197 resultados para 128-798A
Resumo:
Information security policies play an important role in achieving information security. Confidentiality, Integrity, and Availability are classic information security goals attained by enforcing appropriate security policies. Workflow Management Systems (WfMSs) also benefit from inclusion of these policies to maintain the security of business-critical data. However, in typical WfMSs these policies are designed to enforce the organisation’s security requirements but do not consider those of other stakeholders. Privacy is an important security requirement that concerns the subject of data held by an organisation. WfMSs often process sensitive data about individuals and institutions who demand that their data is properly protected, but WfMSs fail to recognise and enforce privacy policies. In this paper, we illustrate existing WfMS privacy weaknesses and introduce WfMS extensions required to enforce data privacy. We have implemented these extensions in the YAWL system and present a case scenario to demonstrate how it can enforce a subject’s privacy policy.
Resumo:
This chapter provides a theoretically and empirically grounded discussion of participatory research methodologies with respect to investigating the dynamic and evolving phenomenon of young people constructing identities and social relations in “iScapes”. We coin the term iScapes to refer to the online/offline interconnectedness of spaces in the fabric of everyday life. Specifically, we offer a critical analysis of the participatory research methods we used in our own research project to understand the ways in which high school students use new media and information communication technologies (ICTs) to construct identities, form social relations, and engage in creative practices as part of their everyday lives. The chapter concludes with reflexive deliberations on our approach to participatory research that may benefit other researchers who share a similar interest in youth and new media.
Resumo:
This Australian study explores the mentoring of pre-service teachers in selecting and implementing teaching strategies to meet students‟ learning needs. Two case studies involving 28 mentor teachers in a professional development program and a mentor-mentee partnership during a four week practicum provided data about mentoring teaching strategies for differentiated learning. Findings showed that contexts for learning about differentiation occurred at the pre action, in-action, and post-action stages. Central to each stage were pedagogical knowledge practices such as planning, preparation, classroom management, assessment, and problem solving (reflection-in-action to present solutions to problems) as key to in-action strategising and the mentoring processes. Mentoring pre-service teachers on how to devise teaching strategies for differentiated learning needs to be researched with a wider range of mentors and pre-service teachers, including those at different stages of development.
Resumo:
High magnification and large depth of field with a temporal resolution of less than 100 microseconds are possible using the present invention which combines a linear electron beam produced by a tungsten filament from an SX-40A Scanning Electron Microscope (SEM), a magnetic deflection coil with lower inductance resulting from reducing the number of turns of the saddle-coil wires, while increasing the diameter of the wires, a fast scintillator, photomultiplier tube, photomultiplier tube base, and signal amplifiers and a high speed data acquisition system which allows for a scan rate of 381 frames per second and 256.times.128 pixel density in the SEM image at a data acquisition rate of 25 MHz. The data acquisition and scan position are fully coordinated. A digitizer and a digital waveform generator which generates the sweep signals to the scan coils run off the same clock to acquire the signal in real-time.
Resumo:
Production of nanofibrous polyacrylonitrile/calcium carbonate (PAN/CaCO3) nanocomposite web was carried out through solution electrospinning process. Pore generating nanoparticles were leached from the PAN matrices in hydrochloric acid bath with the purpose of producing an ultimate nanoporous structure. The possible interaction between CaCO3 nanoparticles and PAN functional groups was investigated. Atomic absorption method was used to measure the amount of extracted CaCO3 nanoparticles. Morphological observation showed nanofibers of 270–720 nm in diameter containing nanopores of 50–130 nm. Monitoring the governing parameters statistically, it was found that the amount of extraction (ε) of CaCO3was increased when the web surface area (a) was broadened according to a simple scaling law (ε = 3.18 a0.4). The leaching process was maximized in the presence of 5% v/v of acid in the extraction bath and 5 wt % of CaCO3 in the polymer solution. Collateral effects of the extraction time and temperature showed exponential growth within a favorable extremum at 50°C for 72 h. Concentration of dimethylformamide as the solvent had no significant impact on the extraction level.
