960 resultados para Collaborative environments
Resumo:
Urquhart, C., Spink, S., Thomas, R., Yeoman, A., Durbin, J., Turner, J., Fenton, R. & Armstrong, C. (2004). Evaluating the development of virtual learning environments in higher and further education. In J. Cook (Ed.), Blue skies and pragmatism: learning technologies for the next decade. Research proceedings of the 11th Association for Learning Technology conference (ALT-C 2004), 14-16 September 2004, University of Exeter, Devon, England (pp. 157-169). Oxford: Association for Learning Technology Sponsorship: JISC
Resumo:
Hunt, C. Elrishi, H. Gilbertson, D. Grattan, J. McLaren, S. Pyatt, B. Rushworth, G. Barker, G. Early-Holocene environments in the Wadi Faynan, Jordan. The Holocene. 2004. 14,6 pp 921-930
Resumo:
Ratcliffe, M. Thomas, L. Ellis, W. Thomasson, B. Capturing Collaborative Designs to Assist the Pedagogical Process.ACM SIGCSE Bulletin Volume 35 , Issue 3 (September 2003)
Resumo:
Science Foundation Ireland (CSET - Centre for Science, Engineering and Technology, Grant No. 07/CE/11147)
Resumo:
There are a number of reasons why this researcher has decided to undertake this study into the differences in the social competence of children who attend integrated Junior Infant classes and children who attend segregated learning environments. Theses reasons are both personal and professional. My personal reasons stem from having grown up in a family which included both an aunt who presented with Down Syndrome and an uncle who presented with hearing impairment. Both of these relatives' experiences in our education system are interesting. My aunt was considered ineducable while her brother - my uncle - was sent to Dublin (from Cork) at six years of age to be educated by a religious order. My professional reasons, on the other hand, stemmed from my teaching experience. Having taught in both special and integrated classrooms it became evident to me that there was somewhat 'suspicion' attached to integration. Parents of children without disabilities questioned whether this process would have a negative impact on their children's education. While parents of children with disabilities debated whether integrated settings met the specific needs of their children. On the other hand, I always questioned whether integration and inclusiveness meant the same thing. My research has enabled me to find many answers. Increasingly, children with special educational needs (SEN) are attending a variety of integrated and inclusive childcare and education settings. This contemporary practice of educating children who present with disabilities in mainstream classrooms has stimulated vast interest on the impact of such practices on children with identified disabilities. Indeed, children who present with disabilities "fare far better in mainstream education than in special schools" (Buckley, cited in Siggins, 2001,p.25). However, educators and practitioners in the field of early years education and care are concerned with meeting the needs of all children in their learning environments, while also upholding high academic standards (Putman, 1993). Fundamentally, therefore, integrated education must also produce questions about the impact of this practice on children without identified special educational needs. While these questions can be addressed from the various areas of child development (i.e. cognitive, physical, linguistic, emotional, moral, spiritual and creative), this research focused on the social domain. It investigates the development of social competence in junior infant class children without identified disabilities as they experience different educational settings.
Resumo:
A wireless sensor network can become partitioned due to node failure, requiring the deployment of additional relay nodes in order to restore network connectivity. This introduces an optimisation problem involving a tradeoff between the number of additional nodes that are required and the costs of moving through the sensor field for the purpose of node placement. This tradeoff is application-dependent, influenced for example by the relative urgency of network restoration. In addition, minimising the number of relay nodes might lead to long routing paths to the sink, which may cause problems of data latency. This data latency is extremely important in wireless sensor network applications such as battlefield surveillance, intrusion detection, disaster rescue, highway traffic coordination, etc. where they must not violate the real-time constraints. Therefore, we also consider the problem of deploying multiple sinks in order to improve the network performance. Previous research has only parts of this problem in isolation, and has not properly considered the problems of moving through a constrained environment or discovering changes to that environment during the repair or network quality after the restoration. In this thesis, we firstly consider a base problem in which we assume the exploration tasks have already been completed, and so our aim is to optimise our use of resources in the static fully observed problem. In the real world, we would not know the radio and physical environments after damage, and this creates a dynamic problem where damage must be discovered. Therefore, we extend to the dynamic problem in which the network repair problem considers both exploration and restoration. We then add a hop-count constraint for network quality in which the desired locations can talk to a sink within a hop count limit after the network is restored. For each new problem of the network repair, we have proposed different solutions (heuristics and/or complete algorithms) which prioritise different objectives. We evaluate our solutions based on simulation, assessing the quality of solutions (node cost, movement cost, computation time, and total restoration time) by varying the problem types and the capability of the agent that makes the repair. We show that the relative importance of the objectives influences the choice of algorithm, and different speeds of movement for the repairing agent have a significant impact on performance, and must be taken into account when selecting the algorithm. In particular, the node-based approaches are the best in the node cost, and the path-based approaches are the best in the mobility cost. For the total restoration time, the node-based approaches are the best with a fast moving agent while the path-based approaches are the best with a slow moving agent. For a medium speed moving agent, the total restoration time of the node-based approaches and that of the path-based approaches are almost balanced.
