946 resultados para One-person dwellings
Resumo:
Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.
Resumo:
One-time proxy signatures are one-time signatures for which a primary signer can delegate his or her signing capability to a proxy signer. In this work we propose two one-time proxy signature schemes with different security properties. Unlike other existing one-time proxy signatures that are constructed from public key cryptography, our proposed schemes are based one-way functions without trapdoors and so they inherit the communication and computation efficiency from the traditional one-time signatures. Although from a verifier point of view, signatures generated by the proxy are indistinguishable from those created by the primary signer, a trusted authority can be equipped with an algorithm that allows the authority to settle disputes between the signers. In our constructions, we use a combination of one-time signatures, oblivious transfer protocols and certain combinatorial objects. We characterise these new combinatorial objects and present constructions for them.
Resumo:
This is a case study of a young university striving to generate and sustain a vibrant Research Training culture. The university’s research training framework is informed by a belief in a project management approach to achieving successful research candidature. This has led to the definition and reporting of key milestones during candidature. In turn, these milestones have generated a range of training programs to support Higher Degree Research (HDR) students to meet these milestones in a timely fashion. Each milestone focuses on a specific set of skills blended with supporting the development of different parts of the doctoral thesis. Data on student progress and completion has provided evidence in highlighting the role that the milestones and training are playing in supporting timely completion. A university-wide reporting cycle generated data on the range of workshops and training provided to Higher Degree Research students and supervisors. The report provided details of thesis topic and format, as well as participation in research training events and participant evaluation of those events. Analysis of the data led to recommendations and comments on the strengths and weaknesses of the current research training program. Discussion considered strategies and drivers for enhancements into the future. In particular, the paper reflects on the significant potential role of centrally curated knowledge systems to support HDR student and supervisor access, and engagement and success. The research training program was developed using blended learning as a model. It covered face-to-face workshops as well as online modules. These were supplemented by web portals that offered a range of services to inform and educate students and supervisors and included opportunities for students to interact with each other. Topics ranged from the research life cycle, writing and publication, ethics, managing research data, managing copyright, and project management to use of software and the University’s Code of Conduct for Research. The challenges discussed included: How to reach off campus students and those studying in external modes? How best to promote events to potential participants? How long and what format is best for face-to-face sessions? What online resources best supplement face-to-face offerings? Is there a place for peer-based learning and what form should this take? These questions are raised by a relatively young university seeking to build and sustain a vibrant research culture. The rapid growth in enrolments in recent years has challenged previous one-to-one models of support. This review of research training is timely in seeking strategies to address changing research training support capacity and student needs. Part of the discussion will focus on supervisory training, noting that good supervision is the one remaining place where one-to-one support is provided. Ensuring that supervisors are appropriately equipped to address student expectations is considered in the context of the research training provisions. The paper concludes with reflection on the challenges faced, and recommended ways forward as the number of research students grows into the future.
Resumo:
A challenge for regulators and the courts has been establishing the boundary between behaviour is exclusionary and should be condemned under s 46 of the then Trade Practices Act 1974 (Cth) (TPA), now s 46 of the Competition and Consumer Act 2010 (Cth) (CCA), and behaviour that is not exclusionary and might even be pro-competitive. This boundary can be especially difficult to draw in the case of entry deterring strategies. Section 46(1) prohibits corporations with a substantial degree of market power from taking advantage of that market power for one of the statutorily proscribed purposes which include preventing the entry of a person into that or any other market. Section 45(2) separately prohibits corporations from making and giving effect to contracts arrangements and understandings that have the purpose, effect or likely effect of substantially lessening competition in a market. The latest case in which the ACCC has failed to satisfy the s 46 criteria is the decision of Greenwood J in ACCC v Cement Australia Pty Ltd [2013] FCA 909 (Cement Australia case). Final orders were published in a separate judgment, in ACCC v Cement Australia Pty Ltd [2014] FCA 148 (28 February 2014). The case concerned an entry deterring strategy, namely the pre-emptive buying of input factors in an upstream market to protect an incumbent with substantial market power in a downstream market and to prevent new entry in the downstream market. Greenwood J found that while Cement Australia Pty Ltd, formerly known as Queensland Cement Ltd (QCL), had substantial market power, its conduct in entering into the pre-emptive contracts was not a contravention of s 46, because Cement Australia had not “taken advantage” of its market power. However, since Cement Australia’s purpose in entering into the pre-emptive contracts was anti-competitive, they were held to contravene s 45(2) of the TPA. The purpose of this Note is to consider only the reasons for judgment in the Cement Australia case in relation to the “taking advantage” element. The judgment was handed down on 10 September 2013. The final hearing date was 15 July 2011, so it was long-awaited. At 714 pages, it is carefully drafted.
