1000 resultados para pinyin-to-characterconversion
Resumo:
In order to develop scientific literacy students need the cognitive tools that enable them to read and evaluate science texts. One cognitive tool that has been widely used in science education to aid the development of conceptual understanding is concept mapping. However, it has been found some students experience difficulty with concept map construction. This study reports on the development and evaluation of an instructional sequence that was used to scaffold the concept-mapping process when middle school students who were experiencing difficulty with science learning used concept mapping to summarise a chapter of a science text. In this study individual differences in working memory functioning are suggested as one reason that students experience difficulty with concept map construction. The study was conducted using a design-based research methodology in the school’s learning support centre. The analysis of student work samples collected during the two-year study identified some of the difficulties and benefits associated with the use of scaffolded concept mapping with these students. The observations made during this study highlight the difficulty that some students experience with the use of concept mapping as a means of developing an understanding of science concepts and the amount of instructional support that is required for such understanding to develop. Specifically, the findings of the study support the use of multi-component, multi-modal instructional techniques to facilitate the development of conceptual understanding with students who experience difficulty with science learning. In addition, the important roles of interactive dialogue and metacognition in the development of conceptual understanding are identified.
Resumo:
an initial public offering, the choices made by issuers, such as the offer price, might not appear to be wealth maximizing. In this article, we argue that the choices are strategic. Based on the model developed by Barry (1989), we show that the average change in the issuer's wealth (4.52 per cent) is lower than the average loss implied by underpricing (12.09 per cent). Our results support the notion that the choices issuers make at the offering generate a compensatory benefit in the aftermarket. That the issuer may well not suffer a net wealth loss from the offering is in accordance with continued initial public offering activity.
Resumo:
With growing concern over the use of the car in our urbanized society, there have emerged a number of lobby groups and professional bodies promoting a return to public transport, walking and cycling, with the urban village as the key driving land use, as a means of making our cities’ transportation systems more sustainable. This research has aimed at developing a framework applicable to the Australian setting that can facilitate increased passenger patronage of rail based urban transport systems from adjacent or associated land uses. The framework specifically tested the application of the Park & Ride and Transit Oriented Development (TOD) concepts and their applicability within the cultural, institutional, political and transit operational characteristics of Australian society. The researcher found that, although the application of the TOD concept had been limited to small pockets of town houses and mixed use developments around stations, the development industry and emerging groups within the community are posed to embrace the concept and bring with it increased rail patronage. The lack of a clear commitment to infrastructure and supporting land uses is a major barrier to the implementation of TODs. The research findings demonstrated significant scope for the size of a TOD to expand to a much greater radius of activity from the public transport interchange, than the commonly quoted 400 to 600 meters, thus incorporating many more residents and potential patrons. The provision of Park & Rides, and associated support facilities like Kiss & Rides, have followed worldwide trends of high patronage demands from the middle and outer car dependent suburbs of our cities. The data collection and analysis gathered by the researcher demonstrated that in many cases Park & Rides should form part of a TOD to ensure ease of access to rail stations by all modes and patron types. The question, however, remains how best to plan the incorporation of a Park & Ride within a TOD and still maintain those features that attract and promote TODs as a living entity.
Resumo:
Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.
Resumo:
TBA: Triptych: Digital Print, PVC Text, Acrylic Sheet Total Size: 252cm x 119cm---------- The work employs text based representations of indigenous plants (3500 species names) and quotations from an eminent botanist. This information is spatialised to represent the geographic area within which the plants where recorded (by others-Gov’t database).---------- The work was exhibited at Eyes wide open (curators K Bradby and A Brandenberg) which was held at Gorepani Gallery, Albany WA to coincide with the first national screening on SBS Television of the Western Australian documentary A Million Acres a Year (Rijavec, F, Harrison, N & Bradby K (directors), Snakewood Films & Film Australia, c2003).
