121 resultados para Nichols, H. S. (Harry Sidney)
Resumo:
Recent attention in education within many western contexts has focused on improved outcomes for students, with a particular focus on closing the gap between those who come from disadvantaged backgrounds and the rest of the student population. Much of this attention has supported a set of simplistic solutions to improving scores on high stakes standardized tests. The collateral damage (Nichols & Berliner, 2007) of such responses includes a narrowing of the curriculum, plateaus in gain scores on the tests, and unproductive blame games aimed by the media and politicians at teachers and communities (Nichols & Berliner, 2007; Synder, 2008). Alternative approaches to improving the quality and equity of schooling remain as viable alternatives to these measures. As an example in a recent study of school literacy reform in low SES schools, Luke, Woods and Dooley (2011) argued for the increase of substantive content and intellectual quality of the curriculum as a necessary means to re-engaging middle school students, improving outcomes of schooling and achieving a high quality, high equity system. The MediaClub is an afterschool program for students in years 4 to 7 (9-12 year old) at a primary school in a low SES area of a large Australian city. It is run as part of an Australian Research Council funded research project. The aim of the program has been to provide an opportunity for students to gain expertise in digital technologies and media literacies in an afterschool setting. It was hypothesized that this expertise might then be used to shift the ways of being literate that these students had to call on within classroom teaching and learning events. Each term, there is a different focus on digital media, and information and communication technology (ICT) activities in the MediaClub. The work detailed in this chapter relates to a robotics program presented as one of the modules within this afterschool setting. As part of the program, the participants were challenged to find creative solutions to problems in a constructivist-learning environment.
Resumo:
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.
Resumo:
This study aimed to assess the feasibility of a home-based exercise program and examine the effects on the healing rates of venous leg ulcers. A 12 –week randomised controlled trial was conducted investigating the effects of an exercise intervention compared to a usual care group. Participants in both groups (n = 13) had active venous ulceration and were treated in a metropolitan hospital outpatients clinic in Australia. Data were collected on recruitment from medical records, clinical assessment and questionnaires. Follow-up data on progress in healing and treatments were collected fortnightly for 12 weeks. Calf muscle pump function data were collected at baseline and 12 weeks from recruitment. Range of ankle motion data were collected at baseline, 6 and 12 weeks from recruitment. This pilot study indicated that the intervention was feasible. Clinical significance was observed in the intervention group with a 32% greater decrease in ulcer size (p=0.34) than the control group, and a 10% (p=0.74) improvement in the number of participants healed in the intervention group compared to the control group. Significant differences between groups over time were observed in calf muscle pump function parameters; (ejection fraction [p = 0.05]; residual volume fraction [p = 0.04]) and range of ankle motion (p = 0.01). This pilot study is one of the first studies to examine and measure clinical healing rates for participants involved in a home-based progressive resistance exercise program. Further research is warranted with a larger multi-site study.
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.
Resumo:
Well-designed initialisation and keystream generation processes for stream ciphers should ensure that each key-IV pair generates a distinct keystream. In this paper, we analyse some ciphers where this does not happen due to state convergence occurring either during initialisation, keystream generation or both. We show how state convergence occurs in each case and identify two mechanisms which can cause state convergence.
Resumo:
A5/1 is a shift register based stream cipher which uses a majority clocking rule to update its registers. It is designed to provide privacy for the GSM system. In this paper, we analyse the initialisation process of A5/1. We demonstrate a sliding property of the A5/1 cipher, where every valid internal state is also a legitimate loaded state and multiple key-IV pairs produce phase shifted keystream sequences. We describe a possible ciphertext only attack based on this property.
