951 resultados para Arbitrary detention
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
Synopsis and review of Australian crime film The Jammed (Dee McLachlan, 2007). Includes cast and credits. One of the strengths of Dee McLachlan’s shocking and moving film is the extensive research undertaken in pre-production, which grounds the film in a reality of which many Australians are unaware. The film opens with a caption stating that it was inspired by court transcripts, and closes with an intertitle stating that in 2001 and 2002, two sex trafficked victims died in Villawood Detention Centre. The film makes it clear that human trafficking and the coercion of women into prostitution are as much problems in Australia as anywhere; Project Respect, an organisation that acts on behalf of trafficked sex workers, has estimated that about 1000 women are illegally brought to Australia to work as prostitutes each year. The film’s title is taken from the term used by support workers to describe how the women are ‘jammed’ between their captors and the authorities; their illegal status and often heavy endebtedness, coupled with their innate fear of authority figures and the captors threats to their families back home, deter them from escaping or going to the police. The latter course of action may only lead to incarceration and deportation, as it does for Crystal in The Jammed. They are also deterred from speaking out by the implied (and often real) collusion between the traffickers and the authorities. While she is held in an apartment shortly after she arrives in Australia, Crystal threatens to call the police, only to be told by her captor ‘My best friend is the police’...
Resumo:
A method for prediction of the radiation pattern of N strongly coupled antennas with mismatched sources is presented. The method facilitates fast and accurate design of compact arrays. The prediction is based on the measured N-port S parameters of the coupled antennas and the N active element patterns measured in a 50 ω environment. By introducing equivalent power sources, the radiation pattern with excitation by sources with arbitrary impedances and various decoupling and matching networks (DMN) can be accurately predicted without the need for additional measurements. Two experiments were carried out for verification: pattern prediction for parasitic antennas with different loads and for antennas with DMN. The difference between measured and predicted patterns was within 1 to 2 dB.
Resumo:
Bioacoustic data can provide an important base for environmental monitoring. To explore a large amount of field recordings collected, an automated similarity search algorithm is presented in this paper. A region of an audio defined by frequency and time bounds is provided by a user; the content of the region is used to construct a query. In the retrieving process, our algorithm will automatically scan through recordings to search for similar regions. In detail, we present a feature extraction approach based on the visual content of vocalisations – in this case ridges, and develop a generic regional representation of vocalisations for indexing. Our feature extraction method works best for bird vocalisations showing ridge characteristics. The regional representation method allows the content of an arbitrary region of a continuous recording to be described in a compressed format.
Resumo:
The concept of cultural sensitivity is located within the tradition of anthropology and the history of colonisation and immigration in Australian society. This history provides a basis for examining the largely uncritical introduction of cultural considerations to the discipline of nursing. This paper argues that contemporary understandings of multiculturalism in nursing and health care policy tend to obscure, ignore and thus perpetuate notions of racial superiority. Recent works in transcultural nursing are med to illustrate the way in which ahistorical and therefore quite arbitrary traits are attributed to particular cultural groups. This perspective, given legitimacy in terms of cultural sensitivity, encourages political neutrality and thereby avoids questioning the discriminatory practices embedded in fundamental social relations.
Resumo:
Numbers, rates and proportions of those remanded in custody have increased significantly in recent decades across a range of jurisdictions. In Australia they have doubled since the early 1980s, such that close to one in four prisoners is currently unconvicted. Taking NSW as a case study and drawing on the recent New South Wales Law Reform Commission Report on Bail (2012), this article will identify the key drivers of this increase in NSW, predominantly a form of legislative hyperactivity involving constant changes to the Bail Act 1978 (NSW), changes which remove or restrict the presumption in favour of bail for a wide range of offences. The article will then examine some of the conceptual, cultural and practice shifts underlying the increase. These include: a shift away from a conception of bail as a procedural issue predominantly concerned with securing the attendance of the accused at trial and the integrity of the trial, to the use of bail for crime prevention purposes; the diminishing force of the presumption of innocence; the framing of a false opposition between an individual interest in liberty and a public interest in safety; a shift from determination of the individual case by reference to its own particular circumstances to determination by its classification within pre‐set legislative categories of offence types and previous convictions; a double jeopardy effect arising in relation to people with previous convictions for which they have already been punished; and an unacknowledged preventive detention effect arising from the increased emphasis on risk. Many of these conceptual shifts are apparent in the explosion in bail conditions and the KPI‐driven policing of bail conditions and consequent rise in revocations, especially in relation to juveniles. The paper will conclude with a note on the NSW Government’s response to the NSW LRC Report in the form of a Bail Bill (2013) and brief speculation as to its likely effects.
