16 resultados para Three proof requirements


Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper, qualitative results of a case study about the professional knowledge in the area of argumentation and proof of future teachers from universities in three countries are described. Based on results of open questionnaires, data about the competencies these future teachers have in the areas of mathematical knowledge and knowledge of mathematics pedagogy are presented. The study shows that the majority of the future teachers at the participating universities situated in Germany, Hong Kong and Australia, were not able to execute formal proofs, requiring only lower secondary mathematical content, in an adequate and mathematically correct way. In contrast, in all samples there was evidence of at least average competencies of pedagogical content reflection about formal and pre-formal proving in mathematics teaching. However, it appears that possessing a mathematical background as mandated for teaching and having a high affinity with proving in mathematics teaching at the lower secondary level are not a sufficient preparation for teaching proof.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Water repellent soils are difficult to irrigate and susceptible to preferential flow, which enhances the potential for accelerated leaching to groundwater of hazardous substances. Over 5 Mha of Australian soil is water repellent, while treated municipal sewage is increasingly used for irrigation. Only if a critical water content is exceeded will repellent soils become wettable. To avoid excessive loss of water from the root zone via preferential flow paths, irrigation schemes should therefore aim to keep the soil wet enough to maintain soil wettability. Our objective was to monitor the near-surface water content and water repellency in a blue gum (Eucalyptus globulus) plantation irrigated with treated sewage. The plantation's sandy soil surface was strongly water repellent when dry. For 4 months, three rows of 15 blue gum trees each received no irrigation, three other rows received 50% of the estimated potential water use minus rainfall, and three more rows received 100%. During this period, 162 soil samples were obtained in three sampling rounds, and their water content (% dry mass) and degree of water repellency determined. Both high and low irrigation effectively wetted up the soil and eliminated water repellency after 2 (high) or 4 (low) months. A single-peaked distribution of water contents was observed in the soil samples, but the water repellency distribution was dichotomous, with 44% extremely water-repellent and 36% wettable. This is consistent with a threshold water content at which a soil sample changes from water repellent to wettable, with spatial variability of this threshold creating a much wider transition zone at the field scale. We characterized this transition zone by expressing the fraction of wettable samples as a function of water content, and demonstrated a way to estimate from this the wettable portion of a field from a number of water content measurements. To keep the plantation soil wettable, the water content must be maintained at a level at which a significant downward flux is likely, with the associated enhanced leaching. At water contents with negligible downward flux, the field is water repellent, and leaching through preferential flow paths is likely. Careful management is needed to resolve these conflicting requirements.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

For an organisation to undertake a Customer Relationship Management (CRM) implementation program it needs to consider a multitude of requirements. Some authors have hinted at viewing CRM within a wider perspective than just  customer centric perspectives. The aim of this paper is to discuss the domain and conceptualise some of the requirements of CRM from an organisation’s point of view. However, CRM needs to be identified as the whole organisation, including its internal and external environments. Undertaking CRM in any organisation needs to be preceded by a sequence of stages. An organization needs to develop a roadmap outlining the path to become CRM centric. Therefore an organisation should address, or at least consider, a list of those factors at every stage of a CRM implementation program, for an implementation program to be effective. The main focus of literature in CRM has been customer centric. This paper, being the first stage of much wider research, will focus on the organisation and the internal environment. This paper will identify three information systems (IS) and information technology (IT) requirements in organisations that are integral parts of CRM. These need to achieve a level of synergy for successful CRM. To understand these three requirements (front-end systems, back-end systems, and datahandling technologies) in a CRM project is too great in magnitude at this early stage of the research. This paper begins to draw together the tenuous links between the three requirements of information systems (IS) and information technology (IT) systems. Writing this paper and shifting its focus towards requirements engineering, the author has realised that a whole area of literature has to be explored, because CRM is another IS implementation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents an assessment of system effectiveness in automatic requirements refinement by comparing results obtained from experts and novices with those achieved by the system. As the investigated system was a combination of a tightly inter-connected methods and a tool, the evaluation framework melded together a number of distinct methodological approaches structured into three empirical studies, which aimed at the construction of a case problem domain, calibrating the system using this defined domain elements and finally using the calibrated system to assess its effectiveness. In consequence, it was concluded that the evaluated methods and tools were effective in supporting requirements refinement.