818 resultados para high security


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study assesses the Vitamin D status of 126 healthy free-living adults aged 18–87 years, in southeast Queensland, Australia (27°S) at the end of the 2006 winter. Participants provided blood samples for analysis of 25(OH)D (the measure of an individual’s Vitamin D status), PTH, Calcium, Phosphate, and Albumin, completed a questionnaire on sun-protective/sun-exposure behaviours, and were assessed for phenotypic characteristics such as skin/hair/eye colour and BMI. We found that 10.2% of the participants had serum 25(OH)D levels below 25 nmol/l (considered deficient) and a further 32.3% had levels between 25 nmol/l and 50 nmol/l (considered insufficient). Our results show that low levels of 25(OH)D can occur in a substantial proportion of the population at the end of winter, even in a sunny climate. 25(OH)D levels were higher amongst those who spent more time in the sun and lower among obese participants (BMI > 30) than those who were not obese (BMI < 30). 25(OH)D levels were also lower in participants who had black hair, dark/olive skin, or brown eyes, when compared with participants who had brown or fair hair, fair skin, or blue/green eyes. No associations were found between 25(OH)D status and age, gender, smoking status, or the use of sunscreen.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Paper first provides a review and analysis of the recent trends on innovation infrastructures developed in industrialised countries to promote innovation and competitiveness for high growth SMEs. It specifically aims to examine various spatial models developed to support provision of innovation infrastructure for high growth sector.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigated the mediating effect of learner selfconcept between conceptions of learning and students' approaches to learning using structural equation modelling. Data were collected using a modified version of Biggs' Learning Process Questionnaire, together with the recently developed 'What is Learning Survey' and 'Learner Self-Concept Scale'. A sample of 355 high school students participated in the study. Results indicate that learner self-concept does mediate between conceptions of meaning and approaches to learning. Students who adopted a deep approach liked learning new things and indirectly viewed learning as experiential, involving social interaction and directly viewed learning as personal development. Implications for teachers are discussed, with consideration given to appropriate classroom practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current world situation is plagued by “wicked problems” and a widespread sense of “things are going to get worse”. We confront the almost imponderable consequences of global habitat destruction and climate change, as well as the meltdown of the financial markets with their largely yet to be seen damage to the “real economy”. These things will have considerable negative impacts on the social system and people's lives, particularly the disadvantaged and socially excluded, and require innovative policy and program responses delivered by caring, intelligent, and committed practitioners. These gargantuan issues put into perspective the difficulties that confront social, welfare, and community work today. Yet, in times of trouble, social work and human services tend to do well. For example, although Australian Social Workers and Welfare and Community Workers have experienced phenomenal job growth over the past 5 years, they also have good prospects for future growth and above average salaries in the seventh and sixth deciles, respectively (Department of Education, Employment and Workplace Relations, 2008). I aim to examine the host of reasons why the pursuit of social justice and high-quality human services is difficult to attain in today's world and then consider how the broadly defined profession of social welfare practitioners may collectively take action to (a) respond in ways that reassert our role in compassionately assisting the downtrodden and (b) reclaim the capacity to be a significant body of professional expertise driving social policy and programs. For too long social work has responded to the wider factors it confronts through a combination of ignoring them, critiquing from a distance, and concentrating on the job at hand and our day-to-day responsibilities. Unfortunately, “holding the line” has proved futile and, little by little, the broad social mandate and role of social welfare has altered until, currently, most social programs entail significant social surveillance of troublesome or dangerous groups, rather than assistance. At times it almost seems like the word “help” has been lost in the political and managerial lexicon, replaced by “manage” and “control”. Our values, beliefs, and ethics are under real threat as guiding principles for social programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: In the current climate of medical education, there is an ever-increasing demand for and emphasis on simulation as both a teaching and training tool. The objective of our study was to compare the realism and practicality of a number of artificial blood products that could be used for high-fidelity simulation. Method: A literature and internet search was performed and 15 artificial blood products were identified from a variety of sources. One product was excluded due to its potential toxicity risks. Five observers, blinded to the products, performed two assessments on each product using an evaluation tool with 14 predefined criteria including color, consistency, clotting, and staining potential to manikin skin and clothing. Each criterion was rated using a five-point Likert scale. The products were left for 24 hours, both refrigerated and at room temperature, and then reassessed. Statistical analysis was performed to identify the most suitable products, and both inter- and intra-rater variability were examined. Results: Three products scored consistently well with all five assessors, with one product in particular scoring well in almost every criterion. This highest-rated product had a mean rating of 3.6 of 5.0 (95% posterior Interval 3.4-3.7). Inter-rater variability was minor with average ratings varying from 3.0 to 3.4 between the highest and lowest scorer. Intrarater variability was negligible with good agreement