247 resultados para 7137-106
Resumo:
INTRODUCTION Influenza vaccination in pregnancy is recommended for all women in Australia, particularly those who will be in their second or third trimester during the influenza season. However, there has been no systematic monitoring of influenza vaccine uptake among pregnant women in Australia. Evidence is emerging of benefit to the infant with respect to preventing influenza infection in the first 6 months of life. The FluMum study aims to systematically monitor influenza vaccine uptake during pregnancy in Australia and determine the effectiveness of maternal vaccination in preventing laboratory-confirmed influenza in their offspring up to 6 months of age. METHODS AND ANALYSIS A prospective cohort study of 10 106 mother-infant pairs recruited between 38 weeks gestation and 55 days postdelivery in six Australian capital cities. Detailed maternal and infant information is collected at enrolment, including influenza illness and vaccination history with a follow-up data collection time point at infant age 6 months. The primary outcome is laboratory-confirmed influenza in the infant. Case ascertainment occurs through searches of Australian notifiable diseases data sets once the infant turns 6 months of age (with parental consent). The primary analysis involves calculating vaccine effectiveness against laboratory-confirmed influenza by comparing the incidence of influenza in infants of vaccinated mothers to the incidence in infants of unvaccinated mothers. Secondary analyses include annual and pooled estimates of the proportion of mothers vaccinated during pregnancy, the effectiveness of maternal vaccination in preventing hospitalisation for acute respiratory illness and modelling to assess the determinants of vaccination. ETHICS AND DISSEMINATION The study was approved by all institutional Human Research Ethics Committees responsible for participating sites. Study findings will be published in peer review journals and presented at national and international conferences. TRIAL REGISTRATION NUMBER The study is registered with the Australia and New Zealand Clinical Trials Registry (ANZCTR) number: 12612000175875.
Resumo:
A numerical study is carried out to investigate the transition from laminar to chaos in mixed convection heat transfer inside a lid-driven trapezoidal enclosure. In this study, the top wall is considered as isothermal cold surface, which is moving in its own plane at a constant speed, and a constant high temperature is provided at the bottom surface. The enclosure is assumed to be filled with water-Al2O3 nanofluid. The governing Navier–Stokes and thermal energy equations are expressed in non-dimensional forms and are solved using Galerkin finite element method. Attention is paid in the present study on the pure mixed convection regime at Richandson number, Ri = 1. The numerical simulations are carried out over a wide range of Reynolds (0.1 ≤ Re ≤ 103) and Grashof (0.01 ≤ Gr ≤ 106) numbers. Effects of the presence of nanofluid on the characteristics of mixed convection heat transfer are also explored. The average Nusselt numbers of the heated wall are computed to demonstrate the influence of flow parameter variations on heat transfer. The corresponding change of flow and thermal fields is visualized from the streamline and the isotherm contour plots.
Resumo:
Numerical investigation of free convection heat transfer in an attic shaped enclosure with differentially heated two inclined walls and filled with air is performed in this study. The left inclined surface is uniformly heated whereas the right inclined surface is uniformly cooled. There is a heat source placed on the right side of the bottom surface. Rest of the bottom surface is kept as adiabatic. Finite volume based commercial software ANSYS 15 (Fluent) is used to solve the governing equations. Dependency of various flow parameters of fluid flow and heat transfer is analyzed including Rayleigh number, Ra ranging from 103 to 106, heater size from 0.2 to 0.6, heater position from 0.3 to 0.7 and aspect ratio from 0.2 to 1.0 with a fixed Prandtl number of 0.72. Outcomes have been reported in terms of temperature and stream function contours and local Nusselt number for various Ra, heater size, heater position, and aspect ratio. Grid sensitivity analysis is performed and numerically obtained results have been compared with those results available in the literature and found good agreement.
