900 resultados para modern British literature
Resumo:
Robust hashing is an emerging field that can be used to hash certain data types in applications unsuitable for traditional cryptographic hashing methods. Traditional hashing functions have been used extensively for data/message integrity, data/message authentication, efficient file identification and password verification. These applications are possible because the hashing process is compressive, allowing for efficient comparisons in the hash domain but non-invertible meaning hashes can be used without revealing the original data. These techniques were developed with deterministic (non-changing) inputs such as files and passwords. For such data types a 1-bit or one character change can be significant, as a result the hashing process is sensitive to any change in the input. Unfortunately, there are certain applications where input data are not perfectly deterministic and minor changes cannot be avoided. Digital images and biometric features are two types of data where such changes exist but do not alter the meaning or appearance of the input. For such data types cryptographic hash functions cannot be usefully applied. In light of this, robust hashing has been developed as an alternative to cryptographic hashing and is designed to be robust to minor changes in the input. Although similar in name, robust hashing is fundamentally different from cryptographic hashing. Current robust hashing techniques are not based on cryptographic methods, but instead on pattern recognition techniques. Modern robust hashing algorithms consist of feature extraction followed by a randomization stage that introduces non-invertibility and compression, followed by quantization and binary encoding to produce a binary hash output. In order to preserve robustness of the extracted features, most randomization methods are linear and this is detrimental to the security aspects required of hash functions. Furthermore, the quantization and encoding stages used to binarize real-valued features requires the learning of appropriate quantization thresholds. How these thresholds are learnt has an important effect on hashing accuracy and the mere presence of such thresholds are a source of information leakage that can reduce hashing security. This dissertation outlines a systematic investigation of the quantization and encoding stages of robust hash functions. While existing literature has focused on the importance of quantization scheme, this research is the first to emphasise the importance of the quantizer training on both hashing accuracy and hashing security. The quantizer training process is presented in a statistical framework which allows a theoretical analysis of the effects of quantizer training on hashing performance. This is experimentally verified using a number of baseline robust image hashing algorithms over a large database of real world images. This dissertation also proposes a new randomization method for robust image hashing based on Higher Order Spectra (HOS) and Radon projections. The method is non-linear and this is an essential requirement for non-invertibility. The method is also designed to produce features more suited for quantization and encoding. The system can operate without the need for quantizer training, is more easily encoded and displays improved hashing performance when compared to existing robust image hashing algorithms. The dissertation also shows how the HOS method can be adapted to work with biometric features obtained from 2D and 3D face images.
Resumo:
(Re)Imagining the world: Children’s Literature’s Response to Changing Times considers how writers of fiction for children imagine ‘the world’, not one universal world, but different worlds: imaginary, strange, familiar, even monstrous worlds. The chapters in this collection discuss how fiction for children engages with some of the changes brought about by new technologies, information literacy, consumerism, migration, politics, different family structures, cosmopolitanism, and new and old monsters. They also invite us to think about how memory shapes our understanding of the past, and how fiction engages our emotions, our capacity to empathize, our desire to discover, and what the future may hold. The contributors bring different perspectives from education, postcolonial studies, literary criticism, cultural studies, childhood studies, postmodernism, and the social sciences. With a wide coverage of texts from different countries, and scholarly and lively discussions, this collection is itself a testament to the power of the human imagination and the significance of children’s literature in the education of young people.
Resumo:
The statutory demand procedure has been a part of our corporate law from its earliest modern formulations and it has been suggested, albeit anecdotally, that under the current regime, it gives rise to more litigation than any other part of the Corporations Act. Despite this there has been a lack of consideration of the underlying policy behind the procedure in both the case law and literature; both of which are largely centred on the technical aspects of the process. The purpose of this article is to examine briefly the process of the statutory demand in the context of the current insolvency law in Australia.
Resumo:
There has been a renewal of interest in memory studies in recent years, particularly in the Western world. This chapter considers aspects of personal memory followed by the concept of cultural memory. It then examines how the Australian cultural memory of the Anzac Legend is represented in a number of recent picture books.
Exploring Indigenous representations in Australian film and literature for the Australian Curriculum
Resumo:
The Australian Curriculum: English, v.5 (ACARA, 2013) now being implemented in Queensland asks teachers and curriculum designers to incorporate the cross curriculum priority (CCP)of Indigenous issues through Aboriginal and Torres Strait Islander histories and cultures. In the Australian Curriculum English, (AC:E) one way to address this CCP is by including texts by and about Aboriginal and Torres Strait Islander people. With the rise of promising and accomplished young, Indigenous filmmakers such as Ivan Sen, Rachael Perkins, Wayne Blair and Warwick Thornton, this guide focuses on the suitable films for schools implementing the Australian Curriculum in terms of cultural representations. This annotated guide suggests some films suitable for inclusion in classroom study and suggests some companion texts (novels, plays, television series and animations, documentaries, poetry and short stories) that may be studied alongside the films. Some of these are by Indigenous filmmakers and writers, and others features Aboriginal and Torres Strait Island representations in character and/or themes.
