194 resultados para sicurezza, exploit, XSS, Beef, browser


Relevância:

10.00% 10.00%

Publicador:

Resumo:

While they are among the most ecologically important animals within forest ecosystems, little is known about how bats respond to habitat loss and fragmentation. The threatened lesser short-tailed bat (Mystacina tuberculata), considered to be an obligate deep-forest species, is one of only 2 extant land mammals endemic to New Zealand; it plays a number of important roles within native forests, including pollination and seed dispersal, and rarely occurs in modified forests. We used radiotelemetry to study the movements, roosting behavior, and habitat use of M. tuberculata within a fragmented landscape comprised of 3 main habitat types: open space (harvested forest and pastoral land), native forests, and exotic pine plantations. We found that the bats had smaller home-range areas and travelled shorter nightly distances than populations investigated previously from contiguous native forest. Furthermore, M. tuberculata occupied all 3 habitat types, with native forest being preferred overall. However, individual variation in habitat selection was high, with some bats preferring exotic plantation and open space over native forest. Roosting patterns were similar to those previously observed in contiguous forest; individual bats often switched between communal and solitary roosts. Our findings indicate that M. tuberculata exhibit some degree of behavioral plasticity that allows them to adapt to different landscape mosaics and exploit alternative habitats. To our knowledge, this is the first such documentation of plasticity in habitat use for a bat species believed to be an obligate forest-dweller.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Unlike US and Continental European jurisdictions, Australian monetary policy announcements are not followed promptly by projections materials or comprehensive summaries that explain the decision process. This information is disclosed 2 weeks later when the explanatory minutes of the Reserve Bank board meeting are released. This paper is the first study to exploit the features of the Australian monetary policy environment in order to examine the differential impact of monetary policy announcements and explanatory statements on the Australian interest rate futures market. We find that both monetary policy announcements and explanatory minutes releases have a significant impact on the implied yield and volatility of Australian interest rate futures contracts. When the differential impact of these announcements is examined using the full sample, no statistically significant difference is found. However, when the sample is partitioned based on stable periods and the Global Financial Crisis, a differential impact is evident. Further, contrary to the findings of Kim and Nguyen (2008), Lu et al. (2009), and Smales (2012a), the response along the yield curve, is found to be indifferent between the short and medium terms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Patent law provides exclusive rights to exploit scientific inventions, which are novel, inventive, and useful. The regime is intended to promote innovation, investment in research and development, and access to scientific information. In recent times, there have been concerns that the patent system has been abused by opportunistic companies known by the phrase “patent trolls”. It has been alleged that such entities have stunted innovation and spurred unnecessary patent litigation. Adam Jaffe and Josh Lerner discuss such pathologies of patent law in their book, Innovation and Its Discontents: How our Broken Patent System is Endangering Innovation and Progress, and What To Do About It. James Bessen and Michael Meurer have addressed such concerns in their recent text, Patent Failure: How Judges, Bureaucrats, and Lawyers Put Innovators at Risk. There have been particular fears about the rise of “patent trolls” in the field of information technology. Peter Dekin, an assistant general counsel at Intel, used the phrase “patent troll” to describe firms, which acquired patents only to extract settlements from companies on dubious infringement claims.