410 resultados para Second Nature
Resumo:
This study provides validity evidence for the Capture-Recapture (CR) method, borrowed from ecology, as a measure of second language (L2) productive vocabulary size (PVS). Two separate “captures” of productive vocabulary were taken using written word association tasks (WAT). At Time 1, 47 bilinguals provided at least 4 associates to each of 30 high-frequency stimulus words in English, their first language (L1), and in French, their L2. A few days later (Time 2), this procedure was repeated with a different set of stimulus words in each language. Since the WAT was used, both Lex30 and CR PVS scores were calculated in each language. Participants also completed an animacy judgment task assessing the speed and efficiency of lexical access. Results indicated that, in both languages, CR and Lex30 scores were significantly positively correlated (evidence of convergent validity). CR scores were also significantly larger in the L1, and correlated significantly with the speed of lexical access in the L2 (evidence of construct validity). These results point to the validity of the technique for estimating relative L2 PVS. However, CR scores are not a direct indication of absolute vocabulary size. A discussion of the method’s underlying assumptions and their implications for interpretation are provided.
Resumo:
It is important that we understand the factors and conditions that shape driver behaviour – those conditions within the road transport system that contribute to driver error and the situations where driver non-compliance to road regulations is likely. This report presents the findings derived from a program of research investigating the nature of errors made by drivers, involving a literature review and an on-road study. The review indicates that, despite significant investigation, the role of different error types in road traffic crashes remains unclear, as does the role of the wider road transport system failures in driver error causation.
Resumo:
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.
Resumo:
Research on subtle dehumanization has focused on the attribution of human uniqueness to groups (infrahumanization), but has not examined another sense of humanness, human nature. Additionally, research has not extended far beyond Western cultures to examine the universality of these forms of dehumanization. Hence, the attribution of both forms of humanness was examined in three cross-cultural studies. Anglo-Australian and ethnic Chinese attributed values and traits (Study 1, N = 200) and emotions (Study 2, N = 151) to Australian and Chinese groups, and rated these characteristics on human uniqueness and human nature. Both studies found evidence of complementary attributions of humanness for Australians, who denied Chinese human nature but attributed them with greater human uniqueness. Chinese denied Australians human uniqueness, but their attributions of human nature varied for traits, values, and emotions. Study 3 (N = 54) demonstrated similar forms of dehumanization using an implicit method. These results and their implications for dehumanization and prejudice suggest the need to broaden investigation and theory to encompass both forms of humanness, and examine the attribution of both lesser and greater humanness to outgroups.
Resumo:
It is commonly perceived that variables ‘measuring’ different dimensions of teaching (construed as instructional attributes) used in student evaluation of teaching (SET) questionnaires are so highly correlated that they pose a serious multicollinearity problem for quantitative analysis including regression analysis. Using nearly 12000 individual student responses to SET questionnaires and ten key dimensions of teaching and 25 courses at various undergraduate and postgraduate levels for multiple years at a large Australian university, this paper investigates whether this is indeed the case and if so under what circumstances. This paper tests this proposition first by examining variance inflation factors (VIFs), across courses, levels and over time using individual responses; and secondly by using class averages. In the first instance, the paper finds no sustainable evidence of multicollinearity. While, there were one or two isolated cases of VIFs marginally exceeding the conservative threshold of 5, in no cases did the VIFs for any of the instructional attributes come anywhere close to the high threshold value of 10. In the second instance, however, the paper finds that the attributes are highly correlated as all the VIFs exceed 10. These findings have two implications: (a) given the ordinal nature of the data ordered probit analysis using individual student responses can be employed to quantify the impact of instructional attributes on TEVAL score; (b) Data based on class averages cannot be used for probit analysis. An illustrative exercise using level 2 undergraduate courses data suggests higher TEVAL scores depend first and foremost on improving explanation, presentation, and organization of lecture materials.
Resumo:
The study examined the health-related behaviours of Saudi people following a recent cardiac event and identified the factors that influence these behaviours using McLeroy et al.'s (1988) Ecological Model of Health Behaviours as a guiding framework. The study was one of the first in Saudi Arabia to examine the health-related behaviours of Saudi people following a recent cardiac event. The study findings emphasise the importance of a program that integrates secondary prevention practices, educational approaches and targeted supportive services in cardiac care in Saudi Arabia.
Resumo:
This article provides a general review of the literature on the nature and role of empathy in social interaction for information professionals working in a variety of information and knowledge environments. Relational agency theory (Edwards, 2005) is used asa framework to re-conceptualize education for empathic social interaction between information professionals and their clients. Past, present and future issues relevant to empathic interaction in information and knowledge management are discussed in the context of three shifts identified from the literature: (a) the continued increase in communication channels, both physical and virtual, for reference, information and re-search services, (b) the transition from the information age to the conceptual age and(c) the growing need for understanding of the affective paradigm in the information and knowledge professions. Findings from the literature review on the relationships between empathy and information behavior, social networking, knowledge management and information and knowledge services are presented. Findings are discussed in relation to the development of guidelines for the affective education and training of information and knowledge professionals and the potential use of virtual learning software such as Second Life in developing empathic communication skills
Resumo:
We aim to design strategies for sequential decision making that adjust to the difficulty of the learning problem. We study this question both in the setting of prediction with expert advice, and for more general combinatorial decision tasks. We are not satisfied with just guaranteeing minimax regret rates, but we want our algorithms to perform significantly better on easy data. Two popular ways to formalize such adaptivity are second-order regret bounds and quantile bounds. The underlying notions of 'easy data', which may be paraphrased as "the learning problem has small variance" and "multiple decisions are useful", are synergetic. But even though there are sophisticated algorithms that exploit one of the two, no existing algorithm is able to adapt to both. In this paper we outline a new method for obtaining such adaptive algorithms, based on a potential function that aggregates a range of learning rates (which are essential tuning parameters). By choosing the right prior we construct efficient algorithms and show that they reap both benefits by proving the first bounds that are both second-order and incorporate quantiles.
Resumo:
Group membership is central to social interaction. Within peer groups, social hierarchies and affiliations are matters to which members seriously attend (Corsaro, 2014). Studies of peer groups highlight how status is achieved through oppositional actions. This paper examines the way in which competition and collaboration in a children’s peer group accomplishes status during the production and management of “second stories” (Sacks 1992). We present analysis of the interaction of young boys in a preparatory year playground who are engaged in a single instance of storytelling “rounds”. Analysis highlights the pivotal role of members’ contributions, assessments and receipts in a series of second stories that enact a simultaneously competitive and collaborative local order.
Resumo:
This chapter considers the key characteristics of different types of child abuse and neglect, and outlines the nature and justifiability of mandatory reporting laws. The issue of whether these laws may be useful for child protection in developing countries with emerging economies is an important one. ‘Developing country’ is a term used by various institutions to describe a nation which has a lower living standard, industrial base, and human development index (HDI) compared to other countries (World Bank 2012; United Nations Development Programme 2013). In the context of developing countries, the chapter addresses two questions: first, might some forms of maltreatment be more suited to mandatory reporting than others? Second, what options for child protection may be considered by developing countries, taking into account children’s needs, cultural conditions and practices, economic imperatives, and the different levels of preparedness to implement child protection strategies?