883 resultados para communication theory


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Review of Soft Power in China: Public diplomacy through communication, edited by J IAN WANG, New York, Palgrave Macmillan, 2011, US$89 (hard), 220 pp

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An engaging narrative is maintained throughout this edited collection of articles that address the issue of militarism in international relations. The book seamlessly integrates historical and contemporary perspectives on militarism with theory and relevant international case studies, resulting in a very informative read. The work is comprised of three parts. Part 1 deals with the theorisation of militarism and includes chapters by Anna Stavrianakis and Jan Selby, Martin Shaw, Simon Dalby, and Nicola Short. It covers a range of topics relating to historical and contemporary theories of militarism, geopolitical threat construction, political economy, and the US military’s ‘cultural turn’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper takes as its starting point the observation that neoliberalism is a concept that is ‘oft-invoked but ill-defined’ (Mudge 2008: 703). It provides a taxonomy of uses of the term neoliberalism to include: (1) an all-purpose denunciatory category; (2) ‘the way things are’; (3) a particular institutional framework characterizing Anglo-American forms of national capitalism; (4) a dominant ideology of global capitalism; (5) a form of governmentality and hegemony; and (6) a variant within the broad framework of liberalism as both theory and policy discourse. It is argued that this sprawling set of definitions are not mutually compatible, and that uses of the term need to be dramatically narrowed from its current association with anything and everything that a particular author may find objectionable. In particular, it is argued that the uses of the term by Michel Foucault in his 1978-79 lectures, found in The Birth of Biopolitics (Foucault, 2008) are not particularly compatible with its more recent status as a variant of dominant ideology or hegemony theories.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ICT integration has been advocated to provide opportunities to improve students’ achievement and engagement through transforming the educational setting. A valuable tool that contributes in enhancing and developing students’ cognitive skills for lifelong learning, ICT integration has introduced a new educational philosophy, shifting the role of students into a more central position in the pedagogical processes. Kuwait, as with many other countries, has recently planned ICT integration to develop its citizen’s capacities. This study sought to capture the principals’, teachers’, and students’ perceptions of ICT integration in pedagogical activities, as well as how ICT is being used for learning and teaching activities in three ICT leading Kuwaiti secondary schools. Interviews with principals, teachers, and students were conducted, along with an open-ended questionnaire for the teachers, researcher observations, and document analysis. The findings revealed that ICT integration in Kuwait needed to be reinforced to accomplish the ICT integration objectives. A call for further support for teachers, and a reconsideration of the ICT integration strategies were also recommended.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kuwait is an oil rich country planning for a future that is not dependent on exploiting natural resources. A major policy initiative has been the introduction of Information Communication and Technology (ICT) to schools. However, contextual issues and teacher capabilities in the use of ICT have limited the success of this initiative. The study examines the leadership strategies of two secondary school principals whose schools have achieved this goal. The case study draws on intensive data collected through interviews of the principals, and teachers supported by document analysis and observations. Analysis was guided by theoretical perspectives drawn from the literature which identified a range of strategies used by the principals to manage change. The principals of Schools A and B employed three key strategies to maximise the impact on the teaching staff incorporating ICT into their teaching and learning practices. These strategies were: (a) encouragement for teaching staff to implement ICT in their teaching; (b) support to meet the material and human needs of teaching staff using ICT; and (c) provision of instructions and guidance for teaching staff in how and why such behaviours and practices should be performed. The outcome of this study proposes an innovative change leadership model that informs emerging countries, which are also undergoing major change related to ICT. However, the study also revealed limitations in the implementation of ICT in the classroom and provides insights into further strategies that principals need to adopt.