98 resultados para Lie algebras.
Resumo:
The current discourse surrounding victims of online fraud is heavily premised on an individual notion of greed. The strength of this discourse permeates the thinking of those who have not experienced this type of crime, as well as victims themselves. The current discourse also manifests itself in theories of victim precipitation, which again assigns the locus of blame to individuals for their actions in an offence. While these typologies and categorisations of victims have been critiqued as “victim blaming” in other fields, this has not occurred with regard to online fraud victims, where victim focused ideas of responsibility for the offence continue to dominate. This paper illustrates the nature and extent of the greed discourse and argues that it forms part of a wider construction of online fraud that sees responsibility for victimisation lie with the victims themselves and their actions. It argues that the current discourse does not take into account the level of deception and the targeting of vulnerability that is employed by the offender in perpetrating this type of crime. It concludes by advocating the need to further examine and challenge this discourse, especially with regard to its potential impact for victim’s access to support services and the wider criminal justice system.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
Migraine with aura (MA) is a subtype of typical migraine. Migraine with aura (MA) also encompasses a rare severe subtype Familial Hemiplegic Migraine (FHM) with several known genetic loci. The type 2 FHM (FHM-2) susceptibility locus maps to chromosome 1q23 and mutations in the ATP1A2 gene at this site have recently been implicated. We have previously provided evidence of linkage of typical migraine (predominantly MA) to microsatellite markers on chromosome 1, in the 1q31 and 1q23 regions. In this study, we have undertaken a large genomic investigation involving candidate genes that lie within the chromosome 1q23 and 1q31 regions using an association analysis approach. Methods We have genotyped a large population of case-controls (243 unrelated Caucasian migraineurs versus 243 controls) examining a set of 5 single nucleotide polymorphisms (SNPs) and the Fas Ligand dinucleotide repeat marker, located within the chromosome 1q23 and 1q31 regions. Results Several genes have been studied including membrane protein (ATP 1 subtype A4 and FasL), cytoplasmic glycoprotein (CASQ 1) genes and potassium (KCN J9 and KCN J10) and calcium (CACNA1E) channel genes in 243 migraineurs (including 85% MA and 15% of migraine without aura (MO)) and 243 matched controls. After correction for multiple testing, chi-square results showed non-significant P values (P > 0.008) across all SNPs (and a CA repeat) tested in these different genes, however results with the KCN J10 marker gave interesting results (P = 0.02) that may be worth exploring further in other populations. Conclusion These results do not show a significant role for the tested candidate gene variants and also do not support the hypothesis that a common chromosome 1 defective gene influences both FHM and the more common forms of migraine.
Resumo:
OBJECTIVES: The aims of the study were: (i) to extend our linkage analysis of chromosome 1q microsatellite markers in predominantly migraine with aura pedigrees and (ii) to test the novel FHM-2 ATP1A2 gene for involvement in these migraine affected pedigrees and a previous pedigree (MF14) showing evidence of linkage of markers to C1q31. METHODS: A chromosome 1 scan (31 markers) was performed in 21 multiplex pedigrees affected predominantly with migraine with aura (MA). The known FHM-2 ATP1A2 gene mutations were tested, by sequencing, for the involvement in MA and migraine without aura (MO) in these pedigrees. Sequencing was performed in the coding areas of the ATP1A2 gene through three MA individuals from MF14. RESULTS: Evidence for linkage was obtained at C1q23 to markers spanning the ATP1A2 gene. However, testing of the known ATP1A2 gene mutations (for FHM) in common migraine probands of pedigrees showing excess allele sharing was negative. Sequencing of the entire coding areas of the gene through all the three MA affected from MF14 was also negative for mutations. DISCUSSION: Microsatellite markers on chromosome 1q23 show evidence of excess allele sharing in MA and some MO pedigrees, suggesting linkage to the common forms of migraine and the presence of a susceptibility gene in this region. The FHM-2 (ATP1A2 gene) does not seem to be involved in the common types of migraine. Despite certain clinical characteristics, the genetic correlation between FHM and familial typical migraine remains unclear. Several candidate genes lie within the C1q23 and C1q31 cytogenetic regions; therefore, further studies are needed.
Resumo:
As we race towards a new era, rapid change of conventional models has become the norm. Just as technology has etched itself to the core of society, the sheer quantity of student devices connecting to university networks presents a sector wide challenge coinciding almost perfectly with many universities creating technology rich learning spaces. New fears include future proofing. It is not just a matter of technology becoming outdated. In seeking to accommodate the teaching styles and experience of staff across diverse faculties, is this technology simply too vanilla to meet their needs as they become increasingly skilled and inspired by technology’s potential? Through the early findings of a study into staff use of technology within Queensland University of Technology's next generation collaborative learning spaces, this paper explores whether the answers lie in a model presented by students equipping themselves with the tools they need to learn in the 21st century.
