238 resultados para strong designated verifier signature scheme
Resumo:
Designed as a 'supplementary' tuition scheme, the Indigenous Tutorial Assistance Scheme (hereafter referred to as ITAS) is a strategic initiative of the National Indigenous Education Policy (DEET, 1989). This paper seeks to contribute to the literature of the analysis of the quality and efficacy of ITAS. Currently, the delivery of ITAS to Indigenous students requires enormous administration and commitment by the staff of Indigenous education support centres. In exploring the essential but problematic provision of ITAS to Indigenous university students, this paper provides insights into significant aspects of our program that move beyond assumptions of student deficit, by researching the quality of teaching and learning through ITAS, analysing administrative workload, and sharing innovations to our program as a result of participatory research with important ITAS stakeholders.
Resumo:
This paper describes the cloning and characterization of a new member of the vascular endothelial growth factor (VEGF) gene family, which we have designated VRF for VEGF-related-factor. Sequencing of cDNAs from a human fetal brain library and RT-PCR products from normal and tumor tissue cDNA pools indicate two alternatively spliced messages with open reading frames of 621 and 564 bp, respectively. The predicted proteins differ at their carboxyl ends resulting from a shift in the open reading frame. Both isoforms show strong homology to VEGF at their amino termini, but only the shorter isoform maintains homology to VEGF at its carboxyl terminus and conserves all 16 cysteine residues of VEGF165. Similarity comparisons of this isoform revealed overall protein identity of 48% and conservative substitution of 69% with VEGF189. VRF is predicted to contain a signal peptide, suggesting that it may be a secreted factor. The VRF gene maps to the D11S750 locus at chromosome band 11q13, and the protein coding region, spanning approximately 5 kb, is comprised of 8 exons that range in size from 36 to 431 bp. Exons 6 and 7 are contiguous and the two isoforms of VRF arise through alternate splicing of exon 6. VRF appears to be ubiquitously expressed as two transcripts of 2.0 and 5.5 kb; the level of expression is similar among normal and malignant tissues.
Resumo:
We have used microarray gene expression profiling and machine learning to predict the presence of BRAF mutations in a panel of 61 melanoma cell lines. The BRAF gene was found to be mutated in 42 samples (69%) and intragenic mutations of the NRAS gene were detected in seven samples (11%). No cell line carried mutations of both genes. Using support vector machines, we have built a classifier that differentiates between melanoma cell lines based on BRAF mutation status. As few as 83 genes are able to discriminate between BRAF mutant and BRAF wild-type samples with clear separation observed using hierarchical clustering. Multidimensional scaling was used to visualize the relationship between a BRAF mutation signature and that of a generalized mitogen-activated protein kinase (MAPK) activation (either BRAF or NRAS mutation) in the context of the discriminating gene list. We observed that samples carrying NRAS mutations lie somewhere between those with or without BRAF mutations. These observations suggest that there are gene-specific mutation signals in addition to a common MAPK activation that result from the pleiotropic effects of either BRAF or NRAS on other signaling pathways, leading to measurably different transcriptional changes.
Resumo:
Many existing schemes for malware detection are signature-based. Although they can effectively detect known malwares, they cannot detect variants of known malwares or new ones. Most network servers do not expect executable code in their in-bound network traffic, such as on-line shopping malls, Picasa, Youtube, Blogger, etc. Therefore, such network applications can be protected from malware infection by monitoring their ports to see if incoming packets contain any executable contents. This paper proposes a content-classification scheme that identifies executable content in incoming packets. The proposed scheme analyzes the packet payload in two steps. It first analyzes the packet payload to see if it contains multimedia-type data (such as . If not, then it classifies the payload either as text-type (such as or executable. Although in our experiments the proposed scheme shows a low rate of false negatives and positives (4.69% and 2.53%, respectively), the presence of inaccuracies still requires further inspection to efficiently detect the occurrence of malware. In this paper, we also propose simple statistical and combinatorial analysis to deal with false positives and negatives.
