997 resultados para Secret Sharing Schemes


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article considers whether the granting of patents in respect of biomedical genetic research should be conditional upon the informed consent of research participants. It focuses upon several case studies. In Moore v the Regents of the University Of California, a patient sued his physician for breach of fiduciary duty and lack of informed consent, because the doctor had obtained a patent on the patient's cell line, without the patient's authorisation. In Greenberg v Miami Children's Hospital, the research participants, the Greenbergs, the National Tay Sachs and Allied Diseases Association, and Dor Yeshorim brought a legal action against the geneticist Reubon Matalon and the Miami Children's Hospital over a patent obtained on a gene related to the Canavan disease and accompany genetic diagnostic test. PXE International entered into a joint venture with Charles Boyd and the University of Hawaii, and obtained a patent together for ‘methods for diagnosing Pseudoxanthoma elasticum’. In light of such case studies, it is contended that there is a need to reform patent law, so as to recognise the bioethical principles of informed consent and benefit-sharing. The 2005 UNESCO Declaration on Bioethics and Human Rights provides a model for future case law and policy-making.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Anti-Counterfeiting Trade Agreement (ACTA) 2011 - Twitter hashtag #ACTA - is a controversial trade agreement designed to provide for stronger enforcement of intellectual property rights.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

High-stakes testing has become an important element of the Australian educational landscape. As one part of the neo-liberal paradigm where beliefs in the individual and the free market are paramount, it is of concern how school leaders can respond to this phenomenon in an ethical manner. Ethics and ethical leadership have increased in prominence both in the educational administration literature and in the media (Cranston, Ehrich, & Kimber, 2006). In this paper we consider ethical theories on which school principals can draw, not only in the leadership of their own schools but in their relationships with other schools. We provide an example of a school leader sharing a successful intervention with other schools, illustrating that school leaders can create spaces for promoting the public good within the context of high-stakes testing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As one of the largest sources of greenhouse gas (GHG) emissions, the building and construction sector is facing increasing pressure to reduce its life cycle GHG emissions. One central issue in striving towards reduced carbon emissions in the building and construction sector is to develop a practical and meaningful yardstick to assess and communicate GHG results through carbon labelling. The idea of carbon labelling schemes for building materials is to trigger a transition to a low carbon future by switching consumer-purchasing habits to low-carbon alternatives. As such, failing to change purchasing pattern and behaviour can be disastrous to carbon labelling schemes. One useful tool to assist customers to change their purchasing behaviour is benchmarking, which has been very commonly used in ecolabelling schemes. This paper analyses the definition and scope of benchmarking in the carbon labelling schemes for building materials. The benchmarking process has been examined within the context of carbon labelling. Four practical issues for the successful implementation of benchmarking, including the availability of benchmarks and databases, the usefulness of different types of benchmarks and the selection of labelling practices have also been clarified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. In this paper, we take a step closer to the adoption of the Information Accountability protocols and demonstrate their functionality through an implementation in FluxMED, a customisable EHR system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article discusses two key issues in REDD+ design and implementation at the national level – carbon rights, and benefit sharing. Both carbon rights and benefit sharing can be understood as new legal concepts (although they build on existing law), and as legal concepts they offer a framework for addressing related areas of REDD+ policy. Many countries are currently considering how to manage carbon rights and benefit sharing issues, including Cambodia and Kenya. Both of these countries host existing forest carbon projects and are also in the process of designing national REDD+ programmes. This article uses a conceptual framework for carbon rights and benefit sharing derived from legal analysis to consider the cases of both Cambodia and Kenya, and also includes a general discussion of the challenges countries might encounter when considering how to manage carbon rights and benefit sharing in the context of REDD+ implementation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present a decentralized dynamic load scheduling/balancing algorithm called ELISA (Estimated Load Information Scheduling Algorithm) for general purpose distributed