566 resultados para Autobiography as Topic


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis presents a sequential pattern based model (PMM) to detect news topics from a popular microblogging platform, Twitter. PMM captures key topics and measures their importance using pattern properties and Twitter characteristics. This study shows that PMM outperforms traditional term-based models, and can potentially be implemented as a decision support system. The research contributes to news detection and addresses the challenging issue of extracting information from short and noisy text.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We appreciate Holmes' body of work relating to transitions within the Australian landscape, and welcome the opportunity to engage in a discussion on this topic. The paper to which Holmes refers (Bjørkhaug and Richards, 2008) examined the application of agricultural (rather than landscape) multifunctionality in both Norway and Australia. Of specific focus was how non-tradeable concerns, such as environmental sustainability, faired under these divergent systems. We argued that Norway's multifunctionality was strong, due to it being embraced at both the policy and actor level, whereas Australia's could be described as weak. This ‘weak multifunctionality’ that we observed in Australia was due to an emerging bi-lateral (state and federal) policy framework that advocated the importance of environmental values which was rarely embraced by landholders who found themselves trapped on the ‘agricultural treadmill’. The nature of the treadmill is that alternative forms of land use are unthinkable when on-farm investments have been made that support the status quo – to get bigger and/or more efficient. For many of the Australian landholders interviewed in relation to this study, efficiency in production was at odds with the values necessary to effect a transition toward multifunctionality. For instance, graziers in Central Queensland were unconvinced of the value of conserving native flora and fauna when economic viability can be better assured through clear felling native forests to increase the productive capacity of the land.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The value of tertiary journalism education is an often hotly-debated topic among journalism educators and in the industry. Yet, the voices of students are often not heard in these debates. For example, we know relatively little about why young people actually decide to study journalism, what area of journalism they want to work in and what they are looking for in a job. To shed more light on the student perspective, this paper reports on a survey of 320 undergraduate journalism students at six Australian universities. The results show that only a minority actually want to work in news journalism, while most prefer entertainment-focussed areas. Students are motivated mainly by a love for writing and because they like journalism as a profession. In terms of job characteristics, they are particularly interested in their own career progression, but also in the extent to which they can provide a public service.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, there has been much discussion about the quality of research published by Australian journalism academics, without much empirical evidence about what kind of work the field actually engages in. This paper attempts to map the relatively young field of Australian journalism research by presenting the results of a comprehensive meta-analysis of articles published in the Australian Journalism Review between 2000 and 2010. Our findings show that, contrary to evidence elsewhere, a gender balance exists in terms of absolute numbers of authors, although a "glass-ceiling effect" is still discernible. Queensland universities dominate the publications, and most studies employ qualitative rather than quantitative methods. Journalism education is the most popular topic, yet a large variety of topics are evident overall. Despite a heavy focus on Australia, and to a smaller extent New Zealand, the journal also displays a sizeable international touch.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The term ‘‘new media’’ has been in play for decades now, and one might be forgiven for wondering how much longer digital forms and platforms can really be called ‘‘new,’’ or even what the scholarship of new media contributes to knowledge. Is it possible to say new things about new media? We think so. This Companion not only demonstrates the variety, salience, and importance of new media studies but also proposes a distinctive approach to the topic : an approach we call ‘‘new media dynamics.’’ In this view, what’s interesting about ‘‘new media’’ is not novelty as such but dynamism. Capitalism, technology, social networks, and media all evolve and change, sometimes to our delight, sometimes our dismay. This incessant process of disruption, renewal, and eventual (if often partial) replacement is now one of humanity’s central experiences. This cutting-edge collection brings together a stellar array of the world’s top researchers, cultural entrepreneurs, and emerging scholars to give the dynamics of new media their first full-length, multidisciplinary, historical, and critical treatment. Across 34 chapters, an international line-up of the very best authors reflects on the historical, technical, cultural, and political changes that underlie the emergence of new media, as existing patterns and assumptions are challenged by the forces of ‘‘creative destruction’’ and innovation, both economic and cultural. At the same time they show that familiar themes and problems carry through from ‘‘old’’media – questions of identity, sexuality, politics, relationships, and meaning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Level design is often characterised as “where the rubber hits the road” in game development. It is a core area of games design, alongside design of game rules and narrative. However, there is a lack of literature dedicated to documenting teaching games design, let alone the more specialised topic of level design. Furthermore, there is a lack of formal frameworks for best practice in level design, as professional game developers often rely on intuition and previous experience. As a result, there is little for games design teachers to draw on when presented with the opportunity to teach a level design unit. In this paper, we discuss the design and implementation of a games level design unit in which students use the StarCraft II Galaxy Editor. We report on two cycles of an action research project, reflecting upon our experiences with respect to student feedback and peer review, and outlining our plans for improving the unit in years to come.