996 resultados para cellules présentatrices d’antigènes (CPA)
Resumo:
Not-for-profit (NFP) financial ratio research has focused primarily on organisational efficiency measurements for external stakeholders. Ratios that also capture information about stability, capacity (liquidity), gearing and sustainability, enable an assessment of financial resilience. They are thus valuable tools that can provide a framework of internal accountability between boards and management. The establishment of an Australian NFP regulator highlights the importance of NFP sustainability, and affirms the timeliness of this paper. We propose a suite of key financial ratios for use by NFP boards and management, and demonstrate its practical usefulness by applying the ratios to financial data from the 2009 reports of ACFID (Australian Council for International Development)-affiliated international aid organisations.
Resumo:
Unmanned Aircraft Systems (UAS) are one of a number of emerging aviation sectors. Such new aviation concepts present a significant challenge to National Aviation Authorities (NAAs) charged with ensuring the safety of their operation within the existing airspace system. There is significant heritage in the existing body of aviation safety regulations for Conventionally Piloted Aircraft (CPA). It can be argued that the promulgation of these regulations has delivered a level of safety tolerable to society, thus justifying the “default position” of applying these same standards, regulations and regulatory structures to emerging aviation concepts such as UAS. An example of this is the proposed “1309” regulation for UAS, which is based on the 1309 regulation for CPA. However, the absence of a pilot on-board an unmanned aircraft creates a fundamentally different risk paradigm to that of CPA. An appreciation of these differences is essential to the justification of the “default position” and in turn, to ensure the development of effective safety standards and regulations for UAS. This paper explores the suitability of the proposed “1309” regulation for UAS. A detailed review of the proposed regulation is provided and a number of key assumptions are identified and discussed. A high-level model characterising the expected number of third party fatalities on the ground is then used to determine the impact of these assumptions. The results clearly show that the “one size fits all” approach to the definition of 1309 regulations for UAS, which mandates equipment design and installation requirements independent of where the UAS is to be operated, will not lead to an effective management of the risks.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistringuishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the receipient in the private domain. "Non-trivial filtering" can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicaly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
Purine compounds, such as caffeine, have many health-promoting properties and have proven to be beneficial in treating a number of different conditions. Theacrine, a purine alkaloid structurally similar to caffeine and abundantly present in Camellia kucha, has recently become of interest as a potential therapeutic compound. In the present study, theacrine was tested using a rodent behavioral model to investigate the effects of the drug on locomotor activity. Long Evans rats were injected with theacrine (24 or 48 mg/kg, i.p.) and activity levels were measured. Results showed that the highest dose of theacrine (48 mg/kg, i.p.) significantly increased locomotor activity compared to control animals and activity remained elevated throughout the duration of the session. To test for the involvement of adenosine receptors underlying theacrine's motor-activating properties, rats were administered a cocktail of the adenosine A₁ agonist, N⁶-cyclopentyladenosine (CPA; 0.1 mg/kg, i.p.) and A(2A) receptor agonist 2-p-(2-carboxyethyl)phenethylamino-5'-N-ethylcarboxamidoadenosine (CGS-21680; 0.2 mg/kg, i.p.). Pre-treatment with theacrine significantly attenuated the motor depression induced by the adenosine receptor agonists, indicating that theacrine is likely acting as an adenosine receptor antagonist. Next, we examined the role of DA D₁ and D₂ receptor antagonism on theacrine-induced hyperlocomotion. Both antagonists, D₁R SCH23390 (0.1 or 0.05 mg/kg, i.p.) and D₂R eticlopride (0.1 mg/kg, i.p.), significantly reduced theacrine-stimulated activity indicating that this behavioral response, at least in part, is mediated by DA receptors. In order to investigate the brain region where theacrine may be acting, the drug (10 or 20 μg) was infused bilaterally into nucleus accumbens (NAc). Theacrine enhanced activity levels in a dose-dependent manner, implicating a role of the NAc in modulating theacrine's effects on locomotion. In addition, theacrine did not induce locomotor sensitization or tolerance after chronic exposure. Taken together, these findings demonstrate that theacrine significantly enhances activity; an effect which is mediated by both the adenosinergic and dopaminergic systems.
Resumo:
Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security.
Resumo:
Chondritic porous aggregates (CPA's) belong to an important subset of small particles (usually between 5 and 50 micrometers) collected from the stratosphere by high flying aircraft. These aggregates are approximately chondritic in elemental abundance and are composed of many thousands of smaller, submicrometer particles. CPA particles have been the subject of intensive study during the past few years [1-3] and there is strong evidence that they are a new class of extraterrestrial material not represented in the meteorite collection [3,4]. However, CPA's may be related to carbonaceous chondrites and in fact, both may be part of a continuum of primitive extraterrestrial materials [5]. The importance of CPA's stems from suggestions that they are very primitive solar system material possibly derived from early formed proto planets, chondritic parent bodies, or comets [3, 6]. To better understand the origin and evolution of these particles, we have attempted to summarize all of the mineralogical data on identified CPA's published since about 1976.
Resumo:
A new set of primitive extraterrestrial materials collected in the Earth's stratosphere include Chondritic Porous Aggregates (CPA's) [1]. CPAs have a complex and variable mineralogy [1-3] that include 'organic compounds' [4,5] and poorly graphitised carbon (PGC)[6]. This study presents a continuation of our detailed Analytical Electron Microscope study on carbon-rich CPA W7029*A from the JSC Cosmic Dust Collection. This CPA is an uncontaminated sample that survived atmospheric entry without appreciable alteration [7] and which contains ~44% carbonaceous material. The carbonaceous composition of selected particles was confirmed by Electron Energy Loss Spectroscopy and Selected Area Electron Diffraction (SAED). Possible carbonaceous contaminants introduced by specimen preparation techniques are easily recognised from indigenous CPA carbon particles [8] and do not bias our interpretations.