Resumo:
This paper presents a novel framework for the modelling of passenger facilitation in a complex environment. The research is motivated by the challenges in the airport complex system, where there are multiple stakeholders, differing operational objectives and complex interactions and interdependencies between different parts of the airport system. Traditional methods for airport terminal modelling do not explicitly address the need for understanding causal relationships in a dynamic environment. Additionally, existing Bayesian Network (BN) models, which provide a means for capturing causal relationships, only present a static snapshot of a system. A method to integrate a BN complex systems model with stochastic queuing theory is developed based on the properties of the Poisson and Exponential distributions. The resultant Hybrid Queue-based Bayesian Network (HQBN) framework enables the simulation of arbitrary factors, their relationships, and their effects on passenger flow and vice versa. A case study implementation of the framework is demonstrated on the inbound passenger facilitation process at Brisbane International Airport. The predicted outputs of the model, in terms of cumulative passenger flow at intermediary and end points in the inbound process, are found to have an $R^2$ goodness of fit of 0.9994 and 0.9982 respectively over a 10 hour test period. The utility of the framework is demonstrated on a number of usage scenarios including real time monitoring and `what-if' analysis. This framework provides the ability to analyse and simulate a dynamic complex system, and can be applied to other socio-technical systems such as hospitals.
Resumo:
A review of literature on the role of emergency nurses in Indonesia revealed a dearth of research. Anecdotal evidence suggests a lack of clarity in role definition which has led to uncertainty and role ambiguity. Despite advances in the development of specialist nursing roles in Indonesia, that of the emergency nurse remains unclear. This study explored the role of nurses working in emergency care services in three general hospitals in West Java, Indonesia. The theoretical framework is grounded in Charmaz’s constructivist grounded theory. Data collection methods were observation, in-depth interviews and interrogation of related documents. Phase one of data collection involved 74 h of observation and nterviews with 35 nurses working in the three ED settings. For the purposes of theoretical sampling, a second phase of data collection was conducted. This involved a second nterview with eight participants from the three EDs. nterviews were also undertaken with the three key informants of nursing management of three related hospitals; key informants from the Indonesian Nurses Association; the Directorate of Nursing, Ministry of Health; and from the organization for ED nurses. Data analysis drew on Charmaz’s constructivist approach and the concepts of simultaneous data collection and analysis, constant comparison, coding, and theoretical sampling. The analysis generated four theoretical concepts that characterized the role of the emergency nurse: An arbitrary scope of practice, Struggling for recognition, Learning on the job and Looking to better practice. These concepts provided analytical direction for an exploration of the clinical and political dimensions of the role of the emergency nurse in Indonesia.
Resumo:
Indigenous juveniles (those aged 10 to 16 years in Queensland and 10 to 17 years in all other jurisdictions) are over-represented at all stages of the criminal justice system, and their over-representation becomes more pronounced at the most severe end of the system (ie in detention). Recent figures show that Indigenous juveniles are 24 times as likely to be detained in a juvenile correctional facility as non-Indigenous juveniles (Richards & Lyneham 2010). A variety of explanations for this over-representation have been proposed, including: • lack of access or disparate access to diversionary programs (Allard et al. 2010; Cunneen 2008; Snowball 2008); • systemic discrimination against Indigenous juveniles (eg police bias against Indigenous juveniles) (Cunneen 2008; Kenny & Lennings 2007); • inadequate resourcing of Aboriginal legal services (Cunneen & Schwartz 2008); and • genuinely higher levels of offending by Indigenous juveniles (Kenny & Lennings 2007; Weatherburn et al. 2003). A range of measures (including diversion and juvenile conferencing programs) has recently been implemented to reduce the over-representation of Indigenous juveniles in detention, and minimise the contact of juveniles with the formal criminal justice system. Diversionary measures can only have a limited impact, however, and reducing offending and reoffending have been identified as critical factors to address if the over-representation of Indigenous juveniles is to be reduced (Allard et al. 2010; Weatherburn et al. 2003). While acknowledging that other measures designed to reduce the over-representation of Indigenous juveniles are important, this paper reviews the evidence on policies and programs that reduce offending by Indigenous juveniles in Australia. Where relevant, research from comparable jurisdictions, such as New Zealand and Canada, is also discussed.
