855 resultados para Et-al
Resumo:
Context The School of Information Technology at QUT has recently undertaken a major restructuring of their Bachelor of Information Technology (BIT) course. Some of the aims of this restructuring include a reduction in first year attrition and to provide an attractive degree course that meets both student and industry expectations. Emphasis has been placed on the first semester in the context of retaining students by introducing a set of four units that complement one another and provide introductory material on technology, programming and related skills, and generic skills that will aid the students throughout their undergraduate course and in their careers. This discussion relates to one of these four fist semester units, namely Building IT Systems. The aim of this unit is to create small Information Technology (IT) systems that use programming or scripting, databases as either standalone applications or web applications. In the prior history of teaching introductory computer programming at QUT, programming has been taught as a stand alone subject and integration of computer applications with other systems such as databases and networks was not undertaken until students had been given a thorough grounding in those topics as well. Feedback has indicated that students do not believe that working with a database requires programming skills. In fact, the teaching of the building blocks of computer applications have been compartmentalized and taught in isolation from each other. The teaching of introductory computer programming has been an industry requirement of IT degree courses as many jobs require at least some knowledge of the topic. Yet, computer programming is not a skill that all students have equal capabilities of learning (Bruce et al., 2004) and this is clearly shown by the volume of publications dedicated to this topic in the literature over a broad period of time (Eckerdal & Berglund, 2005; Mayer, 1981; Winslow, 1996). The teaching of this introductory material has been done pretty much the same way over the past thirty years. During this period of time that introductory computer programming courses have been taught at QUT, a number of different programming languages and programming paradigms have been used and different approaches to teaching and learning have been attempted in an effort to find the golden thread that would allow students to learn this complex topic. Unfortunately, computer programming is not a skill that can be learnt in one semester. Some basics can be learnt but it can take many years to master (Norvig, 2001). Faculty data typically has shown a bimodal distribution of results for students undertaking introductory programming courses with a high proportion of students receiving a high mark and a high proportion of students receiving a low or failing mark. This indicates that there are students who understand and excel with the introductory material while there is another group who struggle to understand the concepts and practices required to be able to translate a specification or problem statement into a computer program that achieves what is being requested. The consequence of a large group of students failing the introductory programming course has been a high level of attrition amongst first year students. This attrition level does not provide good continuity in student numbers in later years of the degree program and the current approach is not seen as sustainable.
Resumo:
Professional drivers and safety Within the industrialised world, work-related crashes are the most common cause of work-related death, injury and reduced productivity (Charbotel et al., 2001; Toscano and Windau, 1994). Likewise in Australia, road crashes are the most common cause of work-related fatalities, injuries and absence from work (Haworth et al., 2000), with the average time lost being greater than any other workplace claim (Stewart-Bogle, 1999). There are obvious costs related to work crashes such as vehicle and property repair costs. There are also many hidden expenses including third party costs, workers compensation, medical costs, rehabilitation, customer-related costs, increased insurance premiums, administrative costs, legal fees and loss of productivity (Collingwood, 1997; Haworth et al, 2000).
Resumo:
It can be argued that technological advances and increasing familiarity with technology in the general population has created a huge potential for expansion of online learning (OL) across the educational spectrum. The growth of OL at the university level over the last few years has brought with it an increasing need to understand the learning processes and social processes involved in the ‘cyber’ or ‘virtual’ lecture hall and seminar room by asking questions such as: What are ‘virtual universities’? How – or more critically whether – virtual learning environments are different from face-to-face (F2F) ones? In other words, there is a critical need to explore how students relate to each other and their lecturer(s) in a literal ‘school without walls’? This paper explores the development of a virtual community within a wholly online MA in Applied Linguistics program within the framework of online community development proposed by Haythornthwaite et al (2000).
