184 resultados para WPS, WSC, Wi-Fi, Cracking, Entropia
Resumo:
It has been almost fi ve years since I fi rst published the article entitled “Much Ado About Staining” in Review of Optometry, which explored what we really knew in 2006 about the relationship between “corneal staining” and contact lens multipurpose solutions (MPS). This was published just prior to the controversial “staining grid.” While the Grid showed MPS-associated hyperfl uorescence under the slitlamp at two hours, it did not explain the “what” or “why” behind it; even so, many proponents of the Grid continue to suggest that it shows us which solution/lens combinations are “biocompatible” and which are not. New evidence suggests that the preservative-associated transient hyperfl uorescence (or PATH) observed at two hours after lens insertion is a benign phenomenon due to an interaction between fl uorescein, MPS preservatives, and corneal cell membranes. The misinterpretation of PATH as “real” corneal staining, like that observed in pathological conditions, may be due in part to the fact that there is not a lot of teaching regarding the true properties of fl uorescein and what is actually occurring when we see either PATH or corneal staining. To discuss the science of fl uorescein, corneal staining, and PATH, I have asked some of the preeminent research experts in the study of fl uorescence spectroscopy and corneal staining from around the world to share their new research and personal opinions on these topics...
Resumo:
In Responsibility to Protect and Women, Peace and Security: Aligning the Protection Agendas, editors Davies, Nwokora, Stamnes and Teitt address the intersections of the Responsibility to Protect (R2P) principle and the Women, Peace, and Security (WPS) agenda. Widespread or systematic sexual or gender-based violence is a war crime, a crime against humanity and an act of genocide, all of which are clearly addressed in the R2P principle. The protection of those at risk of widespread sexual violence is therefore not only relative to the Women, Peace and Security (WPS) agenda, but a fundamental sovereign obligation for all states as part of their commitment to R2P. Contributions from policy-makers and academics consider both the merits and the utility of aligning the protection agendas of R2P and WPS. Ultimately, a number of actionable recommendations are made concerning a unification of the agendas to best support the global empowerment of women and prevention of mass atrocities.
Resumo:
Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.
Resumo:
The Australian masonry standard allows either prism tests or correction factors based on the block height and mortar thickness to evaluate masonry compressive strength. The correction factor helps the taller units with conventional 10 mm mortar being not disadvantaged due to size effect. In recent times, 2-4 mm thick, high-adhesive mortars and H blocks with only the mid-web shell are used in masonry construction. H blocks and thinner and higher adhesive mortars have renewed interest of the compression behaviour of hollow concrete masonry and hence is revisited in this paper. This paper presents an experimental study carried out to examine the effects of the thickness of mortar joints, the type of mortar adhesives and the presence of web shells in the hollow concrete masonry prisms under axial compression. A non-contact digital image correlation technique was used to measure the deformation of the prisms and was found adequate for the determination of strain fi eld of the loaded face shells subjected to axial compression. It is found that the absence of end web shells lowers the compressive strength and stiffness of the prisms and the thinner and higher adhesive mortars increase the compressive strength and stiffness, while lowering the Poisson's ratio. © Institution of Engineers Australia, 2013.
Resumo:
"Students transitioning from vocational education and training (VET) to university can experience a number of challenges. This small research project explored the information literacy needs of VET and university students and how they differ. Students studying early childhood related VET and university courses reported differences in how and where they searched for information in their studies. These differences reflect the more practical focus of VET compared with the more academic and theoretical approach of university. The author proposes a framework of support that could be provided to transitioning students to enable them to develop the necessary information literacy skills for university study."--publisher website
Resumo:
We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.
Resumo:
Analysis of behavioural consistency is an important aspect of software engineering. In process and service management, consistency verification of behavioural models has manifold applications. For instance, a business process model used as system specification and a corresponding workflow model used as implementation have to be consistent. Another example would be the analysis to what degree a process log of executed business operations is consistent with the corresponding normative process model. Typically, existing notions of behaviour equivalence, such as bisimulation and trace equivalence, are applied as consistency notions. Still, these notions are exponential in computation and yield a Boolean result. In many cases, however, a quantification of behavioural deviation is needed along with concepts to isolate the source of deviation. In this article, we propose causal behavioural profiles as the basis for a consistency notion. These profiles capture essential behavioural information, such as order, exclusiveness, and causality between pairs of activities of a process model. Consistency based on these profiles is weaker than trace equivalence, but can be computed efficiently for a broad class of models. In this article, we introduce techniques for the computation of causal behavioural profiles using structural decomposition techniques for sound free-choice workflow systems if unstructured net fragments are acyclic or can be traced back to S- or T-nets. We also elaborate on the findings of applying our technique to three industry model collections.