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driven by a desire to redevelop derelict land, attract inward investments, and better exploit the commercial potential of local talent, public authorities in Glasgow are partnering with private developers to transform an abandoned industrial dockland into a riverside business cluster for the creative industries. It’s a strategy increasingly common in a number of other peripheral regions and it highlights the new role “creativity” plays in urban rejuvenation, social renewal, and economic development. At its core, the strategy also betrays a troubling policy shift away from certain democratic conceptions of culture to ones that are more attuned to economic considerations shaped by global influences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driving on an approach to a signalized intersection while distracted is relatively risky, as potential vehicular conflicts and resulting angle collisions tend to be relatively more severe compared to other locations. Given the prevalence and importance of this particular scenario, the objective of this study was to examine the decisions and actions of distracted drivers during the onset of yellow lights. Driving simulator data were obtained from a sample of 69 drivers under baseline and handheld cell phone conditions at the University of Iowa – National Advanced Driving Simulator. Explanatory variables included age, gender, cell phone use, distance to stop-line, and speed. Although there is extensive research on drivers’ responses to yellow traffic signals, the examinations have been conducted from a traditional regression-based approach, which do not necessary provide the underlying relations and patterns among the sampled data. In this paper, we exploit the benefits of both classical statistical inference and data mining techniques to identify the a priori relationships among main effects, non-linearities, and interaction effects. Results suggest that the probability of yellow light running increases with the increase in driving speed at the onset of yellow. Both young (18–25 years) and middle-aged (30–45 years) drivers reveal reduced propensity for yellow light running whilst distracted across the entire speed range, exhibiting possible risk compensation during this critical driving situation. The propensity for yellow light running for both distracted male and female older (50–60 years) drivers is significantly higher. Driver experience captured by age interacts with distraction, resulting in their combined effect having slower physiological response and being distracted particularly risky.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cost estimating is a key task within Quantity Surveyors’ (QS) offices. Provision of an accurate estimate is vital to ensure that the objectives of the client are met by staying within the client’s budget. Building Information Modelling (BIM) is an evolving technology that has gained attention in the construction industries all over the world. Benefits from the use of BIM include cost and time savings if the processes used by the procurement team are adapted to maximise the benefits of BIM. BIM can be used by QSs to automate aspects of quantity take-off and the preparation of estimates, decreasing turnaround time and assist in controlling errors and inaccuracies. The Malaysian government has decided to require the use of BIM for its projects beginning from 2016. However, slow uptake is reported in the use of BIM both within companies and to support collaboration within the Malaysian industry. It has been recommended that QSs to start evaluating the impact of BIM on their practices. This paper reviews the perspectives of QSs in Malaysia towards the use of BIM to achieve more dependable results in their cost estimating practice. The objectives of this paper include identifying strategies in improving practice and potential adoption drivers that lead QSs to BIM usage in their construction projects. From the expert interviews, it was found out that, despite still using traditional methods and not practising BIM, the interviewees still acquire limited knowledge related to BIM. There are some drivers that potentially motivate them to employ BIM in their practices. These include client demands, innovation in traditional methods, speed in estimating costs, reduced time and costs, improvement in practices and self-awareness, efficiency in projects, and competition from other companies. The findings of this paper identify the potential drivers in encouraging Malaysian Quantity Surveyors to exploit BIM in their construction projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

