899 resultados para Tongs (Secret societies)
Resumo:
The Anti-Counterfeiting Trade Agreement (ACTA) 2011 - Twitter hashtag #ACTA - is a controversial trade agreement designed to provide for stronger enforcement of intellectual property rights.
Resumo:
China has a massive population of children with disabilities. To address the special needs of these children, special/inclusive education in China has developed dramatically since the early 1980s onwards. This Special Issue puts together seven empirical studies emerging from the Chinese societies. These studies analyse inclusive discourses embedded in the education policy documents; scrutinise professional competence of inclusive education teachers; evaluate inclusive education practices in physical education, mathematics education, and job-related social skills education provided to students with disabilities; debate the required in-class support for inclusive education teachers; and discuss the social attitudes towards people with disabilities. The foci, methods and theories vary across the seven studies, while their aims converge. These studies are seeking best possible approaches and best available resources that facilitate inclusion. Knowledge built and lessons learned from these studies will provide implications for future inclusive education practices in China and beyond.
Resumo:
A new intellectual epoch has generated new enterprises to suit changed beliefs and circumstances. A widespread sentiment in both formal historiography and curriculum studies reduces the “new” to the question of how knowledge is recognized as such, how it is gained, and how it is represented in narrative form. Whether the nature of history and conceptions of knowledge are, or ought to be, central considerations in curriculum studies and reducible to purposes or elevated as present orientated requires rethinking. This paper operates as an incitement to discourse that disrupts the protection and isolation of primary categories in the field whose troubling is overdue. In particular, the paper moves through several layers that highlight the lack of settlement regarding the endowment of objects for study with the status of the scientific. It traces how some “invisible” things have been included within the purview of curriculum history as objects of study and not others. The focus is the making of things deemed invisible into scientific objects (or not) and the specific site of analysis is the work of William James (1842-1910). James studied intensely both child mind and the ghost, the former of which becomes scientized and legitimated for further study, the latter abjected. This contrast opens key points for reconsideration regarding conditions of proof, validation criteria, and subject matters and points to opportunities to challenge some well-rehearsed foreclosures within progressive politics and education.
Resumo:
Forced marriages are worldwide phenomena and also exist in Pakistani society. It involves the lack of free and full consent of at least one of the parties to a marriage. Mostly, females are victims of forced marriages. It is prevalent in the name of religion in many Muslim countries; however, it is purely a traditional and cultural phenomenon which has nothing to do with religion. Forced marriages are different from arranged marriages in which both parties freely consent to enter into marriage contract and they have no objection on the choice of partner selected by their parents. This study will highlights different forms of forced marriages in Pakistani society.
Resumo:
Protocols for secure archival storage are becoming increasingly important as the use of digital storage for sensitive documents is gaining wider practice. Wong et al.[8] combined verifiable secret sharing with proactive secret sharing without reconstruction and proposed a verifiable secret redistribution protocol for long term storage. However their protocol requires that each of the receivers is honest during redistribution. We proposed[3] an extension to their protocol wherein we relaxed the requirement that all the recipients should be honest to the condition that only a simple majority amongst the recipients need to be honest during the re(distribution) processes. Further, both of these protocols make use of Feldman's approach for achieving integrity during the (redistribution processes. In this paper, we present a revised version of our earlier protocol, and its adaptation to incorporate Pedersen's approach instead of Feldman's thereby achieving information theoretic secrecy while retaining integrity guarantees.
Resumo:
The prevalence and developmental course of supposed ‘secret language’ was examined in a cohort of twins and closely spaced singletons pairs, with systematic assessments at 20 months and again at 36 months. Two forms of apparent ‘secret language’ were examined: (1) shared understanding—speech directed generally but unintelligible to the parent, although apparently clearly understood within the child pair, and (2) private language directed exclusively to the other twin/sibling—not intelligible to the parent, but apparently clearly understood and used only within the child pair. Both occurred in singleton pairs, but the rate was much higher in twins. In most cases it seemed to be a developmental phenomenon occurring in the second year of life with the emergence of immature speech, and decreasing considerably over the next 16 months. A small group of children, primarily male twins, was reported to use a private language at 36 months. This group had poorer cognitive and language functioning, and was characterized by highly dependent relationships. Some aspects of the twins’ home environment were less stimulating and less responsive, most probably reflecting the abilities and relationships of the children. A follow-up of these children when they were ~6 years of age showed that language outcome was poor for the subgroup (n = 4) who did not develop normal language alongside the use of a private language.
Resumo:
In much the same way that a squirrel stores a range of food in a range of places, the Australian Curriculum, Assessment and Reporting Authority’s (ACARA) Australian Curriculum: English (ACARA, 2015) stores references to grammar in a range of places. This paper explores some seemingly ‘hidden’ grammars within the AC:E to (re)discover their genesis and how they unfold across Foundation to Year 6. The first ‘Secret Squirrel’ moment centres on the introduction of a new grammar which weaves traditional Latin-based and Systemic Functional Linguistics (SFL) theory. The second ‘Secret Squirrel’ moment centres on the use of one sub-system of SFL Theory, the System of Appraisal, and its potential to provide an analytical lens for ‘reading’ the interpersonal meaning within narratives. The remainder of the paper draws on Goodson’s (1990) notion of curriculum as a social construction, paying attention to the levels of processes and (potential) practice. This part of the paper focuses on the System of Appraisal as it is introduced in the AC:E and then translates the Content Descriptions to an example analysis. One stimulus text, Melanie Watt’s (2012) children’s picture book ‘Scaredy Squirrel at the Beach’, is introduced then analysed using the System of Appraisal as an analytical lens for identifying how language choices ‘go to work’ (Macken-Horarik, 2003, p. 285) on readers, that is how Watt’s language choices are crafted so a ‘compliant’ child reader (Martin & White, 2005, p. 62) has the opportunity to ‘feel with’ and thus ‘adjudicate’ the behaviour of characters in particular ways (Macken-Horarik, 2003, p. 285).
