385 resultados para Precautionary Principle
Resumo:
The doctrine of 'prosecution history estoppel' (PH estoppel) as developed in the United States has strong intuitive appeal, especially when applied to counterbalance a related patent law principle, the doctrine of equivalents. The doctrines are receiving increasing attention in US patent decisions, to the point where one patent litigator recently compared them to "two cars that keep bumping fenders. They are frequently returned to the shop for repairs". Could PH estoppel find its way into UK patent law? This article briefly examines the doctrine, its evolution in the US and the problems associated with importing the doctrine into the UK. As the EU legislation stands, Article 69 and the Protocol to the European Patent Convention (EPC) pose serious obstacles to using the doctrine directly in claim construction. However there appears to be some scope to apply the doctrine as a limited form of defence in infringement actions.
Resumo:
The global impact of an ever-increasing population-base combined with dangerously depleted natural resources highlights the urgent need for changes in human lifestyles and land-use patterns. To achieve more equitable and sustainable land use, it is imperative that populations live within the carrying capacity of their natural assets in a manner more accountable to and ethically responsible for the land which sustains them. Our society’s very survival may well depend on worldwide acceptance of the carrying capacity imperative as a principle of personal, political, economic, educational and planning responsibility. This theoretically-focused research identifies, examines and compares a range of methodological approaches to carrying capacity assessment and considers their relevance to future spatial planning. It also addresses existing gaps in current methodologies and suggests avenues for improvement. A set of eleven key criteria are employed to compare various existing carrying capacity assessment models. These criteria include whole-systems analysis, dynamic responses, levels of impact and risk, systemic constraints, applicability to future planning and the consideration of regional and local boundary delineation. This research finds that while some existing methodologies offer significant insights into the assessment of population carrying capacities, a comprehensive model is yet to be developed. However, it is suggested that by combining successful components from various authors, and collecting a range of interconnected data, a practical and workable systems-based model may be achievable in the future.
Resumo:
Wide-angle images exhibit significant distortion for which existing scale-space detectors such as the scale-invariant feature transform (SIFT) are inappropriate. The required scale-space images for feature detection are correctly obtained through the convolution of the image, mapped to the sphere, with the spherical Gaussian. A new visual key-point detector, based on this principle, is developed and several computational approaches to the convolution are investigated in both the spatial and frequency domain. In particular, a close approximation is developed that has comparable computation time to conventional SIFT but with improved matching performance. Results are presented for monocular wide-angle outdoor image sequences obtained using fisheye and equiangular catadioptric cameras. We evaluate the overall matching performance (recall versus 1-precision) of these methods compared to conventional SIFT. We also demonstrate the use of the technique for variable frame-rate visual odometry and its application to place recognition.
Resumo:
This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.
Resumo:
Scientific discoveries, developments in medicine and health issues are the constant focus of media attention and the principles surrounding the creation of so called ‘saviour siblings’ are of no exception. The development in the field of reproductive techniques has provided the ability to genetically analyse embryos created in the laboratory to enable parents to implant selected embryos to create a tissue-matched child who may be able to cure an existing sick child. The research undertaken in this thesis examines the regulatory frameworks overseeing the delivery of assisted reproductive technologies (ART) in Australia and the United Kingdom and considers how those frameworks impact on the accessibility of in vitro fertilisation (IVF) procedures for the creation of ‘saviour siblings’. In some jurisdictions, the accessibility of such techniques is limited by statutory requirements. The limitations and restrictions imposed by the state in relation to the technology are analysed in order to establish whether such restrictions are justified. The analysis is conducted on the basis of a harm framework. The framework seeks to establish whether those affected by the use of the technology (including the child who will be created) are harmed. In order to undertake such evaluation, the concept of harm is considered under the scope of John Stuart Mill’s liberal theory and the Harm Principle is used as a normative tool to judge whether the level of harm that may result, justifies state intervention or restriction with the reproductive decision-making of parents in this context. The harm analysis conducted in this thesis seeks to determine an appropriate regulatory response in relation to the use of pre-implantation tissue-typing for the creation of ‘saviour siblings’. The proposals outlined in the last part of this thesis seek to address the concern that harm may result from the practice of pre-implantation tissue-typing. The current regulatory frameworks in place are also analysed on the basis of the harm framework established in this thesis. The material referred to in this thesis reflects the law and policy in place in Australia and the UK at the time the thesis was submitted for examination (December 2009).
