18 resultados para Sexi-fs

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper approaches a particular type of fandom practice, what I am calling fan activism. Fan activism is a topic that has historically received little attention in the fandom studies area. Here, I analyse the #ForaRicardoTeixeira campaign from a sample of 15,000 tweets posted at the time of his re¬signation from CBF. This paper combines quantitative and qualitative methods to investigate a) the com¬munity dynamics and b) the content of the conversations. The dynamics analysis pointed out, for instance, patterns of users and information sources, and the content analysis revealed how users framed the case. Future implications of the results for the study of online sport fandom practices are discussed at last.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work, 17-polychlorinated dibenzo-pdioxin/furan (PCDD/Fs) isomers were measured in ambient air at four urban sites in Seoul, Korea (from February to June 2009). The concentrations of their summed values RPCDD/Fs) across all four sites ranged from 1,947 (271 WHO05 TEQ) (Jong Ro) to 2,600 (349 WHO05 TEQ) fg/m3 (Yang Jae) with a mean of 2,125 ± 317) fg/m3 (292 WHO05 TEQ fg/m3). The sum values for the two isomer groups of RPCDD and RPCDF were 527 (30 WHO05 TEQ) and 1,598 (263 WHO05 TEQ) fg/m3, respectively. The concentration profile of individual species was dominated by the 2,3,4,7,8-PeCDF isomer, which contributed approximately 36 % of the RPCDD/Fs value. The observed temporal trends in PCDD/F concentrations were characterized by relative enhancement in the winter and spring. The relative contribution of different sources, when assessed by principal component analysis, is explained by the dominance of vehicular emissions along with coal (or gas) burning as the key source of ambient PCDD/Fs in the residential areas studied.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter explores the influence of economic ideas on media policies, particularly the work of John Maynard Keynes, Joseph Schumpeter and Karl Marx. It critically appraises the development of new media policies, and arguments that neo-liberal principles have been the primary driver of such policies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Based on the embedded atom method (EAM), a molecular dynamics (MD) simulation is performed to study the single-crystal copper nanowire with surface defects through tension. The tension simulations for nanowire without defect are first carried out under different temperatures, strain rates and time steps and then surface defect effects for nanowire are investigated. The stress-strain curves obtained by the MD simulations of various strain rates show a rate below 1 x 10(9) s-1 will exert less effect on the yield strength and yield point, and the Young's modulus is independent of strain rate. a time step below 5 fs is recommend for the atomic model during the MD simulation. It is observed that high temperature leads to low Young's modulus, as well as the yield strength. The surface defects on nanowires are systematically studied in considering different defect orientations. It is found that the surface defect serves as a dislocation source, and the yield strength shows 34.20% decresse with 45 degree surface defect. Both yield strength and yield point are significantly influenced by the surface defects, except the Young's modulus.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter examines the changing landscape of literacy in the early years and considers how the diverse spaces and places in which early literacy learning is promoted and takes place can be conceptualised and researched. We argue that early literacy research needs to extend beyond a language focus to become attentive to the embodied, material dimensions of learning environments. The discussion is organised in terms of three kinds of spaces within which children encounter opportunities to participate in communication and representational practices. These are domestic spaces, commercial spaces and spaces of formal education. Theories of spatiality and material semiotics provide the conceptual tools for interpreting research studies located in these spaces. Implications for educators are considered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Blogs and other online platforms for personal writing such as LiveJournal have been of interest to researchers across the social sciences and humanities for a decade now. Although growth in the uptake of blogging has stalled somewhat since the heyday of blogs in the early 2000s, blogging continues to be a major genre of Internet-based communication. Indeed, at the same time that mass participation has moved on to Facebook, Twitter, and other more recent communication phenomena, what has been left behind by the wave of mass adoption is a slightly smaller but all the more solidly established blogosphere of engaged and committed participants. Blogs are now an accepted part of institutional, group, and personal communications strategies (Bruns and Jacobs, 2006); in style and substance, they are situated between the more static information provided by conventional Websites and Webpages and the continuous newsfeeds provided through Facebook and Twitter updates. Blogs provide a vehicle for authors (and their commenters) to think through given topics in the space of a few hundred to a few thousand words – expanding, perhaps, on shorter tweets, and possibly leading to the publication of more fully formed texts elsewhere. Additionally, they are also a very flexible medium: they readily