959 resultados para WORK ANALYSIS
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Pedagogical styles, methods, models, practices or strategies are valued for what they claim they can achieve. In recent times curriculum documents and governments have called for a range of teaching approaches to meet the variety of learner differences and allow students to make more independent decision making in physical education (Hardy and Mawer, 1999). One well known system of categorizing teaching styles is the Mosston and Ashworth’s Spectrum of Teaching Styles (2002). In Queensland, prior to 2005, no research had been conducted on the teaching styles used by teachers of Physical Education. However, many teachers self-reported that they employed a variety of teaching styles depending on the aims and content of the material to be taught (Cothran, et al., 2005). This research, for the first time, collected teacher’s self-reported use of teaching styles and through observations verify the styles that were being used to teach Senior Physical Education in Queensland. More specifically the aims of the research were to determine: a) What teaching styles teachers of Senior Physical Education in Queensland believe they use? i) Were they using a range of teaching styles? ii) Were teachers of Senior Physical Education in Queensland using teaching styles that the Queensland Senior Physical Education Syllabus (2004) required? b) If Mosston and Ashworth’s (2002) Spectrum of Teaching Styles were used to categorise styles observed during the teaching of Senior Physical Education did the styles being used provide opportunities for evaluating as described by the Queensland Senior Physical Education Syllabus (2004)? The research was conducted in two phases. Part A involved use of a questionnaire to determine the teaching styles Queensland teachers of Senior Physical Education reported using and how often they reported using them. The questionnaire was administered to 110 teachers throughout Queensland. The sample was determined from 346 schools teaching Senior Physical Education (in 2006) across the state of Queensland, Australia. 286 questionnaires were sent to 77 non-randomised schools. There were 66 male and 44 female respondents in the sample. A wide range of teaching styles were reportedly used by teachers of Senior Physical Education with Practice Style-Style B, Command Style-Style A and Divergent Discovery Style-Style H, the most reportedly used. The Self-Teaching Style-Style K was reportedly used the least by teachers involved in this study. From the respondents a group of teachers were identified to form the participants for Part B. Part B of the study involved observation of a group of volunteer participants (from those who had completed the questionnaire) who displayed many of the ‘typical’ characteristics, and a cross-section of backgrounds, of teachers of Senior Physical Education in Queensland. In the case of this study, the criteria used to select the group of teachers to be observed teaching were, teaching experience (number of years: 0-4, 5-10 and 11 years and over), gender, geographical location of schools (focused on Brisbane and near area for travel/access purposes), profile of the students at schools (girls, boys or co-educational), nature of school (Government or Private) and the physical activities being taught in a school (activities to reflect all the areas of physical activity outlined within the syllabus). A total of 27 questionnaire respondents from Part A indicated that they were willing to be observed teaching practical lessons. The respondents who volunteered to be involved in Part B of the study came from different regions across the state of Queensland and was not confined to the Brisbane metropolitan area or large cities. From the group of people who volunteered for Part B four came from outside Brisbane and 23 from the Brisbane area. The final observation group of nine participants included eight teachers from the Brisbane area and one from a rural area. The characteristics of the final group included three females and six males from private and public schools with a range of teaching experience in years and a range of physical activities. Four year 12 and five year 11 teachers and their classes were videoed on three occasions as they progressed through an eight – nine week unit of work. This resulted in 24 hours 48 minutes and 20 seconds (or 4465 observations) of video teaching data which was subsequently coded by several researchers (99% interobserver reliability) to determine the teaching styles employed by the participants. This research indicated that, based on Mosston and Ashworth’s (2002) Spectrum of Teaching Styles, teachers of Senior Physical Education in Queensland used predominantly one style to teach 27 observed lessons. This is in sharp contrast to the variety of styles 110 teachers self- reportedly used and in spite of the Queensland Senior Physical Education Syllabus (2004) suggesting a range of specific styles be used. These results are discussed in the context of the Queensland Senior Physical Education Syllabus (2004), teacher knowledge of teaching styles and high-stakes curriculum and external pressures such as national testing and the publication of data from schools in tabloid newspapers. The data and findings in this research provide a rationale for improving teacher knowledge regarding teaching styles and the need for a clear definition of terminology in syllabus documents. Careful examination of the effects that the publishing of school data may have on teaching styles is advised. This research not only collected teacher’s perceptions of the teaching styles they believed they used it also verified these claims through direct observations of the teachers while teaching. These findings are relevant to syllabus writers, teacher educators, policy makers within education and teachers.
