514 resultados para Board group dynamics
Resumo:
There is increasing evidence that parenting and feeding interact to influence children’s eating behaviour and weight status. Interpretation of existing research is complicated by the lack of consensus in the conceptualisation and measurement of both ‘parenting’ and ‘feeding’, particularly the distinction between ‘styles’, ‘dimensions’ and ‘practices’. In addition, the lack of validated tools to concurrently assess feeding practices in infancy limits the capacity to examine the relationships between parenting and feeding in infancy and their short- and long-term influence on weight status. In this paper we provide an overview of the constructs examined in this emerging area of research, highlight the conceptual, definitional and measurement challenges and propose a unifying model to aid design and the interpretation of intervention studies. Progress on these methodological issues will contribute to the robust evidence required to justify investment in interventions that focus on parenting and feeding in the context of child obesity prevention.
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
There is a growing desire for boards of nonprofits to deliver better governance to the organizations they control. Consequently, self-evaluation has become an important tool for nonprofit boards to meet these expectations and demonstrate that they are discharging their responsibilities effectively. This article describes initial results aimed at developing a psychometrically sound, survey-based board evaluation instrument, based on the Team Development Survey (TDS), that assesses the team attributes of an organization’s board. Our results indicate that while constructs applicable to teams generally appear to apply to boards, there are also important differences. We highlight how a perception of board objective clarity, appropriate skills mix, resource availability, and psychological safety were positively and significantly associated with measures of board, management and organizational performance.
Resumo:
Previous research has shown resistance to extinction of fear conditioned to racial out-group faces, suggesting that these stimuli may be subject to prepared fear learning. The current study replicated and extended previous research by using a different racial out-group, and testing the prediction that prepared fear learning is unaffected by verbal instructions. Four groups of Caucasian participants were trained with male in-group (Caucasian) or out-group (Chinese) faces as conditional stimuli; one paired with an electro-tactile shock (CS+) and one presented alone (CS). Before extinction, half the participants were instructed that no more shocks would be presented. Fear conditioning, indexed by larger electrodermal responses to, and blink startle modulation during the CS+, occurred during acquisition in all groups. Resistance to extinction of fear learning was found only in the racial out-group, no instruction condition. Fear conditioned to a racial out-group face was reduced following verbal instructions, contrary to predictions for the nature of prepared fear learning.
Resumo:
Three types of shop scheduling problems, the flow shop, the job shop and the open shop scheduling problems, have been widely studied in the literature. However, very few articles address the group shop scheduling problem introduced in 1997, which is a general formulation that covers the three above mentioned shop scheduling problems and the mixed shop scheduling problem. In this paper, we apply tabu search to the group shop scheduling problem and evaluate the performance of the algorithm on a set of benchmark problems. The computational results show that our tabu search algorithm is typically more efficient and faster than the other methods proposed in the literature. Furthermore, the proposed tabu search method has found some new best solutions of the benchmark instances.
Resumo:
Potential to strengthen a commitment to intervene within a friendship group: – all knew the other passengers, – 3 in 4 discussed intervening with other passengers, – expectations of friends was a key predictive factor. - young women have potential and willingness to intervene in their friends’ drink driving behaviour - majority of campaigns and strategies to reduce alcohol related crashes target the driver however it is arguable that some strategies should target the young female passenger.
Resumo:
Acknowledgement that many children in Australia travel in restraints that do not offer them the best protection has led to recent changes in legislation such that the type of restraint for children under 7 years is now specified. This paper reports the results of two studies (observational; focus group/ survey) carried out in the state of Queensland to evaluate the effectiveness of these changes to the legislation. Observations suggested that almost all of the children estimated as aged 0-12 years were restrained (95%). Analysis of the type of restraint used for target-aged children (0-6 year olds) suggests that the proportion using an age-appropriate restraint has increased by an estimated 7% since enactment of the legislation. However, around 1 in 4 children estimated as aged under 7 years were using restraints too large for good fit. Results from the survey and focus group suggested parents were supportive of the changes in legislation. Non-Indigenous parents agreed that the changes had been necessary, were effective at getting children into the right restraints, were easy to understand as well as making it clear what restraint to use with children. Moreover, they did not see the legislation as too complicated or too hard to comply with. Indigenous parents who participated in a focus group also regarded the legislation as improving children’s safety. However, they identified the cost of restraints as an important barrier to compliance. In summary, the legislation appears to have had a positive effect on compliance levels and on raising parental awareness of the need to restrain children child-specific restraints for longer. However, it would seem that an important minority of parents transition their children into larger restraints too early for optimal protection. Intervention efforts should aim to better inform these parents about appropriate ages for transition, especially from forward facing childseats. This could potentially be through use of other important transitions that occur at the same age, such as starting school. The small proportion of parents who do not restrain their children at all are also an important community sector to target. Finally, obtaining restraints presents a significant barrier to compliance for parents on limited incomes and interventions are needed to address this.