Resumo:
Very little is known about the infl uence of the mechanical environment on the healing of large segmental defects. This partly reflects the lack of standardised, well characterised technologies to enable such studies. Here we report the design, construction and characterisation of a novel external fixator for use in conjunction with rat femoral defects. This device not only imposes a predetermined axial stiffness on the lesion, but also enables the stiffness to be changed during the healing process. The main frame of the fi xator consists of polyethylethylketone with titanium alloy mounting pins. The stiffness of the fi xator is determined by interchangeable connection elements of different thicknesses. Fixators were shown to stabilise 5 mm femoral defects in rats in vivo for at least 8 weeks during unrestricted cage activity. No distortion or infections, including pin infections, were noted. The healing process was simulated in vitro by inserting into a 5 mm femoral defect, materials whose Young’s moduli approximated those of the different tissues present in regenerating bone. These studies confirmed that, although the external fixator is the major determinant of axial stiffness during the early phase of healing, the regenerate within the lesion subsequently dominates this property. There is much clinical interest in altering the mechanics of the defect to enhance bone healing. Our data suggest that, if alteration of the mechanical environment is to be used to modulate the healing of large segmental defects, this needs to be performed before the tissue properties become dominant.
Resumo:
This volume stems from the 1st International Conference on Epithelial-Mesenchymal Transitions (EMT), which was convened by the editors on October 5–8, 2003 in the beautiful setting of Port Douglas, Queensland, Australia. EMT, the name given to the transformation of cells arranged in a coherent layer – epithelial cells – to more individualistic and potential motile cells – mesenchymal cells – was recognized decades ago by Prof. Elisabeth (Betty) Hay (Harvard Medical School, Boston, Mass., USA) as a primary mechanism in embryogenesis for remodelling tissues. More recently EMT has been seen as crucial to the spread and invasion of carcinoma, and more recently still, EMT-like changes have been detected in various pathologies marked by fi brosis. Despite the basic and clinical importance of EMT, this extremely rapidly growing fi eld had never previously had a conference devoted to it, and indeed the disciplines of developmental biology, cancer and pathology rarely interact although they have much to share. The chapters assembled for this volume encompass these three major themes of the meeting, development, pathology and cancer, and further highlight the commonality in terms of mechanisms and outcomes among them...
Resumo:
This article explores the relationship between the Responsibility to Protect (R2P) and the pursuit of the so-called ‘Women, Peace and Security’ (WPS) agenda at the UN. We ask whether the two agendas should continue to be pursued separately or whether each can make a useful contribution to the other. We argue that while the history of R2P has not included language that deliberately evokes the protection of women and the promotion of gender in preventing genocide and mass atrocities, this does not preclude the R2P and WPS agendas becoming mutually reinforcing. The article identifies cross-cutting areas where the two agendas may be leveraged for the UN and member states to address the concerns of women as both actors in need of protection and active agents in preventing and responding to genocide and mass atrocities, namely in the areas of early warning.
Resumo:
We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences’ cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.
