271 resultados para 106-649
Resumo:
Background Brominated flame retardants (BFRs), are chemicals widely used in consumer products including electronics, vehicles, plastics and textiles to reduce flammability. Experimental animal studies have confirmed that these compounds may interfere with thyroid hormone homeostasis and neurodevelopment but to date health effects in humans have not been systematically examined. Objectives To conduct a systematic review of studies on the health impacts of exposure to BFRs in humans, with a particular focus on children. Methods A systematic review was conducted using the Medline and EMBASE electronic databases up to 1 February 2012. Published cohort, cross-sectional, and case-control studies exploring the relationship between BFR exposure and various health outcomes were included. Results In total, 36 epidemiological studies meeting the pre-determined inclusion criteria were included. Plausible outcomes associated with BFR exposure include diabetes, neurobehavioral and developmental disorders, cancer, reproductive health effects and alteration in thyroid function. Evidence for a causal relationship between exposure to BFRs and health outcomes was evaluated within the Bradford Hill framework. Conclusion Although there is suggestive evidence that exposure to BFRs is harmful to health, further epidemiological investigations particularly among children, and long-term monitoring and surveillance of chemical impacts on humans are required to confirm these relationships.
Resumo:
Based on an investigation of 106 projects involving the use of building information modelling (BIM), this paper examines current BIM practices in China, and assesses how various practices alter their effectiveness. The results reveal that in current practice BIM is principally employed as a visualization tool, and how it is implemented is significantly associated with project characteristics. BIM use in the majority of the surveyed projects is seen to have positive outcomes, with the benefits of improved task effectiveness being more substantial than those related to efficiency improvement. The results also provide evidence that project characteristics significantly influence the success of BIM use; however, more substantial contributing factors to BIM effectiveness are the extent of integrated use and client/owner support. While indicating that current BIM practices involve both technological and organizational problems, the findings also provide insights into how the potential for BIM could be better exploited within the industry.
Resumo:
The successful establishment and growth of mixed-species forest plantations requires that complementary or facilitatory species be identified. This can be difficult in many tropical areas because the growth characteristics of endemic species are often unknown, particularly when grown at potentially higher densities in plantations than in natural forests. Here, we investigate whether wood density is a useful and readily accessible trait for choosing complementary species for mixed species plantations. Wood density represents the carbon investment per unit volume of stem with a trade-off generally found between fast (low wood density) and slow (high wood density) growing species. To do this, we use data collected from 18 highly diverse mixed species plantations (4–23 mostly native species) aged from 6 to 11 years at the time of data collection located on Leyte Island, Philippines. We found significant negative correlations between wood densities and the height of the most abundant species, as well as with measures of overall stand growth and tree diameter size distribution. Not only do species with denser woods have slower growth rates, but also mixed-species plantations with higher average wood density and higher stem density were also less productive, at least in these young plantations. Similarly, stands with a high diversity in wood densities were less productive. There is growing interest in making greater use of native multi-species mixtures in smallholder and community planting programs in the tropics, and our results show databases of wood density values may help improve their design. In the early development stages of plantations, canopy closure and rapid height growth are usually key silvicultural targets, and wood density values can predict the rapid height development of species. If plantations are being grown for the livelihood of small landholders then the best target is to choose some species with different wood densities. This allows an early harvest of low-wood density species for early income, and will also reduce competition for slower growing trees with higher wood densities for later income generation.