Resumo:
In this article, an enriched radial point interpolation method (e-RPIM) is developed for computational mechanics. The conventional radial basis function (RBF) interpolation is novelly augmented by the suitable basis functions to reflect the natural properties of deformation. The performance of the enriched meshless RBF shape functions is first investigated using the surface fitting. The surface fitting results have proven that, compared with the conventional RBF, the enriched RBF interpolation has a much better accuracy to fit a complex surface than the conventional RBF interpolation. It has proven that the enriched RBF shape function will not only possess all advantages of the conventional RBF interpolation, but also can accurately reflect the deformation properties of problems. The system of equations for two-dimensional solids is then derived based on the enriched RBF shape function and both of the meshless strong-form and weak-form. A numerical example of a bar is presented to study the effectiveness and efficiency of e-RPIM. As an important application, the newly developed e-RPIM, which is augmented by selected trigonometric basis functions, is applied to crack problems. It has been demonstrated that the present e-RPIM is very accurate and stable for fracture mechanics problems.
Resumo:
This paper considers issues of methodological innovation in communication, media and cultural studies, that arise out of the extent to which we now live in a media environment characterised by an digital media abundance, the convergence of media platforms, content and services, and the globalisation of media content through ubiquitous computing and high-speed broadband networks. These developments have also entailed a shift in the producer-consumer relationships that characterised the 20th century mass communications paradigm, with the rapid proliferation of user-created content, accelerated innovation, the growing empowerment of media users themselves, and the blurring of distinctions between public and private, as well as age-based distinctions in terms of what media can be accessed by whom and for what purpose. It considers these issues through a case study of the Australian Law Reform Commission's National Classification Scheme Review.
Resumo:
A series of solid strong acid catalysts were synthesised from fibrous ZrO2/Al2O3 core and shell nanocomposites. In this series, the zirconium molar percentage was varied from 2 % to 50 %. The ZrO2/Al2O3 nanocomposites and their solid strong acid counterparts were characterised by a variety of techniques including 27Al magic angle spinning nuclear magnetic resonance (MAS-NMR), scanned electronic microscopy (SEM), transmission electron microscope (TEM), X-ray photoelectron spectroscopy (XPS), Nitrogen adsorption and infrared emission spectroscopy (IES). NMR results show that the interaction between zirconia species and alumina strongly correlates with pentacoordinated aluminium sites. This can also be detected by the change in binding energy of the 3d electrons of the zirconium. The acidity of the obtained solid acids was tested by using them as catalysts for the benzolyation of toluene. It was found that a sample with a 50 % zirconium molar percentage possessed the highest surface acidity equalling that of pristine sulfated zirconia despite the reduced mass of zirconia.
Resumo:
Depleting fossil fuel resources and increased accumulation of greenhouse gas emissions are increasingly making electrical vehicles (EV) attractive option for the transportation sector. However uncontrolled random charging and discharging of EVs may aggravate the problems of an already stressed system during the peak demand and cause voltage problems during low demand. This paper develops a demand side response scheme for properly integrating EVs in the Electrical Network. The scheme enacted upon information on electricity market conditions regularly released by the Australian Energy Market Operator (AEMO) on the internet. The scheme adopts Internet relays and solid state switches to cycle charging and discharging of EVs. Due to the pending time-of-use and real-price programs, financial benefits will represent driving incentives to consumers to implement the scheme. A wide-scale dissemination of the scheme is expected to mitigate excessive peaks on the electrical network with all associated technical, economic and social benefits.
