166 resultados para Newman, Harry


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Urban design that harnesses natural features (such as green roofs and green walls) to improve design outcomes is gaining significant interest, particularly as there is growing evidence of links between human health and wellbeing, and contact with nature. The use of such natural features can provide many significant benefits, such as reduced urban heat island effects, reduced peak energy demand for building cooling, enhanced stormwater attenuation and management, and reduced air pollution and greenhouse gas emissions. The principle of harnessing natural features as functional design elements, particularly in buildings, is becoming known as ‘biophilic urbanism’. Given the potential for global application and benefits for cities from biophilic urbanism, and the growing number of successful examples of this, it is timely to develop enabling policies that help overcome current barriers to implementation. This paper describes a basis for inquiry into policy considerations related to increasing the application of biophilic urbanism. The paper draws on research undertaken as part of the Sustainable Built Environment National Research Centre (SBEnrc) In Australia in partnership with the Western Australian Department of Finance, Parsons Brinckerhoff, Green Roofs Australasia, and Townsville City Council (CitySolar Program). The paper discusses the emergence of a qualitative, mixed-method approach that combines an extensive literature review, stakeholder workshops and interviews, and a detailed study of leading case studies. It highlights the importance of experiential and contextual learnings to inform biophilic urbanism and provides a structure to distil such learnings to benefit other applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Proteinuria was observed in 27% of 153 patients taking tenofovir for more than 1 year. Concomitant protease inhibitor therapy and cumulative tenofovir exposure were independently associated with proteinuria in this cohort. Proteinuria was reversible in 11 of 12 patients who ceased tenofovir because of proteinuria without altering other medications. Clinicians should be aware that tenofovir can cause reversible proteinuria in patients with HIV.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper addresses the problem of automatically estimating the relative pose between a push-broom LIDAR and a camera without the need for artificial calibration targets or other human intervention. Further we do not require the sensors to have an overlapping field of view, it is enough that they observe the same scene but at different times from a moving platform. Matching between sensor modalities is achieved without feature extraction. We present results from field trials which suggest that this new approach achieves an extrinsic calibration accuracy of millimeters in translation and deci-degrees in rotation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book examines different aspects of Asian popular culture, including films, TV, music, comedy, folklore, cultural icons, the Internet and theme parks. It raises important questions such as – What are the implications of popularity of Asian popular culture for globalization? Do regional forces impede the globalizing of cultures? Or does the Asian popular culture flow act as a catalyst or conveying channel for cultural globalization? Does the globalization of culture pose a threat to local culture? It addresses two seemingly contradictory and yet parallel processes in the circulation of Asian popular culture: the interconnectedness between Asian popular culture and western culture in an era of cultural globalization that turns subjects such as Pokémon, Hip Hop or Cosmopolitan into truly global phenomena, and the local derivatives and versions of global culture that are necessarily disconnected from their origins in order to cater for the local market. It thereby presents a collective argument that, whilst local social formations, and patterns of consumption and participation in Asia are still very much dependent on global cultural developments and the phenomena of modernity, yet such dependence is often concretized, reshaped and distorted by the local media to cater for the local market. Contents: Introduction: Asian Popular Culture: The Global (Dis)continuity Anthony Y.H. Fung Part 1: The Dominance of Global Continuity: Cultural Localization and Adaptation 1. One Region, Two Modernities: Disneyland in Tokyo and Hong Kong Micky Lee and Anthony Y.H. Fung 2. Comic Travels: Disney Publishing in the People’s Republic of China Jennifer Altehenger 3. When Chinese Youth Meet Harry Potter: Translating Consumption and Middle Class Identification John Nguyet Erni 4.New Forms of Transborder Visuality in Urban China: Saving Face for Magazine Covers Eric Kit-Wai Ma 5. Cultural Consumption and Masculinity: A Case Study of GQ Magazine Covers in Taiwan Hong-Chi Shiau Part 2: Global Discontinuity: The Local Absorption of Global Culture 6. An Unlocalized and Unglobalized Subculture: English Language Independent Music in Singapore Kai Khiun Liew and Shzr Ee Tan 7. The Localized Production of Jamaican Music in Thailand Viriya Sawangchot 8. Consuming Online Games in Taiwan: Global Games and Local Market Lai-Chi Chen 9. The Rise of the Korean Cinema in Inbound and Outbound Globalization Shin Dong Kim Part 3: Cultural Domestication: A New Form of Global Continuity 10. Pocket Capitalism and Virtual Intimacy: Pokémon as a Symptom of Post-Industrial Youth Culture Anne Allison 11. Playing the Global Game: Japan Brand and Globalization Kukhee Choo Part 4: China as a Rising Market: Cultural Antagonism and Globalization 12. China’s New Creative Strategy: The Utilization of Cultural Soft Power and New Markets Michael Keane and Bonnie Liu 13. Renationalizing Hong Kong Cinema: The Gathering Force of the Mainland Market Michael Curtin

Relevância:

10.00% 10.00%

Publicador:

Resumo:

