968 resultados para Standard Insurance Company.
Resumo:
We have tested a methodology for the elimination of the selectable marker gene after Agrobacterium-mediated transformation of barley. This involves segregation of the selectable marker gene away from the gene of interest following co-transformation using a plasmid carrying two T-DNAs, which were located adjacent to each other with no intervening region. A standard binary transformation vector was modified by insertion of a small section composed of an additional left and right T-DNA border, so that the selectable marker gene and the site for insertion of the gene of interest (GOI) were each flanked by a left and right border. Using this vector three different GOIs were transformed into barley. Analysis of transgene inheritance was facilitated by a novel and rapid assay utilizing PCR amplification from macerated leaf tissue. Co-insertion was observed in two thirds of transformants, and among these approximately one quarter had transgene inserts which segregated in the next generation to yield selectable marker-free transgenic plants. Insertion of non-T-DNA plasmid sequences was observed in only one of fourteen SMF lines tested. This technique thus provides a workable system for generating transgenic barley free from selectable marker genes, thereby obviating public concerns regarding proliferation of these genes.
Resumo:
Irradiance profile around the receiver tube (RT) of a parabolic trough collector (PTC) is a key effect of optical performance that affects the overall energy performance of the collector. Thermal performance evaluation of the RT relies on the appropriate determination of the irradiance profile. This article explains a technique in which empirical equations were developed to calculate the local irradiance as a function of angular location of the RT of a standard PTC using a vigorously verified Monte Carlo ray tracing model. A large range of test conditions including daily normal insolation, spectral selective coatings and glass envelop conditions were selected from the published data by Dudley et al. [1] for the job. The R2 values of the equations are excellent that vary in between 0.9857 and 0.9999. Therefore, these equations can be used confidently to produce realistic non-uniform boundary heat flux profile around the RT at normal incidence for conjugate heat transfer analyses of the collector. Required values in the equations are daily normal insolation, and the spectral selective properties of the collector components. Since the equations are polynomial functions, data processing software can be employed to calculate the flux profile very easily and quickly. The ultimate goal of this research is to make the concentrating solar power technology cost competitive with conventional energy technology facilitating its ongoing research.
Resumo:
Occupational exposures of healthcare workers tend to occur because of inconsistent compliance with standard precautions. Also, incidence of occupational exposure is underreported among operating room personnel. The purpose of this project was to develop national estimates for compliance with standard precautions and occupational exposure reporting practices among operating room nurses in Australia. Data was obtained utilizing a 96-item self-report survey. The Standard Precautions and Occupational Exposure Reporting survey was distributed anonymously to 500 members of the Australian College of Operating Room Nurses. The Health Belief Model was the theoretical framework used to guide the analysis of data. Data was analysed to examine relationships between specific constructs of the Health Belief Model to identify factors that might influence the operating room nurse to undertake particular health behaviours to comply with standard precautions and occupational exposure reporting. Results of the study revealed compliance rates of 55.6% with double gloving, 59.1% with announcing sharps transfers, 71.9% with using a hands-free sharps pass technique, 81.9% with no needle recapping and 92.0% with adequate eye protection. Although 31.6% of respondents indicated receiving an occupational exposure in the past 12 months, only 82.6% of them reported their exposures. The results of this study provide national estimates of compliance with standard precautions and occupational exposure reporting among operating room nurses in Australia. These estimates can now be used as support for the development and implementation of measures to improve practices in order to reduce occupational exposures and, ultimately, disease transmission rates among this high-risk group.
Resumo:
Background Occupational exposures of health care workers occur because of inconsistent compliance with standard precautions. The purpose of this study was to develop national estimates of compliance with standard precautions and occupational exposure reporting among operating room nurses (specifically, scrub nurses) in Australia and to assess variables that influence compliance. Methods A descriptive correlation design was used to investigate relationships between variables and compliance, using a theoretical framework, the Health Belief Model, to give meaning to the variables. Data collection was done through mail-out surveys to members of the Australian College of Operating Room Nurses. Results This article reports the results of compliance with the following 2 specific self-protective behaviors: double-gloving and wearing adequate eye protection. Mean compliance rates were 55.6% with always double-gloving during surgical procedures and 92% with always wearing adequate eye protection. In addition, the variable that had the most influence on compliance was the perception of barriers to compliance, specifically, that adhering to standard precautions interfered with duties. Conclusion These results have implications for the development of multifaceted perioperative infection control programs, including strategies for prevention, education, and policy development, to improve practices aimed at reducing occupational exposures among this high-risk group.
