932 resultados para Key intervention
Resumo:
This paper presents a summary of the key findings of the TTF TPACK Survey developed and administered for the Teaching the Teachers for the Future (TTF) Project implemented in 2011. The TTF Project, funded by an Australian Government ICT Innovation Fund grant, involved all 39 Australian Higher Education Institutions which provide initial teacher education. TTF data collections were undertaken at the end of Semester 1 (T1) and at the end of Semester 2 (T2) in 2011. A total of 12881 participants completed the first survey (T1) and 5809 participants completed the second survey (T2). Groups of like-named items from the T1 survey were subject to a battery of complementary data analysis techniques. The psychometric properties of the four scales: Confidence - teacher items; Usefulness - teacher items; Confidence - student items; Usefulness- student items, were confirmed both at T1 and T2. Among the key findings summarised, at the national level, the scale: Confidence to use ICT as a teacher showed measurable growth across the whole scale from T1 to T2, and the scale: Confidence to facilitate student use of ICT also showed measurable growth across the whole scale from T1 to T2. Additional key TTF TPACK Survey findings are summarised.
Resumo:
Introduction Environmental and biological samples taken around Da Nang Air Base have shown elevated levels of dioxin over many years [1-3]. A pre-intervention knowledge, attitudes and practices (KAP) survey (2009), a risk reduction program (2010) and a post intervention KAP survey (2011) were undertaken in four wards surrounding Danang Airbase. A follow-up evaluation was undertaken in 2013. Methods A KAP survey was implemented among 400 randomly selected food handlers. Eleven indepth interviews and four focus group discussions were also undertaken. Results The knowledge of respondents remained positive and/or improved at 2.5 years follow-up. There were no significant differences in attitudes toward preventing dioxin exposure across surveys; most respondents were positive in all three surveys. An increase in households (69.5%) undertaking measures to prevent exposure was observed, which was higher than in the pre-intervention survey (39.6%) and post- intervention survey (60.4%) (χ2 = 95.6; p < 0.001). The proportion of respondents practicing appropriate preventive measures was also significantly improved. Conclusions Despite most of the intervention program’s activities ceasing in 2010, the risk reduction program has resulted in positive outcomes over the longer-term, with many knowledge and attitude measures remaining stable or imporving. Some KAP indicators decreased, but these KAP indicators were still significantly higher than the pre-intervention levels.
Resumo:
In this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the impact of differential trails for block ciphers on collision attacks for various hash function constructions based on block ciphers. Further, we prove the lower bound for finding a pair that follows some truncated differential in case of a random permutation. Then we present open-key differential distinguishers for some well known round-reduced block ciphers.
Resumo:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.
Resumo:
This paper presents the blast response, damage mechanism and evaluation of residual load capacity of a concrete–steel composite (CSC) column using dynamic computer simulation techniques. This study is an integral part of a comprehensive research program which investigated the vulnerability of structural framing systems to catastrophic and progressive collapse under blast loading and is intended to provide design information on blast mitigation and safety evaluation of load bearing vulnerable columns that are key elements in a building. The performance of the CSC column is compared with that of a reinforced concrete (RC) column with the same dimensions and steel ratio. Results demonstrate the superior performance of the CSC column, compared to the RC column in terms of residual load carrying capacity, and its potential for use as a key element in structural systems. The procedure and results presented herein can be used in the design and safety evaluation of key elements of multi-storey buildings for mitigating the impact of blast loads.
Resumo:
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.
Resumo:
Access to clean water is essential for human life and a critical issue facing much of modern society, especially as a result of the 21st Century triad of challenges – population growth, resource scarcity and pollution – which contribute to the rising complexity of providing adequate access to this essential resource for large parts of society. As such, there is now an increasing need for innovative solutions to source, treat and distribute water to cities across the globe. This position paper explores biomimicry – emulating natural form, function, process and systems – as an alternative and sustainable design approach to traditional water infrastructure systems. The key barriers to innovations such as biomimicry are summarised, indicating that regulatory and economic grounds are some of the major hindrances to integrating alternative design approaches in the water sector in developed countries. This paper examines some of the benefits of moving past these barriers to develop sustainable, efficient and resilient solutions that provide adequate access to water in the face of contemporary challenges.
Resumo:
Children and adolescents with intellectual disability have higher rates of mental health problems compared with there typically developing peers. Social support has been identified as an important protective factor for psychological well - being. In this paper we discuss the benefits of social support networks, and consider approaches for promoting children’s perceptions of the availability of social support. We describe an evidence-based intervention that has been specially adapted and implemented for students with intellectual disability in school settings. In a randomised controlled trial, the Aussie Optimism Resilience Skills Program was associated with improved perceptions of social support following a 10-week intervention. Educators need to be aware of the increased vulnerability of students with intellectual disability to the development mental health problems and the proactive ways in which they can promote psychological well - being within their classrooms.
Resumo:
Trust is widely recognized as one of the key qualities that a successful leader needs to bring about change within his/her organization. Literature has also shown that trust plays a pivotal role in effective school leadership. However, little research has been undertaken to identify specific actions of a transformational school leader enabling him/her to develop purposeful relationships of trust with his/her staff and Chair of the school’s governing body. Using a theoretical framework of transformational leadership in the context of the independent schooling sector in Australia, a multicase study of four highly trusted, transformational school leaders revealed 10 key trust building practices in the Head–staff dyad and three practices in the Head–Chair dyad. These practices were independent of the leader’s personal attributes. The study also revealed an inextricable link between trust and transformational leadership.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.