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Attempts by universities to provide an improved learning environment to students have led to an increase in team-teaching approaches in higher education. While the definitions of team-teaching differ slightly, the benefits of team-teaching have been cited widely in the higher education literature. By tapping the specialist knowledge of a variety of staff members, students are exposed to current and emerging knowledge in different fields and topic areas; students are also able to understand concepts from a variety of viewpoints. However, while there is some evidence of the usefulness of team-teaching, there is patchy empirical support to underpin how well students appreciate and adapt to team-teaching approaches. This paper reports on the team-teaching approaches adopted in the delivery of an introductory journalism and communication course at the University of Queensland. The success of the approaches is examined against the background of quantitative and qualitative data. The study found that team-teaching is generally very well received by undergraduate students because they value the diverse expertise and teaching styles they are exposed to. Despite the positive feedback, students also complained about problems of continuity and cohesiveness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The study of international news flows has been a dominant topic of international communication research during the past 50 years. This paper critically reviews past approaches to the analysis of news flows and identifies the main strands of research in this field. In line with some previous critiques of the field, we argue that past research has for too long been influenced by dichotomous debates that failed to take account of the complexities of international news decisions. A new direction is needed in order for news flow research to provide better answers to the recurring questions. This new direction is not a break from past approaches but rather an integration of all different approaches, which would provide researchers with a more holistic framework for analyzing international news flows. This new approach calls for a combination of political, economic, geographic, historical, social and cultural factors, including perspectives from other disciplines, such as anthropology and linguistics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

On Friday 10 January 2014 Education Minister Christopher Pyne formally announced a review of the inaugural Australian curriculum. In his three and half minute televised justification, Pyne (2014) identified a number of criticisms of the national curriculum document, including the ‘necessity to have themes’ of ‘Australia’s place in Asia, Indigenous Australia and sustainability’. It is the second of these themes that we consider as ALEA’s Hot Topic for March 2014. We respond to Pyne’s momentary musing of the necessity of the ‘Indigenous Australian’ theme in the Australian Curriculum with a particular focus on the discipline of English. In the nomenclature of the Australian Curriculum, Assessment and Reporting Authority’s Australian Curriculum (ACARA, 2013), we are of course referring to the ‘cross curriculum priority’ of ‘Aboriginal and Torres Strait Islander histories and cultures’.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Energy efficiency is a complex topic to integrate into higher education curricula, with limited success internationally or in Australia. This paper discusses one of the successful initiatives within the Energy Efficiency Training Program, which was jointly managed and implemented by the New South Wales Office of Environment and Heritage and Department of Education and Communities. The state government initiative aimed to increase the knowledge and skills of the New South Wales workforce, help business to identify and implement energy efficiency projects, and provide professional development for the training providers. Key sectors targeted included property, construction, manufacturing and services. The Program was externally evaluated over the three years 2011 to 2013 and a range of insights were gained through these facilitated reflective opportunities, confirming and building upon literature on the topic to date. This paper presents lessons learned from the engineering part of the program (‘the project’), spanning government agencies, academic institutions, and academia. The paper begins with a contextual summary, followed by a synthesis of key learnings and implications for future training initiatives. It is intended that sharing these lessons will contribute to literature in the field, and assist other organisations in Australia and overseas planning similar initiatives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The importance of repair, maintenance, minor alteration, and addition (RMAA) works is increasing in many built societies. When the volume of RMAA works increases, the occurrence of RMAA accidents also increases. Safety of RMAA works deserves more attention; however, research in this important topic remains limited. Safety climate is considered a key factor that influences safety performance. The present study aims to determine the relationships between safety climate and safety performance of RMAA works, thereby offering recommendations on improving RMAA safety. Questionnaires were dispatched