978 resultados para Special Collections
Resumo:
This thesis presents novel techniques for addressing the problems of continuous change and inconsistencies in large process model collections. The developed techniques treat process models as a collection of fragments and facilitate version control, standardization and automated process model discovery using fragment-based concepts. Experimental results show that the presented techniques are beneficial in consolidating large process model collections, specifically when there is a high degree of redundancy.
Resumo:
Ninety-seven percent of children who have special health care needs are cared for by their mothers. These mothers cite that their informal care work can be intrinsically rewarding, however, the role is not without substantial difficulties and consequences. We investigated differences in the health and well-being of mothers whose young children do and do not have special health care needs. Quantitative data are drawn from Growing Up in Australia: The Longitudinal Study of Australian Children. This study employs a matched-case control methodology to compare the experiences of a group of 292 mothers whose children are identified as having long term special health care needs to those mothers whose children are typically developing at two time points; Wave 1 (2004) and Wave 3 (2008). The findings support previous research that mothers of children with special health care needs have poorer general health and mental health than mothers whose children do not have special needs. Mothers of children with special health care needs also perceived life as more difficult. Longitudinally, this study also shows that maternal well-being remains relatively stable during the years when children are transitioning to formal schooling. Implications for policy makers, practitioners and early childhood professionals are discussed.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.
Resumo:
This special issue of the International Journal of Technology Policy and Law considers recent developments in the reconfiguration of communication regulation to account for the impact of media convergence. It is readily apparent that media worldwide are going through a series of transformations, associated with the rise of the internet, user-created content and social media. The papers in the collection draw upon legal and policy developments in Australia, the European union and South Korea, and consider such issues as public participation in media policy and regulation, civic media governance for online platforms, the future copyright laws, the roles and responsibilities of internet intermediaries, and regulatory frameworks for internet protocol television (IPTV).
Resumo:
More children are now being diagnosed with chromosome abnormalities. Some chromosome disorder syndromes are relatively well known; while others are so rare that there is only limited evidence about their likely impact on learning and development. For educators, a basic level of knowledge about chromosome abnormalities is important for understanding the literature and communicating with families and professionals. This paper describes chromosomes, and the numerical and structural anomalies that can occur, usually spontaneously during early cell division. Distinctive features of various chromosome syndromes are summarised before a discussion of the rare chromosome disorders that are labelled, not with a syndrome name, but simply by a description of the chromosome number, size and shape. Because of the potential within-group variability that characterises syndromes, and the scarcity of literature about the rare chromosome disorders, expectations for learning and development of individual students need to be based on the range of possible outcomes that may be achievable.
Resumo:
Automated process discovery techniques aim at extracting process models from information system logs. Existing techniques in this space are effective when applied to relatively small or regular logs, but generate spaghetti-like and sometimes inaccurate models when confronted to logs with high variability. In previous work, trace clustering has been applied in an attempt to reduce the size and complexity of automatically discovered process models. The idea is to split the log into clusters and to discover one model per cluster. This leads to a collection of process models – each one representing a variant of the business process – as opposed to an all-encompassing model. Still, models produced in this way may exhibit unacceptably high complexity and low fitness. In this setting, this paper presents a two-way divide-and-conquer process discovery technique, wherein the discovered process models are split on the one hand by variants and on the other hand hierarchically using subprocess extraction. Splitting is performed in a controlled manner in order to achieve user-defined complexity or fitness thresholds. Experiments on real-life logs show that the technique produces collections of models substantially smaller than those extracted by applying existing trace clustering techniques, while allowing the user to control the fitness of the resulting models.
Resumo:
In his sweeping survey of the Australian study of international relations, Martin Indyk1 claimed that ‘a common set of assumptions tends to underpin the work of almost all Australian scholars in the discipline’. If that assertion could have been plausibly extended to the whole region one generation ago, it certainly cannot now. The International Relations scholarship emanating from the Oceanic region regales in a diversity of theoretical, methodological and ethical assumptions. This diversity certainly emerged before the first Oceanic Conference on International Studies (OCIS) was convened in Canberra in 2004, however, subsequent conferences in Melbourne (2006) and Brisbane (2008) have galvanised and enriched that diversity. The state of the discipline in the region is as strong and healthy now as it has ever been, as is its integration into the global discipline, something we believe is reflected in the contributions collected in this Special Issue of Global Change, Peace and Security....
