20 resultados para Canning and preserving

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The chronic systemic administration of d-Galactose in C57BL/6J mice showed a relatively high oxidative stress, amyloid-β expression and neuronal cell death. Enhanced expression of pyknotic nuclei, caspase-3 and reduced expression of neuronal integrity markers further confirmed the aforesaid insults. However, concomitant treatment with the recombinant protein (SurR9-C84A) and the anti-transferrin receptor antibody conjugated SurR9-C84A (SurR9+TFN) nanocarriers showed a significant improvement in the disease status and neuronal health. The beauty of this study is that the biodegradable Food and Drug Administration (FDA) approved poly(lactic-co-glycolic acid) (PLGA) nanocarriers enhanced the biological half-life and the efficacy of the treatments. The nanocarriers were effective in lowering the amyloid-β expression, enhancing the neuronal integrity markers and maintaining the basal levels of endogenous survivin that is essential for evading the caspase activation and apoptosis. The current study herein reports for the first time that the brain targeted SurR9-C84A nanocarriers alleviated the d-Galactose induced neuronal insults and has potential for future brain targeted nanomedicine application.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Earth Sanctuaries Ltd (ESL) intends to offer its entire asset base for sale. ESL's primary objective is to conserve Australia's biodiversity, by breeding and preserving fauna profitably by running sanctuaries, environmental consultancies and related tourist facilities. This "ailing company" is also undergoing a management restructuring and attempting cost reduction. ESL was was one of the first firms to adopt AASB 1037. The implications for the accounting profession are discussed.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The intertwined relationship between the built and natural environments characterises and defines coastal towns, especially those with significant heritage values. Our research is located in the context of the “sea change” phenomenon, which is fundamentally changing the coastal towns of Australia. Barbara Norman, a past national president of the Planning Institute of Australia (PIA), summarised the current struggle occurring in many of Australia’s coastal regions when she wrote: “the Australian coastline is littered with exhausted communities battling to save the character and environment of their townships” (Norman, 2008). The Australian National Sea Change Taskforce was established in 2004, as a response to these wider community and professional concerns, and seeks “to ensure that coastal development is managed with a focus on the sustainability of coastal communities and the coastal environment” (Gurran et al., 2006) concluded that more detailed research is needed to develop new responses to coastal development, particularly in terms of promoting community wellbeing, strengthening social cohesion, avoiding socio-economic and socio-spatial polarisation and preserving sense of place.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The accounting profession, like all professions, has a commitment to advance the interests of the general community, as well as those they are contractually bound to serve. Providing services altruistically, at times without compensation, is a salient feature of the public interest ideal. A review of the literature indicates that the profession has abandoned its public interest role so that serving self-interest now appears to have primacy ( Bédard 2001 ; Canning and O'Dwyer 2001 ; Parker 1994 ; Saravanamuthu 2004 ). The aim of this paper is to examine members' interpretation of the public interest ideal and to elicit their perceptions on issues arising from the literature. The results of a survey to members of CPA Australia indicate that members can iterate the formal definition of the public interest, but their application of the public interest in conflict of interest situations is inconsistent with this definition.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper, an Evolutionary-based Similarity Reasoning (ESR) scheme for preserving the monotonicity property of the multi-input Fuzzy Inference System (FIS) is proposed. Similarity reasoning (SR) is a useful solution for undertaking the incomplete rule base problem in FIS modeling. However, SR may not be a direct solution to designing monotonic multi-input FIS models, owing to the difficulty in getting a set of monotonically-ordered conclusions. The proposed ESR scheme, which is a synthesis of evolutionary computing, sufficient conditions, and SR, provides a useful solution to modeling and preserving the monotonicity property of multi-input FIS models. A case study on Failure Mode and Effect Analysis (FMEA) is used to demonstrate the effectiveness of the proposed ESR scheme in undertaking real world problems that require the monotonicity property of FIS models.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

One of the drawbacks of LEACH protocol is the uncontrolled selection of cluster heads which, in some rounds, leads to the concentration of them in a limited area due to the randomness of the selection procedure. LEACH-C is a variant of LEACH that uses a centralized clustering algorithm and forms good clusters through sink control. According to experimental results, the IEEE 802.15.4 packets are damaged by WLAN interferences in ISM band. It seems that, sensor nodes equipped with cognitive radio capabilities can overcome this problem. In cognitive radio sensor networks (CRSN), routing must be accompanied by channel allocation. This requires spectrum management which can be devolved to cluster heads. For this networks, new duty cycle mechanisms must be designed that jointly consider neighbor discovery, and spectrum sensing/allocation. Cluster-based network architecture is a good choice for effective dynamic spectrum management. In such architecture, cluster heads have a proper spatial distribution and are optimally located all over the network. In this paper, using the physical layer information and preserving the feature of random cluster head selection in LEACH, it has been tried to both move the position of cluster heads to appropriate locations and make their quantity optimal. The simulation results show that the transferal of cluster heads to appropriate locations increases the network lifetime significantly though this comes at the price of early instability appearance. By considering the energy level in cluster head election algorithm, one can overcome the network stability issues too. However, this will move the cluster heads away from their appropriate locations. © 2012 IEEE.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

