24 resultados para llw (send)

em Deakin Research Online - Australia


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a traditional anti-jamming system a transmitter who wants to send a signal to a single receiver spreads the signal power over a wide frequency spectrum with the aim of stopping a jammer from blocking the transmission. In this paper, we consider the case that there are multiple receivers and the transmitter wants to broadcast a message to all receivers such that colluding groups of receivers cannot jam the reception of any other receiver. We propose efficient coding methods that achieve this goal and link this problem to well-known problems in combinatorics. We also link a generalisation of this problem to the Key Distribution Pattern problem studied in combinatorial cryptography

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Twice a year, in the May and November issues, RTE publishes a selected bibliography of recent research in the teaching of English and related fields. Most of the studies appeared during the six-month period preceding the compilation of the bibliography (July through December 2001 for the present bibliography), but some studies that appeared earlier are occasionally included. The listing is selective; we make no attempt to include all research and research-related articles that appeared in the period under review. Comments on the bibliography and suggestions about items for inclusion may be directed to the bibliography editors. We encourage you to send your suggestions to djbrown@ucok.edu, cathxx@deakin.edu.au, kalman@data.net.mx, stinsona@uwwvax.uww.edu, or melissa.whiting@usm.edu. You may also submit comments or recommend publications through the Annotated Bibliography page of RTE's World Wide Web site at http://www.ncte.org/rte/.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we have proposed a spam filtering technique using (2+1)-tier classification approach. The main focus of this paper is to reduce the false positive (FP) rate which is considered as an important research issue in spam filtering. In our approach, firstly the email message will classify using first two tier classifiers and the outputs will appear to the analyzer. The analyzer will check the labeling of the output emails and send to the corresponding mailboxes based on labeling, for the case of identical prediction. If there are any misclassifications occurred by first two tier classifiers then tier-3 classifier will invoked by the analyzer and the tier-3 will take final decision. This technique reduced the analyzing complexity of our previous work. It has also been shown that the proposed technique gives better performance in terms of reducing false positive as well as better accuracy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When school front offices are mentioned in research on schools and their relations with the community, it is often to describe how parents/carers and the public are treated officiously and/or inappropriately. In professional development materials, schools are urged to improve communication, and occasionally directed to consider the practices of the front office staff. Yet when schools send out information to parents/carers, the school office is usually the place to which all queries are directed. However, there is almost no detailed research that looks at what actually happens in this place. In this paper we draw on a small-scale commissioned research project which began to fill this gap. In seeking to reread our data and push further on analysis, we have come to realize that those who work in school front offices are women whose physical and emotional labour is not only rendered largely invisible in a wide range of literatures relating to home-school relations but is also inadequately recognized through recruitment practices, professional development and remuneration. We suggest that there needs to be further research into the high energy, multitasking, nurturing work that goes on in school front offices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigates journalism students’ usage of mobile phone technology when they begin their university studies and considers the implications of these baseline data for journalism education. This paper reports on the findings of three consecutive annual surveys of first year journalism students about their use of the applications available on their mobile phones. The surveys confirm that as well as using their phones to text and call, many are making video calls and most have shot photos and videos on their phones by the time they arrive at university. Many are using their phones to send or publish these images. More than half of the students now go online on their mobile phones. This evidence will inform journalism educators seeking to update their teaching practices and curricula.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stepping stone attacks are often used by network intruders to hide their identities. The Round Trip Times (RTT) between the send packets and corresponding echo packets for the connection chains of stepping stones are critical for detecting such attacks. In this paper, we propose a novel real-time RTT getting algorithm for stepping stones which is based on the estimation of the current RTT value. Our experiments show that it is far more precise than the previous real-time RTT getting algorithms. We also present the probability analysis which shows that our algorithm has a high matching rate and a high accurate rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The field of Australian higher education has changed, is changing and is about to change, as it is repositioned in relation to other ‘fields of power’. It is a sector now well defined by its institutional groupings – the Go8, the IRUs, the ATN and the rest – and by their relative claims to selectivity and exclusivity, with every suggestion of their differentiation growing. Even within these groupings there are distinctions and variations. Moreover, Australian universities now compete