170 resultados para cleft constructions
Resumo:
Incorporating engineering concepts into middle school curriculum is seen as an effective way to improve students’ problem-solving skills. A selection of findings is reported from a science, technology, engineering and mathematics (STEM)-based unit in which students in the second year (grade 8) of a three-year longitudinal study explored engineering concepts and principles pertaining to the functioning of simple machines. The culminating activity, the focus of this paper, required the students to design, construct, test, and evaluate a trebuchet catapult. We consider findings from one of the schools, a co-educational school, where we traced the design process developments of four student groups from two classes. The students’ descriptions and explanations of the simple machines used in their catapult design are examined, together with how they rated various aspects of their engineering designs. Included in the findings are students’ understanding of how their simple machines were simulated by the resources supplied and how the machines interacted in forming a complex machine. An ability to link physical materials with abstract concepts and an awareness of design constraints on their constructions were apparent, although a desire to create a ‘‘perfect’’ catapult despite limitations in the physical materials rather than a prototype for testing concepts was evident. Feedback from teacher interviews added further insights into the students’ developments as well as the teachers’ professional learning. An evolving framework for introducing engineering education in the pre-secondary years is proposed.
Resumo:
This paper discusses the fast emerging challenges for Malay and Muslim sexual minority storytellers in the face of an aggressive state-sponsored Islamisation of a constitutionally secular Malaysia. I examine the case of Azwan Ismail, a gay Malay and Muslim Malaysian who took part in the local ‘It Gets Better’ Project, initiated in December 2010 by Seksualiti Merdeka (an annual sexuality rights festival) and who suffered an onslaught of hostile comments from fellow Malay Muslims. In this paper, I ask how a message aimed at discouraging suicidal tendencies among sexual minority teenagers can go so wrong. In discussing the contradictions between Azwan’s constructions of self and the expectations others have of him, I highlight the challenges for Azwan’s existential self. For storytellers who are vulnerable if visible, the inevitable sharing of a personal story with unintended and hostile audiences when placed online, can have significant repercussions. The purist Sunni Islam agenda in Malaysia not only rejects the human rights of the sexual minority in Malaysia but has influenced and is often a leading hostile voice in both regional and international blocs. This self-righteous and supremacist political Islam fosters a more disabling environment for vulnerable, minority communities and their human rights. It creates a harsher reality for the sexual minority that manifests in State-endorsed discrimination, compulsory counselling, forced rehabilitation and their criminalisation. It places the right of the sexual minority to live within such a community in doubt. I draw on existing literature on how personal stories have historically been used to advance human rights. Included too, is the signifance and implications of the work by social psychologists in explaining this loss of credibility of personal stories. I then advance an analytical framework that will allow storytelling as a very individual form of witnessing to reclaim and regain its ‘truth to power’.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
Advanced composite materials offer remarkable potential in the upgrade of civil engineering structures. The evolution of CFRP (carbon fibre reinforced polymer) technologies and their versatility for applications in civil constructions require comprehensive and reliable codes of practice. Guidelines are available on the rehabilitation and retrofit of concrete structures with advanced composite materials. However, there is a need to develop appropriate design guidelines for CFRP strengthened steel structures. It is important to understand the bond characteristics between CFRP and steel plates. This paper describes a series of double strap shear tests loaded in tension to investigate the bond between CFRP sheets and steel plates. Both normal modulus (240 GPa) and high modulus (640 GPa) CFRPs were used in the test program. Strain gauges were mounted to capture the strain distribution along the CFRP length. Different failure modes were observed for joints with normal modulus CFRP and those with high modulus CFRP. The strain distribution along the CFRP length is similar for the two cases. A shorter effective bond length was obtained for joints with high modulus CFRP whereas larger ultimate load carrying capacity can be achieved for joints with normal modulus CFRP when the bond length is long enough.
