982 resultados para Educational Networks
Resumo:
A remarkable growth in quantity and popularity of online social networks has been observed in recent years. There is a good number of online social networks exists which have over 100 million registered users. Many of these popular social networks offer automated recommendations to their users. This automated recommendations are normally generated using collaborative filtering systems based on the past ratings or opinions of the similar users. Alternatively, trust among the users in the network also can be used to find the neighbors while making recommendations. To obtain the optimum result, there must be a positive correlation exists between trust and interest similarity. Though the positive relations between trust and interest similarity are assumed and adopted by many researchers; no survey work on real life people’s opinion to support this hypothesis is found. In this paper, we have reviewed the state-of-the-art research work on trust in online social networks and have presented the result of the survey on the relationship between trust and interest similarity. Our result supports the assumed hypothesis of positive relationship between the trust and interest similarity of the users.
Resumo:
Recommender systems are one of the recent inventions to deal with ever growing information overload. Collaborative filtering seems to be the most popular technique in recommender systems. With sufficient background information of item ratings, its performance is promising enough. But research shows that it performs very poor in a cold start situation where previous rating data is sparse. As an alternative, trust can be used for neighbor formation to generate automated recommendation. User assigned explicit trust rating such as how much they trust each other is used for this purpose. However, reliable explicit trust data is not always available. In this paper we propose a new method of developing trust networks based on user’s interest similarity in the absence of explicit trust data. To identify the interest similarity, we have used user’s personalized tagging information. This trust network can be used to find the neighbors to make automated recommendations. Our experiment result shows that the proposed trust based method outperforms the traditional collaborative filtering approach which uses users rating data. Its performance improves even further when we utilize trust propagation techniques to broaden the range of neighborhood.
Resumo:
In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations based on the ratings of the users that are directly or indirectly trusted by the target user.
Resumo:
This paper explores how young children are constructed in educational policy for citizenship in Australia, investigating tensions between early childhood educational discourses that construct young children as active citizens and the broader discourses of citizenship in Australian educational policy. There is a widespread discourse within early childhood education that regards young children as citizens and democratic participants in their own lives. This view is a reflection of the oft cited Article 12 in the UN Convention on the Rights of the Child (UNCRC 1989). However, educational policy and curriculum for citizenship in Australia, by and large, adheres to age and stage understandings of children, implicitly deeming young children unable to conceptualise abstract ideas of what it means to ‘be a good citizen’. This paper is located in the borders and intersections between discourses of early childhood education, young children as active participants in their own lives and what it means to be an active citizen in Australia. We are concerned with the interweaving of these ideas and how they are played out in educational policy making. This is an important perspective to take for governing and policy making are exercises in harnessing existing ideas and discourses, thereby rendering strategies and tactics for managing populations thinkable and sayable (Rose 1999). The ‘views from the margins’ (Burman 2008, p. 7) can provide alternative perspectives on policymaking, illuminating discursive tactics and strategies.
Resumo:
This article applies social network analysis techniques to a case study of police corruption in order to produce findings which will assist in corruption prevention and investigation. Police corruption is commonly studied but rarely are sophisticated tools of analyse engaged to add rigour to the field of study. This article analyses the ‘First Joke’ a systemic and long lasting corruption network in the Queensland Police Force, a state police agency in Australia. It uses the data obtained from a commission of inquiry which exposed the network and develops hypotheses as to the nature of the networks structure based on existing literature into dark networks and criminal networks. These hypotheses are tested by entering the data into UCINET and analysing the outcomes through social network analysis measures of average path distance, centrality and density. The conclusions reached show that the network has characteristics not predicted by the literature.
Resumo:
This chapter addresses the changing climate of assessment policy and practice in Australia in response to global trends in education and the mounting accountability demands of standards-driven reform. Queensland, a State of Australia, has a tradition of respecting and trusting teacher judgment through the practice of, and policy commitment to, externally moderated school-based assessment. This chapter outlines the global trends in curriculum and assessment reform, and then analyzes the impact of international comparisons on national policy. The creation of the Australian Curriculum, Assessment and Reporting Authority (ACARA) together with the intent of establishing a standards-referenced framework raises tensions and challenges for teachers’ practice. The argument for sustaining confidence in teacher-based assessment is developed with reference to research evidence pertaining to the use of more authentic assessments and moderation practices for the purposes of improving learning, equity and accountability. Evidence is drawn from local studies of teacher judgment practice and used to demonstrate these developments and in so doing illuminate the complex issues of engaging the demands of policy while sustaining confidence in teacher assessment.
