161 resultados para Resolution Trust Corporation (U.S.). Thrift Depositor Protection Oversight Board.

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sequencing of mba gene fragments of reference strains of Ureaplasma urealyticum serovars 1, 3, 6, 14, in addition to 33 clinical U. urealyticum isolates is reported. A phylogenetic tree deduced from an alignment of these sequences clearly demonstrates two major clusters (confidence limit 100%), which equate to the parvo and T960 biovars, and five types which we have designated mba 1, 3, 6, 8 and X. These relationships are supported by bootstrap analysis. Polymorphisms within the mba fragment of types mba 1, 3, and 6 were used to define nine subtypes (mba 1a, 1b, 3a, 3b, 3c, 3d, 3e, 6a, and 6b) thus facilitating high resolution typing of U. urealyticum. Inclusion of the reference strains for serovars 1, 3, 6, and 8 in the mba typing scheme showed that the results of this analysis are broadly consistent with currently accepted serotyping. In addition a ure gene fragment from nine of the clinical isolates was amplified and sequenced. Comparisons of the sequences clearly distinguished the two biovars of U. urealyticum; however this fragment was invariant within the parvo biovar. This study has shown that the sequence of the mba can reveal the fine details of the relationships between U. urealyticum isolates and also supports the significant evolutionary gap between the two biovars.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Troubled dynamics between residents of an Aboriginal town in Queensland and the local health system were established during colonisation and consolidated during those periods of Australian history where the policies of 'protection' (segregation), integration and then assimilation held sway. The status of Aboriginal health is, in part, related to interactions between the residents' current and historical experiences of the health and criminal justice systems as together these agencies used medical and moral policing to legitimate dispossession, marginalisation, institutionalisation and control of the residents. The punitive regulations and ethnocentric strategies used by these institutions are within the living memory of many of the residents or in the published accounts of preceding generations. This paper explores current residents' memories and experiences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article provides an overview of the concept of vulnerability through the lens of the U.S. federal regulations for the protection of human subjects of research. General issues that emerge for nurse researchers working with regulated vulnerable populations are identified. Points of current controversy in the application of the regulations and current discourse about vulnerable groups are highlighted. Suggestions for negotiating the tension between federally regulated human subject requirements and the realities of research with vulnerable subjects are given. The limitations of the designation of vulnerable as a protection for human subjects will also be discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The term “cloud computing” has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the user. The security of the cloud computing environment is a new research area requiring further development by both the academic and industrial research communities. Today, there are many diverse and uncoordinated efforts underway to address security issues in cloud computing and, especially, the identity management issues. This paper introduces an architecture for a new approach to necessary “mutual protection” in the cloud computing environment, based upon a concept of mutual trust and the specification of definable profiles in vector matrix form. The architecture aims to achieve better, more generic and flexible authentication, authorization and control, based on a concept of mutuality, within that cloud computing environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Passively protected railway crossings are a major rail safety issue in Australia. Such crossings cannot be upgraded as such crossings are too numerous and the cost involved is prohibitive. Advanced Driver Assistance Systems (ADAS) have been shown to improve road safety and are widely used. These systems could be a solution to improve safety of passively protected crossings at a lower cost. Such complementary ADAS could result in driver’s over-trust due to the absence of Humane Machine Interface reflecting the quality of the information or the state of the ADAS (failure status). This paper demonstrates that driver’s exposure to crossing exhibiting fail-safe and non-fail safe properties could result in improperly allocating trust between technologies. We conducted a driving simulator study where participants (N=58) were exposed to three types of level crossing warning system on passive and active crossings. The results show that a significant proportion of participants over-trust the ADAS. Such drivers exhibit the same driving performance with the ADAS as when exposed to infrastructure based active crossing protection. They do not take the necessary safety precautions as they have a faster speed approach, reduced number of gaze toward the rail tracks and fail to stop at the