243 resultados para threat


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The urban waterfront may be regarded as the littoral frontier of human settlement. Typically, over the years, it advances, sometimes retreats, where terrestrial and aquatic processes interact and frequently contest this margin of occupation. Because most towns and cities are sited beside water bodies, many of these urban centers on or close to the sea, their physical expansion is constrained by the existence of aquatic areas in one or more directions from the core. It is usually much easier for new urban development to occur along or inland from the waterfront. Where other physical constraints, such as rugged hills or mountains, make expansion difficult or expensive, building at greater densities or construction on steep slopes is a common response. This kind of development, though technically feasible, is usually more expensive than construction on level or gently sloping land, however. Moreover, there are many reasons for developing along the shore or riverfront in preference to using sites further inland. The high cost of developing existing dry land that presents serious construction difficulties is one reason for creating new land from adjacent areas that are permanently or periodically under water. Another reason is the relatively high value of artificially created land close to the urban centre when compared with the value of existing developable space at a greater distance inland. The creation of space for development is not the only motivation for urban expansion into aquatic areas. Commonly, urban places on the margins of the sea, estuaries, rivers or great lakes are, or were once, ports where shipping played an important role in the economy. The demand for deep waterfronts to allow ships to berth and for adjacent space to accommodate various port facilities has encouraged the advance of the urban land area across marginal shallows in ports around the world. The space and locational demands of port related industry and commerce, too, have contributed to this process. Often closely related to these developments is the generation of waste, including domestic refuse, unwanted industrial by-products, site formation and demolition debris and harbor dredgings. From ancient times, the foreshore has been used as a disposal area for waste from nearby settlements, a practice that continues on a huge scale today. Land formed in this way has long been used for urban development, despite problems that can arise from the nature of the dumped material and the way in which it is deposited. Disposal of waste material is a major factor in the creation of new urban land. Pollution of the foreshore and other water margin wetlands in this way encouraged the idea that the reclamation of these areas may be desirable on public health grounds. With reference to examples from various parts of the world, the historical development of the urban littoral frontier and its effects on the morphology and character of towns and cities are illustrated and discussed. The threat of rising sea levels and the heritage value of many waterfront areas are other considerations that are addressed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stormwater has been recognised as one of the main culprits of aquatic ecosystem pollution and as a significant threat to the goal of ecological sustainable development. Water sensitive urban design is one of the key responses to the need to better manage urban stormwater runoff, the objectives of which go beyond rapid and efficient conveyance. Underpinned by the concepts of sustainable urban development, water sensitive urban design has proven to be an efficient and environmentally-friendly approach to urban stormwater management, with the necessary technical know-how and skills already available. However, large-scale implementation of water sensitive urban design is still lacking in Australia due to significant impediments and negative perceptions. Identification of the issues, barriers and drivers that affect sustainability outcomes of urban stormwater management is one of the first steps towards encouraging the wide-scale uptake of water sensitive urban design features which integrate sustainable urban stormwater management. This chapter investigates key water sensitive urban design perceptions, drivers and barriers in order to improve sustainable urban stormwater management efforts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Prolific British author/illustrator Anthony Browne both participates in the classic fairy-tale tradition and appropriates its cultural capital, ultimately undertaking a process of self-canonisation alongside the dissemination of fairy tales. In reading Browne’s Hansel and Gretel (1981), The Tunnel (1989) and Into the Forest (2004), a trajectory emerges that moves from broadly intertextual to more exclusively self-referential modes of representation which reward readers of “Anthony Browne”, rather than readers of “fairy tales”. All three books depict ‘babes in the woods’ stories wherein child characters must negotiate some form of threat outside the home in order to return home safely. Thus, they represent childhood agency. However, these visions of agency are ultimately subordinated to logics of capital, which means that child readers of Browne’s fairy-tale books are overtly invited to identify with children who act, but are interpellated as privileged if they ‘know’. Bourdieu’s model of ‘cultural capital’ offers a lens for considering Browne’s production of ‘value’ for his own works within a broader cultural landscape which privileges literary fairy tales as a register of juvenile cultural competency. If