Resumo:
This paper describes the characterisation for airborne uses of the public mobile data communication systems known broadly as 3G. The motivation for this study was to explore how this mature public communication systems could be used for aviation purposes. An experimental system was fitted to a light aircraft to record communication latency, line speed, RF level, packet loss and cell tower identifier. Communications was established using internet protocols and connection was made to a local server. The aircraft was flown in both remote and populous areas at altitudes up to 8500ft in a region located in South East Queensland, Australia. Results show that the average airborne RF levels are better than those on the ground by 21% and in the order of -77 dbm. Latencies were in the order of 500 ms (1/2 the latency of Iridium), an average download speed of 0.48 Mb/s, average uplink speed of 0.85 Mb/s, a packet of information loss of 6.5%. The maximum communication range was also observed to be 70km from a single cell station. The paper also describes possible limitations and utility of using such a communications architecture for both manned and unmanned aircraft systems.
Resumo:
Attempts to map online networks, representing relationships between people and sites, have covered sites including Facebook, Twitter, and blogs. However, the predominant approach of static network visualization, treating months of data as a single case rather than depicting changes over time or between topics, remains a flawed process. As different events and themes provoke varying interactions and conversations, it is proposed that case-by-case analysis would aid studies of online social networks by further examining the dynamics of links and information flows. This study uses hyperlink analysis of a population of French political blogs to compare connections between sites from January to August 2009. Themes discussed in this period were identified for subsequent analysis of topic-oriented networks. By comparing static blogrolls with topical citations within posts, this research addresses challenges and methods in mapping online networks, providing new information on temporal aspects of linking behaviors and information flows within these systems.
Resumo:
Genomic and proteomic analyses have attracted a great deal of interests in biological research in recent years. Many methods have been applied to discover useful information contained in the enormous databases of genomic sequences and amino acid sequences. The results of these investigations inspire further research in biological fields in return. These biological sequences, which may be considered as multiscale sequences, have some specific features which need further efforts to characterise using more refined methods. This project aims to study some of these biological challenges with multiscale analysis methods and stochastic modelling approach. The first part of the thesis aims to cluster some unknown proteins, and classify their families as well as their structural classes. A development in proteomic analysis is concerned with the determination of protein functions. The first step in this development is to classify proteins and predict their families. This motives us to study some unknown proteins from specific families, and to cluster them into families and structural classes. We select a large number of proteins from the same families or superfamilies, and link them to simulate some unknown large proteins from these families. We use multifractal analysis and the wavelet method to capture the characteristics of these linked proteins. The simulation results show that the method is valid for the classification of large proteins. The second part of the thesis aims to explore the relationship of proteins based on a layered comparison with their components. Many methods are based on homology of proteins because the resemblance at the protein sequence level normally indicates the similarity of functions and structures. However, some proteins may have similar functions with low sequential identity. We consider protein sequences at detail level to investigate the problem of comparison of proteins. The comparison is based on the empirical mode decomposition (EMD), and protein sequences are detected with the intrinsic mode functions. A measure of similarity is introduced with a new cross-correlation formula. The similarity results show that the EMD is useful for detection of functional relationships of proteins. The third part of the thesis aims to investigate the transcriptional regulatory network of yeast cell cycle via stochastic differential equations. As the investigation of genome-wide gene expressions has become a focus in genomic analysis, researchers have tried to understand the mechanisms of the yeast genome for many years. How cells control gene expressions still needs further investigation. We use a stochastic differential equation to model the expression profile of a target gene. We modify the model with a Gaussian membership function. For each target gene, a transcriptional rate is obtained, and the estimated transcriptional rate is also calculated with the information from five possible transcriptional regulators. Some regulators of these target genes are verified with the related references. With these results, we construct a transcriptional regulatory network for the genes from the yeast Saccharomyces cerevisiae. The construction of transcriptional regulatory network is useful for detecting more mechanisms of the yeast cell cycle.
Resumo:
Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks.
Resumo:
In an era of rapidly changing economic, social and environmental conditions, urban and regional planning education must be resilient, innovative and able to deal with the complex political and socio-economic fabric of post-modern cities. As a consequence, urban and regional planning education plays a fundamental role in educating and forming planning practitioners that will be able to tackle such complexity. However, not many tertiary education institutions provide a trans-cultural engagement opportunity for students, where the need to internationalise planning education has been widely recognised worldwide. The aim of this paper is to communicate the findings of three overseas study trips (Kuala Lumpur-Malaysia, Daejeon-Korea, Istanbul and Gallipoli-Turkey) that students of Queensland University of Technology are taken to where these study trips trailed the provision of an innovative tertiary education experience of teaching regional planning in an international context. The findings of the pedagogic analyses of the study reveal that the exposure of students to different planning processes and practices give them a new outlook on what they knew from their own country and provide them with useful insights on international planning issues and cultural differences and barriers.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
Online social networking has become one of the most popular Internet applications in the modern era. They have given the Internet users, access to information that other Internet based applications are unable to. Although many of the popular online social networking web sites are focused towards entertainment purposes, sharing information can benefit the healthcare industry in terms of both efficiency and effectiveness. But the capability to share personal information; the factor which has made online social networks so popular, is itself a major obstacle when considering information security and privacy aspects. Healthcare can benefit from online social networking if they are implemented such that sensitive patient information can be safeguarded from ill exposure. But in an industry such as healthcare where the availability of information is crucial for better decision making, information must be made available to the appropriate parties when they require it. Hence the traditional mechanisms for information security and privacy protection may not be suitable for healthcare. In this paper we propose a solution to privacy enhancement in online healthcare social networks through the use of an information accountability mechanism.
