467 resultados para Perishable Items
Resumo:
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.
Resumo:
Using epistemic perspectives as a theoretical framework, this study investigated Australian pre-service teachers’ perspectives about knowing, knowledge and children’s learning, as they engaged in a semester-long unit on philosophy in the classroom. During the field experience component of the unit, pre-service teachers were required to teach at least one philosophy lesson. Pre-service teachers completed the Personal Epistemological Beliefs Survey at the beginning and end of the unit. They were also interviewed in focus groups at the end of the semester to investigate their views about children’s learning. Paired sample t-tests were used to explore changes in epistemic beliefs over time. Significant differences were found for only some individual items on the survey. However, when interviewed, pre-service teachers indicated that field experiences helped them consider children as competent ‘thinkers’ who were capable of engaging in philosophy in the classroom. They reported predominantly student-centred perspectives of children’s learning, although a process of adjudication (exploring disagreements and evidence for responses) was lacking in these responses.
Resumo:
This paper presents a summary of the key findings of the TTF TPACK Survey developed and administered for the Teaching the Teachers for the Future (TTF) Project implemented in 2011. The TTF Project, funded by an Australian Government ICT Innovation Fund grant, involved all 39 Australian Higher Education Institutions which provide initial teacher education. TTF data collections were undertaken at the end of Semester 1 (T1) and at the end of Semester 2 (T2) in 2011. A total of 12881 participants completed the first survey (T1) and 5809 participants completed the second survey (T2). Groups of like-named items from the T1 survey were subject to a battery of complementary data analysis techniques. The psychometric properties of the four scales: Confidence - teacher items; Usefulness - teacher items; Confidence - student items; Usefulness- student items, were confirmed both at T1 and T2. Among the key findings summarised, at the national level, the scale: Confidence to use ICT as a teacher showed measurable growth across the whole scale from T1 to T2, and the scale: Confidence to facilitate student use of ICT also showed measurable growth across the whole scale from T1 to T2. Additional key TTF TPACK Survey findings are summarised.
Resumo:
Objectives Given increasing trends of obesity being noted from early in life and that active lifestyles track across time, it is important that children at a very young age be active to combat a foundation of unhealthy behaviours forming. This study investigated, within a theory of planned behaviour (TPB) framework, factors which influence mothers’ decisions about their child’s 1) adequate physical activity (PA) and 2) limited screen time behaviours. Methods Mothers (N = 162) completed a main questionnaire, via on-line or paper-based administration, which comprised standard TPB items in addition to measures of planning and background demographic variables. One week later, consenting mothers completed a follow-up telephone questionnaire which assessed the decisions they had made regarding their child’s PA and screen time behaviours during the previous week. Results Hierarchical multiple regression analyses revealed support for the predictive model, explaining an overall 73% and 78% of the variance in mothers’ intention and 38% and 53% of the variance in mothers’ decisions to ensure their child engages in adequate PA and limited screen time, respectively. Attitude and subjective norms predicted intention in both target behaviours, as did intentions with behaviour. Contrary to predictions, perceived behavioural control (PBC) in PA behaviour and planning in screen time behaviour were not significant predictors of intention, neither was PBC a predictor of either behaviour. Conclusions The findings illustrate the various roles that psycho-social factors play in mothers’ decisions to ensure their child engages in active lifestyle behaviours which can help to inform future intervention programs aimed at combating very young children’s inactivity.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
This cross-sectional study examined the association between psychosocial factors (mothers’ perception of own and child weight, maternal self-efficacy in feeding and involvement of the mother-in-law in child-feeding) and controlling feeding practices (monitoring, restriction, pressure to eat and passive feeding). Participants were 531 affluent-Indian mothers in Australia and Mumbai with children aged 1-5 years. The psychosocial variables and feeding practices were measured using a combination of previously validated scales and study-developed items/scales. Multivariable regression analyses were stratified by sample (Australia and Mumbai) to investigate psychosocial factors related to the feeding practices, adjusting for covariates. Self-efficacy in feeding was associated with each of the feeding practices in at least one of the samples (β values between 0.1-0.2, p= 0.04-0.005). The greater involvement of the mother-in-law in child-feeding was related to the higher use of restriction in both samples (β values ≥0.2, p=0.02). In contrast, maternal weight perceptions were not consistently associated with feeding practices in either sample. The findings highlighted that unique (self-efficacy in feeding) and culturally-specific (involvement of the mother-in-law) variables not extensively researched within the context of child-feeding were important factors associated with Indian mothers’ feeding practices. Greater consideration of these factors may be required when tailoring child-feeding interventions for Indian mothers.