Resumo:
The World Health Organization identifies road trauma as a major public health issue in every country; most notably among low-to-middle income countries. More than 90% of all road fatalities occur in these countries, although they have only 48% of all registered vehicles [1]. Unprecedented focus has been placed on reducing the global road trauma burden through the United Nations Decade of Action for Road Safety (2011-2020). China is rapidly transitioning from a nation of bicycle riders and pedestrians to one where car ownership and use is increasing. This transition presents important public health, mobility, and safety challenges. Rapid motorisation has resulted in an increased road trauma burden, shouldered disproportionately among the population. Vulnerable road users (bicyclists, pedestrians, and motorcyclists) are of particular concern, representing 70% of all road-related fatalities [1]. Furthermore, those at greatest risk of sustaining a crash-related disability are: male, older, less educated, and earning a lower income [2] and residing in urban areas [3], with higher fatality rates in north-western poorer provinces [3]. Speeding is a key factor in road crashes in China [1, 4] and is one of two risk factors targeted in the Bloomberg Philanthropies-funded Global Road Safety Program operating in two Chinese cities over five year [5] to which the first author has provided expert advice. However, little evidence exists to help understand the factors underpinning speeding behaviour. Previous research conducted by the authors in Beijing and Hangzhou explored personal, social, and legal factors relating to speeding to assist in better understanding the motivations for non-compliance with speed limits. Qualitative and quantitative research findings indicated that speeding is relatively common, including self-reported travel speeds of greater than 30 km/hour above posted speed limits [6], and that the road safety laws and enforcement practices may, in some circumstances, contribute to this [7]. Normative factors were also evident; the role of friends, family members and driving instructors were influential. Additionally, using social networks to attempt to avoid detection and penalty was reported, thereby potentially reinforcing community perceptions that speeding is acceptable [8, 9]. The authors established strong collaborative links with the Chinese Academy of Sciences and Zhejiang Police College to conduct this research. The first author has worked in both institutions for extended time periods and recognises that research must include an understanding of culturally-relevant issues if road safety is to improve in China. Future collaborations to assist in enhancing our understanding of such issues are welcomed. References [1] World Health Organization. (2009). Global status report on road safety: Time for action; Geneva. [2] Chen, H., Du, W., & Li, N. (2013). The socioeconomic inequality in traffic-related disability among Chinese adults: the application of concentration index. Accident Analysis & Prevention, 55(101-106). [3] Wang, S. Y., Li, Y. H., Chi, G. B., Xiao, S. Y., Ozanne-Smith, J., Stevenson, M., & Phillips, M. (2008). Injury-related fatalities in China: an under-recognised public-health problem. The Lancet (British edition), 372(9651), 1765-1773. [4] He, J., King, M. J., Watson, B., Rakotonirainy, A., & Fleiter, J. J. (2013). Speed enforcement in China: National, provincial and city initiatives and their success. Accident Analysis & Prevention, 50, 282-288. [5] Bhalla, K., Li, Q., Duan, L., Wang, Y., Bishai, D., & Hyder, A. A. (2013). The prevalence of speeding and drink driving in two cities in China: a mid project evaluation of ongoing road safety interventions. Injury, 44, 49-56. doi:10.1016/S0020-1383(13)70213-4. [6] Fleiter, J. J., Watson, B., & Lennon, A. (2013). Awareness of risky behaviour among Chinese drivers. Peer-reviewed paper presented at 23rd Canadian Multidisciplinary Road Safety Conference, Montréal, Québec. [7] Fleiter, J. J., Watson, B., Lennon, A., King, M. J., & Shi, K. (2009). Speeding in Australia and China: A comparison of the influence of legal sanctions and enforcement practices on car drivers. Peer-reviewd paper presented at Australasian Road Safety Research Policing Education Conference, Sydney. [8] Fleiter, J. J., Watson, B., Lennon, A., King, M. J., & Shi, K. (2011). Social influences on drivers in China. Journal of the Australasian College of Road Safety, 22(2), 29-36. [9] Fleiter, J. J., Watson, B., Guan, M. Q., Ding, J. Y., & Xu, C. (2013). Characteristics of Chinese Drivers Attending a Mandatory Training Course Following Licence Suspension. Peer-reviewed paper presented at Road Safety on Four Continents, Beijing, China.
