971 resultados para master secret key leakage
Resumo:
The Anti-Counterfeiting Trade Agreement (ACTA) 2011 - Twitter hashtag #ACTA - is a controversial trade agreement designed to provide for stronger enforcement of intellectual property rights.
Resumo:
Road agencies face growing pressure to respond to a range of issues associated with climate change and the reliance on fossil fuels. A key part of this response will be to reduce the dependency on fossil fuel based energy (and the associated greenhouse gas emissions) of transport, both vehicles and infrastructure. This paper presents findings of investigations into three key areas of innovative technologies and processes, namely the inclusion of onsite renewable energy generation technologies as part of road and transport infrastructure, the potential for automated motorways to reduce traffic fuel consumption (referred to as 'Smart Roads'), and the reduction of energy demand from route and signal lighting. The paper then concludes with the recommendation for the engineering profession to embrace sustainability performance assessment and rating tools as the basis for enhancing and communicating the contribution to Australia's response to climate change. Such tools provide a rigorous structure that can standardise approaches to key issues across entire sectors and provide clarity on the evidence required to demonstrate leading performance. The paper has been developed with funding and support provided by Australia's Sustainable Built Environment National Research Centre (SBEnrc), working with partners including Main Roads Western Australia, NSW Roads and Maritime Services, Queensland Department of Transport and Main Roads, John Holland Group, the Infrastructure Sustainability Council of Australia, Roads Australia, and the CRC for Low Carbon Living.
Resumo:
The koala (Phascolarctos cinereus) is an Australian marsupial that continues to experience significant population declines. Infectious diseases caused by pathogens such as Chlamydia are proposed to have a major role. Very few species-specific immunological reagents are available, severely hindering our ability to respond to the threat of infectious diseases in the koala. In this study, we utilise data from the sequencing of the koala transcriptome to identify key immunological markers of the koala adaptive immune response and cytokines known to be important in the host response to chlamydial infection in other species. This report describes the identification and preliminary sequence analysis of (1) T lymphocyte glycoprotein markers (CD4, CD8); (2) IL-4, a marker for the Th2 response; (3) cytokines such as IL-6, IL-12 and IL-1β, that have been shown to have a role in chlamydial clearance and pathology in other hosts; and (4) the sequences for the koala immunoglobulins, IgA, IgG, IgE and IgM. These sequences will enable the development of a range of immunological reagents for understanding the koala’s innate and adaptive immune responses, while also providing a resource that will enable continued investigations into the origin and evolution of the marsupial immune system.
Resumo:
AIMS: To examine changes in illicit drug consumption between peak holiday season (23 December-3 January) in Australia and a control period two months later in a coastal urban area, an inland semi-rural area and an island populated predominantly by vacationers during holidays. DESIGN: Analysis of representative daily composite wastewater samples collected from the inlet of the major wastewater treatment plant in each area. SETTING: Three wastewater treatment plants. PARTICIPANTS: Wastewater treatment plants serviced approximately 350, 000 persons in the urban area, 120,000 in the semi-rural area and 1100-2400 on the island. MEASUREMENTS: Drug residues were analysed using liquid chromatography coupled to a tandem mass spectrometer. Per capita drug consumption was estimated. Changes in drug use were quantified using Hedges' g. FINDINGS: During the holidays, cannabis consumption in the semi-rural area declined (g = -2.8) as did methamphetamine (-0.8), whereas cocaine (+1.5) and ecstasy (+1.6) use increased. In the urban area, consumption of all drugs increased during holidays (cannabis +1.6, cocaine +1.2, ecstasy +0.8 and methamphetamine +0.3). In the vacation area, methamphetamine (+0.7), ecstasy (+0.7) and cocaine (+1.1) use increased, but cannabis (-0.5) use decreased during holiday periods. CONCLUSIONS: While the peak holiday season in Australia is perceived as a period of increased drug use, this is not uniform across all drugs and areas. Substantial declines in drug use in the semi-rural area contrasted with substantial increases in urban and vacation areas. Per capita drug consumption in the vacation area was equivalent to that in the urban area, implying that these locations merit particular attention for drug use monitoring and harm minimisation measures.
