161 resultados para algebra extensions
Resumo:
This chapter provides a historical materialist review of the development of applied and critical linguistics and their extensions and applications to the fields of English Language studies. Following Bourdieu, we view intellectual fields and their affiliated discourses as constructed in relation to specific economic and political formations and sociocultural contexts. We therefore take ‘applied linguistics’, ‘critical language studies’ and ‘English language studies’ as fields in dynamic and contested formation and relationship. Our review focuses on three historical moments. In the postwar period, we describe the technologisation of linguistics – with the enlistment of linguistics in the applied fields of language planning, literacy education and second/foreign language teaching. We then turn to document the multinationalisation of English, which, we argue entails a rationalisation of English as a universal form of economic capital in globalised economic and cultural flows. We conclude by exploring scenarios for the displacement of English language studies as a major field by other emergent economic lingua franca (e.g., Mandarin, Spanish) and shifts in the economic and cultural nexus of control over English from an Anglo/American centre to East and West Asia.
Resumo:
Introduction: The ability to regulate joint stiffness and coordinate movement during landing when impaired by muscle fatigue has important implications for knee function. Unfortunately, the literature examining fatigue effects on landing mechanics suffers from a lack of consensus. Inconsistent results can be attributed to variable fatigue models, as well as grouping variable responses between individuals when statistically detecting differences between conditions. There remains a need to examine fatigue effects on knee function during landing with attention to these methodological limitations. Aim: The purpose of this study therefore, was to examine the effects of isokinetic fatigue on pre-impact muscle activity and post-impact knee mechanics during landing using singlesubject analysis. Methodology: Sixteen male university students (22.6+3.2 yrs; 1.78+0.07 m; 75.7+6.3 kg) performed maximal concentric and eccentric knee extensions in a reciprocal manner on an isokinetic dynamometer and step-landing trials on 2 occasions. On the first occasion each participant performed 20 step-landing trials from a knee-high platform followed by 75 maximal contractions on the isokinetic dynamometer. The isokinetic data was used to calculate the operational definition of fatigue. On the second occasion, with a minimum rest of 14 days, participants performed 2 sets of 20 step landing trials, followed by isokinetic exercise until the operational definition of fatigue was met and a final post-fatigue set of 20 step-landing trials. Results: Single-subject analyses revealed that isokinetic fatigue of the quadriceps induced variable responses in pre impact activation of knee extensors and flexors (frequency, onset timing and amplitude) and post-impact knee mechanics(stiffness and coordination). In general however, isokinetic fatigue induced sig nificant (p<0.05) reductions in quadriceps activation frequency, delayed onset and increased amplitude. In addition, knee stiffness was significantly (p<0.05) increased in some individuals, as well as impaired sagittal coordination. Conclusions: Pre impact activation and post-impact mechanics were adjusted in patterns that were unique to the individual, which could not be identified using traditional group-based statistical analysis. The results suggested that individuals optimised knee function differently to satisfy competing demands, such as minimising energy expenditure, as well as maximising joint stability and sensory information.
Resumo:
Recent studies suggest that meta-evaluation can be valuable in developing new approaches to evaluation, building evaluation capacities, and enhancing organizational learning. These new extensions of the concept of meta-evaluation are significant, given the growing emphasis on improving the quality and effectiveness of evaluation practices in the South Asian region. Following a review of the literature, this paper presents a case study of the use of concurrent meta-evaluation in the four-year project Assessing Communication for Social Change which developed and trialled a participatory impact assessment methodology in collaboration with a development communication Non-government organization (NGO) in Nepal. Key objectives of the meta-evaluation included to: continuously develop, adapt and improve the impact assessment methodology, Monitoring and Evaluation (M&E) systems and process and other project activities; identify impacts of the project; and build capacities in critical reflection and review. Our analysis indicates that this meta-evaluation was essential to understanding various constraints related to the organizational context that affected the success of the project and the development of improved M&E systems and capacities within the NGO. We identified several limitations of our meta-evaluation methods, which were balanced by the strengths of other methods. Our case study suggests that as well as assessing the quality, credibility and value of evaluation practices, meta-evaluations need to focus on important contextual issues that can have significant impacts on the outcomes of participatory evaluation projects. They include hierarchical organizational cultures, communication barriers, power/knowledge relations, and the time and resources available. Meta-evaluations also need to consider wider issues such as the sustainability of evaluation systems and approaches.
