76 resultados para Virginia Military Institute.
em Queensland University of Technology - ePrints Archive
Resumo:
Recognizing the importance of good nutrition for physical and mental status, the Department of Defense asked the Institute of Medicine to guide the design of the nutritional composition of a ration for soldiers on short-term, high-stress missions. Nutrient Composition of Rations for Short-Term, High-Intensity Combat Operations considers military performance, health concerns, food intake, energy expenditure, physical exercise, and food technology issues. The success of military operations depends to a large extent on the physical and mental status of the individuals involved.
Resumo:
Background There is no legal requirement for Iranian military truck drivers to undergo regular visual checkups as compared to commercial truck drivers. Objectives This study aimed to evaluate the impact of drivers’ visual checkups by comparing the visual function of Iranian military and commercial truck drivers. Patients and Methods In this comparative cross-sectional study, two hundred military and 200 commercial truck drivers were recruited and their Visual Acuity (VA), Visual Field (VF), color vision and Contrast Sensitivity (CS) were assessed and compared using the Snellen chart, confrontation screening method, D15 test and Pelli-Robson letter chart, respectively. A questionnaire regarding driving exposure and history of motor-vehicle crashes (MVCs) was also filled by drivers. Results were analyzed using an independent samples t-test, one-way ANOVA (assessing difference in number of MVCs across different age groups), chi-square test and Pearson correlation at statistical significance level of P < 0.05. Results Mean age was 41.6 ± 9.2 for the military truck drivers and 43.4 ± 10.9 for commercial truck drivers (P > 0.05). No significant difference between military and commercial drivers was found in terms of driving experience, number of MVCs, binocular VA, frequency of color vision defects and CS scores. In contrast, the last ocular examination was significantly earlier in military drivers than commercial drivers (P < 0.001). In addition, 4% of military drivers did not meet the national standards to drive as opposed to 2% of commercial drivers. There was a significant but weak correlation between binocular VA and age (r = 0.175, P < 0.001). However, CS showed a significantly moderate correlation with age (r = -0.488, P < 0.001). Conclusions The absence of legal requirement for regular eye examination in military drivers caused the incompetent drivers to be missed in contrast to commercial drivers. The need for scientific revision of VA standard for Iranian drivers is also discussed. The CS measurement in visual checkups of older drivers deserves to be investigated more thoroughly.
Resumo:
Changes in the environment, including increased environmental complexity, require military supply units to employ a more adaptive strategy in order to enhance military agility. We extend the Lumpkin and Dess (1996) model and develop propositions that explore the interrelationships between/amongst entrepreneurial orientation (EO); opportunity recognition, evaluation and exploitation; environmental and organizational factors; and organizational performance. We propose that the innovativeness, proactiveness, and risk-taking dimensions of EO are of primary importance in identifying adaptive solutions and that these relationships are moderated by environmental factors. The autonomy and competitive aggressiveness dimensions of EO are important in implementing solutions as adaptive strategies, especially in a military context, and these relationships are moderated by organizational factors. This chapter extends existing theory developed primarily for the civilian sector to the military. Military organizations are more rigid hierarchical structures, and have different measures of performance. At an applied level, this research provides insights for military commanders that can potentially enhance agility and adaptability.
Resumo:
As militarization of bodies politic continues apace the world over, as military organizations again reveal themselves as primary political, economic and cultural forces in many societies, we argue that the emergent and potentially dominant form of political economic organization is a species of neo-feudal corporatism. Drawing upon Bourdieu, we theorize bodies politic as living habitus. Bodies politic are prepared for war and peace through new mediations, powerful means of public pedagogy. The process of militarization requires the generation of new, antagonistic evaluations of other bodies politic. Such evaluations are inculcated via these mediations, the movement of meanings across time and space, between formerly disparate histories, places, and cultures. New mediations touch new and different aspects of the body politic: its eyes, its ears, its organs, but they are consistently targeted at the formation of dispositions, the prime movers of action.
Resumo:
This article rebuts the still-common assumption that managers of capitalist entities have a duty, principally or even exclusively, to maximise the monetary return to investors on their investments. It argues that this view is based on a misleadingly simplistic conception of human values and motivation. Not only is acting solely to maximise long-term shareholder value difficult, it displays, at best, banal single-mindedness and, at worst, sociopathy. In fact, real investors and managers have rich constellations of values that should be taken account of in all their decisions, including their business decisions. Awareness of our values, and public expression of our commitment to exemplify them, make for healthier investment and, in the long term, a healthier corporate world. Individuals and funds investing on the basis of such values, in companies that express their own, display humanity rather than pathology. Preamble I always enjoyed the discussions that Michael Whincop and I had about the interaction of ethics and economics. Each of us could see an important role for these disciplines, as well as our common discipline of law. We also shared an appreciation of the institutional context within which much of the drama of life is played out. In understanding the behaviour of individuals and the choices they make, it seemed axiomatic to each of us that ethics and economics have a lot to say. This was also true of the institutions in which they operate. Michael ·had a strong interest in 'the new institutional economics' I and I had a strong interest in 'institutionalising ethics' right through the 1990s.' This formed the basis of some fascinating and fruitful discussions. Professor Charles Sampford is Director, Key Centre for Ethics, Law, Justice and Governance, Foundation Professor of Law at Griffith University and President, International Institute for Public Ethics.DrVirginia Berry is a Research Fellow at theKey Centre for Ethics, Law,Justice andGovernance, Griffith University. Oliver Williamson, one of the leading proponents of the 'new institutional economics', published a number of influential works - see Williamson (1975, 1995,1996). Sampford (1991),' pp 185-222. The primary focus of discussions on institutionalising ethics has been in public sectorethics: see, for example, Preston and Sampford (2002); Sampford (1994), pp 114-38. Some discussion has, however, moved beyond the public sector to include business - see Sampford 200408299