Resumo:
In order to determine the size-resolved chemical composition of single particles in real-time an ATOFMS was deployed at urban background sites in Paris and Barcelona during the MEGAPOLI and SAPUSS monitoring campaigns respectively. The particle types detected during MEGAPOLI included several carbonaceous species, metal-containing types and sea-salt. Elemental carbon particle types were highly abundant, with 86% due to fossil fuel combustion and 14% attributed to biomass burning. Furthermore, 79% of the EC was apportioned to local emissions and 21% to continental transport. The carbonaceous particle types were compared with quantitative measurements from other instruments, and while direct correlations using particle counts were poor, scaling of the ATOFMS counts greatly improved the relationship. During SAPUSS carbonaceous species, sea-salt, dust, vegetative debris and various metal-containing particle types were identified. Throughout the campaign the site was influenced by air masses altering the composition of particles detected. During North African air masses the city was heavily influenced by Saharan dust. A regional stagnation was also observed leading to a large increase in carbonaceous particle counts. While the ATOFMS provides a list of particle types present during the measurement campaigns, the data presented is not directly quantitative. The quantitative response of the ATOFMS to metals was examined by comparing the ion signals within particle mass spectra and to hourly mass concentrations of; Na, K, Ca, Ti, V, Cr, Mn, Fe, Zn and Pb. The ATOFMS was found to have varying correlations with these metals depending on sampling issues such as matrix effects. The strongest correlations were observed for Al, Fe, Zn, Mn and Pb. Overall the results of this work highlight the excellent ability of the ATOFMS in providing composition and mixing state information on atmospheric particles at high time resolution. However they also show its limitations in delivering quantitative information directly.
Resumo:
Open environments involve distributed entities interacting with each other in an open manner. Many distributed entities are unknown to each other but need to collaborate and share resources in a secure fashion. Usually resource owners alone decide who is trusted to access their resources. Since resource owners in open environments do not have a complete picture of all trusted entities, trust management frameworks are used to ensure that only authorized entities will access requested resources. Every trust management system has limitations, and the limitations can be exploited by malicious entities. One vulnerability is due to the lack of globally unique interpretation for permission specifications. This limitation means that a malicious entity which receives a permission in one domain may misuse the permission in another domain via some deceptive but apparently authorized route; this malicious behaviour is called subterfuge. This thesis develops a secure approach, Subterfuge Safe Trust Management (SSTM), that prevents subterfuge by malicious entities. SSTM employs the Subterfuge Safe Authorization Language (SSAL) which uses the idea of a local permission with a globally unique interpretation (localPermission) to resolve the misinterpretation of permissions. We model and implement SSAL with an ontology-based approach, SSALO, which provides a generic representation for knowledge related to the SSAL-based security policy. SSALO enables integration of heterogeneous security policies which is useful for secure cooperation among principals in open environments where each principal may have a different security policy with different implementation. The other advantage of an ontology-based approach is the Open World Assumption, whereby reasoning over an existing security policy is easily extended to include further security policies that might be discovered in an open distributed environment. We add two extra SSAL rules to support dynamic coalition formation and secure cooperation among coalitions. Secure federation of cloud computing platforms and secure federation of XMPP servers are presented as case studies of SSTM. The results show that SSTM provides robust accountability for the use of permissions in federation. It is also shown that SSAL is a suitable policy language to express the subterfuge-safe policy statements due to its well-defined semantics, ease of use, and integrability.
Resumo:
BACKGROUND: Sharing of epidemiological and clinical data sets among researchers is poor at best, in detriment of science and community at large. The purpose of this paper is therefore to (1) describe a novel Web application designed to share information on study data sets focusing on epidemiological clinical research in a collaborative environment and (2) create a policy model placing this collaborative environment into the current scientific social context. METHODOLOGY: The Database of Databases application was developed based on feedback from epidemiologists and clinical researchers requiring a Web-based platform that would allow for sharing of information about epidemiological and clinical study data sets in a collaborative environment. This platform should ensure that researchers can modify the information. A Model-based predictions of number of publications and funding resulting from combinations of different policy implementation strategies (for metadata and data sharing) were generated using System Dynamics modeling. PRINCIPAL FINDINGS: The application allows researchers to easily upload information about clinical study data sets, which is searchable and modifiable by other users in a wiki environment. All modifications are filtered by the database principal investigator in order to maintain quality control. The application has been extensively tested and currently contains 130 clinical study data sets from the United States, Australia, China and Singapore. Model results indicated that any policy implementation would be better than the current strategy, that metadata sharing is better than data-sharing, and that combined policies achieve the best results in terms of publications. CONCLUSIONS: Based on our empirical observations and resulting model, the social network environment surrounding the application can assist epidemiologists and clinical researchers contribute and search for metadata in a collaborative environment, thus potentially facilitating collaboration efforts among research communities distributed around the globe.
