521 resultados para Viikki Tropical Resources Institute


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A major priority for cancer control agencies is to reduce geographical inequalities in cancer outcomes. While the poorer breast cancer survival among socioeconomically disadvantaged women is well established, few studies have looked at the independent contribution that area- and individual-level factors make to breast cancer survival. Here we examine relationships between geographic remoteness, area-level socioeconomic disadvantage and breast cancer survival after adjustment for patients’ socio- demographic characteristics and stage at diagnosis. Multilevel logistic regression and Markov chain Monte Carlo simulation were used to analyze 18 568 breast cancer cases extracted from the Queensland Cancer Registry for women aged 30 to 70 years diagnosed between 1997 and 2006 from 478 Statistical Local Areas in Queensland, Australia. Independent of individual-level factors, area-level disadvantage was associated with breast-cancer survival (p=0.032). Compared to women in the least disadvantaged quintile (Quintile 5), women diagnosed while resident in one of the remaining four quintiles had significantly worse survival (OR 1.23, 1.27, 1.30, 1.37 for Quintiles 4, 3, 2 and 1 respectively).) Geographic remoteness was not related to lower survival after multivariable adjustment. There was no evidence that the impact of area-level disadvantage varied by geographic remoteness. At the individual level, Indigenous status, blue collar occupations and advanced disease were important predictors of poorer survival. A woman’s survival after a diagnosis of breast cancer depends on the socio-economic characteristics of the area where she lives, independently of her individual-level characteristics. It is crucial that the underlying reasons for these inequalities be identified to appropriately target policies, resources and effective intervention strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Barmah Forest virus (BFV) disease is the second most common mosquito-borne disease in Australia, but the linkages of the wetlands and climate zones with BFV transmission remain unclear. We aimed to examine the relationship between the wetlands, climate zones and BFV risk in Queensland, Australia. Data on the wetlands, climate zones, population and BFV cases for the period 1992 to 2008 were obtained from relevant government agencies. BFV risk was grouped as low-, medium- and high-level based on BFV incidence percentiles. The buffer zones around each BFV case were made using 1, 5, 10, 15, 20, 25 and 50 km distances. We performed a discriminant analysis to determine the differences between wetland classes and BFV risk within each climate zone. The discriminant analyses show that saline 1, riverine and saline tidal influence were the most significant contributors to BFV risk in all climate and buffer zones, while lacustrine, palustrine, estuarine and saline 2 and saline 3 wetlands were less important. These models had classification accuracies of 76%, 98% and 100% for BFV risk in subtropical, tropical and temperate climate zones, respectively. This study demonstrates that BFV risk varies with wetland class and climate zone. The discriminant analysis is a useful tool to quantify the links between wetlands, climate zones and BFV risk.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A process for making aluminosilicates of zeolite N structure comprising the steps of: (i) combining a water soluble monovalent cation, a solution of hydroxyl anions and an aluminosilicate to form a resultant mixture having a pH greater than 10 and a H.sub.2O/Al.sub.2O.sub.3 ratio in the range 30 to 220; (ii) heating the resultant mixture to a temperature of between 50.degree. C. and boiling point of the mixture for a time between 1 minute and 100 hours until a crystalline product of zeolite N structure is formed as determined by X-ray diffraction or other suitable characteristic; and (iii) separating the zeolite N product as a solid from the mixture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report presents a snapshot from work which was funded by the Queensland Injury Prevention Council in 2010-11 titled “Feasibility of Using Health Data Sources to Inform Product Safety Surveillance in Queensland children”. The project provided an evaluation of the current available evidence-base for identification and surveillance of product-related injuries in children in Queensland and Australia. A comprehensive 300 page report was produced (available at: http://eprints.qut.edu.au/46518/) and a series of recommendations were made which proposed: improvements in the product safety data system, increased utilisation of health data for proactive and reactive surveillance, enhanced collaboration between the health sector and the product safety sector, and improved ability of health data to meet the needs of product safety surveillance. At the conclusion of the project, a Consumer Product Injury Research Advisory group (CPIRAG) was established as a working party to the Queensland Injury Prevention Council (QIPC), to prioritise and advance these recommendations and to work collaboratively with key stakeholders to promote the role of injury data to support product safety policy decisions at the Queensland and national level. This group continues to meet monthly and is comprised of the organisations represented on the second page of this report. One of the key priorities of the CPIRAG group for 2012 was to produce a snapshot report to highlight problem areas for potential action arising out of the larger report. Subsequent funding to write this snapshot report was provided by the Institute for Health and Biomedical Innovation, Injury Prevention and Rehabilitation Domain at QUT in 2012. This work was undertaken by Dr Kirsten McKenzie and researchers from QUT's Centre for Accident Research and Road Safety - Queensland. This snapshot report provides an evidence base for potential further action on a range of children’s products that are significantly represented in injury data. Further information regarding injury hazards, safety advice and regulatory responses are available on the Office of Fair Trading (OFT) Queensland website and the Product Safety Australia websites. Links to these resources are provided for each product reviewed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis investigates issues of existing approaches to access control in allocating optimal level of access to users and proposes solutions in the form of new access control models. These issues are most evident when uncertainty surrounding users’ access needs, incentive to misuse and accountability are considered, hence the title of the thesis. We first analyse access control in environments where the administrator