832 resultados para POLYNOMIAL IDENTITIES
Resumo:
This paper reports on the initial phase of a Professional Learning Program (PLP) undertaken by 100 primary school teachers in China that aimed to facilitate the development of adaptive expertise in using technology to facilitate innovative science teaching and learning such as that envisaged by the Chinese Ministry of Education’s (2010-2020) education reforms. Key principles derived from literature about professional learning and scaffolding of learning informed the design of the PLP. The analysis of data revealed that the participants had made substantial progress towards the development of adaptive expertise. This was manifested not only by advances in the participants’ repertoires of Subject Matter Knowledge and Pedagogical Content Knowledge but also in changes to their levels of confidence and identities as teachers. By the end of the initial phase of the PLP, the participants had coalesced into a professional learning community that readily engaged in the sharing, peer review, reuse and adaption, and collaborative design of innovative science learning and assessment activities. The findings from the study indicate that those engaged in the development of PLPs for teachers in China need to take cognizance of certain cultural factors and traditions idiosyncratic to the Chinese educational system. A set of revised principles is then presented to inform the future design and implementation of PLPs for teachers in China.
Resumo:
This chapter documents the literacy learning lives of two young Australians now in their early twenties. Both were originally informants in studies of literacy development. The original studies were longitudinal, so in each case there was already a story of change, especially in the young people’s identities as school. The case studies presented here, Tessa and Cruz, tell different stories of learning literacy at school, teaching that makes a difference and raise questions about predictable normative developmental trajectories. Both young people have taken up, albeit selectively, valuable literacy and learner dispositions from school and their wider everyday worlds.
Resumo:
This paper presents a method for the estimation of thrust model parameters of uninhabited airborne systems using specific flight tests. Particular tests are proposed to simplify the estimation. The proposed estimation method is based on three steps. The first step uses a regression model in which the thrust is assumed constant. This allows us to obtain biased initial estimates of the aerodynamic coeficients of the surge model. In the second step, a robust nonlinear state estimator is implemented using the initial parameter estimates, and the model is augmented by considering the thrust as random walk. In the third step, the estimate of the thrust obtained by the observer is used to fit a polynomial model in terms of the propeller advanced ratio. We consider a numerical example based on Monte-Carlo simulations to quantify the sampling properties of the proposed estimator given realistic flight conditions.
Resumo:
Research shows that approximately half of creative practitioners operate as embedded creatives by securing gainful employment within organisations located in the field beyond their core discipline. This foregrounds the significance of having the skills necessary to successfully cross the disciplinary boundaries in order to negotiate a professional role. The multiple implications of such reframing for emerging creative practitioners who navigate uncertain professional boundaries include developing a skill of identifying and successfully targeting the shifting professional and industry coordinates while remaining responsive to changes. A further implication involves creative practitioners engaging in a continuous cycle of re-negotiation of their professional identity making the management of multiple professional selves - along with creating and recreating a meaningful frame of references such as the language around their emerging practice - a necessary skill. This chapter presents a case study of a set of Work Integrated Learning subjects designed to develop in creative industries practitioners the skills to manage their emerging professional identities in response to the shifts in the professional world.
Resumo:
The relationship between temperature and mortality is non-linear and the effect estimates depend on the threshold temperatures selected. However, little is known about whether threshold temperatures differ with age or cause of deaths in the Southern Hemisphere. We conducted polynomial distributed lag non-linear models to assess the threshold temperatures for mortality from all ages (Dall), aged from 15 to 64 (D15-64), 65- 84(D65-84), ≥85 years (D85+), respiratory (RD) and cardiovascular diseases (CVD) in Brisbane, Australia, 1996–2004. We examined both hot and cold thresholds, and the lags of up to 15 days for cold effects and 3 days for hot effects. Results show that for the current day, the cold threshold was 20°C and the hot threshold was 28°C for the groups of Dall, D15-64 and D85+. The cold threshold was higher (23°C) for the group of D65-84 and lower (21°C) for the group of CVD. The hot threshold was higher (29°C) for the group of D65-84 and lower (27°C) for the group of RD. Compared to the current day, for the cold effects of up to 15-day lags, the threshold was lower for the group of D15-64, and the thresholds were higher for the groups of D65-84, D85+, RD and CVD; while for the hot effects of 3-day lags, the threshold was higher for the group of D15-64 and the thresholds were lower for the groups of D65-84 and RD. Temperature thresholds appeared to differ with age and death categories. The elderly and deaths from RD and CVD were more sensitive to temperature stress than the adult group. These findings may have implications in the assessment of temperature-related mortality and development of weather/health warning systems.