Resumo:
Introduction and Aims: Holiday periods are potentially a time for increased substance use as social events and private parties are more common. Data on community illicit drug consumption during holiday periods are limited. Besides existing methods for determining drug use, such as population surveys, one emerging method is to measure illicit drugs and/or their metabolites in wastewater samples. This study examined the change in consumption of cannabis, methamphetamine, cocaine and 3,4- methylenedioxymethamphetamine in three different types of areas (an inland semi-rural area, a coastal urban area and a vacation island) with respect to holiday times. Design and Methods: Samples were collected at the inlet of the major wastewater treatment plant in each area during a key annual holiday (i.e. the summer holiday including Christmas and New Year) and control period. Illicit drug residues in the daily composited samples were measured by liquid chromatography coupled with tandem mass spectrometry. Results: Drug use varied substantially among the three areas within each monitoring period as well as between the holiday and control period within each area. Use consistently increased and peaked over New Year particularly for cocaine and 3,4-methylenedioxymethamphetamine whereas cannabis and methamphetamine were relatively less subjected to holiday times in all the areas. Discussion and Conclusions: Wastewater sampling and analysis provides higher spatio-temporal resolution than national surveys and supplements drug epidemiology studies originating primary in metropolitan locations. Such data is essential for policy makers to plan potential intervention strategies associated with these illicit substances in regional areas and other settings besides urban areas in the future.
Resumo:
"Keeper of the Key", a song by the Australian band Dear Anonymous, was produced as part of the Indie 100 research intensive project within the Independent Music Project (IMP). The IMP is an ongoing, interdisciplinary research arm within QUT. The song's author is Georgia Hahn.
Resumo:
To gain insight into the mechanisms by which the Myb transcription factor controls normal hematopoiesis and particularly, how it contributes to leukemogenesis, we mapped the genome-wide occupancy of Myb by chromatin immunoprecipitation followed by massively parallel sequencing (ChIP-Seq) in ERMYB myeloid progenitor cells. By integrating the genome occupancy data with whole genome expression profiling data, we identified a Myb-regulated transcriptional program. Gene signatures for leukemia stem cells, normal hematopoietic stem/progenitor cells and myeloid development were overrepresented in 2368 Myb regulated genes. Of these, Myb bound directly near or within 793 genes. Myb directly activates some genes known critical in maintaining hematopoietic stem cells, such as Gfi1 and Cited2. Importantly, we also show that, despite being usually considered as a transactivator, Myb also functions to repress approximately half of its direct targets, including several key regulators of myeloid differentiation, such as Sfpi1 (also known as Pu.1), Runx1, Junb and Cebpb. Furthermore, our results demonstrate that interaction with p300, an established coactivator for Myb, is unexpectedly required for Myb-mediated transcriptional repression. We propose that the repression of the above mentioned key pro-differentiation factors may contribute essentially to Myb's ability to suppress differentiation and promote self-renewal, thus maintaining progenitor cells in an undifferentiated state and promoting leukemic transformation. © 2011 The Author(s).
Resumo:
Patents provide monopoly rights to patent holders. There are safeguards in patent regime to ensure that exclusive right of the patent holder is not misused. Compulsory licensing is one of the safeguards provided under TRIPS using which patent granting state may allow a third party to exploit the invention without patent holder’s consent upon terms and conditions decided by the government. This concept existed since 1623 and was not introduced by TRIPS for the first time. But this mechanism has undergone significant changes especially in post-TRIPS era. History of evolution of compulsory licensing is one of the least explored areas of intellectual property law. This paper undertakes an analysis of different phases in the evolution of the compulsory licensing mechanism and sheds light on reasons behind developments especially after TRIPS.