is unable to identify the users who may need access to resources. To resolve this uncertainty an administrative model with delegation support is proposed. Further, a detailed technical enforcement mechanism is introduced to ensure delegated resources cannot be misused. Then we explicitly consider that users are self-interested and capable of misusing resources if they choose to. We propose a novel game theoretic access control model to reason about and influence the factors that may affect users’ incentive to misuse. Next we study access control in environments where neither users’ access needs can be predicted nor they can be held accountable for misuse. It is shown that by allocating budget to users, a virtual currency through which they can pay for the resources they deem necessary, the need for a precise pre-allocation of permissions can be relaxed. The budget also imposes an upper-bound on users’ ability to misuse. A generalised budget allocation function is proposed and it is shown that given the context information the optimal level of budget for users can always be numerically determined. Finally, Role Based Access Control (RBAC) model is analysed under the explicit assumption of administrators’ uncertainty about self-interested users’ access needs and their incentives to misuse. A novel Budget-oriented Role Based Access Control (B-RBAC) model is proposed. The new model introduces the notion of users’ behaviour into RBAC and provides means to influence users’ incentives. It is shown how RBAC policy can be used to individualise the cost of access to resources and also to determine users’ budget. The implementation overheads of B-RBAC is examined and several low-cost sub-models are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivation: Unravelling the genetic architecture of complex traits requires large amounts of data, sophisticated models and large computational resources. The lack of user-friendly software incorporating all these requisites is delaying progress in the analysis of complex traits. Methods: Linkage disequilibrium and linkage analysis (LDLA) is a high-resolution gene mapping approach based on sophisticated mixed linear models, applicable to any population structure. LDLA can use population history information in addition to pedigree and molecular markers to decompose traits into genetic components. Analyses are distributed in parallel over a large public grid of computers in the UK. Results: We have proven the performance of LDLA with analyses of simulated data. There are real gains in statistical power to detect quantitative trait loci when using historical information compared with traditional linkage analysis. Moreover, the use of a grid of computers significantly increases computational speed, hence allowing analyses that would have been prohibitive on a single computer. © The Author 2009. Published by Oxford University Press. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kuwait is an oil rich country planning for a future that is not dependent on exploiting natural resources. A major policy initiative has been the introduction of Information Communication and Technology (ICT) to schools. However, contextual issues and teacher capabilities in the use of ICT have limited the success of this initiative. The study examines the leadership strategies of two secondary school principals whose schools have achieved this goal. The case study draws on intensive data collected through interviews of the principals, and teachers supported by document analysis and observations. Analysis was guided by theoretical perspectives drawn from the literature which identified a range of strategies used by the principals to manage change. The principals of Schools A and B employed three key strategies to maximise the impact on the teaching staff incorporating ICT into their teaching and learning practices. These strategies were: (a) encouragement for teaching staff to implement ICT in their teaching; (b) support to meet the material and human needs of teaching staff using ICT; and (c) provision of instructions and guidance for teaching staff in how and why such behaviours and practices should be performed. The outcome of this study proposes an innovative change leadership model that informs emerging countries, which are also undergoing major change related to ICT. However, the study also revealed limitations in the implementation of ICT in the classroom and provides insights into further strategies that principals need to adopt.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper deals with the transformations that have occurred in news journalism worldwide in the early 21st century. I argue that they havebeen the most significant changes to the profession for 100 years, and the challenges facing the news media industry in responding to them are substantial, as are those facing journalism education. This argument is developed in relation to the crisis of the newspaper business model, and why social media, blogging and citizen journalism have not filled the gap left by the withdrawal of resources from traditional journalism. It also draws upon Wikileaks as a case study in debates about computational and data-driven journalism, and whether large-scale "leaks" of electronic documents may be the future of investigative journalism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ageing population is increasing worldwide, as are a range of chronic diseases, conditions, and physical and cognitive disabilities associated with later life. The older population is also neurologically diverse, with unique and specific challenges around mobility and engagement with the urban environment. Older people tend to interact less with cities and neighbourhoods, putting them at risk of further illnesses and co-morbidities associated with being less physically and socially active. Empirical evidence has shown that reduced access to healthcare services, health-related resources and social interaction opportunities is associated with increases in morbidity and premature mortality. While it is crucial to respond to the needs of this ageing population, there is insufficient evidence for interventions regarding their experiences of public space from the vantage point of neurodiversity. This paper provides a conceptual and methodological framework to investigate relationships between the sensory and cognitive abilities of older people, and their use and negotiation of the urban environment. The paper will refer to a case example of the city of Logan, an urban area in Queensland, Australia, where current urban development provides opportunities for the design of spaces that take experiences of neurodiversity into account. The framework will inform the development of principles for urban design for increasingly neurologically diverse populations.