provide the functionality to include images, audio, video, and other additional materials – as well as the fundamental tool of blogging, the hyperlink itself. Indeed, the role of the link in blogs and blog posts should not be underestimated. Whatever the genre and topic that individual bloggers engage in, for the most part blogging is used to provide timely updates and commentary – and it is typical for such material to link both to relevant posts made by other bloggers, and to previous posts by the present author, both to background material which provides readers with further information about the blogger’s current topic, and to news stories and articles which the blogger found interesting or worthy of critique. Especially where bloggers are part of a larger community of authors sharing similar interests or views (and such communities are often indicated by the presence of yet another type of link – in blogrolls, often in a sidebar on the blog site, which list the blogger’s friends or favourites), then, the reciprocal writing and linking of posts often constitutes an asynchronous, distributed conversation that unfolds over the course of days, weeks, and months. Research into blogs is interesting for a variety of reasons, therefore. For one, a qualitative analysis of one or several blogs can reveal the cognitive and communicative processes through which individual bloggers define their online identity, position themselves in relation to fellow bloggers, frame particular themes, topics and stories, and engage with one another’s points of view. It may also shed light on how such processes may differ across different communities of interest, perhaps in correlation with the different societal framing and valorisation of specific areas of interest, with the socioeconomic backgrounds of individual bloggers, or with other external or internal factors. Such qualitative research now looks back on a decade-long history (for key collections, see Gurak, et al., 2004; Bruns and Jacobs, 2006; also see Walker Rettberg, 2008) and has recently shifted also to specifically investigate how blogging practices differ across different cultures (Russell and Echchaibi, 2009). Other studies have also investigated the practices and motivations of bloggers in specific countries from a sociological perspective, through large-scale surveys (e.g. Schmidt, 2009). Blogs have also been directly employed within both K-12 and higher education, across many disciplines, as tools for reflexive learning and discussion (Burgess, 2006).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. The FS property was also shown to be achievable in (Hierarchical) Identity-Based Encryption (HIBE) by Yao, Fazio, Dodis, and Lysyanskaya (ACM CCS 2004). Yet, for emerging encryption techniques, offering flexible access control to encrypted data, by means of functional relationships between ciphertexts and decryption keys, FS protection was not known to exist.\smallskip In this paper we introduce FS to the powerful setting of \emph{Hierarchical Predicate Encryption (HPE)}, proposed by Okamoto and Takashima (Asiacrypt 2009). Anticipated applications of FS-HPE schemes can be found in searchable encryption and in fully private communication. Considering the dependencies amongst the concepts, our FS-HPE scheme implies forward-secure flavors of Predicate Encryption and (Hierarchical) Attribute-Based Encryption.\smallskip Our FS-HPE scheme guarantees forward security for plaintexts and for attributes that are hidden in HPE ciphertexts. It further allows delegation of decrypting abilities at any point in time, independent of FS time evolution. It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. As the ``cross-product" approach taken in FS-HIBE is not directly applicable to the HPE setting, our construction resorts to techniques that are specific to existing HPE schemes and extends them with what can be seen as a reminiscent of binary tree encryption from FS-PKE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bananas are one of the world�fs most important crops, serving as a staple food and an important source of income for millions of people in the subtropics. Pests and diseases are a major constraint to banana production. To prevent the spread of pests and disease, farmers are encouraged to use disease�] and insect�]free planting material obtained by micropropagation. This option, however, does not always exclude viruses and concern remains on the quality of planting material. Therefore, there is a demand for effective and reliable virus indexing procedures for tissue culture (TC) material. Reliable diagnostic tests are currently available for all of the economically important viruses of bananas with the exception of Banana streak viruses (BSV, Caulimoviridae, Badnavirus). Development of a reliable diagnostic test for BSV is complicated by the significant serological and genetic variation reported for BSV isolates, and the presence of endogenous BSV (eBSV). Current PCR�] and serological�]based diagnostic methods for BSV may not detect all species of BSV, and PCR�]based methods may give false positives because of the presence of eBSV. Rolling circle amplification (RCA) has been reported as a technique to detect BSV which can also discriminate between episomal and endogenous BSV sequences. However, the method is too expensive for large scale screening of samples in developing countries, and little information is available regarding its sensitivity. Therefore the development of reliable PCR�]based assays is still considered the most appropriate option for large scale screening of