965 resultados para Long digital extensor tendon
Resumo:
Children's Literature Digital Resources is a full text digital repository of Australian children’s literature from 1830 to 1945. Users can read online the complete texts of a selection of early Australian children’s literature, both popular and rare. Digitised items include children’s and young adult fiction, poetry, short stories, and picture books. Users can also read related full text critical articles that were digitised as part of the project.
Resumo:
Digital Storytelling is a powerful means for enabling communication and social participation. Ordinary people work with expert creative practitioners to create first person narratives for a wide and growing range of purposes, including community building, cultural engagement, brand identification and public communication. A digital story usually combines 15-30 still images and a recorded script of 100-250 words to create an original personal digital story in the form of a 2-3 minute digital video. This form of co-creative media takes advantage of newly accessible technologies but is based in the ancient and universal tradition of storytelling. Digital storytelling is being adopted internationally in a variety of institutional contexts. It was introduced at QUT by Distinguished Professor John Hartley in 2004 when he brought well known UK based digital storytelling expert Daniel Meadows to the Creative Industries Faculty to trainer researchers and Faculty in the technique. Since 2005 Creative Industries Faculty researchers have adapted digital storytelling for use in a variety of research contexts including heritage, youth welfare, health, and international development, in collaboration with a range of external partner organisations. More than 300 digital stories have been produced by QUT researchers, staff and students. These have been presented on the World Wide Web, broadcast on community media, released on DVD and exhibited in various forms. In addition CIF researchers have produced numerous journal articles, conference papers and books reporting the outcomes of research projects utilising digital storytelling in research. As a result of research activity the Creative Industries Faculty is now well positioned as a leading site for teaching and learning in digital storytelling. Faculty research activity in digital storytelling has generated interest in adapting the form for use in undergraduate and postgraduate Creative Industries curriculum and in service teaching, including short courses for external clients.
Resumo:
Since the 2000s, teachers in an increasing number of Australian schools have been learning how to support students with refugee backgrounds. For some of these students, entry into the Australian school system is not easy. English literacy is integral to some of the challenges confronting the students. In response, educators have been developing and researching ways of engaging with the students’ language and literacy learning. Much of the focus has been on traditional print-based school literacies. In contrast, I look here at student engagement in digital literacies in an after-school media club. Several concepts from the theory of French sociologist, Pierre Bourdieu are useful for understanding the position of students of refugee background in the Australian school system. Like other conflict theories, Bourdieusian theory has sometimes been criticised as ‘pessimistic’, that is, for suggesting that schools necessarily reproduce social disadvantage. However, others have used Bourdieusian theory to analyse and critique the reproductive work of schooling for groups of students who experience educational disadvantage. I align myself with this latter tradition. Specifically, I use Bourdieu’s triad of concepts to explain aspects of the literacy education experiences of some young people of refugee background: field, capital and habitus. In particular, I look at questions of the legitimation of students’ competences as capital in literate fields within and beyond the school context. Data are drawn from an Australian Research Council-funded project, Digital Learning and Print Literacy: A design experiment for the reform of low socio-economic, culturally diverse schools (2009-14). The data analysed in this chapter include interviews and observations relating to the participation of two Congolese girls in an after school media club. Implications are drawn for teachers of literacy in culturally and linguistically diverse contexts. Consideration is made of early childhood, primary and secondary settings.
Resumo:
The taxonomic position of the endemic New Zealand bat genus Mystacina has vexed systematists ever since its erection in 1843. Over the years the genus has been linked with many microchiropteran families and superfamilies. Most recent classifications place it in the Vespertilionoidea, although some immunological evidence links it with the Noctilionoidea (=Phyllostomoidea). We have sequenced 402 bp of the mitochondrial cytochrome b gene for M. tuberculata (Gray in Dieffenbach, 1843), and using both our own and published DNA sequences for taxa in both superfamilies, we applied different tree reconstruction methods to find the appropriate phylogeny and different methods of estimating confidence in the parts of the tree. All methods strongly support the classification of Mystacina in the Noctilionoidea. Spectral analysis suggests that parsimony analysis may be misleading for Mystacina's precise placement within the Noctilionoidea because of its long terminal branch. Analyses not susceptible to long-branch attraction suggest that the Mystacinidae is a sister family to the Phyllostomidae. Dating the divergence times between the different taxa suggests that the extant chiropteran families radiated around and shortly after the Cretaceous-Tertiary boundary. We discuss the biogeographical implications of classifying Mystacina within the Noctilionoidea and contrast our result with those classifications placing Mystacina in the Vespertilionoidea, concluding that evidence for the latter is weak.
Resumo:
As the Internet becomes deeply embedded into consumers’ daily life, the digital virtual world brings significant influence to consumers’ self and narrative. Prior studies look at consumer self from either from a certain online space or comparing consumers’ physical and digital virtual selves but not the integration of the physical/digital world. This paper aims to explore the meanings of the digital virtual space on consumers’ narrative as a whole (their interests, dreams, or subjectivity). We utilise a postmodern concept of the cyborg to understand the cultural complexity, subjective meanings of, and the extent to which the digital virtual space plays a role in consumers’ self-narrative. We conducted in-depth interviews and gathered three consumer narratives. Our findings indicate that consumers’ narrative contains important fragments from both physical and digital virtual worlds and their physical and digital virtual selves form a feedback loop that strengthen their overall narrative.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
Resumo:
This study has provided further understanding of the pathogenesis of EV71, one of the major etiological agents associated with significant mortality in Hand, Foot and Mouth disease. Elucidating the host-pathogen interaction and the mechanism that the virus uses to bypass host defence systems to establish infection will aid in the development of potential antiviral therapeutics against EV71.
