484 resultados para Explicit guarantees
Resumo:
This article discusses what recent statistics and public reports reveal about the funding of GEERS (now the FEG) and its bottom line. The article examines (1) whether there has been a “blowout” in the scheme which guarantees the recovery of employee entitlements in liquidations and (2) what might be done to put the scheme on a firmer fiscal footing.
Resumo:
The influence of different instructional constraints on movement organisation and performance outcomes of the penalty kick (PK) was investigated according to participant age. Sixty penalty takers and twelve goalkeepers from two age groups (under 15 and under 17) performed 300 PKs under five different task conditions, including: no explicit instructional constraints provided (Control); instructional constraints on immobility (IMMOBILE) and mobility (MOBILE) of goalkeepers; and, use of keeper-dependent (DEP) and independent (INDEP) strategies by penalty takers. Every trial was video recorded and digitised using motion analysis techniques. Dependent variables (DVs) were: movement speed of penalty takers and the angles between the goalkeeper's position and the goal line (i.e., diving angle), and between the penalty taker and a line crossing the penalty spot and the centre of the goal (i.e., run up angle). Instructions significantly influenced the way that goalkeepers (higher values in MOBILE relative to Control) and penalty takers (higher values in Control than in DEP) used movement speed during performance, as well as the goalkeepers' movements and diving angle (less pronounced dives in the MOBILE condition compared with INDEP). Results showed how different instructions constrained participant movements during performance, although players' performance efficacy remained constant, reflecting their adaptive variability.
Resumo:
This paper treats the blast response of a pile foundation in saturated sand using explicit nonlinear finite element analysis, considering complex material behavior of soil and soil–pile interaction. Blast wave propagation in the soil is studied and the horizontal deformation of pile and effective stresses in the pile are presented. Results indicate that the upper part of the pile to be vulnerable and the pile response decays with distance from the explosive. The findings of this research provide valuable information on the effects of underground explosions on pile foundation and will guide future development, validation and application of computer models.
Resumo:
Rayleigh–Stokes problems have in recent years received much attention due to their importance in physics. In this article, we focus on the variable-order Rayleigh–Stokes problem for a heated generalized second grade fluid with fractional derivative. Implicit and explicit numerical methods are developed to solve the problem. The convergence, stability of the numerical methods and solvability of the implicit numerical method are discussed via Fourier analysis. Moreover, a numerical example is given and the results support the effectiveness of the theoretical analysis.
Resumo:
This paper proposes that the generational approach to conceptualising first year student learning behaviour, while it has made a very useful contribution to understanding that behaviour, can be expanded upon. The generational approach has an explicit focus on student behaviour and it is suggested that a capability maturity model interpretation may provide a complementary extension of that as it allows an assessment of institutional capability to initiate, plan, manage and evaluate institutional student engagement practices. The development of a Student Engagement, Success and Retention Maturity Model (SESR-MM) is discussed along with Australasian FYE generational data and Australian SESR-MM data.
Resumo:
Heteroatom doping on the edge of graphene may serve as an effective way to tune chemical activity of carbon-based electrodes with respect to charge carrier transfer in an aqueous environment. In a step towards developing mechanistic understanding of this phenomenon, we explore herein mechanisms of proton transfer from aqueous solution to pristine and doped graphene edges utilizing density functional theory. Atomic B-, N-, and O- doped edges as well as the native graphene are examined, displaying varying proton affinities and effective interaction ranges with the H3O+ charge carrier. Our study shows that the doped edges characterized by more dispersive orbitals, namely boron and nitrogen, demonstrate more energetically favourable charge carrier exchange compared with oxygen, which features more localized orbitals. Extended calculations are carried out to examine proton transfer from the hydronium ion in the presence of explicit water, with results indicating that the basic mechanistic features of the simpler model are unchanged.
Resumo:
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.
Resumo:
Purpose – The purpose of this paper is to investigate whether new and young firms are different from older firms. This analysis is undertaken to explore general characteristics, use of external resources and growth orientation. Design/methodology/approach – Data from the 2008 UK Federation of Small Businesses survey provided 8,000 responses. Quantitative analysis identified significantly different characteristics of firms from 0-4, 4-9, 9-19 and 20+ years. Factor analysis was utilised to identify the advice sets, finance and public procurement customers of greatest interest, with ANOVA used to statistically compare firms in the identified age groups with different growth aspirations. Findings – The findings reveal key differences between new, young and older firms in terms of characteristics including business sector, owner/manager age, education/business experience, legal status, intellectual property and trading performance. New and young firms were more able to access beneficial resources in terms of finance and advice from several sources. New and young firms were also able to more easily access government and external finance, as well as government advice, but less able to access public procurement. Research limitations/implications – New and young firms are utilising external networks to access several resources for development purposes, and this differs for older firms. This suggests that a more explicit age-differentiated focus is required for government policies aimed at supporting firm growth. Originality/value – The study provides important baseline data for future quantitative and qualitative studies focused on the impact of firm age and government policy.
Resumo:
This chapter focuses on learning and assessment as social and cultural practices situated within national and international policy contexts of educational change. Classroom assessment was researched using a conceptualization of knowing in action, or the ‘generative dance’. Fine-grained analyses of interactivity between students, and between teacher and student/s, and their patterns of participation in assessment and learning were conducted. The findings offer original insights into how learners draw on explicit and tacit forms of knowing in order to successfully participate in learning. Assessment is re-imagined as a dynamic space in which teachers learn about their students as they learn with their students, and where all students can be empowered to find success.