Resumo:
The concept of radar was developed for the estimation of the distance (range) and velocity of a target from a receiver. The distance measurement is obtained by measuring the time taken for the transmitted signal to propagate to the target and return to the receiver. The target's velocity is determined by measuring the Doppler induced frequency shift of the returned signal caused by the rate of change of the time- delay from the target. As researchers further developed conventional radar systems it become apparent that additional information was contained in the backscattered signal and that this information could in fact be used to describe the shape of the target itself. It is due to the fact that a target can be considered to be a collection of individual point scatterers, each of which has its own velocity and time- delay. DelayDoppler parameter estimation of each of these point scatterers thus corresponds to a mapping of the target's range and cross range, thus producing an image of the target. Much research has been done in this area since the early radar imaging work of the 1960s. At present there are two main categories into which radar imaging falls. The first of these is related to the case where the backscattered signal is considered to be deterministic. The second is related to the case where the backscattered signal is of a stochastic nature. In both cases the information which describes the target's scattering function is extracted by the use of the ambiguity function, a function which correlates the backscattered signal in time and frequency with the transmitted signal. In practical situations, it is often necessary to have the transmitter and the receiver of the radar system sited at different locations. The problem in these situations is 'that a reference signal must then be present in order to calculate the ambiguity function. This causes an additional problem in that detailed phase information about the transmitted signal is then required at the receiver. It is this latter problem which has led to the investigation of radar imaging using time- frequency distributions. As will be shown in this thesis, the phase information about the transmitted signal can be extracted from the backscattered signal using time- frequency distributions. The principle aim of this thesis was in the development, and subsequent discussion into the theory of radar imaging, using time- frequency distributions. Consideration is first given to the case where the target is diffuse, ie. where the backscattered signal has temporal stationarity and a spatially white power spectral density. The complementary situation is also investigated, ie. where the target is no longer diffuse, but some degree of correlation exists between the time- frequency points. Computer simulations are presented to demonstrate the concepts and theories developed in the thesis. For the proposed radar system to be practically realisable, both the time- frequency distributions and the associated algorithms developed must be able to be implemented in a timely manner. For this reason an optical architecture is proposed. This architecture is specifically designed to obtain the required time and frequency resolution when using laser radar imaging. The complex light amplitude distributions produced by this architecture have been computer simulated using an optical compiler.
