238 resultados para additional key words and phrases
Resumo:
Collisions between different road users make a substantial contribution to road trauma. Although evidence suggests that different road users interpret the same road situations differently, it is not clear how road users' situation awareness differs, nor is it clear which differences might lead to conflicts. This article presents the findings from an on-road study conducted to examine driver, motorcyclist and cyclist situation awareness in different road environments. The findings suggest that, in addition to minor differences in the structure of different road users' situation awareness (i.e. amount of information and how it is integrated), the actual content of situation awareness in terms of road user schemata, the resulting interaction with the world and the information underpinning situation awareness is markedly different. Further examination indicates that the differences are likely to be compatible along arterial roads, shopping strips and at roundabouts, but that they may create conflicts between different road users at intersections. Interventions designed to support compatible situation awareness and behaviour between different road users are discussed. Practitioner Summary: Incompatible situation awareness plays a key role in collisions between different road users (e.g. drivers and motorcyclists). This on-road study examined situation awareness in drivers, motorcyclists and cyclists, identifying the key differences and potential conflicts that arise. The findings are used to propose interventions designed to enhance the compatibility of situation awareness between road users.
Resumo:
"Biological Research on Addiction examines the neurobiological mechanisms of drug use and drug addiction, describing how the brain responds to addictive substances as well as how it is affected by drugs of abuse. The book's four main sections examine behavioral and molecular biology; neuroscience; genetics; and neuroimaging and neuropharmacology as they relate to the addictive process. This volume is especially effective in presenting current knowledge on the key neurobiological and genetic elements in an individual's susceptibility to drug dependence, as well as the processes by which some individuals proceed from casual drug use to drug dependence. Biological Research on Addiction is one of three volumes comprising the 2,500-page series, Comprehensive Addictive Behaviors and Disorders. This series provides the most complete collection of current knowledge on addictive behaviors and disorders to date. In short, it is the definitive reference work on addictions."--publisher website
Resumo:
In 2012, Australia introduced a new National Quality Framework, comprising enhanced quality expectations for early childhood education and care services, two national learning frameworks and a new Assessment and Rating System spanning child care centres, kindergartens and preschools, family day care and outside school hours care. This is the linchpin in a series of education reforms designed to support increased access to higher quality early childhood education and care (ECEC) and successful transition to school. As with any policy change, success in real terms relies upon building shared understanding and the capacity of educators to apply new knowledge and to support change and improved practice within their service. With this in mind, a collaborative research project investigated the efficacy of a new approach to professional learning in ECEC: the professional conversation. This paper reports on the trial and evaluation of a series of professional conversations to support implementation of one element of the NQF, the Early Years Learning Framework (DEEWR,2009), and their capacity to promote collaborative reflective practice, shared understanding, and improved practice in ECEC. Set against the backdrop of the NQF, this paper details the professional conversation approach, key challenges and critical success factors, and the learning outcomes for conversation participants. Findings support the efficacy of this approach to professional learning in ECEC, and its capacity to support policy reform and practice change in ECEC.
Resumo:
There has been an intense debate about climatic impacts on the transmission of malaria. It is vitally important to accurately project future impacts of climate change on malaria to support effective policy–making and intervention activity concerning malaria control and prevention. This paper critically reviewed the published literature and examined both key findings and methodological issues in projecting future impacts of climate change on malaria transmission. A literature search was conducted using the electronic databases MEDLINE, Web of Science and PubMed. The projected impacts of climate change on malaria transmission were spatially heterogeneous and somewhat inconsistent. The variation in results may be explained by the interaction of climatic factors and malaria transmission cycles, variations in projection frameworks and uncertainties of future socioecological (including climate) changes. Current knowledge gaps are identified, future research directions are proposed and public health implications are assessed. Improving the understanding of the dynamic effects of climate on malaria transmission cycles, the advancement of modelling techniques and the incorporation of uncertainties in future socioecological changes are critical factors for projecting the impact of climate change on malaria transmission.