Resumo:
Architects and supporters of the Northern Territory Emergency Response (the intervention) mobilised a range of ideas about Aboriginality to introduce and justify the policy program. These representations link Aboriginality to abuse of Aboriginal children, establishing a debate about the nature and future of Aboriginality in a context that limits the discursive authority of Aboriginal people. Aboriginality is represented as savage and in need of settler-imposed control, and also primitive and in need of development. These constructions understand Aboriginality temporally, situating it in the past but providing moral justification for coercing Indigenous people into the settler present. Aboriginality is also constructed spatially in this discourse, with prescribed communities framed as the location of both authentic Aboriginality and of threatening disorder. The intervention is framed as extending settler authority over this troubling terrain, containing and redeeming Aboriginality through inclusion in the settler nation’s moral order.
Resumo:
This thesis examines the construction of Aboriginality in recent public policy reasoning through identifying representations deployed by architects and supporters of the Commonwealth’s 2007 Northern Territory Emergency Response (the intervention). Debate about the Northern Territory intervention was explicitly situated in relation to a range of ideas about appropriate Government policy towards Indigenous people, and particularly about the nature, role, status, value and future of Aboriginality and of Aboriginal people and Torres Strait Islanders. This project involves analysis of constructions of Aboriginality deployed in texts created and circulated to explain and justify the policy program. The aim of the project is to identify the ideas about Aboriginality deployed by the intervention’s architects and supporters, and to examine the effects and implications of these discourses for political relationships between Indigenous people and settlers in Australia. This thesis will argue that advocates of the Northern Territory intervention construct Aboriginality in a range of important ways that reassert and reinforce the legitimacy of the settler colonial order and the project of Australian nationhood, and operate to limit Aboriginal claims. Specifically, it is argued that in linking Aboriginality to the abuse of Aboriginal children, the intervention’s advocates and supporters establish a political debate about the nature and future of Aboriginality within a discursive terrain in which the authority and perspectives of Indigenous people are problematised. Aboriginality is constructed in this process as both temporally and spatially separated from settler society, and in need of coercive integration into mainstream economic and political arrangements. Aboriginality is depicted by settler advocates of intervention as an anachronism, with Aboriginal people and cultures understood as primitive and/or savage precursors to settlers who are represented as modern and civilised. As such, the communities seen as the authentic home or location of Aboriginality represent a threat to Aboriginal children as well as to settlers. These constructions function to obscure the violence of the settler order, provide justification or moral rehabilitation for the colonising project, and reassert the sovereignty of the settler state. The resolution offered by the intervention’s advocates is a performance or enactment of settler sovereignty, representing a claim over and through both the territory of Aboriginal people and the discursive terrain of nationhood.
Resumo:
It is increasingly recognised that Christian Churches and their Institutions have historically been sites where the voices of survivors of child sexual abuse (csa) by Church personnel have not been effectively heard. This paper draws on data from a research project which sought the voices of Church Leaders who were identified as being pro-active in addressing csa within their individual denominations. From this research several key inhibitors to hearing survivor’s voices, within Churches of Australia, were identified. These key inhibitors include the culture of Churches themselves, gendered ideologies, constructions of leadership and the deployment of forgiveness. The identification of such factors creates space to learn more effective strategies for hearing the voices of survivors both within Churches and their organisations and externally. This paper goes beyond considering these factors to report on a collaborative project initiated, between Survivors Australia and Dr Death. This project specifically targets the voices of Australian Survivors of csa by Church leaders. It is hoped that this project will not only achieve the primary objective of hearing and valuing the voices of survivors of csa by Church leaders, but will also provide impetus for the creation of alternative ways of managing complaints of csa by Church leaders in Australia. Such complaints processes will be increasingly survivor focussed and include the creation of spaces where the voices of survivors are valued.