Resumo:
Background Alcohol is a major contributor to road crashes in China (Li, Xie, Nie, & Zhang, 2012; Cochrane, & Chen, 2003). Two levels of offence are defined in legislation: the lower level is driving under the influence (DUI, also translated as “drink driving”) and the higher level is driving while intoxicated (DWI, also translated as “drunk driving”, where the driver has BAC>0.08mg/100ml). This study focuses on a 2011 legislative amendment that made drunk driving (DWI) a criminal offence. However, it is not known whether drivers are aware of the law, and whether this knowledge, their exposure to enforcement and the existence of alcohol use disorders relate to their drink driving behaviour. This study explored these relationships in a sample of convicted drunk drivers. Method A survey collected information about offenders’ knowledge and practices related to drunk driving in Guangzhou. The Alcohol Use Disorders Identification Test (AUDIT) (Babor, & Grant, 1989; Chen, & Cheng, 2005) assessed hazardous drinking levels. In total, 101 drunk driving offenders were recruited while in detention. Results Males represented 90% of the sample; the average age was 33.6 years (SD=8.7; range 17-59 years). The average age at which offenders reported starting to drink alcohol was 19.5 years (SD=4.1; range 8-30 years). Driver’s licences had been held for a median of 7 years. Knowledge about legal limits for DUI and DWI offences was surprisingly low, at 27.7% and 40.6% respectively. On average, offenders had experienced 1.5 police alcohol breath tests in the previous year (SD=1.3; range 1-10). AUDIT scores indicated that a substantial proportion of the offenders had high levels of alcohol use disorders. Higher AUDIT scores were found among the least experienced drivers, those with lack of knowledge about the legal limits, and recidivist drunk drivers. Discussion and conclusions Limited awareness of legal alcohol limits might contribute to offending; high levels of alcohol consumption by many offenders suggest that hazardous drinking levels may also contribute. Novice drivers are a concern and their higher AUDIT scores merit some followup. Overall, this study provides important information to assist in refining community education and prevention efforts to align with China’s new regulations.
Resumo:
Condensation technique of degree of freedom is firstly proposed to improve the computational efficiency of meshfree method with Galerkin weak form. In present method, scattered nodes without connectivity are divided into several subsets by cells with arbitrary shape. The local discrete equations are established over each cell by using moving kriging interpolation, in which the nodes that located in the cell are used for approximation. Then, the condensation technique can be introduced into the local discrete equations by transferring equations of inner nodes to equations of boundary nodes based on cell. In the scheme of present method, the calculation of each cell is carried out by meshfree method with Galerkin weak form, and local search is implemented in interpolation. Numerical examples show that the present method has high computational efficiency and convergence, and good accuracy is also obtained.
Resumo:
Funded and endorsed by the Australasian Juvenile Justice Administrators, this is one of the first national scale research reports into the bail and remand practices for young Australians. A young person can be placed in custody on remand (ie refused bail) after being arrested by police in relation to a suspected criminal offence, before entering a plea, while awaiting trial, during trial or awaiting sentence. Although custodial remand plays an important role in Western criminal justice systems, minimising the unnecessary use of remand is important given the obligations Australia has under several UN instruments to use, as a last resort, youth detention of any kind. This research identifies trends in the use of custodial remand and explores the factors that influence its use for young people nationally and in each of Australia’s jurisdictions.
Resumo:
Activists, Feminists, queer theorists, and those who live outside traditional gender narratives have long challenged the fixity of the sex and gender binaries. While the dominant Western paradigm posits sex and gender as natural and inherent, queer theory argues that sex and gender are socially constructed. This means that our ideas about sex and gender, and the concepts themselves, are shaped by particular social contexts. Questioning the nature of sex can be puzzling. After all, isn’t sex biology? Binary sex – male and female – was labelled as such by scientists based on existing binary categories and observations of hormones, genes, chromosomes, reproductive organs, genitals and other bodily elements. Binary sex is allocated at birth by genital appearance. Not everyone fits into these categories and this leads queer theorists, and others, to question the categories. Now, “some scientists are also starting to move away from the idea of biology as the fixed basis on which the social artefact of gender is built” (5). Making Girls and Boys: Inside the Science of Sex, by Jane McCredie, examines theories about gender roles and behaviours also considering those who don’t fit the arbitrary sex and gender binaries.
Resumo:
This paper presents a comparative study on the response of a buried tunnel to surface blast using the arbitrary Lagrangian-Eulerian (ALE) and smooth particle hydrodynamics (SPH) techniques. Since explosive tests with real physical models are extremely risky and expensive, the results of a centrifuge test were used to validate the numerical techniques. The numerical study shows that the ALE predictions were faster and closer to the experimental results than those from the SPH simulations which over predicted the strains. The findings of this research demonstrate the superiority of the ALE modelling techniques for the present study. They also provide a comprehensive understanding of the preferred ALE modelling techniques which can be used to investigate the surface blast response of underground tunnels.
Resumo:
Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.