364 resultados para 338.3


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Samples of marble from Chillagoe, North Queensland have been analyzed using scanning electron microscopy (SEM) with energy dispersive X-ray spectroscopy (EDS) and Raman spectroscopy. Chemical analyses provide evidence for the presence of minerals other than limestone and calcite in the marble, including silicate minerals. Some of these analyses correspond to silicate minerals. The Raman spectra of these crystals were obtained and the Raman spectrum corresponds to that of allanite from the Arizona State University data base (RRUFF) data base. The combination of SEM with EDS and Raman spectroscopy enables the characterization of the mineral allanite in the Chillagoe marble.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective. To estimate the burden of disease attributable to excess body weight using the body mass index (BMI), by age and sex, in South Africa in 2000. Design. World Health Organization comparative risk assessment (CRA) methodology was followed. Re-analysis of the 1998 South Africa Demographic and Health Survey data provided mean BMI estimates by age and sex. Populationattributable fractions were calculated and applied to revised burden of disease estimates. Monte Carlo simulation-modelling techniques were used for the uncertainty analysis. Setting. South Africa. Subjects. Adults 30 years of age. Outcome measures. Deaths and disability-adjusted life years (DALYs) from ischaemic heart disease, ischaemic stroke, hypertensive disease, osteoarthritis, type 2 diabetes mellitus, and selected cancers. Results. Overall, 87% of type 2 diabetes, 68% of hypertensive disease, 61% of endometrial cancer, 45% of ischaemic stroke, 38% of ischaemic heart disease, 31% of kidney cancer, 24% of osteoarthritis, 17% of colon cancer, and 13% of postmenopausal breast cancer were attributable to a BMI 21 kg/m2. Excess body weight is estimated to have caused 36 504 deaths (95% uncertainty interval 31 018 - 38 637) or 7% (95% uncertainty interval 6.0 - 7.4%) of all deaths in 2000, and 462 338 DALYs (95% uncertainty interval 396 512 - 478 847) or 2.9% of all DALYs (95% uncertainty interval 2.4 - 3.0%). The burden in females was approximately double that in males. Conclusions. This study shows the importance of recognising excess body weight as a major risk to health, particularly among females, highlighting the need to develop, implement and evaluate comprehensive interventions to achieve lasting change in the determinants and impact of excess body weight.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Out of the Box Festival was founded in 1994 by the Queensland Performing Arts Centre and has been held biannually ever since both within and around the centre in what is now known as the Cultural Precinct at Southbank. It is unique in Australia in that it caters entirely to children aged 8 years and under, with a highly curated program of ticketed performance events, workshops and free arts-based events. It is attended by school and kindergarten groups and by families, and besides engaging children in high quality arts experiences, the festival is also a platform for advocating the developmental and educational benefits of the arts for children. Dr Mark Radvan was the artistic director of the 2008 festival, with responsibility for developing the curatorial direction of each festival, for creating and programming its events, and for working with festival partners The Queensland Art Gallery, The Queensland Museum, The State Library of Queensland and The Queensland Theatre Company. Radvan designed selected and commissioned works to demonstrate how the arts create memorable, celebratory and immersive experiences that stimulate children’s imagination, their curiosity and confidence about the material world and the cultures of its people. A core event was an outdoor music and dance performance space featuring entirely Indigenous performers that was not only the beating heart of the festival, but served to underlie the importance of mainstreaming awareness of our first peoples in the increasingly culturally diverse communities of children attending.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

10 page document containing expert assessment of shortcomings of Western Australian State Planning Policy SPP3.7- Planning for Bushfire Risk Management. Document produced on behalf of QUT and submitted to and published by the WAPC as part of their public consultation process for their draft policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl. Grøstl is a so-called wide-pipe construction where the size of the internal state is significantly larger than the size of the output. This has the effect that all known, generic attacks on the hash function are made much more difficult. Grøstl has good performance on a wide range of platforms and counter-measures against side-channel attacks are well-understood from similar work on the AES.