976 resultados para 3-valued paraconsistent logic


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Self-care management is needed for effective management of chronic kidney disease. The main aim for treatment or management of chronic kidney disease is to delay the worsening of kidney function, and to prevent or to manage the co-morbidities. Selfcare management is not easy, and patients will face many challenges, especially when they cannot get use to the new treatment plan. One of the challenges they face is dietary restriction, which is a very important aspect in any self-care management programme. Chronic kidney disease patients require a low-protein, low-sodium, low-potassium, and low-phosphorus diet. There are several strategies patients can undertake to ensure adherence, such as self-monitoring their dietary habits and type of food consumed using a food diary; involving social support, such as family members and spouse to help them to adhere to their diet restrictions; setting goals and providing positive reinforcement when they achieved the targeted goals; joining self-management programmes to equip themselves with the necessary skills so that they can better adhere to the treatment regimes, including diet restriction; and lastly, having the knowledge about their regime, and using this knowledge to help them understand and improve their adherence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Samples of marble from Chillagoe, North Queensland have been analyzed using scanning electron microscopy (SEM) with energy dispersive X-ray spectroscopy (EDS) and Raman spectroscopy. Chemical analyses provide evidence for the presence of minerals other than limestone and calcite in the marble, including silicate minerals. Some of these analyses correspond to silicate minerals. The Raman spectra of these crystals were obtained and the Raman spectrum corresponds to that of allanite from the Arizona State University data base (RRUFF) data base. The combination of SEM with EDS and Raman spectroscopy enables the characterization of the mineral allanite in the Chillagoe marble.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Selection of features that will permit accurate pattern classification is a difficult task. However, if a particular data set is represented by discrete valued features, it becomes possible to determine empirically the contribution that each feature makes to the discrimination between classes. This paper extends the discrimination bound method so that both the maximum and average discrimination expected on unseen test data can be estimated. These estimation techniques are the basis of a backwards elimination algorithm that can be use to rank features in order of their discriminative power. Two problems are used to demonstrate this feature selection process: classification of the Mushroom Database, and a real-world, pregnancy related medical risk prediction task - assessment of risk of perinatal death.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid pace of urbanisation in China has seen a massive increase in the movement of the rural population to work and live in urban regions. In this large-scale migration context, the educational, health, and psychological problems of floating children are becoming increasingly visible. Different from extant studies, we focus our investigation on the rural dispositions of floating children through interviews with leaders, teachers, and students in four schools in Beijing. Drawing on Bourdieu’s key notions of habitus, capital, and field, our study indicates that the rural habitus of floating children can differentiate these children from their urban peers. This habitus can be marginalised and stigmatised in certain fields but can be recognised and valued as capital in other fields. Our paper offers some implications for research and practice in relation to the schooling of floating children.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Out of the Box Festival was founded in 1994 by the Queensland Performing Arts Centre and has been held biannually ever since both within and around the centre in what is now known as the Cultural Precinct at Southbank. It is unique in Australia in that it caters entirely to children aged 8 years and under, with a highly curated program of ticketed performance events, workshops and free arts-based events. It is attended by school and kindergarten groups and by families, and besides engaging children in high quality arts experiences, the festival is also a platform for advocating the developmental and educational benefits of the arts for children. Dr Mark Radvan was the artistic director of the 2008 festival, with responsibility for developing the curatorial direction of each festival, for creating and programming its events, and for working with festival partners The Queensland Art Gallery, The Queensland Museum, The State Library of Queensland and The Queensland Theatre Company. Radvan designed selected and commissioned works to demonstrate how the arts create memorable, celebratory and immersive experiences that stimulate children’s imagination, their curiosity and confidence about the material world and the cultures of its people. A core event was an outdoor music and dance performance space featuring entirely Indigenous performers that was not only the beating heart of the festival, but served to underlie the importance of mainstreaming awareness of our first peoples in the increasingly culturally diverse communities of children attending.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

