948 resultados para digital distribution


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Children's Literature Digital Resources is a full text digital repository of Australian children’s literature from 1830 to 1945. Users can read online the complete texts of a selection of early Australian children’s literature, both popular and rare. Digitised items include children’s and young adult fiction, poetry, short stories, and picture books. Users can also read related full text critical articles that were digitised as part of the project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital Storytelling is a powerful means for enabling communication and social participation. Ordinary people work with expert creative practitioners to create first person narratives for a wide and growing range of purposes, including community building, cultural engagement, brand identification and public communication. A digital story usually combines 15-30 still images and a recorded script of 100-250 words to create an original personal digital story in the form of a 2-3 minute digital video. This form of co-creative media takes advantage of newly accessible technologies but is based in the ancient and universal tradition of storytelling. Digital storytelling is being adopted internationally in a variety of institutional contexts. It was introduced at QUT by Distinguished Professor John Hartley in 2004 when he brought well known UK based digital storytelling expert Daniel Meadows to the Creative Industries Faculty to trainer researchers and Faculty in the technique. Since 2005 Creative Industries Faculty researchers have adapted digital storytelling for use in a variety of research contexts including heritage, youth welfare, health, and international development, in collaboration with a range of external partner organisations. More than 300 digital stories have been produced by QUT researchers, staff and students. These have been presented on the World Wide Web, broadcast on community media, released on DVD and exhibited in various forms. In addition CIF researchers have produced numerous journal articles, conference papers and books reporting the outcomes of research projects utilising digital storytelling in research. As a result of research activity the Creative Industries Faculty is now well positioned as a leading site for teaching and learning in digital storytelling. Faculty research activity in digital storytelling has generated interest in adapting the form for use in undergraduate and postgraduate Creative Industries curriculum and in service teaching, including short courses for external clients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the 2000s, teachers in an increasing number of Australian schools have been learning how to support students with refugee backgrounds. For some of these students, entry into the Australian school system is not easy. English literacy is integral to some of the challenges confronting the students. In response, educators have been developing and researching ways of engaging with the students’ language and literacy learning. Much of the focus has been on traditional print-based school literacies. In contrast, I look here at student engagement in digital literacies in an after-school media club. Several concepts from the theory of French sociologist, Pierre Bourdieu are useful for understanding the position of students of refugee background in the Australian school system. Like other conflict theories, Bourdieusian theory has sometimes been criticised as ‘pessimistic’, that is, for suggesting that schools necessarily reproduce social disadvantage. However, others have used Bourdieusian theory to analyse and critique the reproductive work of schooling for groups of students who experience educational disadvantage. I align myself with this latter tradition. Specifically, I use Bourdieu’s triad of concepts to explain aspects of the literacy education experiences of some young people of refugee background: field, capital and habitus. In particular, I look at questions of the legitimation of students’ competences as capital in literate fields within and beyond the school context. Data are drawn from an Australian Research Council-funded project, Digital Learning and Print Literacy: A design experiment for the reform of low socio-economic, culturally diverse schools (2009-14). The data analysed in this chapter include interviews and observations relating to the participation of two Congolese girls in an after school media club. Implications are drawn for teachers of literacy in culturally and linguistically diverse contexts. Consideration is made of early childhood, primary and secondary settings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis various schemes using custom power devices for power quality improvement in low voltage distribution network are studied. Customer operated distributed generators makes a typical network non-radial and affect the power quality. A scheme considering different algorithm of DSTATCOM is proposed for power circulation and islanded operation of the system. To compensate reactive power overflow and facilitate unity power factor, a UPQC is introduced. Stochastic analysis is carried out for different scenarios to get a comprehensive idea about a real life distribution network. Combined operation of static compensator and voltage regulator is tested for the optimum quality and stability of the system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the Internet becomes deeply embedded into consumers’ daily life, the digital virtual world brings significant influence to consumers’ self and narrative. Prior studies look at consumer self from either from a certain online space or comparing consumers’ physical and digital virtual selves but not the integration of the physical/digital world. This paper aims to explore the meanings of the digital virtual space on consumers’ narrative as a whole (their interests, dreams, or subjectivity). We utilise a postmodern concept of the cyborg to understand the cultural complexity, subjective meanings of, and the extent to which the digital virtual space plays a role in consumers’ self-narrative. We conducted in-depth interviews and gathered three consumer narratives. Our findings indicate that consumers’ narrative contains important fragments from both physical and digital virtual worlds and their physical and digital virtual selves form a feedback loop that strengthen their overall narrative.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Long-term measurements of particle number size distribution (PNSD) produce a very large number of observations and their analysis requires an efficient approach in order to produce results in the least possible time and with maximum accuracy. Clustering techniques are a family of sophisticated methods which have been recently employed to analyse PNSD data, however, very little information is available comparing the performance of different clustering techniques on PNSD data. This study aims to apply several clustering techniques (i.e. K-means, PAM, CLARA and SOM) to PNSD data, in order to identify and apply the optimum technique to PNSD data measured at 25 sites across Brisbane, Australia. A new method, based on the Generalised Additive Model (GAM) with a basis of penalised B-splines, was proposed to parameterise the PNSD data and the temporal weight of each cluster was also estimated using the GAM. In addition, each cluster was associated with its possible source based on the results of this parameterisation, together with the characteristics of each cluster. The performances of four