cultural capital can be formulated most simply as the symbolic exchange value of approved modes of knowing and being, it is clearly helpful when trying to unpack logics of meaning within heavily intertextual or citational texts. It is also helpful thinking about what kinds of stories we as a culture choose to disseminate, choose to privilege, or choose to suppress. Zipes notes of fairy tales that, “the genre itself becomes a kind of institute that is involved in the socialization and acculturation of readers” (22). He elaborates that, “We initiate readers and expect them to learn the fairy-tale code as part of our responsibility in the civilizing process” (Zipes 29), so it is little wonder that Tatar describes fairy tales as “a vital part of our cultural capital” (xix). Although Browne is clearly interested in literary fairy tales, the most obvious strategies of self-canonisation take place in Browne’s work not in words but in pictures: hidden in plain sight, as illustration becomes self-reflexive citation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hong Kong is a modern global city with a reputation for well-regulated financial markets, but for years, the government had been trying to enact laws on corporate rescue procedures with relatively little success. It is under the pretext of the Global Financial Crisis, the threat of a future economic meltdown gave the Hong Kong government the impetus to revisit this issue. This third attempt to codify statutory obligations on directors’ liability for insolvent trading has been criticised for either setting the standards too high or low for directors trading whilst insolvent. There is also some reservation given the beliefs and values of directors in Chinese family-owned and controlled companies. These companies would most likely trade out the difficult times. Nevertheless, this does not negate from the fact that the enactment of corporate rescue procedures in Hong Kong in 2010 is a momentous achievement for the Hong Kong government.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new approach that is slowly replacing neoclassical models of economic growth and commodity based industrial activities, knowledge based urban development (KBUD) aims to provide opportunities for citiesw to foster knowledge creation, exchange and innovation, and is based on the concepts of both sustainable urban development and economic prosperity; sustainable uses and protection of natural resources are therefore integral parts of KBUD. As such, stormwater, which has been recognised as one of the main culprits of aquatic ecosystem pollution and as therefore a significant threat to the goal of sustainable urban development, needs to be managed in a manner that produces ecologically sound outcomes. Water sensitive urban design (WSUD) is one of the key responses to the need to better management urban stormwater runoff and supports KBUD by providing an alternative, innovative and effective strategy to traditional stormwater management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: There is overwhelming scientific evidence that human activities have changed and will continue to change the climate of the Earth. Eco-environmental health, which refers to the interdependencies between ecological systems and population health and well-being, is likely to be significantly influenced by climate change. The aim of this study was to examine perceptions from government stakeholders and other relevant specialists about the threat of climate change, their capacity to deal with it, and how to develop and implement a framework for assessing vulnerability of eco-environmental health to climate change.---------- Methods: Two focus groups were conducted in Brisbane, Australia with representatives from relevant government agencies, non-governmental organisations, and the industry sector (n = 15) involved in the discussions. The participants were specialists on climate change and public health from governmental agencies, industry, and nongovernmental organisations in South-East Queensland.---------- Results: The specialists perceived climate change to be a threat to eco-environmental health and had substantial knowledge about possible implications and impacts. A range of different methods for assessing vulnerability were suggested by the participants and the complexity of assessment when dealing with multiple hazards was acknowledged. Identified factors influencing vulnerability were perceived to be of a social, physical and/or economic nature. They included population growth, the ageing population with associated declines in general health and changes in the vulnerability of particular geographical areas due to for example, increased coastal development, and financial stress. Education, inter-sectoral collaboration, emergency management (e.g. development of early warning systems), and social networks were all emphasised as a basis for adapting to climate change. To develop a framework, different approaches were discussed for assessing eco-environmental health vulnerability, including literature reviews to examine the components of vulnerability such as natural hazard risk and exposure and to investigate already existing frameworks for assessing vulnerability.---------- Conclusion: The study has addressed some important questions in regard to government stakeholders and other specialists’ views on the threat of climate change and its potential impacts on eco-environmental health. These findings may have implications in climate change and public health decision-making.