Resumo:
Family businesses dominate in a majority of economies (Astrachan and Shanker, 2003; Chrisman, Chua, and Sharma, 2005; Morck and Yeung, 2004). As entrepreneurial activities have been shown to be central to economic growth it is essential that family businesses, irrespective of ownership patterns, not only survive but also grow thus growing the economy overall. While a great deal is known about entrepreneurial activities and a body of knowledge is being developed in relation to entrepreneurial processes in family firms, more needs to be understood in relation to the dynamics of entrepreneurial activities at the individual family firm level. One area of particular interest is the dynamics within the business and the family and how these dynamics impact upon entrepreneurial activities. Specifically how relationships between and among family members engaged in the business can interact with professional non-family member senior executives. The senior executives can actively use their positions in such ways that initiatives suggested by family members are less successful than they might be. This paper addresses how ‘family’ aspects of a business can assist or impede the entrepreneurial activities of individuals. It takes into account some of the unique features of family businesses – such as the importance of ‘familiness’ as a competitive advantage; the direct links between ownership and control of a business and the recognition (often implicit) that individuals in families do make a difference to how the business functions (Habbershon and Williams, 1999, Sharma, 2004; and Tokarczyk, Hansen Green, and Down, 2007). This emphasis on individuals in families fits well with the idea of entrepreneur as individual, as expressed by Schumpeter (1934), Baumol et al (2007). The theoretical approach that adopted to explore the dynamics of processes occurring within family firms is structuration theory combined with a theory of embeddeness (Dacin, Ventresca and Beal, 1999; Giddens, 1979, 1984, Jack and Anderson, 2002; and Sarason, Dean and Dillard, 2006).
Resumo:
Using work integrated learning (WIL) in university-industry learning partnerships as a means of developing the deeper and more complex skills of managers is receiving growing interest in the literature. This paper suggests that there are currently, two basic approaches to WIL – the traditional model and the customisation model. While each has strengths, each also has limitations. Responding the call of Patrick et al (2008) for more discussion and research on WIL stratagems, this paper proposes a third model – the sustainable learning partnership – as an option to encourage deeper, more complex and more long-term capacity building in management development.
Resumo:
Predicted the outcomes of 40 men and 20 women who attended a controlled drinking program in a general hospital. Measures included a behavioral interview, the Alcohol Dependence Scale (ADS), the Severity of Alcohol Dependence Questionnaire (SADQ) described by T. Stockwell et al (1979), and a problem drinking self-efficacy scale (PDSES). Substantial reductions in drinking appeared after the program and appeared to be sustained over a 6-mo follow-up. Intake dropped from 11.3 drinks per day to 2.2 drinks during follow-up. Drinking history and alcohol dependence (as measured by the SADQ, but not the ADS) were significant predictors of alcohol consumption during follow-up. Predictive utility of the PDSES was confirmed. PDSES administered at the end of the program significantly predicted alcohol consumption over the next 6 mo.
Resumo:
This study considers the solution of a class of linear systems related with the fractional Poisson equation (FPE) (−∇2)α/2φ=g(x,y) with nonhomogeneous boundary conditions on a bounded domain. A numerical approximation to FPE is derived using a matrix representation of the Laplacian to generate a linear system of equations with its matrix A raised to the fractional power α/2. The solution of the linear system then requires the action of the matrix function f(A)=A−α/2 on a vector b. For large, sparse, and symmetric positive definite matrices, the Lanczos approximation generates f(A)b≈β0Vmf(Tm)e1. This method works well when both the analytic grade of A with respect to b and the residual for the linear system are sufficiently small. Memory constraints often require restarting the Lanczos decomposition; however this is not straightforward in the context of matrix function approximation. In this paper, we use the idea of thick-restart and adaptive preconditioning for solving linear systems to improve convergence of the Lanczos approximation. We give an error bound for the new method and illustrate its role in solving FPE. Numerical results are provided to gauge the performance of the proposed method relative to exact analytic solutions.