computing systems. ELISA uses estimated state information based upon periodic exchange of exact state information between neighbouring nodes to perform load scheduling. The primary objective of the algorithm is to cut down on the communication and load transfer overheads by minimizing the frequency of status exchange and by restricting the load transfer and status exchange within the buddy set of a processor. It is shown that the resulting algorithm performs almost as well as a perfect information algorithm and is superior to other load balancing schemes based on the random sharing and Ni-Hwang algorithms. A sensitivity analysis to study the effect of various design parameters on the effectiveness of load balancing is also carried out. Finally, the algorithm's performance is tested on large dimensional hypercubes in the presence of time-varying load arrival process and is shown to perform well in comparison to other algorithms. This makes ELISA a viable and implementable load balancing algorithm for use in general purpose distributed computing systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The accelerated rate of increase in atmospheric CO2 concentration in recent years has revived the idea of stabilizing the global climate through geoengineering schemes. Majority of the proposed geoengineering schemes will attempt to reduce the amount of solar radiation absorbed by our planet. Climate modelling studies of these so called 'sunshade geoengineering schemes' show that global warming from increasing concentrations of CO2 can be mitigated by intentionally manipulating the amount of sunlight absorbed by the climate system. These studies also suggest that the residual changes could be large on regional scales, so that climate change may not be mitigated on a local basis. More recent modelling studies have shown that these schemes could lead to a slow-down in the global hydrological cycle. Other problems such as changes in the terrestrial carbon cycle and ocean acidification remain unsolved by sunshade geoengineering schemes. In this article, I review the proposed geoengineering schemes, results from climate models and discuss why geoengineering is not the best option to deal with climate change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent research suggests that aggressive driving may be influenced by driver perceptions of their interactions with other drivers in terms of ‘right’ or ‘wrong’ behaviour. Drivers appear to take a moral standpoint on ‘right’ or ‘wrong’ driving behaviour. However, ‘right’ or ‘wrong’ in the context of road use is not defined solely by legislation, but includes informal rules that are sometimes termed ‘driving etiquette’. Driving etiquette has implications for road safety and public safety since breaches of both formal and informal rules may result in moral judgement of others and subsequent behaviours designed to punish the ‘offender’ or ‘teach them a lesson’. This paper outlines qualitative research that was undertaken with drivers to explore their understanding of driving etiquette and how they reacted to other drivers’ observance or violation of their understanding. The aim was to develop an explanatory framework within which the relationships between driving etiquette and aggressive driving could be understood, specifically moral judgement of other drivers and punishment of their transgression of driving etiquette. Thematic analysis of focus groups (n=10) generated three main themes: (1) courtesy and reciprocity, and the notion of two-way responsibility, with examples of how expectations of courteous behaviour vary according to the traffic interaction; (2) acknowledgement and shared social experience: ‘giving the wave’; and (3) responses to breaches of the expectations/informal rules. The themes are discussed in terms of their roles in an explanatory framework of the informal rules of etiquette and how interactions between drivers can reinforce or weaken a driver’s understanding of driver etiquette and potentially lead to driving aggression.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The prevalence and developmental course of supposed ‘secret language’ was examined in a cohort of twins and closely spaced singletons pairs, with systematic assessments at 20 months and again at 36 months. Two forms of apparent ‘secret language’ were examined: (1) shared understanding—speech directed generally but unintelligible to the parent, although apparently clearly understood within the child pair, and (2) private language directed exclusively to the other twin/sibling—not intelligible to the parent, but apparently clearly understood and used only within the child pair. Both occurred in singleton pairs, but the rate was much higher in twins. In most cases it seemed to be a developmental phenomenon occurring in the second year of life with the emergence of immature speech, and decreasing considerably over the next 16 months. A small group of children, primarily male twins, was reported to use a private language at 36 months. This group had poorer cognitive and language functioning, and was characterized by highly dependent relationships. Some aspects of the twins’ home environment were less stimulating and less responsive, most probably reflecting the abilities and relationships of the children. A follow-up of these children when they were ~6 years of age showed that language outcome was poor for the subgroup (n = 4) who did not develop normal language alongside the use of a private language.