Resumo:
Many commentators argue that domestic food waste is strongly influenced by consumer behaviours. This article reports on a study using mixed-methods to identify key factors responsible for promoting consumer behaviours that lead to domestic food waste through the lens of the Value-Belief-Norm (VBN) theory. Based on the study’s findings, three factors are proposed that cause behaviours that lead to food waste: supply knowledge – does a consumer know what food they have available; location knowledge – does a consumer know where to locate food items, and; food literacy – to what degree do past experience and acquired knowledge impact on a consumer’s food consumption and wastage practices. We analyse the study’s findings in light of a review of literature about consumer food wastage behaviours and in turn, present new insights into consumer behaviour, food waste, and the use of technology to reduce food waste.
Resumo:
Purpose – This paper aims to examine the tendencies of sustainability reporting by major commercial banks in Bangladesh in comparison with global sustainability reporting indicators outlined in the GRI framework together with banks' predilection toward reporting 16 GRI financial service sector (FSS) specific performance indicators. Design/methodology/approach – Based on the GRI G3 guidelines, the paper investigated banks' reporting in five broad areas of sustainability, such as environment, labour practices and decent works, product responsibility, human rights and society. The 2008/2009 annual reports of 12 major commercial banks listed on Dhaka stock exchange were analysed and coded using a content-based technique. Findings – The results show that information on society is addressed most extensively with regard to extent of reporting. This is followed by the disclosures prepared on decent works and labour practices and environmental issues. Furthermore, the disclosures of product responsibility information and the information for human rights are rather scarce in banks' reporting; on the subject of FSS-specific disclosures, only seven items out of 16 are disclosed by all sample banks. Research limitations/implications – The findings of the study indicate that Bangladeshi commercial banks' social disclosures could develop in this style to become more holistic and over time (in association with the country's central bank involvement) to resemble a type of structured reporting to the point where they are properly labelled per se. Originality/value – The study contributes to the social disclosure literature, in particular in a developing countries banking sector context, seeing as it disseminates evidence of the standing on social disclosures practices at the level of GRI with developing countries' banks data.
Resumo:
Sweet sorghum is receiving significant global interest as an agro-industrial crop because of its capacity to co-produce energy, food, and feed products in integrated biorefineries. This report assesses the opportunities to develop a sweet sorghum industry in Australia, reports on research demonstrating the production of energy, food, and feed products, and assesses the potential economic and sustainability benefits of sweet sorghum biorefineries in the Australian context.
Resumo:
The Child Feeding Questionnaire (CFQ) developed by Birch and colleagues (2001) is a widely used tool for measuring parental feeding beliefs, attitudes and practices. However, the appropriateness of the CFQ for use with Chinese populations is unknown. This study tested the construct validity of a novel Chinese version of the CFQ using confirmatory factor analysis (CFA). Participants included a convenience sample of 254 Chinese-Australian mothers of children aged 1-4 years. Prior to testing, the questionnaire was translated into Chinese using a translation-back-translation method, one item was re-worded to be culturally appropriate, a new item was added (monitoring), and five items that were not age-appropriate for the sample were removed. Based on previous literature, both a 7-factor and an 8-factor model were assessed via CFA. Results showed that the 8-factor model, which separated restriction and use of food rewards, improved the conceptual clarity of the constructs and provided a good fit to the data. Internal consistency of all eight factors was acceptable (Cronbach’s α: .60−.93). This modified 8-factor CFQ appears to be a linguistically and culturally appropriate instrument for assessing feeding beliefs and practices in Chinese-Australian mothers of young children.
