902 resultados para GENERIC SIMPLICITY
Resumo:
Physical inactivity has become a major cause of the global increase in non-communicable disease (World Health Organisation, 2009}. In 2008, the World Economic Forum called for employers to be proactive in the prevention of non-communicable diseases in the workforce. A significant contributor to the development of a healthy workforce is a reliable pool of employees who are receptive to and aware of healthy lifestyle practices even before becoming employed. Health and Physical Education (HPE) is often stereotyped as 'doing sport'. However, if HPE is to play a part in the development of a healthy workforce, then the HPE learning environment must be about creating meaningful learning for all, which is clearly more than the creation of elite athletes. The ultimate aim of health and physical educators must be about 1) developing lifelong and habitual physical activity; 2) developing generic physical skills; 3) inspiring holistic and positive emotional attitudes and 4) instilling a focus on evidence based knowledge as a framework for inspiring active citizenship. As a response to the worldwide move to the development of healthier people, Australia currently has a strong momentum for an expanded and more unified role for HPE within a potential National curriculum. Other countries have engaged in such a process and much can be learned from their experiences of the process. The 2009 Australian Council for Health, Physical Education and Recreation (ACHPER) conference was a landmark conference that included an International group of experts from all continents and twenty three countries. Creating Active Futures: Edited Proceedings of the 26th ACHPER International Conference is an amalgamation of research and professional perspectives presented at the conference. The papers in this volume emerged from those presented for peer review, rather than through seeking specific articles. This volume is divided into sections based on the five conference themes: 1) Issues in Health and Physical Education (HPE) Pedagogy; 2) Practical Application of Science in HPE; 3) Lifestyle Enhancement; 4) Developing Sporting Excellence; 5) Contemporary Games Teaching. The 'Issues in HPE Pedagogy' section provides a diverse set of perspectives on teaching HPE with papers from a range of topics that include first aid, philosophy, access, cultural characteristics, methods and teaching styles, curriculum, qualifications and emotional development. The second section links science to teaching HPE and provides a range of valuable information on injury prevention, information technology, personality and skill development. Section 3 is a collection of writings and research about Lifestyle Enhancement. Topics include the important role of adventure, the natural world, curriculum, migrant viewpoints, beliefs and globally focused programs in the development of active citizens. The section on sporting excellence contains papers that undertake to explain an aspect of excellence in sport. The last section of this volume highlights some contemporary views on teaching games.
Resumo:
The problem of bubble contraction in a Hele-Shaw cell is studied for the case in which the surrounding fluid is of power-law type. A small perturbation of the radially symmetric problem is first considered, focussing on the behaviour just before the bubble vanishes, it being found that for shear-thinning fluids the radially symmetric solution is stable, while for shear-thickening fluids the aspect ratio of the bubble boundary increases. The borderline (Newtonian) case considered previously is neutrally stable, the bubble boundary becoming elliptic in shape with the eccentricity of the ellipse depending on the initial data. Further light is shed on the bubble contraction problem by considering a long thin Hele-Shaw cell: for early times the leading-order behaviour is one-dimensional in this limit; however, as the bubble contracts its evolution is ultimately determined by the solution of a Wiener-Hopf problem, the transition between the long-thin limit and the extinction limit in which the bubble vanishes being described by what is in effect a similarity solution of the second kind. This same solution describes the generic (slit-like) extinction behaviour for shear-thickening fluids, the interface profiles that generalise the ellipses that characterise the Newtonian case being constructed by the Wiener-Hopf calculation.
Resumo:
User-Web interactions have emerged as an important research in the field of information science. In this study, we examine extensively the Web searching performed by general users. Our goal is to investigate the effects of users’ cognitive styles on their Web search behavior in relation to two broad components: Information Searching and Information Processing Approaches. We use questionnaires, a measure of cognitive style, Web session logs and think-aloud as the data collection instruments. Our study findings show wholistic Web users tend to adopt a top-down approach to Web searching, where the users searched for a generic topic, and then reformulate their queries to search for specific information. They tend to prefer reading to process information. Analytic users tend to prefer a bottom-up approach to information searching and they process information by scanning search result pages.