Resumo:
The dance-drama called Barong and Rangda a ritual, is one of the vital events that breathes life in the small village, Banjar Tista, and extends beyond the boundaries of its "performance" area. In this thesis, I depend on Ronald Grimes' concept of "ritualizing" as a continuum in the context of my fieldwork in Bali, Indonesia. The ritual cycle and the collaborative fieldwork process are analyzed through the impressions of each fieldworker. Barong and Rangda is a well-documented dance-drama and part of the longer Calonarang story. This dance-drama is a mythological battle between the lion, Barong, and the witch, Rangda, and is performed authentically to create spiritual balance and cleanse its community members of evil. This ritual performance reaches beyond the time and place in which the performance originates and creates a ripple affect on the village members, those in trance, musicians and cultural outsiders alike.
Resumo:
OBJECTIVES: To compare the predictive performance and potential clinical usefulness of risk calculators of the European Randomized Study of Screening for Prostate Cancer (ERSPC RC) with and without information on prostate volume. METHODS: We studied 6 cohorts (5 European and 1 US) with a total of 15,300 men, all biopsied and with pre-biopsy TRUS measurements of prostate volume. Volume was categorized into 3 categories (25, 40, and 60 cc), to reflect use of digital rectal examination (DRE) for volume assessment. Risks of prostate cancer were calculated according to a ERSPC DRE-based RC (including PSA, DRE, prior biopsy, and prostate volume) and a PSA + DRE model (including PSA, DRE, and prior biopsy). Missing data on prostate volume were completed by single imputation. Risk predictions were evaluated with respect to calibration (graphically), discrimination (AUC curve), and clinical usefulness (net benefit, graphically assessed in decision curves). RESULTS: The AUCs of the ERSPC DRE-based RC ranged from 0.61 to 0.77 and were substantially larger than the AUCs of a model based on only PSA + DRE (ranging from 0.56 to 0.72) in each of the 6 cohorts. The ERSPC DRE-based RC provided net benefit over performing a prostate biopsy on the basis of PSA and DRE outcome in five of the six cohorts. CONCLUSIONS: Identifying men at increased risk for having a biopsy detectable prostate cancer should consider multiple factors, including an estimate of prostate volume.
Resumo:
Gemstone Team BLAZE
Resumo:
It is essential in musical performance not only to convey the unique language of the composers but also to approach each composition from the perspective of its style. During the 20th century, diverse musical idioms co-existed, sometimes mixing or fusing, yet retaining recognizable characteristics and thereby remaining distinctive. This dissertation explores myriad examples from Late Romanticism/Post- Romanticism, Naturalism, Neo-Classicism, Nationalism and Impressionism composed during this unusually rich period. In order to explore a broad range of collaborative repertoire and to deepen my knowledge of the styles and performance practices relating to these pieces, I studied and performed the repertoire with pianist Eunae Baik–Kim, clarinetist Jihoon Chang, and singers Joshua Brown and Young Joo Lee. The first program featured Post-Romantic, Neo-Classic and Impressionist two-piano works composed by Debussy, Rachmaninoff, and Stravinsky. Each of the three composers used their own distinctive harmonies, rhythms, melodic inventions, pedaling and figurations. In all of the works, both piano parts were densely interwoven, having equal importance. Lied and operatic aria was the focus of the second recital. Brahms’ Vier Ernste Gesänge Op. 121, Ravel’s Don Quichotte a Dulcineé and Italian, French and German operatic arias were the examples of Post-Romanticism and Nationalism. The representative composers were Verdi, Massenet, Korngold, Leoncavallo, Ravel and Wagner. Despite the fact that all of the repertoire was written in traditional musical forms, the composers’ unique voices mark each work as belonging to a particular genre. The third recital focused on Post-Romantic and Impressionistic music written for clarinet and piano: the Première Rhapsodie by Debussy, the Sonata by Poulenc and Brahms’ Sonata in F minor Op. 120, No. 1. These works, although profoundly different in style, share elements of simplicity, clarity and elegance as well as technical virtuosity, articulation and profound musical depth. The three recitals which comprise this dissertation project were performed at the University of Maryland Gildenhorn Recital Hall on February 27, 2010, October 25, 2010, and January 31, 2011. The recitals were recorded on compact disc and are archived within the Digital Repository at the University of Maryland (DRUM).