Resumo:
In the field of leadership studies transformational leadership theory (e.g., Bass, 1985; Avolio, Bass, & Jung, 1995) has received much attention from researchers in recent years (Hughes, Ginnet, & Curphy, 2009; Hunt, 1999). Many previous studies have found that transformational leadership is related to positive outcomes such as the satisfaction, motivation and performance of followers in organisations (Judge & Piccolo, 2004; Lowe, Kroeck, & Sivasubramaniam, 1996), including in educational institutions (Chin, 2007; Leithwoood & Jantzi, 2005). Hence, it is important to explore constructs that may predict leadership style in order to identify potential transformational leaders in leadership assessment and selection procedures. Several researchers have proposed that emotional intelligence (EI) is one construct that may account for hitherto unexplained variance in transformational leadership (Mayer, 2001; Watkin, 2000). Different models of EI exist (e.g., Goleman, 1995, 2001; Bar-On, 1997; Mayer & Salovey, 1997) but momentum is growing for the Mayer and Salovey (1997) model to be considered the most useful (Ashkanasy & Daus, 2005; Daus & Ashkanasy, 2005). Studies in non-educational settings claim to have found that EI is a useful predictor of leadership style and leader effectiveness (Harms & Crede, 2010; Mills, 2009) but there is a paucity of studies which have examined the Mayer and Salovey (1997) model of EI in educational settings. Furthermore, other predictor variables have rarely been controlled in previous studies and only self-ratings of leadership behaviours, rather than multiple ratings, have usually been obtained. Therefore, more research is required in educational settings to answer the question: to what extent is the Mayer and Salovey (1997) model of EI a useful predictor of leadership style and leadership outcomes? This project, set in Australian educational institutions, was designed to move research in the field forward by: using valid and reliable instruments, controlling for other predictors, obtaining an adequately sized sample of real leaders as participants and obtaining multiple ratings of leadership behaviours. Other variables commonly used to predict leadership behaviours (personality factors and general mental ability) were assessed and controlled in the project. Additionally, integrity was included as another potential predictor of leadership behaviours as it has previously been found to be related to transformational leadership (Parry & Proctor-Thomson, 2002). Multiple ratings of leadership behaviours were obtained from each leader and their supervisors, peers and followers. The following valid and reliable psychological tests were used to operationalise the variables of interest: leadership styles and perceived leadership outcomes (Multifactor Leadership Questionnaire, Avolio et al., 1995), EI (Mayer–Salovey–Caruso Emotional Intelligence Test, Mayer, Salovey, & Caruso, 2002), personality factors (The Big Five Inventory, John, Donahue, & Kentle, 1991), general mental ability (Wonderlic Personnel Test-Quicktest, Wonderlic, 2003) and integrity (Integrity Express, Vangent, 2002). A Pilot Study (N = 25 leaders and 75 raters) made a preliminary examination of the relationship between the variables included in the project. Total EI, the experiential area, and the managing emotions and perceiving emotions branches of EI, were found to be related to transformational leadership which indicated that further research was warranted. In the Main Study, 144 leaders and 432 raters were recruited as participants to assess the discriminant validity of the instruments and examine the usefulness of EI as a predictor of leadership style and perceived leadership outcomes. Scores for each leadership scale across the four rating levels (leaders, supervisors, peers and followers) were aggregated with the exception of the management-by-exception active scale of transactional leadership which had an inadequate level of interrater agreement. In the descriptive and measurement component of the Main Study, the instruments were found to demonstrate adequate discriminant validity. The impact of role and gender on leadership style and EI were also examined, and females were found to be more transformational as leaders than males. Females also engaged in more contingent reward (transactional leadership) behaviours than males, whilst males engaged in more passive/avoidant leadership behaviours than females. In the inferential component of the Main Study, multiple regression procedures were used to examine the usefulness of EI as a predictor of leadership style and perceived leadership outcomes. None of the EI branches were found to be related to transformational leadership or the perceived leadership outcomes variables included in the study. Openness, emotional stability (the inverse of neuroticism) and general mental ability (inversely) each predicted a small amount of variance in transformational leadership. Passive/avoidant leadership was inversely predicted by the understanding emotions branch of EI. Overall, EI was not found to be a useful predictor of leadership style and leadership outcomes in the Main Study of this project. Implications for researchers and human resource practitioners are discussed.