556 resultados para Repeated Calls
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Samples of drugs are often given to doctors by pharmaceutical representatives as part of a marketing strategy. Despite the well described advantages of drug samples, little has been published on the potential adverse outcomes. A series of consumer calls to the Adverse Medicine Events Line has highlighted concerns regarding the quality use of medicines associated with drug samples. The most commonly reported problems were drug samples being supplied to patients with inadequate information regarding dosage, administration, storage and possible adverse effects. In addition, some patients were given excessive quantities of a drug. To reduce such adverse outcomes, the drug industry, health professionals and consumers should be aware of the potential problems associated with starter packs.
Resumo:
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.
Resumo:
Smartphones become very critical part of our lives as they offer advanced capabilities with PC-like functionalities. They are getting widely deployed while not only being used for classical voice-centric communication. New smartphone malwares keep emerging where most of them still target Symbian OS. In the case of Symbian OS, application signing seemed to be an appropriate measure for slowing down malware appearance. Unfortunately, latest examples showed that signing can be bypassed resulting in new malware outbreak. In this paper, we present a novel approach to static malware detection in resource-limited mobile environments. This approach can be used to extend currently used third-party application signing mechanisms for increasing malware detection capabilities. In our work, we extract function calls from binaries in order to apply our clustering mechanism, called centroid. This method is capable of detecting unknown malwares. Our results are promising where the employed mechanism might find application at distribution channels, like online application stores. Additionally, it seems suitable for directly being used on smartphones for (pre-)checking installed applications.
Resumo:
Cyclone Yasi struck the Cassowary Coast of Queensland in the early hours of Feb 3, 2011, destroying many homes sand property, including the destruction of the Cardwell and district historical society’s premises. With their own homes flattened, many were forced to live in mobile accommodation, with extended family, or leave altogether. The historical society members however were more devastated by their flattened foreshore museum and loss of their collection material. A call for assistance was made through the OHAA Qld branch, who along with QUT sponsored a trip to somehow plan how they could start to pick up the pieces to start again. This presentation highlights the need for communities to gather, preserve and present their own stories, in a way that is sustainable and meaningful to them, but that good advice and support along the way is important. Two 2 day workshops were held in March and then September, augmented by plenty of email correspondence and phone calls in between. Participants learnt that if they could conduct quality oral history interviews, they could later use these in many exhibitable ways including: documentary pieces; digital stories; photographic collections; creative short stories; audio segments –while also drawing closely together a suffering community. This story is not only about the people who were interviewed about the night Yasi struck, but the amazing women (all over 50) of the historical society who were willing to try and leap the digital divide that faces older Australians, especially those in rural Australia, so that their older local stories would not be lost and so that new stories could also be remembered.
Resumo:
"This essay is a critique of the scientific and policy rationales for transnational standardization. It analyzes two examples of policy export: early childhood standards in one of North America’s oldest Indigenous communities and the ongoing development of international standards for university teaching. It examines calls for American education to look to Finland, Canada, and Singapore for models of reform and innovation, focusing on the complex historical, cultural, and political settlements at work in these countries. The author addresses two affiliated challenges: first, the possibility of a principled understanding of evidence and policy in cultural and political-economic context, and second, the possibility of a mediative educational science that might guide policy formation." -- EDUCATIONAL RESEARCHER November 2011 vol. 40 no. 8 367-377
Resumo:
Objective: To determine the prevalence, severity, location, etiology, treatment, and healing of medical device-related pressure ulcers in intensive care patients for up to 7 days. Design: Prospective repeated measures study. Setting and participants: Patients in 6 intensive care units of 2 major medical centers, one each in Australia and the United States, were screened 1 day per month for 6 months. Those with device-related ulcers were followed daily up to 7 days. Outcome measures: Device-related ulcer prevalence, pain, infection, treatment, healing. Results: 15/483 patients had device-related ulcers and 9/15 with 11 ulcers were followed beyond screening. Their mean age was 60.5 years, most were men, over-weight, and at increased pressure ulcer risk. Endotracheal and nasogastric tubes were the cause of most device-related ulcers. Repositioning was the most frequent treatment. 4/11 ulcers healed within the 7 day observation period. Conclusion: Device-related ulcer prevalence was 3.1%, similar to that reported in the limited literature available, indicating an ongoing problem. Systematic assessment and repositioning of devices are the mainstays of care. We recommend continued prevalence determination and that nurses remain vigilant to prevent device-related ulcers, especially in patients with nasogastric and endotracheal tubes.
