890 resultados para 3G mobile communication
Resumo:
Focuses on the importance of communication to the well-being of older people in Australia. Role of communication for the design, delivery and evaluation of health services for the elderly; Impact of aging on communication; Importance of communication between health care providers and nursing home residents.
Resumo:
The aim of the study was to determine how aspects of communication between nurses and the elderly were perceived by elderly people, future nurses, and uninvolved observers. Respondents (elderly women and nursing and psychology students) rated videotapes of interactions between a nurse and an elderly woman on three dimensions: patronizing, status, and solidarity. Three communication strategies and their combinations were represented in the vignettes. Because the strategies presented were perceived as patronizing by all three groups, no group effect was found for the patronizing dimension. The results show clear group differences particularly between the nursing students and the elderly, with the elderly rating many of the strategies more positively than did the nursing students. The results are discussed in relation to previous evaluations of overaccommodation, and implications of the different perceptions are considered.
Resumo:
In this panel, we showcase approaches to teaching for creativity in disciplines of the Media, Entertainment and Creative Arts School and the School of Design within the Creative Industries Faculty (CIF) at QUT. The Faculty is enormously diverse, with 4,000 students enrolled across a total of 20 disciplines. Creativity is a unifying concept in CIF, both as a graduate attribute, and as a key pedagogic principle. We take as our point of departure the assertion that it is not sufficient to assume that students of tertiary courses in creative disciplines are ‘naturally’ creative. Rather, teachers in higher education must embrace their roles as facilitators of development and learning for the creative workforce, including working to build creative capacity (Howkins, 2009). In so doing, we move away from Renaissance notions of creativity as an individual genius, a disposition or attribute which cannot be learned, towards a 21st century conceptualisation of creativity as highly collaborative, rhizomatic, and able to be developed through educational experiences (see, for instance, Robinson, 2006; Craft; 2001; McWilliam & Dawson, 2008). It has always been important for practitioners of the arts and design to be creative. Under the national innovation agenda (Bradley et al, 2008) and creative industries policy (e.g., Department for Culture, Media and Sport, 2008; Office for the Arts, 2011), creativity has been identified as a key determinant of economic growth, and thus developing students’ creativity has now become core higher education business across all fields. Even within the arts and design, professionals are challenged to be creative in new ways, for new purposes, in different contexts, and using new digital tools and platforms. Teachers in creative disciplines may have much to offer to the rest of the higher education sector, in terms of designing and modelling innovative and best practice pedagogies for the development of student creative capability. Information and Communication Technologies such as mobile learning, game-based learning, collaborative online learning tools and immersive learning environments offer new avenues for creative learning, although analogue approaches may also have much to offer, and should not be discarded out of hand. Each panelist will present a case study of their own approach to teaching for creativity, and will address the following questions with respect to their case: 1. What conceptual view of creativity does the case reflect? 2. What pedagogical approaches are used, and why were these chosen? What are the roles of innovative learning approaches, including ICTs, if any? 3. How is creativity measured or assessed? How do students demonstrate creativity? We seek to identify commonalities and contrasts between and among the pedagogic case studies, and to answer the question: what can we learn about teaching creatively and teaching for creativity from CIF best practice?
Resumo:
New technologies and the pace of change in modern society mean changes for classroom teaching and learning. Information and communication technologies (ICTs) feature in everyday life and provide ample opportunities for enhancing classroom programs. This article outlines how ICTs complement curriculum implementation in one year two classroom. It suggests practical strategies demonstrating how teachers can make ICTs work for them and progressively teach children how to make ICTs work for them.
Resumo:
“Our students have changed radically. Today’s students are no longer the people our educational system was designed to teach” (Prensky, 2001, p. 1). The influx of available new technology has helped to democratise knowledge, transforming when, where and how learning takes place, and changing perceptions of traditional learning landscapes (JISC, 2006; Neary et al., 2010). Mobile computers combined with wireless technology, have completely transformed the educational world; students have turned nomad[ic], engaging in conversations and thinking across traditional campus spaces (Alexander, 2004; Fisher, 2005). In this workshop we will be attempting to de-mystify a facet of mobile learning, by working in small groups to set up and kick start a number of social media sites, which can be used for collaboration and information exchange, in the design studio.
Resumo:
Climate change and land use pressures are making environmental monitoring increasingly important. As environmental health is degrading at an alarming rate, ecologists have tried to tackle the problem by monitoring the composition and condition of environment. However, traditional monitoring methods using experts are manual and expensive; to address this issue government organisations designed a simpler and faster surrogate-based assessment technique for consultants, landholders and ordinary citizens. However, it remains complex, subjective and error prone. This makes collected data difficult to interpret and compare. In this paper we describe a work-in-progress mobile application designed to address these shortcomings through the use of augmented reality and multimedia smartphone technology.
Resumo:
Our everyday environment is full of text but this rich source of information remains largely inaccessible to mobile robots. In this paper we describe an active text spotting system that uses a small number of wide angle views to locate putative text in the environment and then foveates and zooms onto that text in order to improve the reliability of text recognition. We present extensive experimental results obtained with a pan/tilt/zoom camera and a ROS-based mobile robot operating in an indoor environment.
Resumo:
This chapter explores a cultural perspective on the development of strategic communication. It identifies cultural influences on organizational knowledge structures and the work of cultural schema on organizational processes of environmental interpretation. It describes the implications of the structures and processes for strategic communication. The chapter documents that strategic communication may reflect outcomes of cultural selection acting in the knowledge system of an organization as much as it reflects empirical imperatives of the external social environment.
Resumo:
Smartphones become very critical part of our lives as they offer advanced capabilities with PC-like functionalities. They are getting widely deployed while not only being used for classical voice-centric communication. New smartphone malwares keep emerging where most of them still target Symbian OS. In the case of Symbian OS, application signing seemed to be an appropriate measure for slowing down malware appearance. Unfortunately, latest examples showed that signing can be bypassed resulting in new malware outbreak. In this paper, we present a novel approach to static malware detection in resource-limited mobile environments. This approach can be used to extend currently used third-party application signing mechanisms for increasing malware detection capabilities. In our work, we extract function calls from binaries in order to apply our clustering mechanism, called centroid. This method is capable of detecting unknown malwares. Our results are promising where the employed mechanism might find application at distribution channels, like online application stores. Additionally, it seems suitable for directly being used on smartphones for (pre-)checking installed applications.
Resumo:
Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.
Resumo:
In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.
Resumo:
Review of Soft Power in China: Public diplomacy through communication, edited by J IAN WANG, New York, Palgrave Macmillan, 2011, US$89 (hard), 220 pp
Resumo:
ICT integration has been advocated to provide opportunities to improve students’ achievement and engagement through transforming the educational setting. A valuable tool that contributes in enhancing and developing students’ cognitive skills for lifelong learning, ICT integration has introduced a new educational philosophy, shifting the role of students into a more central position in the pedagogical processes. Kuwait, as with many other countries, has recently planned ICT integration to develop its citizen’s capacities. This study sought to capture the principals’, teachers’, and students’ perceptions of ICT integration in pedagogical activities, as well as how ICT is being used for learning and teaching activities in three ICT leading Kuwaiti secondary schools. Interviews with principals, teachers, and students were conducted, along with an open-ended questionnaire for the teachers, researcher observations, and document analysis. The findings revealed that ICT integration in Kuwait needed to be reinforced to accomplish the ICT integration objectives. A call for further support for teachers, and a reconsideration of the ICT integration strategies were also recommended.