Resumo:
"This work forms part of a much larger collaborative album project in progress between Tim Bruniges, Julian Knowles and David Trumpmanis which explores the intersections between traditional rock instrumentation and analogue and digital media. All of the creative team are performers, composers and producers. The material for the album was thus generated by a series of in studio improvisations and performances with each collaborator assuming a range of different and alternating roles – guitars, electronics, drums, percussion, bass, keyboards production. Thematically the work explores the intersection of instrumental (post) rock, ambient music, and historical electro-acoustic tape composition traditions. Over the past 10 years, musical practice has become increasingly hybrid, with the traditional boundaries between genre becoming progressively eroded. At the same time, digital tools have replaced many of the major analogue technologies that dominated music production and performance in the 20th century. The disappearance of analogue media in mainstream musical practice has had a profound effect on the sonic characteristics of contemporary music and the gestural basis for its production. Despite the increasing power of digital technologies, a small but dedicated group of practitioners has continued to prize and use analogue technology for its unique sounds and the non-linearity of the media, aestheticising its inherent limitations and flaws. At the most radical end of this spectrum lie glitch and lo-fi musical forms, seen in part as reactions to the clinical nature of digital media and the perceived lack of character associated with its transparency. Such developments have also problematised the traditional relationships between media and genre, where specific techniques and their associated sounds have become genre markers. Tristate is an investigation into this emerging set of dialogues between analogue and digital media across composition, production and performance. It employs analogue tape loops in performance, where a tape machine ‘performer’ records and hand manipulates loops of an electric guitar performer on ‘destroyed’ tape stock (intentionally damaged tape), processing the output of this analogue system in the digital domain with contemporary sound processors. In doing so it investigates how the most extreme sonic signatures of analogue media – tape dropout and noise – can be employed alongside contemporary digital sound gestures in both compositional and performance contexts and how the extremes of the two media signatures can brought together both compositionally and performatively. In respect of genre, the work established strategies for merging compositional techniques from the early musique concrete tradition of the 1940s with late 60s popular music experimentalism and the laptop glitch electronica movement of the early 2000s. Lastly, the work explores how analogue recording studio technologies can be used as performance tools, thus illuminating and foregrounding the performative/gestural dimensions of traditional analogue studio tools in use."
Resumo:
The Association of South East Asian Nations (ASEAN) Secretariat and its member states have repeatedly professed their commitment to the protection and advancement of women’s economic and human rights. Such commitments have included the Declaration on the Advancement of Women in ASEAN in 1988, the ASEAN Declaration on the Elimination of Violence Against Women in 2004, and the ASEAN Declaration of Human Rights in 2012, as well as the establishment of the ASEAN Committee on Women in 2002 and the ASEAN Commission on the Promotion and Protection of Women and Children in 2009. However, none of these regional commitments or institutions expressly take up the core concern of the Women, Peace and Security (WPS) agenda set out in United Nations Security Council (UNSC) Resolution 1325 in 2000. ASEAN has no 1325 regional action plan and amongst the ASEAN membership, the Philippines is the only state that has adopted a 1325 National Action Plan (NAP). We explore the possible reasons for lack of ASEAN institutional engagement with 1325, outline the case for regional engagement, and suggest specific roles for ASEAN Secretariat, donor governments and individual member states to commit to UNSCR 1325 as a regional priority.
Resumo:
Metarhizium anisopliae is a well-characterized biocontrol agent of a wide range of insects including cane grubs. In this study, a two-dimensional (2D) electrophoresis was used to display secreted proteins of M. anisopliae strain FI-1045 growing on the whole greyback cane grubs and their isolated cuticles. Hydrolytic enzymes secreted by M. anisopliae play a key role in insect cuticle-degradation and initiation of the infection process. We have identified all the 101 protein spots displayed by cross-species identification (CSI) from the fungal kingdom. Among the identified proteins were 64-kDa serine carboxypeptidase, 1,3 beta-exoglucanase, Dynamin GTPase, THZ kinase, calcineurin like phosphoesterase, and phosphatidylinositol kinase secreted by M. ansiopliae (FI-1045) in response to exposure to the greyback cane grubs and their isolated cuticles. These proteins have not been previously identified from the culture supernatant of M. anisopliae during infection. To our knowledge, this the first proteomic map established to study the extracellular proteins secreted by M. ansiopliae (FI-1045) during infection of greyback cane grubs and its cuticles.
Resumo:
Metarhizium anisopliae is a naturally occurring cosmopolitan fungus infecting greyback canegrubs (Dermolepida albohirtum). The main molecular factors involved in the complex interactions occurring between the greyback canegrubs and M. anisopliae (FI-1045) were investigated by comparing the proteomes of healthy canegrubs, canegrubs infected with Metarhizium and fungus only. Differentially expressed proteins from the infected canegrubs were subjected to mass spectrometry to search for pathogenicity related proteins. Immune-related proteins of canegrubs identified in this study include cytoskeletal proteins (actin), cell communication proteins, proteases and peptidases. Fungal proteins identified include metalloproteins, acyl-CoA, cyclin proteins and chorismate mutase. Comparative proteome analysis provided a view into the cellular reactions triggered in the canegrub in response to the fungal infection at the onset of biological control.