Resumo:
Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.
Resumo:
In North America and Europe, the binary toxin positive Clostridium difficile strains of the ribotypes 027 and 078 have been associated with death, toxic megacolon and other adverse outcomes. Following an increase in C. difficile infections (CDIs) in Queensland, a prevalence study involving 175 hospitals was undertaken in early 2012, identifying 168 cases of CDI over a 2 month period. Patient demographics and clinical characteristics were recorded, and C. difficile isolates were ribotyped and tested for the presence of binary toxin genes. Most patients (106/168, 63.1%) were aged over 60 years. Overall, 98 (58.3%) developed symptoms after hospitalisation; 89 cases (53.0%) developed symptoms more than 48 hours after admission. Furthermore, 27 of the 62 (67.7%) patients who developed symptoms in the community ad been hospitalised within the last 3 months. Thirteen of the 168 (7.7%) cases identified had severe disease, resulting in admission to the Intensive Care Unit or death within 30 days of the onset of symptoms. The 3 most common ribotypes isolated were UK 002 (22.9%), UK 014 (13.3%) and the binary toxin-positive ribotype UK 244 (8.4%). The only other binary toxin positive ribotype isolated was UK 078 (n = 1). Of concern was the detection of the binary toxin positive ribotype UK 244, which has recently been described in other parts of Australia and New Zealand. No isolates were of the international epidemic clone of ribotype UK 027, although ribotype UK 244 is genetically related to this clone. Further studies are required to track the epidemiology of ribotype UK 244 in Australia and New Zealand. Commun Dis Intell 2014;38(4):E279–E284.
Resumo:
The electrochemical formation of nanostructured materials is generally achieved by reduction of a metal salt onto a substrate that does not influence the composition of the deposit. In this work we report that Ag, Au and Pd electrodeposited onto Cu under conditions where galvanic replacement is not viable and hydrogen gas is evolved results in the formation of nanostructured surfaces that unexpectedly incorporate a high concentration of Cu in the final material. Under cathodic polarization conditions the electrodissolution/corrosion of Cu occurs which provides a source of ionic copper that is reduced at the surface-electrolyte interface. The nanostructured Cu/M (M = Ag, Au and Pd) surfaces are investigated for their catalytic activity for the reduction of 4 nitrophenol by NaBH4 where Cu/Ag was found to be extremely active. This work indicates that a substrate electrode can be utilized in an interesting manner t make bimetallic nanostructures with enhanced catalytic activity.
Resumo:
Profiled steel roof claddings in Australia and its neighbouring countries are commonly made of very thin high tensile steel and are crest-fixed intermittently with screw fasteners. The failure of the roof cladding systems was due to a local failure (dimpling of crests I pull-through) at the fasteners under wind uplift Cyclic wind uplift during cyclones causes fatigue cracking to occur at the fastener holes which leads to pull-through failures at lower load levels. At present the design of these claddings is entirely based on testing. In order to improve the understanding of the behaviour and the design and test methods of these claddings under wind uplift loading during storms and cyclones, a detailed investigation consisting of finite element analyses, static and fatigue experiments and cyclonic wind modelling was carried out on two-span roofing assemblies of three common roofing profiles. This paper presents the details of this investigation and its important results.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
Resumo:
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.
Resumo:
The continuous changing impacts appeared in all solution understanding approaches in the projects management field (especially in the construction field of work) by adopting dynamic solution paths. The paper will define what argue to be a better relational model for project management constraints (time, cost, and scope). This new model will increase the success factors of any complex program / project. This is a qualitative research adopting a new avenue of investigation by following different approach of attributing project activities with social phenomena, and supporting phenomenon with field of observations rather than mathematical method by emerging solution from human, and ants' colonies successful practices. The results will show the correct approach of relation between the triple constraints considering the relation as multi agents system having specified communication channels based on agents locations. Information will be transferred between agents, and action would be taken based on constraint agents locations in the project structure allowing immediate changes abilities in order to overcome issues of over budget, behind schedule, and additional scope impact. This is complex adaptive system having self organizes technique, and cybernetic control. Resulted model can be used for improving existing project management methodologies.