within an international higher education marketplace, ranked by THES and Shanghai Jiao Tiong league tables. ‘Catchment areas’ and knowledge production have become global. And the potential of a ‘joined‐up’ tertiary education system, of VET and universities, will rework relations within Australian higher education, as will lifting the volume caps on university student numbers. In sum, Australian universities (and agents within them) are positioned differently in the field, although not in the stable relations imagined by Pierre Bourdieu in the France of the 1960s. And being so variously and variably placed, institutions and agents have different stances available to them, including the positions they can take on student equity. In this paper I begin from the premise that our current shared stance on this has been out‐positioned. Nation‐bound proportional representation loses its equity meaning when the Australian elite send their children to Harvard, Yale, Oxford and Cambridge. The same could also be said, and has been, about equity representations by region, institution, discipline and degree. What then, also, for a new national research centre with a focus on student equity and higher education, for its research agenda and positioning in the field? What stance can it take on student equity that will resonate on a national and even international scale? And, given a global field of higher education, what definitions of equity and propositions for policy and practice can it offer? What will work in the pursuit of equity?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the experiences of selected academics pioneering e-learning in Malaysian tertiary institutions. It begins with an overview of the broad factors shaping the Malaysian educational environment and then proceeds to examine the experience of individual teachers and e-learning programs. It takes an in-depth qualitative approach to engaging with this case study material drawing heavily on semi-structured interviews with key actors.
Conversations with several respondents suggested that the social networks of mentor relations found in the Malaysian case studies might be aptly described as ‘bamboo networks’. Bamboo, which happens to be plentiful in the Malaysian peninsula where these case studies are based, spreads from clump to clump through a series of underground connections involving a mature clump of bamboo sending out a subterranean runner, often over very long distances that then emerge into the open as a new bamboo clump.
All of those interviewed reported that they have found it difficult to find a support base in their first years of pioneering online developments. Consequently, they tended to fall back on their peer networks linked to the institutions at which they had studied. Prominent individuals championing e-learning in the institutions where they teach tend to form small groups for information sharing and networking. They do look to their management for tacit ‘permission’ rather than direct encouragement. Consequently, the active promotion of e-learning in Malaysia can be described as being ‘middle-down’ rather than ‘top-down’ in nature. That is to say, it is mid-level teachers that inspire those below them to join in the development of e-learning programs. They are internally driven and strongly motivated. In time, their activity should produce new generations of locally developed e-learning experts but this has yet to take place in a substantial fashion. This study shows that both men and women ‘academic guanxi’, or peer networks, play a key role in the adoption of online technologies. Key early adopters become change-agents by inspiring a small network of their peers and via their guanxi networks. It was also discovered that motivation is not simply an individual matter but is also about groups and peer networks or communities of exchange and encouragement. In the development of e-learning in Malaysia, there is very little activity that is not linked to small clusters of developers who are tied into wider networks through personal contacts.
Like clumping bamboo, whilst the local clusters tend to be easily seen, the longer-range ‘subterranean’ personal connections are generally not nearly so immediately obvious. These connections are often the product of previous mentoring relationships, including the relationships between influential teachers and their former postgraduate students. These relationships tend to work like bamboo runners: they run off in multiple directions, subterranean and unseen and then throw up new clumps that then send out fresh runners of their own.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the construction of masculinity in judge’s sentencing remarks across seventeen cases of male perpetrated intimate femicide sentenced between March 2005 and May 2007 in the Victorian Supreme Court. Using a narrative analysis of sentencing transcripts it investigates how ideal understandings of hegemonic masculinity are used in judicial decision making to condemn or sympathise with male offenders of intimate femicide. The findings illustrate the profound influence that traditional understandings of masculinity and fatherhood still have on current sentencing practises despite the current climate of homicide law reform both within Australia and overseas. Whilst this paper did not directly assess the impact of recent homicide law reforms, specifically provocation, it is explicitly concerned with the continued influence of gender norms and bias at the sentencing stage of the legal process. As such, it provides a preliminary illustration of the key role that judges play in advocating or rejecting change within the criminal justice system, and more broadly legitimising attitudes about male violence against women throughout society. In condoning the use of extreme violence, in any context, judges send a message to society that such behaviour is either generally or specifically acceptable and accommodated within a legal framework.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