Resumo:
We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.
Resumo:
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.
Resumo:
The work of Gilles Deleuze has influenced an increasing number of music scholars and practicing musicians, particularly those interested in experimental, electronic and popular music. This is despite the notoriously complex nature of his writings, and the specialised theoretical vocabulary that he employs. This thesis both demystifies some of the key terms and concepts of this vocabulary, before demonstrating how Deleuze’s ideas may be put to work in new and fruitful ways; this is achieved with specific reference to the relationships that music has with thought, time and machines. In Chapter 1, Deleuze’s understanding of the power of thought is examined, in particular his approach to communication, transcendence and immanence, and the “powers of thought.” Each of these concepts helps us to understand Deleuze’s work within broad problem of how to think about music immanently: that is, how to maintain that thought and music are both immanent aspects of life and experience. Chapter 2 examines time within a Deleuzian framework, linking his work on cinema with the concept of the “refrain”; both of these areas prove crucial to his understanding of music, as seen in Deleuze’s approach to the work of Varese, Messiaen, and Boulez. In addition, Deleuze’s understanding of time proves fruitful in examining various aspects of music production, as seen in contemporary electronic dance music. Finally, Chapter 3 looks at the concept of the machine, as developed by Deleuze and Guattari, with reference to the sorts of “machinic” connections that a Deleuzian approach encourages us to seek out in music. Once again, examples from contemporary electronic music are presented, in relation to the notions of becoming and subjectivity. Throughout these chapters, Deleuze’s broad understanding of philosophy as the “creation of concepts” is deployed. This means introducing new ideas and specific types of music that encourage creative and novel engagements with the study of music.
Resumo:
Responding to the global and unprecedented challenge of capacity building for twenty-first century life, this book is a practical guide for tertiary education institutions to quickly and effectively renew the curriculum towards education for sustainable development. The book begins by exploring why curriculum change has been so slow. It then describes a model for rapid curriculum renewal, highlighting the important roles of setting timeframes, formal and informal leadership, and key components and action strategies. The second part of the book provides detailed coverage of six core elements that have been trialled and peer reviewed by institutions around the world: - raising awareness among staff and students - mapping graduate attributes - auditing the curriculum - developing niche degrees, flagship courses and fully integrated programs - engaging and catalysing community and student markets - integrating curriculum with green campus operations. With input from more than seventy academics and grounded in engineering education experiences, this book will provide academic staff with tools and insights to rapidly align program offerings with the needs of present and future generations of students.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
Today, many sectors across society are recognising the need to swiftly reduce their growing energy demand, as well as meeting remaining demand with low emissions options. A key ingredient to addressing such issues is equipping professionals – in particular engineers – with emerging energy efficiency knowledge and skills. This paper responds to an identified engineering education gap in Australia, by investigating options to increase energy efficiency content for both undergraduate and postgraduate engineers. The authors summarise the findings of the multi-stage methodology funded by the National Framework for Energy Efficiency (2008-2009), highlighting identified key barriers and benefits to such curriculum renewal. The findings are intended for use by engineering departments, accreditation agencies, professional bodies and government, to identify opportunities for moving forward based on rigorous research, and then to strategically plan the transition. This process, focused on energy efficiency, may also provide valuable parallels for a range of sustainable engineering related topics.