Resumo:
One approach to reducing the yield losses caused by banana viral diseases is the use of genetic engineering and pathogen-derived resistance strategies to generate resistant cultivars. The development of transgenic virus resistance requires an efficient banana transformation method, particularly for commercially important 'Cavendish' type cultivars such as 'Grand Nain'. Prior to this study, only two examples of the stable transformation of banana had been reported, both of which demonstrated the principle of transformation but did not characterise transgenic plants in terms of the efficiency at which individual transgenic lines were generated, relative activities of promoters in stably transformed plants, and the stability of transgene expression. The aim of this study was to develop more efficient transformation methods for banana, assess the activity of some commonly used and also novel promoters in stably transformed plants, and transform banana with genes that could potentially confer resistance to banana bunchy top nanovirus (BBTV) and banana bract mosaic potyvirus (BBrMV). A regeneration system using immature male flowers as the explant was established. The frequency of somatic embryogenesis in male flower explants was influenced by the season in which the inflorescences were harvested. Further, the media requirements of various banana cultivars in respect to the 2,4-D concentration in the initiation media also differed. Following the optimisation of these and other parameters, embryogenic cell suspensions of several banana (Musa spp.) cultivars including 'Grand Nain' (AAA), 'Williams' (AAA), 'SH-3362' (AA), 'Goldfinger' (AAAB) and 'Bluggoe' (ABB) were successfully generated. Highly efficient transformation methods were developed for both 'Bluggoe' and 'Grand Nain'; this is the first report of microprojectile bombardment transformation of the commercially important 'Grand Nain' cultivar. Following bombardment of embryogenic suspension cells, regeneration was monitored from single transfom1ed cells to whole plants using a reporter gene encoding the green fluorescent protein (gfp). Selection with kanamycin enabled the regeneration of a greater number of plants than with geneticin, while still preventing the regeneration of non-transformed plants. Southern hybridisation confirmed the neomycin phosphotransferase gene (npt II) was stably integrated into the banana genome and that multiple transgenic lines were derived from single bombardments. The activity, stability and tissue specificity of the cauliflower mosaic virus 358 (CaMV 35S) and maize polyubiquitin-1 (Ubi-1) promoters were examined. In stably transformed banana, the Ubi-1 promoter provided approximately six-fold higher p-glucuronidase (GUS) activity than the CaMV 35S promoter, and both promoters remained active in glasshouse grown plants for the six months they were observed. The intergenic regions ofBBTV DNA-I to -6 were isolated and fused to either the uidA (GUS) or gfjJ reporter genes to assess their promoter activities. BBTV promoter activity was detected in banana embryogenic cells using the gfp reporter gene. Promoters derived from BBTV DNA-4 and -5 generated the highest levels of transient activity, which were greater than that generated by the maize Ubi-1 promoter. In transgenic banana plants, the activity of the BBTV DNA-6 promoter (BT6.1) was restricted to the phloem of leaves and roots, stomata and root meristems. The activity of the BT6.1 promoter was enhanced by the inclusion of intron-containing fragments derived from the maize Ubi-1, rice Act-1, and sugarcane rbcS 5' untranslated regions in GUS reporter gene constructs. In transient assays in banana, the rice Act-1 and maize Ubi-1 introns provided the most significant enhancement, increasing expression levels 300-fold and 100-fold, respectively. The sugarcane rbcS intron increased expression about 10-fold. In stably transformed banana plants, the maize Ubi-1 intron enhanced BT6.1 promoter activity to levels similar to that of the CaMV 35S promoter, but did not appear to alter the tissue specificity of the promoter. Both 'Grand Nain' and 'Bluggoe' were transformed with constructs that could potentially confer resistance to BBTV and BBrMV, including constructs containing BBTV DNA-1 major and internal genes, BBTV DNA-5 gene, and the BBrMV coat protein-coding region all under the control of the Ubi-1 promoter, while the BT6 promoter was used to drive the npt II selectable marker gene. At least 30 transgenic lines containing each construct were identified and replicates of each line are currently being generated by micropropagation in preparation for virus challenge.
Resumo:
Fables of sovereignty / Wayne Hudson Sovereignty discourse and practice : past and future / Joseph Camilleri Guises of sovereignty / Gerry Simpson Westphalian and Islamic concepts of sovereignty in the Middle East / Amin Saikal Wither sovereignty in Southeast Asia today? / See Seng Tan Ambivalent sovereignty : China and re-imagining the Westphalian ideal / Yongjin Zhang Confronting terrorism : dilemmas of principle and practice regarding sovereignty / Brian L. Job Sovereignty in the 21st century : security, immigration, and refugees / Howard Adelman State sovereignty and international refugee protection / Robyn Lui Do no harm : towards a Hippocratic standard for international civilisation / Neil Arya Sovereignty and the global politics of the environment : beyond Westphalia? / Lorraine Elliott Westphalian sovereignty in the shadow of international justice? a fresh coat of paint for a tainted concept / Jackson Nyamuya Maogoto Development assistance and the hollow sovereignty of the weak / Roland Rich Corruption and transparency in governance and development : reinventing sovereignty for promoting good governance / C. Raj Kumar Re-envisioning economic sovereignty : developing countries and the International Monetary Fund / Ross P. Buckley Trust, legitimacy, and the sharing of sovereignty / William Maley Sovereignty as indirect rule / Barry Hindess Indigenous sovereignty / Paul Keal Civil society in a post-statist circumstance / Jan Aart Scholte.
