255 resultados para black identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Teachers’ professional conversations regarding the qualities evidenced in student work provide opportunities to develop a shared understanding of achievement standards. This research investigates social moderation conducted in a synchronous online mode as a specific form of professional conversation. The discussion considers the different factors that influenced these conversations which included the technologic medium of the meeting. The focus of the discussion is how participation in online moderation can support teachers to develop an assessment identity as one who works within a standards-based assessment system. Qualitative data were gathered from middle school teachers from different year levels, in different curriculum areas, in diverse geographic locations, and in a range of sociocultural contexts within Queensland, Australia. Analysis of the data through a sociocultural lens of becoming suggests that participation in online moderation, while challenging for teachers, can also provide opportunities to construct and to negotiate an identity as an assessor of student work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Defrauding land titles systems impacts upon us all. Those who deal in land include ordinary citizens, big business, small business, governments, not-for-profit organisation, deceased estates...Fraud here touches almost everybody." the thesis presented in this paper is that the current and disparate steps taken by jurisdictions to alleviate land fraud associated with identity-based crimes are inadequate. The centrepiece of the analysis is the consideration of two scenarios that have recently occurred. One is the typical scenario where a spouse forges the partner's signature to obtain a mortgage from a financial institution. The second is atypical. It involves a sophisticated overseas fraud duping many stakeholders involved in the conveyancing process. After outlining these scenarios, we will examine how identity verification requirements of the United Kingdom, Ontario, the Australian states, and New Zealand would have been applied to these two frauds. Our conclusion is that even though some jurisdictions may have prevented the frauds from occurring, the current requirements are inadequate. We use the lessons learnt to propose what we consider core principles for identity verification in land transactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The development of the Australian Curriculum has reignited a debate about the role of Australian literature in the contexts of curricula and classrooms. A review of the mechanisms for promoting Australian literature including literary prizes, databases, surveys and texts included for study in senior English classrooms in New South Wales and Victoria provides a background for considering the purpose of Australian texts and the role of literature teachers in shaping students’ engagement with literature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The World Wide Web constitutes one of the most important inventions of the late 20th century: it has changed culture, society, business, communication, politics, and many other fields of human endeavour, not least also by providing a more user-friendly pathway of access to its major underlying technology, the Internet itself. Key phases in its development can be charted, especially by how it has been used to present and share information – and here, the personal or professional, private or official homepage stands in as a useful representation of wider Web trends overall. From hand-coded beginnings through several successive stages of experimentation and standardisation, to the shifting balance between personal sites and social networks, the homepage demonstrates how the Web itself, and its place in our lives, have changed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital Stories are short autobiographical documentaries, often illustrated with personal photographs and narrated in the first person, and typically produced in group workshops. As a media form they offer ‘ordinary people’ the opportunity to represent themselves to audiences of their choosing; and this amplification of hitherto unheard voices has significant repercussions for their social participation. Many of the storytellers involved in the ‘Rainbow Family Tree’ case study that is the subject of this paper can be characterised as ‘everyday’ activists for their common desire to use their personal stories to increase social acceptance of marginalised identity categories. However, in conflict with their willingness to share their personal stories, many fear the risks and ramifications of distributing them in public spaces (especially online) to audiences both intimate and unknown. Additionally, while technologies for production and distribution of rich media products have become more accessible and user-friendly, many obstacles remain. For many people there are difficulties with technological access and aptitude, personal agency, cultural capital, and social isolation, not to mention availability of the time and energy requisite to Digital Storytelling. Additionally, workshop context, facilitation and distribution processes all influence the content of stories. This paper explores the many factors that make ‘authentic’ self-representation far from straight forward. I use qualitative data drawn from interviews, Digital Story texts and ethnographic observation of GLBTQIS participants in a Digital Storytelling initiative that combined face-to-face and online modes of participation. I consider mediating influences in practice and theory and draw on strategies put forth in cultural anthropology and narrative therapy to propose some practical tools for nuanced and sensitive facilitation of Digital Storytelling workshops and webspaces. Finally, I consider the implications of these facilitation strategies for voice, identity and social participation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power system restoration after a large area outage involves many factors, and the procedure is usually very complicated. A decision-making support system could then be developed so as to find the optimal black-start strategy. In order to evaluate candidate black-start strategies, some indices, usually both qualitative and