Resumo:
(-)-CGP12177 is a non-conventional partial agonist that causes modest and transient increases of contractile force in human atrial trabeculae (Kaumann and Molenaar, 2008). These effects are markedly increased and maintained by inhibition of phosphodiesterase PDE3. As verified with recombinant receptors, the cardiostimulant effect of (-)-CGP12177 is mediated through a site at the beta1-adrenoceptor with lower affinity (beta1LAR) compared to the site through which (-)-CGP12177 antagonizes the effects of catecholamines (beta1HAR). However, in a recent report it was proposed that the positive inotropic effects of CGP12177 are mediated through beta3-adrenoceptors (Skeberdis et al 2008). We therefore investigated whether the effects of (-)-CGP12177 on human atrial trabeculae are antagonized by the beta3-adrenoceptor-selective antagonist L-748,337 (1 microM). (-)-CGP12177 (200 nM) caused a stable increase in force which was significantly reduced by the addition of (-)-bupranolol (1 microM), P = 0.002, (basal 4.45 ± 0.78 mN, IBMX (PDE inhibitor) 5.47 ± 1.01 mN, (-)-CGP12177 9.34 ± 1.33 mN, (-)-bupranolol 5.79 ± 1.08 mN, n = 6) but not affected by the addition of L-748,337 (1 microM), P = 0.12, (basal 4.48 ± 1.32 mN, IBMX 7.15 ± 2.28 mN, (-)-CGP12177 12.51 ± 3.71 mN, L-748,337 10.90 ± 3.49 mN, n = 6). Cumulative concentration-effect curves for (-)-CGP12177 were not shifted to the right by L-748,337 (1 microM). The –logEC50M values of (-)-CGP12177 in the absence and presence of L-748,337 were 7.21±0.09 and 7.41±0.13, respectively (data from 25 trabeculae from 8 patients, P=0.2) The positive inotropic effects of (-)-CGP12177 (IBMX present) were not antagonized by L-748,337 but were blunted by (-)-bupranolol (1 microM). The results rule out an involvement of beta3-adrenoceptors in the positive inotropic effects (-)-CGP12177 in human right atrial myocardium and are consistent with mediation through beta1LAR. Kaumann A and Molenaar P (2008) Pharmacol Ther 118, 303-336 Skeberdis VA et al (2008) J Clin Invest, 118, 3219-3227
Resumo:
Tzeng et al. proposed a new threshold multi-proxy multi-signature scheme with threshold verification. In their scheme, a subset of original signers authenticates a designated proxy group to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. Subsequently, there are two improved schemes to eliminate the security leak of Tzeng et al.’s scheme. In this paper, we have pointed out the security leakage of the three schemes and further proposed a novel threshold multi-proxy multi-signature scheme with threshold verification.
Resumo:
Since the industrial revolution, the development of a lifestyle lived predominantly indoors has resulted in less contact with nature. Research over the last twenty years has gradually been identifying the human health benefits attributed to re-connecting with the natural environment. The significance of feeling connected to natural environments, families and friends are described as a foundational requirement for human health and wellbeing (Maller et al., 2008). Also, the early findings of Schultz‟s (2002) work indicated that by feeling connected to the natural world a person is more likely to be committed to positively interact with and protect the natural world. Research on young people has indicated that young people are even more disconnected from the natural world. Leading some writers to call this disconnection a crisis termed “Nature Deficit Disorder.” Participants (n = 131) from 1st year university Physical Education and Human Movement Studies were asked to complete two questionnaires the Connectedness to Nature scale (CNS) (Mayer & Frantz, 2004) and the New Ecological Paradigm Scale (NEP) (Dunlap, Van Liere, Mertig, & Jones, 2000). The NEP and CNS are two scales most commonly used to explore beliefs and feelings of connectedness to the natural world (Schultz, 2002). The NEP was developed over thirty years ago by Dunlap and Van Liere (1978) and originally termed the New Environmental Paradigm. The NEP is now the foremost International tool for measuring beliefs about the natural world (Dunlap, 2008). The CNS measures an individual‟s trait levels of emotional connection to the natural world. It is a relatively new tool for understanding ecological behaviour based on ecopsychology theory and employed to predict behaviour (Mayer and Frantz, 2004). Both questionnaires are based on a 1-5 scale (Strongly disagree to Strongly agree). By combing both scales the researchers aim to develop a snap shot of beliefs and emotional feelings towards the natural world and therefore an idea of intended behaviour. The two questionnaires were combined as one online survey with additional material asking for demographics and self assessments of type of leader included before the surveys. An email inviting outdoor leaders to participate was sent out to networks and interest groups. A basic descriptive statistical analysis was used to interpret data.