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study reports on the use of naturally occurring F-specific coliphages, as well as spiked MS-2 phage, to evaluate a land-based effluent treatment/reuse system and an effluent irrigation scheme. Both the natural phages and the spiked MS-2 phage indicated that the effluent treatment/reuse system (FILTER - Filtration and Irrigated cropping for Land Treatment and Effluent Reuse) achieved a reduction in phage levels over the treatment system by one to two log10. FILTER reduced natural F-specific phage numbers from around 103 to below 102 100-ml-1 and the spiked phage from 105 to around 104 100-ml-1 (incoming compared with outgoing water). In the effluent irrigation scheme, phage spiked into the holding ponds dropped from 106 to 102 100-ml-1 after 168 h (with no detectable levels of natural F-specific phage being found prior to spiking). Only low levels of the spiked phage (102 gm-1) could be recovered from soil irrigated with phage-spiked effluent (at 106 phage 100 ml-1) or from fruits (around 102 phage per fruit) that had direct contact with soil which had been freshly irrigated with the same phage-spiked effluent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In much the same way that a squirrel stores a range of food in a range of places, the Australian Curriculum, Assessment and Reporting Authority’s (ACARA) Australian Curriculum: English (ACARA, 2015) stores references to grammar in a range of places. This paper explores some seemingly ‘hidden’ grammars within the AC:E to (re)discover their genesis and how they unfold across Foundation to Year 6. The first ‘Secret Squirrel’ moment centres on the introduction of a new grammar which weaves traditional Latin-based and Systemic Functional Linguistics (SFL) theory. The second ‘Secret Squirrel’ moment centres on the use of one sub-system of SFL Theory, the System of Appraisal, and its potential to provide an analytical lens for ‘reading’ the interpersonal meaning within narratives. The remainder of the paper draws on Goodson’s (1990) notion of curriculum as a social construction, paying attention to the levels of processes and (potential) practice. This part of the paper focuses on the System of Appraisal as it is introduced in the AC:E and then translates the Content Descriptions to an example analysis. One stimulus text, Melanie Watt’s (2012) children’s picture book ‘Scaredy Squirrel at the Beach’, is introduced then analysed using the System of Appraisal as an analytical lens for identifying how language choices ‘go to work’ (Macken-Horarik, 2003, p. 285) on readers, that is how Watt’s language choices are crafted so a ‘compliant’ child reader (Martin & White, 2005, p. 62) has the opportunity to ‘feel with’ and thus ‘adjudicate’ the behaviour of characters in particular ways (Macken-Horarik, 2003, p. 285).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The short duration of the Doppler signal and noise content in it necessitate a validation scheme to be incorporated in the electronic processor used for frequency measurement, There are several different validation schemes that can be employed in period timing devices. A detailed study of the influence of these validation schemes on the measured frequency has been reported here. These studies were carried out by using a combination of a fast A/D converter and computer. Doppler bursts obtained from an air flow were digitised and stored on magnetic discs. Suitable computer programs were then used to simulate the performance of period timing devices with different validation schemes and the frequency of the stored bursts were evaluated. It is found that best results are obtained when the validation scheme enables frequency measurement to be made over a large number of cycles within the burst.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is well known that the notions of normal forms and acyclicity capture many practical desirable properties for database schemes. The basic schema design problem is to develop design methodologies that strive toward these ideals. The usual approach is to first normalize the database scheme as far as possible. If the resulting scheme is cyclic, then one tries to transform it into an acyclic scheme. In this paper, we argue in favor of carrying out these two phases of design concurrently. In order to do this efficiently, we need to be able to incrementally analyze the acyclicity status of a database scheme as it is being designed. To this end, we propose the formalism of "binary decompositions". Using this, we characterize design sequences that exactly generate theta-acyclic schemes, for theta = agr,beta. We then show how our results can be put to use in database design. Finally, we also show that our formalism above can be effectively used as a proof tool in dependency theory. We demonstrate its power by showing that it leads to a significant simplification of the proofs of some previous results connecting sets of multivalued dependencies and acyclic join dependencies.