579 resultados para Digital mammographic images


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Children's Literature Digital Resources is a full text digital repository of Australian children’s literature from 1830 to 1945. Users can read online the complete texts of a selection of early Australian children’s literature, both popular and rare. Digitised items include children’s and young adult fiction, poetry, short stories, and picture books. Users can also read related full text critical articles that were digitised as part of the project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the 2000s, teachers in an increasing number of Australian schools have been learning how to support students with refugee backgrounds. For some of these students, entry into the Australian school system is not easy. English literacy is integral to some of the challenges confronting the students. In response, educators have been developing and researching ways of engaging with the students’ language and literacy learning. Much of the focus has been on traditional print-based school literacies. In contrast, I look here at student engagement in digital literacies in an after-school media club. Several concepts from the theory of French sociologist, Pierre Bourdieu are useful for understanding the position of students of refugee background in the Australian school system. Like other conflict theories, Bourdieusian theory has sometimes been criticised as ‘pessimistic’, that is, for suggesting that schools necessarily reproduce social disadvantage. However, others have used Bourdieusian theory to analyse and critique the reproductive work of schooling for groups of students who experience educational disadvantage. I align myself with this latter tradition. Specifically, I use Bourdieu’s triad of concepts to explain aspects of the literacy education experiences of some young people of refugee background: field, capital and habitus. In particular, I look at questions of the legitimation of students’ competences as capital in literate fields within and beyond the school context. Data are drawn from an Australian Research Council-funded project, Digital Learning and Print Literacy: A design experiment for the reform of low socio-economic, culturally diverse schools (2009-14). The data analysed in this chapter include interviews and observations relating to the participation of two Congolese girls in an after school media club. Implications are drawn for teachers of literacy in culturally and linguistically diverse contexts. Consideration is made of early childhood, primary and secondary settings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the Internet becomes deeply embedded into consumers’ daily life, the digital virtual world brings significant influence to consumers’ self and narrative. Prior studies look at consumer self from either from a certain online space or comparing consumers’ physical and digital virtual selves but not the integration of the physical/digital world. This paper aims to explore the meanings of the digital virtual space on consumers’ narrative as a whole (their interests, dreams, or subjectivity). We utilise a postmodern concept of the cyborg to understand the cultural complexity, subjective meanings of, and the extent to which the digital virtual space plays a role in consumers’ self-narrative. We conducted in-depth interviews and gathered three consumer narratives. Our findings indicate that consumers’ narrative contains important fragments from both physical and digital virtual worlds and their physical and digital virtual selves form a feedback loop that strengthen their overall narrative.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel shape recognition algorithm was developed to autonomously classify the Northern Pacific Sea Star (Asterias amurenis) from benthic images that were collected by the Starbug AUV during 6km of transects in the Derwent estuary. Despite the effects of scattering, attenuation, soft focus and motion blur within the underwater images, an optimal joint classification rate of 77.5% and misclassification rate of 13.5% was achieved. The performance of algorithm was largely attributed to its ability to recognise locally deformed sea star shapes that were created during the segmentation of the distorted images.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Corner detection has shown its great importance in many computer vision tasks. However, in real-world applications, noise in the image strongly affects the performance of corner detectors. Few corner detectors have been designed to be robust to heavy noise by now, partly because the noise could be reduced by a denoising procedure. In this paper, we present a corner detector that could find discriminative corners in images contaminated by noise of different levels, without any denoising procedure. Candidate corners (i.e., features) are firstly detected by a modified SUSAN approach, and then false corners in noise are rejected based on their local characteristics. Features in flat regions are removed based on their intensity centroid, and features on edge structures are removed using the Harris response. The detector is self-adaptive to noise since the image signal-to-noise ratio (SNR) is automatically estimated to choose an appropriate threshold for refining features. Experimental results show that our detector has better performance at locating discriminative corners in images with strong noise than other widely used corner or keypoint detectors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter we present data drawn from observations of kindergarten children using iPads and talk with the children, their parents/guardians and teachers. We identify a continuum of practices that extends from ‘educational apps’ teaching handwriting, sight words and so forth to uses of the iPad as a device for multimodal literacy development and substantive conversation around children’s creative work. At the current time high stakes testing and the implementation of the Australian Curriculum are prompting new public and professional conversations about literacy and digital technology. The iPad is construed as both cause of and solution to problems of traditional literacy education. In this context we describe the literacies enabled by educational software available on iPads. We higlight the time constraints which bore on teachers' capacity to enact their visions of literacy education through the iPad platform and suggest ways of reflecting on responses to this constraint.