982 resultados para Simpson, Ron
Resumo:
This volume is the second in a series that addresses change and development in the delivery of vocational and education programs in Queensland. A similar volume was published in 2007. Considerable change was foreshadowed for TAFE Queensland by the release of The Queensland Skill Plan (QSP) in 2006. This volume addresses implementation issues for the Actions identified in the QSP. The chapters focus on a breadth of issues that relate to the changing landscape for teaching and learning in TAFE Institutes. The incorporation of Information Communication Technologies (ICTs) and e-learning approaches into the delivery of training packages remain key foci for change, as was evident in the first volume of this series. The chapters also consider issues for some client groups in VET, as well as approaches to professional development to build the capabilities of staff for new teaching and learning environments. The chapter by Sandra Lawrence examines the professional development issues for staff across TAFE institutes in the implementation of the Learning Management System. Suzanne Walsh discusses the issues of new “learning spaces” and “Mode 2 learning in the re-development at Southbank Institute. The chapter by Angela Simpson focuses on VET in schools and school-to-work transition programs. Josie Drew, in her chapter, takes up the issues of embedding employability skills into the delivery of training packages through flexible delivery. The chapter by Colleen Hodgins focuses on the organisational challenges for Lead Institutes in relation to the professional development for TAFE educators in light of policy changes. Bradley Jones discusses the changing roles of libraries in VET contexts and their importance. He examines the adequacy of the VOCED database and reflects on the current nature, role, and practices of VET libraries. Finally, Piero Dametto discusses the pragmatics for TAFE educators in understanding the use of digital objects and learning objects within the LMS and LCMS systems that were presaged in the QSP. These papers were completed by the authors as a part of their postgraduate studies at QUT. The views reported are those of the authors and should not be attributed to the Queensland Department of Education, Training and the Arts. Donna Berthelsen Faculty of Education Queensland University of Technology
Resumo:
Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.
Resumo:
Bob Baxt, the third Chairman of the Trade Practices Commission, served for a single three year term from 1988 to 1991. He followed Bob McComas, who had deliberately adopted a non-litigious approach to preserving the competitive process, believing that he understood business as an insider and that much of what it did was not anti-competitive, when correctly viewed. Baxt was far more pro-active in his approach, and more closely aligned with that of the first Chairman, Ron Bannerman. Baxt sought to push the frontiers of investigation and precedent, and perhaps, more significantly, sought to influence his Ministers, the government, public servants and public opinion about the need to expand the coverage of the Trade Practices Act, increase penalties and properly resource the Commission so that it could perform its assigned roles. This article examines Baxt’s early and on-going role in teaching Australian students and professionals through his interdisciplinary Trade Practices Workshops, the political context of Baxt’s tenure, including his relations with the Attorney-General ,Michael Duffy, and his skilful handling of the Queensland Wire case.
Resumo:
This paper investigates the links between various approaches to managing equity and diversity and their effectiveness in changing the measures of inclusivity of women in organisations as a means of auditing and mapping managing diversity outcomes in Australia. The authors argue that managing diversity is more than changing systems and counting numbers it is also about managing the substantive culture change required in order to achieve inclusivity particularly intercultural inclusivity. Research in one sector of the education industry that investigated the competency skills required for culture change is offered as a model or guide for understanding and reflecting upon intercultural competency and its sequential development.
Resumo:
In this conceptual paper we investigate how corporate venturing influences an organization's competences. The impact of various types of corporate ventures on the portfolio of strategic options of a firm's competence modes (Sanchez, 2004a; Sanchez & Heene, 2002) will be assessed by distinguishing two fundamentally different dimensions of corporate venturing: technology and product (Block & MacMillan, 1993). We argue that the level of product and factor market dynamism mediates the effect of corporate venturing on a firm's competence modes. Corporate ventures that significantly increase the level of product or factor market dynamics will increase the flexibility in all five competence modes. These ventures have a direct effect on the lower-order competence modes and an indirect, lagged effect on higher-order competence modes through feedback loops. The developed framework and the propositions contribute to managing the ability of a firm to change its coordination, resource, and operating flexibility in order to sustain value creation.
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.
Resumo:
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.
Resumo:
This paper aims to describe the development of a critical thinking conceptual model which was constructed to guide the teaching and evaluation of critical thinking skills to Middle-Eastern nurses.
Resumo:
The purpose of this paper is to present a framework to guide critical thinking through reflective journaling, and describe how a group of 20 Middle Eastern nurses used reflective journaling to enhance their practice. Journal documentation was used during clinical practicum to foster the development of critical thinking in order to assist nurses when analysing and evaluating their clinical experiences. The findings from this study demonstrated that nurses accepted the framework for journal documentation because it provided structure for reflection, speculation, synthesis and metacognition of events experienced during clinical practice. Journaling gave nurses the opportunity to transfer thoughts onto paper and write down subjective and objective data, and created dialogue between the nurse educators and nurses. They were engaged in productive and positive activity to enhance their nursing practice. Nurses also commented that writing helped to develop their confidence in writing English.
Resumo:
We consider the problem of monitoring and controlling the position of herd animals, and view animals as networked agents with natural mobility but not strictly controllable. By exploiting knowledge of individual and herd behavior we would like to apply a vast body of theory in robotics and motion planning to achieving the constrained motion of a herd. In this paper we describe the concept of a virtual fence which applies a stimulus to an animal as a function of its pose with respect to the fenceline. Multiple fence lines can define a region, and the fences can be static or dynamic. The fence algorithm is implemented by a small position-aware computer device worn by the animal, which we refer to as a Smart Collar.We describe a herd-animal simulator, the Smart Collar hardware and algorithms for tracking and controlling animals as well as the results of on-farm experiments with up to ten Smart Collars.
Resumo:
In this paper we discuss how a network of sensors and robots can cooperate to solve important robotics problems such as localization and navigation. We use a robot to localize sensor nodes, and we then use these localized nodes to navigate robots and humans through the sensorized space. We explore these novel ideas with results from two large-scale sensor network and robot experiments involving 50 motes, two types of flying robot: an autonomous helicopter and a large indoor cable array robot, and a human-network interface. We present the distributed algorithms for localization, geographic routing, path definition and incremental navigation. We also describe how a human can be guided using a simple hand-held device that interfaces to this same environmental infrastructure.