Resumo:
This study examines the process by which newly recruited nuclear engineering and technical staff came to understand, define, think, feel and behave within a distinct group that has a direct contribution to the organization's overall emphasis on a culture of reliability and system safety. In the field of organizational behavior the interactive model of social identity formation has been recently proposed to explain the process by which the internalization of shared norms and values occurs, an element critical in identity formation. Using this rich model of organizational behavior we analyzed multiple sources of data from nine new hires over a period of three years. This was done from the time they were employed to investigate the construction of social identity by new entrants entering into a complex organizational setting reflected in the context of a nuclear facility. Informed by our data analyses, we found support for the interactive model of social identity development and report the unexpected finding that a newly appointed member's age and level of experience appears to influence the manner in which they adapt, and assimilate into their surroundings. This study represents an important contribution to the safety and reliability literature as it provides a rich insight into the way newly recruited employees enact the process by which their identities are formed and hence act, particularly under conditions of duress or significant organizational disruption in complex organizational settings.
Resumo:
Information and communications technologies are a significant component of the healthcare domain, and electronic health records play a major role in it. Therefore, it is important that they are accepted en masse by healthcare professionals. How healthcare professionals perceive the usefulness of electronic health records and their attitudes towards them have been shown to have significant effects on the overall acceptance in many healthcare systems around the world. This paper investigates the role of perceived usefulness and attitude on the intention to use electronic health records by future healthcare professionals using polynomial regression with response surface analysis. Results show that the relationships between these variables are more complex than predicted in prior research. The paper concludes that the properties of the above determinants must be further investigated to clearly understand: (i) their role in predicting the intention to use electronic health records; and (ii) in designing systems that are better adopted by healthcare professionals of the future.
Resumo:
We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.
Resumo:
Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on probabilistic characteristics, which makes their security grow exponentially with the number of rounds N r r. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an overdefined system of algebraic equations (true with probability 1). We show that this is true for both Serpent (due to a small size of S-boxes) and Rijndael (due to unexpected algebraic properties). We study general methods known for solving overdefined systems of equations, such as XL from Eurocrypt’00, and show their inefficiency. Then we introduce a new method called XSL that uses the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly with the number of rounds. The XSL attack would then be polynomial (or subexponential) in N r> , with a huge constant that is double-exponential in the size of the S-box. The exact complexity of such attacks is not known due to the redundant equations. Though the presented version of the XSL attack always gives always more than the exhaustive search for Rijndael, it seems to (marginally) break 256-bit Serpent. We suggest a new criterion for design of S-boxes in block ciphers: they should not be describable by a system of polynomial equations that is too small or too overdefined.
Resumo:
We study the multicast stream authentication problem when an opponent can drop, reorder and inject data packets into the communication channel. In this context, bandwidth limitation and fast authentication are the core concerns. Therefore any authentication scheme is to reduce as much as possible the packet overhead and the time spent at the receiver to check the authenticity of collected elements. Recently, Tartary and Wang developed a provably secure protocol with small packet overhead and a reduced number of signature verifications to be performed at the receiver. In this paper, we propose an hybrid scheme based on Tartary and Wang’s approach and Merkle hash trees. Our construction will exhibit a smaller overhead and a much faster processing at the receiver making it even more suitable for multicast than the earlier approach. As Tartary and Wang’s protocol, our construction is provably secure and allows the total recovery of the data stream despite erasures and injections occurred during transmission.
Resumo:
An anonymous membership broadcast scheme is a method in which a sender broadcasts the secret identity of one out of a set of n receivers, in such a way that only the right receiver knows that he is the intended receiver, while the others can not determine any information about this identity (except that they know that they are not the intended ones). In a w-anonymous membership broadcast scheme no coalition of up to w receivers, not containing the selected receiver, is able to determine any information about the identity of the selected receiver. We present two new constructions of w-anonymous membership broadcast schemes. The first construction is based on error-correcting codes and we show that there exist schemes that allow a flexible choice of w while keeping the complexities for broadcast communication, user storage and required randomness polynomial in log n,. The second construction is based on the concept of collision-free arrays, which is introduced in this paper. The construction results in more flexible schemes, allowing trade-offs between different complexities.
Resumo:
Firm-customer digital connectedness for effective sensing and responding is a strategic imperative for contemporary competitive firms. This research-in-progress paper conceptualizes and operationalizes the firm-customer mobile digital connectedness of a smart-mobile customer. The empirical investigation focuses on mobile app users and the impact of mobile apps on customer expectations. Based on pilot data collected from 127 customers, we tested hypotheses pertaining to firm-customer mobile digital connectedness and customer expectations. Our test analysis using linear and non-linear postulations reveals those customers raise their expectations as they increase their digital interactions with a firm.
Resumo:
The recent growth of the coal seam gas industry has increased pressure on regional communities. Debate surrounding the industry is intense and a social licence to operate has yet to be granted to the industry in its entirety. This article presents an analysis of social issues surrounding the coal seam gas industry, making comparisons between two case studies: the Ranger and Jabiluka mines and the Yandicoogina mine. It presents the results of a desktop study, focussed on three topics: community identity; procedural justice and distributive justice, which provides a means for comparison and draws attention to central concerns. It is found that: power imbalances; changing community identities; potentially inequitable distributions of long term benefits and the process to distribute those benefits and negative perceptions of the industry as a whole serve to undermine the provision of a social licence to operate by communities and has the potential to impose significant negative impacts on companies within the industry.