quantitative, are employed. However, it may not be possible to directly synthesize these indices, and different extents of interactions may exist among these indices. In the existing black-start decision-making methods, qualitative and quantitative indices cannot be well synthesized, and the interactions among different indices are not taken into account. The vague set, an extended version of the well-developed fuzzy set, could be employed to deal with decision-making problems with interacting attributes. Given this background, the vague set is first employed in this work to represent the indices for facilitating the comparisons among them. Then, a concept of the vague-valued fuzzy measure is presented, and on that basis a mathematical model for black-start decision-making developed. Compared with the existing methods, the proposed method could deal with the interactions among indices and more reasonably represent the fuzzy information. Finally, an actual power system is served for demonstrating the basic features of the developed model and method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A review of the 6th APT focusing on the work and performance of Rohan Wealleans

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intercalated Archean komatiites and dacites sit above a thick footwall dacite unit in the host rock succession at the Black Swan Nickel Mine, north of Kalgoorlie in the Yilgarn Craton, Western Australia. Both lithofacies occur in units that vary in scale from laterally extensive at the scale of the mine lease to localized, thin, irregular bodies, from > 100 m thick to only centimetres thick. Some dacites are only slightly altered and deformed, and are interpreted to post-date major deformation and alteration (late porphyries). However, the majority of the dacites display evidence of deformation, especially at contacts, and metamorphism, varying from silicification and chlorite alteration at contacts to pervasive low grade regional metamorphic alteration represented by common assemblages of chlorite, sericite and albite. Texturally, the dacites vary from entirely massive and coherent to partially brecciated to totally brecciated. Strangely, some dacites are coherent at the margins and brecciated internally. Breccia textures vary from cryptically defined, to blocky, closely packed, in situ jig-saw fit textures with secondary minerals in fractures between clasts, to more apparent matrix rich textures with round clast forms, giving apparent conglomerate textures. Some clast zones have multi-coloured clasts, giving the impression of varied provenance. Strangely however, all these textural variants have gradational relationships with each other, and no bedding or depositional structures are present. This indicates that all textures have an in situ origin. The komatiites are generally altered and pervasively carbonate veined. Preservation of original textures is patchy and local, but includes coarse adcumulate, mesocumulate, orthocumulate, crescumulate-harrisite and occasionally spinifex textures. Where original contacts between komatiites and dacites are preserved intact (i.e. not sheared or overprinted by alteration), the komatiites have chilled margins, whereas the dacites do not. The margins of the dacites are commonly silicified, and inclusions of dacite occur in komatiite, even at the top contacts of komatiite units, but komatiite clasts do not occur in the dacites. The komatiites therefore were emplaced as sills into the dacites, and the intercalated relationships are interpreted as intrusive. The brecciation and alteration in the dacites are interpreted as being largely due to hydraulic fracturing and alteration induced by contact metamorphic effects and hydrothermal alteration deriving from the intrusion of komatiites into the felsic pile. The absence of autobreccia and hyaloclastite textures in the dacites suggest that they were emplaced as an earlier intrusive (sill?) complex at a high level in the crust.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous studies have enabled exact prediction of probabilities of identity-by-descent (IBD) in randommating populations for a few loci (up to four or so), with extension to more using approximate regression methods. Here we present a precise predictor of multiple-locus IBD using simple formulas based on exact results for two loci. In particular, the probability of non-IBD X ABC at each of ordered loci A, B, and C can be well approximated by XABC = XABXBC/XB and generalizes to X123. . .k = X12X23. . .Xk-1,k/ Xk-2, where X is the probability of non-IBD at each locus. Predictions from this chain rule are very precise with population bottlenecks and migration, but are rather poorer in the presence of mutation. From these coefficients, the probabilities of multilocus IBD and non-IBD can also be computed for genomic regions as functions of population size, time, and map distances. An approximate but simple recurrence formula is also developed, which generally is less accurate than the chain rule but is more robust with mutation. Used together with the chain rule it leads to explicit equations for non-IBD in a region. The results can be applied to detection of quantitative trait loci (QTL) by computing the probability of IBD at candidate loci in terms of identity-by-state at neighboring markers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Academically gifted students are recognised as possessing considerable achievement potential. Yet many fail to perform at a level commensurate with their ability. Often gifted students in early adolescence are faced with a forced choice between fulfilment of potential and achieving stable positive relationships with peers. This choice can affect their achievement and may have far-reaching personal and social costs. This case study explored the viability of self-presentation theory to explain students' ways of negotiating their sense of self whilst developing public identity and the concomitant affects on achievement and the fulfilment of potential. It examined how gifted students moderate their images in their learning and extra-curricular environments. Further, the study identifies those self-presentation strategies adopted that either facilitate or hinder achievement. This study may assist parents, educators and school counsellors to provide greater support for gifted adolescents.