3D virtual reality, including the current generation of multi-user virtual worlds, has had a long history of use in education and training, and it experienced a surge of renewed interest with the advent of Second Life in 2003. What followed shortly after were several years marked by considerable hype around the use of virtual worlds for teaching, learning and research in higher education. For the moment, uptake of the technology seems to have plateaued, with academics either maintaining the status quo and continuing to use virtual worlds as they have previously done or choosing to opt out altogether. This paper presents a brief review of the use of virtual worlds in the Australian and New Zealand higher education sector in the past and reports on its use in the sector at the present time, based on input from members of the Australian and New Zealand Virtual Worlds Working Group. It then adopts a forward-looking perspective amid the current climate of uncertainty, musing on future directions and offering suggestions for potential new applications in light of recent technological developments and innovations in the area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objectives In Aboriginal and Torres Strait Islander peoples in Queensland, to (a) determine the disease burden of common chronic lung diseases and (b) identify areas of need with respect to lung health services. Methods Literature reviews and analyses of hospitalisation and mortality data were used to describe disease epidemiology and available programs and services. Key stakeholder interviews and an online survey of health professionals were used to evaluate lung health services across the state and to identify services, needs and gaps. Results Morbidity and mortality from respiratory diseases in the Indigenous population is substantially higher than the non-Indigenous population across all age groups and regions. There are inadequate clinical services and resources to address disease prevention, detection, intervention and management in an evidence-based and culturally acceptable fashion. There is a lack of culturally appropriate educational resources and management programs, insufficient access to appropriately engaged Indigenous health professionals, a lack of multi-disciplinary specialist outreach teams, fragmented information systems and inadequate coordination of care. Conclusions Major initiatives are required at all levels of the healthcare system to adequately address service provision for Indigenous Queenslanders with lung diseases, including high quality research to investigate the causes for poor lung health, which are likely to be multifactorial.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background The body of evidence related to breast-cancer-related lymphoedema incidence and risk factors has substantially grown and improved in quality over the past decade. We assessed the incidence of unilateral arm lymphoedema after breast cancer and explored the evidence available for lymphoedema risk factors. Methods We searched Academic Search Elite, Cumulative Index to Nursing and Allied Health, Cochrane Central Register of Controlled Trials (clinical trials), and Medline for research articles that assessed the incidence or prevalence of, or risk factors for, arm lymphoedema after breast cancer, published between January 1, 2000, and June 30, 2012. We extracted incidence data and calculated corresponding exact binomial 95% CIs. We used random effects models to calculate a pooled overall estimate of lymphoedema incidence, with subgroup analyses to assess the effect of different study designs, countries of study origin, diagnostic methods, time since diagnosis, and extent of axillary surgery. We assessed risk factors and collated them into four levels of evidence, depending on consistency of findings and quality and quantity of studies contributing to findings. Findings 72 studies met the inclusion criteria for the assessment of lymphoedema incidence, giving a pooled estimate of 16·6% (95% CI 13·6–20·2). Our estimate was 21·4% (14·9–29·8) when restricted to data from prospective cohort studies (30 studies). The incidence of arm lymphoedema seemed to increase up to 2 years after diagnosis or surgery of breast cancer (24 studies with time since diagnosis or surgery of 12 to <24 months; 18·9%, 14·2–24·7), was highest when assessed by more than one diagnostic method (nine studies; 28·2%, 11·8–53·5), and was about four times higher in women who had an axillary-lymph-node dissection (18 studies; 19·9%, 13·5–28·2) than it was in those who had sentinel-node biopsy (18 studies; 5·6%, 6·1–7·9). 29 studies met the inclusion criteria for the assessment of risk factors. Risk factors that had a strong level of evidence were extensive surgery (ie, axillary-lymph-node dissection, greater number of lymph nodes dissected, mastectomy) and being overweight or obese. Interpretation Our findings suggest that more than one in five women who survive breast cancer will develop arm lymphoedema. A clear need exists for improved understanding of contributing risk factors, as well as of prevention and management strategies to reduce the individual and public health burden of this disabling and distressing disorder.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In outdoor environments shadows are common. These typically strong visual features cause considerable change in the appearance of a place, and therefore confound vision-based localisation approaches. In this paper we describe how to convert a colour image of the scene to a greyscale invariant image where pixel values are a function of underlying material property not lighting. We summarise the theory of shadow invariant images and discuss the modelling and calibration issues which are important for non-ideal off-the-shelf colour cameras. We evaluate the technique with a commonly used robotic camera and an autonomous car operating in an outdoor environment, and show that it can outperform the use of ordinary greyscale images for the task of visual localisation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim/Background: Transfusion-related acute lung injury (TRALI) is a potentially fatal adverse transfusion reaction. It is hypothesised to occur via a two-insult mechanism: the recipient’s underlying co-morbidity in addition to the transfusion of blood products activate neutrophils in the lung resulting in damaged endothelium and capillary leakage. Neutrophil activation may occur by antibody or non-antibody related mechanisms, with the length of storage of cellular blood products implicated in the latter. This study investigated non-antibody mediated priming and/or activation of neutrophil oxidative burst. Methods: A cytochrome C reduction assay was used to assess priming and activation of neutrophil oxidative burst by pooled supernatant (SN) from day 1 (D1; n=75) and day 42 (D42; n=113) packed red blood cells (PRBC). Pooled PRBC-SN were assessed in parallel with PAF (priming), fMLP (activating), PAF + fMLP (priming + activating) and buffer only (negative) controls. Cytochrome C reduction was measured over 30min at 37oC (inclusive of 10min priming). Neutrophil activation by PRBC-SN was assessed cf. buffer only and neutrophil priming by PRBC-SN was assessed by co-incubation with fMLP cf. fMLP alone. One-way ANOVA; Newman-Keuls post-test; p<0.05; n=10 independent assays. Results: Neither D1- nor D42- PRBC-SN alone activated neutrophil oxidative burst. In addition, D1-PRBC-SN did not prime fMLP-activated neutrophil oxidative burst. D42-PRBC-SN did, however, prime neutrophils for subsequent activation of oxidative burst by fMLP, the magnitude of response being similar to PAF (a known neutrophil priming agonist). Conclusion: These findings are consistent with the two-insult mechanism of TRALI. Factors released into the SN during PRBC storage contributed to neutrophil priming synergistically with other neutrophil stimulating agonists. This implicates PRBC storage duration as a key factor contributing to non-immune neutrophil activation in the development of TRALI in patients with pre-disposing inflammatory conditions.