Resumo:
Purpose - The purpose of this paper is to introduce a knowledge-based urban development assessment framework, which has been constructed in order to evaluate and assist in the (re)formulation of local and regional policy frameworks and applications necessary in knowledge city transformations. Design/methodology/approach - The research reported in this paper follows a methodological approach that includes a thorough review of the literature, development of an assessment framework in order to inform policy-making by accurately evaluating knowledge-based development levels of cities, and application of this framework in a comparative study - Boston, Vancouver, Melbourne and Manchester. Originality/value - The paper, with its assessment framework, demonstrates an innovative way of examining the knowledge-based development capacity of cities by scrutinising their economic, socio-cultural, enviro-urban and institutional development mechanisms and capabilities. Practical implications - The paper introduces a framework developed to assess the knowledge-based development levels of cities; presents some of the generic indicators used to evaluate knowledge-based development performance of cities; demonstrates how a city can benchmark its development level against that of other cities, and; provides insights for achieving a more sustainable and knowledge-based development.
Resumo:
Today, participatory or citizen journalism – journalism which enables readers to become writers – exists online and offline in a variety of forms and formats, operates under a number of editorial schemes, and focusses on a wide range of topics from the specialist to the generic, and the micro-local to the global. Key models in this phenomenon include veteran sites Slashdot and Indymedia, as well as news-related Weblogs; more recent additions into the mix have been the South Korean OhmyNews, which in 2003 was “the most influential online news site in that country, attracting an estimated 2 million readers a day” (Gillmor, 2003a, p. 7), with its new Japanese and international offshoots, as well as the Wikipedia with its highly up-to-date news and current events section and its more recent offshoot Wikinews, and even citizen-produced video news as it is found in sites such as YouTube and Current.tv.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
Reflective practice is widely considered across discussions around educational psychology, professional identity, employability of graduates, and generic or graduate capabilities. Critical reflection is essential for providing a bridge between the university and the workplace, and for ultimately preparing work ready graduates (Patrick et al, 2008). Work integrated learning, particularly through internships and work placements for students, is viewed as a valuable approach for students developing skills in reflective practice. Reflective journals are one of the tools often used to encourage and develop student reflection. Shifting the reflective journal to an online interface as a reflective blog presents opportunities for more meaningful, frequent and richer interaction between the key players in a work integrated learning experience. This paper examines the adoption, implementation and refinement of the use of reflective blogs in a work integrated learning unit for business students majoring in advertising, marketing and public relations disciplines. The reflective blog is discussed as a learning and assessment tool, including the approaches taken to integrate and scaffold the blog as part of the work integrated learning experience. Graduate capabilities were used as cornerstones for students to frame students’ thinking, experiences and reflection. These capabilities emphasise the value of coherent theoretical and practical knowledge, coupled with critical, creative and analytical thinking, problem solving skills, self reliance and resilience. Underlying these graduate capabilities is a focus on assessment for learning matched with assessment of learning. Using specific triggers and prompts as part of the reflective process, and incorporating ongoing feedback from academic supervisors, students moved from descriptive levels of reflection, to more meaningful and critical reflection. Students’ blogs are analysed to identify key themes, challenges and achievements in the work integrated learning experience. Suggestions for further development and improvement, together with a model of best practice, are proposed.
Resumo:
The Australian tourism tertiary education sector operates in a competitive and dynamic environment, which necessitates a market orientation to be successful. Academic staff and management in the sector must regularly assess the perceptions of prospective and current students and monitor the satisfaction levels of current students. This study is concerned with the setting and monitoring of satisfaction levels of current students, reporting the results of three longitudinal investigations of student satisfaction in a postgraduate unit. The study also addresses a limitation of a university’s generic teaching evaluation instrument. Importance-Performance Analysis (IPA) has been recommended as a simple but effective tool for overcoming the deficiencies of many student evaluation studies, which have generally measured only attribute performance at the end of a semester. IPA was used to compare student expectations of the unit at the beginning of a semester with their perceptions of performance 10 weeks later. The first stage documented key benchmarks for which amendments to the unit based on student feedback could be evaluated during subsequent teaching periods.
