiently.
Resumo:
Evidence exists that repositories of business process models used in industrial practice contain significant amounts of duplication. This duplication may stem from the fact that the repository describes variants of the same pro- cesses and/or because of copy/pasting activity throughout the lifetime of the repository. Previous work has put forward techniques for identifying duplicate fragments (clones) that can be refactored into shared subprocesses. However, these techniques are limited to finding exact clones. This paper analyzes the prob- lem of approximate clone detection and puts forward two techniques for detecting clusters of approximate clones. Experiments show that the proposed techniques are able to accurately retrieve clusters of approximate clones that originate from copy/pasting followed by independent modifications to the copied fragments.
Resumo:
Having wrung the most from workforce and workplace productivity initiaitves, innovation has come to the fore as a key goal and directive for public sector organisations to become more efficient. This clarion call for innovation can be heard all around the world, with public services everywhere taking up the message to develop better, smarter, novel, more innovative processes, programs and policies. In the current push for innovation, networks are considered to be a superior vehicle through which collective knowledge can be shared and leveraged; replacing or at least supplementing the role function previously provided by inventive leaders...
Resumo:
What is the understanding of ‘artist’ held by a person with a mental illness? Being diagnosed with a mental illness often results in social isolation. Art programs are often used to address this isolation, and to expedite positive mental health and wellbeing. In these programs the cultural value of art can be moderated and replaced with therapeutic meanings or used for purposes of community integration. Some individuals develop artistic identities within these programs. These artists personify representative tensions within the art world. Artists with mental illness are symbolically positioned within the history of art as holding special creative providence and, yet are also viewed as having a peripheral position outside the cultural framework of the art world. This research engaged with eight artists to determine the understanding of artist held by a person with a mental illness. Through shared activities around the curatorial aspects of an exhibition entitled "Artist Citizen" the impact of illness, culture and alterity were examined. Overlapping approaches of Community Cultural Development and Participatory Action Research have been used. A perspective of alterity is given which was apparent in transformative processes of the research. This thesis shows that alterity and difference are both important social resources as well as positions of isolation and discrimination. Finally, conclusions are presented that indicated that a more nuanced understanding of alterity offers potential to discussions of the complex experiences of a person with a mental illness to negotiate subjective constructions of an identity for participation in broader political, social, health and cultural contexts.