Resumo:
This paper proposes a method, based on polychotomous discrete choice methods, to impute a continuous measure of income when only a bracketed measure of income is available and for only a subset of the obsevations. The method is shown to perform well with CP5 data. © 1991.
Resumo:
This special issue of the Journal of Field Robotics focuses on low altitude flight of UAVs with a particular emphasis on fully implemented systems that were tested in relevant environments or deployed in regular operations.
Resumo:
Locally and globally, guiding children’s social and emotional development is no longer optional for educators. Research undertaken over the last 20 years provides compelling evidence that early and ongoing development of socio-emotional skills contributes to an individual’s overall health, wellbeing and competence throughout life. Moreover, competence in this domain is now recognised as fundamental to school readiness, school adjustment and academic achievement. As a consequence, social and emotional learning (SEL) is an important theme in current educational policy, curriculum frameworks and classroom practice. This chapter focuses on a particular group of vulnerable learners – children with special needs – and highlights key strategies for educators to use in their everyday classroom practices to strengthen SEL in children from early years through to the end of primary school.
Resumo:
Herbarium accession data offer a useful historical botanical perspective and have been used to track the spread of plant invasions through time and space. Nevertheless, few studies have utilised this resource for genetic analysis to reconstruct a more complete picture of historical invasion dynamics, including the occurrence of separate introduction events. In this study, we combined nuclear and chloroplast microsatellite analyses of contemporary and historical collections of Senecio madagascariensis, a globally invasive weed first introduced to Australia c. 1918 from its native South Africa. Analysis of nuclear microsatellites, together with temporal spread data and simulations of herbarium voucher sampling, revealed distinct introductions to south-eastern Australia and mid-eastern Australia. Genetic diversity of the south-eastern invasive population was lower than in the native range, but higher than in the mid-eastern invasion. In the invasive range, despite its low resolution, our chloroplast microsatellite data revealed the occurrence of new haplotypes over time, probably as the result of subsequent introduction(s) to Australia from the native range during the latter half of the 20th century. Our work demonstrates how molecular studies of contemporary and historical field collections can be combined to reconstruct a more complete picture of the invasion history of introduced taxa. Further, our study indicates that a survey of contemporary samples only (as undertaken for the majority of invasive species studies) would be insufficient to identify potential source populations and occurrence of multiple introductions.
Resumo:
This article considers the increased identification of special educational needs in Australia’s largest education system from the perspectives of senior public servants, regional directors, principals, school counsellors, classroom teachers, support class teachers, learning support teachers and teaching assistants (n = 30). While their perceptions of an increase generally align with the story told by official statistics, participants’ narratives reveal that school-based identification of special educational needs is neither art nor science. This research finds that rather than an objective indication of the number and nature of children with SEN, official statistics may be more appropriately viewed as a product of funding eligibility and the assumptions of the adults who teach, refer and assess children who experience difficulties in school and with learning.
Resumo:
"…one should try to locate power at the extreme points of its exercise, where it is always less legal in character." (Foucault, 1980, p.97) Studies of schooling practices as techniques deriving from a particular art of governing that Foucault (2003b) called ‘governmentality’ have shown how psychopathologising discourses work to construct particular student-subjects and legitimise various practices of exclusion (Gram, 2007b). Here I extend this work to consider the use of alternative-site placement as an intensification in response to governmentality being put ‘at risk’. Governing ‘at a distance’ conjures an illusion of individual freedom which relies on the production of subjects who ‘choose’ to make choices that are consistent with the aspirations of government. In this chapter, it is argued that the designation of a child as ‘disorderly’ legitimises the intrusion of state into the private domain of the family via the Trojan horse of early intervention. This is enabled by the psy-sciences, whose technologies and aims amount to the moral retraining of ‘improper’ future-citizens who, in choosing to choose otherwise, threaten to make visible invisible relations of power. Alternative-site placement in special schools running intensive behaviour modification programs allows for a ‘redoubled insistence’ (Ewald, 1992) of these norms and limits that a ‘disorderly’ child threatens to transgress.