•EMT is important for embryonic development, wound healing, and placentation. •Some cancers appear to exploit this process for increased metastatic potential. •Therefore, this pathway is of great therapeutic interest in the treatment of cancer. The spread of cancer cells to distant organs represents a major clinical challenge in the treatment of cancer. Epithelial–mesenchymal transition (EMT) has emerged as a key regulator of metastasis in some cancers by conferring an invasive phenotype. As well as facilitating metastasis, EMT is thought to generate cancer stem cells and contribute to therapy resistance. Therefore, the EMT pathway is of great therapeutic interest in the treatment of cancer and could be targeted either to prevent tumor dissemination in patients at high risk of developing metastatic lesions or to eradicate existing metastatic cancer cells in patients with more advanced disease. In this review, we discuss approaches for the design of EMT-based therapies in cancer, summarize evidence for some of the proposed EMT targets, and review the potential advantages and pitfalls of each approach

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present an algorithm for multiarmed bandits that achieves almost optimal performance in both stochastic and adversarial regimes without prior knowledge about the nature of the environment. Our algorithm is based on augmentation of the EXP3 algorithm with a new control lever in the form of exploration parameters that are tailored individually for each arm. The algorithm simultaneously applies the “old” control lever, the learning rate, to control the regret in the adversarial regime and the new control lever to detect and exploit gaps between the arm losses. This secures problem-dependent “logarithmic” regret when gaps are present without compromising on the worst-case performance guarantee in the adversarial regime. We show that the algorithm can exploit both the usual expected gaps between the arm losses in the stochastic regime and deterministic gaps between the arm losses in the adversarial regime. The algorithm retains “logarithmic” regret guarantee in the stochastic regime even when some observations are contaminated by an adversary, as long as on average the contamination does not reduce the gap by more than a half. Our results for the stochastic regime are supported by experimental validation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Bien Hoa and Da Nang airbases were bulk storages for Agent Orange during the Vietnam War and currently are the two most severe dioxin hot spots. Objectives This study assesses the health risk of exposure to dioxin through foods for local residents living in seven wards surrounding these airbases. Methods This study follows the Australian Environmental Health Risk Assessment Framework to assess the health risk of exposure to dioxin in foods. Forty-six pooled samples of commonly consumed local foods were collected and analyzed for dioxin/furans. A food frequency and Knowledge–Attitude–Practice survey was also undertaken at 1000 local households, various stakeholders were involved and related publications were reviewed. Results Total dioxin/furan concentrations in samples of local “high-risk” foods (e.g. free range chicken meat and eggs, ducks, freshwater fish, snail and beef) ranged from 3.8 pg TEQ/g to 95 pg TEQ/g, while in “low-risk” foods (e.g. caged chicken meat and eggs, seafoods, pork, leafy vegetables, fruits, and rice) concentrations ranged from 0.03 pg TEQ/g to 6.1 pg TEQ/g. Estimated daily intake of dioxin if people who did not consume local high risk foods ranged from 3.2 pg TEQ/kg bw/day to 6.2 pg TEQ/kg bw/day (Bien Hoa) and from 1.2 pg TEQ/kg bw/day to 4.3 pg TEQ/kg bw/day (Da Nang). Consumption of local high risk foods resulted in extremely high dioxin daily intakes (60.4–102.8 pg TEQ/kg bw/day in Bien Hoa; 27.0–148.0 pg TEQ/kg bw/day in Da Nang). Conclusions Consumption of local “high-risk” foods increases dioxin daily intakes far above the WHO recommended TDI (1–4 pg TEQ/kg bw/day). Practicing appropriate preventive measures is necessary to significantly reduce exposure and health risk.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The overarching aim of biomimetic approaches to materials synthesis is to mimic simultaneously the structure and function of a natural material, in such a way that these functional properties can be systematically tailored and optimized. In the case of synthetic spider silk fibers, to date functionalities have largely focused on mechanical properties. A rapidly expanding body of literature documents this work, building on the emerging knowledge of structure–function relationships in native spider silks, and the spinning processes used to create them. Here, we describe some of the benchmark achievements reported until now, with a focus on the last five years. Progress in protein synthesis, notably the expression on full-size spidroins, has driven substantial improvements in synthetic spider silk performance. Spinning technology, however, lags behind and is a major limiting factor in biomimetic production. We also discuss applications for synthetic silk that primarily capitalize on its nonmechanical attributes, and that exploit the remarkable range of structures that can be formed from a synthetic silk feedstock.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Patents provide monopoly rights to patent holders. There are safeguards in patent regime to ensure that exclusive right of the patent holder is not misused. Compulsory licensing is one of the safeguards provided under TRIPS using which patent granting state may allow a third party to exploit the invention without patent holder’s consent upon terms and conditions decided by the government. This concept existed since 1623 and was not introduced by TRIPS for the first time. But this mechanism has undergone significant changes especially in post-TRIPS era. History of evolution of compulsory licensing is one of the least explored areas of intellectual property law. This paper undertakes an analysis of different phases in the evolution of the compulsory licensing mechanism and sheds light on reasons behind developments especially after TRIPS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Effects of plant height on Fusarium crown rot (FCR) disease severity were investigated using 12 pairs of near-isogenic lines (NILs) for six different reduced height (Rht) genes in wheat. The dwarf isolines all gave better FCR resistance when compared with their respective tall counterparts, although the Rht genes involved in these NILs are located on several different chromosomes. Treating plants with exogenous gibberellin increased FCR severity as well as seedling lengths in all of the isolines tested. Analysis of the expression of several defense genes with known correlation with resistance to FCR pathogens between the Rht isolines following FCR inoculation indicated that the better resistance of the dwarf isolines was not due to enhanced defense gene induction. These results suggested that the difference in FCR severity between the tall and dwarf isolines is likely due to their height difference per se or to some physiological and structural consequences of reduced height. Thus, caution should be taken when considering to exploit any FCR locus located near a height gene.