422 resultados para DEPENDENT QUANTUM PROBLEMS
Resumo:
This article argues for an interdisciplinary approach to mathematical problem solving at the elementary school, one that draws upon the engineering domain. A modeling approach, using engineering model eliciting activities, might provide a rich source of meaningful situations that capitalize on and extend students’ existing mathematical learning. The study reports on the developments of 48 twelve-year old students who worked on the Bridge Design activity. Results revealed that young students, even before formal instruction, have the capacity to deal with complex interdisciplinary problems. A number of students created quite appropriate models by developing the necessary mathematical constructs to solve the problem. Students’ difficulties in mathematizing the problem, and in revising and documenting their models are presented and analysed, followed by a discussion on the appropriateness of a modeling approach as a means for introducing complex problems to elementary school students.
Resumo:
In this paper, a hybrid smoothed finite element method (H-SFEM) is developed for solid mechanics problems by combining techniques of finite element method (FEM) and Node-based smoothed finite element method (NS-FEM) using a triangular mesh. A parameter is equipped into H-SFEM, and the strain field is further assumed to be the weighted average between compatible stains from FEM and smoothed strains from NS-FEM. We prove theoretically that the strain energy obtained from the H-SFEM solution lies in between those from the compatible FEM solution and the NS-FEM solution, which guarantees the convergence of H-SFEM. Intensive numerical studies are conducted to verify these theoretical results and show that (1) the upper and lower bound solutions can always be obtained by adjusting ; (2) there exists a preferable at which the H-SFEM can produce the ultrasonic accurate solution.
Resumo:
Anomaly detection compensates shortcomings of signature-based detection such as protecting against Zero-Day exploits. However, Anomaly Detection can be resource-intensive and is plagued by a high false-positive rate. In this work, we address these problems by presenting a Cooperative Intrusion Detection approach for the AIS, the Artificial Immune System, as an example for an anomaly detection approach. In particular we show, how the cooperative approach reduces the false-positive rate of the detection and how the overall detection process can be organized to account for the resource constraints of the participating devices. Evaluations are carried out with the novel network simulation environment NeSSi as well as formally with an extension to the epidemic spread model SIR
Resumo:
Although Australian universities have allocated significant resources toward the development of student support services, administrators have little systematic information about the problems undergraduate university students experience or students' knowledge about available support services. The author surveyed 441 students in an urban, nonresidential university to examine the prevalence of difficulties associated with learning, sexual harassment, discrimination, emotional distress, health problems, course and career concerns, financial difficulties, and difficulties with lecturers; he also assessed students' knowledge of support services in each of these areas. Course concerns were the most common problem, followed by emotional distress, worry about career choices, financial difficulties, and problems with lecturers. More than half of the students were unaware of the support services available to them to address a range of concerns from sexual harassment and discrimination to emotional distress. Approximately 20% of the students reported having used university counseling or career services. Implications for targeting specific areas for outreach programs are discussed.
Resumo:
This paper deals with causal effect estimation strategies in highly heterogeneous empirical settings such as entrepreneurship. We argue that the clearer used of modern tools developed to deal with the estimation of causal effects in combination with our analysis of different sources of heterogeneity in entrepreneurship can lead to entrepreneurship with higher internal validity. We specifically lend support from the counterfactual logic and modern research of estimation strategies for causal effect estimation.
On the effective hydraulic conductivity and macrodispersivity for density-dependent groundwater flow
Resumo:
In this paper, semi-analytical expressions of the effective hydraulic conductivity ( KE) and macrodispersivity ( αE) for 3D steady-state density-dependent groundwater flow are derived using a stationary spectral method. Based on the derived expressions, we present the dependence of KE and αE on the density of fluid under different dispersivity and spatial correlation scale of hydraulic conductivity. The results show that the horizontal KE and αE are not affected by density-induced flow. However, due to gravitational instability of the fluid induced by density contrasts, both vertical KE and αE are found to be reduced slightly when the density factor ( γ ) is less than 0.01, whereas significant decreases occur when γ exceeds 0.01. Of note, the variation of KE and αE is more significant when local dispersivity is small and the correlation scale of hydraulic conductivity is large.
