577 resultados para Perry,Chris
Resumo:
The aim of this study is to estimate the ratio of male and female participants in Sports and Exercise Medicine research. Original research articles published in three major Sports and Exercise Medicine journals (Medicine and Science in Sport and Exercise, British Journal of Sports Medicine and American Journal of Sports Medicine) over a three year period were examined. Each article was screened to determine the following: total number of participants, the number of female participants and the number of male participants. The percentage of females and males per article in each of the journals was also calculated. Cross tabulations and Chi square analysis were used to compare the gender representation of participants within each of the journals. Data were extracted from 1, 382 articles involving a total of 6, 076, 705 participants. 2, 366, 998 (39%) participants were female and 3, 709, 707 (61%) male. The average percentage of female participants per article across the journals ranged from 35-37%. Females were significantly under-represented across all of the journals (X2 =23566, df=2, p<0.00001). There were no significant differences between the three journals. In conclusion, Sports and Exercise Medicine practitioners should be cognisant of sexual dimorphism and gender disparity in the current literature.
Resumo:
Research background: Cungelela is an intercultural music project undertaken in collaboration with William ‘Dura Danje’ Leisha and Shem ‘Curan Danje’ Leisha. The project contributes to cultural maintenance for Australian First Nations peoples, and is informed by prior work in this area by scholars including Peter Dunbar-Hall, Chris Gibson and Karl Neuenfeldt. These existing studies have discussed the complexities of intercultural collaboration, and the types of cultural politics that are involved when Indigenous and non-Indigenous musicians and scholars work together on projects of cultural significance. Critical race theory has also informed the creative work, as a means of interpreting the implicit and explicit discourses of race that arise through intercultural creative practice. The project asked the research question, in what ways can collaborative music making contribute to intercultural understanding and support cultural maintenance for Australian First Nations people affected by the Stolen Generations? Research contribution: This project has identified that collaborative production of recorded popular music can produce shared affective, embodied and transformative forms of knowledge about the impact of the Stolen Generations on Australian First Nations peoples. Research significance: The compact disc was presented by Aunty Anne Leisha as part of an invited presentation at the World Indigenous Nations Higher Education Consortium in New Mexico, 2013. The work also formed part of a refereed conference presentation at the 2013 conference of the International Association for the Study of Popular Music held at the University of Oviedo, Gijon, Spain.
Resumo:
Research background: Ananyi (Going) is an intercultural music project with lyrics sung in Luritja and English, undertaken in collaboration with the Tjupi Band and producer Jeffrey McLaughlin. The project contributes to cultural maintenance for Australian First Nations peoples, and is informed by prior work in this area by scholars including Peter Dunbar-Hall, Chris Gibson and Karl Neuenfeldt. These existing studies have discussed the complexities of intercultural collaboration, and the types of cultural politics that are involved when Indigenous and non-Indigenous musicians and scholars work together on projects of cultural significance. Critical race theory has also informed the creative work, as a means of interpreting the implicit and explicit discourses of race that arise through intercultural creative practice. The project asked the research question, how can collaborative music making contribute to intercultural understanding and the maintenance of Australian First Nations languages and cultures? Research contribution: The project has identified that recorded popular music is important in the maintenance of Luritja language and culture, and that intercultural collaboration in the areas of digital sound production and distribution can assist with cultural maintenance in both local and national contexts. Research significance: The compact disc was released on the CAAMA Music label, and supported through competitive grants from the Australian Government’s Contemporary Music Touring Grant and the Arnhem Land Progress Association (ALPA). The research context of the work is detailed in Brydie-Leigh Bartleet and Gavin Carfoot 2013. "Desert harmony: Stories of collaboration between Indigenous musicians and university students." International Education Journal: Comparative Perspectives 12 (1): 180-196.
Resumo:
Research background: Circle Stories was a live performance curated by Brydie-Leigh Bartleet, Naomi Sunderland, Gavin Carfoot and the Winanjjikari Music Centre as part of the Desert Harmony Festival 2013. The performance was the culmination of five years of research into intercultural performing arts practice, undertaken in partnership with Barkly Regional Arts. This work has built on existing scholarly work in community service learning by Marilynne Boyle-Baise, approaches to intercultural music making with Australian First Peoples by Karl Neuenfeldt, and studies of Indigenous popular music by Peter Dunbar-Hall and Chris Gibson. The performance followed the popular songwriters’ circle approach, in which Aboriginal musicians and elders presented their songs along with tertiary music students, as part of a broader dialogue with each other and the audience. Each performance provided an opportunity to highlight the importance of music in the development of intercultural knowledge and understanding. The project asked the research question, how can collaborative music performance foster mutual learning, intercultural knowledge and reconciliation? Research contribution: The project development and performance of Circle Stories identified that mutual learning and intercultural knowledge can result most effectively through long-term and meaningful relationships underpinning collaborative creative practice. Research significance: Following a general call for proposals, the performance was peer reviewed and selected for inclusion in the Desert Harmony Festival program. The research context of the work is detailed in Brydie-Leigh Bartleet and Gavin Carfoot 2013. "Desert harmony: Stories of collaboration between Indigenous musicians and university students." International Education Journal: Comparative Perspectives 12 (1): 180-196.