10 page document containing expert assessment of shortcomings of Western Australian State Planning Policy SPP3.7- Planning for Bushfire Risk Management. Document produced on behalf of QUT and submitted to and published by the WAPC as part of their public consultation process for their draft policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl. Grøstl is a so-called wide-pipe construction where the size of the internal state is significantly larger than the size of the output. This has the effect that all known, generic attacks on the hash function are made much more difficult. Grøstl has good performance on a wide range of platforms and counter-measures against side-channel attacks are well-understood from similar work on the AES.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two �fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also reflected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2003 Robert Fardon was the first prisoner to be detained under the Dangerous Prisoners (Sexual Offenders) Act 2003 (Qld), the first of the new generation preventive detention laws enacted in Australia and directed at keeping sex offenders in prison or under supervision beyond the expiry of their sentences where a court decides, on the basis of psychiatric assessments, that unconditional release would create an unacceptable risk to the community. A careful examination of Fardon’s case shows the extent to which the administration of the regime was from the outset governed by politics and political calculation rather than the logic of risk management and community protection. In 2003 Robert Fardon was the first person detained under the Dangerous Prisoners (Sexual Offenders) Act 2003 (Qld) (hereafter DPSOA), a newly enacted Queensland law aimed at the preventive detention of sex offenders. It was the first of a new generation of such laws introduced in Australia, now also in force in NSW, Western Australia and Victoria. The laws have been widely criticized by lawyers, academics and others (Keyzer and McSherry 2009; Edgely 2007). In this article I want to focus on the details of how the Queensland law was administered in Fardon’s case, he being perhaps the most well-known prisoner detained under such laws and certainly the longest held. It will show, I hope, that seemingly abstract rule of law principles invoked by other critics are not simply abstract: they afford a crucial practical safeguard against the corruption of criminal justice in which the ends both of community protection and of justice give way to opportunistic exploitation of ‘the mythic resonance of crime and punishment for electoral purposes’ (Scheingold 1998: 888).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a study of socioeconomically disadvantaged children's acquisition of school literacies, a university research team investigated how a group of teachers negotiated critical literacies and explored notions of social power with elementary children in a suburban school located in an area of high poverty. Here we focus on a grade 2/3 classroom where the teacher and children became involved in a local urban renewal project and on how in the process the children wrote about place and power. Using the students' concerns about their neighborhood, the teacher engaged her class in a critical literacy project that not only involved a complex set of literate practices but also taught the children about power and the possibilities for local civic action. In particular, we discuss examples of children's drawing and writing about their neighborhoods and their lives. We explore how children's writing and drawing might be key elements in developing "critical literacies" in elementary school settings. We consider how such classroom writing can be a mediator of emotions, intellectual and academic learning, social practice, and political activism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has a long history of policy attention to the education of poor and working-class youth (Connell, 1994), yet currently on standardized educational outcomes measures the gaps are widening in ways that relate to social background, including race, location and class. An economic analysis of school choice in Australia reveals that a high proportion of government school students now come from lower Socio-Economic Status (SES) backgrounds (Ryan & Watson, 2004), indicating a trend towards a gradual residualisation of the poor in government schools, with increased private school enrolments as a confirmed national trend. The spatial distribution of poverty and the effects on school populations are not unique to Australia (Lupton, 2003; Lipman, 2011; Ryan, 2010). Raffo and colleagues (2010) recently provided a synthesis of socially critical approaches towards schooling and poverty arguing that what is needed are shifts in the balances of power to reposition those within the educational system as having some say in the ways schooling is organized. ‘Disadvantaged’ primary schools are not a marginal concern for education systems, but now account for a large and growing number of schools that serve an ever increasing population being made redundant, in part-time precarious work, under-employed or unemployed (Thomson 2002; Smyth, Down et al 2010). In Australia, the notion of the ‘disadvantaged’ school now refers to those, mostly public schools, being residualised by a politics of parental choice that drives neoliberalising policy logic (Bonner & Caro 2007; Hattam & Comber, forthcoming 2014; Thomson & Reid, 2003)...