Resumo:
The phenomenon of a dissertation literature review is explored from a "second-order" perspective. Written responses from 41 neophyte research scholars from various disciplines in an Australian university were gathered in response to two questions: "What do you mean when you use the words "literature review"?" and "What is the meaning of a literature review for your research?" A phenomenographic analysis identified six conceptions, or ways of experiencing, literature reviews: literature review as a list, literature review as a search, literature review as a survey, literature review as a vehicle for learning, literature review as a research facilitator, and literature review as a report. The conceptions represent differing relations between student researchers and the literature. The range of conceptions suggests that the supervisors of postgraduates and other teachers interested in the literature review process need to accept literature reviews as a problem area for students and develop strategies to help them.
Resumo:
Interpreting the unexplained component of the gender wage gap as indicative of discrimination, the empirical literature to date has tended to ignore the potential impact wage discrimination may have on employment. Employment effects may arise if discrimination lowers the female offered wage and the labour supply curve is upward sloping. The empirical analysis employs the British Household Panel Study and finds evidence of both wage and associated employment effects.
Resumo:
Young adult literature is a tool of socialisation and acculturation for young readers. This extends to endowing ‘reading’ with particular significance in terms of what literature should be read and why. This paper considers some recent young adult fiction with an eye to its engagement with canonical literature and its representations of young people reading. Wider possibilities of using such novels in secondary English classes are discussed, particularly in the context of critiquing literary canons and the social hierarchies they are used to legitimate.
Resumo:
Loneliness is a distressing, complex, universal phenomena. This review focuses on loneliness in children and adolescents, specifically examining research on the relationship between young people’s social anxiety and loneliness and the role of bullying victimization and loneliness. The three concepts are distinct, yet inextricably intertwined as antecedents and consequences of each other. The constructs are bi-directional, often forming a feedback loop or negative cycle. Implications for interventions are addressed.
Resumo:
Service bundles, in the context of e-government, are used to group services together that relate to a certain citizen need. These bundles can then be presented on a governmental one-stop portal to structure the available service offerings according to citizen expectations. In order to ensure that citizens utilise the one-stop portal and comprised service bundles for future transactions, the quality of these service bundles needs to be managed and maximised accordingly. Consequently, models and tools that focus on assessing service bundle quality play an important role, when it comes to increasing or retaining usage behaviour of citizens. This study focuses on providing a rigorous and structured literature review of e-government outlets with regards to their coverage of service bundle quality and e-service quality themes. The study contributes to academia and practice by providing a framework that allows structuring and classifying existing studies relevant for the assessment of quality for government portals. Furthermore, this study provides insights into the status quo of quality models that can be used by governments to assess the quality of their service bundles. Directions for future research and limitations of the present study are provided as well.
Resumo:
Wind power has become one of the popular renewable resources all over the world and is anticipated to occupy 12% of the total global electricity generation capacity by 2020. For the harsh environment that the wind turbine operates, fault diagnostic and condition monitoring are important for wind turbine safety and reliability. This paper employs a systematic literature review to report the most recent promotions in the wind turbine fault diagnostic, from 2005 to 2012. The frequent faults and failures in wind turbines are considered and different techniques which have been used by researchers are introduced, classified and discussed.
Resumo:
This article presents the first narrative analysis of the areas of research that have developed within the destination marketing field since its commencement in 1973. Given the broad extent of the field, and the absence of any previous reviews in four decades, a key challenge is in providing a focus for such a disparate body of knowledge. The review is structured around one principal question: ‘To what extent is the Destination Marketing Organisation (DMO) responsible for the competitiveness of the destination’? In pursuit of this underlying question, we address a number of themes including nomenclature and the DMO, the evolution of the destination marketing literature, competitiveness as the DMO reason d’être, and DMO effectiveness including issues of branding and positioning, and future research themes in the field.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
Given the increasing popularity of videogames, understanding when, how and for whom they have a positive or negative impact on wellbeing is critical. We propose a model for exploring these questions based on existing literature and our own research. The People-Game-Play model identifies player characteristics, game features and the experience of play as key determinants of the impact of videogame play on wellbeing. We propose research exploring the relationships within and between each of these key factors is needed and identify some examples of future research in this space.
Resumo:
Background Several lines of evidence suggests that transcription factors are involved in the pathogenesis of Multiple Sclerosis (MS) but a complete mapping the whole network has been elusive. One of the reasons is that there are several clinical subtypes of MS and transcription factors which may be involved in one subtype may not be in others. We investigated the possibility that this network could be mapped using microarray technologies and modern bioinformatics methods on a dataset from whole blood in 99 untreated MS patients (36 Relapse Remitting MS, 43 Primary Progressive MS, and 20 Secondary Progressive MS) and 45 age-matched healthy controls, Methodology/Principal Findings We have used two different analytical methodologies: a differential expression analysis and a differential co-expression analysis, which have converged on a significant number of regulatory motifs that seem to be statistically overrepresented in genes which are either differentially expressed (or differentially co-expressed) in cases and controls (e.g. V$KROX_Q6, p-value < 3.31E-6; V$CREBP1_Q2, p-value < 9.93E-6, V$YY1_02, p-value < 1.65E-5). Conclusions/significance: Our analysis uncovered a network of transcription factors that potentially dysregulate several genes in MS or one or more of its disease subtypes. Analysing the published literature we have found that these transcription factors are involved in the early T-lymphocyte specification and commitment as well as in oligodendrocytes dedifferentiation and development. The most significant transcription factors motifs were for the Early Growth response EGR/KROX family, ATF2, YY1 (Yin and Yang 1), E2F-1/DP-1 and E2F-4/DP-2 heterodimers, SOX5, and CREB and ATF families.