Resumo:
Climate change is affecting and will increasingly influence human health and wellbeing. Children are particularly vulnerable to the impact of climate change. An extensive literature review regarding the impact of climate change on children’s health was conducted in April 2012 by searching electronic databases PubMed, Scopus, ProQuest, ScienceDirect, and Web of Science, as well as relevant websites, such as IPCC and WHO. Climate change affects children’s health through increased air pollution, more weather-related disasters, more frequent and intense heat waves, decreased water quality and quantity, food shortage and greater exposure to toxicants. As a result, children experience greater risk of mental disorders, malnutrition, infectious diseases, allergic diseases and respiratory diseases. Mitigation measures like reducing carbon pollution emissions, and adaptation measures such as early warning systems and post-disaster counseling are strongly needed. Future health research directions should focus on: (1) identifying whether climate change impacts on children will be modified by gender, age and socioeconomic status; (2) refining outcome measures of children’s vulnerability to climate change; (3) projecting children’s disease burden under climate change scenarios; (4) exploring children’s disease burden related to climate change in low-income countries, and ; (5) identifying the most cost-effective mitigation and adaptation actions from a children’s health perspective.
Resumo:
The past decade has seen an increase in the number of significant natural disasters that have caused considerable loss of life as well as damage to all property markets in the affected areas. In many cases, these natural disasters have not only caused significant property damage, but in numerous cases, have resulted in the total destruction of the property in the location. With these disasters attracting considerable media attention, the public are more aware of where these affected property markets are, as well as the overall damage to properties that have been damaged or destroyed. This heightened level of awareness has to have an impact on the participants in the property market, whether a developer, vendor seller or investor. To assess this issue, a residential property market that has been affected by a significant natural disaster over the past 2 years has been analysed to determine the overall impact of the disaster on buyer, renter and vendor behaviour, as well as prices in these residential markets. This paper is based on data from the Brisbane flood in January 2011. This natural disaster resulted in loss of life and partial and total devastation of considerable residential property sectors. Data for the research have been based on the residential sales and rental listings for each week of the study period to determine the level of activity in the specific property sectors, and these are also compared to the median house prices for the various suburbs for the same period based on suburbs being either flood affected or flood free. As there are 48 suburbs included in the study, it has been possible to group these suburbs on a socio-economic basis to determine possible differences due to location and value. Data were accessed from realestate.com.au, a free real estate site that provides details of current rental and sales listings on a suburb basis, RP Data a commercial property sales database and the Australian Bureau of Statistics. The paper found that sales listings fell immediately after the flood in the affected areas, but there was no corresponding fall or increase in sales listings in the flood-free suburbs. There was a significant decrease in the number of rental listings follow the flood as affected parties sought alternate accommodation. The greatest fall in rental listings was in areas close to the flood-affected suburbs indicating the desire to be close to the flooded property during the repair period.
Resumo:
Virtual Production is a rapidly growing approach to filmmaking that utilises 3D software, virtual camera systems and motion capture technology to visually interact with a real-time virtual environment. The use of these technologies has continued to increase, however, little has been done to document the various approaches for incorporating this new film making technique into a production. This practice-led research project outlines the development of virtual production in the entertainment industry and explores possible strategies for adopting aspects of this new film making technique into the production of short animated films. The outcome is an improved understanding of possible strategies that could be utilised to assist producers and directors with the transition into this new film making technique. - See more at: http://dl4.globalstf.org/?wpsc-product=adopting-virtual-production-for-animated-filmaking#sthash.DLzRph4Z.dpuf
Resumo:
The Warburton-Cooper basins, central Australia, include a multitude of reactivated fracture-fault networks related to a complex, and poorly understood, tectonic evolution. We investigated authigenic illites from a granitic intrusion and sedimentary rocks associated with prominent structural features (Gidgealpa-Merrimelia-Innamincka Ridge and the Nappamerri Trough). These were analysed by 40Ar-39Ar, 87Rb-87Sr and 147Sm-143Nd geochronology to explore the thermal and tectonic histories of central Australian basins. The combined age data provide evidence for three major periods of fault reactivation throughout the Phanerozoic. While Carboniferous (323.3 ± 9.4 Ma) and Late Triassic ages (201.7 ± 9.3 Ma) derive from basin-wide hydrothermal circulation, Cretaceous ages (~128 to ~86 Ma) reflect episodic fluid flow events restricted to the synclinal Nappamerri Trough. Such events result from regional extensional tectonism derived from the transferral of far-field stresses to mechanically and thermally weakened regions of the Australian continent. Specifically, Cretaceous ages reflect continent-wide transmission of tensional stress from a > 2500 km long rifting event on the Eastern (and southern) Australian margin associated with break-up of Gondwana and opening of the Tasman Sea. By integrating 40Ar-39Ar, 87Rb-87Sr and 147Sm-143Nd dating, this study highlights the use of authigenic illite in temporally constraining the tectonic evolution of intracontinental basins that would otherwise remain unknown. Furthermore, combining Sr- and Ar-isotopic systems enables more accurate dating of authigenesis whilst significantly reducing geochemical pitfalls commonly associated with these radioisotopic dating methods.
Resumo:
This paper reports on a four year Australian Research Council funded Linkage Project titled Skilling Indigenous Queensland, conducted in regional areas of Queensland, Australia from 2009 to 2013. The project sought to investigate Vocational Education and Training (VET) and teaching, Indigenous learners’ needs, employer culture and expectations and community culture and expectations to identify best practice in numeracy teaching for Indigenous VET learners. Specifically it focused on ways to enhance the teaching and learning of courses and the associated mathematics in such courses to benefit learners and increase their future opportunities of employment. To date thirty - nine teachers/trainers/teacher aides and two hundred and thirty - one students consented to participate in the project. Nine VET courses offered in schools and Technical and Further Education Institutes (TAFE) were nominated to be the focus on the study. This paper focuses on student questionnaire responses and interview responses from teachers/trainers one high school principal and five students as a result of these processes, the findings indicated that VET course teachers work hard to adopt contextualising strategies to their teaching; however this process is not always straight forward because of the perceptions of how mathematics has been taught and learned by trainers and teachers. Further teachers, trainers and students have high expectations of one another with the view to successful outcomes from the courses.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.