836 resultados para Forward osmosis
Resumo:
Previous research has suggested that perceptual-motor difficulties may account for obese children's lower motor competence; however, specific evidence is currently lacking. Therefore, this study examined the effect of altered visual conditions on spatiotemporal and kinematic gait parameters in obese versus normal-weight children. Thirty-two obese and normal-weight children (11.2 ± 1.5 years) walked barefoot on an instrumented walkway at constant self-selected speed during LIGHT and DARK conditions. Three-dimensional motion analysis was performed to calculate spatiotemporal parameters, as well as sagittal trunk segment and lower extremity joint angles at heel-strike and toe-off. Self-selected speed did not significantly differ between groups. In the DARK condition, all participants walked at a significantly slower speed, decreased stride length, and increased stride width. Without normal vision, obese children had a more pronounced increase in relative double support time compared to the normal-weight group, resulting in a significantly greater percentage of the gait cycle spent in stance. Walking in the DARK, both groups showed greater forward tilt of the trunk and restricted hip movement. All participants had increased knee flexion at heel-strike, as well as decreased knee extension and ankle plantarflexion at toe-off in the DARK condition. The removal of normal vision affected obese children's temporal gait pattern to a larger extent than that of normal-weight peers. Results suggest an increased dependency on vision in obese children to control locomotion. Next to the mechanical problem of moving excess mass, a different coupling between perception and action appears to be governing obese children's motor coordination and control.
Resumo:
This paper examines current teaching practice within the context of the Bachelor of Design (Fashion) programme at AUT University and compares it to the approach adopted in previous years. In recent years, staff on the Bachelor of Design (Fashion) adopted a holistic approach to the assessment of design projects similar to the successful ideas and methods put forward by Stella Lange at the FINZ conference, 2005. Prior to adopting this holistic approach, the teaching culture at AUT University was modular and divorced the development of conceptual design ideas from the technical processes of patternmaking and garment construction, thus limiting the creative potential of integrated project work. Fashion Design is not just about drawing pretty pictures but is rather an entire process that encapsulates conceptual design ideas and technical processes within the context of a target market. Fashion design at AUT being under the umbrella of a wider Bachelor of Design must encourage a more serious view of Fashion and Fashion Design as a whole. In the development of the Bachelor of Design degree at AUT, the university recognised that design education would be best serviced by an inclusive approach. At inception, Core Studio and Core Theory papers formed the first semester of the programme across the discipline areas of Fashion, Spatial Design, Graphic Design and Digital Design. These core papers reinforce the reality that there is a common skill set that transcends all design disciplines with the differentiation between disciplines being determined by the techniques and processes they adopt. Studio based teaching within the scope of a major design project was recognised and introduced some time ago for students in their graduating year, however it was also expected that by year 3 the student had amassed the basic skills required to be able to work in this way. The opinion concerning teaching these basic skills was that they were best serviced by a modular approach. Prior attempts to manage design project delivery leant towards deconstructing the newly formed integrated papers in order to ensure key technical skills were covered in enough depth. So, whilst design projects have played an integral part in the delivery of fashion design over the year levels, the earlier projects were timetabled by discipline and unconvincingly connected. This paper discusses how the holistic approach to assessment must be coupled with an integrated approach to delivery. The methods and processes used are demonstrated and some recently trialled developments are shown to have resulted in achieving the integrated approach in both delivery and assessment.
Resumo:
It’s a pleasure for me to be penning my first President’s Message for the AITPM Newsletter. I am eagerly looking forward to serving the Institute and members over the coming couple of years. First though, I’d like to congratulate Andrew Hulse for steering the good ship AITPM over the past two years, bringing so many initiatives to the fore, including the Certified Transport Planner (CTP), stronger ties with other organisations and agencies such as IPENZ and Austroads, mutually beneficial sponsorship arrangements, and sharing his enthusiasm towards the Thunderbirds. Personally and largely thanks to my kids’ domination of the TV I’m a bit keener on the other great British sixties sci-fi classic, Doctor Who. Maybe we can generate a “favourite Doctor” dialogue in the Newsletter.