Resumo:
This study explored the health needs, familial and social problems of Thai migrants in a local community in Brisbane, Australia. Five focus groups with Thai migrants were conducted. The qualitative data were examined using thematic content analysis that is specifically designed for focus group analysis. Four themes were identified: (1) positive experiences in Australia, (2) physical health problems, (3) mental health problems, and (4) familial and social health problems. This study revealed key health needs related to chronic disease and mental health, major barriers to health service use, such as language skills, and facilitating factors, such as the Thai Temple. We concluded that because the health needs, familial and social problems of Thai migrants were complex and culture bound, the development of health and community services for Thai migrants needs to take account of the ways in which Thai culture both negatively impacts health and offer positive solutions to problems.
Resumo:
South Asia, a source of great literary and literacy traditions and a generator of great philosophies, also contains a large percentage of illiterate people, the majority of them women. South Asia includes India, Pakistan, Bhutan, Nepal, Sri Lanka, Bangladesh, Burma and Afghanistan. The progress of these countries is dependent on female literacy because health, hygiene, and nutrition problems can be partly overcome through educating women. “Illiteracy is closely related to underdevelopment and poverty, and the elimination of illiteracy represents an essential condition for the development and well-being of peoples and nations" (UNESCO PROAP, 1989: II ). In South Asia, women constitute nearly two- thirds of illiterate adults. There is an inherent contradiction in the region between modern amenities, modern educational systems, and advanced communication systems, on the one hand, and the high level of illiteracy and significant backwardness, on the other.
Resumo:
Depression in childhood or adolescence is associated with increased rates of depression in adulthood. Does this justify efforts to detect (and treat) those with symptoms of depression in early childhood or adolescence? The aim of this study was to determine how well symptoms of anxiety/depression (A-D) in early childhood and adolescence predict adult mental health. The study sample is taken from a population-based prospective birth cohort study. Of the 8556 mothers initially approached to participate 8458 agreed, of whom 7223 mothers gave birth to a live singleton baby. Children were screened using modified Child Behaviour Checklist (CBCL) scales for internalizing and total problems (T-P) at age 5 and the CBCL and Youth Self Report (YSR) A-D subscale and T-P scale at age 14. At age 21, a sub-sample of 2563 young adults in this cohort were administered the CIDI-Auto. Results indicated that screening at age 5 would detect few later cases of significant mental ill-health. Using a cut-point of 20% for internalizing at child age 5 years the CBCL had sensitivities of only 25% and 18% for major depression and anxiety disorders at 21 years, respectively. At age 14, the YSR generally performed a little better than the CBCL as a screening instrument, but neither performed at a satisfactory level. Of the children who were categorised as having YSR A-D at 14 years 30% and 37% met DSM-IV criteria for major depression and anxiety disorders, respectively, at age 21. Our findings challenge an existing movement encouraging the detection and treatment of those with symptoms of mental illness in early childhood.
Resumo:
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermarking schemes. We consider vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked %(medical or other digital) images, where they could still be verified as authentic, though they are actually not. Experimental results successfully demonstrate the practicability and consequences of the proposed attacks for some relevant schemes. The development of the proposed attack models can be used as a means to systematically examine the security levels of similar watermarking schemes.
Resumo:
A one-time program is a hypothetical device by which a user may evaluate a circuit on exactly one input of his choice, before the device self-destructs. One-time programs cannot be achieved by software alone, as any software can be copied and re-run. However, it is known that every circuit can be compiled into a one-time program using a very basic hypothetical hardware device called a one-time memory. At first glance it may seem that quantum information, which cannot be copied, might also allow for one-time programs. But it is not hard to see that this intuition is false: one-time programs for classical or quantum circuits based solely on quantum information do not exist, even with computational assumptions. This observation raises the question, "what assumptions are required to achieve one-time programs for quantum circuits?" Our main result is that any quantum circuit can be compiled into a one-time program assuming only the same basic one-time memory devices used for classical circuits. Moreover, these quantum one-time programs achieve statistical universal composability (UC-security) against any malicious user. Our construction employs methods for computation on authenticated quantum data, and we present a new quantum authentication scheme called the trap scheme for this purpose. As a corollary, we establish UC-security of a recent protocol for delegated quantum computation.