955 resultados para Usina Hidrelétrica Peixe Angical (TO)
Resumo:
Despite the numerous observations that dynamic capabilities lie at the source of competitive advantage, we still have limited knowledge as to how access to firm-based resources and changes to these affect the development of dynamic capabilities. In this paper, we examine founder human capital, access to employee human capital, access to technological expertise, access to other specific expertise, and access to two types of tangible resources in a sample of new firms in Sweden. We empirically measure four dynamic capabilities and find that the nature and effect of resources employed in the development of these capabilities vary greatly. For the most part, there are positive effects stemming from access to particular resources. However, for some resources, such as access to employee human capital and access to financial capital, unexpected negative effects also appear. This study therefore provides statistical evidence as to the varying role of resources in capability development. Importantly, we also find that changes in resource bases have more influential roles in the development of dynamic capabilities than the resource stock variables that were measured at an earlier stage of firm development. This provides empirical support for the notion of treating the firm as a dynamic flow of resources as opposed to a static stock. This finding also highlights the importance of longitudinal designs in studies of dynamic capability development. Further recommendations for future empirical studies of dynamic capabilities are presented.
Resumo:
This review article uses the work of Italian scholar Milly Buonanno to review the state and future of television scholarship, given that the ‘age of television’ has been overtaken by the age of computer-based media. In particular, it discusses the role of open-ended narrative through which we collectively explore the human condition.
Resumo:
Marketers and commercial media alike are confronted by shifts in the social relations of media production and consumption in the global services economy, including the challenge of capturing, managing and commercialising media-user productivity. This trajectory of change in media cultures and economies is described here as ‘mass conversation’. Two media texts and a new media object provide a starting point for charting the ascendance and social impact of mass conversation. Apple’s 1984 television commercial, which launched the Macintosh computer, inverted George Orwell’s dystopian vision of the social consequences of panoptic communications systems. It invoked a revolutionary rhetoric to anticipate the social consequences of a new type of interactivity since theorised as ‘intercreativity’. This television commercial is contrasted with another used in Nike’s 2006 launch of its Nike+ (Apple iPod) system. The Nike+ online brand community is also used to consider how a multiplatform brand channel is seeking to manage the changing norms and practices of consumption and end-user agency. This analysis shows that intercreativity modifies the operations of ‘Big Brother’ but serves the more mundane than revolutionary purpose of generating commercial value from the affective labour of end-users.
Resumo:
This study investigated the mediating effect of learner selfconcept between conceptions of learning and students' approaches to learning using structural equation modelling. Data were collected using a modified version of Biggs' Learning Process Questionnaire, together with the recently developed 'What is Learning Survey' and 'Learner Self-Concept Scale'. A sample of 355 high school students participated in the study. Results indicate that learner self-concept does mediate between conceptions of meaning and approaches to learning. Students who adopted a deep approach liked learning new things and indirectly viewed learning as experiential, involving social interaction and directly viewed learning as personal development. Implications for teachers are discussed, with consideration given to appropriate classroom practice.
Resumo:
Background. There is considerable debate regarding the clinical issues surrounding the wish to hasten death (WTHD) in the terminally ill. The clinical factors contributing to the WTHD need further investigation among the terminally ill in order to enhance understanding of the clinical assessment and treatment needs that underlie this problem. A more detailed understanding may assist with the development of appropriate therapeutic interventions. Method. A sample of terminally ill cancer patients (N=256) recruited from an in-patient hospice unit, home palliative care service and a general hospital palliative care consulting service from Brisbane Australia between 1998–2001 completed a questionnaire assessing psychological (depression and anxiety), social (family relationship, social support, level of burden on others) and the impact of physical symptoms. The association between these factors and the WTHD was investigated. Results. A high WTHD was reported by 14% of patients. A discriminant function analysis revealed that the following variables were associated with a high WTHD (P<0·001): higher levels of depressive symptoms, being admitted to an in-patient hospice setting, a greater perception of being a burden on others, lower family cohesion, lower levels of social support, higher levels of anxiety and greater impact of physical symptoms. Conclusions. Psychological and social factors are related to a WTHD among terminally ill cancer patients. Greater attention needs to be paid to the assessment of psychological and social issues in order to provide appropriate therapeutic interventions for terminally ill patients.
Resumo:
Chronic wounds are a significant socioeconomic problem for governments worldwide. Approximately 15% of people who suffer from diabetes will experience a lower-limb ulcer at some stage of their lives, and 24% of these wounds will ultimately result in amputation of the lower limb. Hyperbaric Oxygen Therapy (HBOT) has been shown to aid the healing of chronic wounds; however, the causal reasons for the improved healing remain unclear and hence current HBOT protocols remain empirical. Here we develop a three-species mathematical model of wound healing that is used to simulate the application of hyperbaric oxygen therapy in the treatment of wounds. Based on our modelling, we predict that intermittent HBOT will assist chronic wound healing while normobaric oxygen is ineffective in treating such wounds. Furthermore, treatment should continue until healing is complete, and HBOT will not stimulate healing under all circumstances, leading us to conclude that finding the right protocol for an individual patient is crucial if HBOT is to be effective. We provide constraints that depend on the model parameters for the range of HBOT protocols that will stimulate healing. More specifically, we predict that patients with a poor arterial supply of oxygen, high consumption of oxygen by the wound tissue, chronically hypoxic wounds, and/or a dysfunctional endothelial cell response to oxygen are at risk of nonresponsiveness to HBOT. The work of this paper can, in some way, highlight which patients are most likely to respond well to HBOT (for example, those with a good arterial supply), and thus has the potential to assist in improving both the success rate and hence the costeffectiveness of this therapy.