Resumo:
INTRODUCTION Influenza vaccination in pregnancy is recommended for all women in Australia, particularly those who will be in their second or third trimester during the influenza season. However, there has been no systematic monitoring of influenza vaccine uptake among pregnant women in Australia. Evidence is emerging of benefit to the infant with respect to preventing influenza infection in the first 6 months of life. The FluMum study aims to systematically monitor influenza vaccine uptake during pregnancy in Australia and determine the effectiveness of maternal vaccination in preventing laboratory-confirmed influenza in their offspring up to 6 months of age. METHODS AND ANALYSIS A prospective cohort study of 10 106 mother-infant pairs recruited between 38 weeks gestation and 55 days postdelivery in six Australian capital cities. Detailed maternal and infant information is collected at enrolment, including influenza illness and vaccination history with a follow-up data collection time point at infant age 6 months. The primary outcome is laboratory-confirmed influenza in the infant. Case ascertainment occurs through searches of Australian notifiable diseases data sets once the infant turns 6 months of age (with parental consent). The primary analysis involves calculating vaccine effectiveness against laboratory-confirmed influenza by comparing the incidence of influenza in infants of vaccinated mothers to the incidence in infants of unvaccinated mothers. Secondary analyses include annual and pooled estimates of the proportion of mothers vaccinated during pregnancy, the effectiveness of maternal vaccination in preventing hospitalisation for acute respiratory illness and modelling to assess the determinants of vaccination. ETHICS AND DISSEMINATION The study was approved by all institutional Human Research Ethics Committees responsible for participating sites. Study findings will be published in peer review journals and presented at national and international conferences. TRIAL REGISTRATION NUMBER The study is registered with the Australia and New Zealand Clinical Trials Registry (ANZCTR) number: 12612000175875.
Resumo:
A numerical study is carried out to investigate the transition from laminar to chaos in mixed convection heat transfer inside a lid-driven trapezoidal enclosure. In this study, the top wall is considered as isothermal cold surface, which is moving in its own plane at a constant speed, and a constant high temperature is provided at the bottom surface. The enclosure is assumed to be filled with water-Al2O3 nanofluid. The governing Navier–Stokes and thermal energy equations are expressed in non-dimensional forms and are solved using Galerkin finite element method. Attention is paid in the present study on the pure mixed convection regime at Richandson number, Ri = 1. The numerical simulations are carried out over a wide range of Reynolds (0.1 ≤ Re ≤ 103) and Grashof (0.01 ≤ Gr ≤ 106) numbers. Effects of the presence of nanofluid on the characteristics of mixed convection heat transfer are also explored. The average Nusselt numbers of the heated wall are computed to demonstrate the influence of flow parameter variations on heat transfer. The corresponding change of flow and thermal fields is visualized from the streamline and the isotherm contour plots.
Resumo:
Numerical investigation of free convection heat transfer in an attic shaped enclosure with differentially heated two inclined walls and filled with air is performed in this study. The left inclined surface is uniformly heated whereas the right inclined surface is uniformly cooled. There is a heat source placed on the right side of the bottom surface. Rest of the bottom surface is kept as adiabatic. Finite volume based commercial software ANSYS 15 (Fluent) is used to solve the governing equations. Dependency of various flow parameters of fluid flow and heat transfer is analyzed including Rayleigh number, Ra ranging from 103 to 106, heater size from 0.2 to 0.6, heater position from 0.3 to 0.7 and aspect ratio from 0.2 to 1.0 with a fixed Prandtl number of 0.72. Outcomes have been reported in terms of temperature and stream function contours and local Nusselt number for various Ra, heater size, heater position, and aspect ratio. Grid sensitivity analysis is performed and numerically obtained results have been compared with those results available in the literature and found good agreement.