banana plants for BSV. This MSc project aimed to refine and optimise the protocols for BSV detection, with a particular focus on developing reliable PCR�]based diagnostics Initially, the appropriateness and reliability of PCR and RCA as diagnostic tests for BSV detection were assessed by testing 45 field samples of banana collected from nine districts in the Eastern region of Uganda in February 2010. This research was also aimed at investigating the diversity of BSV in eastern Uganda, identifying the BSV species present and characterising any new BSV species. Out of the 45 samples tested, 38 and 40 samples were considered positive by PCR and RCA, respectively. Six different species of BSV, namely Banana streak IM virus (BSIMV), Banana streak MY virus (BSMYV), Banana streak OL virus (BSOLV), Banana streak UA virus (BSUAV), Banana streak UL virus (BSULV), Banana streak UM virus (BSUMV), were detected by PCR and confirmed by RCA and sequencing. No new species were detected, but this was the first report of BSMYV in Uganda. Although RCA was demonstrated to be suitable for broad�]range detection of BSV, it proved time�]consuming and laborious for identification in field samples. Due to the disadvantages associated with RCA, attempts were made to develop a reliable PCR�]based assay for the specific detection of episomal BSOLV, Banana streak GF virus (BSGFV), BSMYV and BSIMV. For BSOLV and BSGFV, the integrated sequences exist in rearranged, repeated and partially inverted portions at their site of integration. Therefore, for these two viruses, primers sets were designed by mapping previously published sequences of their endogenous counterparts onto published sequences of the episomal genomes. For BSOLV, two primer sets were designed while, for BSGFV, a single primer set was designed. The episomalspecificity of these primer sets was assessed by testing 106 plant samples collected during surveys in Kenya and Uganda, and 33 leaf samples from a wide range of banana cultivars maintained in TC at the Maroochy Research Station of the Department of Employment, Economic Development and Innovation (DEEDI), Queensland. All of these samples had previously been tested for episomal BSV by RCA and for both BSOLV and BSGFV by PCR using published primer sets. The outcome from these analyses was that the newly designed primer sets for BSOLV and BSGFV were able to distinguish between episomal BSV and eBSV in most cultivars with some B�]genome component. In some samples, however, amplification was observed using the putative episomal�]specific primer sets where episomal BSV was not identified using RCA. This may reflect a difference in the sensitivity of PCR compared to RCA, or possibly the presence of an eBSV sequence of different conformation. Since the sequences of the respective eBSV for BSMYV and BSIMV in the M. balbisiana genome are not available, a series of random primer combinations were tested in an attempt to find potential episomal�]specific primer sets for BSMYV and BSIMV. Of an initial 20 primer combinations screened for BSMYV detection on a small number of control samples, 11 primers sets appeared to be episomal�]specific. However, subsequent testing of two of these primer combinations on a larger number of control samples resulted in some inconsistent results which will require further investigation. Testing of the 25 primer combinations for episomal�]specific detection of BSIMV on a number of control samples showed that none were able to discriminate between episomal and endogenous BSIMV. The final component of this research project was the development of an infectious clone of a BSV endemic in Australia, namely BSMYV. This was considered important to enable the generation of large amounts of diseased plant material needed for further research. A terminally redundant fragment (.1.3 �~ BSMYV genome) was cloned and transformed into Agrobacterium tumefaciens strain AGL1, and used to inoculate 12 healthy banana plants of the cultivars Cavendish (Williams) by three different methods. At 12 weeks post�]inoculation, (i) four of the five banana plants inoculated by corm injection showed characteristic BSV symptoms while the remaining plant was wilting/dying, (ii) three of the five banana plants inoculated by needle�]pricking of the stem showed BSV symptoms, one plant was symptomless while the remaining had died and (iii) both banana plants inoculated by leaf infiltration were symptomless. When banana leaf samples were tested for BSMYV by PCR and RCA, BSMYV was confirmed in all banana plants showing symptoms including those were wilting and/or dying. The results from this research have provided several avenues for further research. By completely sequencing all variants of eBSOLV and eBSGFV and fully sequencing the eBSIMV and eBSMYV regions, episomal BSV�]specific primer sets for all eBSVs could potentially be designed that could avoid all integrants of that particular BSV species. Furthermore, the development of an infectious BSV clone will enable large numbers of BSVinfected plants to be generated for the further testing of the sensitivity of RCA compared to other more established assays such as PCR. The development of infectious clones also opens the possibility for virus induced gene silencing studies in banana.