Resumo:
Introduction Many bilinguals will have had the experience of unintentionally reading something in a language other than the intended one (e.g. MUG to mean mosquito in Dutch rather than a receptacle for a hot drink, as one of the possible intended English meanings), of finding themselves blocked on a word for which many alternatives suggest themselves (but, somewhat annoyingly, not in the right language), of their accent changing when stressed or tired and, occasionally, of starting to speak in a language that is not understood by those around them. These instances where lexical access appears compromised and control over language behavior is reduced hint at the intricate structure of the bilingual lexical architecture and the complexity of the processes by which knowledge is accessed and retrieved. While bilinguals might tend to blame word finding and other language problems on their bilinguality, these difficulties per se are not unique to the bilingual population. However, what is unique, and yet far more common than is appreciated by monolinguals, is the cognitive architecture that subserves bilingual language processing. With bilingualism (and multilingualism) the rule rather than the exception (Grosjean, 1982), this architecture may well be the default structure of the language processing system. As such, it is critical that we understand more fully not only how the processing of more than one language is subserved by the brain, but also how this understanding furthers our knowledge of the cognitive architecture that encapsulates the bilingual mental lexicon. The neurolinguistic approach to bilingualism focuses on determining the manner in which the two (or more) languages are stored in the brain and how they are differentially (or similarly) processed. The underlying assumption is that the acquisition of more than one language requires at the very least a change to or expansion of the existing lexicon, if not the formation of language-specific components, and this is likely to manifest in some way at the physiological level. There are many sources of information, ranging from data on bilingual aphasic patients (Paradis, 1977, 1985, 1997) to lateralization (Vaid, 1983; see Hull & Vaid, 2006, for a review), recordings of event-related potentials (ERPs) (e.g. Ardal et al., 1990; Phillips et al., 2006), and positron emission tomography (PET) and functional magnetic resonance imaging (fMRI) studies of neurologically intact bilinguals (see Indefrey, 2006; Vaid & Hull, 2002, for reviews). Following the consideration of methodological issues and interpretative limitations that characterize these approaches, the chapter focuses on how the application of these approaches has furthered our understanding of (1) selectivity of bilingual lexical access, (2) distinctions between word types in the bilingual lexicon and (3) control processes that enable language selection.
Resumo:
Counselling children often requires the use of supplementary strategies in order to interest and engage the child in the therapeutic process. One such strategy is the Metaphorical Fruit Tree (MFT); an art metaphor suited to exploring and developing self-concept. Quantitative and qualitative data was used to explore the relationships between children’s ability to use metaphor, age, gender, and level of emotional competence (N = 58). Quantitative and qualitative analyses revealed a significant negative relationship between self-reported emotional competence and ability to use the MFT. It is proposed that children rely on different processes to understand self and as children’s ability to cognitively report on their emotional capabilities via the Emotional Competence Questionnaire (ECQ) increases, their ability to report creatively on those capabilities via the MFT is undermined. It is suggested that the MFT may be used, via creative processes and as an alternative to cognitive processes, to increase understanding and awareness of intrapersonal and interpersonal concepts of self in the child during counselling.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Various reasons have been proffered for female under-representation in tertiary information technology (IT) courses and the IT industry with most relating to cultural moirés. The 2006 Geek Goddess calendar was designed to alter IT’s “geeky image” and the term is used here to represent young women enrolled in pre-service IT teaching courses. Their special mix of IT and teaching draws on conflicting stereotypes and represents a micro-climate which is typically lost in studies of IT occupations because of the aggregation of all IT roles. This paper will report on a small-scale investigation of female students (N=25) at a university in Queensland (Australia) studying to become teachers of secondary IT subjects. They are entering the IT industry, gendered as a “male” occupation, through the safe space of teaching a discipline allied to feminine qualities of nurturing. They are “geek goddesses” who – perhaps to balance the masculine and feminine of these occupations - have decided to go to school rather than into corporations or government.
Resumo:
The building life cycle process is complex and prone to fragmentation as it moves through its various stages. The number of participants, and the diversity, specialisation and isolation both in space and time of their activities, have dramatically increased over time. The data generated within the construction industry has become increasingly overwhelming. Most currently available computer tools for the building industry have offered productivity improvement in the transmission of graphical drawings and textual specifications, without addressing more fundamental changes in building life cycle management. Facility managers and building owners are primarily concerned with highlighting areas of existing or potential maintenance problems in order to be able to improve the building performance, satisfying occupants and minimising turnover especially the operational cost of maintenance. In doing so, they collect large amounts of data that is stored in the building’s maintenance database. The work described in this paper is targeted at adding value to the design and maintenance of buildings by turning maintenance data into information and knowledge. Data mining technology presents an opportunity to increase significantly the rate at which the volumes of data generated through the maintenance process can be turned into useful information. This can be done using classification algorithms to discover patterns and correlations within a large volume of data. This paper presents how and what data mining techniques can be applied on maintenance data of buildings to identify the impediments to better performance of building assets. It demonstrates what sorts of knowledge can be found in maintenance records. The benefits to the construction industry lie in turning passive data in databases into knowledge that can improve the efficiency of the maintenance process and of future designs that incorporate that maintenance knowledge.