117 resultados para Low Level light Therapy
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.
Resumo:
The GameFlow model strives to be a general model of player enjoyment, applicable to all game genres and platforms. Derived from a general set of heuristics for creating enjoyable player experiences, the GameFlow model has been widely used in evaluating many types of games, as well as non-game applications. However, we recognize that more specific, low-level, and implementable criteria are potentially more useful for designing and evaluating video games. Consequently, the research reported in this paper aims to provide detailed heuristics for designing and evaluating one specific game genre, real-time strategy games. In order to develop these heuristics, we conducted a grounded theoretical analysis on a set of professional game reviews and structured the resulting heuristics using the GameFlow model. A selection of the resulting 165 heuristics are presented in this paper and discussed with respect to key evaluations of the GameFlow model.
Resumo:
The GameFlow model strives to be a general model of player enjoyment, applicable to all game genres and platforms. Derived from a general set of heuristics for creating enjoyable player experiences, the GameFlow model has been widely used in evaluating many types of games, as well as non-game applications. However, we recognize that more specific, low-level, and implementable criteria are potentially more useful for designing and evaluating video games. Consequently, the research reported in this paper aims to provide detailed heuristics for designing and evaluating one specific game genre, real-time strategy games. In order to develop these heuristics, we conducted a grounded theoretical analysis on a set of professional game reviews and structured the resulting heuristics using the GameFlow model. The resulting 165 heuristics for designing and evaluating real-time strategy games are presented and discussed in this paper.
Resumo:
Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.
Resumo:
Efficient state asset management is crucial for government departments that rely on the operations of their state assets in order to fulfil their public functions, which include public service provision and others. These assets may be expensive, extensive and or, complex, and can have a major impact on the ability of governments to perform its function over extended periods. Various governments around the world have increasingly recognised the importance of an efficient state asset management laws, policies, and practices; exemplified by the surge in state asset management reform. This phenomenon is evident in Indonesia, in particular through the establishment of the Directorate General of State Assets in 2006, who was appointed as the ultimate state asset manager (of Republic of Indonesia) and the proprietor of state asset management reform. The Directorate General of State Assets too has pledged its adherence to good governance principles within its state asset management laws and policies reform. However the degree that good governance principles are conceptualised is unknown, resulting in questions of how and to what extent is good governance principles evident within Indonesia's reformed state asset management laws and policies. This study seeks to understand the level of which good governance principles are conceptualised and understood within reformed state asset management policies in Indonesia (as a case study), and identify the variables that play a role in the implementation of said reform. Although good governance improvements has been a central tenet in Indonesian government agenda, and state asset management reform has propelled in priority due to found neglect and unfavourable audit results; there is ambiguity in regards to the extent that good governance is conceptualised within the reform, how and whether this relationship is understood by state asset managers (i.e government officials), and what (and how) other variables play a supporting and/or impeding role in the reform. Using empirical data involving a sample of four Indonesian regional governments and 70 interviews; discrepancy in which good governance principles are conceptualised, the level it is conceptualised, at which stage of state asset management practice it is conceptualised, and the level it is understood by state asset managers (i.e government officials) was found. Human resource capacity and capability, the notion of 'needing more time', low legality, infancy of reform, and dysfunctional sense of stewardship are identified as specific impeding variables to state asset management reform; whilst decentralisation and regional autonomy regime, political history, and culture play a consistent undercurrent key role in good governance related reforms within Indonesia. This study offers insights to Indonesian policy makers interested in ensuring the conceptualisation and full implementation of good governance in all areas of governing, particularly within state asset management practices. Most importantly, this study identifies an asymmetry in good governance understanding, perspective, and assumptions between policy maker (i.e high level government officials) and policy implementers (i.e low level government officials); to be taken into account for future policy evolvements and/or writing. As such, this study suggests the need for a modified perspective and approach to good governance conceptualisation and implementation strategies, one that acknowledges and incorporates a nation's unique characteristics and no longer denies the double-edged sword of simplified assumptions of governance.
