991 resultados para Black Hawk War, 1832.
Resumo:
We describe a new species of dasyurid marsupial within the genus Antechinus that was previously known as a northern outlier of Dusky Antechinus (A. swainsonii). The Black-tailed Antechinus, Antechinus arktos sp. nov., is known only from areas of high altitude and high rainfall on the Tweed Volcano caldera of far south-east Queensland and north-east New South Wales, Australia. Antechinus arktos formerly sheltered under the taxonomic umbrella of A. swainsonii mimetes, the widespread mainland form of Dusky Antechinus. With the benefit of genetic hindsight, some striking morphological differences are herein resolved: A. s. mimetes is more uniformly deep brown-black to grizzled grey-brown from head to rump, with brownish (clove brown—raw umber) hair on the upper surface of the hindfoot and tail, whereas A. arktos is more vibrantly coloured, with a marked change from greyish-brown head to orange-brown rump, fuscous black on the upper surface of the hindfoot and dense, short fur on the evenly black tail. Further, A. arktos has marked orange-brown fur on the upper and lower eyelid, cheek and in front of the ear and very long guard hairs all over the body; these characters are more subtle in A. s. mimetes. There are striking genetic differences between the two species: at mtDNA, A. s. mimetes from north-east New South Wales is 10% divergent to A. arktos from its type locality at Springbrook NP, Queensland. In contrast, the Ebor A. s. mimetes clades closely with conspecifics from ACT and Victoria. A. arktos skulls are strikingly different to all subspecies of A. swainsonii. A. arktos are markedly larger than A. s. mimetes and A. s. swainsonii (Tasmania) for a range of craniodental measures. Antechinus arktos were historically found at a few proximate mountainous sites in south-east Queensland, and have only recently been recorded from or near the type locality. Even there, the species is likely in low abundance. The Black-tailed Antechinus has plausibly been detrimentally affected by climate change in recent decades, and will be at further risk with increasing warming trends.
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.
Resumo:
Mocombe and Tomlin’s Language, Literacy, and Pedagogy in Postindustrial Societies: The Case of Black Academic Underachievement is part of the Routledge Research in Education series. The purpose of the work is to set out a theoretical framework for understanding the black/white academic achievement gap in the age of globalisation and post-industrialism. The authors use each chapter to develop an explanation for the persistent black/white academic achievement gap, by theorising that the gap is an epiphenomenon of global capitalist, post-industrial structures, reinforced by education as an apparatus of the system...
Resumo:
This thesis examines the role of conservative newspaper proprietors and editors to generate support for war against the Boers in South Africa. The thesis utilises Rune Ottosen's theoretical model concerning newspapers creating a pro-war mentality, and S.E. Finer's theory on the influences of the military on civilian Government. The pivotal supportive roles of Governor Lamington and Premiers Dickson and Philp and the oppositional role of Premier Dawson are also examined.
Resumo:
Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.
Resumo:
This study examined the relationship of race and rural/urban setting to physical, behavioral, psychosocial, and environmental factors associated with physical activity. Subjects included 1,668 eighth-grade girls from 31 middle schools: 933 from urban settings, and 735 from rural settings. Forty-six percent of urban girls and 59% of rural girls were Black. One-way and two-way ANOVAs with school as a covariate were used to analyze the data. Results indicated that most differences were associated with race rather than setting. Black girls were less active than White girls, reporting significantly fewer 30-minute blocks of both vigorous and moderate-to-vigorous physical activity. Black girls also spent more time watching television, and had higher BMIs and greater prevalence of overweight than White girls. However, enjoyment of physical education and family involvement in physical activity were greater among Black girls titan White girls. Rural White girls and urban Black girls had more favorable attitudes toward physical activity. Access to sports equipment, perceived safety of neighborhood, and physical activity self-efficacy were higher in White girls than Black girls.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. This volume addresses the issues that are at stake in this dual process of political closure, and therefore rethinks how states can respond to terrorist threats. The contributors range from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world.
Resumo:
With its foregrounding of the political issue of the denial of Aboriginal Australian sovereignty by British invaders in its big budget, mainstream narrative, 'The Sapphires' (Wayne Blair 2012) is shown to be another example of a "fourth formation" (Starrs 2012) in Moore and Muecke's 1985 model. Blair's feel-good movie features an all-Aboriginal Australian troupe of singers, The Sapphires, who undertake a journey of self-discovery whereby they learn the importance of choosing the protest songs of black Soul over the white coloniser's "whining" Country and Western songs and this is historically contextualised with a discussion of Aboriginal Australians and popular radio. Furthermore, this paper argues the iconic 'Welcome to Country' is twice subverted to reinforce this theme, firstly in the Cummeragunja pub and secondly in war-torn Vietnam. Finally, the prediction is made that a "fifth formation", in which seeking recognition of Aboriginal Australian sovereignty is no longer the goal because it has become the ongoing reality, will soon be the project of Australian film-makers as they celebrate this long overdue societal shift.
