932 resultados para Gale, George W.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In daily activities people are using a number of available means for the achievement of balance, such as the use of hands and the co-ordination of balance. One of the approaches that explains this relationship between perception and action is the ecological theory that is based on the work of a) Bernstein (1967), who imposed the problem of ‘the degrees of freedom’, b) Gibson (1979), who referred to the theory of perception and the way which the information is received from the environment in order for a certain movement to be achieved, c) Newell (1986), who proposed that movement can derive from the interaction of the constraints that imposed from the environment and the organism and d) Kugler, Kelso and Turvey (1982), who showed the way which “the degrees of freedom” are connected and interact. According to the above mentioned theories, the development of movement co-ordination can result from the different constraints that imposed into the organism-environment system. The close relation between the environmental and organismic constraints, as well as their interaction is responsible for the movement system that will be activated. These constraints apart from shaping the co-ordination of specific movements can be a rate limiting factor, to a certain degree, in the acquisition and mastering of a new skill. This frame of work can be an essential tool for the study of catching an object (e.g., a ball). The importance of this study becomes obvious due to the fact that movements that involved in catching an object are representative of every day actions and characteristic of the interaction between perception and action.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper employs empirical evidence from a survey of Queensland secondary school students to examine their knowledge about their wages and working conditions. It does so within the theoretical lens of the Gagne (or Gagne-Briggs) theory of instruction, which centres on the content of learning and how learning is acquired (Gagne, Briggs & Wager, 1988). While Gagne articulates five categories of learning, our focus here is on two; verbal information or declarative knowledge (facts that people can declare), and procedural knowledge (the rules and procedures for achieving outcomes). We show that student workers know little about the instruments governing their employment, or their workplace entitlements. Of the total sample of year 9 and year 11 students surveyed (n=892), those students who worked, or who had worked in the past year (n=438), were asked to identify whether they were employed under an award, collective agreement or AWA. Eighty three per cent of students did not know which industrial instrument set their wages. We argue that if young workers do not have declarative knowledge of their entitlements, nor basic procedural knowledge about redress, then they are not in a position to deploy Gagne’s ‘cognitive strategies’ that would enable them to take action to ensure their working conditions meet legal minima. We advocate that young workers should be given summary information on their wages and other entitlements on appointment and that such summary information should be readily available on employers’ noticeboards and electronically on company websites, and that the information should include a brief summary of avenues for redressing issues of underpayment or sub-standard conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ERP systems generally implement controls to prevent certain common kinds of fraud. In addition however, there is an imperative need for detection of more sophisticated patterns of fraudulent activity as evidenced by the legal requirement for company audits and the common incidence of fraud. This paper describes the design and implementation of a framework for detecting patterns of fraudulent activity in ERP systems. We include the description of six fraud scenarios and the process of specifying and detecting the occurrence of those scenarios in ERP user log data using the prototype software which we have developed. The test results for detecting these scenarios in log data have been verified and confirm the success of our approach which can be generalized to ERP systems in general.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Drawn from a larger mixed methods study, this case study provides an account of aspects of the music education programme that occurred with one teacher and a kindergarten class of children aged three and four years. Contrary to transmission approaches that are often used in Hong Kong, the case depicts how musical creativity was encouraged by the teacher in response to children’s participation during the time for musical free play. It shows how the teacher scaffolded the attempts of George, a child aged 3.6 years to use musical notation. The findings are instructive for kindergarten teachers in Hong Kong and suggest ways in which teachers might begin to incorporate more creative approaches to musical education. They are also applicable to other kindergarten settings where transmission approaches tend to dominate and teachers want to encourage children’s musical creativity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Shelton, Edward Mason; p.548 Sherwood Arboretum; p.550 Soutter, William; pp.563-564 Styles or gardens and designed landscapes; pp.575-576 Summer-house; pp.579-580 Trapnell, Walter George; p.602 Tropical Gardens; pp.604-605 Wickham Park; p.642 Wijaya, Made; p.642 Williams, George; p.644 Williams, Keith A.W.; p.644 Verandah Garadening; p.614

