871 resultados para Difference schemes


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 1st July 1997 heralded the implementation of a number of amendments to the Queensland Criminal Code including some intriguing changes affecting the principal property offences of stealing (section 398) and dishonest application (section 408C). This article discusses the impact of the changes. It examines the extent of the amendments and then aims to delineate the ambit of each offence drawing on some of the more recent judgments in the area. It concludes that the offences are moving closer together while retaining many of the complexities of proof experienced in the past.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sedimentary palygorskite (SP) and hydrothermal palygorskite (HP) were characterized by XRF, TG/DSC, andXRD. The total iron and dissociative iron in palygorskite were detected using spectrophotometry. The results showed that about 3.57 wt% of Fe2O3 was detected in SP in contrast with 0.4 wt% in HP. SP was a Fe-substituted palygorskite, and HP was an Al-rich palygorskite. The occurrence of Fe substitution in SP resulted in two mass loss steps of coordinated water and resulted in a larger d spacing. The SP showed greater thermal stability than the HP. It was proposed the change of (200) diffraction peak and (240) diffraction peak reflect changes of tetrahedral and octahedral structures in palygorskite.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes a study designed to understand player responses to artificially intelligent opponents in multi-player First Person Shooter games. It examines the player's ability to tell the difference between artificially intelligent opponents and other human players, and investigates the players' perceptions of these opponents. The study examines player preferences in this regard and identifies the significance of the cues and signs players use to categorise an opponent as artificial or human.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates the gap between the climate change-related corporate governance information being disclosed by companies, and the information sought by stakeholders. To accomplish this objective we utilised previous research on stakeholder demand for information, and we conducted in-depth interviews with six corporate representatives from major Australian emission-intensive companies. Having gained and documented a rich insight into the potential factors responsible for the current gap in disclosure we find that the existence of an expectations gap; the perceived cost of providing commercially sensitive information; the limited accountability being accepted by the corporate managers; and, a lack of stakeholder pressure together contribute to the lack of disclosure. In highlighting the gap in disclosure, this study suggests strategies to reduce the gap in climate change-related corporate governance disclosures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transport processes within heterogeneous media may exhibit non-classical diffusion or dispersion; that is, not adequately described by the classical theory of Brownian motion and Fick's law. We consider a space fractional advection-dispersion equation based on a fractional Fick's law. The equation involves the Riemann-Liouville fractional derivative which arises from assuming that particles may make large jumps. Finite difference methods for solving this equation have been proposed by Meerschaert and Tadjeran. In the variable coefficient case, the product rule is first applied, and then the Riemann-Liouville fractional derivatives are discretised using standard and shifted Grunwald formulas, depending on the fractional order. In this work, we consider a finite volume method that deals directly with the equation in conservative form. Fractionally-shifted Grunwald formulas are used to discretise the fractional derivatives at control volume faces. We compare the two methods for several case studies from the literature, highlighting the convenience of the finite volume approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study was to examine how men account for the diagnosis in men of anorexia nervosa (AN), a condition commonly associated with women. Male students participated in focus group discussions of topics related to AN. Discussions were tape-recorded with participants' consent, transcribed, and then analyzed using discourse analysis. The participants spontaneously constructed AN as a female-specific condition. When asked to account for AN in men, they distanced AN from hegemonic masculinities in ways that sustained both dominant masculine identities and gender-specific constructions of AN. These findings show how issues of health and gender are interlinked in everyday understandings of AN. Future researchers might usefully consider how the construction of gender-specific illness implicates wider notions of both feminine and masculine gender identities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article outlines the impact that a conspiracy of silence and denial of difference has had on some adopted and donor conceived persons who have been lied to or misled about their origins. Factors discussed include deceit - expressed as a central secret which undermines the fabric of a family and through distortion mystifies communication processes; the shock of discovery - often revealed accidentally and the associated sense of betrayal when this occurs; and a series of losses, for example, kinship, medical history, culture and agency which result in having to rebuild personal identity. By providing those affected with a voice, validation and vindication healing can begin. Any feelings of disregard, of betrayal of trust, of anger, frustration, sorrow or loss, need to be regarded as real, expected, and above all, a valid reaction to what has occurred. The author is a 'late discoverer' of her adoption and draws on the information from her doctoral research on the same topic which was completed in 2012.