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Important eCommerce requirements are a robust and secure technical infrastructure, and the ability to ensuring the security of information, and to satisfying certain related legal requirements. In this paper, based on a literature review, we present a high-level conceptual model of information security in eCommerce, consisting of three strategic dimensions: protecting organizations' information, satisfying certain legal requirements, and enabling trusted and secure electronic transactions. Our conceptual model can be used by eCommerce managers as a tool in the strategic planning and management process, to better understand and communicate the inter-dependencies between business and legal requirements. The model can also be used for devising the goals and objectives relevant to their specific organization, for designing the policies that are needed, and deciding how technology will be managed and what training is required.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The challenge of human-computer interaction forces educationalists to think of new ways to understand the social, historical and contextual nature of learning. Discussion and exchange of ideas enable learners to learn together. However, the granularity of the Webbased learning context is extensive; consequently, e- Courseware design faces new dilemmas. Only through targeted research will it be known with any certainty whether Web-based learning gives rise to a new type of learning dissonance [1]. It has been proposed that converged theoretical paradigms that underpin particular digitised or context-mediated learning systems are forcing learners into new ways of thinking [2]. This paper presents an overview of the plans for an experimental project designed to understand the ontological requirements for experiential instructional environments. This project is a joint research initiative involving three Universities in the Asia/Pacific region. Results will be used to inform educationalists interested in developing instructional strategies for a global community.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper proposes to address the need for more innovation in organisational information security by adding a security requirement engineering focus. Based on the belief that any heavyweight security requirements process in organisational security will be doomed to fail, we developed a security requirement approach with three dimensions. The use of a simple security requirements process in the first dimension has been augmented by an agile security approach. However, introducing this second dimension of agile security does provide support for, but does not necessarily stimulate, innovation. A third dimension is, therefore, needed to ensure there is a proper focus in the organisation's efforts to identify potential new innovations in their security. To create this focus three common shortcomings in organisational information security have been identified. The resulting security approach that addresses these shortcomings is called Ubiquitous Information Security. This paper will demonstrate the potential of this new approach by briefly discussing its possible application in two areas: Ubiquitous Identity Management and Ubiquitous Wireless Security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper seeks to describe the volunteering experiences of female single parents engaged in Australia's welfare-to-work program. Interviews were conducted with 26 single parents who had been required to increase their hours of work as a condition of the Centrelink policy introduced in 2006. To analyse the data, the technique of rich point analysis was employed which identified three key concepts central to the women's experiences.  These concepts included the nature of a decent job, notions of reciprocity, and a seeming hierarchy of suitable jobs promoted within the welfareto- work policy. How volunteer activities fit within these constructs was the focus of the investigation. The analysis revealed that the types of paid jobs women obtained were less fulfilling and flexible than their volunteer activities. and gave them less sense of contributing to society, Further, in most cases prior to welfare reform, these single mothers were volunteering in their children's school and as such, both the school's capacity and intergenerational role modelling of volunteering were depleted.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Preliminary research into the critical factors associated with software development/implementation identified three dimensions for successful implementation based on alignment of the requirements engineering process with business needs, change management process and quality of the implementation process. Research results demonstrate the link between the conceptual model for process quality and the process management attributes determined during the research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper investigates whether the narrative section of Iranian companies' annual reports satisfies the information requirements of financial analysts employed by institutional investors. Taking a group of stakeholders (i.e. financial analysts) as the sample, a questionnaire survey was conducted to identify their top