206 resultados para Josef Oriol, Beato, 1650-1702

em Queensland University of Technology - ePrints Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Kaolinite surfaces were modified by mechanochemical treatment for periods of time up to 10 h. X-ray diffraction shows a steady decrease in intensity of the d(001) spacing with mechanochemical treatment, resulting in the delamination of the kaolinite and a subsequent decrease in crystallite size with grinding time. Thermogravimetric analyses show the dehydroxylation patterns of kaolinite are significantly modified. Changes in the molecular structure of the kaolinite surface hydroxyls were followed by infrared spectroscopy. Hydroxyls were lost after 10 h of grinding as evidenced by a decrease in intensity of the OH stretching vibrations at 3695 and 3619 cm−1 and the deformation modes at 937 and 915 cm−1. Concomitantly an increase in the hydroxyl stretching vibrations of water is found. The water-bending mode was observed at 1650 cm−1, indicating that water is coordinating to the modified kaolinite surface. Changes in the surface structure of the OSiO units were reflected in the SiO stretching and OSiO bending vibrations. The decrease in intensity of the 1056 and 1034 cm−1 bands attributed to kaolinite SiO stretching vibrations were concomitantly matched by the increase in intensity of additional bands at 1113 and 520 cm−1 ascribed to the new mechanically synthesized kaolinite surface. Mechanochemical treatment of the kaolinite results in a new surface structure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The creative work, ¡Latin Jazz! is a 50 minute radio documentary to be broadcast on ABC Classic FM. It looks at the evolution of Latin jazz from Spain, Cuba and the United States. It examines the social effects on the style and specifically on the syncretic movement between the countries. The documentary traces my travel to Madrid, Spain and looks at Latin jazz through a deconstruction of the style, musical examples and interviews with prominent artists. Artists interviewed were Chano Domínguez, a Spanish flamenco jazz pianist, Bobby Martínez an American saxophonist, Alain Pérez a Cuban bassist and Pepe Rivero a Cuban pianist. The exegesis supports the radio documentary by examining the style in more depth, and is broken into three main sections. First it traces the historical relationship that occurred through the Ida y Vuelta (To and Fro), the similarities and influences through the habanera, the decíma and the religion of Santería. This is followed by specific musical elements within Latin jazz such as instrumentation, clave, harmony and improvisation, whilst the third section looks at the influences of the new syncretic movement back to Spain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Has the GFC really changed the thinking of the property industry? Or are investment managers suffering from post-GFC stress disorder fated to repeat the mistakes of the past? Christine Retschlag reports on the mindset of the market.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

hSSB1 is a newly discovered single-stranded DNA (ssDNA)-binding protein that is essential for efficient DNA double-strand break signalling through ATM. However, the mechanism by which hSSB1 functions to allow efficient signalling is unknown. Here, we show that hSSB1 is recruited rapidly to sites of double-strand DNA breaks (DSBs) in all interphase cells (G1, S and G2) independently of, CtIP, MDC1 and the MRN complex (Rad50, Mre11, NBS1). However expansion of hSSB1 from the DSB site requires the function of MRN. Strikingly, silencing of hSSB1 prevents foci formation as well as recruitment of MRN to sites of DSBs and leads to a subsequent defect in resection of DSBs as evident by defective RPA and ssDNA generation. Our data suggests that hSSB1 functions upstream of MRN to promote its recruitment at DSBs and is required for efficient resection of DSBs. These findings, together with previous work establish essential roles of hSSB1 in controlling ATM activation and activity, and subsequent DSB resection and homologous recombination (HR).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ross River Virus has caused reported outbreaks of epidemic polyarthritis, a chronic debilitating disease associated with significant long-term morbidity in Australia and the Pacific region since the 1920s. To address this public health concern, a formalin- and UV-inactivated whole virus vaccine grown in animal protein-free cell culture was developed and tested in preclinical studies to evaluate immunogenicity and efficacy in animal models. After active immunizations, the vaccine dose-dependently induced antibodies and protected adult mice from viremia and interferon α/β receptor knock-out (IFN-α/βR(-/-)) mice from death and disease. In passive transfer studies, administration of human vaccinee sera followed by RRV challenge protected adult mice from viremia and young mice from development of arthritic signs similar to human RRV-induced disease. Based on the good correlation between antibody titers in human sera and protection of animals, a correlate of protection was defined. This is of particular importance for the evaluation of the vaccine because of the comparatively low annual incidence of RRV disease, which renders a classical efficacy trial impractical. Antibody-dependent enhancement of infection, did not occur in mice even at low to undetectable concentrations of vaccine-induced antibodies. Also, RRV vaccine-induced antibodies were partially cross-protective against infection with a related alphavirus, Chikungunya virus, and did not enhance infection. Based on these findings, the inactivated RRV vaccine is expected to be efficacious and protect humans from RRV disease

