967 resultados para Offenses against property


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Chlamydia trachomatis continues to be the most commonly reported sexually transmitted bacterial infection in many countries with more than 100 million new cases estimated annually. These acute infections translate into significant downstream health care costs, particularly for women, where complications can include pelvic inflammatory disease and other disease sequelae such as tubal factor infertility. Despite years of research, the immunological mechanisms responsible for protective immunity versus immunopathology are still not well understood, although it is widely accepted that T cell driven IFN-g and Th17 responses are critical for clearing infection. While antibodies are able to neutralize infections in vitro, alone they are not protective, indicating that any successful vaccine will need to elicit both arms of the immune response. In recent years, there has been an expansion in the number and types of antigens that have been evaluated as vaccines, and combined with the new array of mucosal adjuvants, this aspect of chlamydial vaccinology is showing promise. Most recently, the opportunities to develop successful vaccines have been given a significant boost with the development of a genetic transformation system for Chlamydia, as well as the identification of the key role of the chlamydial plasmid in virulence. While still remaining a major challenge, the development of a successful C.trachomatis vaccine is starting to look more likely.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Chlamydia pneumoniae commonly causes respiratory tract infections in children, and epidemiological investigations strongly link infection to the pathogenesis of asthma. The immune system in early life is immature and may not respond appropriately to pathogens. Toll-like receptor (TLR)2 and 4 are regarded as the primary pattern recognition receptors that sense bacteria, however their contribution to innate and adaptive immunity in early life remains poorly defined. We investigated the role of TLR2 and 4 in the induction of immune responses to Chlamydia muridarum respiratory infection, in neonatal wild-type (Wt) or TLR2-deficient (−/−), 4−/− or 2/4−/− BALB/c mice. Wt mice had moderate disease and infection. TLR2−/− mice had more severe disease and more intense and prolonged infection compared to other groups. TLR4−/− mice were asymptomatic. TLR2/4−/− mice had severe early disease and persistent infection, which resolved thereafter consistent with the absence of symptoms in TLR4−/− mice. Wt mice mounted robust innate and adaptive responses with an influx of natural killer (NK) cells, neutrophils, myeloid (mDCs) and plasmacytoid (pDCs) dendritic cells, and activated CD4+ and CD8+ T-cells into the lungs. Wt mice also had effective production of interferon (IFN)γ in the lymph nodes and lung, and proliferation of lymph node T-cells. TLR2−/− mice had more intense and persistent innate (particularly neutrophil) and adaptive cell responses and IL-17 expression in the lung, however IFNγ responses and T-cell proliferation were reduced. TLR2/4−/− mice had reduced innate and adaptive responses. Most importantly, neutrophil phagocytosis was impaired in the absence of TLR2. Thus, TLR2 expression, particularly on neutrophils, is required for effective control of Chlamydia respiratory infection in early life. Loss of control of infection leads to enhanced but ineffective TLR4-mediated inflammatory responses that prolong disease symptoms. This indicates that TLR2 agonists may be beneficial in the treatment of early life Chlamydia infections and associated diseases.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite plentiful efforts to identify perpetrator, victim, and incident characteristics correlated with reporting violence against women to police, few studies have addressed the contexts that shape such reporting. Even fewer have examined variations in these contexts across geographic areas. Drawing upon National Crime Victimization Survey data from 1992 through 2009, this paper uses conjunctive analysis of case configurations to identify and investigate the dominant situational contexts of reporting of violence against women to police across rural, suburban, and urban areas. Our findings show that context matters and the importance of incident, perpetrator, and victim characteristics vary across geographic areas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The arena of intellectual property encompasses streams that often interrelate and overlap in protecting different aspects of intellectual property. Australian commentators suggest that ‘one of the most troublesome areas in the entire field of intellectual property has been the relationship between copyright protection for artistic works under the Copyright Act 1968 (Cth) and protection for registered designs under the Designs Act 1906 (Cth).’ [McKeough, J., Stewart, A., & Griffith, P. (2004). Intellectual property in Australia (3rd ed.). Chatswood, NSW: Butterworths.] [Ricketson, S., Richardson, M., & Davison, M. (2009). Intellectual property: Cases, materials and commentary (4th ed.). Chatswood, NSW: LexisNexis Butterworths.] This overlap has caused much confusion for both creators of artistic works and industrial designs, as there is an uncertainty of whether protection against infringement is afforded under the Copyright Act 1988 (Cth) or whether the Designs Act 2003 (Cth) will apply. In Australia, there is limited precedent that examines the crossover between copyright and designs. Essentially, the cases that have tested this issue remain unclear as to whether a design applied industrially will invoke copyright protection. The cases demonstrate that there is an inconsistency in this area despite the aims of the new provisions of the Designs Act 2003 (Cth) to close the loopholes between copyright and designs. This paper will discuss and evaluate the relationship between copyright protection for artistic works and protection for registered designs with respect to the Designs Act 2003 (Cth).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