Resumo:
The term “Human error” can simply be defined as an error which made by a human. In fact, Human error is an explanation of malfunctions, unintended consequents from operating a system. There are many factors that cause a person to have an error due to the unwanted error of human. The aim of this paper is to investigate the relationship of human error as one of the factors to computer related abuses. The paper beings by computer-relating to human errors and followed by mechanism mitigate these errors through social and technical perspectives. We present the 25 techniques of computer crime prevention, as a heuristic device that assists. A last section discussing the ways of improving the adoption of security, and conclusion.
Resumo:
This paper aims to review the notion of the one-stop shop, particularly as it has developed in Australia. It has three main components. The first focuses on a significant initiative taken by the Coombs Royal Commission on Australian Government Administration as a form of action research in the mid-1970s. The second highlights the associated work on access theory by the late Bernard Schaffer and his associates and explains why this work was of fundamental importance for the development of the idea of the one-stop shop. The third deals with subsequent Australian understandings and a pp lications of the idea.
Resumo:
Our research aims to answer the research questions “How do we commonly describe the global start-ups profile as evidenced in prior inductive research?” and “Does this global start-ups profile can effectively explain phenomena in Australian global start-up firms?” We systematically review 29 global start-ups (144 firms) qualitative articles to understand descriptive definitions of global-startup firms. We then triangulate this finding with an Australian high-tech firm. Our contribution is to form a descriptive profile of global start-up phenomenon and raise interesting issues that have potentially fruitful findings for both research and practice. This profile might well be just a deviant from the traditional model that describes how firms establish their footprints, first in their domestic markets followed by moves into cross-border activities. Regardless, government agencies, consultants, and entrepreneurs need to understand the phenomenon. Thus we anticipate that this phenomenon will continue to provide interesting issues for pursuit, both by researchers as well as the practitioner community.
Resumo:
In common with other professions social workers have the power to articulate certain ‘‘truths’’ about the people who use their services (Hare Mustin, 1994). These knowledge statements about people, often situated in case files may become the only background information of the lived experience for people with disability (Gillman, Swain, & Heyman, 1997). Social workers need to develop interviewing, assessment and recording practices that give precedent to the worldview of service users, if they are to truly understand and respond effectively to people's lives (Bigby, 2007). One such way of doing this is by adopting a life story approach to working with vulnerable people, which can provide a holistic stance to a person's social reality (Ortiz, 1985). This article outlines the use of this approach in research with Queensland ex-prisoners who were labelled as having an intellectual disability. By explaining the process used by the first author (hereafter known as the researcher), the methodological findings of this study illustrate how life story work can contribute to social work practice.
Resumo:
Malaria has been eliminated from over 40 countries with an additional 39 currently planning for, or committed to, elimination. Information on the likely impact of available interventions, and the required time, is urgently needed to help plan resource allocation. Mathematical modelling has been used to investigate the impact of various interventions; the strength of the conclusions is boosted when several models with differing formulation produce similar data. Here we predict by using an individual-based stochastic simulation model of seasonal Plasmodium falciparum transmission that transmission can be interrupted and parasite reintroductions controlled in villages of 1,000 individuals where the entomological inoculation rate is <7 infectious bites per person per year using chemotherapy and bed net strategies. Above this transmission intensity bed nets and symptomatic treatment alone were not sufficient to interrupt transmission and control the importation of malaria for at least 150 days. Our model results suggest that 1) stochastic events impact the likelihood of successfully interrupting transmission with large variability in the times required, 2) the relative reduction in morbidity caused by the interventions were age-group specific, changing over time, and 3) the post-intervention changes in morbidity were larger than the corresponding impact on transmission. These results generally agree with the conclusions from previously published models. However the model also predicted changes in parasite population structure as a result of improved treatment of symptomatic individuals; the survival probability of introduced parasites reduced leading to an increase in the prevalence of sub-patent infections in semi-immune individuals. This novel finding requires further investigation in the field because, if confirmed, such a change would have a negative impact on attempts to eliminate the disease from areas of moderate transmission.