Resumo:
Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savings. Security comes up as one of the most important issues when voice communication and critical voice applications are considered. Not only the security methods provided by traditional telephony systems, but also additional methods are required to overcome security risks introduced by the public IP networks. SIP considers security problems of such a consolidation and provides a security framework. There are several security methods defined within SIP specifications and extensions. But, suggested methods can not solve all the security problems of SIP systems with various system requirements. In this thesis, a Kerberos based solution is proposed for SIP security problems, including SIP authentication and privacy. The proposed solution tries to establish flexible and scalable SIP system that will provide desired level of security for voice communications and critical telephony applications.
Resumo:
In July 2010, China announced the “National Plan for Medium and Long-term Education Reform and Development(2010-2020)” (PRC 2010). The Plan calls for an education system that: • promotes an integrated development which harnesses everyone’s talent; • combines learning and thinking; unifies knowledge and practice; • allows teachers to teach according to individuals’ needs; and • reforms education quality evaluation and personnel evaluation systems focusing on performance including character, knowledge, ability and other factors. This paper discusses the design and implementation of a Professional Learning Program (PLP) undertaken by 432 primary, middle and high school teachers in China. The aim of this initiative was to develop adaptive expertise in using technology that facilitated innovative science and technology teaching and learning as envisaged by the Chinese Ministry of Education’s (2010-2020) education reforms. Key principles derived from literature about professional learning and scaffolding of learning informed the design of the PLP. The analysis of data revealed that the participants had made substantial progress towards the development of adaptive expertise. This was manifested not only by advances in the participants’ repertoires of Subject Matter Knowledge and Pedagogical Content Knowledge but also in changes to their levels of confidence and identities as teachers. It was found that through time the participants had coalesced into a professional learning community that readily engaged in the sharing, peer review, reuse and adaption, and collaborative design of innovative science and technology learning and assessment activities.
Resumo:
PURPOSE: To test the reliability of Timed Up and Go Tests (TUGTs) in cardiac rehabilitation (CR) and compare TUGTs to the 6-Minute Walk Test (6MWT) for outcome measurement. METHODS: Sixty-one of 154 consecutive community-based CR patients were prospectively recruited. Subjects undertook repeated TUGTs and 6MWTs at the start of CR (start-CR), postdischarge from CR (post-CR), and 6 months postdischarge from CR (6 months post-CR). The main outcome measurements were TUGT time (TUGTT) and 6MWT distance (6MWD). RESULTS: Mean (SD) TUGTT1 and TUGTT2 at the 3 assessments were 6.29 (1.30) and 5.94 (1.20); 5.81 (1.22) and 5.53 (1.09); and 5.39 (1.60) and 5.01 (1.28) seconds, respectively. A reduction in TUGTT occurred between each outcome point (P ≤ .002). Repeated TUGTTs were strongly correlated at each assessment, intraclass correlation (95% CI) = 0.85 (0.76–0.91), 0.84 (0.73–0.91), and 0.90 (0.83–0.94), despite a reduction between TUGTT1 and TUGTT2 of 5%, 5%, and 7%, respectively (P ≤ .006). Relative decreases in TUGTT1 (TUGTT2) occurred from start-CR to post-CR and from start-CR to 6 months post-CR of −7.5% (−6.9%) and −14.2% (−15.5%), respectively, while relative increases in 6MWD1 (6MWD2) occurred, 5.1% (7.2%) and 8.4% (10.2%), respectively (P < .001 in all cases). Pearson correlation coefficients for 6MWD1 to TUGTT1 and TUGTT2 across all times were −0.60 and −0.68 (P < .001) and the intraclass correlations (95% CI) for the speeds derived from averaged 6MWDs and TUGTTs were 0.65 (0.54, 0.73) (P < .001). CONCLUSIONS: Similar relative changes occurred for the TUGT and the 6MWT in CR. A significant correlation between the TUGTT and 6MWD was demonstrated, and we suggest that the TUGT may provide a related or a supplementary measurement of functional capacity in CR.
