496 resultados para algebraic number field


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Throughout much of the western world more and more people are being sent to prison, one of a number of changes inspired by a 'new punitiveness' in penal and political affairs. This book seeks to understand these developments, bringing together leading authorities in the field to provide a wide-ranging analysis of new penal trends, compare the development of differing patterns of punishment across different types of societies, and to provide a range of theoretical analyses and commentaries to help understand their significance. As well as increases in imprisonment this book is also concerned to address a number of other aspects of 'the new punitiveness': firstly, the return of a number of forms of punishment previously thought extinct or inappropriate, such as the return of shaming punishments and chain gangs (in parts of the USA); and secondly, the increasing public involvement in penal affairs and penal development, for example in relation to length of sentences and the California Three Strikes Law, and a growing accreditation of the rights of victims. The book will be essential reading for students seeking to understand trends and theories of punishment on law, criminology, penology and other courses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Much of the existing empirical research on journalism focuses largely on hard-news journalism, at the expense of its less traditional forms, particularly the soft-news areas of lifestyle and entertainment journalism. In focussing on one particular area of lifestyle journalism – the reporting of travel stories – this paper argues for renewed scholarly efforts in this increasingly important field. Travel journalism’s location at the intersection between information and entertainment, journalism and advertising, as well as its increasingly significant role in the representation of foreign cultures makes it a significant site for scholarly research. By reviewing existing research about travel journalism and examining in detail the special exigencies that constrain it, the article proposes a number of dimensions for future research into the production practices of travel journalism. These dimensions include travel journalism’s role in mediating foreign cultures, its market orientation, motivational aspects and its ethical standards.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Dengue is one of the most widespread mosquito-borne diseases in the world. The causative agent, dengue virus (DENV), is primarily transmitted by the mosquito Aedes aegypti, a species that has proved difficult to control using conventional methods. The discovery that A. aegypti transinfected with the wMel strain of Wolbachia showed limited DENV replication led to trial field releases of these mosquitoes in Cairns, Australia as a biocontrol strategy for the virus. Methodology/Principal Findings Field collected wMel mosquitoes that were challenged with three DENV serotypes displayed limited rates of body infection, viral replication and dissemination to the head compared to uninfected controls. Rates of dengue infection, replication and dissemination in field wMel mosquitoes were similar to those observed in the original transinfected wMel line that had been maintained in the laboratory. We found that wMel was distributed in similar body tissues in field mosquitoes as in laboratory ones, but, at seven days following blood-feeding, wMel densities increased to a greater extent in field mosquitoes. Conclusions/Significance Our results indicate that virus-blocking is likely to persist in Wolbachia-infected mosquitoes after their release and establishment in wild populations, suggesting that Wolbachia biocontrol may be a successful strategy for reducing dengue transmission in the field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose This work introduces the concept of very small field size. Output factor (OPF) measurements at these field sizes require extremely careful experimental methodology including the measurement of dosimetric field size at the same time as each OPF measurement. Two quantifiable scientific definitions of the threshold of very small field size are presented. Methods A practical definition was established by quantifying the effect that a 1 mm error in field size or detector position had on OPFs, and setting acceptable uncertainties on OPF at 1%. Alternatively, for a theoretical definition of very small field size, the OPFs were separated into additional factors to investigate the specific effects of lateral electronic disequilibrium, photon scatter in the phantom and source occlusion. The dominant effect was established and formed the basis of a theoretical definition of very small fields. Each factor was obtained using Monte Carlo simulations of a Varian iX linear accelerator for various square field sizes of side length from 4 mm to 100 mm, using a nominal photon energy of 6 MV. Results According to the practical definition established in this project, field sizes < 15 mm were considered to be very small for 6 MV beams for maximal field size uncertainties of 1 mm. If the acceptable uncertainty in the OPF was increased from 1.0 % to 2.0 %, or field size uncertainties are 0.5 mm, field sizes < 12 mm were considered to be very small. Lateral electronic disequilibrium in the phantom was the dominant cause of change in OPF at very small field sizes. Thus the theoretical definition of very small field size coincided to the field size at which lateral electronic disequilibrium clearly caused a greater change in OPF than any other effects. This was found to occur at field sizes < 12 mm. Source occlusion also caused a large change in OPF for field sizes < 8 mm. Based on the results of this study, field sizes < 12 mm were considered to be theoretically very small for 6 MV beams. Conclusions Extremely careful experimental methodology including the measurement of dosimetric field size at the same time as output factor measurement for each field size setting and also very precise detector alignment is required at field sizes at least < 12 mm and more conservatively < 15 mm for 6 MV beams. These recommendations should be applied in addition to all the usual considerations for small field dosimetry, including careful detector selection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many model-based investigation techniques, such as sensitivity analysis, optimization, and statistical inference, require a large number of model evaluations to be performed at different input and/or parameter values. This limits the application of these techniques to models that can be implemented in computationally efficient computer codes. Emulators, by providing efficient interpolation between outputs of deterministic simulation models, can considerably extend the field of applicability of such computationally demanding techniques. So far, the dominant techniques for developing emulators have been priors in the form of Gaussian stochastic processes (GASP) that were conditioned with a design data set of inputs and corresponding model outputs. In the context of dynamic models, this approach has two essential disadvantages: (i) these emulators do not consider our knowledge of the structure of the model, and (ii) they run into numerical difficulties if there are a large number of closely spaced input points as is often the case in the time dimension of dynamic models. To address both of these problems, a new concept