Resumo:
Protocols for secure archival storage are becoming increasingly important as the use of digital storage for sensitive documents is gaining wider practice. Wong et al.[8] combined verifiable secret sharing with proactive secret sharing without reconstruction and proposed a verifiable secret redistribution protocol for long term storage. However their protocol requires that each of the receivers is honest during redistribution. We proposed[3] an extension to their protocol wherein we relaxed the requirement that all the recipients should be honest to the condition that only a simple majority amongst the recipients need to be honest during the re(distribution) processes. Further, both of these protocols make use of Feldman's approach for achieving integrity during the (redistribution processes. In this paper, we present a revised version of our earlier protocol, and its adaptation to incorporate Pedersen's approach instead of Feldman's thereby achieving information theoretic secrecy while retaining integrity guarantees.
Resumo:
Queensland University of Technology (QUT), School of Nursing (SoN), has offered a postgraduate Graduate Certificate in Emergency Nursing since 2003, for registered nurses practising in an emergency clinical area, who fulfil key entry criteria. Feedback from industry partners and students evidenced support for flexible and extended study pathways in emergency nursing. Therefore, in the context of a growing demand for emergency health services and the need for specialist qualified staff, it was timely to review and redevelop our emergency specialist nursing courses. The QUT postgraduate emergency nursing study area is supported by a course advisory group, whose aim is to provide input and focus development of current and future course planning. All members of the course advisory were invited to form an expert panel to review current emergency course documents. A half day “brainstorm session”, planning and development workshop was held to review the emergency courses to implement changes from 2009. Results from the expert panel planning day include: proposal for a new emergency specialty unit; incorporation of the College of Emergency Nurses (CENA) Standards for Emergency Nursing Specialist in clinical assessment; modification of the present core emergency unit; enhancing the focus of the two other units that emergency students undertake; and opening the emergency study area to the Graduate Diploma in Nursing (Emergency Nursing) and Master of Nursing (Emergency Nursing). The conclusion of the brainstorm session resulted in a clearer conceptualisation, of the study pathway for students. Overall, the expert panel group of enthusiastic emergency educators and clinicians provided viable options for extending the career progression opportunities for emergency nurses. In concluding, the opportunity for collaboration across university and clinical settings has resulted in the design of a course with exciting potential and strong clinical relevance.
Resumo:
Background: Rupture of vulnerable atheromatous plaque in the carotid and coronary arteries often leads to stroke and heart attack respectively. The role of calcium deposition and its contribution to plaque stability is controversial. This study uses both an idealized and a patient-specific model to evaluate the effect of a calcium deposit on the stress distribution within an atheromatous plaque. Methods: Using a finite-element method, structural analysis was performed on an idealized plaque model and the location of a calcium deposit within it was varied. In addition to the idealized model, in vivo high-resolution MR imaging was performed on 3 patients with carotid atheroma and stress distributions were generated. The individual plaques were chosen as they had calcium at varying locations with respect to the lumen and the fibrous cap. Results: The predicted maximum stress was increased by 47.5% when the calcium deposit was located in the thin fibrous cap in the model when compared with that in a model without a deposit. The result of adding a calcium deposit either to the lipid core or remote from the lumen resulted in almost no increase in maximal stress. Conclusion: Calcification at the thin fibrous cap may result in high stress concentrations, ultimately increasing the risk of plaque rupture. Assessing the location of calcification may, in the future, aid in the risk stratification of patients with carotid stenosis.