OBJECTIVE: To optimize the animal model of liver injury that can properly represent the pathological characteristics of dampness-heat jaundice syndrome of traditional Chinese medicine. METHODS: The liver injury in the model rat was induced by alpha-naphthylisothiocyanate (ANIT) and carbon tetrachloride (CCl(4) ) respectively, and the effects of Yinchenhao Decoction (, YCHD), a proved effective Chinese medical formula for treating the dampness-heat jaundice syndrome in clinic, on the two liver injury models were evaluated by analyzing the serum level of alanine aminotransferase (ALT), asparate aminotransferase (AST), alkaline phosphatase (ALP), malondialchehyche (MDA), total bilirubin (T-BIL), superoxide dismutase (SOD), glutathione peroxidase (GSH-PX) as well as the ratio of liver weight to body weight. The experimental data were analyzed by principal component analytical method of pattern recognition. RESULTS: The ratio of liver weight to body weight was significantly elevated in the ANIT and CCl(4) groups when compared with that in the normal control (P<0.01). The contents of ALT and T-BIL were significantly higher in the ANIT group than in the normal control (P<0.05,P<0.01), and the levels of AST, ALT and ALP were significantly elevated in CCl(4) group relative to those in the normal control P<0.01). In the YCHD group, the increase in AST, ALT and ALP levels was significantly reduced (P<0.05, P<0.01), but with no significant increase in serum T-BIL. In the CCl(4) intoxicated group, the MDA content was significantly increased and SOD, GSH-PX activities decreased significantly compared with those in the normal control group, respectively (P<0.01). The increase in MDA induced by CCl(4) was significantly reduced by YCHD P<0.05). CONCLUSION: YCHD showed significant effects on preventing liver injury progression induced by CCl(4), and the closest or most suitable animal model for damp-heat jaundice syndrome may be the one induced by CCl(4).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report an efficient solar-light-driven photocatalyst based on three-dimensional nanoporous tungsten trioxide (WO3) films. These films are obtained by anodizing W foils in fluoride-containing electrolytes at room temperature and under low applied voltages with an efficient growth rate of 2 μm h− 1. The maximum thickness of the films is ~ 3 μm that exceeds those of previously reported anodized WO3 films in fluoride-containing electrolytes. By investigating the photocatalytic properties of the films with thicknesses ranging from ~ 0.5 to ~ 3 μm, the optimum thickness of the nanoporous film is found to be ~ 1 μm, which demonstrates an impressive 120% improvement in the photocatalytic performance compared to that of a RF-sputtered nanotextured film with similar weights. We mainly ascribe this to large surface area and smaller bandgap.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bayesian networks (BNs) provide a statistical modelling framework which is ideally suited for modelling the many factors and components of complex problems such as healthcare-acquired infections. The methicillin-resistant Staphylococcus aureus (MRSA) organism is particularly troublesome since it is resistant to standard treatments for Staph infections. Overcrowding and understa�ng are believed to increase infection transmission rates and also to inhibit the effectiveness of disease control measures. Clearly the mechanisms behind MRSA transmission and containment are very complicated and control strategies may only be e�ective when used in combination. BNs are growing in popularity in general and in medical sciences in particular. A recent Current Content search of the number of published BN journal articles showed a fi�ve fold increase in general and a six fold increase in medical and veterinary science from 2000 to 2009. This chapter introduces the reader to Bayesian network (BN) modelling and an iterative modelling approach to build and test the BN created to investigate the possible role of high bed occupancy on transmission of MRSA while simultaneously taking into account other risk factors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To evaluate the effectiveness of the 7-valent pneumococcal conjugate vaccine (PCV7) in preventing pneumonia, diagnosed radiologically according to World Health Organization (WHO) criteria, among indigenous infants in the Northern Territory of Australia. Methods We conducted a historical cohort study of consecutive indigenous birth cohorts between 1 April 1998 and 28 February 2005. Children were followed up to 18 months of age. The PCV7 programme commenced on 1 June 2001. All chest X-rays taken within 3 days of any hospitalization were assessed. The primary endpoint was a first episode of WHO-defined pneumonia requiring hospitalization. Cox proportional hazards models were used to compare disease incidence. Findings There were 526 pneumonia events among 10 600 children - an incidence of 3.3 per 1000 child-months; 183 episodes (34.8%) occurred before 