Resumo:
Bird coastal communities were studied along Bribie Island and Moreton Island, two islands within Moreton Bay, Brisbane, Queensland, Australia, using the point counts method. A total of 128 five-hundred metre radius area surveys and 81 beach drive surveys were conducted and observations made over four seasons. Bird species were identified, counted and recorded. The data was compared between the two islands and, between sites on each island as oil-spill affected sites to non-oil spill affected sites. Species such as waders, shorebirds, terns/gulls and raptors were identified as species at most risk from an oil spill and the data was selected to look mainly at these species. The data indicated that sites affected by the oil spill contained 50% less oil-affected species than sites not affected by the oil spill. Bribie Island held on average 5 species per site in the oil affected sites compared to 12 species in non-oil affected sites. This same trend was observed on Moreton Island which held 6 species compared to 14 species. Bird data will continue to be counted over several years to determine whether the observed data is a true reflection of the affects of an oil spill on the habitat of shorebirds.
Resumo:
This paper describes the development of hypothetical models of tendering sets. Each tender is theorized as consisting of two variable components, the cost estimate and the mark-up, and in consideration of these variables, the concept of a 'winning zone' is postulated.
Resumo:
Reasons for performing study: The distance travelled by Australian feral horses in an unrestricted environment has not previously been determined. It is important to investigate horse movement in wilderness environments to establish baseline data against which the movement of domestically managed horses and wild equids can be compared. Objectives: To determine the travel dynamics of 2 groups of feral horses in unrestricted but different wilderness environments. Methods: Twelve feral horses living in 2 wilderness environments (2000 vs. 20,000 km2) in outback Australia were tracked for 6.5 consecutive days using custom designed, collar mounted global positioning systems (GPS). Collars were attached after darting and immobilising the horses. The collars were recovered after a minimum of 6.5 days by re-darting the horses. Average daily distance travelled was calculated. Range use and watering patterns of horses were analysed by viewing GPS tracks overlaid on satellite photographs of the study area. Results: Average distance travelled was 15.9 ± 1.9 km/day (range 8.1–28.3 km/day). Horses were recorded up to 55 km from their watering points and some horses walked for 12 h to water from feeding grounds. Mean watering frequency was 2.67 days (range 1–4 days). Central Australian horses watered less frequently and showed a different range use compared to horses from central Queensland. Central Australian horses walked for long distances in direct lines to patchy food sources whereas central Queensland horses were able to graze close to water sources and moved in a more or less circular pattern around the central water source. Conclusions: The distances travelled by feral horses were far greater than those previously observed for managed domestic horses and other species of equid. Feral horses are able to travel long distances and withstand long periods without water, allowing them to survive in semi-arid conditions.
Resumo:
This thematic issue on education and the politics of becoming focuses on how a Multiple Literacies Theory (MLT) plugs into practice in education. MLT does this by creating an assemblage between discourse, text, resonance and sensations. What does this produce? Becoming AND how one might live are the product of an assemblage (May, 2005; Semetsky, 2003). In this paper, MLT is the approach that explores the connection between educational theory and practice through the lens of an empirical study of multilingual children acquiring multiple writing systems simultaneously. The introduction explicates discourse, text, resonance, sensation and becoming. The second section introduces certain Deleuzian concepts that plug into MLT. The third section serves as an introduction to MLT. The fourth section is devoted to the study by way of a rhizoanalysis. Finally, drawing on the concept of the rhizome, this article exits with potential lines of flight opened by MLT. These are becomings which highlight the significance of this work in terms of transforming not only how literacies are conceptualized, especially in minority language contexts, but also how one might live.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Purpose – This paper adds to growing research of psychiatric intensive care units (PICU) by recounting descriptions of psychiatric intensive care settings and discusses the perceptions held by nurses of the organisational interfaces, arrangements and provisions of care in these settings. Design/methodology/approach – Data gathered from focus groups held with nurses from two PICUs was used to establish terminology, defining attributes, related concepts, antecedents, values, processes and concepts related to current practices. A literature search was conducted to permit a review of the conceptual arrangements and contemporary understanding of intensive care for people experiencing acute psychiatric illness based on the perspectives held by the nurses from the focus groups. Findings – Dissonance between service needs and the needs and management of individual patients overshadow strategies to implement comprehensive recovery-oriented approaches. Three factors are reported in this paper that influence standards and procedural practice in PICU; organisational structures; physical structures; and subtype nomenclature. Practical implications – Acute inpatient care is an important part of a comprehensive approach to mental health services. Commonly intensive acute care is delivered in specialised wards or units co-located with acute mental health inpatient units mostly known as PICU. Evidence of the most effective treatment and approaches in intensive care settings that support comprehensive recovery for improved outcomes is nascent. Originality/value – Current descriptions from nurses substantiate wide variations in the provisions, design and classifications of psychiatric intensive care. Idiosyncratic and localised conceptions of psychiatric intensive care are not adequately entailing effective treatment and methods in support of recovery principles for improved and comprehensive outcomes. The authors suggest that more concrete descriptions, guidelines, training and policies for provision of intensive psychiatric health care encompassing the perspective of nursing professionals, would reinforce conceptual construction and thus optimum treatments within a comprehensive, recovery-oriented approach to mental health services.
