832 resultados para Polynomial Identities
Resumo:
Indigenous news media have experienced significant growth across the globe in recent years, but they have received only limited attention in mainstream society or the journalism and communication research community. Yet, Indigenous journalism is playing an arguably increasingly important role in contributing to Indigenous politics and identities, and is worthy of closer analysis. Using in-depth interviews, this article provides an overview of the main dimensions of Indigenous journalism as they can be found in the journalism culture of Māori journalists in Aotearoa New Zealand. It argues that Māori journalists see their role as providing a counter-narrative to mainstream media reporting and as contributing to Indigenous empowerment and revitalization of their language. At the same time, they view themselves as watchdogs, albeit within a culturally specific framework that has its own constraints. The article argues that the identified dimensions are reflective of evidence on Indigenous journalism from across the globe.
Resumo:
Despite having experienced rapid popularity over the past two decades, lifestyle journalism is still somewhat neglected by academic researchers. So far mostly explored as either part of wider lifestyle programming, particularly on television, or in terms of individual sub-fields, such as travel, fashion or food journalism, lifestyle journalism is in need of scholarly analysis particularly in the area of production, based on the increasing importance which the field has in influencing audiences’ ways of life. This study explores the professional views of 89 Australian and German lifestyle journalists through in-depth interviews in order to explore the ways in which they engage in processes of influencing audiences’ self-expression, identities and consumption behaviors. The article argues that through its work, lifestyle journalism is a significant shaper of identities in today’s consumer societies.
Resumo:
In hyper competition, firms that are agile: sensing and responding better to customer requirements tend to be more successful and achieve supernormal profits. In spite of the widely accepted importance of customer agility, research is limited on this construct. The limited research also has predominantly focussed on the firm’s perspective of agility. However, we propose that the customers are better positioned to determine how well a firm is responding to their requirements (aka a firm’s customer agility). Taking the customers’ stand point, we address the issue of sense and respond alignment in two perspectives-matching and mediating. Based on data collected from customers in a field study, we tested hypothesis pertaining to the two methods of alignment using polynomial regression and response surface methodology. The results provide a good explanation for the role of both forms of alignment on customer satisfaction. Implication for research and practice are discussed.
Resumo:
Mobility across space is an exemplary characteristic of the global era and an important aspect of the cultural experience of many people in advanced industrialised nations. Mobility evokes powerful images that effectively counter any illusion of stationary life and provide a break from the insularity of the local and parochial. High levels of mobility are simultaneously a fact, a necessity and a cultural aspiration. In recent times, debates about mobility in social theory have considered the relationship between mobility and cosmopolitan culture and identities (Hannerz, 1990, Urry, 1990, 2000, Beck, 2006). Against this backdrop, this paper also draws on some of the more recent discussions about the emergence of globalised and cosmopolitan identities among young people (Beck and Beck-Gernsheim, 2009). Using data from a longitudinal study of young people in Queensland, this paper provides an insight into young people’s aspirations about future mobility. The data affirm Skeggs’ (2004) comment that mobility is an unequal resource, and demonstrate that aspirations of future mobility reflect numerous social, economic and cultural realities of young people’s lives. This inevitably leads us to problematise the established, and often abstract, nexus between cosmopolitanism and mobility in contemporary debates about cosmopolitanism.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
Many activities, from disaster response to project management, require cooperation among people from multiple organizations who initially lack interpersonal relationships and trust. Upon entering inter-organizational settings, pre-existing identities and expectations, along with emergent social roles and structures, may all influence trust between colleagues. To sort out these effects, we collected time-lagged data from three cohorts of military MBA students, representing 2,224 directed dyads, shortly after they entered graduate school. Dyads that shared organizational identity, boundary-spanning roles, and similar network positions (structural equivalence) were likely to have stronger professional ties and greater trust.
Resumo:
Objective To understand how the formal curriculum experience of an Australian undergraduate pharmacy program supports students’ professional identity formation. Methods A qualitative ethnographic study was conducted over four weeks using participant observation and examined the ‘typical’ student experience from the perspective of a pharmacist. A one-week period of observation was undertaken with each of the four year groups (that is, for years one to four) comprising the undergraduate curriculum. Data were collected through observation of the formal curriculum experience using field notes, a reflective journal and informal interviews with 38 pharmacy students. Data were analyzed thematically using an a priori analytical framework. Results Our findings showed that the observed curriculum was a conventional curricular experience which focused on the provision of technical knowledge and provided some opportunities for practical engagement. There were some opportunities for students to imagine themselves as pharmacists, for example, when the lecture content related to practice or teaching staff described their approach to practice problems. However, there were limited opportunities for students to observe pharmacist role models, experiment with being a pharmacist or evaluate their professional identities. While curricular learning activities were available for students to develop as pharmacists e.g. patient counseling, there was no contact with patients and pharmacist academic staff tended to role model as educators with little evidence of their pharmacist selves. Conclusion These findings suggest that the current conventional approach to the curriculum design may not be fully enabling learning experiences which support students in successfully negotiating their professional identities. Instead it appeared to reinforce their identities as students with a naïve understanding of professional practice, making their future transition to professional practice challenging.