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to investigate information communications technologies (ICT)-mediated inclusion and exclusion in terms of sexuality through a study of a commercial social networking web site for gay men. Design/methodology/approach – The paper uses an approach based on technological inscription and the commodification of difference to study Gaydar, a commercial social networking site. Findings – Through the activities, events and interactions offered by Gaydar, the study identifies a series of contrasting identity constructions and market segmentations that are constructed through the cyclic commodification of difference. These are fuelled by a particular series of meanings attached to gay male sexualities which serve to keep gay men positioned as a niche market. Research limitations/implications – The research centres on the study of one, albeit widely used, web site with a very specific set of purposes. The study offers a model for future research on sexuality and ICTs. Originality/value – This study places sexuality centre stage in an ICT-mediated environment and provides insights into the contemporary phenomenon of social networking. As a sexualised object, Gaydar presents a semiosis of politicised messages that question heteronormativity while simultaneously contributing to the definition of an increasingly globalised, commercialised and monolithic form of gay male sexuality defined against ICT

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermarking schemes. We consider vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked %(medical or other digital) images, where they could still be verified as authentic, though they are actually not. Experimental results successfully demonstrate the practicability and consequences of the proposed attacks for some relevant schemes. The development of the proposed attack models can be used as a means to systematically examine the security levels of similar watermarking schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Drawing on critical social theory and transformative learning, this study investigates the sociocultural factors that enable a move away from the deficit model of learning. The multicase study examines beginning teachers’ perceptions of learning and teaching for students experiencing learning difficulties. The fluid conception of identity occupied by beginning teachers was explored as the participants challenged structural ideologies and their personal belief systems. The study argues that personal factors such as, engaging in critical reflection and beliefs, and school factors such as job security and school context influence how beginning teachers respond to diverse learners and position themselves as agentive.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anthropomorphism is a cognitive bias, which occurs when individuals see human characteristics in a non-human agent, object or animal. Anthropomorphism is especially interesting to marketers, because once anthropomorphic bias has been triggered, it can lead to a greater feeling of connectedness to a non-human agent (Tam, Lee and Chao, 2013), the emulation of behaviours (Aggarwal and McGill, 2012) or greater attribution of brand personality and brand liking (Delbaere, McQuarrie and Phillips, 2011). Importantly, research now shows that levels of this tendency vary between individuals (Waytz, Cacioppo and Epley, 2010), but research to date has failed to focus on how anthropomorphic tendency influences individual responses to marketing communications messages. Spokes-characters present an ideal context through which to examine this gap, given that they function as personified brands, designed to trigger consumer anthropomorphic tendency. Further, little is understood about how spokes-characters operate and which consumers will prefer them to their human counterparts. Like anthropomorphic research, much empirical work to date has focused on design and outcomes, examining the sender’s encoding process and the feedback generated, but ignoring the individual decoding process that is so important to understanding individual differences and message effectiveness. The current research employs three experiments using an online survey with stimulus exposure to show that anthropomorphic tendency, personality similarity and spokes-character type all have relevance to the understanding of this complex relationship. Study one and two indicate that while a human spokesperson is still preferred by many, higher levels of anthropomorphic tendency increase likeability of cartoon spokes characters. Study three highlights the importance of personality similarity, which further increases likability. Additional analyses provide key findings concerning the nature of anthropomorphic tendency as an individual difference and trait. This research contributes to a greater understanding of anthropomorphism theory and fills existing gaps in the consumer psychology and marketing communications literature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Decision makers frequently use separate participatory activities to involve marginalised groups. This approach can generate valuable insights, but it has limitations. We discuss the benefits and limits through two examples involving young people, and outline how the approach can be modified, thereby building citizens who are responsive to other perspectives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using American panel data from the National Education Longitudinal Study of 1988, this article investigates the effect of working during grade 12 on attainment.We employ, for the first time in the related literature, a semiparametric propensity score matching approach combined with difference-in-differences. We address selection on both observables and unobservables associated with part-time work decisions, without the need for instrumental variable. Once such factors are controlled for, little to no effects on reading and math scores are found. Overall, our results therefore suggest a negligible academic cost from part-time working by the end of high school.