865 resultados para expansion of existing schools


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Hematopoietic stem cell (HSC) transplant is a well established curative therapy for some hematological malignancies. However, achieving adequate supply of HSC from some donor tissues can limit both its application and ultimate efficacy. The theory that this limitation could be overcome by expanding the HSC population before transplantation has motivated numerous laboratories to develop ex vivo expansion processes. Pioneering work in this field utilized stromal cells as support cells in cocultures with HSC to mimic the HSC niche. We hypothesized that through translation of this classic coculture system to a three-dimensional (3D) structure we could better replicate the niche environment and in turn enhance HSC expansion. Herein we describe a novel high-throughput 3D coculture system where murine-derived HSC can be cocultured with mesenchymal stem/stromal cells (MSC) in 3D microaggregates—which we term “micromarrows.” Micromarrows were formed using surface modified microwells and their ability to support HSC expansion was compared to classic two-dimensional (2D) cocultures. While both 2D and 3D systems provide only a modest total cell expansion in the minimally supplemented medium, the micromarrow system supported the expansion of approximately twice as many HSC candidates as the 2D controls. Histology revealed that at day 7, the majority of bound hematopoietic cells reside in the outer layers of the aggregate. Quantitative polymerase chain reaction demonstrates that MSC maintained in 3D aggregates express significantly higher levels of key hematopoietic niche factors relative to their 2D equivalents. Thus, we propose that the micromarrow platform represents a promising first step toward a high-throughput HSC 3D coculture system that may enable in vitro HSC niche recapitulation and subsequent extensive in vitro HSC self-renewal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The efficacy of existing articular cartilage defect repair strategies are limited. Native cartilage tissue forms via a series of exquisitely orchestrated morphogenic events spanning through gestation into early childhood. However, defect repair must be achieved in a non-ideal microenvironment over an accelerated time-frame compatible with the normal life of an adult patient. Scaffolds formed from decellularized tissues are commonly utilized to enable the rapid and accurate repair of tissues such as skin, bladder and heart valves. The intact extracellular matrix remaining following the decellularization of these relatively low-matrix-density tissues is able to rapidly and accurately guide host cell repopulation. By contrast, the extraordinary density of cartilage matrix limits both the initial decellularization of donor material as well as its subsequent repopulation. Repopulation of donor cartilage matrix is generally limited to the periphery, with repopulation of lacunae deeper within the matrix mass being highly inefficient. Herein, we review the relevant literature and discuss the trend toward the use of decellularized donor cartilage matrix of microscopic dimensions. We show that 2-µm microparticles of donor matrix are rapidly integrate with articular chondrocytes, forming a robust cartilage-like composites with enhanced chondrogenic gene expression. Strategies for the clinical application of donor matrix microparticles in cartilage defect repair are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an approach to developing indicators for expressing resilience of a generic water supply system. The system is contextualised as a meta-system consisting of three subsystems to represent the water catchment and reservoir, treatment plant and the distribution system supplying the end-users. The level of final service delivery to end-users is considered as a surrogate measure of systemic resilience. A set of modelled relationships are used to explore relationships between system components when placed under simulated stress. Conceptual system behaviour of specific types of simulated pressure is created for illustration of parameters for indicator development. The approach is based on the hypothesis that an in-depth knowledge of resilience would enable development of decision support system capability which in turn will contribute towards enhanced management of a water supply system. In contrast to conventional water supply system management approaches, a resilience approach facilitates improvement in system efficiency by emphasising awareness of points-of-intervention where system managers can adjust operational control measures across the meta-system (and within subsystems) rather than expansion of the system in entirety in the form of new infrastructure development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Over the last two decades, moves toward “inclusion” have prompted change in the formation of education policies, schooling structures and pedagogical practice. Yet, exclusion through the categorisation and segregation of students with diverse abilities has grown; particularly for students with challenging behaviour. This paper considers what has happened to inclusive education by focusing on three educational jurisdictions known to be experiencing different rates of growth in the identification of special educational needs: New South Wales (Australia), Alberta (Canada) and Finland (Europe). In our analysis, we consider the effects of competing policy forces that appear to thwart the development of inclusive schools in two of our case-study regions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The last few decades have witnessed a broad international movement towards the development of inclusive schools through targeted special education funding and resourcing policies. Student placement statistics are often used as a barometer of policy success but they may also be an indication of system change. In this paper, trends in student enrolments from the Australian state of New South Wales are considered in an effort to understand what effect inclusive education has had in this particular region of the world.