Resumo:
Background: The two-stage Total Laparoscopic Hysterectomy (TLH) versus Total Abdominal Hysterectomy (TAH) for stage I endometrial cancer (LACE) randomised controlled trial was initiated in 2005. The primary objective of stage 1 was to assess whether TLH results in equivalent or improved QoL up to 6 months after surgery compared to TAH. The primary objective of stage 2 was to test the hypothesis that disease-free survival at 4.5 years is equivalent for TLH and TAH. Results addressing the primary objective of stage 1 of the LACE trial are presented here. Methods: The first 361 LACE participants (TAH n= 142, TLH n=190) were enrolled in the QoL substudy at 19 centres across Australia, New Zealand and Hong Kong, and 332 completed the QoL analysis. Randomisation was performed centrally and independently from other study procedures via a computer generated, web-based system (providing concealment of the next assigned treatment) using stratified permuted blocks of 3 and 6, and assigned patients with histologically confirmed stage 1 endometrioid endometrial adenocarcinoma and ECOG performance status <2 to TLH or TAH stratified by histological grade and study centre. No blinding of patients or study personnel was attempted. QoL was measured at baseline, 1 and 4 weeks (early), and 3 and 6 months (late) after surgery using the Functional Assessment of Cancer Therapy-General (FACT-G) questionnaire. The primary endpoint was the difference between the groups in QoL change from baseline at early and late time points (a 5% difference was considered clinically significant). Analysis was performed according to the intention-to-treat principle using generalized estimating equations on differences from baseline for the early and late QoL recovery. The LACE trial is registered with clinicaltrials.gov (NCT00096408) and the Australian New Zealand Clinical Trials Registry (CTRN12606000261516). Patients for both stages of the trial have now been recruited and are being followed up for disease-specific outcomes. Findings: The proportion of missing values at the 5%, 10% 15% and 20% differences in the FACT-G scale was 6% (12/190) in the TLH and 14% (20/142) in the TAH group. There were 8/332 conversions (2.4%, 7 of which were from TLH to TAH). In the early phase of recovery, patients undergoing TLH reported significantly greater improvement of QoL from baseline compared to TAH in all subscales except the emotional and social well-being subscales. Improvements in QoL up to 6 months post-surgery continued to favour TLH except for the emotional and social well-being of the FACT and the visual analogue scale of the EuroQoL five dimensions (EuroQoL-VAS). Length of operating time was significantly longer in the TLH group (138±43 mins), than in the TAH group at (109±34 mins; p=0.001). While the proportion of intraoperative adverse events was similar between the treatment groups (TAH 8/142, 5.6%; TLH 14/190, 7.4%; p=0.55), postoperatively, twice as many patients in the TAH group experienced adverse events of CTC grade 3+ than in the TLH group (33/142, 23.2% and 22/190, 11.6%, respectively; p=0.004). Postoperative serious adverse events occurred more frequently in patients who had a TAH (27/142, 19.0%) than a TLH (15/190, 7.9%) (p=0.002). Interpretation: QoL improvements from baseline during early and later phases of recovery, and the adverse event profile significantly favour TLH compared to TAH for patients treated for Stage I endometrial cancer.