Resumo:
There has been a low level of interest in peripheral aberrations and corresponding image quality for over 200 years. Most work has been concerned with the second-order aberrations of defocus and astigmatism that can be corrected with conventional lenses. Studies have found high levels of aberration, often amounting to several dioptres, even in eyes with only small central defocus and astigmatism. My investigations have contributed to understanding shape changes in the eye with increases in myopia, changes in eye optics with ageing, and how surgical interventions intended to correct central refractive errors have unintended effects on peripheral optics. My research group has measured peripheral second- and higher-order aberrations over a 42° horizontal × 32° vertical diameter visual field. There is substantial variation in individual aberrations with age and pathology. While the higher-order aberrations in the periphery are usually small compared with second-order aberrations, they can be substantial and change considerably after refractive surgery. The thrust of my research in the next few years is to understand more about the peripheral aberrations of the human eye, to measure visual performance in the periphery and determine whether this can be improved by adaptive optics correction, to use measurements of peripheral aberrations to learn more about the optics of the eye and in particular the gradient index structure of the lens, and to investigate ways of increasing the size of the field of good retinal image quality.
Resumo:
The purpose of this study was to test a model of the relationship between temperament, character and job performance, in order to better understand the cause of stable individual differences in job performance. Personality was conceptualized in terms of Cloninger, Svrakic and Przybeck’s (1993) theoretical framework of personality. It was expected that Self Directedness (character) would mediate Harm Avoidance and Persistence (temperament) in the prediction of job performance. In order to test the hypotheses, a sample of 94 employee/supervisor pairs was recruited from several organizations across Australia. Participants completed a number of questionnaires online, regarding their personality traits (completed by employees) and Job Performance (completed by Supervisors). Consistent with the hypothesis, Self Directedness was found to be a moderate, direct predictor of job performance. Also consistent with the hypothesis, Self Directedness mediated Harm Avoidance in the prediction of job performance. Results show that character (Self Directedness) is important in the prediction of job performance, and also suggests that fearful, avoidant individuals are less likely to perform well in the workplace, based on their low level of character development.
Resumo:
The purpose of this study was to evaluate aspects of participation in a participatory action research project, the Ashgrove Healthy School Environment Project. Participatory action research is a form of research that creates change as an explicit part of the research process and requires the active participation of those by and for whom the research is being conducted. This study arose from concems by this researcher, who is also a co-facilitator of the project, that levels of participation were not as extensive as one might have hoped and that this seemingly low level would have a negative impact on the continuing participation of those already involved. Specifically. this evaluation sought to uncover the reasons that prompted participation, to identify structural barriers to initial involvement and to uncover participants' perceptions of the process, including barriers and opportunities. It also sought to record evidence of any shift in decision making and to draw implications about the findings that could assist the project, the school, other schools and the wider community. This evaluation involved focus group discussions and interviews with participants actively involved in the school project. The purpose was to uncover their views, feelings and perceptions about their participation and the participatory processes in use generally. It also included some examination of school documents and newsletters and as also drawn on the reflections of this 'insider' researcher, based on two years of involvement in facilitating the project. The findings that emerge from this study are heartening. Rather than feeling anxious about the long-term sustainability of the project, this researcher now feels more confident about its achievements, both in terms of the changes that have occurred in the school and about the participatory processes and levels of participation. Whilst the evaluation has identified a number of barriers, both institutional, personal and project related, it has also identified several key factors that serve to promote participation.
Resumo:
Objective: Several new types of contraception became available in Australia over the last twelve years (the implant in 2001, progestogen intra-uterine device (IUD) in 2003, and vaginal contraceptive ring in 2007). Most methods of contraception require access to health services. Permanent sterilisation and the insertion of an implant or IUD involve a surgical procedure. Access to health professionals providing these specialised services may be more difficult in rural areas. This paper examines uptake of permanent or long-acting reversible contraception (LARCs) among Australian women in rural areas compared to women in urban areas. Method: Participants in the Australian Longitudinal Study on Women's Health born in 1973-78 reported on their contraceptive use at three surveys: 2003, 2006 and 2009. Contraceptive methods included permanent sterilisation (tubal ligation, vasectomy), non-daily or LARC methods (implant, IUD, injection, vaginal ring), and other methods including daily, barrier or "natural" methods (oral contraceptive pills, condoms, withdrawal, safe period). Sociodemographic, reproductive history and health service use factors associated with using permanent, LARC or other methods were examined using a multivariable logistic regression analysis. Results: Of 9,081 women aged 25-30 in 2003, 3% used permanent methods and 4% used LARCs. Six years later in 2009, of 8,200 women (aged 31-36), 11% used permanent methods and 9% used LARCs. The fully adjusted parsimonious regression model showed that the likelihood of a woman using LARCs and permanent methods increased with number of children. Women whose youngest child was school-age were more likely to use LARCs (OR=1.83, 95%CI 1.43-2.33) or permanent methods (OR=4.39, 95%CI 3.54-5.46) compared to women with pre-school children. Compared to women living in major cities, women in inner regional areas were more likely to use LARCs (OR=1.26, 95%CI 1.03-1.55) or permanent methods (OR=1.43, 95%CI 1.17-1.76). Women living in outer regional and remote areas were more likely than women living in cities to use LARCs (OR=1.65, 95%CI 1.31-2.08) or permanent methods (OR=1.69, 95%CI 1.43-2.14). Women with poorer access to GPs were more likely to use permanent methods (OR=1.27, 95%CI 1.07-1.52). Conclusions: Location of residence and access to health services are important factors in women's choices about long-acting contraception in addition to the number and age of their children. There is a low level of uptake of non-daily, long-acting methods of contraception among Australian women in their mid-thirties.