Resumo:
As all hospital staff are highly likely to interact with people living with dementia, education about their needs must be accessible to all staff, not only clinicians. Catherine Travers and David Lie evaluate the results of providing dementia education to non-clinical staff in a large teaching hospital. Dementia training programs offered in the hospital setting can improve staff knowledge and confidence in caring for patients with dementia (Foreman & Gardner 2005; McPhail et al 2009). It’s also been shown that a relatively minor investment in staff education can have noticeable effects on both staff attitudes and hospital practices regarding the care and support of patients with dementia and cognitive impairment (Foreman & Gardner 2005)...
Resumo:
There has been significant debate about the value of screening for dementia, and the need for early diagnosis. Options include Gene testing, early risk assessment, screening, case finding and review when a patient or carer identify that they have symptoms. This paper is not focused on these early approaches to identifying people with dementia. It is focused on the period when a patient or a carer has recognised that there are some memory problems and they are seeking assistance with a diagnosis or explanation in relation to memory loss.
Resumo:
Brief dementia education training programs appear to be effective in improving knowledge about dementia and self-confidence in interacting with patients with dementia. It is recommended that brief dementia training sessions be provided on a regular, on-going basis, particularly in view of frequent staff changes in the acute hospital environment.
Resumo:
The denial of civil rights to convicts has a long history. Its origins lie in the idea of ‘civil death’. Convicts who were not punished by execution would instead suffer civil death which stripped them of inheritance, family and political rights (Davidson, 2004). In Australia and internationally the removal of prisoners’ voting rights has been a controversial topic which has been a subject of much debate and a number of legislation changes (Davidson, 2004). This article argues that even though the latest amendment to the Australian Electoral legislation is, on the face of it, democratic and inclusive, it is in fact a denial of prisoners’ civil rights, which has its roots in the concept of civil death. My argument is in keeping with the themes of the Crime and Governance thematic group and focuses on my research interests in sociology of deviance, social reactions to crime, and socio-legal topics.
Resumo:
Several I- and A-type granite, syenite plutons and spatially associated, giant Fe–Ti–V deposit-bearing mafic ultramafic layered intrusions occur in the Pan–Xi(Panzhihua–Xichang) area within the inner zone of the Emeishan large igneous province (ELIP). These complexes are interpreted to be related to the Emeishan mantle plume. We present LA-ICP-MS and SIMS zircon U–Pb ages and Hf–Nd isotopic compositions for the gabbros, syenites and granites from these complexes. The dating shows that the age of the felsic intrusive magmatism (256.2 ± 3.0–259.8 ± 1.6 Ma) is indistinguishable from that of the mafic intrusive magmatism (255.4 ± 3.1–259.5 ± 2.7 Ma) and represents the final phase of a continuous magmatic episode that lasted no more than 10 Myr. The upper gabbros in the mafic–ultramafic intrusions are generally more isotopically enriched (lower eNd and eHf) than the middle and lower gabbros, suggesting that the upper gabbros have experienced a higher level of crustal contamination than the lower gabbros. The significantly positive eHf(t) values of the A-type granites and syenites (+4.9 to +10.8) are higher than those of the upper gabbros of the associated mafic intrusion, which shows that they cannot be derived by fractional crystallization of these bodies. They are however identical to those of the mafic enclaves (+7.0 to +11.4) and middle and lower gabbros, implying that they are cogenetic. We suggest that they were generated by fractionation of large-volume, plume-related basaltic magmas that ponded deep in the crust. The deep-seated magma chamber erupted in two stages: the first near a density minimum in the basaltic fractionation trend and the second during the final stage of fractionation when the magma was a low density Fe-poor, Si-rich felsic magma. The basaltic magmas emplaced in the shallowlevel magma chambers differentiated to form mafic–ultramafic layered intrusions accompanied by a small amount of crustal assimilation through roof melting. Evolved A-type granites (synenites and syenodiorites) were produced dominantly by crystallization in the deep crustal magma chamber. In contrast, the I-type granites have negative eNd(t) [-6.3 to -7.5] and eHf(t) [-1.3 to -6.7] values, with the Nd model ages (T Nd DM2) of 1.63-1.67 Ga and Hf model ages (T Hf DM2) of 1.56-1.58 Ga, suggesting that they were mainly derived from partial melting of Mesoproterozoic crust. In combination with previous studies, this study also shows that plume activity not only gave rise to reworking of ancient crust, but also significant growth of juvenile crust in the center of the ELIP.