Resumo:
Purpose: To investigate the influence of accommodation upon axial length (and a comprehensive range of ocular biometric parameters), in populations of young adult myopic and emmetropic subjects. Methods: Forty young adult subjects had ocular biometry measured utilizing a non-contact optical biometer (Lenstar LS 900) based upon the principle of optical low coherence reflectometry, under three different accommodation demands (0 D, 3 D and 6 D). Subjects were classified as emmetropes (n=19) or myopes (n=21) based upon their spherical equivalent refraction (mean emmetropic refraction -0.05 ± 0.27DS and mean myopic refraction -1.82 ± 0.84 DS). Results: Axial length changed significantly with accommodation, with a mean increase of 11.9 ± 12.3 µm and 24.1 ± 22.7 µm for the 3 D and 6 D accommodation stimuli respectively. A significant axial elongation associated with accommodation was still evident even following correction of the axial length data for potential error due to lens thickness change. The mean ‘corrected’ increase in axial length was 5.2 ± 11.2 µm, and 7.4 ± 18.9 µm for the 3 D and 6 D stimuli respectively. There was no significant difference between the myopic and emmetropic populations in terms of the magnitude of change in axial length with accommodation, regardless of whether the data were corrected or not. A number of other ocular biometric parameters, such as anterior chamber depth, lens thickness and vitreous chamber depth also exhibited significant change with accommodation. The myopic and emmetropic populations also exhibited no significant difference in the magnitude of change in these parameters with accommodation. Conclusions: The eye undergoes a significant axial elongation associated with a brief period of accommodation, and the magnitude of this change in eye length increases for larger accommodation demands, however there is no significant difference in the magnitude of eye elongation in myopic and emmetropic subjects.
Resumo:
Bioethics committees are the focus of international scrutiny,particularly in relation to their application of the principle of beneficence,ensuring that risks incurred in research are outweighed by benefits to those involved directly and to the broader society. Beneficence, in turn, has become an international focus in research with young children, who hitherto had been rarely seen or heard in their own right in research.Twenty years ago, The United Nations Convention on the Rights of the Child 1989 raised global awareness of children’s human rights to both participation and protection, and articulation of children’s rights came to inform understandings of young children’s rights in research. In the intervening period, countries such as Australia came to favour child protection and risk minimisation in research over the notion of children’s bone fide participation in research. A key element of the protection regime was the theoretical understanding of young children as developmentally unable and, therefore, unfit to understand, consent to and fully participate as research participants. This understanding has been challenged in recent decades by new theoretical understandings of children’s competence, where children can be seen to demonstrate competence, even at an early age, in consenting to, participating in and withdrawing from research. The paper draws on these understandings to provide insights for human research gatekeepers, such as bioethics committees, to deal with the challenges of research with young children and to realize the benefits that may accrue to children in research.
Resumo:
In the rate-based flow control for ATM Available Bit Rate service, fairness is an important requirement, i.e. each flow should be allocated a fair share of the available bandwidth in the network. Max–min fairness, which is widely adopted in ATM, is appropriate only when the minimum cell rates (MCRs) of the flows are zero or neglected. Generalised max–min (GMM) fairness extends the principle of the max–min fairness to accommodate MCR. In this paper, we will discuss the formulation of the GMM fair rate allocation, propose a centralised algorithm, analyse its bottleneck structure and develop an efficient distributed explicit rate allocation algorithm to achieve the GMM fairness in an ATM network. The study in this paper addresses certain theoretical and practical issues of the GMM fair rate allocation.
Resumo:
In this paper, a rate-based flow control scheme based upon per-VC virtual queuing is proposed for the Available Bit Rate (ABR) service in ATM. In this scheme, each VC in a shared buffer is assigned a virtual queue, which is a counter. To achieve a specific kind of fairness, an appropriate scheduler is applied to the virtual queues. Each VC's bottleneck rate (fair share) is derived from its virtual cell departure rate. This approach of deriving a VC's fair share is simple and accurate. By controlling each VC with respect to its virtual queue and queue build-up in the shared buffer, network congestion is avoided. The principle of the control scheme is first illustrated by max–min flow control, which is realised by scheduling the virtual queues in round-robin. Further application of the control scheme is demonstrated with the achievement of weighted fairness through weighted round robin scheduling. Simulation results show that with a simple computation, the proposed scheme achieves the desired fairness exactly and controls network congestion effectively.