Resumo:
Climate change presents as the archetypal environmental problem with short-term economic self-interest operating to the detriment of the long-term sustainability of our society. The scientific reports of the Intergovernmental Panel on Climate Change strongly assert that the stabilisation of emissions in the atmosphere, to avoid the adverse impacts of climate change, requires significant and rapid reductions in ‘business as usual’ global greenhouse gas emissions. The sheer magnitude of emissions reductions required, within this urgent timeframe, will necessitate an unprecedented level of international, multi-national and intra-national cooperation and will challenge conventional approaches to the creation and implementation of international and domestic legal regimes. To meet this challenge, existing international, national and local legal systems must harmoniously implement a strong international climate change regime through a portfolio of traditional and innovative legal mechanisms that swiftly transform current behavioural practices in emitting greenhouse gases. These include the imposition of strict duties to reduce emissions through the establishment of strong command and control regulation (the regulatory approach); mechanisms for the creation and distribution of liabilities for greenhouse gas emissions and climaterelated harm (the liability approach) and the use of innovative regulatory tools in the form of the carbon trading scheme (the market approach). The legal relations between these various regulatory, liability and market approaches must be managed to achieve a consistent, compatible and optimally effective legal regime to respond to the threat of climate change. The purpose of this thesis is to analyse and evaluate the emerging legal rules and frameworks, both international and Australian, required for the effective regulation of greenhouse gas emissions to address climate change in the context of the urgent and deep emissions reductions required to minimise the adverse impacts of climate change. In doing so, this thesis will examine critically the existing and potential role of law in effectively responding to climate change and will provide recommendations on the necessary reforms to achieve a more effective legal response to this global phenomenon in the future.
Resumo:
Significant numbers of children are severely abused and neglected by parents and caregivers. Infants and very young children are the most vulnerable and are unable to seek help. To identify these situations and enable child protection and the provision of appropriate assistance, many jurisdictions have enacted ‘mandatory reporting laws’ requiring designated professionals such as doctors, nurses, police and teachers to report suspected cases of severe child abuse and neglect. Other jurisdictions have not adopted this legislative approach, at least partly motivated by a concern that the laws produce dramatic increases in unwarranted reports, which, it is argued, lead to investigations which infringe on people’s privacy, cause trauma to innocent parents and families, and divert scarce government resources from deserving cases. The primary purpose of this paper is to explore the extent to which opposition to mandatory reporting laws is valid based on the claim that the laws produce ‘overreporting’. The first part of this paper revisits the original mandatory reporting laws, discusses their development into various current forms, explains their relationship with policy and common law reporting obligations, and situates them in the context of their place in modern child protection systems. This part of the paper shows that in general, contemporary reporting laws have expanded far beyond their original conceptualisation, but that there is also now a deeper understanding of the nature, incidence, timing and effects of different types of severe maltreatment, an awareness that the real incidence of maltreatment is far higher than that officially recorded, and that there is strong evidence showing the majority of identified cases of severe maltreatment are the result of reports by mandated reporters. The second part of this paper discusses the apparent effect of mandatory reporting laws on ‘overreporting’ by referring to Australian government data about reporting patterns and outcomes, with a particular focus on New South Wales. It will be seen that raw descriptive data about report numbers and outcomes appear to show that reporting laws produce both desirable consequences (identification of severe cases) and problematic consequences (increased numbers of unsubstantiated reports). Yet, to explore the extent to which the data supports the overreporting claim, and because numbers of unsubstantiated reports alone cannot demonstrate overreporting, this part of the paper asks further questions of the data. Who makes reports, about which maltreatment types, and what are the outcomes of those reports? What is the nature of these reports; for example, to what extent are multiple numbers of reports made about the same child? What meaning can be attached to an ‘unsubstantiated’ report, and can such reports be used to show flaws in reporting effectiveness and problems in reporting laws? It will be suggested that available evidence from Australia is not sufficiently detailed or strong to demonstrate the overreporting claim. However, it is also apparent that, whether adopting an approach based on public health and or other principles, much better evidence about reporting needs to be collected and analyzed. As well, more nuanced research needs to be conducted to identify what can reasonably be said to constitute ‘overreports’, and efforts must be made to minimize unsatisfactory reporting practice, informed by the relevant jurisdiction’s context and aims. It is also concluded that, depending on the jurisdiction, the available data may provide useful indicators of positive, negative and unanticipated effects of specific components of the laws, and of the strengths, weaknesses and needs of the child protection system.