Resumo:
We derive an explicit method of computing the composition step in Cantor’s algorithm for group operations on Jacobians of hyperelliptic curves. Our technique is inspired by the geometric description of the group law and applies to hyperelliptic curves of arbitrary genus. While Cantor’s general composition involves arithmetic in the polynomial ring F_q[x], the algorithm we propose solves a linear system over the base field which can be written down directly from the Mumford coordinates of the group elements. We apply this method to give more efficient formulas for group operations in both affine and projective coordinates for cryptographic systems based on Jacobians of genus 2 hyperelliptic curves in general form.
Resumo:
In this paper, a hardware-based path planning architecture for unmanned aerial vehicle (UAV) adaptation is proposed. The architecture aims to provide UAVs with higher autonomy using an application specific evolutionary algorithm (EA) implemented entirely on a field programmable gate array (FPGA) chip. The physical attributes of an FPGA chip, being compact in size and low in power consumption, compliments it to be an ideal platform for UAV applications. The design, which is implemented entirely in hardware, consists of EA modules, population storage resources, and three-dimensional terrain information necessary to the path planning process, subject to constraints accounted for separately via UAV, environment and mission profiles. The architecture has been successfully synthesised for a target Xilinx Virtex-4 FPGA platform with 32% logic slices utilisation. Results obtained from case studies for a small UAV helicopter with environment derived from LIDAR (Light Detection and Ranging) data verify the effectiveness of the proposed FPGA-based path planner, and demonstrate convergence at rates above the typical 10 Hz update frequency of an autopilot system.
Resumo:
This paper draws on a larger study of the uses of Australian user-created content and online social networks to examine the relationships between professional journalists and highly engaged Australian users of political media within the wider media ecology, with a particular focus on Twitter. It uses an analysis of topic based conversation networks using the #ausvotes hashtag on Twitter around the 2010 federal election to explore the key themes and issues addressed by this Twitter community during the campaign, and finds that Twitter users were largely commenting on the performance of mainstream media and politicians rather than engaging in direct political discussion. The often critical attitude of Twitter users towards the political establishment mirrors the approach of news and political bloggers to political actors, nearly a decade earlier, but the increasing adoption of Twitter as a communication tool by politicians, journalists, and everyday users alike makes a repetition of the polarisation experienced at that time appear unlikely.
Resumo:
RAP-A was developed to meet the need for a universal resilience building program for teenagers which could be readily implemented in a school setting. A universal program targets all teenagers in a particular grade as opposed to those at higher risk for depression (indicated or selective approaches) or a treatment group. It is easier to recruit and engage adolescents in a universal approach where students do not face the risk of stigmatisation by being singled out for intervention. The Resourceful Adolescent Program (RAP: Shochet, Holland & Whitefield, 1997) was developed to meet this need.
Resumo:
The integration of unmanned aircraft into civil airspace is a complex issue. One key question is whether unmanned aircraft can operate just as safely as their manned counterparts. The absence of a human pilot in unmanned aircraft automatically points to a deficiency that is the lack of an inherent see-and-avoid capability. To date, regulators have mandated that an “equivalent level of safety” be demonstrated before UAVs are permitted to routinely operate in civil airspace. This chapter proposes techniques, methods, and hardware integrations that describe a “sense-and-avoid” system designed to address the lack of a see-and-avoid capability in UAVs.