Resumo:
Adequate amount of graphene oxide (GO) was firstly prepared by oxidation of graphite and GO/epoxy nanocomposites were subsequently prepared by typical solution mixing technique. X-ray diffraction (XRD) pattern, X-ray photoelectron (XPS), Raman and Fourier transform infrared (FTIR) spectroscopy indicated the successful preparation of GO. Scanning electron microscopy (SEM) and Transmission electron microscopy (TEM) images of the graphite oxide showed that they consist of a large amount of graphene oxide platelets with a curled morphology containing of a thin wrinkled sheet like structure. AFM image of the exfoliated GO signified that the average thickness of GO sheets is ~1.0 nm which is very similar to GO monolayer. Mechanical properties of as prepared GO/epoxy nanocomposites were investigated. Significant improvements in both Young’s modulus and tensile strength were observed for the nanocomposites at very low level of GO loading. The Young’s modulus of the nanocomposites containing 0.5 wt% GO was 1.72 GPa, which was 35 % higher than that of the pure epoxy resin (1.28 GPa). The effective reinforcement of the GO based epoxy nanocomposites can be attributed to the good dispersion and the strong interfacial interactions between the GO sheets and the epoxy resin matrices.
Resumo:
Oceania has a relatively low level of crime prevalence yet in the smaller and under-developed PICs we have shown that transnational crime has become increasingly common. A risk contained but potentially dangerous if state failure or fragility undermines law enforcement capacities. We predict that as the pace of globalization quickens and the demand for raw materials and resources grows some parts of the Pacific will be prone to criminal enterprises run by both indigenous and foreign crime groups. Australia and New Zealand will remain attractors of illicit goods notably ATS but will in turn be source countries for diminishing fish stock such as beche de mere and abalone as well forest timber. Finally the role of states such as Australia and New Zealand in helping to maintain law enforcement capacities throughout the region will be crucial if organized crime in Oceania is to be kept in check while demand for illicit resources grow.
Resumo:
Oceania has a relatively low level of crime prevalence yet in the smaller and under-developed PICs we have shown that transnational crime has become increasingly common. A risk contained but potentially dangerous if state failure or fragility undermines law enforcement capacities. We predict that as the pace of globalization quickens and the demand for raw materials and resources grows some parts of the Pacific will be prone to criminal enterprises run by both indigenous and foreign crime groups. Australia and New Zealand will remain attractors of illicit goods notably ATS but will in turn be source countries for diminishing fish stock such as beche de mere and abalone as well forest timber. Finally the role of states such as Australia and New Zealand in helping to maintain law enforcement capacities throughout the region will be crucial if organized crime in Oceania is to be kept in check while demand for illicit resources grow.