5 months of age and 247 (47.0%) by 7 months. Of the children studied, 27% had received 3 doses of vaccine by 7 months of age. Hazard ratios for endpoint pneumonia were 1.01 for 1 versus 0 doses; 1.03 for 2 versus 0 doses; and 0.84 for 3 versus 0 doses. Conclusion There was limited evidence that PCV7 reduced the incidence of radiologically confirmed pneumonia among Northern Territory indigenous infants, although there was a non-significant trend towards an effect after receipt of the third dose. These findings might be explained by lack of timely vaccination and/or occurrence of disease at an early age. Additionally, the relative contribution of vaccine-type pneumococcus to severe pneumonia in a setting where multiple other pathogens are prevalent may differ with respect to other settings where vaccine efficacy has been clearly established.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To compare the diagnostic accuracy of the interRAI Acute Care (AC) Cognitive Performance Scale (CPS2) and the Mini-Mental State Examination (MMSE), against independent clinical diagnosis for detecting dementia in older hospitalized patients. Design, Setting, and Participants The study was part of a prospective observational cohort study of patients aged ≥70 years admitted to four acute hospitals in Queensland, Australia, between 2008 and 2010. Recruitment was consecutive and patients expected to remain in hospital for ≥48 hours were eligible to participate. Data for 462 patients were available for this study. Measurements Trained research nurses completed comprehensive geriatric assessments and administered the interRAI AC and MMSE to patients. Two physicians independently reviewed patients’ medical records and assessments to establish the diagnosis of dementia. Indicators of diagnostic accuracy included sensitivity, specificity, predictive values, likelihood ratios and areas under receiver (AUC) operating characteristic curves. Results 85 patients (18.4%) were considered to have dementia according to independent clinical diagnosis. The sensitivity of the CPS2 [0.68 (95%CI: 0.58–0.77)] was not statistically different to the MMSE [0.75 (0.64–0.83)] in predicting physician diagnosed dementia. The AUCs for the 2 instruments were also not statistically different: CPS2 AUC = 0.83 (95%CI: 0.78–0.89) and MMSE AUC = 0.87 (95%CI: 0.83–0.91), while the CPS2 demonstrated higher specificity [0.92 95%CI: 0.89–0.95)] than the MMSE [0.82 (0.77–0.85)]. Agreement between the CPS2 and clinical diagnosis was substantial (87.4%; κ=0.61). Conclusion The CPS2 appears to be a reliable screening tool for assessing cognitive impairment in acutely unwell older hospitalized patients. These findings add to the growing body of evidence supporting the utility of the interRAI AC, within which the CPS2 is embedded. The interRAI AC offers the advantage of being able to accurately screen for both dementia and delirium without the need to use additional assessments, thus increasing assessment efficiency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This book examines the principles and practice of real estate mortgages in an easily accessible text referenced to all the Australian States. It specifically deals with the major theoretical and practical aspects of the land mortgage, including vitiating factors in formation, mortgagees’ powers and duties and mortgagors’ rights – both statutory and other – as well as assignment, insurance and discharge. It focuses exclusively on real estate mortgages and provides a thorough account of the law through analysis of the plethora of court decisions and statutory provisions in this area. Duncan and Dixon analyse the substance of the mortgage transaction from creation through to rights of enforcement. In its detailed consideration of the rights and obligations of mortgagors and mortgagees, it covers topics such as priorities and tacking, insurance, variation and assignment, rights of discharge, entry into possession, foreclosure and power of sale. In addition, the book contains a separate chapter on factors that may affect the validity and enforcement of a mortgage, together with separate consideration of a mortgagee’s right to enforce a guarantee provided on behalf of a mortgagor, and the rights and liabilities associated with a receivership regime initiated by

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper aims to evaluate the brand value of property in subdivision developments in the Bangkok Metropolitan Region (BMR), Thailand. The result has been determined by the application of a hedonic price model. The development of the model is developed based on a sample of 1,755 property sales during the period of 1992-2010 in eight zones of the BMR. The results indicate that the use of a semi-logarithmic model has stronger explanatory power and is more reliable. Property price increases 12.90% from the branding. Meanwhile, the price annually increases 2.96%; lot size and dwelling area have positive impacts on the price. In contrast, duplexes and townhouses have a negative impact on the price compared to single detached houses. Moreover, the price of properties which are located outside the Bangkok inner city area is reduced by 21.26% to 43.19%. These findings also contribute towards a new understanding of the positive impact of branding on the property price in the BMR. The result is useful for setting selling prices for branded and unbranded properties, and the model could provide a reference for setting property prices in subdivision developments in the BMR.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.