627 resultados para not missing at random


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Why not the Best Schools? offers a ten-point, ten-year plan for an education revolution that will result in the transformation of Australia’s schools. Expectations have been raised in Australia and comparable countries for an ‘education revolution’ that will secure success for all students in all settings. Such a revolution must ensure the alignment of educational outcomes, the skills required for a strong economy, and the needs of a harmonious society. Why not the Best Schools? goes beyond system characteristics to provide an in-depth account of how transformation occurs in schools. Fifty indicators are provided to help shape strategies for policy makers and practitioners in schools and school systems. Guidelines for leadership and governance ensure a future-focus for those who are determined to ensure that all students will succeed in the twentieth-first century. This book draws on a five-year study culminating in the International Project to Frame the Transformation of Schools conducted in Australia, China, England, Finland, the United States and Wales. The findings are consistent with the McKinsey & Company report on the world’s best performing school systems and those arising from OECD’s PISA.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Expectations have been raised in Australia and comparable countries for an 'education revolution' that will secure success for all students in all settings. Such a revolution must ensure the alignment of educational outcomes, the skills required for a strong economy, and the needs of a harmonious society. Why not the Best Schools? offers a ten-point, ten-year plan for an education revolution that will result in the transformation of Australia's schools. Why not the Best Schools? goes beyond system characteristics to provide an in-depth account of how transformation occurs in schools. Fifty indicators are provided to help shape strategies for policy makers and practitioners in schools and school systems. Guidelines for leadership and governance ensure a future-focus for those who are determined to ensure that all students will succeed in the twentieth-first century. This book draws on a five-year study culminating in the International Project to Frame the Transformation of Schools conducted in Australia, China, England, Finland, the United States and Wales. The findings are consistent with the McKinsey & Company report on the world's best performing school systems and those arising from OECD's PISA."--publisher website

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a framework for adaptive security from hard random lattices in the standard model. Our approach borrows from the recent Agrawal-Boneh-Boyen families of lattices, which can admit reliable and punctured trapdoors, respectively used in reality and in simulation. We extend this idea to make the simulation trapdoors cancel not for a specific forgery but on a non-negligible subset of the possible challenges. Conceptually, we build a compactly representable, large family of input-dependent “mixture” lattices, set up with trapdoors that “vanish” for a secret subset which we hope the forger will target. Technically, we tweak the lattice structure to achieve “naturally nice” distributions for arbitrary choices of subset size. The framework is very general. Here we obtain fully secure signatures, and also IBE, that are compact, simple, and elegant.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access keys and tokens in a connected world. Although many existing solutions can be employed to protect a long secret using a short password, those solutions typically require certain assumptions on the distribution of the secret and/or the password, and are helpful against only a subset of the possible attackers. After briefly reviewing a variety of approaches, we propose a user-centric comprehensive model to capture the possible threats posed by online and offline attackers, from the outside and the inside, against the security of both the plaintext and the password. We then propose a few very simple protocols, adapted from the Ford-Kaliski server-assisted password generator and the Boldyreva unique blind signature in particular, that provide the best protection against all kinds of threats, for all distributions of secrets. We also quantify the concrete security of our approach in terms of online and offline password guesses made by outsiders and insiders, in the random-oracle model. The main contribution of this paper lies not in the technical novelty of the proposed solution, but in the identification of the problem and its model. Our results have an immediate and practical application for the real world: they show how to implement single-sign-on stateless roaming authentication for the internet, in a ad-hoc user-driven fashion that requires no change to protocols or infrastructure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using epistemic perspectives as a theoretical framework, this study investigated Australian pre-service teachers’ perspectives about knowing, knowledge and children’s learning, as they engaged in a semester-long unit on philosophy in the classroom. During the field experience component of the unit, pre-service teachers were required to teach at least one philosophy lesson. Pre-service teachers completed the Personal Epistemological Beliefs Survey at the beginning and