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe research into the identification of anomalous events and event patterns as manifested in computer system logs. Prototype software has been developed with a capability that identifies anomalous events based on usage patterns or user profiles, and alerts administrators when such events are identified. To reduce the number of false positive alerts we have investigated the use of different user profile training techniques and introduce the use of abstractions to group together applications which are related. Our results suggest that the number of false alerts that are generated is significantly reduced when a growing time window is used for user profile training and when abstraction into groups of applications is used.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In today's technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Shelton, E.M. (p.548); Sherwood Arboretum (p.550); Soutter, William (pp.563-4); Styles (pp.575-6); Summer-House (579-580); Trapnell, W.G. (p.602); Tropical Gardens (pp.604-5);Verandah Gardening (p.614); Wickham Park (p.642); Wijaya, Made (p.642); Williams, George (p.644); Williams Keith A (p.644).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Membranes prepared from a protein, fibroin, isolated from domesticated silkworm (Bombyx mori) silk, support the cultivation of human limbal epithelial (HLE) cells and thus display significant potential as biomaterials for ocular surface reconstruction. We presently extend this promising avenue of research by directly comparing the attachment, morphology and phenotype of primary HLE cell cultures grown on fibroin to that observed on donor amniotic membrane (AM), the current clinical standard substrate for HLE transplantation. Fibroin membranes measuring 6.3 ± 0.5 μm (mean ± sd) in thickness and permeable to FITC dextran of a molecular weight up to 70 kDa, were used. Attachment of HLE cells to fibroin was similar to that supported by tissue culture plastic but approximately 6-fold less than that observed on AM. Nevertheless, epithelia constructed from HLE on fibroin maintained evidence of corneal phenotype (K3/K12 expression) and displayed a comparable number and distribution of ΔNp63+ progenitor cells to that seen in cultures grown on AM. These results support the suitability of membranes constructed from Bombyx mori silk fibroin as substrata for HLE cultivation and encourage progression to studies of efficacy in preclinical models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Under pressure from both the ever increasing level of market competition and the global financial crisis, clients in consumer electronics (CE) industry are keen to understand how to choose the most appropriate procurement method and hence to improve their competitiveness. Four rounds of Delphi questionnaire survey were conducted with 12 experts in order to identify the most appropriate procurement method in the Hong Kong CE industry. Five key selection criteria in the CE industry are highlighted, including product quality, capability, price competition, flexibility and speed. This study also revealed that product quality was found to be the most important criteria for the “First type used commercially” and “Major functional improvements” projects. As for “Minor functional improvements” projects, price competition was the most crucial factor to be considered during the PP selection. These research findings provide owners with useful insights to select the procurement strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Membranes prepared from Bombyx mori silk fibroin have shown potential as a substrate for human limbal epithelial (L-EC) and stromal cell cultivation. Here we present fibroin as a dual-layer construct containing both an epithelium and underlying stroma for corneolimbal reconstruction. We have compared the growth and phenotype of L-EC on non-porous versus porous fibroin membranes. Furthermore, we have compared the growth of limbal mesenchymal stromal cells (L-MSC) in either serum-supplemented medium or the MesenCult-XF® culture system within fibroin fibrous mats. The co-culture of L-EC and L-MSC in fibroin dual-layer constructs was also examined. L-EC on porous membranes displayed a squamous monolayer; in contrast, L-EC on non-porous fibroin appeared cuboidal and stratified. Both constructs maintained evidence of corneal phenotype (cytokeratin 3/12) and distribution of ΔNp63+ progenitor cells. L-MSC cultivated within fibroin fibrous mats in serum-supplemented medium contained less than 64% of cells expressing the characteristic MSC phenotype of CD73+CD90+CD105+ after two weeks, compared with over 81% in MesenCult-XF® medium. Dual-layer fibroin scaffolds consisting of L-EC and L-MSC maintained a similar phenotype as on the separate layers. These results support the feasibility of a 3D engineered limbus constructed from B. mori silk fibroin, and warrant further studies into the potential benefits it offers to corneolimbal tissue regeneration.