127 resultados para Constitutional guarantees
Resumo:
Cloud computing is an emerging computing paradigm in which IT resources are provided over the Internet as a service to users. One such service offered through the Cloud is Software as a Service or SaaS. SaaS can be delivered in a composite form, consisting of a set of application and data components that work together to deliver higher-level functional software. SaaS is receiving substantial attention today from both software providers and users. It is also predicted to has positive future markets by analyst firms. This raises new challenges for SaaS providers managing SaaS, especially in large-scale data centres like Cloud. One of the challenges is providing management of Cloud resources for SaaS which guarantees maintaining SaaS performance while optimising resources use. Extensive research on the resource optimisation of Cloud service has not yet addressed the challenges of managing resources for composite SaaS. This research addresses this gap by focusing on three new problems of composite SaaS: placement, clustering and scalability. The overall aim is to develop efficient and scalable mechanisms that facilitate the delivery of high performance composite SaaS for users while optimising the resources used. All three problems are characterised as highly constrained, large-scaled and complex combinatorial optimisation problems. Therefore, evolutionary algorithms are adopted as the main technique in solving these problems. The first research problem refers to how a composite SaaS is placed onto Cloud servers to optimise its performance while satisfying the SaaS resource and response time constraints. Existing research on this problem often ignores the dependencies between components and considers placement of a homogenous type of component only. A precise problem formulation of composite SaaS placement problem is presented. A classical genetic algorithm and two versions of cooperative co-evolutionary algorithms are designed to now manage the placement of heterogeneous types of SaaS components together with their dependencies, requirements and constraints. Experimental results demonstrate the efficiency and scalability of these new algorithms. In the second problem, SaaS components are assumed to be already running on Cloud virtual machines (VMs). However, due to the environment of a Cloud, the current placement may need to be modified. Existing techniques focused mostly at the infrastructure level instead of the application level. This research addressed the problem at the application level by clustering suitable components to VMs to optimise the resource used and to maintain the SaaS performance. Two versions of grouping genetic algorithms (GGAs) are designed to cater for the structural group of a composite SaaS. The first GGA used a repair-based method while the second used a penalty-based method to handle the problem constraints. The experimental results confirmed that the GGAs always produced a better reconfiguration placement plan compared with a common heuristic for clustering problems. The third research problem deals with the replication or deletion of SaaS instances in coping with the SaaS workload. To determine a scaling plan that can minimise the resource used and maintain the SaaS performance is a critical task. Additionally, the problem consists of constraints and interdependency between components, making solutions even more difficult to find. A hybrid genetic algorithm (HGA) was developed to solve this problem by exploring the problem search space through its genetic operators and fitness function to determine the SaaS scaling plan. The HGA also uses the problem's domain knowledge to ensure that the solutions meet the problem's constraints and achieve its objectives. The experimental results demonstrated that the HGA constantly outperform a heuristic algorithm by achieving a low-cost scaling and placement plan. This research has identified three significant new problems for composite SaaS in Cloud. Various types of evolutionary algorithms have also been developed in addressing the problems where these contribute to the evolutionary computation field. The algorithms provide solutions for efficient resource management of composite SaaS in Cloud that resulted to a low total cost of ownership for users while guaranteeing the SaaS performance.
Resumo:
Development and application of inorganic adsorbent materials have been continuously investigated due to their variability and versatility. This Master thesis has expanded the knowledge in the field of adsorption targeting radioactive iodine waste and proteins using modified inorganic materials. Industrial treatment of radioactive waste and safety disposal of nuclear waste is a constant concern around the world with the development of radioactive materials applications. To address the current problems, laminar titanate with large surface area (143 m2 g−1) was synthesized from inorganic titanium compounds by hydrothermal reactions at 433 K. Ag2O nanocrystals of particle size ranging from 5–30 nm were anchored on the titanate lamina surface which has crystallographic similarity to that of Ag2O nanocrystals. Therefore, the deposited Ag2O nanocrystals and titanate substrate could join together at these surfaces between which there forms a coherent interface. Such coherence between the two phases reduces the overall energy by minimizing surface energy and maintains the Ag2O nanocrystals firmly on the outer surface of the titanate structure. The combined adsorbent was then applied as efficient adsorbent to remove radioactive iodine from water (one gram adsorbent can capture up to 3.4 mmol of I- anions) and the composite adsorbent can be recovered easily for safe disposal. The structure changes of the titanate lamina and the composite adsorbent were characterized via various techniques. The isotherm and kinetics of iodine adsorption, competitive adsorption and column adsorption using the adsorbent were studied to determine the iodine removal abilities of the adsorbent. It is shown that the adsorbent exhibited excellent trapping ability towards iodine in the fix-bed column despite the presence of competitive ions. Hence, Ag2O deposited titanate lamina could serve as an effective adsorbent for removing iodine from radioactive waste. Surface hydroxyl group of the inorganic materials is widely applied for modification purposes and modification of inorganic materials for biomolecule adsorption can also be achieved. Specifically, γ-Al2O3 nanofibre material is converted via calcinations from boehmite precursor which is synthesised by hydrothermal chemical reactions under directing of surfactant. These γ-Al2O3 nanofibres possess large surface area (243 m2 g-1), good stability under extreme chemical conditions, good mechanical strength and rich surface hydroxyl groups making it an ideal candidate in industrialized separation column. The fibrous morphology of the adsorbent also guarantees facile recovery from aqueous solution under both centrifuge and sedimentation approaches. By chemically bonding the dyes molecules, the charge property of γ-Al2O3 is changed in the aim of selectively capturing of lysozyme from chicken egg white solution. The highest Lysozyme adsorption amount was obtained at around 600 mg/g and its proportion is elevated from around 5% to 69% in chicken egg white solution. It was found from the adsorption test under different solution pH that electrostatic force played the key role in the good selectivity and high adsorption rate of surface modified γ-Al2O3 nanofibre adsorbents. Overall, surface modified fibrous γ-Al2O3 could be applied potentially as an efficient adsorbent for capturing of various biomolecules.