Resumo:
In many countries there is a shortage of quality teachers in areas of science, technology, engineering and mathematics (STEM). One solution has been to encourage mid-career professionals in the area of STEM to become school teachers. The transition of mid-career professionals to science and mathematics teaching in schools is thus becoming a common phenomenon. The assumption exists that their experiences and enthusiasm for their subject matter will inspire more students to achieve greater outcomes in school and to pursue careers in the sciences. Although the experiences of beginning teachers have been extensively studied for over half a century, there has been little research on career-change teachers and the particular challenges that they face in becoming school teachers. These career-changers have constructed professional identities and are accustomed to working within a culture of collaboration and inquiry. In contrast school cultures are quite different and often teaching is a lonely solitary affair with little opportunity for collegial relationships aimed at knowledge building in the context of teaching. This research was a longitudinal study that followed 17 teachers from the commencement of teaching. Most of these teachers left professional careers to become teachers. Seven remained in teaching after three years.
Resumo:
This paper offers insights into the relationship between curriculum decision making, positive school climate, and academic achievement for same-sex attracted (SSA) students. The authors use critical discourse analysis to present a ‘conversation’ between six same-sex attracted young people, aged 14-19, and three pop-culture texts currently popular with both teachers and school-aged peers: The Hunger Games, Tomorrow When the War Began, and Neighbours. Analysis starts from the perspective that schools are empowered agents in the production of students’ sexualised identities and seeks to understand how textual choices function as active discourse in that production. Through this analysis, an argument is made for expanding notions of what it means to ‘attend to’ gender and sexuality through textual choice and critical pedagogy.
Resumo:
Despite the fact that Australia is a socially progressive country and boasts one of the largest Gender Dysphoria Clinics in the Southern Hemisphere, delivering services for almost four decades, Australian Governments fail to arrive at any consensus on the legal and human rights approaches to Trans*people. The subsequent lack of recognition does little more than increase the levels of frustration of and the continued discrimination to Trans*people, including adverse mental health problems, in this country. The purpose of this presentation is to provide an overview of the Australian systems that govern Trans*people and to identify how Trans*identities are manipulated in our Federal system of government; a system which offers little to protect the human rights of Trans*people. In order to contextualise the Australian situation, I commence with a brief description on the layers of government which will include how Australian Trans*people are currently protected under the law in those jurisdictions. I then present some of the impracticalities endured by the transitioning individual (single or married) including change of documentation and legal gender status before, during and after surgical transition for both those born on and off shore. This presentation will also include discussion of legislation that has been described by Trans*advocates as “Gesture”, “Cart before the Horse” and “Harmful”. I will conclude with a way forward by suggesting the development of a coordinated all of government approach in consultation with key stakeholders for “Trans* Friendly Legislation” to improve the human and legal rights, and ultimately the health and wellbeing of Australian Trans*identities.
Resumo:
Recently, several classes of permutation polynomials of the form (x2 + x + δ)s + x over F2m have been discovered. They are related to Kloosterman sums. In this paper, the permutation behavior of polynomials of the form (xp − x + δ)s + L(x) over Fpm is investigated, where L(x) is a linearized polynomial with coefficients in Fp. Six classes of permutation polynomials on F2m are derived. Three classes of permutation polynomials over F3m are also presented.
Resumo:
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead and computing efficiency are two parameters to be taken into account when designing a multicast stream protocol. In this paper, we propose to use two families of erasure codes to deal with this problem, namely, rateless codes and maximum distance separable codes. Our constructions will have the following advantages. First, our packet overhead will be small. Second, the number of signature verifications to be performed at the receiver is O(1). Third, every receiver will be able to recover all the original data packets emitted by the sender despite losses and injection occurred during the transmission of information.
Resumo:
From journalism to social media, the practices of our professional storytellers continue to evolve and change along with our storytelling institutions and their functions. Comprehending these developments is a key problem of contemporary media and cultural studies. Are the politics of representation giving way to a new progressive politics of self-representation and direct participation? Or, instead, are these new genres of self-representation part of a more general demotic turn in the function of contemporary media? Do media merely mediate or amplify cultural identities, or is media functionality becoming, closer to that of a translator or even an author of identities? How can we know if the changing actor-networks of storytelling contribute to a wider democratisation, a reshaping of the hierarchies of voice and agency? This chapter considers the place of one specific critical participatory media production practice known as 'digital storytelling’ in addressing these larger questions of socio-cultural change.
Resumo:
This paper explores the emotional life of fly‑in fly‑out (FIFO) workers and their families, through an analysis of more than 500 postings made on an online chat forum for mining families. Building on literature on fly‑in fly‑out workers and understandings of emotions as socially constructed, analysis shows how posters to the forum, typically women whose male partners are FIFO workers, construct gendered emotional identities for their partners (sometimes referred to as 'Mr Miner'), and for themselves, as 'mining women', 'mining widows' or the 'mining missus'. Inherent in the creation of gendered emotional subject positions is the process of women undertaking emotion work on and behalf of themselves, their male partners and their children. The findings demonstrate the overarching normative dimensions of women's emotional self‑transformations in the service of their mining partners' careers and the attendant reproduction of everyday patriarchal relations in the private lives of mining families.
Resumo:
Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.