'The film is a mixture of flickery, letraset, light, scratching and hand-drawn colour. So rapid is the movement that it makes you wonder at times if you are looking at an image or its afterimage. Could a film like Frames be damaging to your retinam or neurological functions? if you sat in front of this type of film long enough, would it send you on a trip? Could it awaken a patient out of a coma? After a confronting seven minutes I felt exhausted and slightly frazzled. Such is the power of the film' Glen Hannah in Filmviews Number 130 p28 1986

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Landfill waste has a negative impact on the environment and small and medium sized enterprises (SMEs) are believed to be significant contributors. There is little government or scholarly research, however, quantifying the collective volume of waste SMEs send to landfill. Where studies do exist they measure total volumes (landfill and recycling combined) and/or do not distinguish between specific waste streams (e.g. wood) and subcategories (e.g. dust). This paper contributes to knowledge by giving insight into the collective volume of waste of 404 SMEs, reconceptualising SME waste into subcategories and by measuring landfill volumes. It presents findings from these 404 Australian SMEs which found that, in descending order, cardboard, paper, plastic wrap, wood dust and particleboard were the subcategories these SMEs sent to landfill in the greatest volumes. It also argues that this reconceptualisation, and associated data collection protocols, have the potential to enable scholars and policy makers to determine the waste subcategories to which SMEs contribute most, formulate targeted interventions and research or evaluate environmental outcomes. © 2014 © 2014 Environment Institute of Australia and New Zealand Inc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbitrary identity string as an encryption key. Since IBE does not require prior generation and distribution of keys, it greatly simplifies key management in public-key cryptography. According to the Menezes-Okamoto-Vanstone (MOV) reduction theory, the IBE scheme based on bilinear map loses the high efficiency of elliptic curve because of the requirement of large security parameters. Therefore, it is important to build a provably secure IBE scheme without bilinear map. To this end, this paper proposes an improved IBE scheme that is different from the previous schemes because this new scheme does not use symmetric encryption algorithm. Furthermore, it can be proven to be secure against adaptively chosen identity and chosen plaintext attacks in the standard model. Elaborated security and performance analysis demonstrate that this new scheme outperforms the previous ones in terms of the time complexity for encryption and decryption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The principle of legality has evolved into a clear and entrenchedjurisprudential mechanism for protecting common law rights and freedoms. It operates as a shield to preserve the scope of application of fundamental rights and fre edoms. In recent years it has been increasingly applied by the courts to limit the scope of legislative provisions which potentially impinge on human rights and fundamental freedoms. Yet there is one domain where the principle of legality is conspicuously absent: sentencing. Ostensibly, this is paradoxical. Sentencing is the realm where the legalsystem operates in its most coercive manner against individuals. In thisarticle, we argue that logically the principle of legality has an importantrole in the sentencing system given the incursions by criminal sanctionsinto a number of basic rights, including the right to liberty, the freedom ofassociation and the deprivation of property. By way of illustration, we setout how the principle of legality should apply to the interpretation of keystatutory provisions. To this end, we argue that the objectives of generaldeterrence and specifi c deterrence should have less impact in sentencing. It is also suggested that judges should be more reluctant to send offenders with dependants to terms of imprisonment. Injecting the principle of legality into sentencing law and practice would result in the reduction in severity of a large number of sanctions, thereby reducing the frequency and extent to which the fundamental rights of offenders are violated. The methodology set out in this article can be applied to alter the operation of a number of legislative sentencing objectives and rules.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The popularity of mobile devices such as smart phones and tablets has led to a growing use of spatial crowdsourcing in recent years. However, current solution requires the workers send their locations to a centralized server, which leads to a privacy threat. One of the key challenges of spatial crowdsourcing is to maximize the number of assigned tasks with workers’ location privacy preserved. In this paper, we focus on the reward-based spatial crowdsourcing and propose a two-stage method which consists of constructing a differentially private contour plot followed by task assignment with optimized-reward allocation. Experiments on real dataset demonstrate the availability of the proposed method.