Resumo:
Musculoskeletal health can be compromised by breast cancer treatment. In particular, bone loss and arthralgias are prevalent side effects experienced by women treated with chemotherapy and/or adjuvant endocrine therapy. Bone loss leads to osteoporosis and related fractures, while arthralgias threaten quality of life and compliance to treatment. Because the processes that lead to these musculoskeletal problems are initiated when treatment begins, early identification of women who may be at higher risk of developing problems, routine monitoring of bone density and pain at certain stages of treatment, and prudent application of therapeutic interventions are key to preventing and/or minimizing musculoskeletal sequelae. Exercise may be a particularly suitable intervention strategy because of its potential to address a number of impairments; it may slow bone loss, appears to reduce joint pain in noncancer conditions, and improves other breast cancer outcomes. Research efforts continue in the areas of etiology, measurement, and treatment of bone loss and arthralgias. The purpose of this review is to provide an overview of the current knowledge on the management and treatment of bone loss and arthralgias in breast cancer survivors and to present a framework for rehabilitation care to preserve musculoskeletal health in women treated for breast cancer.
Resumo:
A key derivation function (KDF) is a function that transforms secret non-uniformly random source material together with some public strings into one or more cryptographic keys. These cryptographic keys are used with a cryptographic algorithm for protecting electronic data during both transmission over insecure channels and storage. In this thesis, we propose a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the under-lying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream nalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.
Resumo:
Tissue engineering and cell implantation therapies are gaining popularity because of their potential to repair and regenerate tissues and organs. To investigate the role of inflammatory cytokines in new tissue development in engineered tissues, we have characterized the nature and timing of cell populations forming new adipose tissue in a mouse tissue engineering chamber (TEC) and characterized the gene and protein expression of cytokines in the newly developing tissues. EGFP-labeled bone marrow transplant mice and MacGreen mice were implanted with TEC for periods ranging from 0.5 days to 6 weeks. Tissues were collected at various time points and assessed for cytokine expression through ELISA and mRNA analysis or labeled for specific cell populations in the TEC. Macrophage-derived factors, such as monocyte chemotactic protein-1 (MCP-1), appear to induce adipogenesis by recruiting macrophages and bone marrow-derived precursor cells to the TEC at early time points, with a second wave of nonbone marrow-derived progenitors. Gene expression analysis suggests that TNFα, LCN-2, and Interleukin 1β are important in early stages of neo-adipogenesis. Increasing platelet-derived growth factor and vascular endothelial cell growth factor expression at early time points correlates with preadipocyte proliferation and induction of angiogenesis. This study provides new information about key elements that are involved in early development of new adipose tissue.
Resumo:
Objectives To review the effects of physical activity on health and behavior outcomes and develop evidence-based recommendations for physical activity in youth. Study design A systematic literature review identified 850 articles; additional papers were identified by the expert panelists. Articles in the identified outcome areas were reviewed, evaluated and summarized by an expert panelist. The strength of the evidence, conclusions, key issues, and gaps in the evidence were abstracted in a standardized format and presented and discussed by panelists and organizational representatives. Results Most intervention studies used supervised programs of moderate to vigorous physical activity of 30 to 45 minutes duration 3 to 5 days per week. The panel believed that a greater amount of physical activity would be necessary to achieve similar beneficial effects on health and behavioral outcomes in ordinary daily circumstances (typically intermittent and unsupervised activity). Conclusion School-age youth should participate daily in 60 minutes or more of moderate to vigorous physical activity that is developmentally appropriate, enjoyable, and involves a variety of activities.
Resumo:
Research Background Young people’s avid use of mobile technologies in daily life has led to an increase in the design and research on mHealth (mobile health) interventions targeting young people. ‘Music eScape’ is a mobile based mood regulation app that uses an innovative approach to promoting young people’s wellbeing using music. Research Question The design, research, development and evaluation of ‘Music eScape’ addressed a number of research questions from across the fields of Psychology and Interactive and Visual Design. The specific design research question addressed was: How can interaction and visual design be utilized to promote and enable young people to effectively regulate their mood using music and how can the new design further promote their experience of empowerment, control and agency over actively directing their mood journey? Research Contribution Innovation and New Knowledge Through its unique visual interface design and interactivity, the application presents a novel approach to promoting young people’s wellbeing using music and a specific function that allows users to ‘draw’ their mood journey in order to generate a playlist. The mobile app is the first to contain a function that enables users to plan their mood journey and exercise a sense of agency, intentional choice and control over the mood shift and by extension, their wellbeing. The feature ‘drawing’ interface was designed by Oksana Zelenko using participatory design research and Russell’s circumplex model of affect (1980) to inform the key visual design concept and underpinning interaction design. Research Significance The significance of the design research component within the larger interdisciplinary practices that have informed ‘Music eScape’ (e.g. field of psychology, reported through journal articles and other related outcomes), is the unique visual and interactive presentation of participant data and music therapy research within the app interface and interaction design which improves and increases young people’s engagement with the health messages it contains. The industry quality standard is further demonstrated by the launch on Apple iTunes. This demonstrates the application meets the high professional requirements for national release and meets international standards. The app also creates a new benchmark for the quality of health apps on the market as it marks the industry release of a trialled evidence-based mHealth intervention co-designed with young people.