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The 2008 US election has been heralded as the first presidential election of the social media era, but took place at a time when social media were still in a state of comparative infancy; so much so that the most important platform was not Facebook or Twitter, but the purpose-built campaign site my.barackobama.com, which became the central vehicle for the most successful electoral fundraising campaign in American history. By 2012, the social media landscape had changed: Facebook and, to a somewhat lesser extent, Twitter are now well-established as the leading social media platforms in the United States, and were used extensively by the campaign organisations of both candidates. As third-party spaces controlled by independent commercial entities, however, their use necessarily differs from that of home-grown, party-controlled sites: from the point of view of the platform itself, a @BarackObama or @MittRomney is technically no different from any other account, except for the very high follower count and an exceptional volume of @mentions. In spite of the significant social media experience which Democrat and Republican campaign strategists had already accumulated during the 2008 campaign, therefore, the translation of such experience to the use of Facebook and Twitter in their 2012 incarnations still required a substantial amount of new work, experimentation, and evaluation. This chapter examines the Twitter strategies of the leading accounts operated by both campaign headquarters: the ‘personal’ candidate accounts @BarackObama and @MittRomney as well as @JoeBiden and @PaulRyanVP, and the campaign accounts @Obama2012 and @TeamRomney. Drawing on datasets which capture all tweets from and at these accounts during the final months of the campaign (from early September 2012 to the immediate aftermath of the election night), we reconstruct the campaigns’ approaches to using Twitter for electioneering from the quantitative and qualitative patterns of their activities, and explore the resonance which these accounts have found with the wider Twitter userbase. A particular focus of our investigation in this context will be on the tweeting styles of these accounts: the mixture of original messages, @replies, and retweets, and the level and nature of engagement with everyday Twitter followers. We will examine whether the accounts chose to respond (by @replying) to the messages of support or criticism which were directed at them, whether they retweeted any such messages (and whether there was any preferential retweeting of influential or – alternatively – demonstratively ordinary users), and/or whether they were used mainly to broadcast and disseminate prepared campaign messages. Our analysis will highlight any significant differences between the accounts we examine, trace changes in style over the course of the final campaign months, and correlate such stylistic differences with the respective electoral positioning of the candidates. Further, we examine the use of these accounts during moments of heightened attention (such as the presidential and vice-presidential debates, or in the context of controversies such as that caused by the publication of the Romney “47%” video; additional case studies may emerge over the remainder of the campaign) to explore how they were used to present or defend key talking points, and exploit or avert damage from campaign gaffes. A complementary analysis of the messages directed at the campaign accounts (in the form of @replies or retweets) will also provide further evidence for the extent to which these talking points were picked up and disseminated by the wider Twitter population. Finally, we also explore the use of external materials (links to articles, images, videos, and other content on the campaign sites themselves, in the mainstream media, or on other platforms) by the campaign accounts, and the resonance which these materials had with the wider follower base of these accounts. This provides an indication of the integration of Twitter into the overall campaigning process, by highlighting how the platform was used as a means of encouraging the viral spread of campaign propaganda (such as advertising materials) or of directing user attention towards favourable media coverage. By building on comprehensive, large datasets of Twitter activity (as of early October, our combined datasets comprise some 3.8 million tweets) which we process and analyse using custom-designed social media analytics tools, and by using our initial quantitative analysis to guide further qualitative evaluation of Twitter activity around these campaign accounts, we are able to provide an in-depth picture of the use of Twitter in political campaigning during the 2012 US election which will provide detailed new insights social media use in contemporary elections. This analysis will then also be able to serve as a touchstone for the analysis of social media use in subsequent elections, in the USA as well as in other developed nations where Twitter and other social media platforms are utilised in electioneering.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we tackle the problem of unsupervised domain adaptation for classification. In the unsupervised scenario where no labeled samples from the target domain are provided, a popular approach consists in transforming the data such that the source and target distributions be- come similar. To compare the two distributions, existing approaches make use of the Maximum Mean Discrepancy (MMD). However, this does not exploit the fact that prob- ability distributions lie on a Riemannian manifold. Here, we propose to make better use of the structure of this man- ifold and rely on the distance on the manifold to compare the source and target distributions. In this framework, we introduce a sample selection method and a subspace-based method for unsupervised domain adaptation, and show that both these manifold-based techniques outperform the cor- responding approaches based on the MMD. Furthermore, we show that our subspace-based approach yields state-of- the-art results on a standard object recognition benchmark.