Resumo:
This paper offers an analysis of the character animation in Tangled to develop a deeper understanding of how Disney has approached the extension of their traditional aesthetic into the CG medium.
Resumo:
BACKGROUND: Epidemiologic research has demonstrated that cutaneous markers of photo-damage are associated with risk of basal cell carcinoma (BCC). However there has been no previous attempt to calculate pooled risk estimates. METHODS: We conducted a systematic review and meta-analysis after extracting relevant studies published up to January 2013 from five electronic databases. Eligible studies were those that permitted quantitative assessment of the association between histologically-confirmed BCC and actinic keratoses, solar elastosis, solar lentigines, or telangiectasia. RESULTS: Seven eligible studies were identified and summary odds ratios (OR) were calculated using both random and quality effects models. Having more than ten actinic keratoses was most strongly associated with BCC, conferring up to a 5-fold increase in risk (OR: 4.97; 95% CI: 3.26, 7.58). Other factors, including solar elastosis, solar lentigines, and telangiectasia had weaker but positive associations with BCC with ORs around 1.5. CONCLUSIONS: Markers of chronic photo-damage are positively associated with BCC. The presence of actinic keratoses was the most strongly associated with BCC of the markers examined. IMPACT: This work highlights the relatively modest association between markers of chronic ultraviolet exposure and BCC.
Resumo:
Globalised communication in society today is characterised by multimodal forms of meaning making in the context of increased cultural and linguistic diversity. This research paper responds to these imperatives, applying Halliday's (1978, 1994) categories of systemic functional linguistics - representational or ideational, interactive or interpersonal, and compositional or textual meanings. Following the work of Kress (2000), van Leeuwen (Kress and van Leeuwen, 1996), and Jewitt (2006), multimodal semiotic analysis is applied to claymation movies that were collaboratively designed by Year 6 students. The significance of this analysis is the metalanguage for textual work in the kineikonic mode - moving images.
Resumo:
BACKGROUND: The treatment for deep surgical site infection (SSI) following primary total hip arthroplasty (THA) varies internationally and it is at present unclear which treatment approaches are used in Australia. The aim of this study is to identify current treatment approaches in Queensland, Australia, show success rates and quantify the costs of different treatments. METHODS: Data for patients undergoing primary THA and treatment for infection between January 2006 and December 2009 in Queensland hospitals were extracted from routinely used hospital databases. Records were linked with pathology information to confirm positive organisms. Diagnosis and treatment of infection was determined using ICD-10-AM and ACHI codes, respectively. Treatment costs were estimated based on AR-DRG cost accounting codes assigned to each patient hospital episode. RESULTS: A total of n=114 patients with deep surgical site infection were identified. The majority of patients (74%) were first treated with debridement, antibiotics and implant retention (DAIR), which was successful in eradicating the infection in 60.3% of patients with an average cost of $13,187. The remaining first treatments were 1-stage revision, successful in 89.7% with average costs of $27,006, and 2-stage revisions, successful in 92.9% of cases with average costs of $42,772. Multiple treatments following 'failed DAIR' cost on average $29,560, for failed 1-stage revision were $24,357, for failed 2-stage revision were $70,381 and were $23,805 for excision arthroplasty. CONCLUSIONS: As treatment costs in Australia are high primary prevention is important and the economics of competing treatment choices should be carefully considered. These currently vary greatly across international settings.