clustering techniques were compared using the Dunn index and Silhouette width validation values and the K-means technique was found to have the highest performance, with five clusters being the optimum. Therefore, five clusters were found within the data using the K-means technique. The diurnal occurrence of each cluster was used together with other air quality parameters, temporal trends and the physical properties of each cluster, in order to attribute each cluster to its source and origin. The five clusters were attributed to three major sources and origins, including regional background particles, photochemically induced nucleated particles and vehicle generated particles. Overall, clustering was found to be an effective technique for attributing each particle size spectra to its source and the GAM was suitable to parameterise the PNSD data. These two techniques can help researchers immensely in analysing PNSD data for characterisation and source apportionment purposes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An expanding education market targeted through ‘bridging material’ enabling cineliteracies has the potential to offer Australian producers with increased distribution opportunities, educators with targeted teaching aids and students with enhanced learning outcomes. For Australian documentary producers, the key to unlocking the potential of the education sector is engaging with its curriculum-based requirements at the earliest stages of pre-production. Two key mechanisms can lead to effective educational engagement; the established area of study guides produced in association with the Australian Teachers of Media (ATOM) and the emerging area of philanthropic funding coordinated by the Documentary Australia Foundation (DAF). DAF has acted as a key financial and cultural philanthropic bridge between individuals, foundations, corporations and the Australian documentary sector for over 14 years. DAF does not make or commission films but through management and receipt of grants and donations provides ‘expertise, information, guidance and resources to help each sector work together to achieve their goals’. The DAF application process also requires film-makers to detail their ‘Education and Outreach Strategy’ for each film with 582 films registered and 39 completed as of June 2014. These education strategies that can range from detailed to cursory efforts offer valuable insights into the Australian documentary sector's historical and current expectations of education as a receptive and dynamic audience for quality factual content. A recurring film-maker education strategy found in the DAF data is an engagement with ATOM to create a study guide for their film. This study guide then acts as a ‘bridging material’ between content and education audience. The frequency of this effort suggests these study guides enable greater educator engagement with content and increased interest and distribution of the film to educators. The paper Education paths for documentary distribution: DAF, ATOM and the study guides that bind them will address issues arising out of the changing needs of the education sector and the impact targeting ‘cineliteracy’ outcomes may have for Australian documentary distribution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some information on the secret, namely the shape of the parallelepiped, which has been exploited on practical attacks [24]. NTRUSign was an extremely efficient scheme, and thus there has been a noticeable interest on developing countermeasures to the attacks, but with little success [6]. In [8] Gentry, Peikert and Vaikuntanathan proposed a randomized version of Babai’s nearest plane algorithm such that the distribution of a reduced vector modulo a secret parallelepiped only depended on the size of the base used. Using this algorithm and generating large, close to uniform, public keys they managed to get provably secure GGH-like lattice-based signatures. Recently, Stehlé and Steinfeld obtained a provably secure scheme very close to NTRUSign [26] (from a theoretical point of view). In this paper we present an alternative approach to seal the leak of NTRUSign. Instead of modifying the lattices and algorithms used, we do a classic leaky NTRUSign signature and hide it with gaussian noise using techniques present in Lyubashevky’s signatures. Our main contributions are thus a set of strong NTRUSign parameters, obtained by taking into account latest known attacks against the scheme, a statistical way to hide the leaky NTRU signature so that this particular instantiation of CVP-based signature scheme becomes zero-knowledge and secure against forgeries, based on the worst-case hardness of the O~(N1.5)-Shortest Independent Vector Problem over NTRU lattices. Finally, we give a set of concrete parameters to gauge the efficiency of the obtained signature scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Overvoltage and overloading due to high utilization of PVs are the main power quality concerns for future distribution power systems. This paper proposes a distributed control coordination strategy to manage multiple PVs within a network to overcome these issues. PVs reactive power is used to deal with over-voltages and PVs active power curtailment are regulated to avoid overloading. The proposed control structure is used to share the required contribution fairly among PVs, in proportion to their ratings. This approach is examined on a practical distribution network with multiple PVs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter we present data drawn from observations of kindergarten children using iPads and talk with the children, their parents/guardians and teachers. We identify a continuum of practices that extends from ‘educational apps’ teaching handwriting, sight words and so forth to uses of the iPad as a device for multimodal literacy development and substantive conversation around children’s creative work. At the current time high stakes testing and the implementation of the Australian Curriculum are prompting new public and professional conversations about literacy and digital technology. The iPad is construed as both cause of and solution to problems of traditional literacy education. In this context we describe the literacies enabled by educational software available on iPads. We higlight the time constraints which bore on teachers' capacity to enact their visions of literacy education through the iPad platform and suggest ways of reflecting on responses to this constraint.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the development of a playful digital experience, Anim-action, designed for young children with developmental disabilities. This experience was built using the Stomp platform, a technology designed specifically to meet the needs of people with intellectual disability through facilitating whole body interaction. We provide detail on how knowledge gained from key stakeholders informed the design of the application and describe the design guidelines used in the development process. A study involving 13 young children with developmental disabilities was conducted to evaluate the extent to which Anim-action facilitates cognitive, social and physical activity. Results demonstrated that Anim-action effectively supports cognitive and physical activity. In particular, it promoted autonomy and encouraged problem solving and motor planning. Conversely, there were limitations in the system’s ability to support social interaction, in particular, cooperation. Results have been analyzed to determine how design guidelines might be refined to address these limitations.