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the explosion of Web 2.0 application such as blogs, social and professional networks, and various other types of social media, the rich online information and various new sources of knowledge flood users and hence pose a great challenge in terms of information overload. It is critical to use intelligent agent software systems to assist users in finding the right information from an abundance of Web data. Recommender systems can help users deal with information overload problem efficiently by suggesting items (e.g., information and products) that match users’ personal interests. The recommender technology has been successfully employed in many applications such as recommending films, music, books, etc. The purpose of this report is to give an overview of existing technologies for building personalized recommender systems in social networking environment, to propose a research direction for addressing user profiling and cold start problems by exploiting user-generated content newly available in Web 2.0.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Clinical work with people who have survived trauma carries a risk of vicarious traumatisation for the service provider, but also the potential for vicarious posttraumatic growth. Despite growing interest in this area, the effects of working with survivors of refugee-related trauma have remained relatively unexplored. The aim of the current study was to examine the lived experiences of people working on a daily basis with survivors of torture and trauma who had sought refuge in Australia. Seventeen clinical, administrative, and managerial staff from a not-for-profit organisation participated in a semi-structured interview that was later analysed using interpretive phenomenological analysis. Analysis of the data demonstrated that the entire sample reported symptoms of vicarious trauma (e.g., strong emotional reactions, intrusive images, shattering of existing beliefs) as well as vicarious posttraumatic growth (e.g., forming new relationships, increased self-understanding, greater appreciation of life). Moreover, effortful meaning making processes appeared to facilitate such positive changes. Reduction in the risks associated with this work, enhancement of clinician well-being, and improvement of therapeutic outcomes is a shared responsibility of the organisation and clinician. Without negating the distress of trauma work, clinicians are encouraged to more deeply consider the unique positive outcomes that supporting survivors can provide.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Low-cost level crossings are often criticized as being unsafe. Does a SIL (safety integrity level) rating make the railway crossing any safer? This paper discusses how a supporting argument might be made for low-cost level crossing warning devices with lower levels of safety integrity and issues such as risk tolerability and derivation of tolerable hazard rates for system-level hazards. As part of the design of such systems according to fail-safe principles, the paper considers the assumptions around the pre-defined safe states of existing warning devices and how human factors issues around such states can give rise to additional hazards.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: When experiencing sleep problems for the first time, consumers may often approach community pharmacists for advice as they are easily accessible health care professionals in the community. In Australian community pharmacies there are no specific tools available for use by pharmacists to assist with the assessment and handling of consumers with sleep enquiries. Objective: To assess the feasibility of improving the detection of sleep disorders within the community through the pilot of a newly developed Community Pharmacy Sleep Assessment Tool (COP-SAT). Method: The COP-SAT was designed to incorporate elements from a number of existing, standardized, and validated clinical screening measures. The COP-SAT was trialed in four Australian community pharmacies over a 4-week period. Key findings: A total of 241 community pharmacy consumers were assessed using the COP-SAT. A total of 74 (30.7%) were assessed as being at risk of insomnia, 26 (10.7%) were at risk of daytime sleepiness, 19 (7.9%) were at risk of obstructive sleep apnea, and 121 (50.2%) were regular snorers. A total of 116 (48.1%) participants indicated that they consume caffeine before bedtime, of which 55 (47%) had associated symptoms of sleep onset insomnia. Moreover, 85 (35%) consumed alcohol before bedtime, of which 50 (58%) experienced fragmented sleep, 50 (58%) were regular snorers, and nine (10.6%) had apnea symptoms. The COP-SAT was feasible in the community pharmacy setting. The prevalence of sleep disorders in the sampled population was high, but generally consistent with previous studies on the general population. Conclusion: A large proportion of participants reported sleep disorder symptoms, and a link was found between the consumption of alcohol and caffeine substances at bedtime and associated symptoms. While larger studies are needed to assess the clinical properties of the tool, the results of this feasibility study have demonstrated that the COP-SAT may be a practical tool for the identification of patients at risk of developing sleep disorders in the community.