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: HIV-1 Gag virus like particles (VLPs) used as candidate vaccines are regarded as inert particles as they contain no replicative nucleic acid, although they do encapsidate cellular RNAs. During HIV-1 Gag VLP production in baculovirus-based expression systems, VLPs incorporate the baculovirus Gp64 envelope glycoprotein, which facilitates their entry into mammalian cells. This suggests that HIV-1 Gag VLPs produced using this system facilitate uptake and subsequent expression of encapsidated RNA in mammalian cells - an unfavourable characteristic for a vaccine. Methods. HIV-1 Gag VLPs encapsidating reporter chloramphenicol acetyl transferase (CAT) RNA, were made in insect cells using the baculovirus expression system. The presence of Gp64 on the VLPs was verified by western blotting and RT-PCR used to detect and quantitate encapsidated CAT RNA. VLP samples were heated to inactivate CAT RNA. Unheated and heated VLPs incubated with selected mammalian cell lines and cell lysates tested for the presence of CAT protein by ELISA. Mice were inoculated with heated and unheated VLPs using a DNA prime VLP boost regimen. Results: HIV-1 Gag VLPs produced had significantly high levels of Gp64 (∼1650 Gp64 molecules/VLP) on their surfaces. The amount of encapsidated CAT RNA/g Gag VLPs ranged between 0.1 to 7 ng. CAT protein was detected in 3 of the 4 mammalian cell lines incubated with VLPs. Incubation with heated VLPs resulted in BHK-21 and HeLa cell lysates showing reduced CAT protein levels compared with unheated VLPs and HEK-293 cells. Mice inoculated with a DNA prime VLP boost regimen developed Gag CD8 and CD4 T cell responses to GagCAT VLPs which also boosted a primary DNA response. Heating VLPs did not abrogate these immune responses but enhanced the Gag CD4 T cell responses by two-fold. Conclusions: Baculovirus-produced HIV-1 Gag VLPs encapsidating CAT RNA were taken up by selected mammalian cell lines. The presence of CAT protein indicates that encapsidated RNA was expressed in the mammalian cells. Heat-treatment of the VLPs altered the ability of protein to be expressed in some cell lines tested but did not affect the ability of the VLPs to stimulate an immune response when inoculated into mice. © 2011 Valley-Omar et al; licensee BioMed Central Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

‘Social innovation’ is a construct increasingly used to explain the practices, processes and actors through which sustained positive transformation occurs in the network society (Mulgan, G., Tucker, S., Ali, R., Sander, B. (2007). Social innovation: What it is, why it matters and how can it be accelerated. Oxford:Skoll Centre for Social Entrepreneurship; Phills, J. A., Deiglmeier, K., & Miller, D. T. Stanford Social Innovation Review, 6(4):34–43, 2008.). Social innovation has been defined as a “novel solution to a social problem that is more effective, efficient, sustainable, or just than existing solutions, and for which the value created accrues primarily to society as a whole rather than private individuals.” (Phills,J. A., Deiglmeier, K., & Miller, D. T. Stanford Social Innovation Review, 6 (4):34–43, 2008: 34.) Emergent ideas of social innovation challenge some traditional understandings of the nature and role of the Third Sector, as well as shining a light on those enterprises within the social economy that configure resources in novel ways. In this context, social enterprises – which provide a social or community benefit and trade to fulfil their mission – have attracted considerable policy attention as one source of social innovation within a wider field of action (see Leadbeater, C. (2007). ‘Social enterprise and social innovation: Strategies for the next 10 years’, Cabinet office,Office of the third sector http://www.charlesleadbeater.net/cms xstandard/social_enterprise_innovation.pdf. Last accessed 19/5/2011.). And yet, while social enterprise seems to have gained some symbolic traction in society, there is to date relatively limited evidence of its real world impacts.(Dart, R. Not for Profit Management and Leadership, 14(4):411–424, 2004.) In other words, we do not know much about the social innovation capabilities and effects of social enterprise. In this chapter, we consider the social innovation practices of social enterprise, drawing on Mulgan, G., Tucker, S., Ali, R., Sander, B. (2007). Social innovation: What it is, why it matters and how can it be accelerated. Oxford: Skoll Centre for Social Entrepreneurship: 5) three dimensions of social innovation: new combinations or hybrids of existing elements; cutting across organisational, sectoral and disciplinary boundaries; and leaving behind compelling new relationships. Based on a detailed survey of 365 Australian social enterprises, we examine their self-reported business and mission-related innovations, the ways in which they configure and access resources and the practices through which they diffuse innovation in support of their mission. We then consider how these findings inform our understanding of the social innovation capabilities and effects of social enterprise,and their implications for public policy development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.