Resumo:
The one-step preparation of highly anisotropic polymer semiconductor thin films directly from solution is demonstrated. The conjugated polymer poly(3-hexylthiophene) (P3HT) as well as P3HT:fullerene bulk-heterojunction blends can be spin-coated from a mixture of the crystallizable solvent 1,3,5-trichlorobenzene (TCB) and a second carrier solvent such as chlorobenzene. Solidification is initiated by growth of macroscopic TCB spherulites followed by epitaxial crystallization of P3HT on TCB crystals. Subsequent sublimation of TCB leaves behind a replica of the original TCB spherulites. Thus, highly ordered thin films are obtained, which feature square-centimeter-sized domains that are composed of one spherulite-like structure each. A combination of optical microscopy and polarized photoluminescence spectroscopy reveals radial alignment of the polymer backbone in case of P3HT, whereas P3HT:fullerene blends display a tangential orientation with respect to the center of spherulite-like structures. Moreover, grazing-incidence wide-angle X-ray scattering reveals an increased relative degree of crystallinity and predominantly flat-on conformation of P3HT crystallites in the blend. The use of other processing methods such as dip-coating is also feasible and offers uniaxial orientation of the macromolecule. Finally, the applicability of this method to a variety of other semi-crystalline conjugated polymer systems is established. Those include other poly(3-alkylthiophene)s, two polyfluorenes, the low band-gap polymer PCPDTBT, a diketopyrrolopyrrole (DPP) small molecule as well as a number of polymer:fullerene and polymer:polymer blends. Macroscopic spherulite-like structures of the conjugated polymer poly(3-hexylthiophene) (P3HT) grow directly during spin-coating. This is achieved by processing P3HT or P3HT:fullerene bulk heterojunction blends from a mixture of the crystallizable solvent 1,3,5-trichlorobenzene and a second carrier solvent such as chlorobenzene. Epitaxial growth of the polymer on solidified solvent crystals gives rise to circular-symmetric, spherulite-like structures that feature a high degree of anisotropy.
Resumo:
This paper explores the possibility of connecting two Wind Turbine Generators (WTG) to the grid using a single three level inverter. In the proposed system the rectified output of one WTG is connected across the upper dc-link capacitor of a standard diode clamped three level inverter. Similarly the rectified output of the other WTG is connected across the lower capacitor. This particular combination has several advantages such as, direct connection to the grid, reduced parts count, improved reliability and high power capacity. However, the major problem in the proposed system is the imminent imbalance of dc-link voltages. Under such conditions conventional modulation methods fail to produce desired voltage and current waveforms. A detailed analysis on this issue and a novel space vector modulation method, as the solution, are proposed in this paper. To track the Maximum power point of each WTG a power sharing algorithm is proposed. Simulation results are presented to attest the efficacy of the proposed system.
Resumo:
Alternative dispute resolution, or ‘ADR’, is defined by the National Alternative Dispute Resolution Advisory Council as: … an umbrella term for processes, other than judicial determination, in which an impartial person assists those in a dispute to resolve the issues between them. ADR is commonly used as an abbreviation for alternative dispute resolution, but can also be used to mean assisted or appropriate dispute resolution. Some also use the term ADR to include approaches that enable parties to prevent or manage their own disputes without outside assistance. A broad range of ADR processes are used in legal practice contexts, including, for example, arbitration, conciliation, mediation, negotiation, conferencing, case appraisal and neutral evaluation. Hybrid processes are also used, such as med-arb in which the practitioner starts by using mediation, and then shifts to using arbitration. ADR processes generally fall into one of three general categories: facilitative, advisory or determinative. In a facilitative process, the ADR practitioner has the role of assisting the parties to reach a mutually agreeable outcome to the dispute by helping them to identify the issues in dispute, and to develop a range of options for resolving the dispute. Mediation and facilitated negotiation are examples of facilitative processes. ADR processes that are advisory involve the practitioner appraising the dispute, providing advice as to the facts of the dispute, the law and then, in some cases, articulating possible or appropriate outcomes and how they might be achieved. Case appraisal and neutral evaluation are examples of advisory processes. In a determinative ADR process, the practitioner evaluates the dispute (which may include the hearing of formal evidence from the parties) and makes a determination. Arbitration is an example of a determinative ADR process. The use of ADR processes has increased significantly in recent years. Indeed, in a range of contemporary legal contexts the use of an ADR process is now required before a party is able to file a matter in court. For example, Juliet Behrens discusses in Chapter 11 of this book how the Family Law Act 1975 (Cth) now effectively mandates attendance at pre-filing family dispute resolution in parenting disputes. At the state level, in Queensland, for example, attendance at a conciliation conference can be required in anti-discrimination matters, and is encouraged in residential tenancy matters, and in personal injuries