Resumo:
In the paper, the flow-shop scheduling problem with parallel machines at each stage (machine center) is studied. For each job its release and due date as well as a processing time for its each operation are given. The scheduling criterion consists of three parts: the total weighted earliness, the total weighted tardiness and the total weighted waiting time. The criterion takes into account the costs of storing semi-manufactured products in the course of production and ready-made products as well as penalties for not meeting the deadlines stated in the conditions of the contract with customer. To solve the problem, three constructive algorithms and three metaheuristics (based one Tabu Search and Simulated Annealing techniques) are developed and experimentally analyzed. All the proposed algorithms operate on the notion of so-called operation processing order, i.e. the order of operations on each machine. We show that the problem of schedule construction on the base of a given operation processing order can be reduced to the linear programming task. We also propose some approximation algorithm for schedule construction and show the conditions of its optimality.
Resumo:
A television series is tagged with the label "cult" by the media, advertisers, and network executives when it is considered edgy or offbeat, when it appeals to nostalgia, or when it is considered emblematic of a particular subculture. By these criteria, almost any series could be described as cult. Yet certain programs exert an uncanny power over their fans, encouraging them to immerse themselves within a fictional world.In Cult Television leading scholars examine such shows as The X-Files; The Avengers; Doctor Who, Babylon Five; Star Trek; Xena, Warrior Princess; and Buffy the Vampire Slayer to determine the defining characteristics of cult television and map the contours of this phenomenon within the larger scope of popular culture.Contributors: Karen Backstein; David A. Black, Seton Hall U; Mary Hammond, Open U; Nathan Hunt, U of Nottingham; Mark Jancovich; Petra Kuppers, Bryant College; Philippe Le Guern, U of Angers, France; Alan McKee; Toby Miller, New York U; Jeffrey Sconce, Northwestern U; Eva ViethSara Gwenllian-Jones is a lecturer in television and digital media at Cardiff University and co-editor of Intensities: The Journal of Cult Media.Roberta E. Pearson is a reader in media and cultural studies at Cardiff University. She is the author of the forthcoming book Small Screen, Big Universe: Star Trek and Television.
Resumo:
The dynamic interaction between building systems and external climate is extremely complex, involving a large number of difficult-to-predict variables. In order to study the impact of climate change on the built environment, the use of building simulation techniques together with forecast weather data are often necessary. Since most of building simulation programs require hourly meteorological input data for their thermal comfort and energy evaluation, the provision of suitable weather data becomes critical. In this paper, the methods used to prepare future weather data for the study of the impact of climate change are reviewed. The advantages and disadvantages of each method are discussed. The inherent relationship between these methods is also illustrated. Based on these discussions and the analysis of Australian historic climatic data, an effective framework and procedure to generate future hourly weather data is presented. It is shown that this method is not only able to deal with different levels of available information regarding the climate change, but also can retain the key characters of a “typical” year weather data for a desired period.
Resumo:
Knowledge has been recognised as a source of competitive advantage. Knowledge-based resources allow organisations to adapt products and services to the marketplace and deal with competitive challenges that enable them to compete more effectively. One factor critical to using knowledge-based resources is the ability to transfer knowledge as a dimension of the learning organisation. There are many elements that may influence whether knowledge transfer can be effectively achieved in an organisation such as leadership, problem-solving behaviours, support structures, change management capabilities, absorptive capacity and the nature of the knowledge. An existing framework was applied in a case study to explain how knowledge transfer can be managed effectively and to identify emerging issues or additional factors involved in the process. As a result, a refined framework is proposed that provides a better understanding for the effective management of knowledge transfer processes that can provide a competitive advantage.
Resumo:
To maintain or achieve competitiveness and profitability, a manufacturing firm or enterprise must respond to a range of challenges, including rapid improvements in technology; declining employment and output; globalisation of markets and environmental requirements. In addition, substantial changes in government policy have had important impacts in many countries, as have the increasing levels of global trade. Manufacturing enterprises need to have a clear understanding of what their customers want and why customers purchase their products rather than purchase from their competitors. They need to fully understand the aims of the business in terms of its customers, market segments, product attributes, geographical markets and performance. Continuous Improvement (CI) methods have become widely adopted and regarded as providing an important component of increased company competitiveness. This article examines the extent to which continuous improvement activities have contributed to the different areas of business performance.
