87 resultados para metabelian groups


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examined the operational structure of Southeast Asian drug trafficking groups operating on the eastern seaboard of Australia by testing the validity and application of organised crime and drug trafficking typologies using data obtained from 159 drug trafficking cases in three Australian states: New South Wales; Queensland; and Victoria. Key findings indicated that the usefulness of typologies is limited when classifying and analysing organised crime groups. In particular, Southeast Asian drug trafficking groups operated largely in small, informal, family-based hierarchies or groups that were better conceptualised using theoretical perspectives from network and cultural studies. The study recommended that replicating previous empirical research in the field is an effective approach that will contribute towards building a cumulative body of knowledge on organised crime structures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Synthetic goethite and thermally treated goethite at different temperatures were used to remove phosphate from sewage. The effect of annealing temperature on phosphate removal over time was investigated. X-ray diffraction(XRD), transmission electron microscopy (TEM), N2 adsorption and desorption (BET), and infrared emission spectrum (FT-IES) were utilized to characterize the phase, morphology, specific surface area, pore distribution, and the surface groups of samples. The results show that annealed products of goethite at temperatures over 250 °C are hematite with the similar morphology as the original goethite with different hydroxyl groups and surface area. Increasing temperature causes the decrease in hydroxyl groups, consequential increase in surface area at first and then experiences a decrease (14.8–110.4–12.6 m2/g) and the subsequent formation of nanoscale pores. The variation rate of hydroxyl groups and surface area based on FT-IES and BET, respectively, are used to evaluate the effect of annealing temperature on phosphate removal. By using all of the characterization techniques, it is concluded that the changes of phosphate removal basically result from the total variation rate between hydroxyl groups and surface area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aims Physical activity has been shown to increase adolescent self-esteem. The aim of this investigation was to assess adolescent perceptions of parental support for physical activity endeavours, and its relationship with self-esteem among high and low SES groups. Methods Perceptions of parental support, and Rosenberg’s self-esteem (1965) were derived from the Children’s Physical Activity Correlates questionnaire, with scores ranging from 1 (lowest) to 4 (highest). Independent sample t-tests were conducted and Levene’s test indicated homogenous group variance, while Pearson’s r was employed to assess relationships between perceptions of parental support, and self-esteem. Results Overall, 111 (89%) and 64 (55%) high and low SES participants had complete data and were included in the analysis. The high SES differed for self-esteem (M = 3.39, SE = .05) from the low SES group (M = 2.75, SE = .08), t (173) = 6.82, p < .05, with a medium effect size (ES) r = .46. The high SES group scored higher for perceptions of parental support (M = 2.95, SE = .06) than the low SES group (M = 2.71, SE = .07), t (173) = 2.58, p < .05, with a low ES r = .04. Self-esteem was significantly correlated with parental support in both high (r = .34) and low (r = .47) SES groups. Conclusion Results indicate that perceptions of parental support may be a stronger indicator of self-esteem for low, than for high SES adolescents. Future physical activity strategies to promote self-esteem should involve parents as active facilitators.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent events, notions of political protest, civil disobedience, extremism, and criminal action have become increasingly blurred. The London Riots, the Occupy movement, and the actions of hacking group Anonymous have all sparked heated debate about the limits of legitimate protest, and the distinction between an acceptable action and a criminal offence. Long before these events, environmental activists were challenging convention in protest actions, with several groups engaging in politically motivated law-breaking. The emergence of the term ‘eco-tage’ (the sabotage of equipment in order to protect the environment) signifies the important place environmental activists hold in challenging the traditional boundaries between illegal action and legitimate protest. Many of these groups establish their own boundaries of legitimacy, with some justifying their actions on the basis of civil disobedience or extensional self-defence. This paper examines the statements of environmental activist organisations that have engaged in politically motivated law breaking. It identifies the parameters that these groups set on their illegal actions, as well as the justifications that they provide, with a view to determining where these actions fit in the vast grey area between legal protest and violent extremism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Migraine is a painful and debilitating disorder with a significant genetic component. Steroid hormones, in particular estrogen, have long been considered to play a role in migraine, as variations in hormone levels are associated with migraine onset in many sufferers of the disorder. Steroid hormones mediate their activity via hormone receptors, which have a wide tissue distribution. Estrogen receptors have been localized to the brain in regions considered to be involved in migraine pathogenesis. Hence it is possible that genetic variation in the estrogen receptor gene may play a role in migraine susceptibility. This study thus examined the estrogen receptor 1 (ESRα) gene for a potential role in migraine pathogenesis and susceptibility. A population-based cohort of 224 migraine sufferers and 224 matched controls were genotyped for the G594A polymorphism located in exon 8 of the ESR1 gene. Statistical analysis indicated a significant difference between migraineurs and non-migraineurs in both the allele frequencies (P=0.003) and genotype distributions (P=0.008) in this sample. An independent follow-up study was then undertaken using this marker in an additional population-based cohort of 260 migraine sufferers and 260 matched controls. This resulted in a significant association between the two groups with regard to allele frequencies (P=8×10−6) and genotype distributions (P=4×10−5). Our findings support the hypothesis that genetic variation in hormone receptors, in particular the ESR1 gene, may play a role in migraine.