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the faba bean viruses found in West Asia and North Africa was identified as broad bean mottle virus (BBMV) by host reactions, particle morphology and size, serology, and granular, often vesiculated cytoplasmic inclusions. Detailed research on four isolates, one each from Morocco, Tunisia, Sudan and Syria, provided new information on the virus. The isolates, though indistinguishable in ELISA or gel-diffusion tests, differed slightly in host range and symptoms. Twenty-one species (12 legumes and 9 non-legumes) out of 27 tested were systemically infected, and 14 of these by all four isolates. Infection in several species was symptomless, but major legumes such as chickpea, lentil and especially pea, suffered severely from infection. All 23 genotypes of faba bean, 2 of chickpea, 4 of lentil, 11 out of 21 of Phaseolus bean, and 16 out of 17 of pea were systemically sensitive to the virus. Twelve plant species were found to be new potential hosts and cucumber a new local-lesion test plant of the virus. BBMV particles occurred in faba bean plants in very high concentrations and seed transmission in this species (1.37%) was confirmed. An isolate from Syria was purified and two antisera were produced, one of which was used in ELISA to detect BBMV in faba bean field samples. Two hundred and three out of the 789 samples with symptoms suggestive of virus infection collected in 1985, 1986 and 1987, were found infected with BBMV: 4 out of 70 (4/70) tested samples from Egypt, 0/44 from Lebanon, 1/15 from Morocco, 46/254 from Sudan, 72/269 from Syria and 80/137 from Tunisia. This is the first report on its occurrence in Egypt, Syria and Tunisia. The virus is a potential threat to crop improvement in the region.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The outcome of interspecific hybridization between native and invasive species depends on the relative frequencies of parental taxa and viability of hybrid progeny. We investigated individual and population level consequences of hybridization between the Australian native, Senecio pinnatifolius, and the exotic S. madagascariensis, with AFLP markers and used this information to simulate the expected outcome of hybridization.A high frequency (range 8.3-75.6 %) of hybrids was detected in open pollinated seeds of both species, but mature hybrids were absent from sympatric populations indicating that sympatric populations represent tension zones. A hybridization advantage was observed for S. madagascariensis,where significantly more progeny than expected were sired based on proportional representation of the two species in sympatric populations. Simulations indicated S. pinnatifolius could be replaced in sympatric populations if hybridization was density dependent.For this native-exotic pair, prezygotic isolating barriers are weak, but low hybrid viability maintains a strong postzygotic barrier to introgression. Due to asymmetric hybridization, S. pinnatifolius appears under threat from demographic swamping, and local extinction is possible where it occurs in sympatry with S. madagascariensis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The transformation of urban spaces that occurs once darkness falls is simultaneously exhilarating and menacing, and over the past 20 months we have investigated the potential for mobile technology to help users manage their personal safety concerns in the city at night. Our findings subverted commonly held notions of vulnerability, with the threat of violence felt equally by men and women. But while women felt protected because of their mobile technology, men dismissed it as digital Man Mace. We addressed this macho design challenge by studying remote engineers in outback Australia to inspire our personal safety design prototype MATE (Mobile Artifact for Taming Environments).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Damage to genetic material represents a persistent and ubiquitous threat to genomic stability. Once DNA damage is detected, a multifaceted signaling network is activated that halts the cell cycle, initiates repair, and in some instances induces apoptotic cell death. In this article, we will review DNA damage surveillance networks, which maintain the stability of our genome, and discuss the efforts underway to identify chemotherapeutic compounds targeting the core components of DNA double-strand breaks (DSB) response pathway. The majority of tumor cells have defects in maintaining genomic stability owing to the loss of an appropriate response to DNA damage. New anticancer agents are exploiting this vulnerability of cancer cells to enhance therapeutic indexes, with limited normal tissue toxicity. Recently inhibitors of the checkpoint kinases Chk1 and Chk2 have been shown to sensitize tumor cells to DNA damaging agents. In addition, the treatment of BRCA1- or BRCA2-deficient tumor cells with poly(ADP-ribose) polymerase (PARP) inhibitors also leads to specific tumor killing. Due to the numerous roles of p53 in genomic stability and its defects in many human cancers, therapeutic agents that restore p53 activity in tumors are the subject of multiple clinical trials. In this article we highlight the proteins mentioned above and catalog several additional players in the DNA damage response pathway, including ATM, DNA-PK, and the MRN complex, which might be amenable to pharmacological interventions and lead to new approaches to sensitize cancer cells to radio- and chemotherapy. The challenge is how to identify those patients most receptive to these treatments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the launch of the ‘Clean Delhi, Green Delhi’ campaign in 2003, slums have become a significant social and political issue in India’s capital city. Through this campaign, the state, in collaboration with Delhi’s