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the development of a playful digital experience, Anim-action, designed for young children with developmental disabilities. This experience was built using the Stomp platform, a technology designed specifically to meet the needs of people with intellectual disability through facilitating whole body interaction. We provide detail on how knowledge gained from key stakeholders informed the design of the application and describe the design guidelines used in the development process. A study involving 13 young children with developmental disabilities was conducted to evaluate the extent to which Anim-action facilitates cognitive, social and physical activity. Results demonstrated that Anim-action effectively supports cognitive and physical activity. In particular, it promoted autonomy and encouraged problem solving and motor planning. Conversely, there were limitations in the system’s ability to support social interaction, in particular, cooperation. Results have been analyzed to determine how design guidelines might be refined to address these limitations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Images of scantily clad women are used by advertisers to make products more attractive to men. This ‘‘sex sells’’ approach is increasingly employed to promote ethical causes, most prominently by the animal-rights organization PETA. Yet sexualized images can dehumanize women, leaving an unresolved paradox – is it effective to advertise an ethical cause using unethical means? In Study 1, a sample of Australian male undergraduates (N = 82) viewed PETA advertisements containing either sexualized or non-sexualized images of women. Intentions to support the ethical organization were reduced for those exposed to the sexualized advertising, and this was explained by their dehumanization of the sexualized women, and not by increased arousal. Study 2 used a mixed-gender community sample from the United States (N = 280), replicating this finding and extending it by showing that behaviors helpful to the ethical cause diminished after viewing the sexualized advertisements, which was again mediated by the dehumanization of the women depicted. Alternative explanations relating to the reduced credibility of the sexualized women and their objectification were not supported. When promoting ethical causes, organizations may benefit from using advertising strategies that do not dehumanize women.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mass media have transitioned in the past five years from being one-way communication mediums, from journalists to audiences, into an era of networked digital media in which individuals can easily publish text, photos and video to a world-wide audience.The power of the press is severely threatened and its business model is broken...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ways in which technology mediates daily activities is shifting rapidly. Global trends point toward the uptake of ambient and interactive media to create radical new ways of working, interacting and socialising. Tech giants such as Google and Apple are banking on the success of this emerging market by investing in new future focused consumer products such as Google Glass and the Apple Watch. The potential implications of ubiquitous technological interactions via tangible and ambient media have never been more real or more accessible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Investigative journalists who join what theorist Manuel Castells describes as the ‘network society’ can locate potential news sources using various social media platforms and interview them using Web-based communication technologies. The potential for journalistic investigations involving multi-directional conversations with news sources across the globe is beginning to be explored. Potential news sources who are part of the network society have unprecedented access to specialist investigative reporters irrespective of their location and can speak to them more cost effectively than in the past. This paper explores how new journalism technologies are allowing journalists to call powerful individuals and institutions to account, irrespective of national borders; and how previously silenced individuals are being given a voice. To read an example of international investigative journalism facilitated by a combination of social media, Web-based communications, reporter collaboration and news outlet collaborations see http://www.theaustralian.com.au/news/features/churchs-wall-of-silence-on-sexual-abuse/story-e6frg6z6-1226639077238.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Process improvement and innovation are risky endeavors, like swimming in unknown waters. In this chapter, I will discuss how process innovation through BPM can benefit from Research-as-a-Service, that is, from the application of research concepts in the processes of BPM projects. A further subject will be how innovations can be converted from confidence-based to evidence-based models due to affordances of digital infrastructures such as large-scale enterprise soft-ware or social media. I will introduce the relevant concepts, provide illustrations for digital capabilities that allow for innovation, and share a number of key takeaway lessons for how organizations can innovate on the basis of digital opportunities and principles of evidence-based BPM: the foundation of all process decisions in facts rather than fiction.