263 resultados para key schedule
Resumo:
Australia is undergoing a critical demographic transition: the population is ageing. By 2050, one in four Australians will be older than 65 years and by 2031, the number of older Australians requiring residential aged care will increase 63%, to 1.4 million (ABS, 2005). In anticipation of this global demographic transition, the World Health Organisation has advocated ‘active ageing’, identifying health, participation and security as the three key factors that enhance quality of life for people as they age (WHO, 2002). While there is considerable discussion and acceptance of active ageing principles, little is known about the experience of ‘active ageing’ for older Australians who live in Residential Aged Care Facilities (RACF). This research addresses this knowledge gap by exploring the key facilitators and barriers to quality of life and active ageing in aged care from the perspective of aged care residents (n=12). To do this, the project documented the initial expectations and daily life experience of new residents living in a RACF over a one-year period. Combined with in-depth interviews and surveys, the project utilised Photovoice methodology - where participants used photography to record their lived experiences. The initial findings suggest satisfaction with living in aged care centers around five key themes; resident’s mental attitude to living in aged care, forming positive peer and staff relationships, self-determination and maintaining independence, opportunities to participate in interesting activities, and living in a safe and comfortable physical environment. This paper reports on the last of these five key themes, focusing on the role of design in facilitating quality of life, specifically: “living within these walls” – safety, comfort and the physical environment.
Resumo:
A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt (Stɛ) schemes as far as both efficiency and security are concerned. A security model for signcryption, and thus joint encryption and signing, has been recently defined which considers possible attacks and security goals. Such a scheme is considered secure if the encryption part guarantees indistinguishability and the signature part prevents existential forgeries, for outsider but also insider adversaries. We propose two schemes of parallel signcryption, which are efficient alternative to Commit-then-Sign-and- Encrypt (Ct&G3&S). They are both provably secure in the random oracle model. The first one, called generic parallel encrypt and sign, is secure if the encryption scheme is semantically secure against chosen-ciphertext attacks and the signature scheme prevents existential forgeries against random-message attacks. The second scheme, called optimal parallel encrypt. and sign, applies random oracles similar to the OAEP technique in order to achieve security using encryption and signature components with very weak security requirements — encryption is expected to be one-way under chosen-plaintext attacks while signature needs to be secure against universal forgeries under random-plaintext attack, that is actually the case for both the plain-RSA encryption and signature under the usual RSA assumption. Both proposals are generic in the sense that any suitable encryption and signature schemes (i.e. which simply achieve required security) can be used. Furthermore they allow both parallel encryption and signing, as well as parallel decryption and verification. Properties of parallel encrypt and sign schemes are considered and a new security standard for parallel signcryption is proposed.
Resumo:
MOST PAN stages in Australian factories use only five or six batch pans for the high grade massecuite production and operate these in a fairly rigid repeating production schedule. It is common that some of the pans are of large dropping capacity e.g. 150 to 240 t. Because of the relatively small number and large sizes of the pans, steam consumption varies widely through the schedule, often by ±30% about the mean value. Large fluctuations in steam consumption have implications for the steam generation/condensate management of the factory and the evaporators when bleed vapour is used. One of the objectives of a project to develop a supervisory control system for a pan stage is to (a) reduce the average steam consumption and (b) reduce the variation in the steam consumption. The operation of each of the high grade pans within the schedule at Macknade Mill was analysed to determine the idle (or buffer) time, time allocations for essential but unproductive operations (e.g. pan turn round, charging, slow ramping up of steam rates on pan start etc.), and productive time i.e. the time during boil-on of liquor and molasses feed. Empirical models were developed for each high grade pan on the stage to define the interdependence of the production rate and the evaporation rate for the different phases of each pan’s cycle. The data were analysed in a spreadsheet model to try to reduce and smooth the total steam consumption. This paper reports on the methodology developed in the model and the results of the investigations for the pan stage at Macknade Mill. It was found that the operation of the schedule severely restricted the ability to reduce the average steam consumption and smooth the steam flows. While longer cycle times provide increased flexibility the steam consumption profile was changed only slightly. The ability to cut massecuite on the run among pans, or the use of a high grade seed vessel, would assist in reducing the average steam consumption and the magnitude of the variations in steam flow.
Resumo:
The results of comprehensive experimental studies of the operation, stability, and plasma parameters of the low-frequency (0.46 MHz) inductively coupled plasmas sustained by the internal oscillating rf current are reported. The rf plasma is generated by using a custom-designed configuration of the internal rf coil that comprises two perpendicular sets of eight currents in each direction. Various diagnostic tools, such as magnetic probes, optical emission spectroscopy, and an rf-compensated Langmuir probe were used to investigate the electromagnetic, optical, and global properties of the argon plasma in wide ranges of the applied rf power and gas feedstock pressure. It is found that the uniformity of the electromagnetic field inside the plasma reactor is improved as compared to the conventional sources of inductively coupled plasmas with the external flat coil configuration. A reasonable agreement between the experimental data and computed electromagnetic field topography inside the chamber is reported. The Langmuir probe measurements reveal that the spatial profiles of the electron density, the effective electron temperature, plasma potential, and electron energy distribution/probability functions feature a high degree of the radial and axial uniformity and a weak azimuthal dependence, which is consistent with the earlier theoretical predictions. As the input rf power increases, the azimuthal dependence of the global plasma parameters vanishes. The obtained results demonstrate that by introducing the internal oscillated rf currents one can noticeably improve the uniformity of electromagnetic field topography, rf power deposition, and the plasma density in the reactor.