Resumo:
The Woods Bagot 2007 refurbishment of the Qantas and British Airways Bangkok Business lounge in the Survarnabhumi Airport features wall finishes designed by wallpaper designer, Florence Broadhurst (1899-1977) and Thai Silk trader, Jim Thompson (1906-1967). This distinctive selection, which is proclaimed on the airport’s website, of patterned wall surfaces side by side draws attention to their striking similarities and their defining differences . Thompson and Broadhurst would appear to be worlds apart, but here in the airport their work brings them together. Thompson, the son of a wealthy cotton family in America, worked as an architect before joining the army. He moved to Bangkok to start The Thai Silk Company in 1948. Broadhurst was born on a farm in Mt. Perry, Queensland. She began her career as a performance artist, as part of an Australian troupe in Shanghai, moving onto pursue a career in fashion design, catering to the middle and upper classes in London. Upon her return to Australia, Broadhurst started a print design company in 1959. Both Broadhurst and Thompson pursued multiple careers, lived many lives, and died under mysterious circumstances. Broadhurst was murdered in 1977 at her Sydney print warehouse, which remains an unsolved crime. Thompson disappeared in Malaysia in 1967 and his body has never been found. This chapter investigates the parallels between Thompson and Broadhurst and what lead them to design such popular patterns for wall surfaces towards the end of their careers. While neither designer was a household name, their work is familiar to most, seen in the costume and set design of films, on the walls of restaurants and cafes and even in family homes. The reason for the popularity of their patterns has not previously been analysed. However, this chapter suggests that the patterns are intriguing because they contain something of their designers’ identities. It suggests that the coloured surface provides a way of camouflaging and hiding its subjects’ histories, such that Broadhurst and Thompson, consciously or unconsciously, used the patterned surface as a plane in which their past lives could be buried. The revealing nature of the stark white wall, compared with the forgiveness provided by the pattern in which to hide, is elaborated by painter and advocate for polychromatic architecture, Fernand Léger in his essay, “The Wall, The Architect, The Painter (1965).” Léger writes that, “the modern architect has gone too far in his magnificent attempts to cleanse through emptiness,” and that the resultant white walls of modernity create ‘an impalpability of air, of slick, brilliant new surfaces where nothing can be hidden any longer …even shadows don’t dare to enter’. To counter the exposure produced by the white wall, Thompson and Broadhurst designed patterned surfaces that could harbour their personal histories. Broadhurst and Thompson’s works share a number of commonalities in their design production, even though their work in print design commenced a decade apart. Both designers opted to work more with traditional methods of pattern making. Broadhurst used hand-operated screens, and Thompson outsourced work to local weavers and refrained from operating out of a factory. Despite humble beginnings, Broadhurst and Thompson enjoyed international success with their wall patterns being featured in a number of renowned international hotels in Bahrain, Singapore, Sydney, and London in the 1970s and 1980s. Their patterns were also transferred to fabric for soft furnishings and clothing. Thompson’s patterns were used for costumes in films including the King and I and Ben Hur. Broadhurst’s patterns were also widely used by fashion designers and artists, such as Akira Isogowa‘s costume design for Salome, a 1998 production by the Sydney Dance Company. Most recently her print designs have been used by skin illustrator Emma Hack, in a series of works painting female bodies into Broadhurst’s patterns. Hack’s works camouflage the models’ bodies into the patterned surface, assimilating subject and surface, hinting at there being something living within the patterned wall. More than four decades after Broadhurst’s murder and five decades since Thompson’s disappearance, their print designs persist as more than just a legacy. They are applied as surface finishes with the same fervour as when the designs were first released. This chapter argues that the reason for the ongoing celebration of their work is that there is the impalpable presence of the creator in the patterns. It suggests that the patterns blur the boundary between subject and surface.
Resumo:
Thin plate spline finite element methods are used to fit a surface to an irregularly scattered dataset [S. Roberts, M. Hegland, and I. Altas. Approximation of a Thin Plate Spline Smoother using Continuous Piecewise Polynomial Functions. SIAM, 1:208--234, 2003]. The computational bottleneck for this algorithm is the solution of large, ill-conditioned systems of linear equations at each step of a generalised cross validation algorithm. Preconditioning techniques are investigated to accelerate the convergence of the solution of these systems using Krylov subspace methods. The preconditioners under consideration are block diagonal, block triangular and constraint preconditioners [M. Benzi, G. H. Golub, and J. Liesen. Numerical solution of saddle point problems. Acta Numer., 14:1--137, 2005]. The effectiveness of each of these preconditioners is examined on a sample dataset taken from a known surface. From our numerical investigation, constraint preconditioners appear to provide improved convergence for this surface fitting problem compared to block preconditioners.