to private property management companies, maintenance sections of quasi-government developers and their subcontractors, RMAA sections of general contractors, small RMAA contractors, building services contractors and trade unions in Hong Kong. In total, data from 396 questionnaires were collected from RMAA workers. The sample was divided into two equal-sized sub-samples. On the first sub-sample SEM was used to test the model, which was validated on the second sub-sample. The model revealed a significant negative relationship between RMAA safety climate and incidence of self-reported near misses and injuries, and significant positive relationships between RMAA safety climate and safety participation and safety compliance respectively. Higher RMAA safety climate was positively associated with a lower incidence of self-reported near misses and injuries and higher levels of safety participation and safety compliance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis opens up the design space for awareness research in CSCW and HCI. By challenging the prevalent understanding of roles in awareness processes and exploring different mechanisms for actively engaging users in the awareness process, this thesis provides a better understanding of the complexity of these processes and suggests practical solutions for designing and implementing systems that support active awareness. Mutual awareness, a prominent research topic in the fields of Computer-Supported Cooperative Work (CSCW) and Human-Computer Interaction (HCI) refers to a fundamental aspect of a person’s work: their ability to gain a better understanding of a situation by perceiving and interpreting their co-workers actions. Technologically-mediated awareness, used to support co-workers across distributed settings, distinguishes between the roles of the actor, whose actions are often limited to being the target of an automated data gathering processes, and the receiver, who wants to be made aware of the actors’ actions. This receiver-centric view of awareness, focusing on helping receivers to deal with complex sets of awareness information, stands in stark contrast to our understanding of awareness as social process involving complex interactions between both actors and receivers. It fails to take into account an actors’ intimate understanding of their own activities and the contribution that this subjective understanding could make in providing richer awareness information. In this thesis I challenge the prevalent receiver-centric notion of awareness, and explore the conceptual foundations, design, implementation and evaluation of an alternative active awareness approach by making the following five contributions. Firstly, I identify the limitations of existing awareness research and solicit further evidence to support the notion of active awareness. I analyse ethnographic workplace studies that demonstrate how actors engage in an intricate interplay involving the monitoring of their co-workers progress and displaying aspects of their activities that may be of relevance to others. The examination of a large body of awareness research reveals that while disclosing information is a common practice in face-to-face collaborative settings it has been neglected in implementations of technically mediated awareness. Based on these considerations, I introduce the notion of intentional disclosure to describe the action of users actively and deliberately contributing awareness information. I consider challenges and potential solutions for the design of active awareness. I compare a range of systems, each allowing users to share information about their activities at various levels of detail. I discuss one of the main challenges to active awareness: that disclosing information about activities requires some degree of effort. I discuss various representations of effort in collaborative work. These considerations reveal that there is a trade-off between the richness of awareness information and the effort required to provide this information. I propose a framework for active awareness, aimed to help designers to understand the scope and limitations of different types of intentional disclosure. I draw on the identified richness/effort trade-off to develop two types of intentional disclosure, both of which aim to facilitate the disclosure of information while reducing the effort required to do so. For both of these approaches, direct and indirect disclosure, I delineate how they differ from related approaches and define a set of design criteria that is intended to guide their implementation. I demonstrate how the framework of active awareness can be practically applied by building two proof-of-concept prototypes that implement direct and indirect disclosure respectively. AnyBiff, implementing direct disclosure, allows users to create, share and use shared representations of activities in order to express their current actions and intentions. SphereX, implementing indirect disclosure, represents shared areas of interests or working context, and links sets of activities to these representations. Lastly, I present the results of the qualitative evaluation of the two prototypes and analyse the results with regard to the extent to which they implemented their respective disclosure mechanisms and supported active awareness. Both systems were deployed and tested in real world environments. The results for AnyBiff showed that users developed a wide range of activity representations, some unanticipated, and actively used the system to disclose information. The results further highlighted a number of design considerations relating to the relationship between awareness and communication, and the role of ambiguity. The evaluation of SphereX validated the feasibility of the indirect disclosure approach. However, the study highlighted the challenges of implementing cross-application awareness support and translating the concept to users. The study resulted in design recommendations aimed to improve the implementation of future systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.