Resumo:
The insurance industry discharges a critical role in the Australian economy and is a significant part of the Australian financial services market. The industry relies upon intermediaries, the principal types being brokers and agents, to promote, arrange and distribute their products and services in the market. The pivotal role that they play in this context and sensitivities associated with the consumer oriented products, such as house and contents insurance, has ensured close regulatory attention. Of particular importance was the passage of the Insurance (Agents and Brokers) Act 1984 (Cth), a comprehensive attempt to address the responsibilities of intermediaries as well as particular problem areas associated with the handling of money. However, with the introduction of financial services and market reform early in the new millennium this insurance intermediary specific regulatory approach was abandoned in favour of a market-wide strategy; that is, market reform was based upon across-the-board licensing, disclosure, conduct and fairness standards, and all financial products and services are now regulated at a generic level under Ch 7 of the Corporations Act 2001 (Cth). This article briefly explores the categories of insurance intermediaries and the relevant distinctions between them but focuses mainly upon the regulatory context in which they operate. This context transcends a strictly legal framework as the regulatory body, the Australian Securities and Investments Commission (ASIC), has sought to inform and guide the market through Policy Statements and Regulatory Guides. The usefulness of these guides as an adjunct to the legislation in explaining the scope and operation of regulatory framework is examined. In addition, the article looks at the self-regulatory and dispute resolution practices in this area and their impact. In conclusion an assessment of this across-the-board regulatory regime is advanced.
Resumo:
This is the opening paper for a special edition of the Journal of Australian Indigenous Issues and comes from an Australian Learning and Teaching Council (ALTC) Leadership for Excellence in Learning and Teaching Program funded project titled Tiddas Showin’ Up, Talkin’ Up and Puttin’ Up: Indigenous Women and Educational Leadership (Bunda and White 2009). The project name, Tiddas Showin’ Up, Talkin’ Up and Puttin’ Up, draws from two Indigenous sources. Firstly, it reinscribes the white way of knowing the familial relationship of ‘Sister’ in the Indigenous generic language term of ‘Tidda’. Secondly, Showin’ Up, ‘Talkin’ Up’ (Moreton-Robinson 2000) and Puttin’ Up calls into being the constructions of our leadership as Indigenous women, grounded in our communities and with particular reference to our leadership in universities.
Resumo:
Purpose: In the global knowledge economy, investment in knowledge-intensive industries and information and communication technology (ICT) infrastructures are seen as significant factors in improving the overall socio-economic fabric of cities. Consequently knowledge-based urban development (KBUD) has become a new paradigm in urban planning and development, for increasing the welfare and competitiveness of cities and regions. The paper discusses the critical connections between KBUD strategies and knowledge-intensive industries and ICT infrastructures. In particular, it investigates the application of the knowledge-based urban development concept by discussing one of South East Asia’s large scale manifestations of KBUD; Malaysia’s Multimedia Super Corridor. ----- ----- Design/methodology/approach: The paper provides a review of the KBUD concept and develops a knowledge-based urban development assessment framework to provide a clearer understanding of development and evolution of KBUD manifestations. Subsequently the paper investigates the implementation of the KBUD concept within the Malaysian context, and particularly the Multimedia Super Corridor (MSC). ----- ----- Originality/value: The paper, with its KBUD assessment framework, scrutinises Malaysia’s experince; providing an overview of the MSC project and discussion of the case findings. The development and evolution of the MSC is viewed with regard to KBUD policy implementation, infrastructural implications, and the agencies involved in the development and management of the MSC. ----- ----- Practical implications: The emergence of the knowledge economy, together with the issues of globalisation and rapid urbanisation, have created an urgent need for urban planners to explore new ways of strategising planning and development that encompasses the needs and requirements of the knowledge economy and society. In light of the literature and MSC case findings, the paper provides generic recommendations, on the orchestration of knowledge-based urban development, for other cities and regions seeking to transform to the knowledge economy.
Resumo:
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving n puzzles is n times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger definitions of difficulty for client puzzles that are meaningful in the context of adversaries with more computational power than required to solve a single puzzle. A protocol using strong client puzzles may still not be secure against DoS attacks if the puzzles are not used in a secure manner. We describe a security model for analyzing the DoS resistance of any protocol in the context of client puzzles and give a generic technique for combining any protocol with a strong client puzzle to obtain a DoS-resistant protocol.