Resumo:
Air transportation of Australian casualties in World War II was initially carried out in air ambulances with an accompanying male medical orderly. By late 1943 with the war effort concentrated in the Pacific, Allied military authorities realised that air transport was needed to move the increasing numbers of casualties over longer distances. The Royal Australian Air Force (RAAF) became responsible for air evacuation of Australian casualties and established a formal medical air evacuation system with trained flight teams early in 1944. Specialised Medical Air Evacuation Transport Units (MAETUs) were established whose sole responsibility was undertaking air evacuations of Australian casualties from the forward operational areas back to definitive medical care. Flight teams consisting of a RAAF nursing sister (registered nurse) and a medical orderly carried out the escort duties. These personnel had been specially trained in Australia for their role. Post-WWII, the RAAF Nursing Service was demobilised with a limited number of nurses being retained for the Interim Air Force. Subsequently, those nurses were offered commissions in the Permanent Air Force. Some of the nurses who remained were air evacuation trained and carried out air evacuations both in Australia and as part of the British Commonwealth Occupation Force in Japan. With the outbreak of the Korean War in June 1950, Australia became responsible for the air evacuation of British Commonwealth casualties from Korea to Japan. With a re-organisation of the Australian forces as part of the British Commonwealth forces, RAAF nurses were posted to undertake air evacuation from Korea and back to Australia from Iwakuni, Japan. By 1952, a specialised casualty staging section was established in Seoul and staffed by RAAF nurses from Iwakuni on a rotation basis. The development of the Australian air evacuation system and the role of the flight nurses are not well documented for the period 1943-1953. The aims of this research are three fold and include documenting the origins and development of the air evacuation system from 1943-1953; analysing and documenting the RAAF nurse’s role and exploring whether any influences or lessons remain valid today. A traditional historical methodology of narrative and then analysis was used to inform the flight nurse’s role within the totality of the social system. Evidence was based on primary data sources mainly held in Defence files, the Australian War Memorial or the National Archives of Australia. Interviews with 12 ex-RAAF nurses from both WWII and the Korean War were conducted to provide information where there were gaps in the primary data and to enable exploration of the flight nurses’ role and their contributions in war of the air evacuation of casualties. Finally, this thesis highlights two lessons that remain valid today. The first is that interoperability of air evacuation systems with other nations is a force multiplier when resources are scarce or limited. Second, the pre-flight assessment of patients was essential and ensured that there were no deaths in-flight.
Resumo:
On 16 July 2003 the Australian Government’s Treasurer, the Honourable Peter Costello, addressed the Sydney Institute on his vision for a tolerant Australian society. Drawing from Putnam’s research Costello argued that tolerance will flow from an active voluntary sector. However, Costello’s proposed model for a “tolerant” society fails to acknowledge that all behaviour is strategic and that voluntary association based on disinterested action is not possible. Ultimately, Treasurer Costello’s notion of tolerant society fuelled by an active voluntary sector may not lead to his desired end. Indeed, the promotion of voluntary association may contribute to the ongoing exclusion of citizens with low social capital. Amid the dynamism of the modern era some citizens such as ageing workers, slow or ineffective learners and women may be especially at risk. Accordingly, rather than advocating a policy approach that seeks to build inclusiveness through an active voluntary sector this paper recommends a policy approach that explores ways in which to strengthen learning and the wider involvement of individuals through both formal and informal means.
Resumo:
Medical personnel serving with the Defence Forces have contributed to the evolution of trauma treatment and the advancement of prehospital care within the military environment. This paper investigates the stories of an Australian Medical Officer, Sir Neville Howse, and two stretcher bearers, Private John Simpson (Kirkpatrick) and Private Martin O’Meara, In particular it describes the gruelling conditions under which they performed their roles, and reflects on the legacy that they have left behind in Australian society. While it is widely acknowledged that conflicts such as World War One should never have happened, as civilian and defence force paramedics, we should never forget the service and sacrifice of defence force medical personnel and their contribution to the body of knowledge on the treatment of trauma. These men and women bravely provided emergency care in the most harrowing conditions possible. However, men like Martin O’Meara may not have been given the same status in society today as Sir Neville Howse or Simpson and his donkey, due to the public’s lack of awareness and acceptance of war neurosis and conditions such as post traumatic stress disorder, reactive psychosis and somatoform disorders which were suffered by many soldiers during their wartime service and on their return home after fighting in war.
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
"The 1990s saw the United Nations, the militaries of key member states, and NGOs increasingly entangled in the complex affairs of disrupted states. Whether as deliverers of humanitarian assistance or as agents of political, social, and civic reconstruction, whether in Somalia, Bosnia, Kosovo, or East Timor, these actors have had to learn ways of interacting with each other in order to optimize the benefits for the populations they seek to assist. Yet the challenges have proved daunting. Civil and military actors have different organizational cultures and standard operating procedures and are confronted with the need to work together to perform tasks to which different actors may attach quite different priorities."--BOOK JACKET.
Resumo:
A copy of the slide presentation titled 'Researching with the Aboriginal Community'. It was presented by Bronwyn Fredericks for the Master of Public Health Program (MPH2057- Aboriginal Health Course) at Monash University. The Monash University Aboriginal Health Course (MPH2057) is delivered in partnership by the Victorian Aboriginal Community Controlled Health Organisation (VACCHO) & The Burnet Institute. The 2010 Aboriginal Health Course was run on Level 3 of The Burnet Institute, 89 Commercial Road, Prahan, Melbourne, Victoria, 29 September 2010.