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The literature was reviewed to assess the relationship between the lipid adjusted concentration in human serum and breast milk (expressed as the serum/milk ratio) of a broad range of POPs in paired samples. Thirteen studies were identified, including seven studies that reported serum/milk ratios for polychlorinated dibenzo-dioxins and -furans (PCDD/Fs), ten for polychlorinated biphenyls (PCBs), five for polybrominated diphenyl ethers (PBDEs), and five for organochlorine pesticides (OCPs). Mean serum/milk ratios ranged between 0.7 and 25 depending on the compound and congener. For PCDD/Fs, PCBs and PBDEs, a clear trend of increasing mean serum/milk ratio by increasing molar volume, hydrophobicity and number of halogen substitutes was observed. The mean serum/milk ratios reported by the 13 studies summarized here will aid comparison between human POPs exposure studies using either serum or milk samples. More studies are needed to allow a valid comparison between data obtained from analysis of breast milk and serum samples for a broader range of POPs. Furthermore such studies may shed light on compound specific factors as well as other determinants that may affect the partitioning and partition kinetics of POPs between serum and breast milk.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In very clear language the United Nations Convention on the Law of the Sea (UNCLOS) calls upon the parties to initiate regional action for protection of marine environment. Although the UNCLOS gives special recognition in various ways to developing countries, the South Asian developing countries continue to encounter some bottlenecks in complying with the provisions of the Convention relating to marine environment. Against this backdrop, this paper tends to examine the need for a regional approach towards conservation of marine environment. Moreover, the paper aims to explore possible ways to establish a regional legal framework for conservation of marine environment in South Asian region. In doing so, the paper critically examines existing mechanisms already in place including the South Asian Seas Programme and South Asian Seas Action Plan

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The deposition of small metal clusters (Cu, Au and Al) on f.c.c. metals (Cu, Au and Ni) has been studied by molecular dynamics simulation using Finnis–Sinclair (FS) potential. The impact energy varied from 0.01 to 10 eV/atom. First, the deposition of single cluster was simulated. We observed that, even at much lower energy, a small cluster with (Ih) icosahedral symmetry was reconstructed to match the substrate structure (f.c.c.) after deposition. Next, clusters were modeled to drop, one after the other, on the surface. The nanostructure was found by soft landing of Au clusters on Cu with increasing coverage, where interfacial energy dominates. While at relatively higher deposition energy (a few eV), the ordered f.c.c.-like structure was observed in the first adlayer of the film formed by Al clusters depositing on Ni substrate. This characteristic is mainly attributive to the ballistic collision. Our results indicate that the surface morphology synthesized by cluster deposition could be controlled by experimental parameters, which will be helpful for controlled design of nanostructure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Oceania has a relatively low level of crime prevalence yet in the smaller and under-developed PICs we have shown that transnational crime has become increasingly common. A risk contained but potentially dangerous if state failure or fragility undermines law enforcement capacities. We predict that as the pace of globalization quickens and the demand for raw materials and resources grows some parts of the Pacific will be prone to criminal enterprises run by both indigenous and foreign crime groups. Australia and New Zealand will remain attractors of illicit goods notably ATS but will in turn be source countries for diminishing fish stock such as beche de mere and abalone as well forest timber. Finally the role of states such as Australia and New Zealand in helping to maintain law enforcement capacities throughout the region will be crucial if organized crime in Oceania is to be kept in check while demand for illicit resources grow.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Newell (1985, 1986) identified the importance of interacting constraints on the emergent behaviours of learners or performers in sport as they assemble functional states of movement organisation in achieving task goals. Constraints, related to the person, task and environment, were defined as ‘boundaries or features that limit motion of the entity under consideration at any moment in time’ (Newell, 1986, p.347). Personal (or organismic) constraints include factors such as individual anthropometrics (height, weight, and limb lengths), fitness (e.g., strength, speed, aerobic capacity, and flexibility), mental skills (e.g. concentration, confidence, emotional control and motivation), perceptual and decisionmaking skills (e.g., recognising patterns of play, anticipation by reading the movements of opponents) and personality factors (e.g., risk taking or conservative behaviours). Newell (1986, p.350) distinguished between general environmental constraints, such as gravity, ambient temperature, natural light and altitude and task constraints, which are task specific and concerned with the goals of a specific activity. More recently, socio-cultural constraints (e.g., family support, cultural expectations and access to facilities) have also been considered as environmental constraints. Application of the constraints framework to the study of sport performance has led to task constraints being defined to include factors such as rules of games, equipment used, boundary playing areas and markings, nets and goals, the number of...