Resumo:
Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.
Resumo:
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003. We propose the first protocol for key exchange among n ≥2k+1 parties which simultaneously achieves all of the following properties: 1. Key Privacy (including forward security) against active attacks by group outsiders, 2. Non-malleability — meaning in particular that no subset of up to k corrupted group insiders can ‘fix’ the agreed key to a desired value, and 3. Robustness against denial of service attacks by up to k corrupted group insiders. Our insider security properties above are achieved assuming the availability of a reliable broadcast channel.
Resumo:
B-Raf is one of the more commonly mutated proto-oncogenes implicated in the development of cancers. In this review, we consider the mechanisms and clinical impacts of B-Raf mutations in cancer and discuss the implications for the patient in melanoma, thyroid cancer and colorectal cancer, where B-Raf mutations are particularly common.
Resumo:
In 2001, the red imported fire ant (Solenopsis invicta Buren) was identified in Brisbane, Australia. An eradication program involving broadcast bait treatment with two insect growth regulators and a metabolic inhibitor began in September of that year and is currently ongoing. To gauge the impacts of these treatments on local ant populations, we examined long-term monitoring data and quantified abundance patterns of S. invicta and common local ant genera using a linear mixed-effects model. For S. invicta, presence in pitfalls reduced over time to zero on every site. Significantly higher numbers of S. invicta workers were collected on high-density polygyne sites, which took longer to disinfest compared with monogyne and low-density polygyne sites. For local ants, nine genus groups of the 10 most common genera analyzed either increased in abundance or showed no significant trend. Five of these genus groups were significantly less abundant at the start of monitoring on high-density polygyne sites compared with monogyne and low-density polygyne sites. The genus Pheidole significantly reduced in abundance over time, suggesting that it was affected by treatment efforts. These results demonstrate that the treatment regime used at the time successfully removed S. invicta from these sites in Brisbane, and that most local ant genera were not seriously impacted by the treatment. These results have important implications for current and future prophylactic treatment efforts, and suggest that native ants remain in treated areas to provide some biological resistance to S. invicta.
Resumo:
This paper examines the frame as it contributes to the debate on contemporary intermedial theatre and performance practices in light of increasing astriction between filmic and theatrical discourses. Informed by Auslander (1999), Lehmann (2006), and Giesekam (2007), and through an extrapolation of the tenets Eckersall, Gretchen and Scheer identify in the theory of New Media Dramaturgy, it will analyse two recent works of experimental theatre-making. RUFF (2013), a New York produced solo performance by one of the world’s leading female performers, explores her experiences of having a stroke. Total Dik! (2013), produced in Brisbane, Australia, is an interdisciplinary collaborative performance that examines aspects of dictatorship. They are clearly very different works yet there are a number of significant theatrical similarities in their use of Chroma Key technology and live compositing as material scenic devices. These works overtly and evocatively draw on the cinematic technique and technology of Chroma Key to augment and reveal the tensions and overlaps in their production processes.
Resumo:
Equitable claims now increasingly arise in Australian estate litigation, particularly in conjunction with family provision applications.
Resumo:
Since its discovery in 1991, the bacterial periplasmic oxidative folding catalyst DsbA has been the focus of intense research. Early studies addressed why it is so oxidizing and how it is maintained in its less stable oxidized state. The crystal structure of Escherichia coli DsbA (EcDsbA) revealed that the oxidizing periplasmic enzyme is a distant evolutionary cousin of the reducing cytoplasmic enzyme thioredoxin. Recent significant developments have deepened our understanding of DsbA function, mechanism, and interactions: the structure of the partner membrane protein EcDsbB, including its complex with EcDsbA, proved a landmark in the field. Studies of DsbA machineries from bacteria other than E. coli K-12 have highlighted dramatic differences from the model organism, including a striking divergence in redox parameters and surface features. Several DsbA structures have provided the first clues to its interaction with substrates, and finally, evidence for a central role of DsbA in bacterial virulence has been demonstrated in a range of organisms. Here, we review current knowledge on DsbA, a bacterial periplasmic protein that introduces disulfide bonds into diverse substrate proteins and which may one day be the target of a new class of anti-virulence drugs to treat bacterial infection. Antioxid. Redox Signal. 14, 1729–1760.
Resumo:
Governments, authorities, and organisations dedicate significant resources to encourage communities to prepare for and respond to natural hazards such as cyclones, earthquakes, floods, and bushfires. However, recent events, media attention, and ongoing academic research continue to highlight cases of non-compliance including swift water rescues. Individuals who fail to comply with instructions issued during natural hazards significantly impede the emergency response because they divert resources to compliance-enforcement and risk the lives of emergency service workers who may be required to assist them. An initial investigation of the field suggests several assumptions or practices that influence emergency management policy, communication strategy, and community behaviours during natural hazards: 1) that community members will comply with instructions issued by governments and agencies that represent the most authoritative voice, 2) that communication campaigns are shaped by intuition rather than evidence-based approaches (Wood et al., 2012), and 3) that emergency communication is linear and directional. This extended abstract represents the first stage of a collaborative research project that integrates industry and cross-disciplinary perspectives to provide evidence-based approaches for emergency and risk communication during the response and recovery phases of a natural hazard. Specifically, this abstract focuses on the approach taken and key elements that will form the development of a typology of compliance-gaining messages during the response phase of natural hazards, which will be the focus of the conference presentation.