62 resultados para Olmsted, Harry Aborn, 1873-
Resumo:
Antechinus argentus sp. nov. is currently only known from the plateau at the eastern escarpment of Kroombit Tops National Park, about 400km NNW of Brisbane and 60km SSW of Gladstone, south-east Queensland, Australia. Antechinus flavipes (Waterhouse) is also known from Kroombit Tops NP, 4.5km W of the nearest known population of A. argentus; A. mysticus Baker, Mutton and Van Dyck has yet to be found within Kroombit Tops, but is known from museum specimens taken at Bulburin NP, just 40km ESE, as well as extant populations about 400km to both the south-east and north-west of Kroombit NP. A. argentus can be easily distinguished in the field, having an overall silvery/grey appearance with much paler silver feet and drabber deep greyish-olive rump than A. flavipes, which has distinctive yellow-orange toned feet, rump and tail-base; A. argentus fur is also less coarse than that of A. flavipes. A. argentus has a striking silver-grey head, neck and shoulders, with pale, slightly broken eye-rings, which distinguish it from A. mysticus which has a more subtle greyish-brown head, pale buff dabs of eyeliner and more colourful brownish-yellow rump. Features of the dentary can also be used for identification: A. argentus differs from A. flavipes in having smaller molar teeth, as well as a narrower and smaller skull and from A. mysticus in having on average a narrower snout, smaller skull and dentary lengths and smaller posterior palatal vacuities in the skull. A. argentus is strongly divergent genetically (at mtDNA) from both A. flavipes (9.0–11.2%) and A. mysticus (7.2–7.5%), and forms a very strongly supported clade to the exclusion of all other antechinus species, in both mtDNA and combined (mtDNA and nDNA) phylogenies inferred here. We are yet to make detailed surveys in search of A. argentus from forested areas to the immediate east and north of Kroombit Tops. However, A. mysticus has only been found at these sites in low densities in decades past and not at all in several recent trapping expeditions conducted by the authors. With similar habitat types in close geographic proximity, it is plausible that A. argentus may be found outside Kroombit. Nevertheless, it is striking that from a range of surveys conducted at Kroombit Tops in the last 15 years and intensive surveys by the authors in the last 3 years, totalling more than 5 080 trap nights, just 13 A. argentus have been captured from two sites less than 6 km apart. If this is even close to the true geographic extent of the species, it would possess one of the smallest distributions of an Australian mammal species. With several threats identified, we tentatively recommend that A. argentus be listed as Endangered, pending an exhaustive trapping survey of Kroombit and surrounds.
Resumo:
Western economies are highly dependent on service innovation for their growth and employment. An important driver for economic growth is, therefore, the development of new, innovative services like electronic services, mobile end-user services, new financial or personalized services. Service innovation joins four trends that currently shape the western economies: the growing importance of services, the need for innovation, changes in consumer and business markets, and the advancements in information and communication technology (ICT).
Resumo:
In this chapter we will make the transition towards the design of business models and the related critical issues. We develop a model that helps us understand the causalities that play a role in understanding the viability and feasibility of the business models, i.e. long-term profitability and market adoption. We argue that designing viable business models requires balancing the requirements and interests of the actors involved, within and between the various business model domains. Requirements in the service domain guide the design choices in the technology domain, which in turn affect network formation and the financial arrangements. It is important to understand the Critical Design Issues (CDIs) involved in business models and their interdependencies. In this chapter, we present the Critical Design Issues involved in designing mobile service business models, and demonstrate how they are linked to the Critical Success Factors (CSFs) with regard to business model viability. This results in a causal model for understanding business model viability, as well as providing grounding for the business model design approach outlined in Chapter 5.
Resumo:
Many research and development projects that are carried out by firms and research institutes are technology-oriented. There is a large gap between research results, for instance in the form of prototypes, and the actual service offerings to customers. This becomes problematic when an organization wants to bring the results from such a project to the market, which will be particularly troublesome when the research results do not readily fit traditional offerings, roles and capabilities in the industry, nor the financial arrangements. In this chapter, we discuss the design of a business model for a mobile health service, starting with a research prototype that was developed for patients with chronic lower back pain, using the STOF model and method. In a number of design sessions, an initial business model was developed that identifies critical design issues that play a role in moving from prototype toward market deployment. The business model serves as a starting-point to identify and commit relevant stakeholders, and to draw up a business plan and case. This chapter is structured as follows. We begin by discussing the need for mobile health business models. Next, the research and development project on mobile health and the prototype for chronic lower back pain patients are introduced, after which the approach used to develop the business model is described, followed by a discussion of the developed mobile health business model for each of the STOF domains. We conclude with a discussion regarding the lessons that were learned with respect to the development of a business model on the basis of a prototype.
Resumo:
The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.
