66 resultados para suomalaiset pk-yritykset
Resumo:
The influence of different instructional constraints on movement organisation and performance outcomes of the penalty kick (PK) was investigated according to participant age. Sixty penalty takers and twelve goalkeepers from two age groups (under 15 and under 17) performed 300 PKs under five different task conditions, including: no explicit instructional constraints provided (Control); instructional constraints on immobility (IMMOBILE) and mobility (MOBILE) of goalkeepers; and, use of keeper-dependent (DEP) and independent (INDEP) strategies by penalty takers. Every trial was video recorded and digitised using motion analysis techniques. Dependent variables (DVs) were: movement speed of penalty takers and the angles between the goalkeeper's position and the goal line (i.e., diving angle), and between the penalty taker and a line crossing the penalty spot and the centre of the goal (i.e., run up angle). Instructions significantly influenced the way that goalkeepers (higher values in MOBILE relative to Control) and penalty takers (higher values in Control than in DEP) used movement speed during performance, as well as the goalkeepers' movements and diving angle (less pronounced dives in the MOBILE condition compared with INDEP). Results showed how different instructions constrained participant movements during performance, although players' performance efficacy remained constant, reflecting their adaptive variability.
Resumo:
Attention Deficit Hyperactivity Disorder (ADHD) has achieved celebrity status in many Western countries, yet despite considerable effort to prove its existence as a “real” disorder, ADHD still suffers from a crisis of legitimacy. Nonetheless, diagnosis and prescription of medication has grown at a phenomenal rate since the late 1980s, particularly in Western culture. Numerous accounts exist explaining how the ADHD diagnosis functions as a convenient administrative loophole, providing schools with a medical explanation for school failure, medication to sedate the “problem” into submission, or the means to eject children from mainstream classrooms. This book provides a more holistic interpretation of how to respond to children who might otherwise be diagnosed with and medicated for “ADHD”—a diagnosis which, whether scientifically valid or not, is unhelpful within the confine of the school. Training teachers to recognise and identify “ADHD symptoms” or to understand the functions of restricted pharmaceuticals will only serve to increase the number of children diagnosed and the sale of psychoactive medications. Research has shown that such activities will not help those children learn, nor will it empower their classroom teachers to take responsibility for teaching such children well. This book seeks to provide school practitioners with knowledge that is useful within the educational context to improve the educational experiences and outcomes for children who might otherwise receive a diagnosis of ADHD.
Resumo:
Social media adoption in Australia, which provides the geographic focus for this chapter, has been rapid and substantial (ABC News, 2010) – possibly because of the considerable dispersal of the Australian population across the continent, as well as the significant distance of the country from many of its closest partner nations. Social media can play an important role in strengthening and maintaining interpersonal and professional relationships in spite of such physical distance; in particular, social media services are now well-recognised as important tools for the dissemination of news across many developed nations. Hermida (2010) and Burns (2010) both speak of Twitter as a medium for “ambient news”, for example: always-on, operating as a steady stream in the background and at the edge of users’ conscious perception. Much as ambient music is designed to do, it comes to the fore when notable events (such as major breaking news) lead to an increase in volume and demand a greater level of attention from users.
Resumo:
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.
Resumo:
Since its launch in 2006, Twitter has turned from a niche service to a mass phenomenon. By the beginning of 2013, the platform claims to have more than 200 million active users, who “post over 400 million tweets per day” (Twitter, 2013). Its success is spreading globally; Twitter is now available in 33 different languages, and has significantly increased its support for languages that use non-Latin character sets. While Twitter, Inc. has occasionally changed the appearance of the service and added new features—often in reaction to users’ developing their own conventions, such as adding ‘#’ in front of important keywords to tag them—the basic idea behind the service has stayed the same: users may post short messages (tweets) of up to 140 characters and follow the updates posted by other users. This leads to the formation of complex follower networks with unidirectional as well as bidirectional connections between individuals, but also between media outlets, NGOs, and other organisations. While originally ‘microblogs’ were perceived as a new genre of online communication, of which Twitter was just one exemplar, the platform has become synonymous with microblogging in most countries. A notable exception is Sina Weibo, popular in China where Twitter is not available. Other similar platforms have been shut down (e.g., Jaiku), or are being used in slightly different ways (e.g., Tumblr), thus making Twitter a unique service within the social media landscape.
Resumo:
Talk of Big Data seems to be everywhere. Indeed, the apparently value-free concept of ‘data’ has seen a spectacular broadening of popular interest, shifting from the dry terminology of labcoat-wearing scientists to the buzzword du jour of marketers. In the business world, data is increasingly framed as an economic asset of critical importance, a commodity on a par with scarce natural resources (Backaitis, 2012; Rotella, 2012). It is social media that has most visibly brought the Big Data moment to media and communication studies, and beyond it, to the social sciences and humanities. Social media data is one of the most important areas of the rapidly growing data market (Manovich, 2012; Steele, 2011). Massive valuations are attached to companies that directly collect and profit from social media data, such as Facebook and Twitter, as well as to resellers and analytics companies like Gnip and DataSift. The expectation attached to the business models of these companies is that their privileged access to data and the resulting valuable insights into the minds of consumers and voters will make them irreplaceable in the future. Analysts and consultants argue that advanced statistical techniques will allow the detection of ongoing communicative events (natural disasters, political uprisings) and the reliable prediction of future ones (electoral choices, consumption)...
Resumo:
Chinese modal particles feature prominently in Chinese people’s daily use of the language, but their pragmatic and semantic functions are elusive as commonly recognised by Chinese linguists and teachers of Chinese as a foreign language. This book originates from an extensive and intensive empirical study of the Chinese modal particle a (啊), one of the most frequently used modal particles in Mandarin Chinese. In order to capture all the uses and the underlying meanings of the particle, the author transcribed the first 20 episodes, about 20 hours in length, of the popular Chinese TV drama series Kewang ‘Expectations’, which yielded a corpus data of more than 142’000 Chinese characters with a total of 1829 instances of the particle all used in meaningful communicative situations. Within its context of use, every single occurrence of the particle was analysed in terms of its pragmatic and semantic contributions to the hosting utterance. Upon this basis the core meanings were identified which were seen as constituting the modal nature of the particle.
Resumo:
Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.
Resumo:
Despite the dominancy of medical explanations for difficult child behavior, the shifting sands that lie beneath the ADHD construct provide an unstable foundation for educational practice. It can be somewhat liberating to remember that “attention deficit hyperactivity disorder” is a label (one of many, including minimal brain damage and hyperkinetic reaction of childhood) that the medical domain has coined to both group and describe certain challenging behaviors exhibited by children and young people (see Smith, Chapter 2). The label is but one conceptualization of what these behaviors mean and, despite the existence of powerful lobby groups, it may not be the best way forward. In what follows, I present an alternative typology to the medical conceptualization by describing some common issues that bring this group of children to attention. In an effort to introduce educationally useful responses to students who are difficult to teach, I will then outline what classroom teachers need to recognize in order to work with these students and realize their potential. To assist teachers in thinking pedagogically, these observations are coupled with well-known and relevant qualities of good teaching to remind teachers of what they already know and to reacquaint them with the power of that knowledge.