Resumo:
Background and Objectives Obesity and some dietary related diseases are emerging health problems among Chinese immigrants and their children in developed countries. These health problems are closely linked to eating habits, which are established in the early years of life. Young children’s eating habits are likely to persist into later childhood and youth. Family environment and parental feeding practices have a strong effect on young children’s eating habits. Little information is available on the early feeding practices of Chinese mothers in Australia. The aim of this study was to understand the dietary beliefs, feeding attitudes and practices of Chinese mothers with young children who were recent immigrants to Australia. Methods Using a sequential explanatory design, this mixed methods study consisted of two distinct phases. Phase 1 (quantitative): 254 Chinese immigrant mothers of children aged 12 to 59 months completed a cross-sectional survey. The psychometric properties and factor structure of a Chinese version of the Child Feeding Questionnaire (CFQ, by Birch et al. 2001) were assessed and used to measure specific maternal feeding attitudes and controlling feeding practices. Other questions were developed from the literature and used to explore maternal traditional dietary beliefs and feeding practices related to their beliefs, perceptions of picky eating in children and a range of socioeconomic and acculturation factors. Phase 2 (qualitative): 21 mothers took part in a follow-up telephone interview to assist in explaining and interpreting some significant findings obtained in the first phase. Results Chinese mothers held strong traditional dietary beliefs and fed their children according to these beliefs. However, children’s consumption of non-core foods was high. Both traditional Chinese and Australian style foods were consumed by their children. Confirmatory factor analysis revealed that the original 7-factor model of the CFQ provided an acceptable fit to the data with minor modification. However, an alternative model with eight constructs in which two items related to using food rewards were separated from the original restriction construct, not only provided an acceptable fit to the data, but also improved the conceptual clarity of the constructs. The latter model included 24 items loading onto the following eight constructs: restriction, pressure to eat, monitoring, use of food rewards, perceived responsibility, perception of own weight, perception of child’s weight, and concern about child becoming overweight. The internal consistency of the constructs was acceptable or desirable (Cronbach’s α = .60 - .93). Mothers reported low levels of concern about their child overeating or becoming overweight, but high levels of controlling feeding practices: restriction, monitoring, pressure to eat and use of food rewards. More than one quarter of mothers misinterpreted their child’s weight status (based on mothers’ self-reported data). In addition, mothers’ controlling feeding practices independently predicted half of the variance and explained 16% of the variance in child weight status: pressuring the child to eat was negatively associated with child weight status (β = -0.30, p < .01) and using food rewards was positively associated with child weight status (β = 0.20, p < .05) after adjusting for maternal and child covariates. Monitoring and restriction were not associated with child weight status. Mothers’ perceptions of their child’s weight were positively associated with child weight status (β = 0.33, p < .01). Moreover, mothers reported that they mostly decided what (65%) and how much (80%) food their child ate. Mothers who decided what food their child ate were more likely to monitor (β = -0.17, p < .05) and restrict (β = -0.17, p < .05) their child’s food consumption. Mothers who let their child decide how much food their child ate were less likely to pressure their child to eat (β = -0.38, p < .01) and use food rewards (β = -0.24, p < .01). Mothers’ perceptions of picky eating behaviour were positively associated with their use of pressure (β = 0.21, p < .01) and negatively associated with monitoring (β = -0.16, p < .05) and perceptions of their child’s weight status (β = -0.13, p < .05). Qualitative data showed that pressuring to eat, monitoring and restriction of the child’s food consumption were common practices among these mothers. However, mothers stated that their motivation for monitoring and restricting was to ensure the child’s general health. Mothers’ understandings of picky eating behaviour in their children were consistent with the literature and they reported multiple feeding strategies to deal with it. Conclusion Chinese immigrant mothers demonstrated strong traditional dietary beliefs, a low level of concern for child weight, misperceptions of child weight status, and a high overall level of control in child feeding in this study. The Chinese version of the CFQ, which consists of eight constructs and distinguishes between the constructs using food rewards and restriction, is an appropriate instrument to assess feeding attitudes and controlling feeding practices among Chinese immigrant mothers of young children in Australia. Mothers’ feeding attitudes and practices were associated with children’s weight status and mothers’ perceptions of picky eating behaviour in children after adjusting for a range of socio-demographic maternal and child characteristics. Monitoring and restriction of children’s food consumption according to food selection may be positive feeding practices, whereas pressuring to eat and using food rewards appeared to be negative feeding practices in this study. In addition, the results suggest that these young children have high exposure to energy-dense, nutrient-poor food. There is a need to develop and implement nutrition interventions to improve maternal feeding practices and the dietary quality among children of Chinese immigrant mothers in Australia.
Resumo:
This study examined the beliefs underlying people’s decision-making, from a theory of planned behaviour (TPB) framework, in the prediction of curbside household waste recycling. Community members in Brisbane, Australia (N = 148) completed a questionnaire assessing the belief based TPB measures of attitudinal beliefs (costs and benefits), normative beliefs (important referents), and control beliefs (barriers) in relation to engaging in curbside household waste recycling for a 2-week period. Two weeks later, participants completed self report measures of recycling behaviour for the previous fortnight. The results revealed that the attitudinal, normative, and control beliefs for people who performed higher and lower levels of recycling differed significantly. A regression analysis identified both normative and control beliefs as the main determinants of recycling behaviour. For normative beliefs, high level recyclers perceived more approval from referents such as partners, friends, and neighbours to recycle all eligible materials. In addition, the strong results for control beliefs indicated that barriers such as forgetfulness, lack of time, and laziness were rated as more likely to hamper optimal recycling performance for low level recyclers. These findings provide important applied information about beliefs to target in the development of future community recycling campaigns.