Resumo:
This paper focuses on a practice-led research project where the author as artist/researcher participates in a Queensland-wide women’s history project to celebrate Queensland’s Suffrage Centenary in 2005. The author participated in the Women’s Historical Shoebox Collection, where Queensland women were invited to decorate and fill a shoebox with personal and symbolic items that speak about their lives and the lives of their women forebears. This paper explores the practice-led research process that enabled the artist/researcher to design and assemble her contribution. Fredericks describes the iterative process of developing the shoebox and the themes that developed through her artistic practice. She also describes the content of her shoebox and explains the symbolism underpinning the items. The Women’s Historical Shoebox Collection is now owned by the State Library of Queensland and the Jessie Street National Women’s Library.
Resumo:
Accurate monitoring of prevalence and trends in population levels of physical activity (PA) is a fundamental public health need. Test-retest reliability (repeatability) was assessed in population samples for four self-report PA measures: the Active Australia survey (AA, N=356), the short International Physical Activity Questionnaire (IPAQ, N=104), the physical activity items in the Behavioral Risk Factor Surveillance System (BRFSS, N=127) and in the Australian National Health Survey (NHS, N=122). Percent agreement and Kappa statistics were used to assess reliability of classification of activity status as 'active', 'insufficiently active' or 'sedentary'. Intraclass correlations (ICCs) were used to assess agreement on minutes of activity reported for each item of each survey and for total minutes. Percent agreement scores for activity status were very good on all four instruments, ranging from 60% for the NHS to 79% for the IPAQ. Corresponding Kappa statistics ranged from 0.40 (NHS) to 0.52 (AA). For individual items, ICCs were highest for walking (0.45 to 0.78) and vigorous activity (0.22 to 0.64) and lowest for the moderate questions (0.16 to 0.44). All four measures provide acceptable levels of test-retest reliability for assessing both activity status and sedentariness, and moderate reliability for assessing total minutes of activity.
Resumo:
Background Parents play a significant role in shaping youth physical activity (PA). However, interventions targeting PA parenting have been ineffective. Methodological inconsistencies related to the measurement of parental influences may be a contributing factor. The purpose of this article is to review the extant peer-reviewed literature related to the measurement of general and specific parental influences on youth PA. Methods A systematic review of studies measuring constructs of PA parenting was conducted. Computerized searches were completed using PubMed, MEDLINE, Academic Search Premier, SPORTDiscus, and PsycINFO. Reference lists of the identified articles were manually reviewed as well as the authors' personal collections. Articles were selected on the basis of strict inclusion criteria and details regarding the measurement protocols were extracted. A total of 117 articles met the inclusionary criteria. Methodological articles that evaluated the validity and reliability of PA parenting measures (n=10) were reviewed separately from parental influence articles (n=107). Results A significant percentage of studies used measures with indeterminate validity and reliability. A significant percentage of articles did not provide sample items, describe the response format, or report the possible range of scores. No studies were located that evaluated sensitivity to change. Conclusion The reporting of measurement properties and the use of valid and reliable measurement scales need to be improved considerably.
Resumo:
Aim. This paper is a report of a development and validation of a new job performance scale based on an established job performance model. Background. Previous measures of nursing quality are atheoretical and fail to incorporate the complete range of behaviours performed. Thus, an up-to-date measure of job performance is required for assessing nursing quality. Methods. Test construction involved systematic generation of test items using focus groups, a literature review, and an expert review of test items. A pilot study was conducted to determine the multidimensional nature of the taxonomy and its psychometric properties. All data were collected in 2005. Findings. The final version of the nursing performance taxonomy included 41 behaviours across eight dimensions of job performance. Results from preliminary psychometric investigations suggest that the nursing performance scale has good internal consistency, good convergent validity and good criterion validity. Conclusion. The findings give preliminary support for a new job performance scale as a reliable and valid tool for assessing nursing quality. However, further research using a larger sample and nurses from a broader geographical region is required to cross-validate the measure. This scale may be used to guide hospital managers regarding the quality of nursing care within units and to guide future research in the area.