Resumo:
"The National Disability Insurance Scheme (NDIS) was launched on 1 July 2013. The NDIS Act 2013 is an historic piece of legislation that is the foundation for a national scheme which will deliver meaningful change for people with disabilities across Australia. The NDIS seeks to support the independence and social and economic participation of people with a disability, mainly by funding the provision of reasonable and necessary supports, including early intervention supports. The NDIS establishes three main criteria for access to the scheme - age, residence and disability. The National Disability Insurance Scheme Handbook written by Bill Madden, Janine McIlwraith and Ruanne Brell examines the NDIS from the viewpoint of a person seeking to access the NDIS and those advising or assisting them. The three key criteria are examined, along with the powers of the NDIS Chief Executive Officer and the scope for review of adverse decisions. The important area of interplay between the NDIS and compensation entitlements is carefully scrutinised. This handbook provides scheme users, carers, lawyers and health practitioners with an easy to understand guide to this watershed legal development."--Publisher website
Resumo:
"in a world which is experiencing unprecedented deforestation and widespread global environmental threats there is something intuitively right about planting a tree" (Future Forests (Fiji) Limited) The above quote demonstrates that even in the wake of global environmental crisis that hope still remains and that humans can still control their destiny. This opportunity to effect positive environmental change is one of the main aims of the South Pacific Stock Exchange’s (SPSE) most recent publicly listed company: Future Forest (Fiji) Limited. Incorporated in 2004 and listed on SPSE in 2011, the company is Fiji’s first large-scale commercial hardwood forest plantation and nursery. Future Forest (FF) is the only company listed on the SPSE with biological assets or “living assets.” The accounting standard for biological assets is IAS 41: Agriculture. This standard prescribes the use of fair value as the basis of valuation. While a more relevant method of valuation, the application of fair value accounting can be more costly and burdensome for companies in developing economies (White 2008). In line with the journal’s theme of agriculture, this article explores the issues, challenges and potential benefits involved in applying fair value accounting for biological assets in a developing economy such as Fiji using the case of Future Forest (Fiji) Limited.
Resumo:
We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in the construction is a family of lattices for which there are two distinct trapdoors for finding short vectors. One trapdoor enables the real system to generate short vectors in all lattices in the family. The other trapdoor enables the simulator to generate short vectors for all lattices in the family except for one. We extend this basic technique to an adaptively-secure IBE and a Hierarchical IBE.
Resumo:
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
Most existing marinas are boat parking/storing and servicing facilities that have been built over a long period of time for the convenience of local boat owners.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
Parabolic trough concentrator collector is the most matured, proven and widespread technology for the exploitation of the solar energy on a large scale for middle temperature applications. The assessment of the opportunities and the possibilities of the collector system are relied on its optical performance. A reliable Monte Carlo ray tracing model of a parabolic trough collector is developed by using Zemax software. The optical performance of an ideal collector depends on the solar spectral distribution and the sunshape, and the spectral selectivity of the associated components. Therefore, each step of the model, including the spectral distribution of the solar energy, trough reflectance, glazing anti-reflection coating and the absorber selective coating is explained and verified. Radiation flux distribution around the receiver, and the optical efficiency are two basic aspects of optical simulation are calculated using the model, and verified with widely accepted analytical profile and measured values respectively. Reasonably very good agreement is obtained. Further investigations are carried out to analyse the characteristics of radiation distribution around the receiver tube at different insolation, envelop conditions, and selective coating on the receiver; and the impact of scattered light from the receiver surface on the efficiency. However, the model has the capability to analyse the optical performance at variable sunshape, tracking error, collector imperfections including absorber misalignment with focal line and de-focal effect of the absorber, different rim angles, and geometric concentrations. The current optical model can play a significant role in understanding the optical aspects of a trough collector, and can be employed to extract useful information on the optical performance. In the long run, this optical model will pave the way for the construction of low cost standalone photovoltaic and thermal hybrid collector in Australia for small scale domestic hot water and electricity production.
Resumo:
NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized by IEEE, but until recently, its security analysis relied only on heuristic arguments. Recently, Stehlé and Steinfeld showed that a slight variant (that we call pNE) could be proven to be secure under chosen-plaintext attack (IND-CPA), assuming the hardness of worst-case problems in ideal lattices. We present a variant of pNE called NTRUCCA, that is IND-CCA2 secure in the standard model assuming the hardness of worst-case problems in ideal lattices, and only incurs a constant factor overhead in ciphertext and key length over the pNE scheme. To our knowledge, our result gives the first IND-CCA2 secure variant of NTRUEncrypt in the standard model, based on standard cryptographic assumptions. As an intermediate step, we present a construction for an All-But-One (ABO) lossy trapdoor function from pNE, which may be of independent interest. Our scheme uses the lossy trapdoor function framework of Peikert and Waters, which we generalize to the case of (k − 1)-of-k-correlated input distributions.
Resumo:
Standard Monte Carlo (sMC) simulation models have been widely used in AEC industry research to address system uncertainties. Although the benefits of probabilistic simulation analyses over deterministic methods are well documented, the sMC simulation technique is quite sensitive to the probability distributions of the input variables. This phenomenon becomes highly pronounced when the region of interest within the joint probability distribution (a function of the input variables) is small. In such cases, the standard Monte Carlo approach is often impractical from a computational standpoint. In this paper, a comparative analysis of standard Monte Carlo simulation to Markov Chain Monte Carlo with subset simulation (MCMC/ss) is presented. The MCMC/ss technique constitutes a more complex simulation method (relative to sMC), wherein a structured sampling algorithm is employed in place of completely randomized sampling. Consequently, gains in computational efficiency can be made. The two simulation methods are compared via theoretical case studies.