matters the parties must attend a preliminary compulsory conference. Certain ADR processes are used more commonly in the resolution of particular disputes. For example, in family law contexts, mediation and conciliation are generally used because they provide the parties with flexibility in terms of process and outcome while still ensuring that the negotiations occur in a positive, structured and facilitated framework. In commercial contexts, arbitration and neutral evaluation are often used because they can provide the parties with a determination of the dispute that is factually and legally principled, but which is also private and more timely than if the parties went to court. Women, as legal personalities and citizens of society, can find themselves involved in any sort of legal dispute, and therefore all forms of ADR are relevant to women. Perhaps most commonly, however, women come into contact with facilitative ADR processes. For example, through involvement in family law disputes women will encounter family dispute resolution processes, such as mediation. In this chapter, therefore, the focus is on facilitative ADR processes and, particularly, issues for women in terms of their participation in such processes. The aim of this chapter is to provide legal practitioners with an understanding of issues for women in ADR to inform your approach to representing women clients in such processes, and to guide you in preparing women clients for their participation in ADR. The chapter begins with a consideration of the ways in which facilitative ADR processes are positive for women participants. Next, some of the disadvantages for women in ADR are explored. Finally, the chapter offers ways in which legal practitioners can effectively prepare women clients for participation in ADR. Before embarking on a discussion of issues for women in ADR, it is important to acknowledge that women’s experiences in these dispute resolution environments, whilst often sharing commonalities, are diverse and informed by a range of factors specific to each individual woman; for example, her race or socio-economic background. This discussion, therefore, addresses some common issues for women in ADR that are fundamentally gender based. It must be noted, however, that providing advice to women clients about participating in ADR processes requires legal practitioners to have a very good understanding of the client as an individual, and her particular needs and interests. Some sources of diversity are discussed in Chapters 13, 14 and 15.
Resumo:
Background Advance care planning is regarded as integral to better patient outcomes yet little is known about the prevalence of advance directives in Australia. Aims To determine the prevalence of advance directives (ADs) in the Australian population. Methods A national telephone survey about estate and advance planning. Sample was stratified by age (18-45 and >45 years) and quota sampling occurred based on population size in each State and Territory. Results Fourteen percent of the Australian population has an AD. There is State variation with people from South Australia and Queensland more likely to have an AD than people from other states. Will making and particularly completion of a financial enduring power of attorney are associated with higher rates of AD completion. Standard demographic variables were of limited use in predicting whether a person would have an AD. Conclusions Despite efforts to improve uptake of advance care planning (including ADs), barriers remain. One likely trigger for completing an AD and advance care planning is undertaking a wider future planning process (e.g. making a will or financial enduring power of attorney). This presents opportunities to increase advance care planning but steps are needed to ensure that planning which occurs outside the health system is sufficiently informed and supported by health information so that it is useful in the clinical setting. Variations by State could also suggest that redesign of regulatory frameworks (such as a user-friendly and well publicised form backed by statute) may help improve uptake of ADs.
Resumo:
Organizational change is a typical phenomenon within public sector agencies in OECD countries. An increasing number of studies in the literature examine the implementation of change and its resulting impact on the work attitudes of public sector employees; however, little is known about the extent to which change management processes impact on employees’ work attitudes. This study aims to address this issue by developing a path model underpinned by change management and public service motivation literature. The path model was tested on a sample of 308 managerial and non-managerial public sector employees from the U.S. The results provide further empirical evidence on the types of change initiatives on nursing work and change management processes being implemented. Public sector agencies in the sample implemented a variety of change initiatives such as downsizing, delayering and empowerment. Employees reported two change management processes: the provision of change-related information and participation in change decision making. While the results indicate that change produces change-induced stressors, change information tends to reduce stressors and, subsequently, role stress. The results also indicate that change management processes are associated with higher levels of public service motivation, which is in turn connected to higher levels of person–organization fit. Person–organization fit was found to partially mediate the relationship between public service motivation and job satisfaction in the context of change.