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Grenada’s New Jewel Movement, led by Maurice Bishop, was the first indigenous political grouping in the history of the English-speaking Caribbean to overthrow an existing government by armed force. Yet most of the four and a half years of the Revolution (1979-83) were characterized by considerable popular support for the new People’s Revolutionary Government before it came to it’s tragic, unexpected and shocking end in October 1983. Social, economic and political change seems possible in the 1970s and ‘80s. People in newly decolonizing countries were encouraged by the beginnings of the Non-Aligned Movement of Third World nations demanding new international economic order that would win them some economic justice after the ravages of colonialism. People also saw that some radical regimes, such as that led by Michael Manley in Jamaica and the Sandinistas in Nicaragua, were articulating and implementing basic rights that held the promise of countering the social and political oppression that they had endured throughout the centuries of colonial history. A majority of Grenadians committed themselves to fighting by the side of the People’s Revolutionary Government for such new goals. This chapter will analyse how the Grenada Revolution reconceptualised the education, planned new goals, and implemented bold new educational policies. It will discuss the extent to which the government and people were able to reshape education as a tool for national reconstruction and the raising of national consciousness.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A recent comment in the Journal of Sports Sciences (MacNamara & Collins, 2011) highlighted some major concerns with the current structure of talent identification and development (TID) programmes of Olympic athletes (e.g. Gulbin, 2008; Vaeyens, Gullich, Warr, & Philippaerts, 2009). In a cogent commentary, MacNamara and Collins (2011) provided a short review of the extant literature, which was both timely and insightful. Specifically, they criticised the ubiquitous one-dimensional ‘physically-biased’ attempts to produce world class performers, emphasising the need to consider a number of key environmental variables in a more multi-disciplinary perspective. They also lamented the wastage of talent, and alluded to the operational and opportunistic nature of current talent transfer programmes. A particularly compelling aspect of the comment was their allusion to high profile athletes who had ‘failed’ performance evaluation tests and then proceeded to succeed in that sport. This issue identifies a problem with current protocols for evaluating performance and is a line of research that is sorely needed in the area of talent development. To understand the nature of talent wastage that might be occurring in high performance programmes in sport, future empirical work should seek to follow the career paths of ‘successful’ and ‘unsuccessful’ products of TID programmes, in comparative analyses. Pertinent to the insights of MacNamara and Collins (2011), it remains clear that a number of questions have not received enough attention from sport scientists interested in talent development, including: (i) why is there so much wastage of talent in such programmes? And (ii), why are there so few reported examples of successful talent transfer programmes? These questions highlight critical areas for future investigation. The aim of this short correspondence is to discuss these and other issues researchers and practitioners might consider, and to propose how an ecological dynamics underpinning to such investigations may help the development of existing protocols...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The International Classification of Functioning, Disability and Health (ICF) assumes a biopsychosocial basis for disability and provides a framework for understanding how environmental factors contribute to the experience of disability. To determine the utility of prevalent disability assessment instruments, the authors examined the extent to which a range of such instruments addressed the impact of environmental factors on the individual and whether the instruments designed for different disability groups focused differentially on the environment. Items from 20 widely used disability assessment instruments were linked to the five chapters of the ICF environment component using standardized classification rules. Nineteen of the 20 instruments reviewed measured the environment to varying degrees. It was determined that environmental factors from the Natural Environment and Attitudes chapters were not well accommodated by the majority of instruments. Instruments developed for people with intellectual disabilities had the greatest environmental coverage. Only one instrument provided a relatively comprehensive and economical account of environmental barriers. The authors conclude that ICF classification of environmental factors provides a valuable resource for evaluating the environmental content of existing disability-related instruments, and that it may also provide a useful framework for revising instruments in use and for developing future disability assessment instruments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Management