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: To examine between eye differences in corneal higher order aberrations and topographical characteristics in a range of refractive error groups. Methods: One hundred and seventy subjects were recruited including; 50 emmetropic isometropes, 48 myopic isometropes (spherical equivalent anisometropia ≤ 0.75 D), 50 myopic anisometropes (spherical equivalent anisometropia ≥ 1.00 D) and 22 keratoconics. The corneal topography of each eye was captured using the E300 videokeratoscope (Medmont, Victoria, Australia) and analyzed using custom written software. All left eye data were rotated about the vertical midline to account for enantiomorphism. Corneal height data were used to calculate the corneal wavefront error using a ray tracing procedure and fit with Zernike polynomials (up to and including the eighth radial order). The wavefront was centred on the line of sight by using the pupil offset value from the pupil detection function in the videokeratoscope. Refractive power maps were analysed to assess corneal sphero-cylindrical power vectors. Differences between the more myopic (or more advanced eye for keratoconics) and the less myopic (advanced) eye were examined. Results: Over a 6 mm diameter, the cornea of the more myopic eye was significantly steeper (refractive power vector M) compared to the fellow eye in both anisometropes (0.10 ± 0.27 D steeper, p = 0.01) and keratoconics (2.54 ± 2.32 D steeper, p < 0.001) while no significant interocular difference was observed for isometropic emmetropes (-0.03 ± 0.32 D) or isometropic myopes (0.02 ± 0.30 D) (both p > 0.05). In keratoconic eyes, the between eye difference in corneal refractive power was greatest inferiorly (associated with cone location). Similarly, in myopic anisometropes, the more myopic eye displayed a central region of significant inferior corneal steepening (0.15 ± 0.42 D steeper) relative to the fellow eye (p = 0.01). Significant interocular differences in higher order aberrations were only observed in the keratoconic group for; vertical trefoil C(3,-3), horizontal coma C(3,1) secondary astigmatism along 45 C(4, -2) (p < 0.05) and vertical coma C(3,-1) (p < 0.001). The interocular difference in vertical pupil decentration (relative to the corneal vertex normal) increased with between eye asymmetry in refraction (isometropia 0.00 ± 0.09, anisometropia 0.03 ± 0.15 and keratoconus 0.08 ± 0.16 mm) as did the interocular difference in corneal vertical coma C (3,-1) (isometropia -0.006 ± 0.142, anisometropia -0.037 ± 0.195 and keratoconus -1.243 ± 0.936 μm) but only reached statistical significance for pair-wise comparisons between the isometropic and keratoconic groups. Conclusions: There is a high degree of corneal symmetry between the fellow eyes of myopic and emmetropic isometropes. Interocular differences in corneal topography and higher order aberrations are more apparent in myopic anisometropes and keratoconics due to regional (primarily inferior) differences in topography and between eye differences in vertical pupil decentration relative to the corneal vertex normal. Interocular asymmetries in corneal optics appear to be associated with anisometropic refractive development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most research virtually ignores the important role of a blood clot in supporting bone healing. In this study, we investigated the effects of surface functional groups carboxyl and alkyl on whole blood coagulation, complement activation and blood clot formation. We synthesised and tested a series of materials with different ratios of carboxyl (–COOH) and alkyl (–CH3, –CH2CH3 and –(CH2)3CH3) groups. We found that surfaces with –COOH/–(CH2)3CH3 induced a faster coagulation activation than those with –COOH/– CH3 and –CH2CH3, regardless of the –COOH ratios. An increase in –COOH ratios on –COOH/–CH3 and –CH2CH3 surfaces decreased the rate of coagulation activation. The pattern of complement activation was entirely similar to that of surface-induced coagulation. All material coated surfaces resulted in clots with thicker fibrin in a denser network at the clot/material interface and a significantly slower initial fibrinolysis when compared to uncoated glass surfaces. The amounts of platelet-derived growth factor-AB (PDGF-AB) and transforming growth factor-b (TGF-b1) released from an intact clot were higher than a lysed clot. The release of PDGF-AB was found to be correlated with the fibrin density. This study demonstrated that surface chemistry can significantly influence the activation of blood coagulation and complement system, resultant clot structure, susceptibility to fibrinolysis as well as release of growth factors, which are important factors determining the bone healing process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report on the use of the hydrogen bond acceptor properties of some phosphorus-containing functional groups for the assembly of a series of [2]rotaxanes. Phosphinamides, and the homologous thio– and selenophosphinamides, act as hydrogen bond acceptors that, in conjunction with an appropriately positioned amide group on the thread, direct the assembly of amide-based macrocycles around the axle to form rotaxanes in up to 60% yields. Employing solely phosphorus-based functional groups as the hydrogen bond accepting groups on the thread, a bis(phosphinamide) template and a phosphine oxide-phosphinamide template afforded the corresponding rotaxanes in 18 and 15 % yields, respectively. X-Ray crystallography of the rotaxanes shows the presence of up to four intercomponent hydrogen bonds between the amide groups of the macrocycle and various hydrogen bond accepting groups on the thread, including rare examples of amide-to-phosphonamide, -thiophosphinamide and -selenophosphinamide groups. With a phosphine oxide-phosphinamide thread, the solid state structure of the rotaxane is remarkable, featuring no direct intercomponent hydrogen bonds but rather a hydrogen bond network involving water molecules that bridge the H-bonding groups of the macrocycle and thread through bifurcated hydrogen bonds. The incorporation of phosphorus-based functional groups into rotaxanes may prove useful for the development of molecular shuttles in which the macrocycle can be used to hinder or expose binding ligating sites for metal-based catalysts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examined the formation and operation of women's microfinance self-help groups in southern India and investigated whether or not the poorest of the poor women were accepted as members of those groups. The study found that caste was used as a selection criterion. Many eligible women excluded themselves from joining the self-help group due to their own lack of education, age, poor health, poverty and lack of trust in the system. The research revealed that self-help groups enhanced women's income and education, improved village infrastructure, and reduced household conflict. Factors that might prevent inclusion of the poorest of the poor in future microfinance programs were identified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i  ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.