918 resultados para Chevrolet Citation.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research with typically developing groups has identified loneliness as a significant predictor of a range of physical and mental health problems. This paper reviews research about loneliness in children and adults with intellectual disability. Although a considerable body of evidence has highlighted the difficulties individuals with intellectual disability have with friendships, there is a relative scarcity of research focused explicitly on loneliness. The available evidence suggests that up to half of those with intellectual disability are chronically lonely, compared with around 15-30% of people in the general population. The cognitive, physical and mental health problems already associated with intellectual disability are likely to be compounded by experiences of chronic loneliness. We argue that people with intellectual disability are highly vulnerable to loneliness and present a theoretical model of vulnerability that comprises three reciprocally influencing domains: social attitudes and expectations; opportunities and experiences; and skill deficits associated with intellectual disability. We propose that societal views which have traditionally devalued and stigmatised those with intellectual disability limit their opportunities for experiencing social and emotional connectedness with others. Individual skill deficits in areas such as communication, self-regulation and social understanding, as well as functional difficulties associated with intellectual disability, also potentially influence the opportunities and experiences of people with intellectual disability, both directly and via multiple layers of the social context. In turn, limited opportunities will entrench particular skill deficits and reinforce negative attitudes towards intellectual disability. Future research about loneliness and intellectual disability needs to address the difficulties of measuring emotional isolation in this population, as well as the possibility that people with intellectual disability may understand, experience and interpret loneliness somewhat differently from others. The model proposed in this paper provides a starting point for developing a more sophisticated understanding of the experience of loneliness for individuals with intellectual disability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences’ cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Engaging clients in psychotherapy by managing their expectations is important for therapeutic success. Initial moments in first sessions of therapy are thought to afford an opportunity to establish a shared understanding of how therapy will proceed. However there is little evidence from analysis of actual sessions of therapy to support this. Objective This study utilised recordings to examine how therapists manage clients’ expectations during the first two sessions of online Cognitive Behavioural Therapy (CBT). Methods Expectation management was investigated through conversation analysis of sessions from 176 client-therapist dyads involved in online CBT. The primary focus of analysis was expectation management during the initial moments of first sessions, with a secondary focus on expectations at subsequent points. Analysis Clients’ expectations for therapy were most commonly managed during the initial moments of first sessions of therapy. At this point, most therapists either outlined the tasks of the first and subsequent sessions (n=36), or the first session only (n=108). On other occasions (n = 32), no attempt was made to manage clients’ expectations by outlining what would happen in therapy. Observations of the interactional consequences of such an absence suggest clients may struggle to engage with the therapeutic process in the absence of appropriate expectation management by therapists. Conclusion Clients may more readily engage from the outset of therapy when provided with an explanation that manages their expectation of what is involved. Therapists can accomplish this by projecting how therapy will proceed, particularly beyond the initial session.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work addresses the problem of cheating prevention in secret sharing. Two cheating scenarios are considered. In the first one, the cheaters always submit invalid shares to the combiner. In the second one, the cheaters collectively decide which shares are to be modified so the combiner gets a mixture of valid and invalid shares from the cheaters. The secret scheme is said to be k-cheating immune if any group of k cheaters has no advantage over honest participants. The paper investigates cryptographic properties of the defining function of secret sharing so the scheme is k-cheating immune. Constructions of secret sharing immune against k cheaters are given.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Australasian Information Security Conference (AISC) 2011 was held on 18th-19th January 2011 in Perth, Australia, as a part of the Australasian Computer Science Week 2011. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Australasian Information Security Conference (AISC) 2012 was held at RMIT University in Melbourne, Australia, as a part of the Australasian Computer Science Week, January 30 - February 3, 2012. