88 resultados para 11-105

em Queensland University of Technology - ePrints Archive


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Criminologists have mostly followed the criminal law in adopting an apolitical concept of crime. They paid limited attention to both political crime and the political power to criminalise. The article traces efforts to redress this since the 1960s. It nevertheless remained a minority concern, mostly of critical criminology. Yet crime has been politicised in various ways by other developments, also examined in the article. The events of 9/11 have crowned the emergence of crime as a strategic security issue posing a challenge to criminology to engage with politically inspired crime and its control.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As connectivity analyses become more popular, claims are often made about how the brain's anatomical networks depend on age, sex, or disease. It is unclear how results depend on tractography methods used to compute fiber networks. We applied 11 tractography methods to high angular resolution diffusion images of the brain (4-Tesla 105-gradient HARDI) from 536 healthy young adults. We parcellated 70 cortical regions, yielding 70×70 connectivity matrices, encoding fiber density. We computed popular graph theory metrics, including network efficiency, and characteristic path lengths. Both metrics were robust to the number of spherical harmonics used to model diffusion (4th-8th order). Age effects were detected only for networks computed with the probabilistic Hough transform method, which excludes smaller fibers. Sex and total brain volume affected networks measured with deterministic, tensor-based fiber tracking but not with the Hough method. Each tractography method includes different fibers, which affects inferences made about the reconstructed networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this study, Lampert examines how cultural identities are constructed within fictional texts for young people written about the attacks on the Twin Towers. It identifi es three significant identity categories encoded in 9/11 books for children:ethnic identities, national identities, and heroic identities,arguing that the identities formed within the selected children’s texts are in flux, privileging performances of identities that are contingent on post-9/11 politics. Looking at texts including picture books, young adult fiction, and a selection of DC Comics, Lampert finds in post-9/11 children’s literature a co-mingling of xenophobia and tolerance; a binaried competition between good and evil and global harmony and national insularity; and a lauding of both the commonplace hero and the super-human. The shifting identities evident in texts that are being produced for children about 9/11 offer implicit and explicit accounts of what constitutes good citizenship, loyalty to nation and community, and desirable attributes in a Western post-9/11 context. This book makes an original contribution to the field of children’s literature by providing a focused and sustained analysis of how texts for children about 9/11 contribute to formations of identity in these complex times of cultural unease and global unrest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Young people aged 17–24 years are at high risk of being killed in road crashes around the world. Road safety interventions consider some influences upon young driver behaviour; for example, imposing passenger restrictions on young novice drivers indirectly minimises the potential negative social influences of peers as passengers. To change young driver risky behaviour, the multitude of psychosocial influences upon its initiation and maintenance must be identified. A study questionnaire was developed to investigate the relationships between risky driving and Akers’ social learning theory, social identity theory, and thrill seeking variables. The questionnaire was completed by 165 participants (105 women,60 men) residing in south-east Queensland, Australia. The sociodemographic variables of age, gender, and exposure explained 19% of the variance in self-reported risky driving behaviour, whilst Akers’ social learning variables explained an additional 42%. Thrill seeking and social identity variables did not explain any significant additional variance. Significant predictors of risky driving included imitation of the driving behaviours of, and anticipated rewards and punishments administered by, parents and peers. Road safety policy that directly considers and incorporates these factors in their design, implementation, and enforcement of young driver road safety interventions should prove more efficacious than current approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Summary of findings: QISU estimates that approximately 1,000 skateboard-associated injuries are seen at emergency departments each year in Queensland. 10-14 year old males are the most likely group to present to a QISU ED with a skateboard related injury. The peak time for skateboard injuries to occur is on the weekend and in the late afternoon. Only 19% of skateboard injuries occur at skate park facilities, with the remainder oc-curring in non-skate parks, on roads and footpaths. Risk factors associated with more severe injuries are, age less than 10 years and involvement in a motor vehicle crash The most common types of injuries are fractures and sprains of the upper limbs. Isolated head injuries represent approximately 5% of skateboarding injuries, but 60% of serious injuries requiring resuscitation. These injuries may be minimized or pre-vented with helmet use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