Resumo:
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.
Resumo:
"The collection contributes to transnational whiteness debates through theoretically informed readings of historical and contemporary texts by established and emerging scholars in the field of critical whiteness studies. From a wide range of disciplinary perspectives, the book traces continuity and change in the cultural production of white virtue within texts, from the proud colonial moment through to neoliberalism and the global war on terror in the twenty-first century. Read together, these chapters convey a complex understanding of how transnational whiteness travels and manifests itself within different political and cultural contexts. Some chapters address political, legal and constitutional aspects of whiteness while others explore media representations and popular cultural texts and practices. The book also contains valuable historical studies documenting how whiteness is insinuated within the texts produced, circulated and reproduced in specific cultural and national locations."--Google eBook
Resumo:
The Quantitative Assessment of Solar UV [ultraviolet] Exposure for Vitamin D Synthesis in Australian Adults (AusD) Study aimed to better define the relationship between sun exposure and serum 25-hydroxyvitamin D (25(OH)D) concentration. Cross-sectional data were collected between May 2009 and December 2010 from 1,002 participants aged 18-75 years in 4 Australian sites spanning 24° of latitude. Participants completed the following: 1) questionnaires on sun exposure, dietary vitamin D intake, and vitamin D supplementation; 2) 10 days of personal ultraviolet radiation dosimetry; 3) a sun exposure and physical activity diary; and 4) clinical measurements and blood collection for 25(OH)D determination. Our multiple regression model described 40% of the variance in 25(OH)D concentration; modifiable behavioral factors contributed 52% of the explained variance, and environmental and demographic or constitutional variables contributed 38% and 10%, respectively. The amount of skin exposed was the single strongest contributor to the explained variance (27%), followed by location (20%), season (17%), personal ultraviolet radiation exposure (8%), vitamin D supplementation (7%), body mass index (weight (kg)/height (m)2) (4%), and physical activity (4%). Modifiable behavioral factors strongly influence serum 25(OH)D concentrations in Australian adults. In addition, latitude was a strong determinant of the relative contribution of different behavioral factors.
Resumo:
This paper will give a ‘criminological perspective’ on mandatory sentencing. It will however largely avoid the issues of the effect of mandatory sentencing provisions on the judicial process and judicial independence, as this has already been covered by Sir Anthony Mason. It will also avoid the legal issues concerning the constitutional, human rights and international law aspects of mandatory sentencing which will be covered by later speakers. The aim will be to give a brief overview of research which evaluates the effects of mandatory sentencing provisions in terms of the available evidence of whether they meet their stated aims of deterrence, selective incapacitation and the reduction of crime rates. This will be done in two parts, first in relation to the more extensive experiment in mandatory sentencing in the USA which has provided some of the impetus and metaphors ("three strikes") for recent Australian developments; and second the recent mandatory sentencing provisions in Western Australia (WA) and the Northern Territory (NT). Evidence from both the US and WA (NT is hard to assess because of the lack of proper monitoring and criminal statistics) indicates that mandatory sentencing does not produce the effects of deterrence, selective incapacitation and crime reduction which are its stated justifications and does produce a range of damaging side effects in terms of distortion of the judicial process, wildly disproportionate sentencing, additional financial and social cost and deepening social exclusion of individuals and particular communities. So what is left are the less acknowledged underpinnings of mandatory sentencing in the form of the symbolic politics of law and order, the politics of social exclusion and a displacement of racial anxieties and hostilities onto the terrain of the legal. In fashioning this necessarily brief overview a number of sources have been heavily drawn upon, in particular the excellent work by Neil Morgan from UWA (Morgan, 1995;1999; 2000); Dianne Johnson and George Zdenkowski in their detailed report to the Senate Inquiry (2000); and a number of articles appearing in 1999 in an excellent special issue of the UNSW Law Journal, all of which are highly recommended for further reading.
