752 resultados para Classical School


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Driving on an approach to a signalized intersection while distracted is particularly dangerous, as potential vehicular conflicts and resulting angle collisions tend to be severe. Given the prevalence and importance of this particular scenario, the decisions and actions of distracted drivers during the onset of yellow lights are the focus of this study. Driving simulator data were obtained from a sample of 58 drivers under baseline and handheld mobile phone conditions at the University of Iowa - National Advanced Driving Simulator. Explanatory variables included age, gender, cell phone use, distance to stop-line, and speed. Although there is extensive research on drivers’ responses to yellow traffic signals, the examination has been conducted from a traditional regression-based approach, which does not necessary provide the underlying relations and patterns among the sampled data. In this paper, we exploit the benefits of both classical statistical inference and data mining techniques to identify the a priori relationships among main effects, non-linearities, and interaction effects. Results suggest that novice (16-17 years) and young drivers’ (18-25 years) have heightened yellow light running risk while distracted by a cell phone conversation. Driver experience captured by age has a multiplicative effect with distraction, making the combined effect of being inexperienced and distracted particularly risky. Overall, distracted drivers across most tested groups tend to reduce the propensity of yellow light running as the distance to stop line increases, exhibiting risk compensation on a critical driving situation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smartphones become very critical part of our lives as they offer advanced capabilities with PC-like functionalities. They are getting widely deployed while not only being used for classical voice-centric communication. New smartphone malwares keep emerging where most of them still target Symbian OS. In the case of Symbian OS, application signing seemed to be an appropriate measure for slowing down malware appearance. Unfortunately, latest examples showed that signing can be bypassed resulting in new malware outbreak. In this paper, we present a novel approach to static malware detection in resource-limited mobile environments. This approach can be used to extend currently used third-party application signing mechanisms for increasing malware detection capabilities. In our work, we extract function calls from binaries in order to apply our clustering mechanism, called centroid. This method is capable of detecting unknown malwares. Our results are promising where the employed mechanism might find application at distribution channels, like online application stores. Additionally, it seems suitable for directly being used on smartphones for (pre-)checking installed applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the context of culturally diverse high poverty areas of Australia, we have conducted collaborative research with teachers and students in a primary school for more than a decade. Teachers have been exploring the affordances of place‐based pedagogies (Gruenewald & Smith, 2008) for the development of students’ spatial literacies and their understandings of the politics of places and built environments (Comber, Nixon, Ashmore, Loo & Cook, 2006; Comber, Thomson and Wells, 2001). This paper reports on a project in which the affordances of placedbased pedagogy are being explored through teacher inquiries and classroom‐based design experiments (Cobb, Confrey, di Sessa, Lehrer & Schauble, 2003). Located within a large‐scale urban renewal project in which houses are being demolished and families relocated, the original school has been replaced by a larger school that serves a population from a wider area. In this paper we draw on the study to consider the challenges of working with teachers and primary school students to study innovative ideas and practices in educational research. Specifically we consider issues raised by collaborative studies of the affordances of cross curricular projects focusing on social and environmental change to engage students in academic learning and expand their literate repertoires in a changing policy climate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modern mobile computing devices are versatile, but bring the burden of constant settings adjustment according to the current conditions of the environment. While until today, this task has to be accomplished by the human user, the variety of sensors usually deployed in such a handset provides enough data for autonomous self-configuration by a learning, adaptive system. However, this data is not fully available at certain points in time, or can contain false values. Handling potentially incomplete sensor data to detect context changes without a semantic layer represents a scientific challenge which we address with our approach. A novel machine learning technique is presented - the Missing-Values-SOM - which solves this problem by predicting setting adjustments based on context information. Our method is centered around a self-organizing map, extending it to provide a means of handling missing values. We demonstrate the performance of our approach on mobile context snapshots, as well as on classical machine learning datasets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explores the role of principal leadership in creating a thinking school. It contributes to the school leadership literature by exploring the intersection of two important areas of study in education - school leadership and education for thinking - which is a particularly apt area of study, because effective school leadership is crucial if students are to learn to be critical and creative thinkers, yet this connection has not be widely investigated. We describe how one principal, Hinton, turned around an underperforming school by using critical and creative philosophical thinking as the focus for students, staff and parents. Then, drawing on the school leadership literature, the article describes seven attributes of school leadership beginning with four articulated by Leithwood and colleagues (2006) (building vision and setting direction; redesigning the organisation; understanding and developing people; managing the teaching and learning program), and adding three others (influence; self-development; and responding to context). This framework is then used in a case study format in a collaboration between practitioner and researchers to first explore evidence from empirical studies and personal reflection about Hinton's leadership of Buranda