593 resultados para communication problems


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research with typically developing groups has identified loneliness as a significant predictor of a range of physical and mental health problems. This paper reviews research about loneliness in children and adults with intellectual disability. Although a considerable body of evidence has highlighted the difficulties individuals with intellectual disability have with friendships, there is a relative scarcity of research focused explicitly on loneliness. The available evidence suggests that up to half of those with intellectual disability are chronically lonely, compared with around 15-30% of people in the general population. The cognitive, physical and mental health problems already associated with intellectual disability are likely to be compounded by experiences of chronic loneliness. We argue that people with intellectual disability are highly vulnerable to loneliness and present a theoretical model of vulnerability that comprises three reciprocally influencing domains: social attitudes and expectations; opportunities and experiences; and skill deficits associated with intellectual disability. We propose that societal views which have traditionally devalued and stigmatised those with intellectual disability limit their opportunities for experiencing social and emotional connectedness with others. Individual skill deficits in areas such as communication, self-regulation and social understanding, as well as functional difficulties associated with intellectual disability, also potentially influence the opportunities and experiences of people with intellectual disability, both directly and via multiple layers of the social context. In turn, limited opportunities will entrench particular skill deficits and reinforce negative attitudes towards intellectual disability. Future research about loneliness and intellectual disability needs to address the difficulties of measuring emotional isolation in this population, as well as the possibility that people with intellectual disability may understand, experience and interpret loneliness somewhat differently from others. The model proposed in this paper provides a starting point for developing a more sophisticated understanding of the experience of loneliness for individuals with intellectual disability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we tackle the problem of finding an efficient signature verification scheme when the number of signatures is signi.- cantly large and the verifier is relatively weak. In particular, we tackle the problem of message authentication in many-to-one communication networks known as concast communication. The paper presents three signature screening algorithms for a variant of ElGamal-type digital signatures. The cost for these schemes is n applications of hash functions, 2n modular multiplications, and n modular additions plus the verification of one digital signature, where n is the number of signatures. The paper also presents a solution to the open problem of finding a fast screening signature for non-RSA digital signature schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Following the derivation of amplitude equations through a new two-time-scale method [O'Malley, R. E., Jr. & Kirkinis, E (2010) A combined renormalization group-multiple scale method for singularly perturbed problems. Stud. Appl. Math. 124, 383-410], we show that a multi-scale method may often be preferable for solving singularly perturbed problems than the method of matched asymptotic expansions. We illustrate this approach with 10 singularly perturbed ordinary and partial differential equations. © 2011 Cambridge University Press.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces a straightforward method to asymptotically solve a variety of initial and boundary value problems for singularly perturbed ordinary differential equations whose solution structure can be anticipated. The approach is simpler than conventional methods, including those based on asymptotic matching or on eliminating secular terms. © 2010 by the Massachusetts Institute of Technology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we introduce a new technique to obtain the slow-motion dynamics in nonequilibrium and singularly perturbed problems characterized by multiple scales. Our method is based on a straightforward asymptotic reduction of the order of the governing differential equation and leads to amplitude equations that describe the slowly-varying envelope variation of a uniformly valid asymptotic expansion. This may constitute a simpler and in certain cases a more general approach toward the derivation of asymptotic expansions, compared to other mainstream methods such as the method of Multiple Scales or Matched Asymptotic expansions because of its relation with the Renormalization Group. We illustrate our method with a number of singularly perturbed problems for ordinary and partial differential equations and recover certain results from the literature as special cases. © 2010 - IOS Press and the authors. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines the progress by the JoMeC (Journalism, Media & Communication) Network in developing TLO (Threshold Learning Outcome) statements for Bachelor-level university programs in the disciplines of Journalism, Public Relations and Media & Communications Studies. The paper presents the finalised TLO statement for Journalism, and outlines moves to engage discipline-based groups to further develop preliminary TLOs for Public Relations and Media & Communication Studies. The JoMeC Network was formed in 2011, in response to requirements that from 2014 all degrees and qualifications at Australian universities would be able to demonstrate that they comply with the threshold learning standards set by the Australian Qualifications Framework (AQF). The AQF’s threshold standards define the minimum types and levels of knowledge, skills and capabilities that a student must demonstrate in order to graduate. The Tertiary Education Quality and Standards Agency (TEQSA) will use the AQF’s threshold standards as a key tool in recording and assessing the performance of higher educational institutions, and determining whether they should be registered as Australian Higher Education Providers under the Higher Education Standards Framework. The