Resumo:
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.
Resumo:
Purpose - The purpose of this paper is to determine the impact stigma has on property values and how long the stigma remains after the Not in My Back Yard (NIMBY) structure has been removed. Design/methodology/approach - A quantitative analysis was undertaken, using a high voltage overhead transmission line (HVOTL) case study, to determine the effect on property values prior and post removal of the NIMBY structure. A repeat sales index in conjunction with the regression analysis determined the length of time, the stigma remained after removal of the NIMBY structure. Findings - The results show that while the NIMBY is in place the impact on value is confined to those properties in close proximity. This is in contradiction to the findings, where on removal of the NIMBY the property values of the whole neighbourhood improve with the stigma remaining for 3 to 4 years. Research Implications - The implication of this research is that property Valuers need to change the way they take into account the presence of NIMBYs when valuing property with more emphasis, being placed on the neighbourhood rather than just the properties in close proximity. While the HVOTL was in place, only properties in close proximity were negatively affected, but on removal of the HVOTL the whole neighbourhood increased in value. Originality/value - Results expand on current knowledge by demonstrating the length of time the market takes to adjust to the removal of a NIMBY structure.
Resumo:
The concept of media influence has a long history in media and communication studies, and has also had significant influence on public policy. This article revisits questions of media influence through three short case studies. First, it critically analyses the strongly partisan position of News Corporation’s newspapers against the Labor government during the 2013 Australian Federal election to consider whether the potential for media influence equated to the effective use of media power. Second, it discusses the assumption in broadcasting legislation, in both the United Kingdom and Australia, that terrestrial broadcasting should be subject to more content regulation than subscription services, and notes the new challenges arising from digital television and over-the-top video streaming services. Finally, it discusses the rise of multi-platform global content aggregators such as Google, Apple, Microsoft and others, and how their rise necessitates changes in ways of thinking about concentration of media ownership, and regulations that may ensue from it.
Resumo:
In this chapter we present data drawn from observations of kindergarten children using iPads and talk with the children, their parents/guardians and teachers. We identify a continuum of practices that extends from ‘educational apps’ teaching handwriting, sight words and so forth to uses of the iPad as a device for multimodal literacy development and substantive conversation around children’s creative work. At the current time high stakes testing and the implementation of the Australian Curriculum are prompting new public and professional conversations about literacy and digital technology. The iPad is construed as both cause of and solution to problems of traditional literacy education. In this context we describe the literacies enabled by educational software available on iPads. We higlight the time constraints which bore on teachers' capacity to enact their visions of literacy education through the iPad platform and suggest ways of reflecting on responses to this constraint.
Resumo:
Long-term systematic population monitoring data sets are rare but are essential in identifying changes in species abundance. In contrast, community groups and natural history organizations have collected many species lists. These represent a large, untapped source of information on changes in abundance but are generally considered of little value. The major problem with using species lists to detect population changes is that the amount of effort used to obtain the list is often uncontrolled and usually unknown. It has been suggested that using the number of species on the list, the "list length," can be a measure of effort. This paper significantly extends the utility of Franklin's approach using Bayesian logistic regression. We demonstrate the value of List Length Analysis to model changes in species prevalence (i.e., the proportion of lists on which the species occurs) using bird lists collected by a local bird club over 40 years around Brisbane, southeast Queensland, Australia. We estimate the magnitude and certainty of change for 269 bird species and calculate the probabilities that there have been declines and increases of given magnitudes. List Length Analysis confirmed suspected species declines and increases. This method is an important complement to systematically designed intensive monitoring schemes and provides a means of utilizing data that may otherwise be deemed useless. The results of List Length Analysis can be used for targeting species of conservation concern for listing purposes or for more intensive monitoring. While Bayesian methods are not essential for List Length Analysis, they can offer more flexibility in interrogating the data and are able to provide a range of parameters that are easy to interpret and can facilitate conservation listing and prioritization. © 2010 by the Ecological Society of America.
Resumo:
This paper reports on the development of a playful digital experience, Anim-action, designed for young children with developmental disabilities. This experience was built using the Stomp platform, a technology designed specifically to meet the needs of people with intellectual disability through facilitating whole body interaction. We provide detail on how knowledge gained from key stakeholders informed the design of the application and describe the design guidelines used in the development process. A study involving 13 young children with developmental disabilities was conducted to evaluate the extent to which Anim-action facilitates cognitive, social and physical activity. Results demonstrated that Anim-action effectively supports cognitive and physical activity. In particular, it promoted autonomy and encouraged problem solving and motor planning. Conversely, there were limitations in the system’s ability to support social interaction, in particular, cooperation. Results have been analyzed to determine how design guidelines might be refined to address these limitations.
Resumo:
Changing environments pose a serious problem to current robotic systems aiming at long term operation under varying seasons or local weather conditions. This paper is built on our previous work where we propose to learn to predict the changes in an environment. Our key insight is that the occurring scene changes are in part systematic, repeatable and therefore predictable. The goal of our work is to support existing approaches to place recognition by learning how the visual appearance of an environment changes over time and by using this learned knowledge to predict its appearance under different environmental conditions. We describe the general idea of appearance change prediction (ACP) and investigate properties of our novel implementation based on vocabularies of superpixels (SP-ACP). Our previous work showed that the proposed approach significantly improves the performance of SeqSLAM and BRIEF-Gist for place recognition on a subset of the Nordland dataset under extremely different environmental conditions in summer and winter. This paper deepens the understanding of the proposed SP-ACP system and evaluates the influence of its parameters. We present the results of a large-scale experiment on the complete 10 h Nordland dataset and appearance change predictions between different combinations of seasons.