Resumo:
The famous philosopher Leibniz (1646-1716) was also active in the (cultural) politics of his time. His interest in forming scientific societies never waned and his efforts led to the founding of the Berlin Academy of Sciences. He also played a part in the founding of the Dresden Academy of Science and the St. Petersburg Academy of Science. Though Leibniz's models for the scientific society were the Royal Society and the Royal Science Academy of France, his pansophistic vision of scientific cooperation sometimes took on utopian dimensions. In this paper, I will present Leibniz's ideas of scientific cooperation as a kind of religious activity and discuss his various schemes for the founding of such scientific societies.
Resumo:
A plethora of indices have been proposed and used to construct dominance hierarchies in a variety of vertebrate and invertebrate societies, although the rationale for choosing a particular index for a particular species is seldom explained. In this study, we analysed and compared three such indices, viz Clutton-Brock et al.'s index (CBI), originally developed for red deer, Cervus elaphus, David's score (DS) originally proposed by the statistician H. A. David and the frequency-based index of dominance (FDI) developed and routinely used by our group for the primitively eusocial wasps Ropalidia marginata and Ropalidia cyathiformis. Dominance ranks attributed by all three indices were strongly and positively correlated for both natural data sets from the wasp colonies and for artificial data sets generated for the purpose. However, the indices differed in their ability to yield unique (untied) ranks in the natural data sets. This appears to be caused by the presence of noninteracting individuals and reversals in the direction of dominance in some of the pairs in the natural data sets. This was confirmed by creating additional artificial data sets with noninteracting individuals and with reversals. Based on the criterion of yielding the largest proportion of unique ranks, we found that FDI is best suited for societies such as the wasps belonging to Ropalidia, DS is best suited for societies with reversals and CBI remains a suitable index for societies such as red deer in which multiple interactions are uncommon. (C) 2009 The Association for the Study of Animal Behaviour. Published by Elsevier Ltd. All rights reserved.
Resumo:
Existing protocols for archival systems make use of verifiability of shares in conjunction with a proactive secret sharing scheme to achieve high availability and long term confidentiality, besides data integrity. In this paper, we extend an existing protocol (Wong et al. [9]) to take care of more realistic situations. For example, it is assumed in the protocol of Wong et al. that the recipients of the secret shares are all trustworthy; we relax this by requiring that only a majority is trustworthy.
Resumo:
In a networked society, governing advocacy groups and networks through decentralized systems of policy implementation has been the interest of governance network literature. This paper addresses the topic of governing networks in the context of Indian agrarian societies by taking the case example of a welfare scheme for the Indian rural poor. We explore context-specific regulatory dynamics through the situated agent based architectural framework. The effects of various regulatory strategies that can be adopted by governing node are tested under various action arenas through experimental design. Results show the impact of regulatory strategies on the resource dependencies and asymmetries in the network relationships. This indicates that the optimal feasible regulatory strategy in networked society is institutionally rational and is context dependent. Further, we show that situated MAS architecture is a natural fit for institutional understanding of the dynamics (Ostrom et al. in Rules, games, and common-pool resources, 1994).
Resumo:
A pairwise independent network (PIN) model consists of pairwise secret keys (SKs) distributed among m terminals. The goal is to generate, through public communication among the terminals, a group SK that is information-theoretically secure from an eavesdropper. In this paper, we study the Harary graph PIN model, which has useful fault-tolerant properties. We derive the exact SK capacity for a regular Harary graph PIN model. Lower and upper bounds on the fault-tolerant SK capacity of the Harary graph PIN model are also derived.
Resumo:
Mobile nodes observing correlated data communicate using an insecure bidirectional switch to generate a secret key, which must remain concealed from the switch. We are interested in fault-tolerant secret key rates, i.e., the rates of secret key generated even if a subset of nodes drop out before the completion of the communication protocol. We formulate a new notion of fault-tolerant secret key capacity, and present an upper bound on it. This upper bound is shown to be tight when the random variables corresponding to the observations of nodes are exchangeable. Further, it is shown that one round of interaction achieves the fault-tolerant secret key capacity in this case. The upper bound is also tight for the case of a pairwise independent network model consisting of a complete graph, and can be attained by a noninteractive protocol.
Resumo:
Communication complexity refers to the minimum rate of public communication required for generating a maximal-rate secret key (SK) in the multiterminal source model of Csiszar and Narayan. Tyagi recently characterized this communication complexity for a two-terminal system. We extend the ideas in Tyagi's work to derive a lower bound on communication complexity in the general multiterminal setting. In the important special case of the complete graph pairwise independent network (PIN) model, our bound allows us to determine the exact linear communication complexity, i.e., the communication complexity when the communication and SK are restricted to be linear functions of the randomness available at the terminals.