Resumo:
Purpose – This paper aims to provide insights into the moral values embodied by a popular social networking site (SNS), Facebook. Design/methodology/approach – This study is based upon qualitative fieldwork, involving participant observation, conducted over a two-year period. The authors adopt the position that technology as well as humans has a moral character in order to disclose ethical concerns that are not transparent to users of the site. Findings – Much research on the ethics of information systems has focused on the way that people deploy particular technologies, and the consequences arising, with a view to making policy recommendations and ethical interventions. By focusing on technology as a moral actor with reach across and beyond the internet, the authors reveal the complex and diffuse nature of ethical responsibility and the consequent implications for governance of SNS. Research limitations/implications – The authors situate their research in a body of work known as disclosive ethics, and argue for an ongoing process of evaluating SNS to reveal their moral importance. Along with that of other authors in the genre, this work is largely descriptive, but the paper engages with prior research by Brey and Introna to highlight the scope for theory development. Practical implications – Governance measures that require the developers of social networking sites to revise their designs fail to address the diffuse nature of ethical responsibility in this case. Such technologies need to be opened up to scrutiny on a regular basis to increase public awareness of the issues and thereby disclose concerns to a wider audience. The authors suggest that there is value in studying the development and use of these technologies in their infancy, or if established, in the experiences of novice users. Furthermore, flash points in technological trajectories can prove useful sites of investigation. Originality/value – Existing research on social networking sites either fails to address ethical concerns head on or adopts a tool view of the technologies so that the focus is on the ethical behaviour of users. The authors focus upon the agency, and hence the moral character, of technology to show both the possibilities for, and limitations of, ethical interventions in such cases.
Resumo:
A range of authors from the risk management, crisis management, and crisis communications literature have proposed different models as a means of understanding components of crisis. A generic component of these sources has focused on preparedness practices before disturbance events and response practices during events. This paper provides a critical analysis of three key explanatory models of how crises escalate highlighting the strengths and limitations of each approach. The paper introduces an optimised conceptual model utilising components from the previous work under the four phases of pre-event, response, recovery, and post-event. Within these four phases, a ten step process is introduced that can enhance understanding of the progression of distinct stages of disturbance for different types of events. This crisis evolution framework is examined as a means to provide clarity and applicability to a range of infrastructure failure contexts and provide a path for further empirical investigation in this area.
Resumo:
In this study we develop a theorization of an Internet dating site as a cultural artifact. The site, Gaydar, is targeted at gay men. We argue that contemporary received representations of their sexuality figure heavily in the site’s focus by providing a cultural logic for the apparent ad hoc development trajectories of its varied commercial and non-‐commercial services. More specifically, we suggest that the growing sets of services related to the website are heavily enmeshed within current social practices and meanings. These practices and meanings are, in turn, shaped by the interactions and preferences of a variety of diverse groups involved in what is routinely seen within the mainstream literature as a singularly specific sexuality and cultural project. Thus, we attend to two areas – the influence of the various social engagements associated with Gaydar together with the further extension of its trajectory ‘beyond the web’. Through the case of Gaydar, we contribute a study that recognizes the need for attention to sexuality in information systems research and one which illustrates sexuality as a pivotal aspect of culture. We also draw from anthropology to theorize ICTs as cultural artifacts and provide insights into the contemporary phenomena of ICT enabled social networking.
Resumo:
The objective of this work is to determine the thermal stability and vibrational spectra of datolite CaBSiO4(OH) and relate these properties to the structure of the mineral. The thermal analysis of datolite shows a mass loss of 5.83% over a 700–775 °C temperature range. This mass loss corresponds to 1 water (H2O) molecules pfu. A quantitative chemical analysis using electron probe was undertaken. The Raman spectrum of datolite is characterized by bands at 917 and 1077 cm−1 assigned to the symmetric stretching modes of BO and SiO tetrahedra. A very intense Raman band is observed at 3498 cm−1 assigned to the stretching vibration of the OH units in the structure of datolite. BOH out-of-plane vibrations are characterized by the infrared band at 782 cm−1. The vibrational spectra are based upon the structure of datolite based on sheets of four- and eight-membered rings of alternating SiO4 and BO3(OH) tetrahedra with the sheets bonded together by calcium atoms.