Resumo:
We present CHURNs, a method for providing freshness and authentication assurances to human users. In computer-to-computer protocols, it has long been accepted that assurances of freshness such as random nonces are required to prevent replay attacks. Typically, no such assurance of freshness is presented to a human in a human-and-computer protocol. A Computer–HUman Recognisable Nonce (CHURN) is a computer-aided random sequence that the human has a measure of control over and input into. Our approach overcomes limitations such as ‘humans cannot do random’ and that humans will follow the easiest path. Our findings show that CHURNs are significantly more random than values produced by unaided humans; that humans may be used as a second source of randomness, and we give measurements as to how much randomness can be gained from humans using our approach; and that our CHURN-generator makes the user feel more in control, thus removing the need for complete trust in devices and underlying protocols. We give an example of how a CHURN may be used to provide assurances of freshness and authentication for humans in a widely used protocol.
Resumo:
Audio recording of 10 tracks funded by Legacy, The Australia Council, and Arts Queensland. The recordings explore the untold stories of soldiers' wives through song. It features the vocal and songwriting talents of Jackie Marshall, Bertie Page, Sahara Beck, Emma Bosworth, Roz Pappalardo, and Kristy Apps. Recorded, Mixed, Mastered, and Co-Produced by Phil Graham.
Resumo:
The rat theta class glutathione S-transferase (GST) 5-5 has been shown to affect the mutagenicity of halogenated alkanes and epoxides. In Salmonella typhimurium TA1535 expressing the rat GST5-5 the number of revertants was increased compared to the control strain by CH2Br2, ethylene dibromide (EDB) and 1,2,3,4-diepoxybutane (BDE); in contrast, mutagenicity of 1,2-epoxy-3-(4'-nitrophenoxy)propane (EPNP) was reduced. S.typhimurium TA1535 cells were transformed with an expression plasmid carrying the cDNA of the human theta ortholog GST1-1 either in sense or antisense orientation, the latter being the control. These transformed bacteria were utilized for mutagenicity assays. Mutagenicity of EDB, BDE, CH2Br2, epibromohydrin and 1,3-dichloroacetone was higher in the S.typhimurium TA1535 expressing GSTT1-1 than in the control strain. The expression of active enzyme did not affect the mutagenicity of 1,2-epoxy-3-butene or propylene oxide, GSTT1-1 expression reduced the mutagenicity of EPNP. Glutathione S-transferase 5-5 and GSTT1-1 modulate genotoxicity of several industrially important chemicals in the same way. Polymorphism of the GSTT1 locus in humans may therefore cause differences in cancer susceptibility between the two phenotypes.
Resumo:
"A young couple go to a remote and deserted coral island for a camping holiday, only to find that the island is inhabited by a ghost seeking retribution for a past outrage. - Written by Bill Bennett " "Synopsis: Based on actual events…. Harry and Beth want a different kind of holiday. So they charter a boat to drop them off on a remote coral island on the Great Barrier Reef. The island is idyllic – surrounded by a wide reef, covered in palms and full of birds and other wildlife, small and totally deserted. Or is it? The young lovers soon come to believe there is someone else on the island. Things go missing from their camp – and then they discover someone else’s footprints in the sand. What they didn’t realise was that the island has a ghost – a young girl who had died in shocking circumstances some eighty years earlier. The ghost at first plays mischievously with the young couple, but then turns malevolent. And their idyllic island holiday becomes a nightmare."
Resumo:
Efficient error-Propagating Block Chaining (EPBC) is a block cipher mode intended to simultaneously provide both confidentiality and integrity protection for messages. Mitchell’s analysis pointed out a weakness in the EPBC integrity mechanism that can be used in a forgery attack. This paper identifies and corrects a flaw in Mitchell’s analysis of EPBC, and presents other attacks on the EPBC integrity mechanism.
Resumo:
In this chapter, we explore methods for automatically generating game content—and games themselves—adapted to individual players in order to improve their playing experience or achieve a desired effect. This goes beyond notions of mere replayability and involves modeling player needs to maximize their enjoyment, involvement, and interest in the game being played. We identify three main aspects of this process: generation of new content and rule sets, measurement of this content and the player, and adaptation of the game to change player experience. This process forms a feedback loop of constant refinement, as games are continually improved while being played. Framed within this methodology, we present an overview of our recent and ongoing research in this area. This is illustrated by a number of case studies that demonstrate these ideas in action over a variety of game types, including 3D action games, arcade games, platformers, board games, puzzles, and open-world games. We draw together some of the lessons learned from these projects to comment on the difficulties, the benefits, and the potential for personalized gaming via adaptive game design.
Hermione Ganger goes to war: A feminist reflection on the situation of girls in real world conflicts
Resumo:
To report the outcomes of a randomised educational trial of a new methodology for extended immersion in medical simulation for senior medical students. Clinical Learning through Extended Immersion in Medical Simulation (CLEIMS) is a new methodology for medical student learning. It involves senior students working in teams of 4-5 through the clinical progress of one or more patients over a week, utilising a range of simulation methodologies (simulated patient assessment, simulated significant other briefing, virtual story continuations, pig-trotter wound repair, online simulated on-call modules, interprofessional simulated ward rounds and high fidelity mannequin-based emergency simulations), to enhance learning in associated workshops and seminars. A randomised educational trial comparing the methodology to seminars and workshops alone began in 2010 and interim results were reported at last year’s conference. Updated results are presented here and final primary endpoint outcomes will be available by the time of the conference.