Resumo:
Modified montmorillonite was prepared at different surfactant (HDTMA) loadings through ion exchange. The conformational arrangement of the loaded surfactants within the interlayer space of MMT was obtained by computational modelling. The conformational change of surfactant molecules enhance the visual understanding of the results obtained from characterization methods such as XRD and surface analysis of the organoclays. Batch experiments were carried out for the adsorption of p-chlorophenol (PCP) and different conditions (pH and temperature) were used in order to determine the optimum sorption. For comparison purpose, the experiments were repeated under the same conditions for p-nitrophenol (PNP). Langmuir and Freundlich equations were applied to the adsorption isotherm of PCP and PNP. The Freundlich isotherm model was found to be the best fit for both of the phenolic compounds. This involved multilayer adsorptions in the adsorption process. In particular, the binding affinity value of PNP was higher than that of PCP and this is attributable to their hydrophobicities. The adsorption of the phenolic compounds by organoclays intercalated with highly loaded surfactants was markedly improved possibly due to the fact that the intercalated surfactant molecules within the interlayer space contribute to the partition phases, which result in greater adsorption of the organic pollutants.
Resumo:
In this thesis, I contribute to the study of how arrangements are made in social interaction. Using conversation analysis, I examine a corpus of 375 telephone calls between employees and clients of three Community Home Care (CHC) service agencies in metropolitan Adelaide, South Australia. My analysis of the CHC data corpus draws upon existing empirical findings within conversation analysis in order to generate novel findings about how people make arrangements with one another, and some of the attendant considerations that parties to such an activity can engage in: Prospective informings as remote proposals for a future arrangement – Focusing on how employees make arrangements with clients, I show how the employees in the CHC data corpus use ‘prospective informings’ to detail a future course of action that will involve the recipient of that informing. These informings routinely occasion a double-paired sequence, where informers pursue a response to their informing. This pursuit often occurs even after recipients have provided an initial response. This practice for making arrangements has been previously described by Houtkoop (1987) as ‘remote proposing.’ I develop Houtkoop’s analysis to show how an informing of a future arrangement can be recompleted, with response solicitation, as a proposal that is contingent upon a recipient’s acceptance. Participants’ understanding of references to non-present third parties – In the process of making arrangements, references are routinely made to non-present third parties. In the CHC data corpus, these third parties are usually care workers. Prior research (e.g., Sacks & Schegloff, 1979; Schegloff, 1996b) explains how the use of ‘recognitional references’ (such as the bare name ‘Kerry’), conveys to recipients that they should be able to locate the referent from amongst their acquaintances. Conversely, the use of ‘non-recognitional references’ (such as the description ‘a lady called Kerry’), conveys that recipients are unacquainted with the referent. I examine instances where the selection of a recognitional or non-recognitional reference form is followed by a recipient initiating repair on that reference. My analysis provides further evidence thatthe existing analytic account of these references corresponds to the way in which participants themselves make sense of them. My analysis also advances an understanding of how repair can be used, by recipients, to indicate the inappositeness of a prior turn. Post-possible-completion accounts – In a case study of a problematic interaction, I examine a misunderstanding that is not resolved within the repair space, the usual defence of intersubjectivity in interaction (cf. Schegloff, 1992b). Rather, I explore how the source of trouble is addressed, outside of the sequence of its production, with a ‘post-possible-completion account.’ This account specifies the basis of a misunderstanding and yet, unlike repair, does so without occasioning a revised response to a trouble-source turn. By considering various aspects of making arrangements in social interaction, I highlight some of the rich order that underpins the maintenance of human relationships across time. In the concluding section of this thesis I review this order, while also discussing practical implications of this analysis for CHC practice.
