992 resultados para American Party -- Pennsylvania
Resumo:
Flows of cultural heritage in textual practices are vital to sustaining Indigenous communities. Indigenous heritage, whether passed on by oral tradition or ubiquitous social media, can be seen as a “conversation between the past and the future” (Fairclough, 2012, xv). Indigenous heritage involves appropriating memories within a cultural flow to pass on a spiritual legacy. This presentation reports ethnographic research of social media practices in a small independent Aboriginal school in Southeast Queensland, Australia that is resided over by the Yugambeh elders and an Aboriginal principal. The purpose was to rupture existing notions of white literacies in schools, and to deterritorialize the uses of digital media by dominant cultures in the public sphere. Examples of learning experiences included the following: i. Integrating Indigenous language and knowledge into media text production; ii. Using conversations with Indigenous elders and material artifacts as an entry point for storytelling; iii. Dadirri – spiritual listening in the yarning circle to develop storytelling (Ungunmerr-Baumann, 2002); and iv. Writing and publicly sharing oral histories through digital scrapbooking shared via social media. The program aligned with the Australian National Curriculum English (ACARA, 2012), which mandates the teaching of multimodal text creation. Data sources included a class set of digital scrapbooks collaboratively created in a multi-age primary classroom. The digital scrapbooks combined digitally encoded words, images of material artifacts, and digital music files. A key feature of the writing and digital design task was to retell and digitally display and archive a cultural narrative of significance to the Indigenous Australian community and its memories and material traces of the past for the future. Data analysis of the students’ digital stories involved the application of key themes of negotiated, material, and digitally mediated forms of heritage practice. It drew on Australian Indigenous research by Keddie et al. (2013) to guard against the homogenizing of culture that can arise from a focus on a static view of culture. The interpretation of findings located Indigenous appropriation of social media within broader racialized politics that enables Indigenous literacy to be understood as a dynamic, negotiated, and transgenerational flows of practice. The findings demonstrate that Indigenous children’s use of media production reflects “shifting and negotiated identities” in response to changing media environments that can function to sustain Indigenous cultural heritages (Appadurai, 1696, xv). It demonstrated how the children’s experiences of culture are layered over time, as successive generations inherit, interweave, and hear others’ cultural stories or maps. It also demonstrated how the children’s production of narratives through multimedia can provide a platform for the flow and reconstruction of performative collective memories and “lived traces of a common past” (Giaccardi, 2012). It disrupts notions of cultural reductionism and racial incommensurability that fix and homogenize Indigenous practices within and against a dominant White norm. Recommendations are provided for an approach to appropriating social media in schools that explicitly attends to the dynamic nature of Indigenous practices, negotiated through intercultural constructions and flows, and opening space for a critical anti-racist approach to multimodal text production.
Resumo:
Community foundations have been described as the fastest growing form of philantrhopy. This report focuses on the development of community foundations in Australia as one especially important example of the growth of community foundations world-wide.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.
Resumo:
In ASIC v Atlantic 3 Financial (Aust) Pty Ltd [2006] QCA 540 the Queensland Court of Appeal dismissed an appeal from the decision of Mullins J at first instance in ASIC v Atlantic 3 Financial (Aust) Pty LTd [2006] QSC 152, the majority concluding that the client agreement in issue was not inconsistent with s48 of the Queensland Law Society Act 1952.
Resumo:
This study compared the determinants of physical activity in active and low-active African-American sixth grade students (N=108, 57 F, 51 M). Objective assessments of physical activity over a seven-day period were obtained using the CSA 7164 accelerometer. Students were classified as active if they exhibited three pr more 20-minute bouts of moderate to vigorous physical activity over the seven-day period. Relative to low-actives, active boys reported significantly higher levels of self-efficacy, greater involvement in community physical activity organizations, and were significantly more likely to perceive their mother us active. Relative to low-actives, active girls reported significantly higher levels of physical activity self-efficacy, greater positive beliefs regarding physical activity outcomes, and were significantly less likely to watch television or play video games for greater than or equal to 3 hrs/day. These observations provide preliminary guidance as to the design of physical activity interventions targeted at African-American youth.
Resumo:
Purpose To evaluate the relative utility of the Theory of Reasoned Action (TRA) and the Theory of Planned Behavior (TPB) in explaining intentions and physical activity behavior in white and African-American eighth-grade girls. Methods One-thousand-thirty white and 1114 African-American eighth-grade girls (mean age 13.6 ± 0.7 years) from 31 middle schools in South Carolina completed a 3-day physical activity recall and a questionnaire assessing attitudes, subjective norms, perceived behavioral control, self-efficacy, and intentions related to regular participation in moderate-to-vigorous physical activity (MVPA). Results Among Whites, 17% of the variance in intentions was contributed by subjective norms and attitude, with intentions accounting for 8% of the variance in MVPA. The addition of perceived behavioral control and self-efficacy to the TRA significantly improved the prediction of intentions and MVPA accounting for 40% and 10% of the variance, respectively. Among African-Americans, subjective norms and attitude accounted for 13% of the variance in intentions, with intentions accounting for only 3% of the variance in MVPA. The addition of perceived behavioral control and self-efficacy to the TRA significantly improved the prediction of intentions and MVPA accounting for 28% and 5% of the variance, respectively. Conclusions The results provided limited empirical support for the TPB among white adolescent girls; however, our findings suggest that the planned behavior framework has limited utility among African-American adolescent girls. The relatively weak link between intentions and MVPA observed in both population groups suggest that constructs external to the TPB may be more important mediators of physical activity behavior in adolescent girls.