Resumo:
The most powerful known primitive in public-key cryptography is undoubtedly elliptic curve pairings. Upon their introduction just over ten years ago the computation of pairings was far too slow for them to be considered a practical option. This resulted in a vast amount of research from many mathematicians and computer scientists around the globe aiming to improve this computation speed. From the use of modern results in algebraic and arithmetic geometry to the application of foundational number theory that dates back to the days of Gauss and Euler, cryptographic pairings have since experienced a great deal of improvement. As a result, what was an extremely expensive computation that took several minutes is now a high-speed operation that takes less than a millisecond. This thesis presents a range of optimisations to the state-of-the-art in cryptographic pairing computation. Both through extending prior techniques, and introducing several novel ideas of our own, our work has contributed to recordbreaking pairing implementations.
Resumo:
As a decentralised communication technology, the Internet has offered much autonomy and unprecedented communication freedom to the Chinese public. Yet the Chinese government has imposed different forms of censorship over cyberspace. However, the Hong Kong erotic photo scandal reshuffles the traditional understanding of censorship in China as it points to a different territory. The paper takes the Hong Kong erotic photo scandal in 2008 as a case study and aims to examine the social and generational conflicts hidden in China. When thousands of photos containing sexually explicit images of Hong Kong celebrities were released on the Internet, gossip, controversies and eroticism fuelled the public discussion and threatened traditional values in China. The Internet provides an alternative space for the young Chinese who have been excluded from mainstream social discourse to engage in public debates. This, however, creates concerns, fear and even anger among the older generations in China, because they can no longer control, monitor and educate their children in the way that their predecessors have done for centuries. The photo scandal illustrates the internal social conflicts and distrust between generations in China and the generational conflict has a far-reaching political ramification as it creates a new concept of censorship.
Resumo:
Teaching English to EAL/D learners as a cross-curricula priority, not just the purview of the English classroom or language specialist, is now officially endorsed in the national curriculum. Yet many teachers, including subject English teachers, feel ill-equipped for this task. This paper presents an action research project conducted with a teacher of junior secondary English and Geography. The focus of the project was developing metacognitive reading strategies among EAL/D learners to enable them to access content area information more effectively and more independently. We discuss the particular strategies that were beneficial for students at the Emerging level of English and present a range of research-based reading strategies that teachers can embed in regular teaching in order to enhance reading comprehension. Examples from Geography and English lessons will be provided to show how the teaching of explicit ‘second language’ reading strategies can position EAL/D learners as valuable members of the classroom.
Resumo:
The communal nature of knowledge production predicts the importance of creating learning organisations where knowledge arises out of processes that are personal, social, situated and active. It follows that workplaces must provide both formal and informal learning opportunities for interaction with ideas and among individuals. This grounded theory for developing contemporary learning organisations harvests insights from the knowledge management, systems sciences, and educational learning literatures. The resultant hybrid theoretical framework informs practical application, as reported in a case study that harnesses the accelerated information exchange possibilities enabled through web 2.0 social networking and peer production technologies. Through complementary organisational processes, 'meaning making' is negotiated in formal face-to-face meetings supplemented by informal 'boundary spanning' dialogue. The organisational capacity building potential of this participatory and inclusive approach is illustrated through the example of the Dr. Martin Luther King, Jr. Library in San Jose, California, USA. As an outcome of the strategic planning process at this joint city-university library, communication, decision-making, and planning structures, processes, and systems were re-invented. An enterprise- level redesign is presented, which fosters contextualising information interactions for knowledge sharing and community building. Knowledge management within this context envisions organisations as communities where knowledge, identity, and learning are situated. This framework acknowledges the social context of learning - i.e., that knowledge is acquired and understood through action, interaction, and sharing with others. It follows that social networks provide peer-to-peer enculturation through intentional exchange of tacit information made explicit. This, in turn, enables a dynamic process experienced as a continuous spiral that perpetually elevates collective understanding and enables knowledge creation.
Resumo:
To overcome the challenge of finding placements for large student numbers, QUT has partnered with community organisations to enable students to work on community-based projects addressing a community need. Students work in interdisciplinary teams with the community organisation to resolve issues and identify solutions to suit the organisation and client base. This paper will describe the community engaged learning pedagogy that is employed in the subject and will consider the benefits and challenges to law students of working collaboratively and developing community relationships. Critical appraisal of the legal system and the role of lawyers and analysis of the professional and ethical responsibilities legal practitioners is a focus of the subject. Explicit emphasis is placed on developing a sense of social responsibility and inculcating a pro bono ethos. Students attend workshops on topics such as reflective practice, cultural competencies, client solutions, collaborative practice and ethical obligations. This paper will discuss the challenges in creating the new legal clinic subject, benefits to students and community partners, and the results of initial student evaluation of the subject.
Resumo:
Detailed mechanisms for the formation of hydroxyl or alkoxyl radicals in the reactions between tetrachloro-p-benzoquinone (TCBQ) and organic hydroperoxides are crucial for better understanding the potential carcinogenicity of polyhalogenated quinones. Herein, the mechanism of the reaction between TCBQ and H2O2 has been systematically investigated at the B3LYP/6-311++G** level of theory in the presence of different numbers of water molecules. We report that the whole reaction can easily take place with the assistance of explicit water molecules. Namely, an initial intermediate is formed first. After that, a nucleophilic attack of H2O2 onto TCBQ occurs, which results in the formation of a second intermediate that contains an OOH group. Subsequently, this second intermediate decomposes homolytically through cleavage of the O-O bond to produce a hydroxyl radical. Energy analyses suggest that the nucleophilic attack is the rate-determining step in the whole reaction. The participation of explicit water molecules promotes the reaction significantly, which can be used to explain the experimental phenomena. In addition, the effects of F, Br, and CH3 substituents on this reaction have also been studied.