of developing emulators for dynamic models is proposed. This concept is based on a prior that combines a simplified linear state space model of the temporal evolution of the dynamic model with Gaussian stochastic processes for the innovation terms as functions of model parameters and/or inputs. These innovation terms are intended to correct the error of the linear model at each output step. Conditioning this prior to the design data set is done by Kalman smoothing. This leads to an efficient emulator that, due to the consideration of our knowledge about dominant mechanisms built into the simulation model, can be expected to outperform purely statistical emulators at least in cases in which the design data set is small. The feasibility and potential difficulties of the proposed approach are demonstrated by the application to a simple hydrological model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines some of the issues faced by School-Based Youth Health Nurses working in Queensland, in relation to the legal principles surrounding the provision of reproductive and sexual health advice. The paper outlines a number of specific issues faced by nurses working within this setting and considers the legal principles underpinning the issues concerning consent and confidentiality. The discussion in this paper demonstrates how the legal principles – which are often viewed as complex and uncertain by nurses working within this field – may be used as a guide to underpin good practice and compliance with the law. Although this paper is considered in the context of nurses working within Queensland, the principles and factors outlined are relevant to healthcare practitioners working within all Australian jurisdictions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To obtain accurate Monte Carlo simulations of small radiation fields, it is important model the initial source parameters (electron energy and spot size) accurately. However recent studies have shown that small field dosimetry correction factors are insensitive to these parameters. The aim of this work is to extend this concept to test if these parameters affect dose perturbations in general, which is important for detector design and calculating perturbation correction factors. The EGSnrc C++ user code cavity was used for all simulations. Varying amounts of air between 0 and 2 mm were deliberately introduced upstream to a diode and the dose perturbation caused by the air was quantified. These simulations were then repeated using a range of initial electron energies (5.5 to 7.0 MeV) and electron spot sizes (0.7 to 2.2 FWHM). The resultant dose perturbations were large. For example 2 mm of air caused a dose reduction of up to 31% when simulated with a 6 mm field size. However these values did not vary by more than 2 % when simulated across the full range of source parameters tested. If a detector is modified by the introduction of air, one can be confident that the response of the detector will be the same across all similar linear accelerators and the Monte Carlo modelling of each machine is not required.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Insulated rail joints are designed in a similar way to butt jointed steel structural systems, the difference being a purpose made gap between the main rail members to maintain electrical insulation for the proper functioning of the track circuitry at all times of train operation. When loaded wheels pass the gap, they induce an impact loading with the corresponding strains in the railhead edges exceeding the plastic limit significantly, which lead to metal flow across the gap thereby increasing the risk of short circuiting and impeding the proper functioning of the signalling and broken rail identification circuitries, of which the joints are a critical part. The performance of insulated rail joints under the passage of the wheel loading is complex due to the presence of a number of interacting components and hence is not well understood. This paper presents a dynamic wheel-rail contact-impact modelling method for the determination of the impact loading; a brief description of a field experiment to capture strain signatures for validating the predicted impact loading is also presented. The process and the results of the characterisation of the materials from virgin, in-service and damaged insulated rail joints using neutron diffraction method are also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reviews a wide range of literature on environmental management in the field in Queensland, and analyzes this by period and by author. An episodic pattern of activities since European settlement is evident. Periods of exploration (pre-1950) and inventory- compilation (ca. 1950-1970) were followed by two decades of media and non-government organization campaigning (ca. 1970-1990), then an era dominated by government regulatory action (ca. 1990-2010). These eras dominated public perception of what was happening in environmental practice. They were delineated by historic ‘interventions’ (summarily, the end of World War II, the 1971 inflationary crisis, and computerization respectively).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The writing of award winning tartan noir author, Denise Mina, “crime queen of Glasgow” has been identified with “explicitly feminist politics,” and Mina herself claims, as a feminist, she wants to use crime fiction to present a “narrative about very disempowered people becoming empowered.” This paper explores how Mina’s avowed stance on feminism plays out in her novel, The Field of Blood (2005), and examines whether her concerns are reflected in the embodied actions of her young protagonist, would-be investigative journalist, Paddy Meehan. It asks whether Mina has succeeded in working against entrenched patriarchal codes of crime fiction’s dominant narrative construction or whether her feminist intentions have been undermined by traditional stereotypical conventions of the genre.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"This invaluable companion to The Mammals of Australia is intended to be taken out into the field and used in conjunction with the more comprehensive volume. Genuinely practical in the outdoors, the book includes accounts of 389 species and newly developed, comprehensive identification keys. The Field Companion is introduced by a Mammal Distribution Matrix, which provides a classified checklist of all mammals in Australia (including those extinguished since European settlement) and the distribution of extant species in each state and territory. Species accounts provide initial differentiation, and include notes on identification, size, abundance, habitat and federal list/status, photograph and distribution map, as well as key references, which provide quick access to all relevant state identification keys in the Field Companion and to the longer entry in The Mammals of Australia. The authors have developed separate keys, illustrated with detailed drawings and maps, for the six states and the Northern Territory, to simplify the identification process and allow the reader to confidently separate all mammal species, no matter how subtle the differences. With the addition of these identification keys, this book becomes more than a field guide - although it is intended primarily to be used outdoors - and allows the user to finish identification based on more obscure characteristics, which is an advantage for some hard-to-identify species groups."--Libraries Australia