Resumo:
The World Health Organization identifies road trauma as a major public health issue in every country; most notably among low-to-middle income countries. More than 90% of all road fatalities occur in these countries, although they have only 48% of all registered vehicles [1]. Unprecedented focus has been placed on reducing the global road trauma burden through the United Nations Decade of Action for Road Safety (2011-2020). China is rapidly transitioning from a nation of bicycle riders and pedestrians to one where car ownership and use is increasing. This transition presents important public health, mobility, and safety challenges. Rapid motorisation has resulted in an increased road trauma burden, shouldered disproportionately among the population. Vulnerable road users (bicyclists, pedestrians, and motorcyclists) are of particular concern, representing 70% of all road-related fatalities [1]. Furthermore, those at greatest risk of sustaining a crash-related disability are: male, older, less educated, and earning a lower income [2] and residing in urban areas [3], with higher fatality rates in north-western poorer provinces [3]. Speeding is a key factor in road crashes in China [1, 4] and is one of two risk factors targeted in the Bloomberg Philanthropies-funded Global Road Safety Program operating in two Chinese cities over five year [5] to which the first author has provided expert advice. However, little evidence exists to help understand the factors underpinning speeding behaviour. Previous research conducted by the authors in Beijing and Hangzhou explored personal, social, and legal factors relating to speeding to assist in better understanding the motivations for non-compliance with speed limits. Qualitative and quantitative research findings indicated that speeding is relatively common, including self-reported travel speeds of greater than 30 km/hour above posted speed limits [6], and that the road safety laws and enforcement practices may, in some circumstances, contribute to this [7]. Normative factors were also evident; the role of friends, family members and driving instructors were influential. Additionally, using social networks to attempt to avoid detection and penalty was reported, thereby potentially reinforcing community perceptions that speeding is acceptable [8, 9]. The authors established strong collaborative links with the Chinese Academy of Sciences and Zhejiang Police College to conduct this research. The first author has worked in both institutions for extended time periods and recognises that research must include an understanding of culturally-relevant issues if road safety is to improve in China. Future collaborations to assist in enhancing our understanding of such issues are welcomed. References [1] World Health Organization. (2009). Global status report on road safety: Time for action; Geneva. [2] Chen, H., Du, W., & Li, N. (2013). The socioeconomic inequality in traffic-related disability among Chinese adults: the application of concentration index. Accident Analysis & Prevention, 55(101-106). [3] Wang, S. Y., Li, Y. H., Chi, G. B., Xiao, S. Y., Ozanne-Smith, J., Stevenson, M., & Phillips, M. (2008). Injury-related fatalities in China: an under-recognised public-health problem. The Lancet (British edition), 372(9651), 1765-1773. [4] He, J., King, M. J., Watson, B., Rakotonirainy, A., & Fleiter, J. J. (2013). Speed enforcement in China: National, provincial and city initiatives and their success. Accident Analysis & Prevention, 50, 282-288. [5] Bhalla, K., Li, Q., Duan, L., Wang, Y., Bishai, D., & Hyder, A. A. (2013). The prevalence of speeding and drink driving in two cities in China: a mid project evaluation of ongoing road safety interventions. Injury, 44, 49-56. doi:10.1016/S0020-1383(13)70213-4. [6] Fleiter, J. J., Watson, B., & Lennon, A. (2013). Awareness of risky behaviour among Chinese drivers. Peer-reviewed paper presented at 23rd Canadian Multidisciplinary Road Safety Conference, Montréal, Québec. [7] Fleiter, J. J., Watson, B., Lennon, A., King, M. J., & Shi, K. (2009). Speeding in Australia and China: A comparison of the influence of legal sanctions and enforcement practices on car drivers. Peer-reviewd paper presented at Australasian Road Safety Research Policing Education Conference, Sydney. [8] Fleiter, J. J., Watson, B., Lennon, A., King, M. J., & Shi, K. (2011). Social influences on drivers in China. Journal of the Australasian College of Road Safety, 22(2), 29-36. [9] Fleiter, J. J., Watson, B., Guan, M. Q., Ding, J. Y., & Xu, C. (2013). Characteristics of Chinese Drivers Attending a Mandatory Training Course Following Licence Suspension. Peer-reviewed paper presented at Road Safety on Four Continents, Beijing, China.
Resumo:
Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.