Resumo:
In automatic facial expression detection, very accurate registration is desired which can be achieved via a deformable model approach where a dense mesh of 60-70 points on the face is used, such as an active appearance model (AAM). However, for applications where manually labeling frames is prohibitive, AAMs do not work well as they do not generalize well to unseen subjects. As such, a more coarse approach is taken for person-independent facial expression detection, where just a couple of key features (such as face and eyes) are tracked using a Viola-Jones type approach. The tracked image is normally post-processed to encode for shift and illumination invariance using a linear bank of filters. Recently, it was shown that this preprocessing step is of no benefit when close to ideal registration has been obtained. In this paper, we present a system based on the Constrained Local Model (CLM) which is a generic or person-independent face alignment algorithm which gains high accuracy. We show these results against the LBP feature extraction on the CK+ and GEMEP datasets.
Resumo:
Becoming a teacher in technology-rich classrooms is a complex and challenging transition for career-change entrants. Those with generic or specialist Information and Communication Technology (ICT) expertise bring a mindset about purposeful uses of ICT that enrich student learning and school communities. The transition process from a non-education environment is both enhanced and constrained by shifting the technology context of generic or specialist ICT expertise, developed through a former career as well as general life experience. In developing an understanding of the complexity of classrooms and creating a learner centred way of working, perceptions about learners and learning evolve and shift. Shifts in thinking about how ICT expertise supports learners and enhances learning preceded shifts in perceptions about being a teacher, working with colleagues, and functioning in schools that have varying degrees of intensity and impact on evolving professional identities. Current teacher education and school induction programs are seen to be falling short of meeting the needs of career-change entrants and, as a flow on, the students they nurture. Research (see, for example, Tigchelaar, Brouwer, & Korthagen, 2008; Williams & Forgasz, 2009) highlights the value of generic and specialist expertise career-change teachers bring to the profession and draws attention to the challenges such expertise begets (Anthony & Ord, 2008; Priyadharshini & Robinson-Pant, 2003). As such, the study described in this thesis investigated perceptions of career-change entrants, who have generic (Mishra & Koehler, 2006) or specialist expertise, that is, ICT qualifications and work experience in the use of ICT. The career-change entrants‘ perceptions were sought as they shifted the technology context and transitioned into teaching in technology-rich classrooms. The research involved an interpretive analysis of qualitative data and quantitative data. The study used the explanatory case study (Yin, 1994) methodology enriched through grounded theory processes (Strauss & Corbin, 1998), to develop a theory about professional identity transition from the perceptions of the participants in the study. The study provided insights into the expertise and experiences of career change entrants, particularly in relation to how professional identities that include generic and specialist ICT knowledge and expertise were reconfigured while transitioning into the teaching profession. This thesis presents the Professional Identity Transition Theory that encapsulates perceptions about teaching in technology-rich classrooms amongst a selection of the increasing number of career-change entrants. The theory, grounded in the data, (Strauss & Corbin, 1998) proposes that career-change entrants experience transition phases of varying intensity that impact on professional identity, retention and development as a teacher. These phases are linked to a shift in perceptions rather than time as a teacher. Generic and specialist expertise in the use of ICT is a weight of the past and an asset that makes the transition process more challenging for career-change entrants. The study showed that career-change entrants used their experiences and perceptions to develop a way of working in a school community. Their way of working initially had an adaptive orientation focussed on immediate needs as their teaching practice developed. Following a shift of thinking, more generative ways of working focussed on the future emerged to enable continual enhancement and development of practice. Sustaining such learning is a personal, school and systemic challenge for the teaching profession.
Resumo:
A configurable process model provides a consolidated view of a family of business processes. It promotes the reuse of proven practices by providing analysts with a generic modelling artifact from which to derive individual process models. Unfortunately, the scope of existing notations for configurable process modelling is restricted, thus hindering their applicability. Specifically, these notations focus on capturing tasks and control-flow dependencies, neglecting equally important ingredients of business processes such as data and resources. This research fills this gap by proposing a configurable process modelling notation incorporating features for capturing resources, data and physical objects involved in the performance of tasks. The proposal has been implemented in a toolset that assists analysts during the configuration phase and guarantees the correctness of the resulting process models. The approach has been validated by means of a case study from the film industry.