middle class through the ‘Bhagidari system’ (literally translated as ‘participatory system’), aims to transform Delhi into a ‘world-class city’ that offers a sanitised, aesthetically appealing urban experience to its citizens and Western visitors. In 2007, Delhi won the bid to host the 2010 Commonwealth Games; since then, this agenda has acquired an urgent, almost violent, impetus to transform Delhi into an environmentally friendly, aesthetically appealing and ‘truly international city’. Slums and slum-dwellers, with their ‘filth, dirt, and noise’, have no place in this imagined city. The violence inflicted upon slum-dwellers, including the denial of their judicial rights, is justified on these accounts. In addition, the juridical discourse since 2000 has ‘re-problematised slums as ‘nuisance’. The rising antagonism of the middle-classes against the poor, supported by the state’s ambition to have a ‘world-class city’, has allowed a new rhetoric to situate the slums in the city. These representations articulate slums as homogenised spaces of experience and identity. The ‘illegal’ status of slum-dwellers, as encroachers upon public space, is stretched to involve ‘social, cultural, and moral’ decadence and depravity. This thesis is an ethnographic exploration of everyday life in a prominent slum settlement in Delhi. It sensually examines the social, cultural and political materiality of slums, and the relationship of slums with the middle class. In doing so, it highlights the politics of sensorial ordering of slums as ‘filthy, dirty, and noisy’ by the middle classes to calcify their position as ‘others’ in order to further segregate, exclude and discriminate the slums. The ethnographic experience in the slums, however, highlights a complex sensorial ordering and politics of its own. Not only are the interactions between diverse communities in slums highly restricted and sensually ordained, but the middle class is identified as a sensual ‘other’, and its sensual practices prohibited. This is significant in two ways. First, it highlights the multiplicity of social, cultural experience and engagement in the slums, thereby challenging its homogenised representation. Second, the ethnographic exploration allowed me to frame a distinct sense of self amongst the slums, which is denied in mainstream discourses, and allowed me to identify the slums’ own ’others’, middle class being one of them. This thesis highlights sound – its production, performances and articulations – as an act with social, cultural, and political implications and manifestations. ‘Noise’ can be understood as a political construct to identify ‘others’ – and both slum-dwellers and the middle classes identify different sonic practices as noise to situate the ‘other’ sonically. It is within this context that this thesis frames the position of Listener and Hearer, which corresponds to their social-political positions. These positions can be, and are, resisted and circumvented through sonic practices. For instance, amplification tactics in the Karimnagar slums, which are understood as ‘uncultured, callous activities to just create more noise’ by the slums’ middle-class neighbours, also serve definite purposes in shaping and navigating the space through the slums’ soundscapes, asserting a presence that is otherwise denied. Such tactics allow the residents to define their sonic territories and scope of sonic performances; they are significant in terms of exerting one’s position, territory and identity, and they are very important in subverting hierarchies. The residents of the Karimnagar slums have to negotiate many social, cultural, moral and political prejudices in their everyday lives. Their identity is constantly under scrutiny and threat. However, the sonic cultures and practices in the Karimnagar slums allow their residents to exert a definite sonic presence – which the middle class has to hear. The articulation of noise and silence is an act manifesting, referencing and resisting social, cultural, and political power and hierarchies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the late 1990’s, intense and vigorous debate surrounded the impact of minority communities on Australia’s mainstream society. The rise of far-right populism took the stage with the introduction to the political landscape of Pauline Hanson and her One Nation party, whilst John Howard’s Liberal-National Coalition Government took the fore on debate over immigration issues corresponding with an influx of irregular arrivals. In 2001, following the September 11 terrorist attacks in the United States of America and subsequent attacks on western targets globally, many of these issues continued to be debated through the security posturing that followed. In recent years, much effort has been afforded to countering the threat of terrorism from home grown assailants. The Government has introduced stringent legislative responses whilst researchers have studied social movements and trends within Australian communities, particularly with respect to minorities. In 2008, the Scanlon Foundation, in association with Monash University and various government entities, released its findings into its survey approach to mapping social cohesion in Australia. It identified a number of spheres of exploration which it believed were essential to measuring cohesiveness of Australian communities generally including, economic, political and socio-cultural factors (Markus and Dharmalingam, 2008). This doctoral project report will explore the political sphere as identified in the Mapping Social Cohesion project and apply it to identified minority ethnic communities. The Scanlon Foundation project identified political