Resumo:
In North America and Europe, the binary toxin positive Clostridium difficile strains of the ribotypes 027 and 078 have been associated with death, toxic megacolon and other adverse outcomes. Following an increase in C. difficile infections (CDIs) in Queensland, a prevalence study involving 175 hospitals was undertaken in early 2012, identifying 168 cases of CDI over a 2 month period. Patient demographics and clinical characteristics were recorded, and C. difficile isolates were ribotyped and tested for the presence of binary toxin genes. Most patients (106/168, 63.1%) were aged over 60 years. Overall, 98 (58.3%) developed symptoms after hospitalisation; 89 cases (53.0%) developed symptoms more than 48 hours after admission. Furthermore, 27 of the 62 (67.7%) patients who developed symptoms in the community ad been hospitalised within the last 3 months. Thirteen of the 168 (7.7%) cases identified had severe disease, resulting in admission to the Intensive Care Unit or death within 30 days of the onset of symptoms. The 3 most common ribotypes isolated were UK 002 (22.9%), UK 014 (13.3%) and the binary toxin-positive ribotype UK 244 (8.4%). The only other binary toxin positive ribotype isolated was UK 078 (n = 1). Of concern was the detection of the binary toxin positive ribotype UK 244, which has recently been described in other parts of Australia and New Zealand. No isolates were of the international epidemic clone of ribotype UK 027, although ribotype UK 244 is genetically related to this clone. Further studies are required to track the epidemiology of ribotype UK 244 in Australia and New Zealand. Commun Dis Intell 2014;38(4):E279–E284.
Resumo:
The electrochemical formation of nanostructured materials is generally achieved by reduction of a metal salt onto a substrate that does not influence the composition of the deposit. In this work we report that Ag, Au and Pd electrodeposited onto Cu under conditions where galvanic replacement is not viable and hydrogen gas is evolved results in the formation of nanostructured surfaces that unexpectedly incorporate a high concentration of Cu in the final material. Under cathodic polarization conditions the electrodissolution/corrosion of Cu occurs which provides a source of ionic copper that is reduced at the surface-electrolyte interface. The nanostructured Cu/M (M = Ag, Au and Pd) surfaces are investigated for their catalytic activity for the reduction of 4 nitrophenol by NaBH4 where Cu/Ag was found to be extremely active. This work indicates that a substrate electrode can be utilized in an interesting manner t make bimetallic nanostructures with enhanced catalytic activity.
Resumo:
Profiled steel roof claddings in Australia and its neighbouring countries are commonly made of very thin high tensile steel and are crest-fixed intermittently with screw fasteners. The failure of the roof cladding systems was due to a local failure (dimpling of crests I pull-through) at the fasteners under wind uplift Cyclic wind uplift during cyclones causes fatigue cracking to occur at the fastener holes which leads to pull-through failures at lower load levels. At present the design of these claddings is entirely based on testing. In order to improve the understanding of the behaviour and the design and test methods of these claddings under wind uplift loading during storms and cyclones, a detailed investigation consisting of finite element analyses, static and fatigue experiments and cyclonic wind modelling was carried out on two-span roofing assemblies of three common roofing profiles. This paper presents the details of this investigation and its important results.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
Resumo:
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.
Resumo:
The continuous changing impacts appeared in all solution understanding approaches in the projects management field (especially in the construction field of work) by adopting dynamic solution paths. The paper will define what argue to be a better relational model for project management constraints (time, cost, and scope). This new model will increase the success factors of any complex program / project. This is a qualitative research adopting a new avenue of investigation by following different approach of attributing project activities with social phenomena, and supporting phenomenon with field of observations rather than mathematical method by emerging solution from human, and ants' colonies successful practices. The results will show the correct approach of relation between the triple constraints considering the relation as multi agents system having specified communication channels based on agents locations. Information will be transferred between agents, and action would be taken based on constraint agents locations in the project structure allowing immediate changes abilities in order to overcome issues of over budget, behind schedule, and additional scope impact. This is complex adaptive system having self organizes technique, and cybernetic control. Resulted model can be used for improving existing project management methodologies.