328 resultados para contribution analysis
Resumo:
The position of housing demand and supply is not consistent. The Australian situation counters the experience demonstrated in many other parts of the world in the aftermath of the Global Financial Crisis, with residential housing prices proving particularly resilient. A seemingly inexorable housing demand remains a critical issue affecting the socio-economic landscape. Underpinned by high levels of population growth fuelled by immigration, and further buoyed by sustained historically low interest rates, increasing income levels, and increased government assistance for first home buyers, this strong housing demand level ensures problems related to housing affordability continue almost unabated. A significant, but less visible factor impacting housing affordability relates to holding costs. Although only one contributor in the housing affordability matrix, the nature and extent of holding cost impact requires elucidation: for example, the computation and methodology behind the calculation of holding costs varies widely - and in some instances completely ignored. In addition, ambiguity exists in terms of the inclusion of various elements that comprise holding costs, thereby affecting the assessment of their relative contribution. Such anomalies may be explained by considering that assessment is conducted over time in an ever-changing environment. A strong relationship with opportunity cost - in turn dependant inter alia upon prevailing inflation and / or interest rates - adds further complexity. By extending research in the general area of housing affordability, this thesis seeks to provide a detailed investigation of those elements related to holding costs specifically in the context of midsized (i.e. between 15-200 lots) greenfield residential property developments in South East Queensland. With the dimensions of holding costs and their influence over housing affordability determined, the null hypothesis H0 that holding costs are not passed on can be addressed. Arriving at these conclusions involves the development of robust economic and econometric models which seek to clarify the componentry impacts of holding cost elements. An explanatory sequential design research methodology has been adopted, whereby the compilation and analysis of quantitative data and the development of an economic model is informed by the subsequent collection and analysis of primarily qualitative data derived from surveying development related organisations. Ultimately, there are significant policy implications in relation to the framework used in Australian jurisdictions that promote, retain, or otherwise maximise, the opportunities for affordable housing.
Resumo:
Despite of a significant contribution of transport sector in the global economy and society, it is one of the largest sources of global energy consumption, green house gas emissions and environmental pollutions. A complete look onto the whole life cycle environmental inventory of this sector will be helpful to generate a holistic understanding of contributory factors causing emissions. Previous studies were mainly based on segmental views which mostly compare environmental impacts of different modes of transport, but very few consider impacts other than the operational phase. Ignoring the impacts of non-operational phases, e.g., manufacture, construction, maintenance, may not accurately reflect total contributions on emissions. Moreover an integrated study for all motorized modes of road transport is also needed to achieve a holistic estimation. The objective of this study is to develop a component based life cycle inventory model which considers impacts of both operational and non-operational phases of the whole life as well as different transport modes. In particular, the whole life cycle of road transport has been segmented into vehicle, infrastructure, fuel and operational components and inventories have been conducted on each component. The inventory model has been demonstrated using the road transport of Singapore. Results show that total life cycle green house gas emissions from the road transport sector of Singapore is 7.8 million tons per year, among which operational phase and non-operational phases contribute about 55% and about 45%, respectively. Total amount of criteria air pollutants are 46, 8.5, 33.6, 13.6 and 2.6 thousand tons per year for CO, SO2, NOx, VOC and PM10, respectively. From the findings, it can be deduced that stringent government policies on emission control measures have a significant impact on reducing environmental pollutions. In combating global warming and environmental pollutions the promotion of public transport over private modes is an effective sustainable policy.
Resumo:
Pre-packaged administrations have been prevalent in the UK for years. However, Australia's voluntary administration regime has been more restrictive of the practice. This article analyses the evolution of UK pre-packs, why they are not prevalent in Australia and the challenges for UK and Australian lawmakers in striking the right balance with pre-packs in their respective administration regimes. The article proposes a mechanism that might make ‘connected-party’ pre-pack business sales work more fairly for stakeholders — that is, by obligating a connected-party purchaser to make a future-income contribution in favour of the insolvent company whose business has been ‘rescued’ by a pre-packaged sale in administration.
Resumo:
This thesis reports on an interview study with 17 international students about their experiences of coming to belong in an Australian university. All used English as an additional language (EAL). The students’ narratives of ‘coming to belong’ are conceptualised through the theory of Bourdieu, in particular the concepts of field, capital, habitus and legitimation; and the methodological premises of critical realism’s layered ontology. The literature review argues that access to and accrual of a range of capital is critical to successful adaptation to a new educational system. This, and processes of legitimation by others in the fields, affects the senses of belonging for students of various linguistic backgrounds, of different countries of origin, studying from primary to higher education in diverse parts of the world. Data were collected by semi-structured interviews and email dialogues at three points during the students’ first year of study in Australia. The analysis shows how the students’ empirical experiences were ordered in terms of narrative structure—orientation, complication, evaluation, resolution and coda—and highlight the emotions generated by the sequence of events. The findings show that EAL international students sought new field positions through legitimation in multiple senses across (sub-)fields. They also show that academic, social and linguistic legitimacy granted by others produced a spectrum of belonging: in the centre, at the margin, and/or to meaningful intercultural encounters. This study makes a contribution to the growing literature around the experience of international students in higher education, and to empirical literature using Bourdieu to understand educational relations.