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two �fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also reflected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a study of socioeconomically disadvantaged children's acquisition of school literacies, a university research team investigated how a group of teachers negotiated critical literacies and explored notions of social power with elementary children in a suburban school located in an area of high poverty. Here we focus on a grade 2/3 classroom where the teacher and children became involved in a local urban renewal project and on how in the process the children wrote about place and power. Using the students' concerns about their neighborhood, the teacher engaged her class in a critical literacy project that not only involved a complex set of literate practices but also taught the children about power and the possibilities for local civic action. In particular, we discuss examples of children's drawing and writing about their neighborhoods and their lives. We explore how children's writing and drawing might be key elements in developing "critical literacies" in elementary school settings. We consider how such classroom writing can be a mediator of emotions, intellectual and academic learning, social practice, and political activism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Minnie’s Bow-Toons follows the adventures of Minnie Mouse and her best friend Daisy Duck as they run Minnie's Bow-tique, a specialty shop stocked only with colorful bows and bowties. In the third season Minnie, Daisy and their assistant Cuckoo Loca opens a pet grooming salon adjacent to the Bow-tique. In the fourth season Minnie, Daisy and Cuckoo Loca travel around the world, visiting cities like London, Venice and Tokyo.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses documentary heritage collection enrichment programs run with community participation. Two library programs at the State Library of Queensland (SLQ) are explored as examples. The programs are the Flood and Cyclone Mosaic and Pitch in! The challenges for the implementation of such programs in Indonesia are also discussed in the last section of the paper. This paper provides better understanding of documentary heritage collection enrichment strategies conducted by a public library in Queensland, Australia. It is expected that this paper will inspire public libraries in Indonesia to maximise their documentary collection enrichment strategies with community participation. This paper can also help the National Library of Indonesia (PNRI) in designing their documentary heritage collections enrichment strategies in its role as the Web portal provider of the national documentary heritage repository. Tulisan ini membahas program pengayaan koleksi warisan dokumenter yang dilaksanakan dengan partisipasi masyarakat. Dua program perpustakaan di the State Library of Queensland (SLQ) dieksplorasi sebagai contoh. Program-program yang dibahas adalah Flood and Cyclone Mosaic dan Pitch In! Tantangan yang harus dihadapi untuk penerapan program semacam di Indonesia juga dibahas di bagian akhir tulisan. Tulisan ini memberikan pemahaman mengenai strategi pengayaan koleksi warisan dokumenter yang dilakukan oleh sebuah perpustakaan umum di Queensland, Australia. Diharapkan tulisan ini dapat menjadi inspirasi bagi perpustakaan umum di Indonesia untuk dapat memaksimalkan strategi pengayaan koleksi dokumenter mereka dengan melibatkan partisipasi masyarakat. Tulisan ini juga dapat membantu Perpustakaan Nasional Republik Indonesia (PNRI) dalam merancang strategi pengayaan koleksi warisan dokumenter mereka dalam perannya sebagai penyedia portal Web repositori warisan dokumenter bangsa.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The structures of the cocrystalline adducts of 3,5-dinitrobenzoic acid (3,5-DNBA) with 4-aminosalicylic acid (PASA), the 1:1 partial hydrate, C7H4N2O6 .C7H7NO3 . 2H2O, (I) and 2-hydroxy-3-(1H-indol-3-yl)propenoic acid (HIPA) and the 1:1:1 d6-dimethylsulfoxide solvate, C7H4N2O6 . C11H9NO3 . C2D6OS, (II) are reported. The crystal substructure of (I) comprises two centrosymmetric hydrogen-bonded R2/2(8) homodimers, one with 3,5-DNBA, the other with PASA, and an R2/2(8) 3,5-DNBA-PASA heterodimer. In the crystal, inter-unit amine N-H...O and water O-H...O hydrogen bonds generate a three-dimensional supramolecular structure. In (II), the asymmetric unit consists of the three constituent molecules which form an essentially planar cyclic hydrogen-bonded heterotrimer unit [graph set R2/3(17)] through carboxyl, hydroxy and amino groups. These units associate across a crystallographic inversion centre through the HIPA carboxylic acid group in an R2/2~(8) hydrogen-bonding association, giving a zero-dimensional structure lying parallel to (100). In both structures, pi--pi interactions are present [minimum ring centroid separations: 3.6471(18)A in (I) and 3.5819(10)A in (II)].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The structures of the 1:1 co-crystalline adduct C8H6BrN3S . C7H5NO4 (I) and the salt C8H7BrN3S+ C7H3N2O7- (II) from the interaction of 5-(4-bromophenyl)-1,3,4-thiadiazol-2-amine with 4-nitrobenzoic acid and 3,5-dinitrosalicylic acid, respectively, have been determined. The primary inter-species association in both (I) and (II) is through duplex R2/2(8) (N-H...O/O-H...O) or (N-H...O/N-H...O) hydrogen bonds, respectively, giving heterodimers. In (II), these are close to planar [dihedral angles between the thiadiazole ring and the two phenyl rings are 2.1(3)deg. (intra) and 9.8(2)deg. (inter)], while in (I) these angles are 22.11(15) and 26.08(18)deg., respectively. In the crystal of (I), the heterodimers are extended into a one-dimensional chain along b through an amine N-...N(thiadiazole) hydrogen bond but in (II), a centrosymmetric cyclic heterotetramer structure is generated through N-H...O hydrogen bonds to phenol and nitro O-atom acceptors and features, together with the primary R2/2(8) interaction, conjoined R4/6(12), R2/1(6) and S(6) ring motifs. Also present in (I) are pi--pi interactions between thiadiazole rings [minimum ring centroid separation, 3.4624(16)deg.] as well as short Br...O(nitro) interactions in both (I) and (II) [3.296(3)A and 3.104(3)A, respectively].