AIMS: Alcohol use disorders and depression co-occur frequently and are associated with poorer outcomes than when either condition occurs alone. The present study (Depression and Alcohol Integrated and Single-focused Interventions; DAISI) aimed to compare the effectiveness of brief intervention, single-focused and integrated psychological interventions for treatment of coexisting depression and alcohol use problems. METHODS: Participants (n = 284) with current depressive symptoms and hazardous alcohol use were assessed and randomly allocated to one of four individually delivered interventions: (i) a brief intervention only (single 90-minute session) with an integrated focus on depression and alcohol, or followed by a further nine 1-hour sessions with (ii) an alcohol focus; (iii) a depression focus; or (iv) an integrated focus. Follow-up assessments occurred 18 weeks after baseline. RESULTS: Compared with the brief intervention, 10 sessions were associated with greater reductions in average drinks per week, average drinking days per week and maximum consumption on 1 day. No difference in duration of treatment was found for depression outcomes. Compared with single-focused interventions, integrated treatment was associated with a greater reduction in drinking days and level of depression. For men, the alcohol-focused rather than depression-focused intervention was associated with a greater reduction in average drinks per day and drinks per week and an increased level of general functioning. Women showed greater improvements on each of these variables when they received depression-focused rather than alcohol-focused treatment. CONCLUSIONS: Integrated treatment may be superior to single-focused treatment for coexisting depression and alcohol problems, at least in the short term. Gender differences between single-focused depression and alcohol treatments warrant further study.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This tome really is what it says it is: An anthology of dissent. For many of us frustrated at the lack of critical analysis, annoyed by the repetitive, albeit spectacular, images of the falling world trade towers and sickened by the absence of any reflection whatsoever upon ‘America’s Jihad’, this book provides some intellectual solace at long last. It contains 35 short pieces composed by an impressive list of prominent lawyers, academics, human rights activists and journalists. Six of the pieces are re-publications of articles that appeared in the print media commentary soon after 11 September, the other 29 are solicited pieces on a range of topics and angles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in leaps and bounds. From tenuous beginnings, where the only safe way to deploy a WLAN was to assume it was hostile and employ higherlayer information security controls, to the current state of the art, all manner of improvements have been conceived and many implemented. This work investigates some of the remaining issues surrounding IEEE 802.11 WLAN operation. While the inherent issues in WLAN deployments and the problems of the original Wired Equivalent Privacy (WEP) provisions are well known and widely documented, there still exist a number of unresolved security issues. These include the security of management and control frames and the data link layer protocols themselves. This research introduces a novel proposal to enhance security at the link layer of IEEE 802.11 WLANs and then conducts detailed theoretical and empirical investigation and analysis of the eects of such proposals. This thesis �rst de�nes the state of the art in WLAN technology and deployment, including an overview of the current and emerging standards, the various threats, numerous vulnerabilities and current exploits. The IEEE 802.11i MAC security enhancements are discussed in detail, along with the likely outcomes of the IEEE 802.11 Task Group W1, looking into protected management frames. The problems of the remaining unprotected management frames, the unprotected control frames and the unprotected link layer headers are reviewed and a solution is hypothesised, to encrypt the entire MAC Protocol Data Unit (MPDU), including the MAC headers, not just the MAC Service Data Unit (MSDU) commonly performed by existing protocols. The proposal is not just to encrypt a copy of the headers while still using cleartext addresses to deliver the frame, as used by some existing protocols to support the integrity and authenticity of the headers, but to pass the entire MPDU only as ciphertext to also support the con�dentiality of the frame header information. This necessitates the decryption of every received frame using every available key before a station can determine if it is the intended recipient. As such, this raises serious concerns as to the viability of any such proposal due to the likely impact on throughput and scalability. The bulk of the research investigates the impacts of such proposals on the current WLAN protocols. Some possible variations to the proposal are also provided to enhance both utility and speed. The viability this proposal with respect to the eect on network throughput is then tested using a well known and respected network simulation tool, along with a number of analysis tools developed speci�cally for the data generated here. The simulator's operation is �rst validated against recognised test outputs, before a comprehensive set of control data is established, and then the proposal is tested and and compared against the controls. This detailed analysis of the various simulations should be of bene�t to other researchers who need to validate simulation results. The analysis of these tests indicate areas of immediate improvement and so the protocols are adjusted and a further series of experiments conducted. These �nal results are again analysed in detail and �nal appraisals provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Popular wireless network standards, such as IEEE 802.11/15/16, are increasingly adopted in real-time control systems. However, they are not designed for real-time applications. Therefore, the performance of such wireless networks needs to be carefully evaluated before the systems are implemented and deployed. While efforts have been made to model general wireless networks with completely random traffic generation, there is a lack of theoretical investigations into the modelling of wireless networks with periodic real-time traffic. Considering the widely used IEEE 802.11 standard, with the focus on its distributed coordination function (DCF), for soft-real-time control applications, this paper develops an analytical Markov model to quantitatively evaluate the network quality-of-service (QoS) performance in periodic real-time traffic environments. Performance indices to be evaluated include throughput capacity, transmission delay and packet loss ratio, which are crucial for real-time QoS guarantee in real-time control applications. They are derived under the critical real-time traffic condition, which is formally defined in this paper to characterize the marginal satisfaction of real-time performance constraints.