923 resultados para Key Block Theory


Relevância:

30.00% 30.00%

Publicador:

Resumo:

ECA Best of Sustainability: Research, theory and practice by Elliott, Edwards, Davis and Cutter-MacKenzie collates a range of key articles focussing on sustainability from past editions of the Australasian Journal of Early Childhood and Every Child. Sustainable service operation and promoting children’s responsibility and care for the environment are now part of the National Quality Standards and more importantly, all early childhood services must engage with sustainability in this time of increasing global environmental concerns. The publication documents the best of research, theory and practice to date and questions where has early childhood education for sustainability come from and more importantly, where is it going? There are multiple possibilities for educators, researchers, policy makers and managers to take action in early childhood settings for an environmentally sustainable future.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Human Resources (HR) policies and practices have changed due to global environmental instability. These policies and practices are key factors for successful environmental management. Using the Theory of Planned Behaviour, this article aims to understand the critical factors which influence senior management’s decision to adopt ‘green’ HR practices. Data were collected from 210 organisations in Australia using two separate surveys. Survey one, which was addressed directly to HR managers and directors, contained questions relating to HR policies (the dependent variables), while survey two, which was addressed directly to CEOs and senior managers, contained questions about environmental-related attitudes, subjective norms and perceived control (the independent variables). Results indicated that senior management’s environmental-related attitudes, subjective norms from stakeholders and perceived green resource readiness influenced their decision to adopt green HR initiatives. However, attitudes and green resource readiness in particular had greater impacts than subjective norms. Limitations, implications and future research are also outlined.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Pattern and Structure Mathematics Awareness Project (PASMAP) has investigated the development of patterning and early algebraic reasoning among 4 to 8 year olds over a series of related studies. We assert that an awareness of mathematical pattern and structure (AMPS) enables mathematical thinking and simple forms of generalization from an early age. This paper provides an overview of key findings of the Reconceptualizing Early Mathematics Learning empirical evaluation study involving 316 Kindergarten students from 4 schools. The study found highly significant differences on PASA scores for PASMAP students. Analysis of structural development showed increased levels for the PASMAP students; those categorised as low ability developed improved structural responses over a short period of time.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Elaborated Intrusion (EI) Theory proposes that cravings occur when involuntary thoughts about food are elaborated; a key part of elaboration is affectively-charged imagery. Craving can be weakened by working memory tasks that block imagery. EI Theory predicts that cravings should also be reduced by preventing involuntary thoughts being elaborated in the first place. Research has found that imagery techniques such as body scanning and guided imagery can reduce the occurrence of food thoughts. This study tested the prediction that these techniques also reduce craving. We asked participants to abstain from food overnight, and then to carry out 10 min of body scanning, guided imagery, or a control mind wandering task. They rated their craving at 10 points during the task on a single item measure, and before and after the task using the Craving Experience Questionnaire. While craving rose during the task for the mind wandering group, neither the guided imagery nor body scanning group showed an increase. These effects were not detected by the CEQ, suggesting that they are only present during the competing task. As they require no devices or materials and are unobtrusive, brief guided imagery strategies might form useful components of weight loss programmes that attempt to address cravings.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mosquito-borne diseases pose some of the greatest challenges in public health, especially in tropical and sub-tropical regions of theworld. Efforts to control these diseases have been underpinned by a theoretical framework developed for malaria by Ross and Macdonald, including models, metrics for measuring transmission, and theory of control that identifies key vulnerabilities in the transmission cycle. That framework, especially Macdonald’s formula for R0 and its entomological derivative, vectorial capacity, are nowused to study dynamics and design interventions for many mosquito-borne diseases. A systematic review of 388 models published between 1970 and 2010 found that the vast majority adopted the Ross–Macdonald assumption of homogeneous transmission in a well-mixed population. Studies comparing models and data question these assumptions and point to the capacity to model heterogeneous, focal transmission as the most important but relatively unexplored component in current theory. Fine-scale heterogeneity causes transmission dynamics to be nonlinear, and poses problems for modeling, epidemiology and measurement. Novel mathematical approaches show how heterogeneity arises from the biology and the landscape on which the processes of mosquito biting and pathogen transmission unfold. Emerging theory focuses attention on the ecological and social context formosquito blood feeding, themovement of both hosts and mosquitoes, and the relevant spatial scales for measuring transmission and for modeling dynamics and control.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that for any related-key differential characteristic on full-round PRESENT-80, the probability of the characteristic only in the 64-bit state is not higher than 2−64. To overcome the exponential (in the state and key sizes) computational complexity of the search we use truncated differences, however as the key schedule is not nibble oriented, we switch to actual differences and apply early abort techniques to prune the tree-based search. With a new method called extended split approach we are able to make the whole search feasible and we implement and run it in real time. Our approach targets the PRESENT-80 cipher however,with small modifications can be reused for other lightweight ciphers as well.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This project develops and evaluates a model of curriculum design that aims to assist student learning of foundational disciplinary ‘Threshold Concepts’. The project uses phenomenographic action research, cross-institutional peer collaboration and the Variation Theory of Learning to develop and trial the model. Two contrasting disciplines (Physics and Law) and four institutions (two research-intensive and two universities of technology) were involved in the project, to ensure broad applicability of the model across different disciplines and contexts. The Threshold Concepts that were selected for curriculum design attention were measurement uncertainty in Physics and legal reasoning in Law. Threshold Concepts are key disciplinary concepts that are inherently troublesome, transformative and integrative in nature. Once understood, such concepts transform students’ views of the discipline because they enable students to coherently integrate what were previously seen as unrelated aspects of the subject, providing new ways of thinking about it (Meyer & Land 2003, 2005, 2006; Land et al. 2008). However, the integrative and transformative nature of such threshold concepts make them inherently difficult for students to learn, with resulting misunderstandings of concepts being prevalent...