Resumo:
The 2008 US election has been heralded as the first presidential election of the social media era, but took place at a time when social media were still in a state of comparative infancy; so much so that the most important platform was not Facebook or Twitter, but the purpose-built campaign site my.barackobama.com, which became the central vehicle for the most successful electoral fundraising campaign in American history. By 2012, the social media landscape had changed: Facebook and, to a somewhat lesser extent, Twitter are now well-established as the leading social media platforms in the United States, and were used extensively by the campaign organisations of both candidates. As third-party spaces controlled by independent commercial entities, however, their use necessarily differs from that of home-grown, party-controlled sites: from the point of view of the platform itself, a @BarackObama or @MittRomney is technically no different from any other account, except for the very high follower count and an exceptional volume of @mentions. In spite of the significant social media experience which Democrat and Republican campaign strategists had already accumulated during the 2008 campaign, therefore, the translation of such experience to the use of Facebook and Twitter in their 2012 incarnations still required a substantial amount of new work, experimentation, and evaluation. This chapter examines the Twitter strategies of the leading accounts operated by both campaign headquarters: the ‘personal’ candidate accounts @BarackObama and @MittRomney as well as @JoeBiden and @PaulRyanVP, and the campaign accounts @Obama2012 and @TeamRomney. Drawing on datasets which capture all tweets from and at these accounts during the final months of the campaign (from early September 2012 to the immediate aftermath of the election night), we reconstruct the campaigns’ approaches to using Twitter for electioneering from the quantitative and qualitative patterns of their activities, and explore the resonance which these accounts have found with the wider Twitter userbase. A particular focus of our investigation in this context will be on the tweeting styles of these accounts: the mixture of original messages, @replies, and retweets, and the level and nature of engagement with everyday Twitter followers. We will examine whether the accounts chose to respond (by @replying) to the messages of support or criticism which were directed at them, whether they retweeted any such messages (and whether there was any preferential retweeting of influential or – alternatively – demonstratively ordinary users), and/or whether they were used mainly to broadcast and disseminate prepared campaign messages. Our analysis will highlight any significant differences between the accounts we examine, trace changes in style over the course of the final campaign months, and correlate such stylistic differences with the respective electoral positioning of the candidates. Further, we examine the use of these accounts during moments of heightened attention (such as the presidential and vice-presidential debates, or in the context of controversies such as that caused by the publication of the Romney “47%” video; additional case studies may emerge over the remainder of the campaign) to explore how they were used to present or defend key talking points, and exploit or avert damage from campaign gaffes. A complementary analysis of the messages directed at the campaign accounts (in the form of @replies or retweets) will also provide further evidence for the extent to which these talking points were picked up and disseminated by the wider Twitter population. Finally, we also explore the use of external materials (links to articles, images, videos, and other content on the campaign sites themselves, in the mainstream media, or on other platforms) by the campaign accounts, and the resonance which these materials had with the wider follower base of these accounts. This provides an indication of the integration of Twitter into the overall campaigning process, by highlighting how the platform was used as a means of encouraging the viral spread of campaign propaganda (such as advertising materials) or of directing user attention towards favourable media coverage. By building on comprehensive, large datasets of Twitter activity (as of early October, our combined datasets comprise some 3.8 million tweets) which we process and analyse using custom-designed social media analytics tools, and by using our initial quantitative analysis to guide further qualitative evaluation of Twitter activity around these campaign accounts, we are able to provide an in-depth picture of the use of Twitter in political campaigning during the 2012 US election which will provide detailed new insights social media use in contemporary elections. This analysis will then also be able to serve as a touchstone for the analysis of social media use in subsequent elections, in the USA as well as in other developed nations where Twitter and other social media platforms are utilised in electioneering.
Resumo:
