926 resultados para Communication Processes
Resumo:
On-line learning is increasingly being used in nursing education. Nevertheless, there is still insufficient evidence to demonstrate: whether students respond positively when this form of learning is used to teach relatively practical or clinical subjects; whether it is effective; and whether it is fair to students with less access to, or familiarity with, computers and the internet. In 2003, an on-line Unit on clinical communication was developed for Australian undergraduate nurses in partnership between an Australian School of Nursing and the a Department of Clinical Psychology. Students were overwhelmingly positive in their evaluation of the Unit although some regretted the lack of face-to-face contact with tutors and peers. The best aspects of the Unit included the content and structure being perceived as interesting, fun and informative, the relevance of the material for them as nurses, flexibility to work independently, promotion of critical thinking and gaining an understanding of client issues. Neither their evaluation nor their final grades were related to students’ age or whether they preferred on-line or traditional learning. Students who had readily available computer access, however, had better final grades. Also, students’ grades were correlated with how often they accessed the Unit.
Resumo:
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.
Resumo:
This thesis presents a novel idea for an adaptive prioritized cross-layer design (APCLD) control algorithm to achieve comprehensive channel congestion control for vehicular safety communication based on DSRC technology. An appropriate evaluation metric and two control parameters have been established. Simulation studies have evaluated the DSRC network performance in different traffic scenario and under different channel conditions. The APCLD algorithm is derived from the results of the simulation analysis.
Resumo:
Increasing numbers of preclinical and clinical studies are utilizing pDNA (plasmid DNA) as the vector. In addition, there has been a growing trend towards larger and larger doses of pDNA utilized in human trials. The growing demand on pDNA manufacture leads to pressure to make more in less time. A key intervention has been the use of monoliths as stationary phases in liquid chromatography. Monolithic stationary phases offer fast separation to pDNA owing to their large pore size, making pDNA in the size range from 100 nm to over 300 nm easily accessible. However, the convective transport mechanism of monoliths does not guarantee plasmid purity. The recovery of pure pDNA hinges on a proper balance in the properties of the adsorbent phase, the mobile phase and the feedstock. The effects of pH and ionic strength of binding buffer, temperature of feedstock, active group density and the pore size of the stationary phase were considered as avenues to improve the recovery and purity of pDNA using a methacrylate-based monolithic adsorbent and Escherichia coli DH5α-pUC19 clarified lysate as feedstock. pDNA recovery was found to be critically dependent on the pH and ionic strength of the mobile phase. Up to a maximum of approx. 92% recovery was obtained under optimum conditions of pH and ionic strength. Increasing the feedstock temperature to 80°C increased the purity of pDNA owing to the extra thermal stability associated with pDNA over contaminants such as proteins. Results from toxicological studies of the plasmid samples using endotoxin standard (E. coli 0.55:B5 lipopolysaccharide) show that endotoxin level decreases with increasing salt concentration. It was obvious that large quantities of pure pDNA can be obtained with minimal extra effort simply by optimizing process parameters and conditions for pDNA purification.
Resumo:
Business Process Management describes a holistic management approach for the systematic design, modeling, execution, validation, monitoring and improvement of organizational business processes. Traditionally, most attention within this community has been given to control-flow aspects, i.e., the ordering and sequencing of business activities, oftentimes in isolation with regards to the context in which these activities occur. In this paper, we propose an approach that allows executable process models to be integrated with Geographic Information Systems. This approach enables process models to take geospatial and other geographic aspects into account in an explicit manner both during the modeling phase and the execution phase. We contribute a structured modeling methodology, based on the well-known Business Process Model and Notation standard, which is formalized by means of a mapping to executable Colored Petri nets. We illustrate the feasibility of our approach by means of a sustainability-focused case example of a process with important ecological concerns.
Resumo:
In an ever evolving business landscape, change is an ever present part of any organisation’s lifecycle. This thesis presents communication as a fundamental element of effective change management. Drawing from the existing change communication literature and two case studies, this thesis examines how organisations utilise strategic change communication to manage identity change. As a result this study presents a conceptual model that outlines a process of change communication strategy and implementation. This model is offered as a step toward connecting important scholarship into a more comprehensive portrait of change communication during identity change than so far has been available.
Resumo:
This article outlines proposed reforms to auditor reporting currently being considered by the International Auditing and Assurance Standards Board (IAASB), and other key national and transnational standard-setters and regulatory bodies. It adds to recent academic contributions on reforming the auditor’s report by analyzing the 165 stakeholder responses to the IAASB’s 2012 Invitation to Comment: Improving the Auditor’s Report to determine levels of support for the IAASB’s proposed reforms, and the differences, if any, between the views of various respondents based on stakeholder groups (e.g. audit and assurance firms, users, preparers, regulators, etc.) and regional classifications. Guided by insights from communication theory, our results show the levels of stakeholder support for the IAASB’s proposed reforms addressing auditors’ expectations, information and communication gaps are mixed. The strongest overall support was for enhanced auditor reporting on other information attached to, or intended to be read with, the financial statements, and the least supported initiative was including additional information in the auditor’s report about the auditor’s judgements and processes. Whilst overall there is generally consensus across both stakeholder groups and regions concerning the various questions investigated, we highlight where statistically significant differences between groups do exist. Notably, North American respondents were less likely to support a number of the IAASB’s proposed reforms than their counterparts from other regions.
Resumo:
By referring to Niklas Luhmann's theory of self-referential systems, Aldo Mascareño (2008, submitted for publication) gives an account of system-environment interrelatedness, explaining how social and individual constitute each other through the process of communication and co-creation of meanings. Two possible extensions to his account are discussed. Firstly, auto-communication within the system that happens without any external reference needs to be taken into account while describing the existence and constant re-creation of psychic systems. Secondly, in order for the system and environment or two systems to communicate, an imagined and temporary intersubjectivity between the two needs to be assumed.
Resumo:
Communication and information diffusion are typically difficult in situations where centralised structures may become unavailable. In this context, decentralised communication based on epidemic broadcast becomes essential. It can be seen as an opportunity-based flooding for message broadcasting within a swarm of autonomous agents, where each entity tries to share the information it possesses with its neighbours. As an example of applications for such a system, we present simulation results where agents have to coordinate to map an unknown area.