154 resultados para Polemic against Islam

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Women with a disability continue to experience social oppression and domestic violence as a consequence of gender and disability dimensions. Current explanations of domestic violence and disability inadequately explain several features that lead women who have a disability to experience violent situations. This article incorporates both disability and material feminist theory as an alternative explanation to the dominant approaches (psychological and sociological traditions) of conceptualising domestic violence. This paper is informed by a study which was concerned with examining the nature and perceptions of violence against women with a physical impairment. The emerging analytical framework integrating material feminist interpretations and disability theory provided a basis for exploring gender and disability dimensions. Insight was also provided by the women who identified as having a disability in the study and who explained domestic violence in terms of a gendered and disabling experience. The article argues that material feminist interpretations and disability theory, with their emphasis on gender relations, disablism and poverty, should be used as an alternative tool for exploring the nature and consequences of violence against women with a disability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Zoonotic schistosomiasis japonica is a major public health problem in China. Bovines, particularly water buffaloes, are thought to play a major role in the transmission of schistosomiasis to humans in China. Preliminary results (1998–2003) of a praziquantel (PZQ)-based pilot intervention study we undertook provided proof of principle that water buffaloes are major reservoir hosts for S. japonicum in the Poyang Lake region, Jiangxi Province. Methods and Findings Here we present the results of a cluster-randomised intervention trial (2004–2007) undertaken in Hunan and Jiangxi Provinces, with increased power and more general applicability to the lake and marshlands regions of southern China. The trial involved four matched pairs of villages with one village within each pair randomly selected as a control (human PZQ treatment only), leaving the other as the intervention (human and bovine PZQ treatment). A sentinel cohort of people to be monitored for new infections for the duration of the study was selected from each village. Results showed that combined human and bovine chemotherapy with PZQ had a greater effect on human incidence than human PZQ treatment alone. Conclusions The results from this study, supported by previous experimental evidence, confirms that bovines are the major reservoir host of human schistosomiasis in the lake and marshland regions of southern China, and reinforce the rationale for the development and deployment of a transmission blocking anti-S. japonicum vaccine targeting bovines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has had many inquiries into teaching and teacher education over the last decade. Standards for teaching have been produced by national education systems with many state systems following suit. The Queensland College of Teachers (QCT) advocates ten professional teaching standards for teachers and preservice teachers. How can preservice teachers be measured against advocated professional standards? This study investigated 106 second-year preservice teachers’ perceptions of their development against the QCT standards. A pretest-posttest survey instrument was developed based on the QCT standards and administered to these preservice teachers before and after their science education coursework. Percentages, ANOVAs and t-tests were generated to analyse the results. Findings indicated that 22 of the 24 paired pretest-posttest items were highly significant (p<.001). Percentage increases ranged from as low as 27% in the pretest to as high as 97% in the posttest, yet, there were two items with lower significance (i.e., working in professional science education teams and supporting students’ participation in society). Understanding preservice teachers’ perceptions of their abilities to implement these standards may be a step towards the process of determining the achievement of teaching standards; however, more rigorous measurements will need to be developed for both teachers and preservice teachers. University coursework and related assessments can provide an indication of achieving these standards, especially authentic assessment of preservice teachers’ practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Positive Buck- Boost (PBB) converter is a known DC-DC converter that can operate in step up and step down modes. Unlike Buck, Boost, and Inverting Buck Boost converters, the inductor current of a PBB can be controlled independently of its voltage conversion ratio. In other words, the inductor of PBB can be utilised as an energy storage unit in addition to its main function of energy transfer. In this paper, the capability of PBB to store energy has been utilised to achieve robustness against input voltage fluctuations and output current changes. The control strategy has been developed to keep accuracy, affordability, and simplicity acceptable. To improve the efficiency of the system a Smart Load Controller (SLC) has been suggested. Applying SLC extra current storage occurs when there is sudden loads change otherwise little extra current is stored.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this chapter is to discuss the relationship between crime and morality, with a specific focus on crimes against morality. While we argue that all crimes have a general moral basis, condemned as wrong or bad and proscribed by society, there is a specific group of offences in modern democratic nations labelled crimes against morality. Included within this group are offences related to prostitution, pornography and homosexuality. What do these crimes have in common? Most clearly they tend to have a sexual basis and are often argued to do sexual harm, in both a moral and /or psychological sense, as well as physically. Conversely they are often argued to be victimless crimes, especially when the acts occur between consenting adults. Finally they are considered essentially private acts but they often occur, and are regulated, in the public domain. Most importantly, each of these crimes against morality has only relatively recently (ie in the past 150 years) become identified and regulated by the state as a criminal offence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While it is uncontested that the medical profession makes a valuable contribution to society, doctors should not always be beyond the reach of the criminal law and they should not automatically be treated as God. Doctors should act reasonably and be conscious of their position of trust. In this sense, the notion of “doctors” is construed broadly to include a range of health care professionals such as podiatrists, radiographers, surgeons and general practitioners. This paper will explore contemporary Australian examples where doctors have acted inappropriately and been convicted of non-fatal offences against the person. The physical invasiveness involved in these scenarios varies significantly. In one example, a doctor penetrates a patient’s private body part with a probe for their own sexual gratification, and in another, a doctor covertly visually records a naked patient. The examples will be connected to the theories underpinning criminalisation, particularly social welfare and individual autonomy, with a view to framing guidelines on when doctors should not be immune from non-fatal offences against a person, and thus where the criminal law should respond.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this article is to highlight the conflict in the policy objectives of subs 46(1) and subs 46(1AA) of the Trade Practices Act 1974 (Cth) (TPA). The policy objective of subs 46(1) is to promote competition and efficient markets for the benefit of consumers (consumer welfare standard). It does not prohibit corporations with substantial market power using cost savings arising from efficiencies such economies of scale or scope, to undercut small business competitors The policy objective of 46(1AA), on the other hand, is to protect small business operators from price discounting by their larger competitors.. Unlike subs 46(1), it does not contain a ‘taking advantage’ element. It is argued that subs 46(1AA) may harm consumer welfare by having a chilling effect on price competition if this would harm small business competitors.