Resumo:
One of the prominent topics in Business Service Management is business models for (new) services. Business models are useful for service management and engineering as they provide a broader and more holistic perspective on services. Business models are particularly relevant for service innovation as this requires paying attention to the business models that make new services viable and business model innovation can drive the innovation of new and established services. Before we can have a look at business models for services, we first need to understand what business models are. This is not straight-forward as business models are still not well comprehended and the knowledge about business models is fragmented over different disciplines, such as information systems, strategy, innovation, and entrepreneurship. This whitepaper, ‘Understanding business models,’ introduces readers to business models. This whitepaper contributes to enhancing the understanding of business models, in particular the conceptualisation of business models by discussing and integrating business model definitions, frameworks and archetypes from different disciplines. After reading this whitepaper, the reader will have a well-developed understanding about what business models are and how the concept is sometimes interpreted and used in different ways. It will help the reader in assessing their own understanding of business models and that and of others. This will contribute to a better and more beneficial use of business models, an increase in shared understanding, and making it easier to work with business model techniques and tools.
Resumo:
This research provides a systematic and theoretical analysis of the digital challenges to the established exclusive regime of the economic rights enjoyed by authors (and related rightholders) under the law of copyright. Accordingly, this research has developed a relational theory of authorship and a relational approach to copyright, contending that the regulatory emphasis of copyright law should focus on the facilitation of the dynamic relations between the culture, the creators, the future creators, the users and the public, rather than the allocation of resources in a static world. In this networked digital world, the creative works and contents have become increasingly vital for people to engage in creativity and cultural innovation, and for the evolution of the economy. Hence, it is argued that today copyright owners, as content holders, have certain obligations to make their works accessible and available to the public under fair conditions. This research sets forward a number of recommendations for the reform of the current copyright system.
Resumo:
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
Over recent decades, the field of ethics has been the focus of increasing attention in teaching. This is not surprising given that teaching is a moral activity that is heavily values-laden. Because of this, teachers face ethical dilemmas in the course of their daily work. This paper presents an ethical decision-making model that helps to explain the decision-making processes that individuals or groups are likely to experience when confronted by an ethical dilemma. In order to make sense of the model, we put forward three short ethical dilemma scenarios facing teachers and apply the model to interpret them. Here we identify the critical incident, the forces at play that help to illuminate the incident, the choices confronting the individual and the implications of these choices for the individual, organization and community. Based on our analysis and the wider literature we identify several strategies that may help to minimize the impact of ethical dilemmas. These include the importance of sharing dilemmas with trusted others; having institutional structures in schools that lessen the emergence of harmful actions occurring; the necessity for individual teachers to articulate their own personal and professional ethics; acknowledging that dilemmas have multiple forces at play; the need to educate colleagues about specific issues; and the necessity of appropriate preparation and support for teachers. Of these strategies, providing support for teachers via professional development is explored more fully.
Resumo:
The synthesizer has come a long way since wendy Carlos' 'Switched On Bach'. Unfortunately many would not realise it. Synthesizers are in most of the popular and commercial music we hear, and their development has followed the rapid development of computing technology, allowing sugnificant perfromance leaps every five years. In the last 10 years or so, the physical interface of synthesizers has changed little even while the sound generating hardware has raced ahead. The stabilisation of gestural controller, particularly keyboard-based controllers, has enabled tje synthesizer to establish itself as an expressive instrument and one worthy of the hours of practice required on any instrument to reach a high level of proficiency. It is now time for the instrumental study of synthesizer to be taken seriously by music educators across Australia, and I hope, through this paper, to shed some light on the path forward.