of groundwater systems requires realistic conceptual hydrogeological models as a framework for numerical simulation modelling, but also for system understanding and communicating this to stakeholders and the broader community. To help overcome these challenges we developed GVS (Groundwater Visualisation System), a stand-alone desktop software package that uses interactive 3D visualisation and animation techniques. The goal was a user-friendly groundwater management tool that could support a range of existing real-world and pre-processed data, both surface and subsurface, including geology and various types of temporal hydrological information. GVS allows these data to be integrated into a single conceptual hydrogeological model. In addition, 3D geological models produced externally using other software packages, can readily be imported into GVS models, as can outputs of simulations (e.g. piezometric surfaces) produced by software such as MODFLOW or FEFLOW. Boreholes can be integrated, showing any down-hole data and properties, including screen information, intersected geology, water level data and water chemistry. Animation is used to display spatial and temporal changes, with time-series data such as rainfall, standing water levels and electrical conductivity, displaying dynamic processes. Time and space variations can be presented using a range of contouring and colour mapping techniques, in addition to interactive plots of time-series parameters. Other types of data, for example, demographics and cultural information, can also be readily incorporated. The GVS software can execute on a standard Windows or Linux-based PC with a minimum of 2 GB RAM, and the model output is easy and inexpensive to distribute, by download or via USB/DVD/CD. Example models are described here for three groundwater systems in Queensland, northeastern Australia: two unconfined alluvial groundwater systems with intensive irrigation, the Lockyer Valley and the upper Condamine Valley, and the Surat Basin, a large sedimentary basin of confined artesian aquifers. This latter example required more detail in the hydrostratigraphy, correlation of formations with drillholes and visualisation of simulation piezometric surfaces. Both alluvial system GVS models were developed during drought conditions to support government strategies to implement groundwater management. The Surat Basin model was industry sponsored research, for coal seam gas groundwater management and community information and consultation. The “virtual” groundwater systems in these 3D GVS models can be interactively interrogated by standard functions, plus production of 2D cross-sections, data selection from the 3D scene, rear end database and plot displays. A unique feature is that GVS allows investigation of time-series data across different display modes, both 2D and 3D. GVS has been used successfully as a tool to enhance community/stakeholder understanding and knowledge of groundwater systems and is of value for training and educational purposes. Projects completed confirm that GVS provides a powerful support to management and decision making, and as a tool for interpretation of groundwater system hydrological processes. A highly effective visualisation output is the production of short videos (e.g. 2–5 min) based on sequences of camera ‘fly-throughs’ and screen images. Further work involves developing support for multi-screen displays and touch-screen technologies, distributed rendering, gestural interaction systems. To highlight the visualisation and animation capability of the GVS software, links to related multimedia hosted online sites are included in the references.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose - Researchers debate whether tacit knowledge sharing through Information Technology (IT) is actually possible. However, with the advent of social web tools, it has been argued that most shortcomings of tacit knowledge sharing are likely to disappear. This paper has two purposes: firstly, to demonstrate the existing debates in the literature regarding tacit knowledge sharing using IT, and secondly, to identify key research gaps that lay the foundations for future research into tacit knowledge sharing using social web. Design/methodology/approach - This paper reviews current literature on IT-mediated tacit knowledge sharing and opens a discussion on tacit knowledge sharing through the use of social web. Findings - First, the existing schools of thoughts in regards to IT ability for tacit knowledge sharing are introduced. Next, difficulties of sharing tacit knowledge through the use of IT are discussed. Then, potentials and pitfalls of social web tools are presented. Finally, the paper concludes that whilst there are significant theoretical arguments supporting that the social web facilitates tacit knowledge sharing there is a lack of empirical evidence to support these arguments and further work is required. Research limitations/implications - The limitations of the review includes: covering only papers that were published in English, issues of access to full texts of some resources, possibility of missing some resources due to search strings used or limited coverage of databases searched. Originality/value - The paper contributes to the fast growing literature on the intersection of KM and IT particularly by focusing on tacit knowledge sharing in social media space. The paper highlights the need for further studies in this area by discussing the current situation in the literature and disclosing the emerging questions and gaps for future studies.