Office of Learning & Teaching (OLT) places the onus on discipline communities to collaborate in order to develop and ‘own’ the threshold learning standards that can be considered the minimum learning outcomes of university-level programs in that field. With the support of an OLT Grant, the JoMeC Network’s prime goal has been to develop three sets of discipline-specific TLOs – one each for the Journalism, Public Relations, and Media & Communications Studies disciplines. This paper describes the processes of research, consultation, drafting and ongoing revision of the TLO for Journalism. It outlines the processes that the JoMeC Network has taken in developing a preliminary TLO draft to initiate discussion of Public Relations and Media & Communication Studies. The JoMeC Network plans to hand management of further development of these TLOs to scholars within the discipline who will engage with academics and other stakeholders to develop statements that the respective disciplines can embrace and ‘own’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The series expansion of the plasma fields and currents in vector spherical harmonics has been demonstrated to be an efficient technique for solution of nonlinear problems in spherically bounded plasmas. Using this technique, it is possible to describe the nonlinear plasma response to the rotating high-frequency magnetic field applied to the magnetically confined plasma sphere. The effect of the external magnetic field on the current drive and field configuration is studied. The results obtained are important for continuous current drive experiments in compact toruses. © 2000 American Institute of Physics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i  ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Design Science is the process of solving ‘wicked problems’ through designing, developing, instantiating, and evaluating novel solutions (Hevner, March, Park and Ram, 2004). Wicked problems are described as agent finitude in combination with problem complexity and normative constraint (Farrell and Hooker, 2013). In Information Systems Design Science, determining that problems are ‘wicked’ differentiates Design Science research from Solutions Engineering (Winter, 2008) and is a necessary part of proving the relevance to Information Systems Design Science research (Hevner, 2007; Iivari, 2007). Problem complexity is characterised as many problem components with nested, dependent and co-dependent relationships interacting through multiple feedback and feed-forward loops. Farrell and Hooker (2013) specifically state for wicked problems “it will often be impossible to disentangle the consequences of specific actions from those of other co-occurring interactions”. This paper discusses the application of an Enterprise Information Architecture modelling technique to disentangle the wicked problem complexity for one case. It proposes that such a modelling technique can be applied to other wicked problems and can lay the foundations for proving relevancy to DSR, provide solution pathways for artefact development, and aid to substantiate those elements required to produce Design Theory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 1972, the United Nations (UN) Conference on the Human Environment expressed a growing realization that economic and social progress needed to be balanced with a concern for the environment and the stewardship of natural resources. The hard-to-grasp concept of "sustainable development" was first defined as "development that meets the needs of the present without compromising the ability of future generations to meet their needs" (World Commission on Environment and Development [WESDJ, 1987, p. 43). This definition contains two concepts: first, "human needs," with priority given to the world's poor, and, second, the environment's limits for meeting the state of technological and social organization (WESD, 1987, p. 43). At the 2002 World Summit on Sustainable Development (UN, 2002a), the focus on environmental protection broadened to encompass social justice and the fight against poverty as key principles of development that is sustainable. Three interdependent and mutually reinforcing "pillars" were recognized: economic development, social development, and environmental protection. These pillars must be established at local, national, and global levels. The complexity and interrelationship of critical issues such as poverty, wasteful consumption, urban decay, population growth, gender inequality, health, conflict, and the violation of human rights are addressed in all three pillars (Pigozzi, 2003, p. 3). Following the concept of sustainable development, we argue that the challenge for developing countries in contemporary society is to meet the very real need for economic development and opportunities for income generation, while avoiding the unintended and unwanted consequences of economic development and globalization. These consequences include social exclusion, loss of cultural heritage, and environmental and ecological problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Discussions of public diplomacy in recent years have paid a growing amount of attention to networks. This network perspective is understood to provide insights into various issues of public diplomacy, such as its effects, credibility, reputation, identity and narratives. This paper applies the network idea to analyse China’s Confucius Institutes initiative. It understands Confucius Institutes as a global network and argues that this network structure has potential implications for the operation of public and cultural diplomacy that are perhaps underestimated in existing accounts of Chinese cultural diplomacy. In particular, it is noted that the specific setup of Confucius Institutes requires the engagement of local stakeholders, in a way that is less centralised and more networked than comparable cultural diplomacy institutions. At the same time, the development of a more networked for of public cultural diplomacy is challenged in practice by both practical issues and the configuration of China’s state-centric public diplomacy system informed by the political constitution of the Chinese state.