Resumo:
The annual Anzac Day observance is a focus for articulating popular notions of Australian national identity. Early Anzac Day observations were characterised by a diversity of observational modes, many distinctly masculine and militarist in character; including sports, competitions and marches. It was from the late 1920s that the now characteristic structure of the day (dawn service - march -follow-on - afternoon celebrations including eating, drinking and playing of the gambling game two-up, illegal on every other day of the year} became the dominant form. 1 Widely believed to have experienced an extended nadir in the 1960s and 1970s, since the 1980s Anzac Day has arguably become the single most important national event in the Australian calendar, involving probably the largest-numbers of Australians, many of them young, in the same temporal observance in a multitude of locations across the country and around the world.2 To date, there is a rich literature around Anzac Day observations and meanings focussing on its cultural I folkioric role'; the production of (masculinised) national identity;pilgrimage;' popular memory I history;' and the contemporary reshaping of the Anzac myth by and for indigenous participants.'
Resumo:
This paper discusses proposed changes to the Australian welfare state in the Welfare Review chaired by Patrick McClure and launched by Kevin Andrews, Minister for Social Services in the Abbott government, in a recent address to the Sydney Institute. Andrews cited the Beveridge Report of 1942, referring to Lord William Beveridge as the “godfather of the British post-war welfare state”, commending him for putting forward a plan for a welfare state providing a minimal level of support, constituting a bare safety net, rather than “stifling civil society and personal responsibility” through generous provision. In line with a key TASA conference theme of challenging institutions and identifying social and political change at local and global levels, this paper examines both the Beveridge Report and the McClure Report, identifying key issues and themes of relevance to current times in Australia.
Resumo:
We studied the wing morphology, echolocation calls, diet and emergence time of the black-bearded tomb bat (Taphozous melanopogon) from May to October 2006 in Guangxi Province, southwest China. Taphozous melanopogon has wings with high aspect ratio, high loading and pointed wing-tip shape-characteristics associated with fast flight in open space. This species usually produces low-intensity, low frequency, and frequency-modulated (FM) calls usually containing up to four harmonics, with most energy in the second (or sometimes third) harmonic. The diet of this species consists mostly of Lepidoptera and Hemiptera. Timing of evening emergence is correlated with the time of sunset. This is the first study to describe the flight and echolocation behavior of this species in China, and opens the way for future studies of its biology.
Resumo:
The authors used data collected from 1995 to 1999, from an on-going cancer case–control study in greater Johannesburg, to estimate the importance of tobacco and alcohol consumption and other suspected risk factors with respect to cancer of the oesophagus (267 men and 138 women), lung (105 men and 41 women), oral cavity (87 men and 37 women), and larynx (51 men). Cancers not associated with tobacco or alcohol consumption were used as controls (804 men and 1370 women). Tobacco smoking was found to be the major risk factor for all of these cancers with odds ratios ranging from 2.6 (95% CI 1.5–4.5) for oesophageal cancer in female ex-smokers to 50.9 (95% CI 12.6–204.6) for lung cancer in women, and 23.9 (95% CI 9.5–60.3) for lung cancer and 23.6 (95% CI 4.6–121.2) for laryngeal cancer in men who smoked 15 or more grams of tobacco a day. This is the first time an association between smoking and oral and laryngeal cancers has been shown in sub-Saharan Africa. Long-term residence in the Transkei region in the southeast of the country continues to be a risk factor for oesophageal cancer, especially in women (odds ratio=14.7, 95% CI 4.7–46.0), possibly due to nutritional factors. There was a slight increase in lung cancer (odds ratio=2.9, 95% CI 1.1–7.5) in men working in ‘potentially noxious’ industries. ‘Frequent’ alcohol consumption, on its own, caused a marginally elevated risk for oesophageal cancer (odds ratio=1.7, 95% CI 1.0–2.9, for women and odds ratio=1.8, 95% CI 1.2–2.8, for men). The risks for oesophageal cancer in relation to alcohol consumption increased significantly in male and female smokers (odds ratio=4.7, 95% CI=2.8–7.9 in males and odds ratio=4.8, 95% CI 3.2–6.1 in females). The above results are broadly in line with international findings.