Resumo:
The current rapid urban growth throughout the world manifests in various ways and historically cities have grown, similarly, alternately or simultaneously between planned extensions and organic informal settlements (Mumford, 1989). Within cities different urban morphological regions can reveal different contexts of economic growth and/or periods of dramatic social/technological change (Whitehand, 2001, 105). Morpho-typological study of alternate contexts can present alternative models and contribute to the present discourse which questions traditional paradigms of urban planning and design (Todes et al, 2010). In this study a series of cities are examined as a preliminary exploration into the urban morphology of cities in ‘humid subtropical’ climates. From an initial set of twenty, six cities were selected: Sao Paulo, Brazil; Jacksonville, USA; Maputo, Mozambique; Kanpur, India; Hong Kong, China; and Brisbane, Australia. The urban form was analysed from satellite imagery at a constant scale. Urban morphological regions (types) were identified as those demonstrating particular consistant characteristics of form (density, typology and pattern) different to their surroundings when examined at a constant scale. This analysis was correlated against existing data and literature discussing the proliferation of two types of urban development, ‘informal settlement’ (defined here as self-organised communities identifiable but not always synonymous with ‘slums’) and ‘suburbia’ (defined here as master planned communities of generally detached houses prevalent in western society) - the extreme ends of a hypothetical spectrum from ‘planned’ to ‘spontaneous’ urban development. Preliminary results show some cities contain a wide variety of urban form ranging from the highly organic ‘self-organised’ type to the highly planned ‘master planned community’ (in the case of Sao Paulo) while others tend to fall at one end of the planning spectrum or the other (more planned in the cases of Brisbane and Jacksonville; and both highly planned and highly organic in the case of Maputo). Further research will examine the social, economical and political drivers and controls which lead to this diversity or homogeneity of urban form and speculates on the role of self-organisation as a process for the adaptation of urban form.
Resumo:
The use of symbols and abbreviations adds uniqueness and complexity to the mathematical language register. In this article, the reader’s attention is drawn to the multitude of symbols and abbreviations which are used in mathematics. The conventions which underpin the use of the symbols and abbreviations and the linguistic difficulties which learners of mathematics may encounter due to the inclusion of the symbolic language are discussed. 2010 NAPLAN numeracy tests are used to illustrate examples of the complexities of the symbolic language of mathematics.
Resumo:
Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security.
Resumo:
In this paper we propose a framework for both gradient descent image and object alignment in the Fourier domain. Our method centers upon the classical Lucas & Kanade (LK) algorithm where we represent the source and template/model in the complex 2D Fourier domain rather than in the spatial 2D domain. We refer to our approach as the Fourier LK (FLK) algorithm. The FLK formulation is advantageous when one pre-processes the source image and template/model with a bank of filters (e.g. oriented edges, Gabor, etc.) as: (i) it can handle substantial illumination variations, (ii) the inefficient pre-processing filter bank step can be subsumed within the FLK algorithm as a sparse diagonal weighting matrix, (iii) unlike traditional LK the computational cost is invariant to the number of filters and as a result far more efficient, and (iv) this approach can be extended to the inverse compositional form of the LK algorithm where nearly all steps (including Fourier transform and filter bank pre-processing) can be pre-computed leading to an extremely efficient and robust approach to gradient descent image matching. Further, these computational savings translate to non-rigid object alignment tasks that are considered extensions of the LK algorithm such as those found in Active Appearance Models (AAMs).