Resumo:
The role of the judiciary in common law systems is to create law, interpret law and uphold the law. As such decisions by courts on matters related to ecologically sustainable development, natural resource use and management and climate change make an important contribution to earth jurisprudence. There are examples where judicial decisions further the goals of earth jurisprudence and examples where decisions go against the principles of earth jurisprudence. This presentation will explore judicial approaches to standing in Australia and America. The paper will explore two trends in each jurisdiction. Approaches by American courts to standing will be examined in reference to climate change and environmental justice litigation. While Australian approaches to standing will be examined in the context of public interest litigation and environmental criminal negligence cases. The presentation will draw some conclusions about the role of standing in each of these cases and implications of this for earth jurisprudence.
Resumo:
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.
Resumo:
In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.
Resumo:
Pro-anorexia Internet sites aim to promote, support and discuss anorexia nervosa. Media coverage has raised concerns that sites may increase the level of eating disorders. This research examines the meaning of participation in a pro-anorexia Internet site and its relationship with disordered eating by using an interpretative phenomenological analysis of fifteen separate message ‘threads’ followed over a six-week period. Four themes were identified: (1) tips and techniques; (2) ‘ana’ v. anorexia nervosa; (3) social support; and (4) need for anorexia. Findings suggest participation was multi-purpose, providing a coping function in relation to weight loss, and the contribution of sites to increased levels of eating disorders is not inevitable.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Objective: To calculate pooled risk estimates of the association between pigmentary characteristics and basal cell carcinoma (BCC) of the skin. Methods: We searched three electronic databases and reviewed the reference lists of the retrieved articles until July 2012 to identify eligible epidemiologic studies. Eligible studies were those published in between 1965 and July 2012 that permitted quantitative assessment of the association between histologically-confirmed BCC and any of the following characteristics: hair colour, eye colour, skin colour, skin phototype, tanning and burning ability, and presence of freckling or melanocytic nevi. We included 29 studies from 2236 initially identified. We calculated summary odds ratios (ORs) using weighted averages of the log OR, using random effects models. Results: We found strongest associations with red hair (OR 2.02; 95% CI: 1.68, 2.44), fair skin colour (OR 2.11; 95% CI: 1.56, 2.86), and having skin that burns and never tans (OR 2.03; 95% CI: 1.73, 2.38). All other factors had weaker but positive associations with BCC, with the exception of freckling of the face in adulthood which showed no association. Conclusions: Although most studies report risk estimates that are in the same direction, there is significant heterogeneity in the size of the estimates. The associations were quite modest and remarkably similar, with ORs between about 1.5 and 2.5 for the highest risk level for each factor. Given the public health impact of BCC, this meta-analysis will make a valuable contribution to our understanding of BCC.
Resumo:
This thesis developed and applied Bayesian models for the analysis of survival data. The gene expression was considered as explanatory variables within the Bayesian survival model which can be considered the new contribution in the analysis of such data. The censoring factor that is inherent of survival data has also been addressed in terms of its impact on the fitting of a finite mixture of Weibull distribution with and without covariates. To investigate this, simulation study were carried out under several censoring percentages. Censoring percentage as high as 80% is acceptable here as the work involved high dimensional data. Lastly the Bayesian model averaging approach was developed to incorporate model uncertainty in the prediction of survival.
Resumo:
The incidence of Squamous Cell Carcinoma (SCG) is growing in certain populations to the extent that it is now the most common skin lesion in young men and women in high ultraviolet exposure regions such as Queensland. In terms of incidence up to 40% of the Australian population over 40 years of age is thought to possess the precancerous Solar Keratosis (SK) lesion and with a small, but significant, chance of progression into SCC, understanding the genetic events that play a role in this process is essential. The major aims of this study were to analyse whole blood derived samples for DNA aberrations in genes associated with tumour development and cellular maintenance, with the ultimate aim of identifying genes associated with non-melanoma skin cancer development. More specifically the first aim of this project was to analyse the SDHD and MMP12 genes via Dual-Labelled Probe Real-Time PCR for copy number aberrations in an affected Solar Keratosis and control cohort. It was found that 12 samples had identifiable copy-number aberrations in either the SDHD or MMP12 gene (this means that a genetic section of either of these two genes is aberrantly amplified or deleted), with five of the samples exhibiting aberrations in both genes. The significance of this study is the contribution to the knowledge of the genetic pathways that are malformed in the progression and development of the pre-cancerous skin lesion Solar Keratosis. © 2008 Springer Science+Business Media, LLC.