Literary tale of A.M. Remizov (1900’s – 1920’s) The thesis is devoted to a detailed historical-literary description of a tale as a genre tradition in the creative work of Alexei Mikhailovich Remizov (1877-1957), one of the major Russian prose writers of the 20’s century. This very approach allows to specify the place and functional meaning of this genre in literary practice of the writer and to appeal to one of the key problems of the 20-21 century literature history – a specific of modernistic literature composition principle and a role of montage techniques in its formation. Remizov was working on tales during his whole life, though the most productive years of folklore studies fell to 1900’s – 1910’s. During this period he intensively studied folklore materials, narrated several hundreds of folk tales and in 1900’s – 1920’s published eight tale collections which played a significant role in the formation of stylistic and compositional principles of his prose of the 1910’s – 1920’s, especially montage techniques, which in its turn influenced the development of the narrative forms in the Russian post-revolutionary literature. At the same time a tale has specified not only poetics but also problematics of Remizov’s creative work, as when choosing folklore sources the writer always alluded to modern themes and relevant intellectual trends. The current research work, based on various archive materials and a wide spectrum of modern historical-literary data, complies four chapters with a consistent description of creation history, publication and critics’ reviews of Remizov’s tale collections and single tales contributing to his creative evolution characteristic. Furthermore, the work refers to composition and subject of the particular collections. On the whole it enables to follow up genre dynamics. The first chapter of the work is devoted to Posolon’ (Sunwise), the earliest tale collection of Remizov. The main feature of the collection is that its composition is oriented on the agrarian calendar and the subject – on the system of mythological views reflected in the Russian folklore. This very collection to a large extent corresponds to the writer’s views on the myth represented in Pis’mo v redaktsiyu (Letter to the Editor). The history of this manifesto appearing is analyzed in the second chapter. The incident which caused its forthcoming contributed to ‘legitimization’ of Remizov’s narrations as a relevant genre of modern literature and to upgrading the writer in professional hierarchy. The third chapter analyzes Remizov’s collections of 1900’s – early 1920’s, a result of Remizov’s scrupulous work with a specific tale material. He is acting here as a tale repertory researcher and in some cases as a collector as well. The means of such collections’ topical organization is not the myth but the hero of the tale. According to this principle single pieces are grouped into cycles, which then form complicated montage constructs. Texts themselves can be viewed as a sort of hyper-quotations, as they in fact entirely coincide with their original sources. Besides, collections usually have their own ideal patterns. In the fourth chapter a connection of Remizov’s creative work with folk fun culture and a tradition of the folklore noel story is being demonstrated on Zavetnyie skazy (Secret Tales) material. A consistent collections’ history creation analysis convinces us that the tale was a sort of laboratory in which main writer’s prose methods were being worked out.
Resumo:
Titled "An Essay on Antimetaphoric Resistance", the dissertation investigates what is here being called "Counter-figures": a term which has in this context a certain variety of applications. Any other-than-image or other-than-figure, anything that cannot be exhausted by figuration (and that is, more or less, anything at all, except perhaps the reproducible images and figures themselves) can be considered "counter-figurative" with regard to the formation of images and figures, ideas and schemas, "any graven image, or any likeness of any thing". Singularity and radical alterity, as well as temporality and its peculiar mode of uniqueness are key issues here, and an ethical dimension is implied by, or intertwined with, the aesthetic. In terms borrowed from Paul Celan's "Meridian" speech, poetry may "allow the most idiosyncratic quality of the Other, its time, to participate in the dialogue". This connection between singularity, alterity and temporality is one of the reasons why Celan so strongly objects to the application of the traditional concept of metaphor to poetry. As Celan says, "carrying over [übertragen]" by metaphor may imply an unwillingness to "bear with [mittragen]" and to "endure [ertragen]" the poem. The thesis is divided into two main parts. The first consists of five distinct prolegomena which all address the mentioned variety of applications of the term "counter-figures", and especially the rejection or critique of either metaphor (by Aristotle, for instance) or the concept of metaphor (defined by Aristotle, and sometimes deemed "anti-poetic" by both theorists and poets). Even if we restrict ourselves to the traditional rhetorico-poetical terms, we may see how, for instance, metonymy can be a counter-figure for metaphor, allegory for symbol, and irony for any single trope or for any piece of discourse at all. The limits of figurality may indeed be located at these points of intersection between different types of tropes or figures, and even between figures or tropes and the "non-figurative trope" or "pseudo-figure" called catachresis. The second part, following on from the open-ended prolegomena, concentrates on Paul Celan's poetry and poetics. According to Celan, true poetry is "essentially anti-metaphoric". I argue that inasmuch as we are willing to pay attention to the "will" of the poetic images themselves (the tropes and metaphors in a poem) to be "carried ad absurdum", as Celan invites us to do, we may find alternative ways of reading poetry and approaching its "secret of the encounter", precisely when the traditional rhetorical instruments, and especially the notion of metaphor, become inapplicable or suspicious — and even where they still seem to impose themselves.
Resumo:
A public key cryptosystem is proposed, which is based on the assumption that finding the square root of an element in a large finite ring is computationally infeasible in the absence of a knowledge of the ring structure. The encryption and decryption operations are very fast, and the data expansion is 1:2.