Resumo:
In previous Analytical Electron Microscope studies of extraterrestrial Chondritic Porous Aggregate (CPA) W7029* A, we have reported on the presence of layer silicates(Rietmeijer and Mackinnon, 1984a; Mackinnon and Rietmeijer, 1983) and metal oxides (Rietmeijer and Mackinnon, 1984a; Mackinnon and Rietmeijer, 1984). We present here a continuation ofthis detailed mineralogical study and propose a scenario which may account for the variety and types of phases observed in this CPA. At least 50% ofCPA W7029*A is carbonaceous material, primarily poorly graphitised carbon (POC) with morphologies similar to POC in acid residues of carbonaceous chondrites (Smith and Busek, 1981; Lumpkin, 1983). The basal spacing of graphite in CPA W7029*A ranges from 3.47-3.52 A and compares with doo, of graphite in the Allende residues (Smith and Buseck, 1981; Lumpkin, 1983). Low-temperature phases comprise - 20% of CPA W7029*A and include layer silicates, Bi,O" a-FeOOH(Rietmeijer and Mackinnon, 1984a; Mackinnon and Rietmeijer, 1983), BaSO.,.Ti.O, plates, pentlandite-violarite and bornite. Clusters of Mg-rich olivine and pyroxene make up - 12% of the aggregate...
Resumo:
Across time, companies have increasingly made public commitments to sustainable development and to reducing their impacts on climate change. Management remuneration plans (MRPs) are a key mechanism to motivate managers to achieve corporate goals. We review the MRPs negotiated with key management personnel in a sample of large Australian carbon-intensive companies. Our results show that, as in past decades, the companies in our sample have MRPs in place that continue to fixate on financial performance. We argue that this provides evidence of a disconnection, or ‘decoupling’, between the sustainability-related rhetoric of the sample companies, and their ‘real’ organisational practices and priorities.
Resumo:
Despite the ubiquitous nature of the discourse on human rights there is currently little research on the emergence of disclosure by multinational corporations on their human rights obligations or the regulatory dynamic that may lie behind this trend. In an attempt to begin to explore the extent to which, if any, the language of human rights has entered the discourse of corporate accountability, this paper investigates the adoption of the International Labour Organisation's (ILO) human rights standards by major multinational garment retail companies that source products from developing countries, as disclosed through their reporting media. The paper has three objectives. Firstly, to empirically explore the extent to which a group of multinational garment retailers invoke the language of human rights when disclosing their corporate responsibilities. The paper reviews corporate reporting media including social responsibility codes of conduct, annual reports and stand-alone social responsibility reports released by 18 major global clothing and retail companies during a period from 1990 to 2007. We find that the number of companies adopting and disclosing on the ILO's workplace human rights standards has significantly increased since 1998 – the year in which the ILO's standards were endorsed and accepted by the global community (ILO, 1998). Secondly, drawing on a combination of Responsive Regulation theory and neo-institutional theory, we tentatively seek to understand the regulatory space that may have influenced these large corporations to adopt the language of human rights obligations. In particular, we study the role that International Governmental Organisation's (IGO) such as ILO may have played in these disclosures. Finally, we provide some critical reflections on the power and potential within the corporate adoption of the language of human rights.
Resumo:
An important subset of extraterrestrial particles that reach the Earth's stratosphere include the so-called Chondritic Porous Aggregates (CPA's) [1-3]. In general, CPA's have a fluffy morphology and consist of numerous (>104)subparticles that are often <100A in size [4]. Mineral species in CPA's include Mg-rich pyroxene and olivine, Fe- and (Fe,Ni)-sulphides, taenite, Fe,Ni-carbides, magnetite, Ti-metal, a Bi-phase (metal or oxide), and variable amounts of carbonaceous material [1, 5-7]. Hydrated silicates are rare in CPA's and are limited to aggregates that have not been severely altered (thermo-metamorphosed) during atmospheric entry [8]. The presence of hydrated silicates in one cosmic dust particle was established by X-ray diffraction [2] and has been inferred in others by infra-red spectroscopy [8]. If CPA's are cometary, their mineralogy and morphology suggest that at least two episodes of aggregation occurred and that variations in porosity may be related to local differences in ice-to-dust ratio [3].
Resumo:
This paper, founded within Enterprise 2.0, knowledge management and informed learning theory, outlines the introduction of Yammer, an enterprise microblogging application at CPA Australia. The implementation and adoption process is discussed through usage analysis, and resulting outcomes through user success stories. Lessons learned provide a framework for organisations looking to adopt social networking tools within their own organisational environment.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.
Resumo:
Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this work, we construct “Fuzzy” Identity Based Encryption from the hardness of the Learning With Errors (LWE) problem. We note that for our parameters, the underlying lattice problems (such as gapSVP or SIVP) are assumed to be hard to approximate within supexponential factors for adversaries running in subexponential time. We give CPA and CCA secure variants of our construction, for small and large universes of attributes. All our constructions are secure against selective-identity attacks in the standard model. Our construction is made possible by observing certain special properties that secret sharing schemes need to satisfy in order to be useful for Fuzzy IBE. We also discuss some obstacles towards realizing lattice-based attribute-based encryption (ABE).