Resumo:
Lack of physical activity and low levels of physical fitness are thought to be contributing factors to the high prevalence of obesity in African-American girls, To examine this hypothesis, we compared habitual physical activity and physical fitness in 54 African-American girls with obesity and 96 African-American girls without obesity residing in rural South Carolina, Participation in vigorous (greater than or equal to 6 METs) (VPA) or moderate and vigorous physical activity (greater than or equal to 4 METs) (MVPA) was assessed on three consecutive days using the Previous Day Physical Activity Recall, Cardiorespiratory fitness was assessed using the PWC 170 cycle ergometer test, Upper body strength was determined at two sites via isometric cable tensiometer tests, Relative to their counterparts without obesity, girls with obesity reported significantly fewer 30-minute blocks of VPA (0.90 +/- 0.14 vs. 1.3 +/- 0.14) and MVPA (1.2 +/- 0.18 vs. 1.7 +/- 0.16) (p<0.01), Within the entire sample, VPA and MVPA were inversely associated with body mass index (r=-0.17 and r=-0.19) and triceps skinfold thickness (r=-0.19 and r=-0.22) (p<0.05), In the PWC 170 test and isometric strength tests, girls with obesity demonstrated absolute scores that were similar to, or greater than, those of girls without obesity; however, when scores were expressed relative to bodyweight, girls with obesity demonstrated significantly lower values (p<0.05). The results support the hypothesis that lack of physical activity and low physical fitness are important contributing factors in the development and/or maintenance of obesity in African-American girls.
Resumo:
The purposes of this study were to describe and compare the specific physical activity choices and sedentary pursuits of African American and Caucasian American girls. Participants were 1,124 African American and 1,068 Caucasian American eighth grade students from 31 middle schools. The 3-Day Physical Activity Recall (3DPAR) was used to measure participation in physical activities and sedentary pursuits. The most frequently reported physical activities were walking, basketball, jogging or running, bicycling, and social dancing. Differences between groups were found in 11 physical activities and 3 sedentary pursuits. Participation rates were higher in African American girls (p<.001)for social dancing, basketball, watching television, and church attendance but lower in calisthenics, ballet and other dance, jogging or running, rollerblading, soccer, softball or baseball, using an exercise machine, swimming, and homework. Cultural differences of groups should be considered when planning interventions to promote physical activity.
Resumo:
In Kimtran Pty Ltd v Downie [2003] QDC 043 the court allowed in part an appeal from the refusal by the Queensland Building Tribunal to order the respondent liquidators pay the appellants' costs of proceedings in the Tribunal. The decision involved an examination of authorities which have considered the circumstances in which it is in the interests of justice to make an order for costs against a non-party.
Resumo:
The decision in Hook v Boreham & QBE Insurance (Australia) Limited [2006] QDC 304 considered whether the court should go further than order that costs be assessed on the indemnity basis, but should also specify the basis by which those indemnity costs should be determined. The decision makes it clear that under r704(3) of the Uniform Civil Procedure Rules, questions of that nature are ordinarily preserved to the discretion of the Registrar.
Resumo:
The Galapagos archipelago is characterized by a high degree of endemism across many taxa, linked to the archpelago's oceanic origin and distance from other colonizing land masses. A population of ~ 500 American Flamingos (Phoenicopterus ruber) resides in Galapagos, which is thought to share an historical origin with the American Flamingo currently found in the Caribbean region. Genetic and phenotypic parameters in American Flamingos from Galapagos and from the Caribbean were investigated. Microsatellite and microchondrial DNA markers data showed that the American Flamingo population in Galapagos differs genetically from that in the Caribbean. American Flamingos in Galapagos form a clade which differs by a single common nucleotide substitution from American Flamingos in the Caribbean. The genetic differentiation is also evident from nuclear DNA in that microsatellite data reveal a number of private alleles for the American Flamingo in Galapagos. Analysis of skeletal measurements showed that American Flamingos in Galapagos are smaller than those in the Caribbean primarily due to shorter tarsus length, and differences in body shape sexual dimorphism. American Flamingo eggs from Galapagos have smaller linear dimensions and volumes than those from the Caribbean. The findings are consistent with reproductive isolation of American Flamingo population in Galapagos.
Resumo:
Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
A review of Philip Glass's opera The Perfect American. The Brisbane Festival’s production of Philip Glass’s opera The Perfect American is only the third production of the 2012 work ever to be staged. That’s quite a coup for the Brisbane Festival and Opera Queensland. The Perfect American was commissioned by Madrid’s Teatro Real and London’s English National Opera to mark the American composer’s 75th birthday. Glass’s telling of the Disney myth focuses on the final stages of Walt Disney’s life and career – a high art critique of a popular culture icon...