Resumo:
Basal cell carcinoma (BCC) is a skin cancer of particular importance to the Australian community. Its rate of occurrence is highest in Queensland, where 1% to 2% of people are newly affected annually. This is an order of magnitude higher than corresponding incidence estimates in European and North American populations. Individuals with a sun-sensitive complexion are particularly susceptible because sun exposure is the single most important causative agent, as shown by the anatomic distribution of BCC which is in general consistent with the levels of sun exposure across body sites. A distinguishing feature of BCC is the occurrence of multiple primary tumours within individuals, synchronously or over time, and their diagnosis and treatment costs contribute substantially to the major public health burden caused by BCC. A primary knowledge gap about BCC pathogenesis however was an understanding of the true frequency of multiple BCC occurrences and their body distribution, and why a proportion of people do develop more than one BCC in their life. This research project sought to address this gap under an overarching research aim to better understand the detailed epidemiology of BCC with the ultimate goal of reducing the burden of this skin cancer through prevention. The particular aim was to document prospectively the rate of BCC occurrence and its associations with constitutional and environmental (solar) factors, all the while paying special attention to persons affected by more than one BCC. The study built on previous findings and recent developments in the field but set out to confirm and extend these and propose more adequate theories about the complex epidemiology of this cancer. Addressing these goals required a new approach to researching basal cell carcinoma, due to the need to account for the phenomenon of multiple incident BCCs per person. This was enabled by a 20 year community-based study of skin cancer in Australians that provided the methodological foundation for this thesis. Study participants were originally randomly selected in 1986 from the electoral register of all adult residents of the subtropical township of Nambour in Queensland, Australia. On various occasions during the study, participants were fully examined by dermatologists who documented cumulative photodamage as well as skin cancers. Participants completed standard questionnaires about skin cancer-related factors, and consented to have any diagnosed skin cancers notified to the investigators by regional pathology laboratories in Queensland. These methods allowed 100% ascertainment of histologically confirmed BCCs in this study population. 1339 participants had complete follow-up to the end of 2007. Statistical analyses in this thesis were carried out using SAS and SUDAAN statistical software packages. Modelling methods, including multivariate logistic regressions, allowed for repeated measures in terms of multiple BCCs per person. This innovative approach gave new findings on two levels, presented in five chapters as scientific papers: 1. Incidence of basal cell carcinoma multiplicity and detailed anatomic distribution: longitudinal study of an Australian population The incidence of people affected multiple times by BCC was 705 per 100,000 person years compared to an incidence rate of people singly affected of 935 per 100,000 person years. Among multiply and singly affected persons alike, site-specific BCC incidence rates were far highest on facial subsites, followed by upper limbs, trunk, and then lower limbs 2. Melanocytic nevi and basal cell carcinoma: is there an association? BCC risk was significantly increased in those with forearm nevi (Odds Ratios (OR) 1.43, 95% Confidence Intervals (CI) 1.09-1.89) compared to people without forearm nevi, especially among those who spent their time mainly outdoors (OR 1.6, 95%CI 1.1-2.3) compared to those who spent their time mainly indoors. Nevi on the back were not associated with BCC. 3. Clinical signs of photodamage are associated with basal cell carcinoma multiplicity and site: a 16-year longitudinal study Over a 16-year follow-up period, 58% of people affected by BCC developed more than one BCC. Among these people 60% developed BCCs across different anatomic sites. Participants with high numbers of solar keratoses, compared to people without solar keratoses, were most likely to experience the highest BCC counts overall (OR 3.3, 95%CI 1.4-13.5). Occurrences of BCC on the trunk (OR 3.3, 95%CI 1.4-7.6) and on the limbs (OR 3.7, 95%CI 2.0-7.0) were strongly associated with high numbers of solar keratoses on these sites. 4. Occurrence and determinants of basal cell carcinoma by histological subtype in an Australian community Among 1202 BCCs, 77% had a single growth pattern and 23% were of mixed histological composition. Among all BCCs the nodular followed by the superficial growth patterns were commonest. Risk of nodular and superficial BCCs on the head was raised if 5 or more solar keratoses were present on the face (OR 1.8, 95%CI 1.2-2.7 and OR 4.5, 95%CI 2.1-9.7 respectively) and similarly on the trunk in the presence of multiple solar keratoses on the trunk (OR 4.2, 95%CI 1.5-11.9 and OR 2.2, 95%CI 1.1-4.4 respectively). 5. Basal cell carcinoma and measures of cumulative sun exposure: an Australian longitudinal community-based study Dermal elastosis was more likely to be seen adjacent to head and neck BCCs than trunk BCCs (p=0.01). Severity of dermal elastosis increased on each site with increasing clinical signs of cutaneous sun damage on that site. BCCs that occurred without perilesional elastosis per se, were always found in an anatomic region with signs of photodamage. This thesis thus has identified the magnitude of the burden of multiple BCCs. It does not support the view that people affected by more than one BCC represent a distinct group of people who are prone to BCCs on certain body sites. The results also demonstrate that BCCs regardless of site, histology or order of occurrence are strongly associated with cumulative sun exposure causing photodamage to the skin, and hence challenge the view that BCCs occurring on body sites with typically low opportunities for sun exposure or of the superficial growth pattern are different in their association with the sun from those on typically sun-exposed sites, or nodular BCCs, respectively. Through dissemination in the scientific and medical literature, and to the community at large, these findings can ultimately assist in the primary and secondary prevention of BCC, perhaps especially in high-risk populations.