crossing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article examines important insurance and trust law issues that may confront trustees charged with the governance and protection of unique properties with broad community and heritage significance. Often trustee roles are assumed by community leaders without full appreciation of the potential difficulties and consequences when unforeseen circumstances arise. Three recent New Zealand court decisions in relation to the deconstruction and repair of the Christchurch Cathedral and to the interim construction of a transitional"cardboard Cathedral" highlight how difficult - and legally exposed - the role of trustee can be. The Cathedral cases go to the heart of defining the core purpose for which a Trust is created and examine the scope of discretion in fulfilling this charge its Trustees carry. Arising in the wake of the devastating Christchurch earthquakes, the Cathedral's Trustees were called upon to consider the best directions forward for a criplled and dangerous building subject to potential demolition, the wellbeing of the Cathedral's direct community, and the broader heritage and identity factors that this 'heart' of Christchurch represented. In the context of a seemingly grossly underinsured material damage cover - and faced with broader losses across the Diocese's holdings - the Trustees found that their sense of mission failed to gel with that of a community-based heritage buildings preservation trust. The High Court had to consider how monies received under the material damage policy could be applied by the Trustee in deconstructing, reinstating or repairing the Cathedral and if monies could be partly deployed to create an interim solution in the former of a transitional cathedral - all this in the context of the site-specific purpose of the Cathedral trust. The cases emphasise further the need to assess professionally the nature and quantum of cover effected to protect against various risks. In addition, in the case of historic or unusual buildings extra care must be exercised to take account additional costs associated with reinstatement so as to substantially retain the character and intrinsic value of such properties.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The use of GNSS tracked Lagrangian drifters allows more realistic quantification of fluid motion and dispersion coefficients than Eulerian techniques because such drifters are analogues of particles that are relevant to flow field characterisation and pollutant dispersion. Using the fast growing Real Time Kinematic (RTK) positioning technique derived from Global Satellite Navigation Systems (GNSS), drifters are developed for high frequency (10 Hz) sampling with position estimates to centimetre accuracy. The drifters are designed with small size and less direct wind drag to follow the sub-surface flow which characterizes dispersion in shallow waters. An analysis of position error from stationary observation indicates that the drifter can efficiently resolve motion up to 1 Hz. The result of the field deployments of the drifter in conjunction with acoustic Eulerian devices shows higher estimate of the drifter streamwise velocities. Single particle statistical analysis of field deployments in a shallow estuarine zone yielded dispersion coefficients estimate comparable to those of dye tracer studies. The drifters capture the tidal elevation during field studies in a tidal estuary.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The workshop is an activity of the IMIA Working Group ‘Security in Health Information Systems’ (SiHIS). It is focused to the growing global problem: how to protect personal health data in today’s global eHealth and digital health environment. It will review available trust building mechanisms, security measures and privacy policies. Technology alone does not solve this complex problem and current protection policies and legislation are considered woefully inadequate. Among other trust building tools, certification and accreditation mechanisms are dis-cussed in detail and the workshop will determine their acceptance and quality. The need for further research and international collective action are discussed. This workshop provides an opportunity to address a critical growing problem and make pragmatic proposals for sustainable and effective solutions for global eHealth and digital health.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Drawing on two case studies, this article considers the allegation of a disgruntled author: ’Defamation was framed to protect the reputations of 19th century gentlemen hypocrites'. The first case study considers the litigation over Bob Ellis' unreliable political memoir, ’Goodbye Jerusalem', published by Random House. The second case study focuses upon the litigation over the allegation by Media Watch that Richard Carleton had plagarised a documentary entitled ’Cry from the Grave'. The article considers the meaning of defamatory imputations, the range of defences, and the available remedies. It highlights the competing arguments over the protection of reputation and privacy, artistic expression, and the freedom of speech. This article concludes that defamation law should foster ’gossip we can trust'.