Resumo:
Now in its ninth edition, Australian Tax Analysis: Cases, Commentary, Commercial Applications and Questions has a proven track record as a high-level work for students of taxation law written by a team of authors with many years experience. Taking into account the fact that the volume of material needed to be processed by today’s taxation student can be overwhelming, the well-chosen extracts and thought-provoking commentary in Australian Tax Analysis, 9th edition, provide readers with the depth of knowledge, and reasoning and analytical skills which will be required of them as practitioners. In addition to the carefully selected case extracts and the helpful commentary, each chapter is supplemented by engaging practice questions involving problem solving, commercial decision-making, legal analysis and quantitative application. All these elements combined make Australian Tax Analysis an invaluable aid to the understanding of a subject which can be both technical and complex.
Resumo:
We introduce the use of Ingenuity Pathway Analysis to analyzing global metabonomics in order to characterize phenotypically biochemical perturbations and the potential mechanisms of the gentamicin-induced toxicity in multiple organs. A single dose of gentamicin was administered to Sprague Dawley rats (200 mg/kg, n = 6) and urine samples were collected at -24-0 h pre-dosage, 0-24, 24-48, 48-72 and 72-96 h post-dosage of gentamicin. The urine metabonomics analysis was performed by UPLC/MS, and the mass spectra signals of the detected metabolites were systematically deconvoluted and analyzed by pattern recognition analyses (Heatmap, PCA and PLS-DA), revealing a time-dependency of the biochemical perturbations induced by gentamicin toxicity. As result, the holistic metabolome change induced by gentamicin toxicity in the animal's organisms was characterized. Several metabolites involved in amino acid metabolism were identified in urine, and it was confirmed that gentamicin biochemical perturbations can be foreseen from these biomarkers. Notoriously, it was found that gentamicin induced toxicity in multiple organs system in the laboratory rats. The proof-of-knowledge based Ingenuity Pathway Analysis revealed gentamicin induced liver and heart toxicity, along with the previously known toxicity in kidney. The metabolites creatine, nicotinic acid, prostaglandin E2, and cholic acid were identified and validated as phenotypic biomarkers of gentamicin induced toxicity. Altogether, the significance of the use of metabonomics analyses in the assessment of drug toxicity is highlighted once more; furthermore, this work demonstrated the powerful predictive potential of the Ingenuity Pathway Analysis to study of drug toxicity and its valuable complementation for metabonomics based assessment of the drug toxicity.
Resumo:
Most individuals have more than one job or occupation in their working lives. Most employees are repeatedly faced with the choice of whether to remain in their present job (with the possibility of promotion), or quit to another job in the same occupation with a different firm, or - more radically change occupation. At each stage in an individual's career, the scope for future job or occupational mobility is largely conditioned by the type and quantity of their human capital. This paper presents an empirical study of the factors which link occupational mobility and the acquisition of either firm-based, occupation-specific or general human capital. The data employed are from a cohort of 1980 UK graduates drawn from the Department of Employment Survey 1987. The econometric work presents estimates of the role of firm-based training and occupation-specific training in the career mobility of qualified manpower in the first seven years in the labour market
Resumo:
Objective: To calculate pooled risk estimates of the association between pigmentary characteristics and basal cell carcinoma (BCC) of the skin. Methods: We searched three electronic databases and reviewed the reference lists of the retrieved articles until July 2012 to identify eligible epidemiologic studies. Eligible studies were those published in between 1965 and July 2012 that permitted quantitative assessment of the association between histologically-confirmed BCC and any of the following characteristics: hair colour, eye colour, skin colour, skin phototype, tanning and burning ability, and presence of freckling or melanocytic nevi. We included 29 studies from 2236 initially identified. We calculated summary odds ratios (ORs) using weighted averages of the log OR, using random effects models. Results: We found strongest associations with red hair (OR 2.02; 95% CI: 1.68, 2.44), fair skin colour (OR 2.11; 95% CI: 1.56, 2.86), and having skin that burns and never tans (OR 2.03; 95% CI: 1.73, 2.38). All other factors had weaker but positive associations with BCC, with the exception of freckling of the face in adulthood which showed no association. Conclusions: Although most studies report risk estimates that are in the same direction, there is significant heterogeneity in the size of the estimates. The associations were quite modest and remarkably similar, with ORs between about 1.5 and 2.5 for the highest risk level for each factor. Given the public health impact of BCC, this meta-analysis will make a valuable contribution to our understanding of BCC.