Resumo:
Since the nineteenth century, drug use has been variously understood as a problem of epidemiology, psychiatry, physiology, and criminality. Consequently drug research tends to be underpinned by assumptions of inevitable harm, and is often directed towards preventing drug use or solving problems. These constructions of the drug problem have generated a range of law enforcement responses, drug treatment technologies and rehabilitative programs that are intended to prevent drug related harm and resituate drug users in the realm of neo-liberal functional citizenship. This paper is based on empirical research of young people’s illicit drug use in Brisbane. The research rejects the idea of a pre-given drug problem, and seeks to understand how drugs have come to be defined as a problem. Using Michel Foucault’s conceptual framework of governmentality, the paper explores how the governance of illicit drugs, through law, public health and medicine, intersects with self-governance to shape young people’s drug use practices. It is argued that constructions of the drug problem shape what drug users believe about themselves and the ways in which they use drugs. From this perspective, drug use practices are ‘practices of the self’, formed through an interaction of the government of illicit drugs and the drug users own subjectivity.
Resumo:
"Theoretical work on the career development of women has travelled a journey from critique to creation. Early work responded to and criticised a literature that focused on theorising male roles in a workplace that was conceptualised as providing vertical career paths primarily for middle class males. More recently theorists are creating new constructions and frameworks to enable a more holistic understanding of career, applicable to both women and men. These constructions include broadening the discussion from women’s careers to women’s working lives. This is the fifth book in the Sense Publishers Career Development Series. It features the vibrant work of contributors from around the world writing in the field of women’s working lives. It emphasises the need to explore theoretical connections and understandings in order to facilitate a more holistic and inclusive understanding of women’s working lives. The writers in the current volume acknowledge the changing roles of women, in both public and private spheres. Women’s roles in paid work are changing both in their nature and type of engagement. In addition, with an ageing population, women’s roles in care work are increasingly being extended from child care to aged care. This book provides a history of theorising about women's careers, in addition to presenting a focus on current empirical and theoretical work which contributes to understandings of women's working lives. It’s contributions both map the current discourse and challenge future work to extend the boundaries of that discourse."--publisher website
Resumo:
Flows of cultural heritage in textual practices are vital to sustaining Indigenous communities. Indigenous heritage, whether passed on by oral tradition or ubiquitous social media, can be seen as a “conversation between the past and the future” (Fairclough, 2012, xv). Indigenous heritage involves appropriating memories within a cultural flow to pass on a spiritual legacy. This presentation reports ethnographic research of social media practices in a small independent Aboriginal school in Southeast Queensland, Australia that is resided over by the Yugambeh elders and an Aboriginal principal. The purpose was to rupture existing notions of white literacies in schools, and to deterritorialize the uses of digital media by dominant cultures in the public sphere. Examples of learning experiences included the following: i. Integrating Indigenous language and knowledge into media text production; ii. Using conversations with Indigenous elders and material artifacts as an entry point for storytelling; iii. Dadirri – spiritual listening in the yarning circle to develop storytelling (Ungunmerr-Baumann, 2002); and iv. Writing and publicly sharing oral histories through digital scrapbooking shared via social media. The program aligned with the Australian National Curriculum English (ACARA, 2012), which mandates the teaching of multimodal text creation. Data sources included a class set of digital scrapbooks collaboratively created in a multi-age primary classroom. The digital scrapbooks combined digitally encoded words, images of material artifacts, and digital music files. A key feature of the writing and digital design task was to retell and digitally display and archive a cultural narrative of significance to the Indigenous Australian community and its memories and material traces of the past for the future. Data analysis of the students’ digital stories involved the application of key themes of negotiated, material, and digitally mediated forms of heritage practice. It drew on Australian Indigenous research by Keddie et al. (2013) to guard against the homogenizing of culture that can arise from a focus on a static view of culture. The interpretation of findings located Indigenous appropriation of social media within broader racialized politics that enables Indigenous literacy to be understood as a dynamic, negotiated, and transgenerational flows of practice. The findings demonstrate that Indigenous children’s use of media production reflects “shifting and negotiated identities” in response to changing media environments that can function to sustain Indigenous cultural heritages (Appadurai, 1696, xv). It demonstrated how the children’s experiences of culture are layered over time, as successive generations inherit, interweave, and hear others’ cultural stories or maps. It also demonstrated how the children’s production of narratives through multimedia can provide a platform for the flow and reconstruction of performative collective memories and “lived traces of a common past” (Giaccardi, 2012). It disrupts notions of cultural reductionism and racial incommensurability that fix and homogenize Indigenous practices within and against a dominant White norm. Recommendations are provided for an approach to appropriating social media in schools that explicitly attends to the dynamic nature of Indigenous practices, negotiated through intercultural constructions and flows, and opening space for a critical anti-racist approach to multimodal text production.