end of the unit. They were also interviewed in focus groups at the end of the semester to investigate their views about children’s learning. Paired sample t-tests were used to explore changes in epistemic beliefs over time. Significant differences were found for only some individual items on the survey. However, when interviewed, pre-service teachers indicated that field experiences helped them consider children as competent ‘thinkers’ who were capable of engaging in philosophy in the classroom. They reported predominantly student-centred perspectives of children’s learning, although a process of adjudication (exploring disagreements and evidence for responses) was lacking in these responses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Directed cell migration is essential for normal development. In most of the migratory cell populations that have been analysed in detail to date, all of the cells migrate as a collective from one location to another. However, there are also migratory cell populations that must populate the areas through which they migrate, and thus some cells get left behind while others advance. Very little is known about how individual cells behave to achieve concomitant directional migration and population of the migratory route. We examined the behavior of enteric neural crest-derived cells (ENCCs), which must both advance caudally to reach the anal end and populate each gut region. Results The behaviour of individual ENCCs was examined using live imaging and mice in which ENCCs express a photoconvertible protein. We show that individual ENCCs exhibit very variable directionalities and speed; as the migratory wavefront of ENCCs advances caudally, each gut region is populated primarily by some ENCCs migrating non-directionally. After populating each region, ENCCs remain migratory for at least 24 hours. Endothelin receptor type B (EDNRB) signaling is known to be essential for the normal advance of the ENCC population. We now show that perturbation of EDNRB principally affects individual ENCC speed rather than directionality. The trajectories of solitary ENCCs, which occur transiently at the wavefront, were consistent with an unbiased random walk and so cell-cell contact is essential for directional migration. ENCCs migrate in close association with neurites. We showed that although ENCCs often use neurites as substrates, ENCCs lead the way, neurites are not required for chain formation and neurite growth is more directional than the migration of ENCCs as a whole. Conclusions Each gut region is initially populated by sub-populations of ENCCs migrating non-directionally, rather than stopping. This might provide a mechanism for ensuring a uniform density of ENCCs along the growing gut.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the attacker can find collision and multi-collision messages with complexity only 6 compress function operations and negligible memory with time complexity 2 13. In addition, we show the hashing algorithm can be distinguishable from a truly random sequence with probability close to one.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Nutrition screening identifies patients at risk of malnutrition to facilitate early nutritional intervention. Studies have reported incompletion and error rates of 30-90% for a range of commonly used screening tools. This study aims to investigate the incompletion and error rates of 3-Minute Nutrition Screening (3-MinNS) and the effect of quality improvement initiatives in improving the overall performance of the screening tool and the referral process for at risk patients. Methods Annual audits were carried out from 2008-2013 on 4467 patients. Value Stream Mapping, Plan-Do-Check-Act cycle and Root Cause Analysis were used in this study to identify gaps and determine the best intervention. The intervention included 1) implementing a nutrition screening protocol, 2) nutrition screening training, 3) nurse empowerment for online dietetics referral of at-risk cases, 4) closed-loop feedback system and 5) removing a component of 3-MinNS that caused the most error without compromising its sensitivity and specificity. Results Nutrition screening error rates were 33% and 31%, with 5% and 8% blank or missing forms, in 2008 and 2009 respectively. For patients at risk of malnutrition, referral to dietetics took up to 7.5 days, with 10% not referred at all. After intervention, the latter decreased to 7% (2010), 4% (2011) and 3% (2012 and 2013), and the mean turnaround time from screening to referral was reduced significantly from 4.3 ± 1.8 days to 0.3 ± 0.4 days (p < 0.001). Error rates were reduced to 25% (2010), 15% (2011), 7% (2012) and 5% (2013) and percentage of blank or missing forms reduced to and remained at 1%. Conclusion Quality improvement initiatives are effective in reducing the incompletion and error rates of nutrition screening, and led to sustainable improvements in the referral process of patients at nutritional risk.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