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The role of emotion during learning encounters in science teacher education is under-researched and under-theorized. In this case study we explore the emotional climates, that is, the collective states of emotional arousal, of a preservice secondary science education class to illuminate practice for producing and reproducing high quality learning experiences for preservice science teachers. Theories related to the sociology of emotions informed our analyses from data sources such as preservice teachers’ perceptions of the emotional climate of their class, emotional facial expressions, classroom conversations, and cogenerative dialogue. The major outcome from our analyses was that even though preservice teachers reported high positive emotional climate during the professor’s science demonstrations, they also valued the professor’s in the moment reflections on her teaching that were associated with low emotional climate ratings. We co-relate emotional climate data and preservice teachers’ comments during cogenerative dialogue to expand our understanding of high quality experiences and emotional climate in science teacher education. Our study also contributes refinements to research perspectives on emotional climate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effects of acid treatment, vapor grown carbon fiber (VGCF) interlayer and the angle, i.e., 0° and 90°, between the rolling stripes of an aluminum (Al) plate and the fiber direction of glass fiber reinforced plastics (GFRP) on the mode II interlaminar mechanical properties of GFRP/Al laminates were investigated. The experimental results of an end notched flexure test demonstrate that the acid treatment and the proper addition of VGCF can effectively improve the critical load and mode II fracture toughness of GFRP/Al laminates. The specimens with acid treatment and 10 g m−2 VGCF addition possess the highest mode II fracture toughness, i.e., 269% and 385% increases in the 0° and 90° specimens, respectively compared to those corresponding pristine ones. Due to the induced anisotropy by the rolling stripes on the aluminum plate, the 90° specimens possess 15.3%–73.6% higher mode II fracture toughness compared to the 0° specimens. The improvement mechanisms were explored by the observation of crack propagation path and fracture surface with optical, laser scanning and scanning electron microscopies. Moreover, finite element analyses were carried out based on the cohesive zone model to verify the experimental fracture toughness and to predict the interface shear strength between the aluminum plates and GFRP laminates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Interaction topologies in service-oriented systems are usually classified into two styles: choreographies and orchestrations. In a choreography, services interact in a peer-to-peer manner and no service plays a privileged role. In contrast, interactions in an orchestration occur between one particular service, the orchestrator, and a number of subordinated services. Each of these topologies has its trade-offs. This paper considers the problem of migrating a service-oriented system from a choreography style to an orchestration style. Specifically, the paper presents a tool chain for synthesising orchestrators from choreographies. Choreographies are initially represented as communicating state machines. Based on this representation, an algorithm is presented that synthesises the behaviour of an orchestrator, which is also represented as a state machine. Concurrent regions are then identified in the synthesised state machine to obtain a more compact representation in the form of a Petri net. Finally, it is shown how the resulting Petri nets can be transformed into notations supported by commercial tools, such as the Business Process Modelling Notation (BPMN).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work we test the feasibility of a new calibration method for gel dosimetry. We examine, through Monte Carlo modelling, whether the inclusion of an organic plastic scintillator system at key points within the gel phantom would perturb the dose map. Such a system would remove the requirement for a separate calibration gel, removing many sources of uncertainty.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract Legacy information systems evolved incrementally in response to changes in business strategy and information technology. Organizations are now being forced to change much more radically and quickly than previously and this change places new demands on information systems. Legacy information systems are usually considered from a technical perspective, addressing issues such as age, complexity, maintainability, design and technology. We wish to demonstrate that the business dimension to legacy information systems, represented by the organisation structure, business processes and procedures that are bound up in the design and operation of the existing IT systems, is also significant. This paper identifies the important role of legacy information systems in the formation of new strategies. We show that the move away from a stable to an unstable business environment accelerates the rate of change. Furthermore, the gap between what the legacy information systems can deliver and the strategic vision of the organization widens when the legacy information systems are unable to adapt to meet the new requirements. An analysis of fifteen case studies provides evidence that legacy information systems include business and technical dimensions and that the systems can present problems when there is a misalignment between the strategic vision of the business, the IT legacy and the old business model embodied in the legacy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: Examining the association between socioeconomic disadvantage and heat-related emergency department (ED) visits during heatwave periods in Brisbane, 2000–2008. Methods: Data from 10 public EDs were analysed using a generalised additive model for disease categories, age groups and gender. Results: Cumulative relative risks (RR) for non-external causes other than cardiovascular and respiratory diseases were 1.11 and 1.05 in most and least disadvantaged areas, respectively. The pattern persisted on lags 0–2. Elevated risks were observed for all age groups above 15 years in all areas. However, with RRs of 1.19–1.28, the 65–74 years age group in more disadvantaged areas stood out, compared with RR=1.08 in less disadvantaged areas. This pattern was observed on lag 0 but did not persist. The RRs for male presentations were 1.10 and 1.04 in most and less disadvantaged areas; for females, RR was 1.04 in less disadvantaged areas. This pattern persisted across lags 0–2. Conclusions: Heat-related ED visits increased during heatwaves. However, due to overlapping confidence intervals, variations across socioeconomic areas should be interpreted cautiously. Implications: ED data may be utilised for monitoring heat-related health impacts, particularly on the first day of heatwaves, to facilitate prompt interventions and targeted resource allocation.