State School, and second to illuminate how these general features of school leadership apply to creating a thinking school. Based on the case study and using the general characteristics of school leadership, a framework for leading a thinking school is described. Because the framework is based on a turnaround school, this framework has wide applicability: to schools that are doing well as an indication of how to implement a contemporary approach to curriculum and pedagogy; and to schools that are underperforming and want a rigorous, high expectation and contemporary way to improve student learning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Australian study explores the mentoring of pre-service teachers in selecting and implementing teaching strategies to meet students‟ learning needs. Two case studies involving 28 mentor teachers in a professional development program and a mentor-mentee partnership during a four week practicum provided data about mentoring teaching strategies for differentiated learning. Findings showed that contexts for learning about differentiation occurred at the pre action, in-action, and post-action stages. Central to each stage were pedagogical knowledge practices such as planning, preparation, classroom management, assessment, and problem solving (reflection-in-action to present solutions to problems) as key to in-action strategising and the mentoring processes. Mentoring pre-service teachers on how to devise teaching strategies for differentiated learning needs to be researched with a wider range of mentors and pre-service teachers, including those at different stages of development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The evolution of classic power grids to smart grids creates chances for most participants in the energy sector. Customers can save money by reducing energy consumption, energy providers can better predict energy demand and environment benefits since lower energy consumption implies lower energy production including a decrease of emissions from plants. But information and communication systems supporting smart grids can also be subject to classical or new network attacks. Attacks can result in serious damage such as harming privacy of customers, creating economical loss and even disturb the power supply/demand balance of large regions and countries. In this paper, we give an overview about the German smart measuring architecture, protocols and security. Afterwards, we present a simulation framework which enables researchers to analyze security aspects of smart measuring scenarios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Theoretical foundations of higher order spectral analysis are revisited to examine the use of time-varying bicoherence on non-stationary signals using a classical short-time Fourier approach. A methodology is developed to apply this to evoked EEG responses where a stimulus-locked time reference is available. Short-time windowed ensembles of the response at the same offset from the reference are considered as ergodic cyclostationary processes within a non-stationary random process. Bicoherence can be estimated reliably with known levels at which it is significantly different from zero and can be tracked as a function of offset from the stimulus. When this methodology is applied to multi-channel EEG, it is possible to obtain information about phase synchronization at different regions of the brain as the neural response develops. The methodology is applied to analyze evoked EEG response to flash visual stimulii to the left and right eye separately. The EEG electrode array is segmented based on bicoherence evolution with time using the mean absolute difference as a measure of dissimilarity. Segment maps confirm the importance of the occipital region in visual processing and demonstrate a link between the frontal and occipital regions during the response. Maps are constructed using bicoherence at bifrequencies that include the alpha band frequency of 8Hz as well as 4 and 20Hz. Differences are observed between responses from the left eye and the right eye, and also between subjects. The methodology shows potential as a neurological functional imaging technique that can be further developed for diagnosis and monitoring using scalp EEG which is less invasive and less expensive than magnetic resonance imaging.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A little-known facet of Cuban internationalism is the Cuba shares in the education of young people who want to help build a stronger media culture that represents voices from the global South. Cuba was instrumental in the establishment and operation of the International Film and Television School at San Antonio de los Baños. The Cuban government provided the location and buildings for the school, and among the range of international media professionals who teach the students are selected Cuban professors from the Institute of the Arts, based n Havana. The International Film and Television School is supported by funding from Spain and other countries, and by the willingness of international media professionals to teach short courses for little more than an honorarium. Cuba used to provide full scholarships for student from the South to study a two-year course in film or television, but now charges fees for its three-year diploma course.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

School connectedness is an important protective factor for adolescent risk-taking behaviour. This study examined a pilot version of the Skills for Preventing Injury in Youth (SPIY) programme, combining teacher professional development for increasing school connectedness (connectedness component) with a risk and injury prevention curriculum for early adolescents (curriculum component). A process evaluation was conducted on the connectedness component, involving assessments of programme reach, participant receptiveness and initial use, and a preliminary impact evaluation was conducted on the combined connectedness and curriculum programme. The connectedness component was well received by teacher participants, who saw benefits for both themselves and their students. Classroom observation also showed that teachers who received professional development made use of the programme strategies. Grade 8 students who participated in the SPIY programme were less likely to report violent behaviour at six-month follow-up than were control students, and trends also suggested reduced transport injuries. The results of this research support the use of the combined SPIY connectedness and curriculum components in a large-scale effectiveness trial to assess the impact of the programme on students’ connectedness, risk-taking and associated injuries.