Resumo:
In an increasingly business technology (BT) dependent world, the impact of the extraordinary changes brought about by the nexus of mobile and cloud technologies, social media and big data is increasingly being felt in the board room. As leaders of enterprises of every type and size, board directors can no longer afford to ignore, delegate or avoid BT-related decisions. Competitive, financial and reputational risk is increased if boards fail to recognize their role in governing technology as an asset and in removing barriers to improving enterprise business technology governance (EBTG). Directors’ awareness of the need for EBTG is increasing. However, industry research shows that board level willingness to rectify the gap between awareness and action is very low or non-existent. This literature review-based research identifies barriers to EBTG effectiveness. It provides a practical starting point for board analysis. We offer four outcomes that boards might focus on to ensure the organizations they govern are not left behind by those led by the upcoming new breed of technology-savvy leaders. Most extant research looks backward for examples, examining data pre-2010, the time when a tipping point in the personal and business use of multimedia and mobile-internet devices significantly deepened the impacts of the identified nexus technology forces, and began rapidly changing the way many businesses engage with their customers, employees and stakeholders. We situate our work amidst these nexus forces, discuss the board’s role in EBTG in this context, and modernize current definitions of enterprise technology governance. The primary limitation faced is the lack of scholarly research relating to EBTG in the rapidly changing digital economy. Although we have used recent (2011 - 2013) industry surveys, the volume of these surveys and congruence across them is significant in terms of levels of increased awareness and calls for increased board attention and competency in EBTG and strategic information use. Where possible we have used scholarly research to illustrate or discuss industry findings.
Resumo:
Objectives: Smoking cessation has been shown to be an important intervention for preventing cardiovascular events and improving the health of patients with heart disease. However, unaided quit attempts in these patients often leads to high rates of failure and a return to smoking. Outpatient smoking cessation clinics using face-to-face counseling, ongoing behavioral support, advice on smoking pharmacotherapy and objective monitoring, have been found to be one of the most effective interventions for improving quit smoking rates. An outpatient smoking cessation clinic was trialed within a cardiac rehabilitation service in order to explore its effects on smoking rates for patients with or at risk of heart disease. Attendance rates to the clinic were also monitored. Methods: A descriptive exploratory design was used for this newly developed clinic. Patients who currently smoked tobacco and who had a history of either coronary artery disease, heart failure, atrial fibrillation or those seen under a chest pain assessment service were invited to an outpatient ‘Cardiac Patients Smokers Clinic’. Initially patients were offered up to 10 clinic visits over a 3 month period. Follow-up clinic visits were conducted at 3, 6 and 12 months. A portable carbon monoxide meter was used to objectively measure levels of smoking and validate smoking abstinence. Primary outcomes included rates of attendance. Results: Preliminary findings showed 24 per cent of participants (N = 6) completed all their clinic visits and remained smoke free as measured by their ongoing expired carbon monoxide readings. Clinic attendance rates appeared lowest for those with significant mental health issues such as schizophrenia or substance abuse. However, rates of attendance were improved by having an administration officer make reminder telephone calls prior to clinic visits. Conclusions: Early findings indicate the feasibility of providing a specialist smoking cessation clinic within a cardiac rehabilitation service. Further, that reminder telephone calls prior to appointments improved attendance rates in patients with heart disease to this type of clinic. However, future investigations are warranted.
Resumo:
In light of the high stakes of the deepwater horizon civil trial and the important precedent-setting role that the case will have on the assessment of future marine disasters, the methodologies underpinning the calculations of damage on both sides will be subjected to considerable scrutiny. Despite the importance of the case, however, there seems to be a pronounced lack of convergence about it in the academic literature. Contributions from scientific journals frequently make comparisons to the Ixtoc I oil spill off the coast of Mexico in 1979; the legal literature, by stark contrast, seems to be much more focused on the Exxon Valdez spill that occurred off the shores of Alaska in 1989. This paper accordingly calls for a more thorough consideration of other analogs beyond the Exxon Valdez spill—most notably, the Ixtoc I incident—in arriving at an assessment of the damage caused by the Deepwater Horizon disaster.