880 resultados para Network security constraints


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Castells argues that society is being reconstituted according to the global logic of networks. This paper discusses the ways in which a globalised network logic transforms the nature young people's transitions from school to work. Furthermore, the paper explores the ways in which this network logic restructured the manner in which youth transitions are managed via the emergence of a Vocational Education and Training (VET) agenda in Australian post compulsory secondary schooling. It also notes the implications of the emergence of the 'network society' for locality generally and for selected localities specific to the research upon which this paper is based. It suggests that schools represent nodes in a range of VET and other networks, and shows how schools and other agencies in particular localities mobilise their expertise to construct such networks. These networks are networked, funded and regulated at various levels - regionally, nationally and globally. But, they are also facilitated by personal networking opportunities and capacities. The paper also points to the ways in which the 'reflexivity chances' of young people are shaped by this network logic - a situation that generates new forms of responsibility, for schools and teachers, with regard to the management of youth transitions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While young women have been found to be at additional risk for psychological morbidity after a breast cancer diagnosis, their specific needs in relation to support are not well described. A community development approach was utilized to develop the Young Women's Network, a peer support programme for young women who have been diagnosed with breast cancer that addresses their specific psychological and social needs, Central to this approach was the key role of the target group in both the definition of the problem and the generation of the solutions. This article describes the steps involved in developing this programme and guidelines for health professionals and community members who may wish to replicate either the Young Women's Network or this particular approach to programme development. Copyright (C), 2001 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evidence suggests that women who are mothers of young children have lower levels of physical activity than women of similar age who do not have children (Brown, Lee, Mishra, & Bauman, 2000). The purposes of this study were to explore the factors that constrain mothers of young children from being more physically active, and the relationship between physical activity and levels of social support available to the women. The empirical basis for this examination was provided through a study of activity levels and barriers to physical activity experienced by a sample of 543 mothers of young children from differing socioeconomic backgrounds. The data indicate that: (a) more than two-thirds of the mothers were inadequately active in their leisure time for health benefit; (b) while the vast majority of mothers expressed a desire to be more active, they were inhibited in their ability to act out their leisure preferences by a combination of structural (e.g., lack of time, money, energy) and ideological influences (e.g., sense of commitment to others); (c) access to social support (from partners, family, and friends) was seen to place some women in a better position than others to negotiate constraints that inhibit leisure participation; and (d) within groups of varying socioeconomic status (SES) there was wide variation in the amount of time spent each week in active leisure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we consider whether the behaviour of the neural circuitry that controls lower limb movements in humans is shaped primarily by the spatiotemporal characteristics of bipedal gait patterns, or by selective pressures that are sensitive to considerations of balance and energetics. During the course of normal locomotion, the full dynamics of the neural circuitry are masked by the inertial properties of the limbs. In the present study, participants executed bipedal movements in conditions in which their feet were either unloaded or subject to additional inertial loads. Two patterns of rhythmic coordination were examined. In the in-phase mode, participants were required to flex their ankles and extend their ankles in synchrony. In the out-of-phase mode, the participants flexed one ankle while extending the other and vice versa. The frequency of movement was increased systematically throughout each experimental trial. All participants were able to maintain both the in-phase and the out-of-phase mode of coordination, to the point at which they could no longer increase their frequency of movement. Transitions between the two modes were not observed, and the stability of the out-of-phase and in-phase modes of coordination was equivalent at all movement frequencies. These findings indicate that, in humans, the behaviour of the neural circuitry underlying coordinated movements of the lower limbs is not constrained strongly by the spatiotemporal symmetries of bipedal gait patterns.