Resumo:
Information security policies play an important role in achieving information security. Confidentiality, Integrity, and Availability are classic information security goals attained by enforcing appropriate security policies. Workflow Management Systems (WfMSs) also benefit from inclusion of these policies to maintain the security of business-critical data. However, in typical WfMSs these policies are designed to enforce the organisation’s security requirements but do not consider those of other stakeholders. Privacy is an important security requirement that concerns the subject of data held by an organisation. WfMSs often process sensitive data about individuals and institutions who demand that their data is properly protected, but WfMSs fail to recognise and enforce privacy policies. In this paper, we illustrate existing WfMS privacy weaknesses and introduce WfMS extensions required to enforce data privacy. We have implemented these extensions in the YAWL system and present a case scenario to demonstrate how it can enforce a subject’s privacy policy.
Resumo:
In 1980 Alltop produced a family of cubic phase sequences that nearly meet the Welch bound for maximum non-peak correlation magnitude. This family of sequences were shown by Wooters and Fields to be useful for quantum state tomography. Alltop’s construction used a function that is not planar, but whose difference function is planar. In this paper we show that Alltop type functions cannot exist in fields of characteristic 3 and that for a known class of planar functions, x^3 is the only Alltop type function.
Resumo:
Mutually unbiased bases (MUBs) have been used in several cryptographic and communications applications. There has been much speculation regarding connections between MUBs and finite geometries. Most of which has focused on a connection with projective and affine planes. We propose a connection with higher dimensional projective geometries and projective Hjelmslev geometries. We show that this proposed geometric structure is present in several constructions of MUBs.
Resumo:
Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savings. Security comes up as one of the most important issues when voice communication and critical voice applications are considered. Not only the security methods provided by traditional telephony systems, but also additional methods are required to overcome security risks introduced by the public IP networks. SIP considers security problems of such a consolidation and provides a security framework. There are several security methods defined within SIP specifications and extensions. But, suggested methods can not solve all the security problems of SIP systems with various system requirements. In this thesis, a Kerberos based solution is proposed for SIP security problems, including SIP authentication and privacy. The proposed solution tries to establish flexible and scalable SIP system that will provide desired level of security for voice communications and critical telephony applications.
Resumo:
A new deterministic method for predicting simultaneous inbreeding coefficients at three and four loci is presented. The method involves calculating the conditional probability of IBD (identical by descent) at one locus given IBD at other loci, and multiplying this probability by the prior probability of the latter loci being simultaneously IBD. The conditional probability is obtained applying a novel regression model, and the prior probability from the theory of digenic measures of Weir and Cockerham. The model was validated for a finite monoecious population mating at random, with a constant effective population size, and with or without selfing, and also for an infinite population with a constant intermediate proportion of selfing. We assumed discrete generations. Deterministic predictions were very accurate when compared with simulation results, and robust to alternative forms of implementation. These simultaneous inbreeding coefficients were more sensitive to changes in effective population size than in marker spacing. Extensions to predict simultaneous inbreeding coefficients at more than four loci are now possible.
Resumo:
The tertiary sector is an important employer and its growth is well above average. The Texo project’s aim is to support this development by making services tradable. The composition of new or value-added services is a cornerstone of the proposed architecture. It is, however, intended to cater for build-time. Yet, at run-time unforseen exceptions may occur and user’s requirements may change. Varying circumstances require immediate sensemaking of the situation’s context and call for prompt extensions of existing services. Lightweight composition technology provided by the RoofTop project enables domain experts to create simple widget-like applications, also termed enterprise mashups, without extensive methodological skills. In this way RoofTop can assist and extend the idea of service delivery through the Texo platform and is a further step towards a next generation internet of services.
Resumo:
A multivariate approach to bidding strategy is presented in comparison with previous standard approaches. An optimal formulation is derived and a method of parameter estimation proposed. A case study illustrates the derivation of optimal and other strategic mark up values against a single bidder. Concluding remarks concern extensions to multiple competitors differing levels of information, and sensitivity analysis.