969 resultados para technology standard
Resumo:
This paper reports a number of findings from the Interests and Recruitment in Science (IRIS) study carried out in Australia in 2011. The findings concern the perceptions of first year university students in science, technology and engineering courses about the influence of museums/science centres and outreach activities on their choice of course. The study found that STE students in general tended to rate museums/science centres as more important in their decisions than outreach activities. However, a closer examination showed that females in engineering courses were significantly more inclined to rate outreach activities as important than were males in engineering courses or females in other courses. The implications of this finding for strategies to encourage more young women into engineering are discussed.
Resumo:
The prime aim of this research project is to evaluate the performance of confined masonry walls under in-plane shear with a view to contributing to the national masonry design standard through a set of design clauses. This aim stems from the criticisms of the current provisions of the in-plane shear capacity equations in the Australian Masonry Standard AS3700 (2011) being highly non-conservative. This PhD thesis is an attempt to address this gap in the knowledge through systematic investigation of the key parameters that affects the in-plane shear strength of the masonry walls through laboratory experiments and extensive finite element analyses.
Resumo:
It is well established that there are inherent difficulties involved in communicating across cultural boundaries. When these difficulties are encountered within the justice system the innocent can be convicted and witnesses undermined. A large amount of research has been undertaken regarding the implications of miscommunication within the courtroom but far less has been carried out on language and interactions between police and Indigenous Australians. It is necessary that officers of the law be made aware of linguistic issues to ensure they conduct their investigations in a fair, effective and therefore ethical manner. This paper draws on Cultural Schema Theory to illustrate how this could be achieved. The justice system is reliant upon the skills and knowledge of the police, therefore, this paper highlights the need for research to focus on the linguistic and non‐verbal differences between Australian Aboriginal English and Australian Standard English in order to develop techniques to facilitate effective communication.
Resumo:
Issues of autonomy impact motivation, the user experience and even psychological wellbeing, yet many questions surrounding design for autonomy remain unanswered. This workshop will explore theory, issues and design strategies related to autonomy drawing on theoretical frameworks available in psychology and looking at autonomy from multiple levels. These include user autonomy within the context of software environments, technologies that increase autonomy in daily life, and how technologies might foster autonomy as a component of psychological development.
Resumo:
Bit-stream-based control, which uses one bit wide signals to control power electronics applications, is a new approach for controller design in power electronic systems. This study presents a novel family of three-phase space vector modulators, which are based on the bit-stream technique and suitable for three-phase inverter systems. Each of the proposed modulators simultaneously converts a two-phase reference to the three-phase domain and reduces switching frequencies to reasonable levels. The modulators do not require carrier oscillators, trigonometric functions or, in some cases, sector detectors. A complete three-phase modulator can be implemented in as few as 102 logic elements. The performance of the proposed modulators is compared through simulation and experimental testing of a 6 kW, three-phase DC-to-AC inverter. Subject to limits on the modulation index, the proposed modulators deliver spread-spectrum output currents with total harmonic distortion comparable to a standard carrier-based space vector pulse width modulator.
Resumo:
This thesis studied the emotional climate (EC) of a pre-service science teachers' class in Bhutan. It examined the types of activities students engaged in and the relationship between the tutor and students whose interactions produced both positive and negative EC in the class. The major finding was that the activities involving students' presentations using video clips and models, group activity, and coteaching valenced the class EC positively. Negative EC was identified when the tutor ignored students' responses, during formal lectures, and when the tutor was uncertain of the subject knowledge. The replication of activities that produce positive EC by other Bhutanese tutors may improve the standard of science education in the country.
Resumo:
Purpose This paper seeks to answer two research questions which are “What are key factors which influence Chinese to adopt mobile technology?” and “Do these key factors differ from factors which are identified from Western context?” Design/methodology The findings from a pilot study with 45 in-depth interviews are used to develop questionnaires and test across 800 residents from the three research cities. The data were analyzed by Structural Equation Modelling together with Multi-group Analysis. Findings Our data suggest eight important concepts, i.e. utilitarian expectation, hedonic expectation, status gains, status loss avoidance, normative influence, external influence, cost, and quality concern, are influential factors affecting users’ intentions to adopt 3G mobile technology. Differences are found between the samples in the three research cities in the effect of hedonic expectation, status gains, status loss avoidance, and normative influence on mobile technology adoption intention. Research limitations/implications: As the stability of intentions may change over time, only measuring intentions might be inadequate in predicting actual adoption behaviors. However, the focus on potential users is thought to be appropriate, given that the development of 3G is still in its infancy in China. Originality/value Previous research into Information Technology (IT) adoption among Chinese users has not paid attention to regional diversity. Some research considered China as a large single market and some was conducted in only one province or one city. Culturally, China is a heterogeneous country.