Resumo:
Much academic writing on pornography focuses on the genre’s exceptionalism (the ways in which it is different from other forms of culture). This paper rather focuses on its typicality as a Creative Industry. As with other Creative Industries, in the production and distribution of pornography it is producers who make most money. While a small number of on-camera performers become wealthy and powerful the majority lack creative control and are poorly paid. The careers of performers are typically short examples of “nomadic labour”. Many creative workers are involved in the production of pornography apart those in front of the camera, and the skills of these behind-the-camera creatives can be transferable across sectors. Like other Creative Industries, the pornography business is facing challenges from increased digitalization and globalization; and like other Creative Industries the solutions to these challenges lie in branding, niche marketing, and exploiting new technological possibilities.
Resumo:
The principle of common but differentiated responsibility (CBDR) will play a role in the 2020 Climate Regime. This Article starts by examining differential treatment within the international legal order, finding that it is ethically and practically difficult to implement an international climate instrument based on formal equality. There is evidence of state parties accepting differential responsibilities in a number of areas within the international legal order and the embedding of CBDR in the United Nations Framework Convention on Climate Change (UNFCCC), means that that differential commitments will lie at the heart of the 2020 climate regime. The UNFCCC applies the implementation method of differentiation, while the Kyoto Protocol applies both the obligation and implementation method of differentiation. It is suggested that the implementation model will be the differentiation model retained in the 2020 climate agreement. The Parties’ submissions under the Durban Platform are considered in order to gain an understanding of their positions on CBDR. While there are areas of contention including the role of principles in shaping obligations and the ongoing legal status of Annex I and Non-Annex I distinction, there is broad consensus among the parties in favour of differentiation by implementation with developed and major economies undertaking Quantified Emission Limitation and Reduction Objectives (economy wide targets) and developing countries that are not major economies undertaking sectoral targets.
Resumo:
Despite the dominancy of medical explanations for difficult child behavior, the shifting sands that lie beneath the ADHD construct provide an unstable foundation for educational practice. It can be somewhat liberating to remember that “attention deficit hyperactivity disorder” is a label (one of many, including minimal brain damage and hyperkinetic reaction of childhood) that the medical domain has coined to both group and describe certain challenging behaviors exhibited by children and young people (see Smith, Chapter 2). The label is but one conceptualization of what these behaviors mean and, despite the existence of powerful lobby groups, it may not be the best way forward. In what follows, I present an alternative typology to the medical conceptualization by describing some common issues that bring this group of children to attention. In an effort to introduce educationally useful responses to students who are difficult to teach, I will then outline what classroom teachers need to recognize in order to work with these students and realize their potential. To assist teachers in thinking pedagogically, these observations are coupled with well-known and relevant qualities of good teaching to remind teachers of what they already know and to reacquaint them with the power of that knowledge.
Resumo:
This paper explores the slippery nature of illness and diagnosis in Lauren Slater’s memoir, Lying: a Metaphorical Memoir (2000). Speaking from the shadowy intersection of childhood and adolescence, Slater’s narrator, Lauren, uses the metaphor of epilepsy to describe her own predilection for exaggeration. In exploiting the fallibility of the first-person narrator, Slater insists on the legitimacy of metaphor in accounts of childhood illness that are more concerned with narrative truth than historical accuracy. The result of this playfulness and general misrule is that Slater writes herself into a double bind: on one side, she is the child narrator who inadvertently misrepresents events and misdirects readers, and on the other side, she is the untrustworthy author who employs metaphor as a licence to lie.
Resumo:
Motion control systems have a significant impact on the performance of ships and marine structures allowing them to perform tasks in severe sea states and during long periods of time. Ships are designed to operate with adequate reliability and economy, and in order to achieve this, it is essential to control the motion. For each type of ship and operation performed (transit, landing a helicopter, fishing, deploying and recovering loads, etc.), there are not only desired motion settings, but also limits on the acceptable (undesired) motion induced by the environment. The task of a ship motion control system is therefore to act on the ship so it follows the desired motion as closely as possible. This book provides an introduction to the field of ship motion control by studying the control system designs for course-keeping autopilots with rudder roll stabilisation and integrated rudder-fin roll stabilisation. These particular designs provide a good overview of the difficulties encountered by designers of ship motion control systems and, therefore, serve well as an example driven introduction to the field. The idea of combining the control design of autopilots with that of fin roll stabilisers, and the idea of using rudder induced roll motion as a sole source of roll stabilisation seems to have emerged in the late 1960s. Since that time, these control designs have been the subject of continuous and ongoing research. This ongoing interest is a consequence of the significant bearing that the control strategy has on the performance and the issues associated with control system design. The challenges of these designs lie in devising a control strategy to address the following issues: underactuation, disturbance rejection with a non minimum phase system, input and output constraints, model uncertainty, and large unmeasured stochastic disturbances. To date, the majority of the work reported in the literature has focused strongly on some of the design issues whereas the remaining issues have been addressed using ad hoc approaches. This has provided an additional motivation for revisiting these control designs and looking at the benefits of applying a contemporary design framework, which can potentially address the majority of the design issues.