Resumo:
Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.
Resumo:
Objectives This research explores the relationship between young firms, their growth orientation-intention and a range of relationships which can be seen to provide business support. Prior-work Research indicates that networks impact the firm’s ability to secure resources (Sirmon and Hitt 2003; Liao and Welsch. 2004; Hanlon and Saunders 2007). Networks have been evaluated in a number of ways ranging from simple counts to characteristics of their composition (Davidsson and Honig 2003), strength of relationships (Granovetter 1973) and network diversity (Carter et al 2003). By providing access to resources and knowledge (from start-up assistance and raising capital, (e.g. Smallbone et al, 2003), networks may assist in enabling continued persistence during those times where firms may experience resource constraints owing to firm growth (Baker and Nelson 2005). Approach The data used in this research was generated in the 2008 UK Federation of Small Businesses (FSB) survey. Over 1,000 of the firms responding were found to fall into the category of “young”, ((defined as firms under 4 years old). Firms were considered the unit of analysis with the entrepreneur being the chief spokesperson for the firm. Preliminary data analysis considered key demographic characteristics and industry classifications, comparing the FSB data with that of the UK government’s own (BERR) Small Business Surveys of 2007 and 2008, to establish some degree of representativeness of the respondents. The analysis then examined networks with varying potential ability to provide support for young firms, the networks measured in terms of number, diversity, characteristic and strength in its relationship to young firm growth orientation. The diversity of business-support-related relationships ranged from friends and family, through professional services, customers and suppliers, and government business services, to trade associations and informal business networks. The characteristics of these formal and informal sources of support for new businesses are examined across a range of business support-type activities for new firms. The number of relationships and types of business support are also explored. Finally, the strength of these relationships is examined by analysis of the source of business support, type of business support, and links to the growth orientation-intention of the firm, after controlling for a number of key variables related to firm and industry status and owner characteristics. Results Preliminary analysis of the data by means of univariate analysis showed that average number of sources of advice was around 2.5 (from a potential total of 6). In terms of the diversity of relationships, universities had by far the smallest percentage of firms receiving beneficial advice from them. Government business services were beneficially used by 40% of young firms, the other relationship types being around the 50-55% mark. In terms of characteristics of the advice, the average number of areas in which benefit was achieved was around 5.5 of a maximum of 15. Start-up advice has by far the highest percentage of firms obtaining beneficial advice, with increasing sales, improving contacts and improving confidence being the other categories at or around the 50% mark. Other market-focused areas where benefits were also received were in the areas of new markets, existing product improvements and new product improvements, where around 40% of the young responding firms obtained benefit. Regression techniques evaluating the strength of these relationships in terms of the links between business support (by source of support, type of support, and range of support) and firm growth orientation-intention focus highlighted a number of significant relationships, even after controlling for a range of other explanatory variables identified in the literature. Specifically, there was found to be a positive relationship between receiving business advice generally (regardless of type or source) and growth orientation. This relationship was seen to be stronger, however, when looking at the number of types of beneficial advice received, and stronger again for the number of sources of this advice. In terms of individual sources of advice, customers and suppliers had the strongest relationship with growth, with Government business services also found to be significant. Combining these two sources was also seen to increase the strength of the relationship between these two sources of advice and growth orientation. In considering areas of support, growth was most strongly positively related to advice that benefited the development of new products and services, and also business confidence, but was negatively related to advice linked to business recovery. Finally, amalgamating the 4 key types and sources of advice to examine the impact of combinations of these types and sources of advice also improved the strength of the relationship. Implications The findings will assist in the understanding of young firms in general and growth more specifically, particularly the role and importance of specific sources, types and combinations of business support used more extensively by new young growth-oriented firms. Value This research may assist in processes designed to allow entrepreneurs to make better decisions; educators and support organizations to develop better advice and assistance, and Governments design better conditions for the creation of new growth-oriented businesses.