Resumo:
Leadership research demonstrates that there are serious shortcomings in the quality and competence of leaders in our organizations. The recent global financial crisis has also reminded us that, if our society and economies are to move forward sustainability, we must have the right kind of leaders and the right kind of leadership throughout our organizations. "The Leader in You: Developing Your Leadership Potential" has been framed to be useful to all individuals who are currently in leadership roles, from chief executives to frontline managers, and for those who wish to step up to a leadership role. Organizations can also utilize this book to assist their leaders to increase their leadership potential or to complement leadership development programs. If you want to search for and develop leadership qualities in yourself, then this book is for you. If you want to set a higher standard in your organization and you think leadership is a serious matter in the lives of other people, then this book is for you. In the process of self-reflection, "The Leader in You: Developing Your Leadership Potential" will enable you to develop an individual leadership profile and an individual skills profile, culminating in the development of a plan for leadership improvement. This book aims to couple these outcomes with exposure to some practical skills that leaders need to lead in every day environments. The first four chapters allow the reader to develop an understanding of the concepts that underpin leadership performance, and to undertake exercises to develop a comprehensive understanding of their values, behaviors and personality. That is, to understand who they are and why they behave the way they do. An individual leadership profile is developed at the end of these chapters. Then, the remaining chapters look at issues that leaders will face in contemporary society, and at the skills required to address them in everyday environments. An individual skills profile is developed at the end of these chapters culminating in the development of a plan for leadership improvement.
Resumo:
In the field of leadership studies transformational leadership theory (e.g., Bass, 1985; Avolio, Bass, & Jung, 1995) has received much attention from researchers in recent years (Hughes, Ginnet, & Curphy, 2009; Hunt, 1999). Many previous studies have found that transformational leadership is related to positive outcomes such as the satisfaction, motivation and performance of followers in organisations (Judge & Piccolo, 2004; Lowe, Kroeck, & Sivasubramaniam, 1996), including in educational institutions (Chin, 2007; Leithwoood & Jantzi, 2005). Hence, it is important to explore constructs that may predict leadership style in order to identify potential transformational leaders in leadership assessment and selection procedures. Several researchers have proposed that emotional intelligence (EI) is one construct that may account for hitherto unexplained variance in transformational leadership (Mayer, 2001; Watkin, 2000). Different models of EI exist (e.g., Goleman, 1995, 2001; Bar-On, 1997; Mayer & Salovey, 1997) but momentum is growing for the Mayer and Salovey (1997) model to be considered the most useful (Ashkanasy & Daus, 2005; Daus & Ashkanasy, 2005). Studies in non-educational settings claim to have found that EI is a useful predictor of leadership style and leader effectiveness (Harms & Crede, 2010; Mills, 2009) but there is a paucity of studies which have examined the Mayer and Salovey (1997) model of EI in educational settings. Furthermore, other predictor variables have rarely been controlled in previous studies and only self-ratings of leadership behaviours, rather than multiple ratings, have usually been obtained. Therefore, more research is required in educational settings to answer the question: to what extent is the Mayer and Salovey (1997) model of EI a useful predictor of leadership style and leadership outcomes? This project, set in Australian educational institutions, was designed to move research in the field forward by: using valid and reliable instruments, controlling for other predictors, obtaining an adequately sized sample of real leaders as participants and obtaining multiple ratings of leadership behaviours. Other variables commonly used to predict leadership behaviours (personality factors and general mental ability) were assessed and controlled in the project. Additionally, integrity was included as another potential predictor of leadership behaviours as it has previously been found to be related to transformational leadership (Parry & Proctor-Thomson, 2002). Multiple ratings of leadership behaviours were obtained from each leader and their supervisors, peers and followers. The following valid and reliable psychological tests were used to operationalise the variables of interest: leadership styles and perceived leadership outcomes (Multifactor Leadership Questionnaire, Avolio et al., 1995), EI (Mayer–Salovey–Caruso Emotional Intelligence Test, Mayer, Salovey, & Caruso, 2002), personality factors (The Big Five Inventory, John, Donahue, & Kentle, 1991), general mental ability (Wonderlic Personnel Test-Quicktest, Wonderlic, 2003) and integrity (Integrity Express, Vangent, 2002). A Pilot