between first and second rating as per weighted kappa scores (K = 0.67). Conclusion: The most realistic and practical form of artificial blood identified was a commercial product called KD151 Flowing Blood Syrup. It was found to be not only realistic in appearance but practical in terms of storage and stain removal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Executive Summary The objective of this report was to use the Sydney Opera House as a case study of the application of Building Information Modelling (BIM). The Sydney opera House is a complex, large building with very irregular building configuration, that makes it a challenging test. A number of key concerns are evident at SOH: • the building structure is complex, and building service systems - already the major cost of ongoing maintenance - are undergoing technology change, with new computer based services becoming increasingly important. • the current “documentation” of the facility is comprised of several independent systems, some overlapping and is inadequate to service current and future services required • the building has reached a milestone age in terms of the condition and maintainability of key public areas and service systems, functionality of spaces and longer term strategic management. • many business functions such as space or event management require up-to-date information of the facility that are currently inadequately delivered, expensive and time consuming to update and deliver to customers. • major building upgrades are being planned that will put considerable strain on existing Facilities Portfolio services, and their capacity to manage them effectively While some of these concerns are unique to the House, many will be common to larger commercial and institutional portfolios. The work described here supported a complementary task which sought to identify if a building information model – an integrated building database – could be created, that would support asset & facility management functions (see Sydney Opera House – FM Exemplar Project, Report Number: 2005-001-C-4 Building Information Modelling for FM at Sydney Opera House), a business strategy that has been well demonstrated. The development of the BIMSS - Open Specification for BIM has been surprisingly straightforward. The lack of technical difficulties in converting the House’s existing conventions and standards to the new model based environment can be related to three key factors: • SOH Facilities Portfolio – the internal group responsible for asset and facility management - have already well established building and documentation policies in place. The setting and adherence to well thought out operational standards has been based on the need to create an environment that is understood by all users and that addresses the major business needs of the House. • The second factor is the nature of the IFC Model Specification used to define the BIM protocol. The IFC standard is based on building practice and nomenclature, widely used in the construction industries across the globe. For example the nomenclature of building parts – eg ifcWall, corresponds to our normal terminology, but extends the traditional drawing environment currently used for design and documentation. This demonstrates that the international IFC model accurately represents local practice for building data representation and management. • a BIM environment sets up opportunities for innovative processes that can exploit the rich data in the model and improve services and functions for the House: for example several high-level processes have been identified that could benefit from standardized Building Information Models such as maintenance processes using engineering data, business processes using scheduling, venue access, security data and benchmarking processes using building performance data. The new technology matches business needs for current and new services. The adoption of IFC compliant applications opens the way forward for shared building model collaboration and new processes, a significant new focus of the BIM standards. In summary, SOH current building standards have been successfully drafted for a BIM environment and are confidently expected to be fully developed when BIM is adopted operationally by SOH. These BIM standards and their application to the Opera House are intended as a template for other organisations to adopt for the own procurement and facility management activities. Appendices provide an overview of the IFC Integrated Object Model and an understanding IFC Model Data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents the findings of a study of the psychological variables that discriminate between high and low omitters on a high-stakes achievement test using a short-response format. Data were obtained from a questionnaire administered to a random sample (N = 1,908) of students prior to sitting the 1997 Queensland Core Skills (QCS) Test (N = 29,273). Fourteen psychological variables were measured including test anxiety (four subscales), emotional stability, achievement motivation, self-esteem, academic self-concept, self-estimate of ability, locus of control (three subscales), and approaches to learning (two subscales). The results were analyzed using descriptive discriminant analysis and suggested that the psychological predictors of the propensity to omit short-response items include test-irrelevant thinking and academic self-concept, with sex of candidate being a mediating variable.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

From an initial sample of 747 primary school students, the top 16 percent (n =116) with high self-esteem (HSE) and the bottom 15 percent (n = I1 I) with low selfesteem (LSE) were se/eeted. These two groups were then compared on personal and classroom variables. Significant differences were found for all personal (self-talk, selfconcepts) and classroom (teacher feedback, praise, teacher-student relationship, and classroom environment) variables. Students with HSE scored more highly on all variables. Discriminant Function Analysis (DFA) was then used to determine which variables discriminated between these two groups of students. Learner self-concept, positive and negative self-talk, classroom environment, and effort feedback were the best discriminators of students with high and low self-esteem. Implications for educational psychologists and teachers are discussed.