On Friday 10 January 2014 Education Minister Christopher Pyne formally announced a review of the inaugural Australian curriculum. In his three and half minute televised justification, Pyne (2014) identified a number of criticisms of the national curriculum document, including the ‘necessity to have themes’ of ‘Australia’s place in Asia, Indigenous Australia and sustainability’. It is the second of these themes that we consider as ALEA’s Hot Topic for March 2014. We respond to Pyne’s momentary musing of the necessity of the ‘Indigenous Australian’ theme in the Australian Curriculum with a particular focus on the discipline of English. In the nomenclature of the Australian Curriculum, Assessment and Reporting Authority’s Australian Curriculum (ACARA, 2013), we are of course referring to the ‘cross curriculum priority’ of ‘Aboriginal and Torres Strait Islander histories and cultures’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this research was to develop a model to estimate future freeway pavement construction costs in Henan Province, China. A comprehensive set of factors contributing to the cost of freeway pavement construction were included in the model formulation. These factors comprehensively reflect the characteristics of region and topography and altitude variation, the cost of labour, material, and equipment, and time-related variables such as index numbers of labour prices, material prices and equipment prices. An Artificial Neural Network model using the Back-Propagation learning algorithm was developed to estimate the cost of freeway pavement construction. A total of 88 valid freeway cases were obtained from freeway construction projects let by the Henan Transportation Department during the period 1994−2007. Data from a random selection of 81 freeway cases were used to train the Neural Network model and the remaining data were used to test the performance of the Neural Network model. The tested model was used to predict freeway pavement construction costs in 2010 based on predictions of input values. In addition, this paper provides a suggested correction for the prediction of the value for the future freeway pavement construction costs. Since the change in future freeway pavement construction cost is affected by many factors, the predictions obtained by the proposed method, and therefore the model, will need to be tested once actual data are obtained.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dragon stream cipher is one of the focus ciphers which have reached Phase 2 of the eSTREAMproject. In this paper, we present a new method of building a linear distinguisher for Dragon. The distinguisher is constructed by exploiting the biases of two S-boxes and the modular addition which are basic components of the nonlinear function F. The bias of the distinguisher is estimated to be around 2−75.32 which is better than the bias of the distinguisher presented by Englund and Maximov. We have shown that Dragon is distinguishable from a random cipher by using around 2150.6 keystream words and 259 memory. In addition, we present a very efficient algorithm for computing the bias of linear approximation of modular addition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current research extends our knowledge of the main effects of attitude, subjective norm, and perceived control over the individual’s technology adoption. We propose a critical buffering role of social influence on the collectivistic culture in the relationship between attitude, perceived behavioral control, and Information Technology (IT) adoption. Adoption behavior was studied among 132 college students being introduced to a new virtual learning system. While past research mainly treated these three variables as being in parallel relationships, we found a moderating role for subjective norm on technology attitude and perceived control on adoption intent. Implications and limitations for understating the role of social influence in the collectivistic society are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Feral pigs occur throughout tropical far north Queensland, Australia and are a significant threat to biodiversity and World Heritage values, agriculture and are a vector of infectious diseases. One of the constraints on long-lasting, local eradication of feral pigs is the process of reinvasion into recently controlled areas. This study examined the population genetic structure of feral pigs in far north Queensland to identify the extent of movement and the scale at which demographically independent management units exist. Genetic analysis of 328 feral pigs from the Innisfail to Tully region of tropical Queensland was undertaken. Seven microsatellite loci were screened and Bayesian clustering methods used to infer population clusters. Sequence variation at the mitochondrial DNA control region was examined to identify pig breed. Significant population structure was identified in the study area at a scale of 25 to 35 km, corresponding to three demographically independent management units (MUs). Distinct natural or anthropogenic barriers were not found, but environmental features such as topography and land use appear to influence patterns of gene flow. Despite the strong, overall pattern of structure, some feral pigs clearly exhibited ancestry from a MU outside of that from which they were sampled indicating isolated long distance dispersal or translocation events. Furthermore, our results suggest that gene flow is restricted among pigs of domestic Asian and European origin and non-random mating influences management unit boundaries. We conclude that the three MUs identified in this study should be considered as operational units for feral pig control in far north Queensland. Within a MU, coordinated and simultaneous control is required across farms, rainforest areas and National Park Estates to prevent recolonisation from adjacent localities.