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper will report on the “wicked” problems encountered when designing an online course with bounded content in an unbounded learning environment. It will describe the dilemmas faced and decisions made by academics in an Australian university challenged by an institutional initiative to design radical, disruptive learning experiences making use of readily available online media. This bounded/unbounded environment demands new roles for instructors in adopting innovative pedagogies and teaching and learning strategies. It also creates changing and challenging roles for course designers as they deal with ill-defined parameters and unknown audiences. In this paper, we propose a novel methodology for making curricular decisions in ill-defined spaces.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This text is designed to implement the Threshold Learning Outcomes (TLOs) for law in the first year, and to incorporate Sally Kift’s First Year Curriculum principles: http://tls.vu.edu.au/portal/site/trans/Resources/KiftTransitonPedagogySixPrinciples_16Nov09.pdf This is a learning-centered text book intentionally designed for first year students and written by experts in legal education and the first year experience. It is written in a tone and style that engages and communicates effectively with first year law students, without compromising its rigour. It provides students with opportunities to contextualise and make sense of their learning by connecting that learning with what they already know, and with current contemporary issues and affairs. This work is designed to ease students through the transition from a diverse variety of backgrounds (such as high school, work or other disciplines) to the first year of law. It provides practical guidance about adjusting to law school and to university. Students are asked to regularly reflect upon why they are studying law. The book also prepares law students for success in their latter year studies in law by ensuring that they are equipped with the necessary threshold concepts and foundational skills to do well: for example, research skills (particularly, online research skills), reasoning skills, written communication skills, negotiation skills, and self-management skills. A range of practical tips on studying law are provided throughout the book. The work also asks students to engage with developing an emergent sense of professional identity – including what it means to ‘think like a lawyer’. In supporting the students to engage with the concept of professional identity, the work begins a process of preparing students for transition from law school to legal practice. This is achieved by providing explanations of how the material being presented relates to the practice of law, as well as practical information relating to employability skills as a new graduate. This work has a number of learning and teaching objectives to enhance the quality of student learning in their first year of law by engaging, motivating and supporting that learning. First, the work is designed to engage first year students with their legal education and with a future sense of professional identity. It does this through its: • Dynamic writing style • Engaging format • Inclusion of contemporary issues and events • Flowcharts, checklists, mind-maps, tables and timelines • Inclusion of real-world problems and dilemmas. Second, the text motivates student learning by promoting active learning. It does this by: • Demonstrating, and asking students to practice, what they need to do – that is, the work is not simply focussed on telling students what they need to know • Including regular self-directed learning exercises throughout each chapter, such as practical exercises for the development of important foundational legal skills • Including exercises that promote student collaboration, and that require students to apply their learning to practical situations, and • Incorporating a range of interesting active thinking points and research activities. Third, the book supports student learning by encouraging reflective learning and independent learning. It does this by including: • Specific content on how to be a reflective practitioner and an independent learner • Exercises that require students to engage in independent learning, particularly in relation to legal research skill development • Exercises requiring students to reflect upon what they have learned, and encouraging students to keep a reflective learning journal • Exercises requiring students to reflect upon their own views and beliefs • Reflection on whether students have achieved the learning objectives articulated at the beginning of the chapter. The work also: • Demonstrates respect for student experiences, views, opinions and values • Acknowledges student diversity • Recognises the importance of being globally minded law students and lawyers • Supports law teachers in using the work in their classrooms through the provision of comprehensive teaching materials.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract Within the field of Information Systems, a good proportion of research is concerned with the work organisation and this has, to some extent, restricted the kind of application areas given consideration. Yet, it is clear that information and communication technology deployments beyond the work organisation are acquiring increased importance in our lives. With this in mind, we offer a field study of the appropriation of an online play space known as Habbo Hotel. Habbo Hotel, as a site of media convergence, incorporates social networking and digital gaming functionality. Our research highlights the ethical problems such a dual classification of technology may bring. We focus upon a particular set of activities undertaken within and facilitated by the space – scamming. Scammers dupe members with respect to their ‘Furni’, virtual objects that have online and offline economic value. Through our analysis we show that sometimes, online activities are bracketed off from those defined as offline and that this can be related to how the technology is classified by members – as a social networking site and/or a digital game. In turn, this may affect members’ beliefs about rights and wrongs. We conclude that given increasing media convergence, the way forward is to continue the project of educating people regarding the difficulties of determining rights and wrongs, and how rights and wrongs may be acted out with respect to new technologies of play online and offline.