584 resultados para obstacles to the fight


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article presents two approaches that have dominated International Relations in their approach to the international politics of health. The statist approach, which is primarily security-focused, seeks to link health initiatives to a foreign or defence policy remit. The globalist approach, in contrast, seeks to advance health not because of its intrinsic security value but because it advances the well-being and rights of individuals. This article charts the evolution of these approaches and demonstrates why both have the potential to shape our understanding of the evolving global health agenda. It examines how the statist and globalist perspectives have helped shape contemporary initiatives in global health governance and suggests that there is evidence of an emerging convergence between the two perspectives. This convergence is particularly clear in the articulation of a number of UN initiatives in this area—especially the One World, One Health Strategic Framework and the Oslo Ministerial Declaration (2007) which inspired the first UN General Assembly resolution on global health and foreign policy in 2009 and the UN Secretary-General's note ‘Global health and foreign policy: strategic opportunities and challenges'. What remains to be seen is whether this convergence will deliver on securing states’ interest long enough to promote the interests of the individuals who require global efforts to deliver local health improvements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In large sedimentary basins with layers of different rocks, the groundwater flow between aquifers depends on the hydraulic conductivity (K) of the separating low-permeable rocks, or aquitards. Three methods were developed to evaluate K in aquitards for areas with limited field data: • Coherence and harmonic analysis: estimates the regional-scale K based on water-level fluctuations in adjacent aquifers. • Cokriging and Bayes' rule: infers K from downhole geophysical logs. • Fluvial process model: reproduces the lithology architecture of sediment formations which can be converted to K. These proposed methods enable good estimates of K and better planning of further drillholes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this investigation of rehabilitation professionals in Australasia, where the profession of rehabilitation counseling might be described as emerging, the appropriateness of the Rehabilitation Skills Inventory for use in Australasian settings was evaluated. This resulted in an amendment to the original instrument and the development of the RSI (Amended) instrument. The instrument validation is discussed and the four component solution described.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study examines the important contributions of clinical faculty toward the education of the future workforce of Certified Registered Nurse Anesthetists (CRNAs). Differences in workload, work activities and income among clinical faculty, academic faculty and nonfaculty are examined. This is Part 2 of a 2-part column. Part 1, published in the April 2008 AANA Journal discussed salaries, recruitment, and retention of CRNA faculty.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-exponent d from the public key (N,e) as long as d < N 1/4. Interestingly, Wiener stated that his attack may sometimes also work when d is slightly larger than N 1/4. This raises the question of how much larger d can be: could the attack work with non-negligible probability for d=N 1/4 + ρ for some constant ρ > 0? We answer this question in the negative by proving a converse to Wiener’s result. Our result shows that, for any fixed ε > 0 and all sufficiently large modulus lengths, Wiener’s attack succeeds with negligible probability over a random choice of d < N δ (in an interval of size Ω(N δ )) as soon as δ > 1/4 + ε. Thus Wiener’s success bound dthe Wiener attack, which are guaranteed to succeed even when δ > 1/4. The known attacks in this class (by Verheul and Van Tilborg and Dujella) run in exponential time, so it is natural to ask whether there exists an attack in this class with subexponential run-time. Our second converse result answers this question also in the negative.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained examples of near-collisions for the compression function, but in practice the attack could not be extended to the full function due to large memory requirements and computation time. In this paper we improve the attack and show that it is possible to find near-collisions in practice for any given value of IV. In particular, this means that the full hash function with the prespecified IV is vulnerable in practice, not just in theory. We exhibit an example near-collision for the complete hash function.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

These lecture notes highlight some of the recent applications of multi-objective and multidisciplinary design optimisation in aeronautical design using the framework and methodology described in References 8, 23, 24 and in Part 1 and 2 of the notes. A summary of the methodology is described and the treatment of uncertainties in flight conditions parameters by the HAPEAs software and game strategies is introduced. Several test cases dealing with detailed design and computed with the software are presented and results discussed in section 4 of these notes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Much has been written about transferring class materials and teaching techniques to digital platforms, but less has been written about applying heuristic organizing constructs in the same manner. With the transformation of learning ecologies over the past decades as well as requirements to adjust to constantly shifting digital tools and environments, the challenges for learning facilitators are to readily adapt and change, as well as to engage a changing learner demographic. However, most importantly is to engage most effectively with learners in these online environments. This article reviews the existing literature in the heuristic construct of academagogy [1] and applies a case study methodology to discussion of the first application of academagogy to the online delivery of an undergraduate design unit. Through a focus on effective teaching and learning techniques, the transfer from face-to-face (f2f) to the digital realm is explored through four main focal points: Tools for teaching, teaching and learning, communicating with students, and effective teaching methods. These four focal points are then used to discuss ways to meet the challenges of teaching online including how they create new dimensions in teaching practice and how the digital experience changes learning experiences. The article concludes with reflection and consolidation of the similarities and differences between the face-to-face and digital deliveries, and by suggesting changes to the academagogic heuristic to enable its use more easily in a digital space.