Resumo:
Intimate partner violence (IPV) is not only a problem for heterosexual couples. Although research in the area is beset by methodological and definitional problems, studies generally demonstrate that IPV also affects those who identify as non-heterosexual; that is, those sexualities that are typically categorized as lesbian, gay, bisexual, transgender, or intersex (LGBTI). IPV appears to be at least as prevalent in LGBTI relationships as it is in heterosexual couples, and follows similar patterns (e.g. Australian Research Centre on Sex, Health and Society 2006; Donovan et al. 2006; Chan 2005; Craft and Serovich 2005; Burke et al. 2002; Jeffries and Ball 2008; Kelly and Warshafsky 1987; Letellier 1994; Turrell 2000; Ristock 2003; Vickers 1996). There is, however, little in the way of specific community or social services support available to either victims or perpetrators of violence in same-sex relationships (see Vickers 1996). In addition, there are important differences in the experience of IPV between LGBTI and non-LGBTI victims, and even among LGBTI individuals; for example, among transgender populations (Chan 2005), and those who are HIV sero-positive (Craft and Serovich 2005). These different experiences of IPV include the use of HIV and the threat of “outing” a partner as tools of control, as just two examples (Jeffries and Ball 2008; Salyer 1999; WA Government 2008b). Such differences impact on how LGBTI victims respond to the violence, including whether or not and how they seek help, what services they are able to avail themselves of, and how likely they are to remain with, or return to, their violent partners (Burke et al. 2002). This chapter explores the prevalent heteronormative discourses that surround IPV, both within the academic literature, and in general social and government discourses. It seeks to understand how same-sex IPV remains largely invisible, and suggests that these dominant discourses play a major role in maintaining this invisibility. In many respects, it builds on work by a number of scholars who have begun to interrogate the criminal justice and social discourses surrounding violent crime, primarily sexual violence, and who problematize these discourses (see for example Carmody 2003; Carmody and Carrington 2000; Marcus 1992). It will begin by outlining these dominant discourses, and then problematize these by identifying some of the important differences between LGBTI IPV and IPV in heterosexual relationships. In doing so, this chapter will suggest some possible reasons for the silence regarding IPV in LGBTI relationships, and the effects that this can have on victims. Although an equally important area of research, and another point at which the limitations of dominant social discourses surrounding IPV can be brought to light, this chapter will not examine violence experienced by heterosexual men at the hands of their intimate female partners. Instead, it will restrict itself to IPV perpetrated within same-sex relationships.
Resumo:
This chapter is a condensation of a guide written by the chapter authors for both university teachers and students (Fowler et al., 2006). All page references given in this chapter are to this guide, unless otherwise stated. University students often work in groups. It may be a formal group (i.e. one that has been formed for a group presentation, writing a report, or completing a project) or an informal group (i.e. some students have decided to form a study group or undertake research together). Whether formal or informal, this chapter aims to make working in groups easier for you. Health care professionals also often work in groups. Yes, working in groups will extend well beyond your time at university. In fact, the skills and abilities to work effectively in groups are some of the most sought-after attributes in health care professionals. It seems obvious, then, that taking the opportunity to develop and enhance your skills and abilities for working in groups is a wise choice.
Resumo:
Information System (IS) success may be the most arguable and important dependent variable in the IS field. The purpose of the present study is to address IS success by empirically assess and compare DeLone and McLean’s (1992) and Gable’s et al. (2008) models of IS success in Australian Universities context. The two models have some commonalities and several important distinctions. Both models integrate and interrelate multiple dimensions of IS success. Hence, it would be useful to compare the models to see which is superior; as it is not clear how IS researchers should respond to this controversy.