Resumo:
High-speed broadband internet access is widely recognised as a catalyst to social and economic development. However, the provision of broadband Internet services with the existing solutions to rural population, scattered over an extensive geographical area, remains both an economic and technical challenge. As a feasible solution, the Commonwealth Scientific and Industrial Research Organization (CSIRO) proposed a highly spectrally efficient, innovative and cost-effective fixed wireless broadband access technology, which uses analogue TV frequency spectrum and Multi-User MIMO (MUMIMO) technology with Orthogonal-Frequency-Division-Multiplexing (OFDM). MIMO systems have emerged as a promising solution for the increasing demand of higher data rates, better quality of service, and higher network capacity. However, the performance of MIMO systems can be significantly affected by different types of propagation environments e.g., indoor, outdoor urban, or outdoor rural and operating frequencies. For instance, large spectral efficiencies associated with MIMO systems, which assume a rich scattering environment in urban environments, may not be valid for all propagation environments, such as outdoor rural environments, due to the presence of less scatterer densities. Since this is the first time a MU-MIMO-OFDM fixed broadband wireless access solution is deployed in a rural environment, questions from both theoretical and practical standpoints arise; For example, what capacity gains are available for the proposed solution under realistic rural propagation conditions?. Currently, no comprehensive channel measurement and capacity analysis results are available for MU-MIMO-OFDM fixed broadband wireless access systems which employ large scale multiple antennas at the Access Point (AP) and analogue TV frequency spectrum in rural environments. Moreover, according to the literature, no deterministic MU-MIMO channel models exist that define rural wireless channels by accounting for terrain effects. This thesis fills the aforementioned knowledge gaps with channel measurements, channel modeling and comprehensive capacity analysis for MU-MIMO-OFDM fixed wireless broadband access systems in rural environments. For the first time, channel measurements were conducted in a rural farmland near Smithton, Tasmania using CSIRO's broadband wireless access solution. A novel deterministic MU-MIMO-OFDM channel model, which can be used for accurate performance prediction of rural MUMIMO channels with dominant Line-of-Sight (LoS) paths, was developed under this research. Results show that the proposed solution can achieve 43.7 bits/s/Hz at a Signal-to- Noise Ratio (SNR) of 20 dB in rural environments. Based on channel measurement results, this thesis verifies that the deterministic channel model accurately predicts channel capacity in rural environments with a Root Mean Square (RMS) error of 0.18 bits/s/Hz. Moreover, this study presents a comprehensive capacity analysis of rural MU-MIMOOFDM channels using experimental, simulated and theoretical models. Based on the validated deterministic model, further investigations on channel capacity and the eects of capacity variation, with different user distribution angles (θ) around the AP, were analysed. For instance, when SNR = 20dB, the capacity increases from 15.5 bits/s/Hz to 43.7 bits/s/Hz as θ increases from 10° to 360°. Strategies to mitigate these capacity degradation effects are also presented by employing a suitable user grouping method. Outcomes of this thesis have already been used by CSIRO scientists to determine optimum user distribution angles around the AP, and are of great significance for researchers and MU-MUMO-OFDM system developers to understand the advantages and potential capacity gains of MU-MIMO systems in rural environments. Also, results of this study are useful to further improve the performance of MU-MIMO-OFDM systems in rural environments. Ultimately, this knowledge contribution will be useful in delivering efficient, cost-effective high-speed wireless broadband systems that are tailor-made for rural environments, thus, improving the quality of life and economic prosperity of rural populations.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
Susceptibility to complex traits, by definition, involves aetiological polymorphisms at multiple genetic loci combined with variable contributions by environmental factors. However, the approaches taken to identifying genetic loci implicated in susceptibility to complex traits frequently overlooks the compounding contribution of multiple loci in favour of highlighting a single gene solely responsible for predisposition. It is only in a small minority of cases that this has resulted in clear disease heritability associated with polymorphisms in a single gene. More often, this approach has led to an accumulation of single-gene associations with minor contributions to disease susceptibility. As the genomic era advances and genome-wide screens become higher in resolution and throughput, the need for simultaneous consideration of multiple loci is becoming more important. With special reference to non-Hodgkin’s lymphoma (NHL), this chapter will overview the current progress made in elucidating genetic polymorphisms associated with disease susceptibility. We also present novel data from a high-resolution single nucleotide polymorphism (SNP) microarray screen for susceptibility loci that are involved in NHL. Using an ‘informed approach’, the findings are highlighted within the context of cellular pathways, and provide insight and new ideas for methods of analysis for genome-wide screens for susceptibility.