Resumo:
In this work we used a 3D quantitative CT ultrasound imaging system to characterise polymer gel dosimeters. The system comprised of two identical 5 MHz 128 element phased-array ultrasound transducers co-axially aligned and submerged in water as a coupling agent. Rotational and translational movement of the gel dosimeter sample between the transducers were performed using a robotic arm. Ultrasound signals were generated and received using an Olympus Omniscan unit. Dose sensitivity of attenuation and time of flight ultrasonic parameters were assessed using this system.
Resumo:
In this paper, the influence of the impact energy on the initial fabrication of thin films formed by low energy cluster deposition was investigated by molecular dynamics simulation of All 3 clusters depositing on Ni(0 0 1) substrate. In the case of soft-landing, (0.01 eV/atom), clusters are rearranged from I-h symmetry into fcc-like clusters on the surface. Then they aggregate each other, which result in thin film growing in 3D island mode. While, growth will be in layer-by-layer mode at the impact energy of a few electron volt due to the transient lateral spread of cluster atoms induced by dense collision cascade. This effect has been traced to collision cascade inside the cluster. which is enhanced by collision with a hard Ni substrate. (C) 2002 Elsevier Science B.V. All rights reserved.
Resumo:
Indonesia is a country spread across wide-ranging archipelago, located in South East Asia between two oceans, the Indian and the Pacific. Indonesia is well known as an active tectonic region because it lies on top of three major active tectonic plates: the Eurasian in the North, the Indian Ocean-Australian in the South, and the Pacific plate in the East. The southern and eastern part of the country features a range of volcanic arcs, volcanic mountains, and lowlands with 500 young volcanoes, of which 128 are active and thus representing 15% of the world’s active volcanoes. In the period 2002-2007, approximately 1782 disasters occurred, with hundreds of thousands of lives lost and billions of rupiah in losses incurred: (Floods - 1183 instances, cyclones - 272 instances, and landslides - 252 instances). Of these, the 2004 Aceh tsunami and the 2006 central Java earthquake (impacting predominantly city and suburbs of Yogyakarta) were the most significant. Even so, disaster management experts believe lessons learnt from the two major natural disasters needs to be formalised into laws and institutions before another disaster occurs, regardless of the type of natural disaster – i.e. Volcano eruption or landslide; as opposed to tsunami or earthquake. Following in the wake of disasters occurring in Yogyakarta, many of its community members responded by banding together as one, with the determination of rebuilding its villages and cities through the spirit of ‘gotong royong’. The idea of social interaction; in particular as a collective, consensual, and cooperative nation; has predominantly formed the ideological basis of Indonesia’s societal nature. Many Indonesian terms cohere to this ideology, such as: ‘koperasi” (cooperatives as the basis of economic interactions), ‘musyawarah’ (consensual nature in decision making), and ‘gotong royong’ (mutual assistance). ‘Gotong royong’ has become a key cultural operator in Indonesia, in particular In Jogjakarta. Appropriately so as ‘gotong royong’ is depicted from the traditional Javanese village, where labour is accomplished through reciprocal exchange and the villagers are motivated by a general ethos of selfishness and concern for the common good. The culture of ‘gotong royong’ promotes positive values such as social harmony and mutual reciprocation in disaster-affected areas provides the necessary spirit needed to endure the hardships and for all involved. While gotong royong emphasises the positive notions of mutual family support and deep community level activity there is a potential for contrast against government lead disaster response and recovery management activities especially in settings where sporadic governance mechanisms exist and transparency and accountability in the recovery process of public infrastructure assets have been questioned. This paper thus questions whether Gotong Royong is a double-edged sword, and explores the potential marriage of community values and governance mechanisms for future disaster management planning and practice.
Resumo:
The prison casts a long shadow over Australian cinema. This chapter discusses Australian films set in penal settlements and prisons in the past, present and future. Themes discussed include the fictional depiction of actual events and people, gender and the prison film, the outback as virtual prison, the cell, and stories of unjust imprisonment and systemic brutality.