As part of the security within distributed systems, various services and resources need protection from unauthorized use. Remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. The conversion not only significantly improves the information assurance at low cost but also protects client privacy in distributed systems. In addition, our framework retains several practice-friendly properties of the underlying two-factor authentication, which we believe is of independent interest.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Human populations can cause serious damage to the natural environment. This, however, depends on the type of society and its size. Many traditional communities have a balanced relation with the environment, using practices for managing the soil, water and natural resources in order to satisfy their needs that are compatible to the general goals of environmental preservation.

The most usual approach to environmental conservation in the world sees human beings as intruders, potentially destroyers of the nature and, as a consequence, generally requires local population to be expelled from the protected regions. This situation has generated social conflicts because many protected areas, particularly in developing countries, are inhabited by indigenous or other traditional communities.

The disagreement about expelling or maintaining traditional communities in environmental conservation areas is strengthened by the lack of diagnostics on which changes are produced or suffered by communities in the region where they live. This paper presents a methodology developed to analyse land use dynamics in region with environmental conservation and traditional communities. We seek a better understanding of the way traditional communities use their space, the spatial pattern of land uses, which factors drive land use change, which impacts can be seen in those regions and identify the effects of conservation policies on land use dynamics.

The application of the method to the National Park of Superagui, Brazil, has successfully performed characterisation, analysis and simulation of land use dynamics in a region of environmental importance. Testing different scenarios has suggested that the adoption of a less restrictive policy for environmental conservation would have resulted in less social conflict with the same environmental efficiency than the established current policy.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper addresses the problem of privacy-preserving data publishing for social network. Research on protecting the privacy of individuals and the confidentiality of data in social network has recently been receiving increasing attention. Privacy is an important issue when one wants to make use of data that involves individuals' sensitive information, especially in a time when data collection is becoming easier and sophisticated data mining techniques are becoming more efficient. In this paper, we discuss various privacy attack vectors on social networks. We present algorithms that sanitize data to make it safe for release while preserving useful information, and discuss ways of analyzing the sanitized data. This study provides a summary of the current state-of-the-art, based on which we expect to see advances in social networks data publishing for years to come.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper, a novel approach to building a Fuzzy Inference System (FIS) that preserves the monotonicity property is proposed. A new fuzzy re-labeling technique to re-label the consequents of fuzzy rules in the database (before the Similarity Reasoning process) and a monotonicity index for use in FIS modeling are introduced. The proposed approach is able to overcome several restrictions in our previous work that uses mathematical conditions in building monotonicity-preserving FIS models. Here, we show that the proposed approach is applicable to different FIS models, which include the zero-order Sugeno FIS and Mamdani models. Besides, the proposed approach can be extended to undertake problems related to the local monotonicity property of FIS models. A number of examples to demonstrate the usefulness of the proposed approach are presented. The results indicate the usefulness of the proposed approach in constructing monotonicity-preserving FIS models.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

With the advent of Cloud Computing, IDS as a service (IDSaaS) has been proposed as an alternative to protect a network (e.g., financial organization) from a wide range of network attacks by offloading the expensive operations such as the process of signature matching to the cloud. The IDSaaS can be roughly classified into two types: signature-based detection and anomaly-based detection. During the packet inspection, no party wants to disclose their own data especially sensitive information to others, even to the cloud provider, for privacy concerns. However, current solutions of IDSaaS have not much discussed this issue. In this work, focus on the signature-based IDSaaS, we begin by designing a promising privacy-preserving intrusion detection mechanism, the main feature of which is that the process of signature matching does not reveal any specific content of network packets by means of a fingerprint-based comparison. We further conduct a study to evaluate this mechanism under a cloud scenario and identify several open problems and issues for designing such a privacy-preserving mechanism for IDSaaS in a practical environment.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Optimistic fair exchange (OFE) protocols are useful tools for two participants to fairly exchange items with the aid of a third party who is only involved if needed. A widely accepted requirement is that the third party's involvement in the exchange must be transparent, to protect privacy and avoid bad publicity. At the same time, a dishonest third party would compromise the fairness of the exchange and the third party thus must be responsible for its behaviors. This is achieved in OFE protocols with another property called accountability. It is unfortunate that the accountability has never been formally studied in OFE since its introduction ten years ago. In this paper, we fill these gaps by giving the first complete definition of accountability in OFE where one of the exchanged items is a digital signature and a generic (also the first) design of OFE where transparency and accountability coexist.