three information needs from the narrative sections of company annual reports in each of three information categories: Present, Analytical and Prospective. Following this survey, a checklist was prepared to analyse whether Iranian companies are disclosing this information required by financial analysts. Overall, the results partially support stakeholder theory as there is a general lack of information flow on the part of Iranian listed companies in meeting their stakeholders' information needs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The current automotive industry and todays car drivers are faced with every increasing challenges, not previously experienced. Climate Change, financial issues, rising fuel prices, increased traffic congestion and reduced parking space in cities are all leading to changes in consumer preferences and the requirements of modern passenger vehicles. However, despite the shift in the industry dynamics, the principal layout of a car hasn’t changed since its invention. The design of a ’conventional’ vehicle is still principally a matchbox with four wheels, one at each corner. The concept has served its purpose well for over 100 years, but such a layout is not suited to solving today’s problems. To address the range of problems faced by the industry, a number of alternative commuting vehicles have been developed. Yet the commercialization of these ‘alternative’ vehicles has yet to be successful. This is largely due failure of these vehicles to meet the changing demands of the industry and the limited understanding of consumer behaviour, motivation and attitudes. Deakin University’s Tomorrow’s Car concept tackles all of these problems. The vehicle is a novel three-wheeler cross over concept between a car and a motorbike that combines the best of both worlds. The vehicle combines the low cost, small size and ‘fun’ factor of a motorbike together with the safety, comfort and easy to drive features of a car produce a vehicle with a fuel efficiency better than either car or scooter. Intensive market research has been conducted for various major potential markets of alternative vehicles including India, China and Australia. The research analysed consumer attitudes in relation to narrow tilting vehicles, and in particular towards Deakin’s Tomorrow’s Car (TC). The study revealed that a relatively large percentage of consumers find such a concept very appealing. For the other consumers, the overall appearance and perception of safety and not the actual safety performance were found to be the most impeding factors of such vehicles. By addressing these issues and marketing the vehicle accordingly the successful commercialization of Tomorrow’s Car can be ensured.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Several grouping proof protocols have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with EPC Class-1 Gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, forward security, dependence, detecting illegitimate tags, eliminating unwanted tag processing and denial-of-proof (DoP) attacks have not been fully addressed by many. Our protocol addresses these important gaps and is based on simple XOR encryption and 128-bit Pseudo Random Number Generators (PRNG), operations that are easily implemented on low-cost passive tags and hence achieves EPC C1G2 compliance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Several grouping proof protocols for RFID systems have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with the EPC class-1 gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, simultaneity, dependence, detecting illegitimate tags, eliminating unwanted tag processing, and denial-of-proof attacks have not been fully addressed by many. Our protocol addresses these important gaps by taking a holistic approach to grouping proofs and provides forward security, which is an open research issue. The protocol is based on simple (XOR) encryption and 128-bit pseudorandom number generators, operations that can be easily implemented on low-cost passive tags. Thus, our protocol enables large-scale implementations and achieves EPC C1G2 compliance while meeting the security requirements.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we propose a novel zero knowledge grouping proof protocol for RFID Systems. Over the years, several protocols have been proposed in this area but they are either found to be vulnerable to certain attacks or do not comply with the EPC Class 1 Gen 2 (C1G2) standard because they use hash functions or other complex encryption schemes. Also, the unique design requirements of grouping proofs have not been fully addressed by many. Our protocol addresses these important security and design gaps in grouping proofs. We present a novel approach based on pseudo random squares and quadratic residuosity to realize a zero knowledge system. Tag operations are limited to functions such as modulo (MOD), exclusive-or (XOR) and 128 bit Pseudo Random Number Generators (PRNG). These can be easily implemented on passive tags and hence achieves compliance with the EPC Global standard while meeting the security requirements.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Three Flying Saucers is wall mounted set of three works which parody the iconic kitsch set of three flying ducks which inhabit the walls of many houses from the 1950’s to today. The project proposes a time in the future where contact with alien intelligent life has been established and we have finally obtained proof that Flying Saucers were real and had been visiting our world for many decades. Now these mysterious celestial forms have been adopted as the new kitsch and adorn the homes of the future.