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Measuring Earth material behaviour on time scales of millions of years transcends our current capability in the laboratory. We review an alternative path considering multiscale and multiphysics approaches with quantitative structure-property relationships. This approach allows a sound basis to incorporate physical principles such as chemistry, thermodynamics, diffusion and geometry-energy relations into simulations and data assimilation on the vast range of length and time scales encountered in the Earth. We identify key length scales for Earth systems processes and find a substantial scale separation between chemical, hydrous and thermal diffusion. We propose that this allows a simplified two-scale analysis where the outputs from the micro-scale model can be used as inputs for meso-scale simulations, which then in turn becomes the micro-model for the next scale up. We present two fundamental theoretical approaches to link the scales through asymptotic homogenisation from a macroscopic thermodynamic view and percolation renormalisation from a microscopic, statistical mechanics view.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents the results of a qualitative action-research inquiry into how a highly diverse cohort of post-graduate students could develop significant capacity in sustainable development within a single unit (course), in this case a compulsory component of four built environment masters programs. The method comprised applying threshold learning theory within the technical discipline of sustainable development, to transform student understanding of sustainable business practice in the built environment. This involved identifying a number of key threshold concepts, which once learned would provide a pathway to having a transformational learning experience. Curriculum was then revised, to focus on stepping through these targeted concepts using a scaffolded, problem-based-learning approach. Challenges included a large class size of 120 students, a majority of international students, and a wide span of disciplinary backgrounds across the spectrum of built environment professionals. Five ‘key’ threshold learning concepts were identified and the renewed curriculum was piloted in Semester 2 of 2011. The paper presents details of the study and findings from a mixed-method evaluation approach through the semester. The outcomes of this study will be used to inform further review of the course in 2012, including further consideration of the threshold concepts. In future, it is anticipated that this case study will inform a framework for rapidly embedding sustainability within curriculum.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Trust is widely recognized as one of the key qualities that a successful leader needs to bring about change within his/her organization. Literature has also shown that trust plays a pivotal role in effective school leadership. However, little research has been undertaken to identify specific actions of a transformational school leader enabling him/her to develop purposeful relationships of trust with his/her staff and Chair of the school’s governing body. Using a theoretical framework of transformational leadership in the context of the independent schooling sector in Australia, a multicase study of four highly trusted, transformational school leaders revealed 10 key trust building practices in the Head–staff dyad and three practices in the Head–Chair dyad. These practices were independent of the leader’s personal attributes. The study also revealed an inextricable link between trust and transformational leadership.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A key derivation function (KDF) is a function that transforms secret non-uniformly random source material together with some public strings into one or more cryptographic keys. These cryptographic keys are used with a cryptographic algorithm for protecting electronic data during both transmission over insecure channels and storage. In this thesis, we propose a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the under-lying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream nalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The overall purpose of this paper is to contribute to the theory - practice gap debate in organization studies, especially in pluralistic contexts such as project organizing. We briefly outline some of the current debates, i.e. modernist and postmodernist proposals, and the prevalent dichotomous thinking stance assumptions to better move beyond it, anchoring our contribution in the Aristotelian ethical and practical philosophy. We introduce the current state of the debate, part of the broad question of “science that matters”, and the various discourses between practice and academia within social sciences and more specifically organizational studies. We briefly critically summarize some main features of the two main philosophical stances (modernism, postmodernism), before presenting some key aspects, for the purpose of this paper, of the Aristotelian pre-modern practical and ethical philosophy. Then, we build on the foundations above established, discussing propositions to reconnect theory and practice according the Aristotelian ethical and practical philosophy, and some key implications for research notably in the following areas: roles played by practitioners and scholars, emancipatory praxeological style of reasoning, for closing the “phronetic gap” and reconnecting means and ends, facts and values, relation between collective praxis, development of “good practice” (standards), ethics and politics. We conclude highlighting the role of the suggested shift to an Aristotelian emancipatory style of reasoning for reconciling theory and practice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The continuum model is a key paradigm describing the behavior of electromechanical transients in power systems. In the past two decades, much research work has been done on applying the continuum model to analyze the electromechanical wave in power systems. In this work, the uniform and non-uniform continuum models are first briefly described, and some explanations borrowing concepts and tools from other fields are given. Then, the existing approaches of investigating the resulting wave equations are summarized. An application named the zero reflection controller based on the idea of the wave equations is next presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on probabilistic characteristics, which makes their security grow exponentially with the number of rounds N r r. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an overdefined system of algebraic equations (true with probability 1). We show that this is true for both Serpent (due to a small size of S-boxes) and Rijndael (due to unexpected algebraic properties). We study general methods known for solving overdefined systems of equations, such as XL from Eurocrypt’00, and show their inefficiency. Then we introduce a new method called XSL that uses the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly with the number of rounds. The XSL attack would then be polynomial (or subexponential) in N r> , with a huge constant that is double-exponential in the size of the S-box. The exact complexity of such attacks is not known due to the redundant equations. Though the presented version of the XSL attack always gives always more than the exhaustive search for Rijndael, it seems to (marginally) break 256-bit Serpent. We suggest a new criterion for design of S-boxes in block ciphers: they should not be describable by a system of polynomial equations that is too small or too overdefined.