Resumo:
This study seeks to answer the question of “why is policy innovation in Indonesia, in particular reformed state asset management laws and regulations, stagnant?” through an empirical and qualitative approach, identifying and exploring potential impeding influences to the full and equal implementation of said laws and regulations. The policies and regulations governing the practice of state asset management has emerged as an urgent question among many countries worldwide (Conway, 2006; Dow, Gillies, Nichols, & Polen, 2006; Kaganova, McKellar, & Peterson, 2006; McKellar, 2006b) for there is heightened awareness of the complex and crucial role that state assets play in public service provision. Indonesia is an example of such country, introducing a ‘big-bang’ reform in state asset management laws, policies, regulations, and technical guidelines. Two main reasons propelled said policy innovation: a) world-wide common challenges in state asset management practices - such as incomplete information system, accountability, and governance adherence/conceptualisation (Kaganova, McKellar and Peterson 2006); and b) unfavourable state assets audit results in all regional governments across Indonesia. The latter reasoning is emphasised, as the Indonesian government admits to past neglect in ensuring efficiency and best practice in its state asset management practices. Prior to reform there was euphoria of building and developing state assets and public infrastructure to support government programs of the day. Although this euphoria resulted in high growth within Indonesia, there seems to be little attention paid to how state assets bought/built is managed. Up until 2003-2004 state asset management is considered to be minimal; inventory of assets is done manually, there is incomplete public sector accounting standards, and incomplete financial reporting standards (Hadiyanto 2009). During that time transparency, accountability, and maintenance state assets was not the main focus, be it by the government or the society itself (Hadiyanto 2009). Indonesia exemplified its enthusiasm in reforming state asset management policies and practices through the establishment of the Directorate General of State Assets in 2006. The Directorate General of State Assets have stressed the new direction that it is taking state asset management laws and policies through the introduction of Republic of Indonesia Law Number 38 Year 2008, which is an amended regulation overruling Republic of Indonesia Law Number 6 Year 2006 on Central/Regional Government State Asset Management (Hadiyanto, 2009c). Law number 38/2008 aims to further exemplify good governance principles and puts forward a ‘the highest and best use of assets principle in state asset management (Hadiyanto, 2009a). The methodology of this study is that of qualitative case study approach, with a triangulated data collection method of document analysis (all relevant state asset management laws, regulations, policies, technical guidelines, and external audit reports), semi-structured interviews, and on-site observation. Empirical data of this study involved a sample of four Indonesian regional governments and 70 interviews, performed during January-July 2010. The analytical approach of this study is that of thematic analysis, in an effort to identify common influences and/or challenges to policy innovation within Indonesia. Based on the empirical data of this study specific impeding influences to state asset management reform is explored, answering the question why innovative policy implementation is stagnant. An in-depth analysis of each influencing factors to state asset management reform, and the attached interviewee’s opinions for each factor, suggests the potential of an ‘excuse rhetoric’; whereby the influencing factors identified are a smoke-screen, or are myths that public policy makers and implementers believe in; as a means to explain innovative policy stagnancy. This study offers insights to Indonesian policy makers interested in ensuring the conceptualisation and full implementation of innovative policies, particularly, although not limited to, within the context of state asset management practices.
Resumo:
Proteinuria was observed in 27% of 153 patients taking tenofovir for more than 1 year. Concomitant protease inhibitor therapy and cumulative tenofovir exposure were independently associated with proteinuria in this cohort. Proteinuria was reversible in 11 of 12 patients who ceased tenofovir because of proteinuria without altering other medications. Clinicians should be aware that tenofovir can cause reversible proteinuria in patients with HIV.
Resumo:
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.
Resumo:
Growing community concerns about the ecological, social, cultural and economic impact of housing and urban projects poses new challenges for those who have to deliver them. It is important that these concerns are addressed as part of the community engagement processes on projects. Community engagement is traditionally perceived as the purview of planners and disconnected from the building construction process. This is despite most project approval processes mandating on-going community engagement over the project’s entire lifetime. There is evidence that point to a culture of ambiguity and ambivalence among building professionals about their roles, responsibilities and expectations of community engagement during the construction phase of projects. This has contributed to a culture of distrust between communities and the construction industry. There is a clear need to build capacity among building professionals to empower them as active participants in community engagement processes which can promote better project outcomes and minimise delays and conflicts. This paper describes a process that utilises the Theory of Planned Behaviour as a framework to equip building professionals with the skills they need to engage effectively with local communities during the construction phase of projects.