Resumo:
Background No tool exists to measure self-efficacy for overcoming lymphedema-related exercise barriers in individuals with cancer-related lymphedema. However, an existing scale measures confidence to overcome general exercise barriers in cancer survivors. Therefore, the purpose of this study was to develop, validate and assess the reliability of a subscale, to be used in conjunction with the general barriers scale, for determining exercise barriers self-efficacy in individuals facing lymphedema-related exercise barriers. Methods A lymphedema-specific exercise barriers self-efficacy subscale was developed and validated using a cohort of 106 cancer survivors with cancer-related lymphedema, from Brisbane, Australia. An initial ten-item lymphedema-specific barrier subscale was developed and tested, with participant feedback and principal components analysis results used to guide development of the final version. Validity and test-retest reliability analyses were conducted on the final subscale. Results The final lymphedema-specific subscale contained five items. Principal components analysis revealed these items loaded highly (> 0.75) on a separate factor when tested with a well-established nine-item general barriers scale. The final five-item subscale demonstrated good construct and criterion validity, high internal consistency (Cronbach’s alpha=0.93) and test-retest reliability (ICC=0.67, p< 0.01). Conclusions A valid and reliable lymphedema-specific subscale has been developed to assess exercise barriers self-efficacy in individuals with cancer-related lymphedema. This scale can be used in conjunction with an existing general exercise barriers scale to enhance exercise adherence in this understudied patient group.
Resumo:
Katharine Hepburn’s entertaining portrayal of reference librarian Bunny Watson in Desk Set (1957) moves her character from apprehension about new technology to an understanding that it is simply another tool. This article outlines the impact of technology on academic legal research. It examines the nature of legal research and the doctrinal method, the importance of law libraries (and librarians) in legal research, and the roles and implications of the Internet and web search engines on legal research methods and education.
Resumo:
The surfaces of natural beidellite were modified with cationic surfactant octadecyl trimethylammonium bromide at different concentrations. The organo-beidellite adsorbent materials were then used for the removal of atrazine with the goal of investigating the mechanism for the adsorption of organic triazine herbicide from contaminated water. Changes on the surfaces and structure of beidellite were characterised by X-ray diffraction (XRD), thermogravimetric analysis (TGA), Fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy (SEM) and BET surface analysis. Kinetics of the adsorption studies were also carried out which show that the adsorption capacity of the organoclays increases with increasing surfactant concentration up until 1.0 CEC surfactant loading, after which the adsorption capacity greatly decreases. TG analysis reveals that although the 2.0 CEC sample has the greatest percentage of surfactant by mass, most of it is present on external sites. The 0.5 CEC sample has the highest proportion of surfactant exchanged into the internal active sites and the 1.0 CEC sample accounts for the highest adsorption capacity. The goodness of fit of the pseudo-second order kinetic confirms that chemical adsorption, rather than physical adsorption, controls the adsorption rate of atrazine.
Resumo:
Using data from 28 countries in four continents, the present research addresses the question of how basic values may account for political activism. Study 1 (N = 35,116) analyses data from representative samples in 20 countries that responded to the 21-item version of the Portrait Values Questionnaire (PVQ-21) in the European Social Survey. Study 2 (N = 7,773) analyses data from adult samples in six of the same countries (Finland, Germany, Greece, Israel, Poland, and United Kingdom) and eight other countries (Australia, Brazil, Chile, Italy, Slovakia, Turkey, Ukraine, and United States) that completed the full 40-item PVQ. Across both studies, political activism relates positively to self-transcendence and openness to change values, especially to universalism and autonomy of thought, a subtype of self-direction. Political activism relates negatively to conservation values, especially to conformity and personal security. National differences in the strength of the associations between individual values and political activism are linked to level of democratization.