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Academically gifted students are recognised as possessing considerable achievement potential. Yet many fail to perform at a level commensurate with their ability. Often gifted students in early adolescence are faced with a forced choice between fulfilment of potential and achieving stable positive relationships with peers. This choice can affect their achievement and may have far-reaching personal and social costs. This case study explored the viability of self-presentation theory to explain students' ways of negotiating their sense of self whilst developing public identity and the concomitant affects on achievement and the fulfilment of potential. It examined how gifted students moderate their images in their learning and extra-curricular environments. Further, the study identifies those self-presentation strategies adopted that either facilitate or hinder achievement. This study may assist parents, educators and school counsellors to provide greater support for gifted adolescents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The biosafety of carbon nanomaterial needs to be critically evaluated with both experimental and theoretical validations before extensive biomedical applications. In this letter, we present an analysis of the binding ability of two dimensional monolayer carbon nanomaterial on actin by molecular simulation to understand their adhesive characteristics on F-actin cytoskeleton. The modelling results indicate that the positively charged carbon nanomaterial has higher binding stability on actin. Compared to crystalline graphene, graphene oxide shows higher binding influence on actin when carrying 11 positive surface charge. This theoretical investigation provides insights into the sensitivity of actin-related cellular activities on carbon nanomaterial.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main purpose of this longitudinal study was to investigate the role of motivational climates, perceived competence and motivational regulations as antecedents of self-reported physical activity during junior high school years. The participants included 237 Finnish students (101 girls, 136 boys) that were 13 years old at the first stage of the study. Students completed the motivational climate and perceived competence questionnaires at Grade 7, motivation towards physical education questionnaire at Grade 8, and self-reported physical activity questionnaire at Grade 9. A path analysis revealed a path from task-involving motivational climate via perceived competence and intrinsic motivation to self-reported physical activity. Perceived competence and intrinsic motivation were statistically significant mediators between task-involving motivational climate and self-reported physical activity. This finding supports the four-stage causal sequence model of motivation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report looks at opportunities in relation to what is either already available or starting to take off in Information and Communication Technology (ICT). ICT focuses on the entire system of information, communication, processes and knowledge within an organisation. It focuses on how technology can be implemented to serve the information and communication needs of people and organisations. An ICT system involves a combination of work practices, information, people and a range of technologies and applications organised to make the business or organisation fully functional and efficient, and to accomplish goals in an organisation. Our focus is on vocational, workbased education in New Zealand. It is not about eLearning, although we briefly touch on the topic. We provide a background on vocational education in New Zealand, cover what we consider to be key trends impacting workbased, vocational education and training (VET), and offer practical suggestions for leveraging better value from ICT initiatives across the main activities of an Industry Training Organisation (ITO). We use a learning value chain approach to demonstrate the main functions ITOs engage in and also use this approach as the basis for developing and prioritising an ICT strategy. Much of what we consider in this report is applicable to the wider tertiary education sector as it relates to life-long learning. We consider ICT as an enabler that: a) connects education businesses (all types including tertiary education institutions) to learners, their career decisions and their learning, and as well, b) enables those same businesses to run more efficiently. We suggest that these two sets of activities are considered as interconnected parts of the same education or training business ICT strategy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The issue of carbon sequestration rights has become topical following the United Nations Convention on Climate Change (United Nations 1992 at page 1414) and the subsequent Kyoto Protocol (United Nations Climate Change Secretariat 1998) which identified emissions trading as one of the mechanisms to reduce greenhouse gas emissions. Australian states have responded by creating a legal framework for the recognition of rights to bio-sequestered carbon. There is a lack of uniformity in the approach of each state to the recognition of these rights, which vary from the creation of new and novel interests in land to the adoption of more traditional rights such as a profit a prendre. Rights to bio-sequestered carbon are likely to have an impact on the utility, marketability, value and financing of rural land holdings. Despite the creation of the legal framework for recognition of rights to sequestrated carbon, there has been a delay in the introduction of a formalised carbon trading scheme in Australia. In the absence of an established carbon market, this paper addresses the applicability of contingent valuation theory to assess the value of bio-sequestered carbon rights to a rural land holder. Limitations and potential controversies associated with this application of contingent valuation theory are also addressed in this paper.