Resumo:
Mammographic density (MD) is a strong heritable risk factor for breast cancer, and may decrease with increasing parity. However, the biomolecular basis for MD-associated breast cancer remains unclear, and systemic hormonal effects on MD-associated risk is poorly understood. This study assessed the effect of murine peripartum states on high and low MD tissue maintained in a xenograft model of human MD. Method High and low MD human breast tissues were precisely sampled under radiographic guidance from prophylactic mastectomy specimens of women. The high and low MD tissues were maintained in separate vascularised biochambers in nulliparous or pregnant SCID mice for 4 weeks, or mice undergoing postpartum involution or lactation for three additional weeks. High and low MD biochamber material was harvested for histologic and radiographic comparisons during various murine peripartum states. High and low MD biochamber tissues in nulliparous mice were harvested at different timepoints for histologic and radiographic comparisons. Results High MD biochamber tissues had decreased stromal (p = 0.0027), increased adipose (p = 0.0003) and a trend to increased glandular tissue areas (p = 0.076) after murine postpartum involution. Stromal areas decreased (p = 0.042), while glandular (p = 0.001) and adipose areas (p = 0.009) increased in high MD biochamber tissues during lactation. A difference in radiographic density was observed in high (p = 0.0021) or low MD biochamber tissues (p = 0.004) between nulliparous, pregnant and involution groups. No differences in tissue composition were observed in high or low MD biochamber tissues maintained for different durations, although radiographic density increased over time. Conclusion High MD biochamber tissues had measurable histologic changes after postpartum involution or lactation. Alterations in radiographic density occurred in biochamber tissues between different peripartum states and over time. These findings demonstrate the dynamic nature of the human MD xenograft model, providing a platform for studying the biomolecular basis of MD-associated cancer risk. © 2013 Springer Science+Business Media New York.
Resumo:
Objectives To review the effects of physical activity on health and behavior outcomes and develop evidence-based recommendations for physical activity in youth. Study design A systematic literature review identified 850 articles; additional papers were identified by the expert panelists. Articles in the identified outcome areas were reviewed, evaluated and summarized by an expert panelist. The strength of the evidence, conclusions, key issues, and gaps in the evidence were abstracted in a standardized format and presented and discussed by panelists and organizational representatives. Results Most intervention studies used supervised programs of moderate to vigorous physical activity of 30 to 45 minutes duration 3 to 5 days per week. The panel believed that a greater amount of physical activity would be necessary to achieve similar beneficial effects on health and behavioral outcomes in ordinary daily circumstances (typically intermittent and unsupervised activity). Conclusion School-age youth should participate daily in 60 minutes or more of moderate to vigorous physical activity that is developmentally appropriate, enjoyable, and involves a variety of activities.
Resumo:
The physical, emotional, educational and social developmental challenges of adolescence can be associated with high levels of emotional vulnerability. Thus, the development of effective emotion-regulation strategies is crucial during this time period. Young people commonly use music to identify, express and regulate their emotions. Modern mobile technology provides an engaging, easily accessible means of assisting young people through music. A systematic contextual review identified 20 iPhone applications addressing emotions through music and two independent raters, using the Mobile App Rating Scale (MARS), evaluated the quality of the apps. Their characteristics, key features and overall quality will be presented. Three participatory design workshops (N=13, 6 males, 7 females; age 15-25) were conducted to explore young people’s use of music to enhance wellbeing. Young people were also asked to trial existing mood and music apps and to conceptualise their ultimate mood targeting music application. A thematic analysis of the participatory design workshops content identified the following music affect-regulation strategies: relationship building, modifying cognitions, modifying emotions, and immersing in emotions. The application of the key learnings from the mobile app review and participatory design workshops and the design and development of the music eScape app were presented and implications for future research was discussed.
Resumo:
This paper presents new five-level current-source inverters (CSIs) with voltage/current buck-boost capability, unlike existing five-level CSIs where only voltage-boost operation is supported. The proposed inverters attain self-inductive-current-balancing per switching cycle at their dc front ends without having to include additional balancing hardware or complex control manipulation. The inverters can conveniently be controlled by using the well-established phase-shifted carrier modulation scheme with only two additional linear references and a mapping logic table needed. Existing modulators can therefore be conveniently retrofitted for controlling the presented inverters. By appropriately coordinating the inverter gating signals, their implementations can be realized by using the least number of components without degrading performance. These enhanced features of the inverters have already been verified in simulation and experimentally using a scaled-down laboratory platform.
Efficient extension of standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Resumo:
Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.