1000 resultados para Computer vison


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Study objective: The purpose of this study is to examine emergency nurses' performance using triage scenarios characterized by type of patient population (adult versus pediatric) and mode of delivery (paper versus computer). Methods:   A combination of paper-based (script alone) and computer-based (script plus still photographs) triage scenarios were used. Of the 28 scenarios used, half were written and half were computer based. Within each subgroup, there were 7 adult and 7 pediatric scenarios. Participants were asked to allocate an Australasian Triage Scale category for each triage scenario. Results: One hundred sixty-seven participants completed a total of 2,349 adult scenarios, and 161 participants completed 2,265 pediatric scenarios. Sixty-one percent of the triage decisions made by the nurses were “expected” triage decisions, 18% were “undertriage,” decisions, and 21% were “overtriage” decisions. Nurse triage allocation decisions for the scenarios containing still photographs delivered by computer demonstrated a higher average agreement percentage of 66.2% (κ=0.56; τb=0.77; P<.0001) compared with the average agreement percentage of 55.4% (κ=0.42; τb=0.75; P<.0001) using paper-based (text-only) scenarios. Conclusion: The mode of delivery appeared to have an effect on the nurses' triage performance. It is unclear whether the use of simple still photographs used in the computer mode of delivery resulted in a higher incidence of expected triage decisions and, thus, improved performance. The use of cues such as photographs and video footage to enhance the fidelity of triage scenarios may be useful not only for the education of triage nurses but also the conduct of research into triage decisionmaking. However, further exploration and research in this area are warranted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A number of central precepts of flexible delivery of workplace training are challenged by research showing that vocational learners are typically non-verbal, and prefer structured and social learning environments. That research is reviewed, together with a number of strategies that will assist flexible delivery to these learners. These strategies are largely amenable to
computer-mediated communication.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the introduction of a computer conferencing  component into a first year study unit in Technology Management at Deakin University, Australia. It was found that significant variations in computer  usage were correlated to student study mode, including source of computer access, source of Internet access, hours per week computer usage, regular use of email, regular use of the Internet, and number of times the conference was accessed. Other moderate differences were also noted. Following  exposure to the computer conference, on-campus students were more likely to agree computers could assist their learning, and off-campus students  were less likely to agree that learning from computers would be better than classes/lectures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A brief narrative description of the journal article, document, or resource. This paper presents the reflective perspectives of the student and supervisor in a successful computer-mediated research relationship at Deakin University (Australia). Key contributing factors are discussed in a dialog format covering the role of computer-mediated communication (CMC), the projection of social presence, student self-efficacy beliefs, the role of information and communication technology (ICT), and interaction in online professional networks. Drawing on relevant theory, inherent challenges are addressed, informing some concluding suggestions as to how supervision might become more responsive to the emergent forms of research learning being experienced by escalating numbers of postgraduate students studying at a distance via ICT.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Salmon’s (2000) proposed model for the effective development of on-line communication and collaboration between student suggests that on-line socialisation forms an early and important component of establishing required levels of comfort and skill. In this paper we review research with Chinese learners that suggests that some adjustments to Salmon’s model may be advisable for these students. Specifically, the model is redeveloped to provide a more structured experience, and to use that structure to develop online skills, such that comfortable socialisation is seen as an end-point rather than as an early enabler.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A longitudinal analysis of computer usage by commencing students in Deakin University’s undergraduate engineering and technology programs over the period 1998 to 2001 revealed that; access to computers was at high levels; mean computer usage for off-campus students had not changed
significantly, but had risen significantly for on-campus students; while access to the Internet / WWW had not increased significantly, reported regular use of the Internet / WWW had risen significantly; while most students continued to report their source of Internet / WWW access as either Home or University, the proportion reporting Home as their source of access had risen significantly; and the reported regular use of e-mail rose significantly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper will provide an overview of the CMC structure in two different units of study in the Masters of Professional Education and Training at Deakin University. Each of these structures makes a set of demands on participants, and provides differing collaborative learning opportunities. The paper examines the experiences we have had in each of these structures, focusing on student participation, style of contribution to CMC, and the relationship between socialisation processes and knowledge construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Content analysis of computer conferences provides a rich source of data for researching and understanding online learning. However the complexities of using content analysis in a relatively new research field have resulted in researchers avoiding its use as a qualitative or quantitative method and using more familiar methods such as survey and interview instead. Ethical issues are also raised that, though ensuring students’ rights, particularly to privacy and with no fear of coercion, are making it difficult for researchers to access and analyse archives of conference data as a research source. This paper suggests a pragmatic but systematic approach to solving these research issues by using several research strategies that are described in the context of the authors’ research and practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the student use of resources placed on the CMC system for them by the academics in a foundation Management unit of a Bachelor of Commerce degree at one of Australia's largest providers of off campus university education. The findings of this pilot study highlight that the students may not necessarily have the same appreciation of the value of the material that the academics perceive it to have. Also, it would appear that students are choosing to interact with the material at a sub-optimal rate, that in itself may be hampering their own learning experiences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer frauds, while less dramatic than crimes of violence, can inflict significant damage at community, organizational or individual level. In order to properly quantify and mitigate the risk, computer frauds needs to be well understood. In this paper, in a conceptual-analytical research approach, we propose a dissection of computer fraud. First, we look into the elements of an offense, the act of fraud in general, than explain what is and what is not computer fraud. Next, from a prevention perspective, we propose a taxonomy of computer fraud with respect to perpetration platform, and to perpetration method. We believe that our contributions extend the existing knowledge of the phenomenon, and can assist those fighting computer fraud to better understand it and to design means of preventing and reporting it.