Resumo:
To remove the right of prisoners to vote does many things. … It signals that whatever the prisoner says is not of interest to those at the top, that you are not interested in talking to them or even listening to them, that you want to exclude them and that you have no interest in knowing about them. INTRODUCTION In June 2006, Australia passed legislation disenfranchising all prisoners serving full-time custodial sentences from voting in federal elections. This followed a succession of changes dating from 1983 that alternately extended and restricted the prisoner franchise. In 1989 and 1995, the Australian Labor Party (ALP) federal government prepared draft legislation removing any restrictions on prisoner voting rights in federal elections; the measures were defeated and withdrawn. With the 2006 legislation, the Howard Coalition government (composed of the Liberal and National parties) successfully achieved the total disenfranchisement it first sought in 1998. This chapter examines the politics and legality of the 2006 disenfranchisement. This will be approached, first, by briefly outlining the key provisions of the Commonwealth Electoral Act 1918, offering a short legislative history of prisoner franchise, and examining some of the key constitutional issues. Second, the 2006 disenfranchisement introduced in the Electoral and Referendum (Electoral Integrity and Other Measures) Act 2006 will be examined in greater detail, particularly in terms of the manner in which it was achieved and the arguments that were mobilized both in support of and against the change.
Resumo:
We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.
Resumo:
Recently, Portfolio Theory (PT) has been proposed for Information Retrieval. However, under non-trivial conditions PT violates the original Probability Ranking Principle (PRP). In this poster, we shall explore whether PT upholds a different ranking principle based on Quantum Theory, i.e. the Quantum Probability Ranking Principle (QPRP), and examine the relationship between this new model and the new ranking principle. We make a significant contribution to the theoretical development of PT and show that under certain circumstances PT upholds the QPRP, and thus guarantees an optimal ranking according to the QPRP. A practical implication of this finding is that the parameters of PT can be automatically estimated via the QPRP, instead of resorting to extensive parameter tuning.
Resumo:
Dynamic positioning of marine craft refers to the use of the propulsion system to regulate the vessel position and heading. This type of motion control is commonly used in the offshore industry for surface vessels, and it is also used for some underwater vehicles. In this paper, we use a port-Hamiltonian framework to design a novel nonlinear set-point-regulation controller with integral action. The controller handles input saturation and guarantees internal stability, rejection of unknown constant disturbances, and (integral-)input-to-state stability.
Resumo:
There is a growing recognition of the interests and rights of individuals conceived using donated gametes in assisted reproductive technology to information about their biological parentage. In Australia these rights vary between jurisdictions according to differing statutory provisions. In February 2011 the Senate's Legal and Constitutional Affairs References Committee published its report on Donor Conception Practices in Australia. The report recommended the development of a nationally consistent approach to donor conception and recommended the enactment of legislation in those Australian jurisdictions without legislation regulating donor conception. This editorial reviews the Senate Committee report and its recommendations and supports calls for a nationally harmonised approach to donor conception in Australia.
Resumo:
China’s biggest search engine has a constitutional right to filter its search results, a US court found last month. But that’s just the start of the story. Eight New York-based pro-democracy activists sued Baidu Inc in 2011, seeking damages because Baidu prevents their work from showing up in search results. Baidu follows Chinese law that requires it to censor politically sensitive results. But in what the plaintiffs’ lawyer has dubbed a “perfect paradox”, US District Judge Jesse Furman has dismissed the challenge, explaining that to hold Baidu liable for its decisions to censor pro-democracy content would itself infringe the right to free speech.
Resumo:
This paper presents a novel control strategy for trajectory tracking of marine vehicles manoeuvring at low speed. The model of the marine vehicle is formulated as a Port-Hamiltonian system, and the tracking controller is designed using energy shaping and damping assignment. The controller guarantees global asymptotic stability and includes integral action for output variables with relative degree greater than one.