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background and purpose: To prospectively evaluate differences in carotid plaque characteristics in symptomatic and asymptomatic patients using high resolution MRI. Methods: 20 symptomatic and 20 asymptomatic patients, with at least 50% carotid stenosis as determined by Doppler ultrasound, underwent preoperative in vivo multispectral MRI of the carotid arteries. Studies were analysed both qualitatively and quantitatively in a randomised manner by two experienced readers in consensus, blinded to clinical status, and plaques were classified according to the modified American Heart Association (AHA) criteria. Results: After exclusion of poor quality images, 109 MRI sections in 18 symptomatic and 19 asymptomatic patients were available for analysis. There were no significant differences in mean luminal stenosis severity (72.9% vs 67.6%; p = 0.09) or plaque burden (median plaque areas 50 mm2 vs 50 mm 2; p = 0.858) between the symptomatic and asymptomatic groups. However, symptomatic lesions had a higher incidence of ruptured fibrous caps (36.5% vs 8.7%; p = 0.004), haemorrhage or thrombus (46.5% vs 14.0%; p<0.001), large necrotic lipid cores (63.8% vs 28.0%; p = 0.002) and complicated type VI AHA lesions (61.5% vs 28.1%; p = 0.001) compared with asymptomatic lesions. The MRI findings of plaque haemorrhage or thrombus had an odds ratio of 5.25 (95% CI 2.08 to 13.24) while thin or ruptured fibrous cap (as opposed to a thick fibrous cap) had an odds ratio of 7.94 (95% CI 2.93 to 21.51) for prediction of symptomatic clinical status. Conclusions: There are significant differences in plaque characteristics between symptomatic and asymptomatic carotid atheroma and these can be detected in vivo by high resolution MRI.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Object. Individuals with carotid atherosclerosis develop symptoms following rupture of vulnerable plaques. Biomechanical stresses within this plaque may increase vulnerability to rupture. In this report the authors describe the use of in vivo carotid plaque imaging and computational mechanics to document the magnitude and distribution of intrinsic plaque stresses. Methods. Ten (five symptomatic and five asymptomatic) individuals underwent plaque characterization magnetic resonance (MR) imaging. Plaque geometry and composition were determined by multisequence review. Intrinsic plaque stress profiles were generated from 3D meshes by using finite element computational analysis. Differences in principal (shear) stress between normal and diseased sections of the carotid artery and between symptomatic and asymptomatic plaques were noted. Results. There was a significant difference in peak principal stress between diseased and nondiseased segments of the artery (mean difference 537.65 kPa, p < 0.05). Symptomatic plaques had higher mean stresses than asymptomatic plaques (627.6 kPa compared with 370.2 kPa, p = 0.05), which were independent of luminal stenosis and plaque composition. Conclusions. Significant differences in plaque stress exist between plaques from symptomatic individuals and those from asymptomatic individuals. The MR imaging-based computational analysis may therefore be a useful aid to identification of vulnerable plaques in vivo.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND AND PURPOSE It is well known that the vulnerable atheromatous plaque has a thin, fibrous cap and large lipid core with associated inflammation. This inflammation can be detected on MRI with use of a contrast medium, Sinerem, an ultrasmall superparamagnetic iron oxide (USPIO). Although the incidence of macrophage activity in asymptomatic disease appears low, we aimed to explore the incidence of MRI-defined inflammation in asymptomatic plaques in patients with known contralateral symptomatic disease. METHODS Twenty symptomatic patients underwent multisequence MRI before and 36 hours after USPIO infusion. Images were manually segmented into quadrants, and the signal change in each quadrant was calculated after USPIO administration. A mixed mathematical model was developed to compare the mean signal change across all quadrants in the 2 groups. Patients had a mean symptomatic stenosis of 77% compared with 46% on their asymptomatic side, as measured by conventional angiography. RESULTS There were 11 (55%) men, and the median age was 72 years (range, 53 to 84 years). All patients had risk factors consistent with severe atherosclerotic disease. All symptomatic carotid stenoses had inflammation, as evaluated by USPIO-enhanced imaging. On the contralateral sides, inflammatory activity was found in 19 (95%) patients. Contralaterally, there were 163 quadrants (57%) with a signal loss after USPIO when compared with 217 quadrants (71%) on the symptomatic side (P=0.007). CONCLUSIONS - This study adds weight to the argument that atherosclerosis is a truly systemic disease. It suggests that investigation of the contralateral side in patients with symptomatic carotid stenosis can demonstrate inflammation in 95% of plaques, despite a mean stenosis of only 46%. Thus, inflammatory activity may be a significant risk factor in asymptomatic disease in patients who have known contralateral symptomatic disease. Patients with symptomatic carotid disease should have their contralateral carotid artery followed up.