Resumo:
Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.
Resumo:
Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this work, we construct “Fuzzy” Identity Based Encryption from the hardness of the Learning With Errors (LWE) problem. We note that for our parameters, the underlying lattice problems (such as gapSVP or SIVP) are assumed to be hard to approximate within supexponential factors for adversaries running in subexponential time. We give CPA and CCA secure variants of our construction, for small and large universes of attributes. All our constructions are secure against selective-identity attacks in the standard model. Our construction is made possible by observing certain special properties that secret sharing schemes need to satisfy in order to be useful for Fuzzy IBE. We also discuss some obstacles towards realizing lattice-based attribute-based encryption (ABE).
Resumo:
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.
Resumo:
In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Previous group signature constructions did not provide any disclosure capability, or at best a very limited one (such as subset membership). Our scheme offers a very powerful language for disclosing exactly in what capacity a subgroup of signers is making a signature on behalf of the group.
Resumo:
In this thesis we investigate the use of quantum probability theory for ranking documents. Quantum probability theory is used to estimate the probability of relevance of a document given a user's query. We posit that quantum probability theory can lead to a better estimation of the probability of a document being relevant to a user's query than the common approach, i. e. the Probability Ranking Principle (PRP), which is based upon Kolmogorovian probability theory. Following our hypothesis, we formulate an analogy between the document retrieval scenario and a physical scenario, that of the double slit experiment. Through the analogy, we propose a novel ranking approach, the quantum probability ranking principle (qPRP). Key to our proposal is the presence of quantum interference. Mathematically, this is the statistical deviation between empirical observations and expected values predicted by the Kolmogorovian rule of additivity of probabilities of disjoint events in configurations such that of the double slit experiment. We propose an interpretation of quantum interference in the document ranking scenario, and examine how quantum interference can be effectively estimated for document retrieval. To validate our proposal and to gain more insights about approaches for document ranking, we (1) analyse PRP, qPRP and other ranking approaches, exposing the assumptions underlying their ranking criteria and formulating the conditions for the optimality of the two ranking principles, (2) empirically compare three ranking principles (i. e. PRP, interactive PRP, and qPRP) and two state-of-the-art ranking strategies in two retrieval scenarios, those of ad-hoc retrieval and diversity retrieval, (3) analytically contrast the ranking criteria of the examined approaches, exposing similarities and differences, (4) study the ranking behaviours of approaches alternative to PRP in terms of the kinematics they impose on relevant documents, i. e. by considering the extent and direction of the movements of relevant documents across the ranking recorded when comparing PRP against its alternatives. Our findings show that the effectiveness of the examined ranking approaches strongly depends upon the evaluation context. In the traditional evaluation context of ad-hoc retrieval, PRP is empirically shown to be better or comparable to alternative ranking approaches. However, when we turn to examine evaluation contexts that account for interdependent document relevance (i. e. when the relevance of a document is assessed also with respect to other retrieved documents, as it is the case in the diversity retrieval scenario) then the use of quantum probability theory and thus of qPRP is shown to improve retrieval and ranking effectiveness over the traditional PRP and alternative ranking strategies, such as Maximal Marginal Relevance, Portfolio theory, and Interactive PRP. This work represents a significant step forward regarding the use of quantum theory in information retrieval. It demonstrates in fact that the application of quantum theory to problems within information retrieval can lead to improvements both in modelling power and retrieval effectiveness, allowing the constructions of models that capture the complexity of information retrieval situations. Furthermore, the thesis opens up a number of lines for future research. These include: (1) investigating estimations and approximations of quantum interference in qPRP; (2) exploiting complex numbers for the representation of documents and queries, and; (3) applying the concepts underlying qPRP to tasks other than document ranking.