Resumo:
Introduction: There is a recognised relationship between dry weather conditions and increased risk of anterior cruciate ligament (ACL) injury. Previous studies have identified 28 day evaporation as an important weather-based predictor of non-contact ACL injuries in professional Australian Football League matches. The mechanism of non-contact injury to the ACL is believed to increased traction and impact forces between footwear and playing surface. Ground hardness and the amount and quality of grass are factors that would most likely influence this and are inturn, related to the soil moisture content and prevailing weather conditions. This paper explores the relationship between soil moisture content, preceding weather conditions and the Clegg Soil Impact Test (CSIT) which is an internationally recognised standard measure of ground hardness for sports fields. Methodology: The 2.25 kg Clegg Soil Impact Test and a pair of 12 cm soil moisture probes were used to measure ground hardness and percentage moisture content. Five football fields were surveyed at 13 prescribed sites just before seven football matches from October 2008 to January 2009 (an FC Women’s WLeague team). Weather conditions recorded at the nearest weather station were obtained from the Bureau of Meteorology website and total rainfall less evaporation was calculated for 7 and 28 days prior to each match. All non-contact injuries occurring during match play and their location on the field were recorded. Results/conclusions: Ground hardness varied between CSIT 5 and 17 (x10G) (8 is considered a good value for sports fields). Variations within fields were typically greatest in the centre and goal areas. Soil moisture ranged from 3 to 40% with some fields requiring twice the moisture content of others to maintain similar CSIT values. There was a non-linear, negative relationship for ground hardness versus moisture content and a linear relationship with weather (R2, of 0.30 and 0.34, respectively). Three non-contact ACL injuries occurred during the season. Two of these were associated with hard and variable ground conditions.
Resumo:
This book examines different aspects of Asian popular culture, including films, TV, music, comedy, folklore, cultural icons, the Internet and theme parks. It raises important questions such as – What are the implications of popularity of Asian popular culture for globalization? Do regional forces impede the globalizing of cultures? Or does the Asian popular culture flow act as a catalyst or conveying channel for cultural globalization? Does the globalization of culture pose a threat to local culture? It addresses two seemingly contradictory and yet parallel processes in the circulation of Asian popular culture: the interconnectedness between Asian popular culture and western culture in an era of cultural globalization that turns subjects such as Pokémon, Hip Hop or Cosmopolitan into truly global phenomena, and the local derivatives and versions of global culture that are necessarily disconnected from their origins in order to cater for the local market. It thereby presents a collective argument that, whilst local social formations, and patterns of consumption and participation in Asia are still very much dependent on global cultural developments and the phenomena of modernity, yet such dependence is often concretized, reshaped and distorted by the local media to cater for the local market. Contents: Introduction: Asian Popular Culture: The Global (Dis)continuity Anthony Y.H. Fung Part 1: The Dominance of Global Continuity: Cultural Localization and Adaptation 1. One Region, Two Modernities: Disneyland in Tokyo and Hong Kong Micky Lee and Anthony Y.H. Fung 2. Comic Travels: Disney Publishing in the People’s Republic of China Jennifer Altehenger 3. When Chinese Youth Meet Harry Potter: Translating Consumption and Middle Class Identification John Nguyet Erni 4.New Forms of Transborder Visuality in Urban China: Saving Face for Magazine Covers Eric Kit-Wai Ma 5. Cultural Consumption and Masculinity: A Case Study of GQ Magazine Covers in Taiwan Hong-Chi Shiau Part 2: Global Discontinuity: The Local Absorption of Global Culture 6. An Unlocalized and Unglobalized Subculture: English Language Independent Music in Singapore Kai Khiun Liew and Shzr Ee Tan 7. The Localized Production of Jamaican Music in Thailand Viriya Sawangchot 8. Consuming Online Games in Taiwan: Global Games and Local Market Lai-Chi Chen 9. The Rise of the Korean Cinema in Inbound and Outbound Globalization Shin Dong Kim Part 3: Cultural Domestication: A New Form of Global Continuity 10. Pocket Capitalism and Virtual Intimacy: Pokémon as a Symptom of Post-Industrial Youth Culture Anne Allison 11. Playing the Global Game: Japan Brand and Globalization Kukhee Choo Part 4: China as a Rising Market: Cultural Antagonism and Globalization 12. China’s New Creative Strategy: The Utilization of Cultural Soft Power and New Markets Michael Keane and Bonnie Liu 13. Renationalizing Hong Kong Cinema: The Gathering Force of the Mainland Market Michael Curtin
Resumo:
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.
Resumo:
This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.
Resumo:
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.