Study (N = 25 leaders and 75 raters) made a preliminary examination of the relationship between the variables included in the project. Total EI, the experiential area, and the managing emotions and perceiving emotions branches of EI, were found to be related to transformational leadership which indicated that further research was warranted. In the Main Study, 144 leaders and 432 raters were recruited as participants to assess the discriminant validity of the instruments and examine the usefulness of EI as a predictor of leadership style and perceived leadership outcomes. Scores for each leadership scale across the four rating levels (leaders, supervisors, peers and followers) were aggregated with the exception of the management-by-exception active scale of transactional leadership which had an inadequate level of interrater agreement. In the descriptive and measurement component of the Main Study, the instruments were found to demonstrate adequate discriminant validity. The impact of role and gender on leadership style and EI were also examined, and females were found to be more transformational as leaders than males. Females also engaged in more contingent reward (transactional leadership) behaviours than males, whilst males engaged in more passive/avoidant leadership behaviours than females. In the inferential component of the Main Study, multiple regression procedures were used to examine the usefulness of EI as a predictor of leadership style and perceived leadership outcomes. None of the EI branches were found to be related to transformational leadership or the perceived leadership outcomes variables included in the study. Openness, emotional stability (the inverse of neuroticism) and general mental ability (inversely) each predicted a small amount of variance in transformational leadership. Passive/avoidant leadership was inversely predicted by the understanding emotions branch of EI. Overall, EI was not found to be a useful predictor of leadership style and leadership outcomes in the Main Study of this project. Implications for researchers and human resource practitioners are discussed.
Resumo:
New technologies have the potential to both expose children to and protect them from television news footage likely to disturb or frighten. The advent of cheap, portable and widely available digital technology has vastly increased the possibility of violent news events being captured and potentially broadcast. This material has the potential to be particularly disturbing and harmful to young children. But on the flipside, available digital technology could be used to build in protection for young viewers especially when it comes to preserving scheduled television programming and guarding against violent content being broadcast during live crosses from known trouble spots. Based on interviews with news directors, parents and a review of published material two recommendations are put forward: 1. Digital television technology should be employed to prevent news events "overtaking" scheduled children's programming and to protect safe harbours placed in the classifications zones to protect children. 2. Broadcasters should regain control of the images that go to air during "live" feeds from obviously volatile situations by building in short delays in G classification zones.
Resumo:
The use of mesoporous bioactive glasses (MBG) for drug delivery and bone tissue regeneration has grown significantly over the past 5 years. In this review, we highlight the recent advances made in the preparation of MBG particles, spheres, fibers and scaffolds. The advantages of MBG for drug delivery and bone scaffold applications are related to this material’s well-ordered mesopore channel structure, superior bioactivity, and the application for the delivery of both hydrophilic and hydrophobic drugs. A brief forward-looking perspective on the potential clinical applications of MBG in regenerative medicine is also discussed.
Resumo:
This article examines one of the changes implemented in the Corporations Amendment (Insolvency) Act 2007 (Cth) . It is argued that the insertion of s 444DA raises some matters that go to the nature of the insolvency process generally and the operation of Pt 5.3A in a particular. The position of employees in insolvency is a matter that is the subject of much comment from a policy perspective. This article does not cover that debate but provides some initial explanation of the need to protect employees. The second part of the article covers the particular background to the voluntary administration system as far as employee rights are concerned as well as the arguments put forward by the government to justify the change in the legislation which inserted s 444DA . It suggests that there was little evidence provided for the need to protect employee priority rights in this particular way. An alternative explanation is given for the change adopted by the government. The third part of the article suggests that the manner in which the legislation seeks to better protect employee creditors is somewhat clumsy in its operation. It raises a number of questions about how the legislation may operate and argues that given the stated aims, some alteration to it would improve its effectiveness.