Resumo:
Aim: This study aimed to enhance the capacity of oncology nurses to provide supportive care for patients with advanced cancer who have dependent children. ---------- Method: This was a pilot study of an educational intervention comprising a study-developed self-directed learning manual, supported by a day-long communication skills training workshop. Evaluation pre- and post-training included measures of stress and burnout, self-reports of confidence and attitudes, responses to clinical vignettes and video-taped interviews with simulated patients.---------- Results: Nurses found the educational intervention highly acceptable, and reported increased confidence in their ability to provide information and support for parents, and to initiate discussion about emotional issues. There were significant improvements in general communication skills and skills specific to this training, as well as reduced use of blocking.---------- Conclusion: Brief communication skills training supplemented with tailored educational resources can enhance confidence skills and knowledge of oncology nurses regarding their supportive care of parents with advanced cancer.
Resumo:
For most of the 20th Century a ‘closed’ system of adoption was practised throughout Australia and other modern Western societies. This ‘closed’ system was characterised by sealed records; amended birth certificates to conceal the adoption, and prohibited contact with all biological family. Despite claims that these measures protected these children from the taint of illegitimacy the central motivations were far more complex, involving a desire to protect couples from the stigma of infertility and to provide a socially acceptable family structure (Triseliotis, Feast, & Kyle, 2005; Marshall & McDonald, 2001). From the 1960s significant evidence began to emerge that many adopted children and adults were experiencing higher incidences of psychological difficulties, characterised by problems with psychological adjustment, building self-esteem and forming a secure personal identity. These difficulties became grouped under the term ‘genealogical bewilderment’. As a result, new policies and practices were introduced to try to place the best interests of the child at the forefront. These changes reflected new understandings of adoption; as not only an individual process but also as a social and relational process that continues throughout life. Secrecy and the withholding of birth information are now prohibited in the overwhelming majority of all domestic adoptions processed in Australia (Marshall & McDonald, 2001). One little known consequence of this ‘closed’ system of adoption was the significant number of children who were never told of their adoptive status. As a consequence, some have discovered or had this information disclosed to them, as adults. The first study that looked at the late discovery of genetic origins experiences was conducted by the Post Adoption Resource Centre in New South Wales in 1999. This report found that the participants in their study expressed feelings of disbelief, confusion, anger, sorrow and loss. Further, the majority of participants continued to struggle with issues arising from this intentional concealment of their genetic origins (Perl & Markham, 1999). A second and more recent study (Passmore, Feeney & Foulstone, 2007) looked at the issue of secrecy in adoptive families as part of a broader study of 144 adult adoptees. This study found that secrecy and/or lies or misinformation on the part of adoptive parents had negative effects on both personal identity and relationships with others. The authors noted that those adoptees who found out about their adoption as adults were ‘especially likely to feel a sense of betrayal’ (p.4). Over recent years, stories of secrecy and late discovery have also started to emerge from sperm donor conceived adults (Spencer, 2007; Turner & Coyle, 2000). Current research evidence shows that although a majority of couples during the donor assisted conception process indicate that they intend to tell the offspring about their origins, as many as two-thirds or more of couples continue to withhold this information from their children (Akker, 2006; Gottlieb, A. McWhinnie, 2001; Salter-Ling, Hunter, & Glover, 2001). Why do they keep this secret? Infertility involves a range of complex factors that are often left unresolved or poorly understood by those choosing insemination by donor as a form of family building (Schaffer, J. A., & Diamond, R., 1993). These factors may only impact after the child is born, when resemblance talk becomes most pronounced. Resemblance talk is an accepted form of public discourse and a social convention that legitimises the child as part of the family and is part of the process of constructing the child’s identity within the family. Couples tend to become focused on resemblance as this is where they feel most vulnerable, and the lack of resemblance to the parenting father may trigger his sense of loss (Becker, Butler, & Nachtigall, 2005).