Resumo:
Solving indeterminate algebraic equations in integers is a classic topic in the mathematics curricula across grades. At the undergraduate level, the study of solutions of non-linear equations of this kind can be motivated by the use of technology. This article shows how the unity of geometric contextualization and spreadsheet-based amplification of this topic can provide a discovery experience for prospective secondary teachers and information technology students. Such experience can be extended to include a transition from a computationally driven conjecturing to a formal proof based on a number of simple yet useful techniques.
Resumo:
We introduce a function which measures the number of distinct ways in which a number can be expressed as the sum of Fibonacci numbers. Using a binary table and other devices, we explore the values that can take and reveal some interesting patterns. The article shows how standard spreadsheet functionalities make it possible to reveal quite striking patterns in data, and is intended to be used in the classroom.
Resumo:
This thesis delivers new knowledge about how Australian community arts practices of appropriate technology are shifting due to the internet. It reconfigures the sector's incumbent ethics of sustainability in response to emerging concerns about how the internet's material politics are affecting cultural participation.
Resumo:
Distributed Network Protocol Version 3 (DNP3) is the de-facto communication protocol for power grids. Standard-based interoperability among devices has made the protocol useful to other infrastructures such as water, sewage, oil and gas. DNP3 is designed to facilitate interaction between master stations and outstations. In this paper, we apply a formal modelling methodology called Coloured Petri Nets (CPN) to create an executable model representation of DNP3 protocol. The model facilitates the analysis of the protocol to ensure that the protocol will behave as expected. Also, we illustrate how to verify and validate the behaviour of the protocol, using the CPN model and the corresponding state space tool to determine if there are insecure states. With this approach, we were able to identify a Denial of Service (DoS) attack against the DNP3 protocol.
Feasibility of using technology to disseminate evidence to rural nurses and improve patient outcomes
Resumo:
Background: Rural African American women receive less frequent mammography screening and die of breast cancer at a higher rate than is seen in the general population. To overcome this disparity, it is necessary to assist rural providers in their efforts to influence women to obtain screening. Method: This study examined the feasibility of using distance education to disseminate knowledge about timely and appropriate mammography screening to rural nurses, using patient outcome data to evaluate the effectiveness of this intervention. Results: Overall, there was a decline in referrals and mammography screening, but the intervention group centers showed a smaller decline after the educational intervention than did the control group. Conclusion: The findings show the effect of dissemination of information and the feasibility of using patient outcome data for educational evaluation. Neighboring academic health centers and nursing schools should include in their mission the provision of educational programs for relatively isolated rural nurses.
Efficient extension of standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Resumo:
Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.
Resumo:
Here we report on the synthesis of caesium doped graphene oxide (GO-Cs) and its application to the development of a novel NO2 gas sensor. The GO, synthesized by oxidation of graphite through chemical treatment, was doped with Cs by thermal solid-state reaction. The samples, dispersed in DI water by sonication, have been drop-casted on standard interdigitated Pt electrodes. The response of both pristine and Cs doped GO to NO2 at room temperature is studied by varying the gas concentration. The developed GO-Cs sensor shows a higher response to NO2 than the pristine GO based sensor due to the oxygen functional groups. The detection limit measured with GO-Cs sensor is ≈90 ppb.
Resumo:
The session explores the potential for “Patron Driven Acquisition” (PDA) as a model for the acquisition of online video. Today, PDA has become a standard model of acquisition in the eBook market, more effectively aligning spend with use and increased return on investment (ROI). PDA is an unexplored model for acquisition of video, for which library collection development is complicated by higher storage and delivery costs, labor overheads for content selection and acquisition, and a dynamic film industry in which media and the technology that supports it is changing daily. Queensland University of Technology (QUT) and La Trobe University in Australia launched a research project in collaboration with Kanopy to explore the opportunity for PDA of video. The study relied on three data sources: (1) national surveys to compare the video purchasing and use practices of colleges, (2) on-campus pilot projects of PDA models to assess user engagement and behavior, and (3) testing of various user applications and features to support the model. The study incorporates usage statistics and survey data and builds upon a peer-reviewed research paper presented at the VALA 2014 conference in Melbourne, Australia. This session will be conducted by the researchers and will graphically present the results from the study. It will map out a future for video PDA, and how libraries can more cost-effectively acquire and maximize the discoverability of online video. The presenters will also solicit input and welcome questions from audience members.