participation as one of a number of true indicators of social cohesion. This project acknowledges that democracy in Australia is represented predominantly by two political entities representing a vast majority of constituents under a compulsory voting regime. This essay will identify the levels of political activism achieved by minority ethnic communities and access to democratic participation within the Australian political structure. It will define a ten year period from 1999 to 2009, identifying trends and issues within minority communities that have proactively and reactively promoted engagement in achieving a political voice, framed within a mainstream-dominated political system. It will research social movements and other influential factors over that period to enrich existing knowledge in relation to political participation rates across Australian communities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hot spot identification (HSID) plays a significant role in improving the safety of transportation networks. Numerous HSID methods have been proposed, developed, and evaluated in the literature. The vast majority of HSID methods reported and evaluated in the literature assume that crash data are complete, reliable, and accurate. Crash under-reporting, however, has long been recognized as a threat to the accuracy and completeness of historical traffic crash records. As a natural continuation of prior studies, the paper evaluates the influence that under-reported crashes exert on HSID methods. To conduct the evaluation, five groups of data gathered from Arizona Department of Transportation (ADOT) over the course of three years are adjusted to account for fifteen different assumed levels of under-reporting. Three identification methods are evaluated: simple ranking (SR), empirical Bayes (EB) and full Bayes (FB). Various threshold levels for establishing hotspots are explored. Finally, two evaluation criteria are compared across HSID methods. The results illustrate that the identification bias—the ability to correctly identify at risk sites--under-reporting is influenced by the degree of under-reporting. Comparatively speaking, crash under-reporting has the largest influence on the FB method and the least influence on the SR method. Additionally, the impact is positively related to the percentage of the under-reported PDO crashes and inversely related to the percentage of the under-reported injury crashes. This finding is significant because it reveals that despite PDO crashes being least severe and costly, they have the most significant influence on the accuracy of HSID.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Video surveillance technology, based on Closed Circuit Television (CCTV) cameras, is one of the fastest growing markets in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. To overcome this limitation, it is necessary to have “intelligent” processes which are able to highlight the salient data and filter out normal conditions that do not pose a threat to security. In order to create such intelligent systems, an understanding of human behaviour, specifically, suspicious behaviour is required. One of the challenges in achieving this is that human behaviour can only be understood correctly in the context in which it appears. Although context has been exploited in the general computer vision domain, it has not been widely used in the automatic suspicious behaviour detection domain. So, it is essential that context has to be formulated, stored and used by the system in order to understand human behaviour. Finally, since surveillance systems could be modeled as largescale data stream systems, it is difficult to have a complete knowledge base. In this case, the systems need to not only continuously update their knowledge but also be able to retrieve the extracted information which is related to the given context. To address these issues, a context-based approach for detecting suspicious behaviour is proposed. In this approach, contextual information is exploited in order to make a better detection. The proposed approach utilises a data stream clustering algorithm in order to discover the behaviour classes and their frequency of occurrences from the incoming behaviour instances. Contextual information is then used in addition to the above information to detect suspicious behaviour. The proposed approach is able to detect observed, unobserved and contextual suspicious behaviour. Two case studies using video feeds taken from CAVIAR dataset and Z-block building, Queensland University of Technology are presented in order to test the proposed approach. From these experiments, it is shown that by using information about context, the proposed system is able to make a more accurate detection, especially those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information give critical feedback to the system designers to refine the system. Finally, the proposed modified Clustream algorithm enables the system to both continuously update the system’s knowledge and to effectively retrieve the information learned in a given context. The outcomes from this research are: (a) A context-based framework for automatic detecting suspicious behaviour which can be used by an intelligent video surveillance in making decisions; (b) A modified Clustream data stream clustering algorithm which continuously updates the system knowledge and is able to retrieve contextually related information effectively; and (c) An update-describe approach which extends the capability of the existing human local motion features called interest points based features to the data stream environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.