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An estimated 285 million people worldwide are visually impaired. Some 90% of those live in developing nations, where less than 1% of the world’s books are available in a form they can read. In developed countries, the situation is only marginally better: only around 7% of the world’s books are accessible to print-disabled people. The right to read is part of our basic human rights. Access to the written word is crucial to allow people to fully participate in society. It’s important for education, political involvement, success in the workplace, scientific progress and, not least, creative play and leisure. Equal access to books and other cultural goods is also required by international law. The technology now exists to deliver books in accessible electronic forms to people much more cheaply than printing and shipping bulky braille copies or books on tape. Electronic books can be read with screen readers and refreshable braille devices, or printed into large print or braille if needed. Now that we have this technology, what’s been referred to as the global “book famine” is a preventable tragedy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The public relations literature has tended to present dialogue as an idealised concept, with a focus on how it should, could, or ought to be carried out in public relations practice. There is little in extant literature that considers the significance of dialogue to the actual practice of public relations. This paper presents the findings of a qualitative study of public relations practitioners’ day-to-day work. It concludes that dialogue does not – and arguably, cannot – occur in public relations practice and instead articulates an empirically-based practitioner perspective on two-way communication, which displays pragmatic characteristics that significantly distinguish it from dialogue.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In response to the rail industry lacking a consistently accepted standard of minimal training to perform incident investigations, the Australasian rail industry requested the development of a unified approach to investigator training. This paper details how the findings from a training needs analysis were applied to inform the development of a standardised training package for rail incident investigators. Data from job descriptions, training documents and subject matter experts sourced from 17 Australasian organisations were analysed and refined to yield a draft set of 10 critical competencies. Finally the draft of critical competencies was reviewed by industry experts to verify the accuracy and completeness of the competency list and to consider the most appropriate level of qualification for training development. The competencies identified and the processes described to translate research into an applied training framework in this paper, can be generalised to assist practitioners and researchers in developing industry approved standardised training packages.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ubiquitination involves the attachment of ubiquitin to lysine residues on substrate proteins or itself, which can result in protein monoubiquitination or polyubiquitination. Ubiquitin attachment to different lysine residues can generate diverse substrate-ubiquitin structures, targeting proteins to different fates. The mechanisms of lysine selection are not well understood. Ubiquitination by the largest group of E3 ligases, the RING-family E3 s, is catalyzed through co-operation between the non-catalytic ubiquitin-ligase (E3) and the ubiquitin-conjugating enzyme (E2), where the RING E3 binds the substrate and the E2 catalyzes ubiquitin transfer. Previous studies suggest that ubiquitination sites are selected by E3-mediated positioning of the lysine toward the E2 active site. Ultimately, at a catalytic level, ubiquitination of lysine residues within the substrate or ubiquitin occurs by nucleophilic attack of the lysine residue on the thioester bond linking the E2 catalytic cysteine to ubiquitin. One of the best studied RING E3/ E2 complexes is the Skp1/Cul1/F box protein complex, SCFCdc4, and its cognate E2, Cdc34, which target the CDK inhibitor Sic1 for K48-linked polyubiquitination, leading to its proteasomal degradation. Our recent studies of this model system demonstrated that residues surrounding Sic1 lysines or lysine 48 in ubiquitin are critical for ubiquitination. This sequence-dependence is linked to evolutionarily conserved key residues in the catalytic region of Cdc34 and can determine if Sic1 is mono- or poly-ubiquitinated. Our studies indicate that amino acid determinants in the Cdc34 catalytic region and their compatibility to those surrounding acceptor lysine residues play important roles in lysine selection. This may represent a general mechanism in directing the mode of ubiquitination in E2 s.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Nature exists. Humans exist. The behaviour of one impacts upon the other. The behaviour of humans is governed by the artificial contrivance described as the law. While the law can in this way control the behaviour of humans and the impact that human behaviour has on nature, the behaviour of nature is governed – if at all- in accordance with nature’s own sets of values which are quintessentially a matter for nature. The relationship between nature and humans may be the object of rules of law, but traditional legal doctrine dictates that humans but not nature are the subjects of the rules of law. The jurisprudence of the earth – it would appear – seeks to equalise in the eyes of the law nature as part of the global environment and humans as part of the global environment. How might this be done?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents our system to address the CogALex-IV 2014 shared task of identifying a single word most semantically related to a group of 5 words (queries). Our system uses an implementation of a neural language model and identifies the answer word by finding the most semantically similar word representation to the sum of the query representations. It is a fully unsupervised system which learns on around 20% of the UkWaC corpus. It correctly identifies 85 exact correct targets out of 2,000 queries, 285 approximate targets in lists of 5 suggestions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explores the possibility of connecting two Wind Turbine Generators (WTG) to the grid using a single three level inverter. In the proposed system the rectified output of one WTG is connected across the upper dc-link capacitor of a standard diode clamped three level inverter. Similarly the rectified output of the other WTG is connected across the lower capacitor. This particular combination has several advantages such as, direct connection to the grid, reduced parts count, improved reliability and high power capacity. However, the major problem in the proposed system is the imminent imbalance of dc-link voltages. Under such conditions conventional modulation methods fail to produce desired voltage and current waveforms. A detailed analysis on this issue and a novel space vector modulation method, as the solution, are proposed in this paper. To track the Maximum power point of each WTG a power sharing algorithm is proposed. Simulation results are presented to attest the efficacy of the proposed system.