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The summit meeting between the two Korean heads of state, which took place in Pyongyang in June 2000, constitutes a major turning point in the peninsula's history. As the effects of the meeting are gradually unfolding, a period of detente no longer seems impossible. But major difficulties remain unsolved and Korea will continue to be one of the world's most volatile areas. The task of this essay is to identify and analyse some of the entrenched political patterns that will challenge policy-makers in the years ahead. To do so it is necessary to portray the conflict in Korea not only in conventional ideological and geopolitical terms, but also, and primarily, as a question of identity. From such a vantage-point two components are essential in the search for a more peaceful peninsula. Substantial progress has recently been made in the first realm, the need to approach security problems, no matter how volatile they seem. in a cooperative and dialogical, rather than merely a coercive manner. The second less accepted but perhaps more important factor, revolves around the necessity to recognize that dialogue has its limits, that the party on the other side of the DMZ cannot always be accommodated or subsumed into compromise. Needed is an ethics of difference: a willingness to accept that the other's sense of identity and politics may be inherently incompatible with one's own.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reviews the book 'Asia Pacific Security Outlook 2000,' edited by Richard W. Baker and Charles M. Morrison.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A pilot telemedicine network was established in 11 sites using funding provided by the Department of Trade and Industry in the UK. The main purpose of the project was to develop and evaluate clinical and educational links between central and peripheral sites in Scotland, The results were very encouraging, and clinical services were established in accident and emergency medicine, tele-ultrasound and clinical psychology. An undergraduate medical teaching service was also successfully established. All of these services are to be continued after the completion of the project. Many lessons were learned during the establishment of this network which will be useful in future projects. These included the importance of training for telemedicine users, the importance of identifying a telemedicine champion, the pitfall of health economics and the fact that services must be needs driven.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the design and development of a dividing/phasing network for a compact switched-beam array antenna for Land-vehicle mobile satellite communications, The device is formed by a switched radial divider/combiner and 1-bit phase shifters and generates a sufficient number of beams for the proper satellite tracking.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vesicular carriers for intracellular transport associate with unique sets of accessory molecules that dictate budding and docking on specific membrane domains. Although many of these accessory molecules are peripheral membrane proteins, in most cases the targeting sequences responsible for their membrane recruitment have yet to be identified. We have previously defined a novel Golgi targeting domain (GRIP) shared by a family of coiled-coil peripheral membrane Golgi proteins implicated in membrane trafficking. We show here that the docking site for the GRIP motif of p230 is a specific domain of Golgi. membranes. By immunoelectron microscopy of HeLa cells stably expressing a green fluorescent protein (GFP)-p230(GRIP) fusion protein, we show binding specifically to a subset of membranes of the trans-Golgi network (TGN). Real-time imaging of live HeLa cells revealed that the GFP-p230(GRIP) was associated with highly dynamic tubular extensions of the TGN, which have the appearance and behaviour of transport carriers. To further define the nature of the GRIP membrane binding site, in vitro budding assays were performed using purified rat liver Golgi membranes and cytosol from GFP-p230(GRIP) transfected cells. Analysis of Golgi-derived vesicles by sucrose gradient fractionation demonstrated that GFP-p230(GRIP) binds to a specific population of vesicles distinct from those labelled for beta -COP or gamma -adaptin. The GFP-p230(GRIP) fusion protein is recruited to the same vesicle population as full-length p230, demonstrating that the GRIP domain is solely proficient as a targeting signal for membrane binding of the native molecule. Therefore, p230 GRIP is a targeting signal for recruitment to a highly selective membrane attachment site on a specific population of trans-Golgi network tubulovesicular carriers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Applied econometricians often fail to impose economic regularity constraints in the exact form economic theory prescribes. We show how the Singular Value Decomposition (SVD) Theorem and Markov Chain Monte Carlo (MCMC) methods can be used to rigorously impose time- and firm-varying equality and inequality constraints. To illustrate the technique we estimate a system of translog input demand functions subject to all the constraints implied by economic theory, including observation-varying symmetry and concavity constraints. Results are presented in the form of characteristics of the estimated posterior distributions of functions of the parameters. Copyright (C) 2001 John Wiley Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.