852 resultados para Forensic specialists


Relevância:

10.00% 10.00%

Publicador:

Resumo:

High-risk adolescents are shown to jeopardise their future social and health functioning as well as placing themselves and others at immediate risk of harm. The challenge of “reaching” high-risk adolescents, who are often marginalised, is considerable. There is a positive relationship between age and risk taking behaviors during adolescence. This study examines outcomes (alcohol use, transport risk behaviors, violence) of a school based intervention (SPIY) by comparing low-medium risk adolescents with high-risk adolescents over a six month period.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We aimed to evaluate the effect of the appointment of a dedicated specialist thoracic surgeon on surgical practice for lung cancer previously served by cardio-thoracic surgeons. Outcomes were compared for the 240 patients undergoing surgical resection for lung cancer in two distinct 3-year periods: Group A: 65 patients, 1994-1996 (pre-specialist); Group B: 175 patients, 1997-1999 (post-specialist). The changes implemented resulted in a significant increase in resection rate (from 12.2 to 23.4%, P<0.001), operations in the elderly (over 75 years) and extended resections. There were no significant differences in stage distribution, in-hospital mortality or stage-specific survival after surgery. Lung cancer surgery provided by specialists within a multidisciplinary team resulted in increased surgical resection rates without compromising outcome. Our results strengthen the case for disease-specific specialists in the treatment of lung cancer. © 2004 Published by Elsevier Ireland Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objectives This study introduces and assesses the precision of a standardized protocol for anthropometric measurement of the juvenile cranium using three-dimensional surface rendered models, for implementation in forensic investigation or paleodemographic research. Materials and methods A subset of multi-slice computed tomography (MSCT) DICOM datasets (n=10) of modern Australian subadults (birth—10 years) was accessed from the “Skeletal Biology and Forensic Anthropology Virtual Osteological Database” (n>1200), obtained from retrospective clinical scans taken at Brisbane children hospitals (2009–2013). The capabilities of Geomagic Design X™ form the basis of this study; introducing standardized protocols using triangle surface mesh models to (i) ascertain linear dimensions using reference plane networks and (ii) calculate the area of complex regions of interest on the cranium. Results The protocols described in this paper demonstrate high levels of repeatability between five observers of varying anatomical expertise and software experience. Intra- and inter-observer error was indiscernible with total technical error of measurement (TEM) values ≤0.56 mm, constituting <0.33% relative error (rTEM) for linear measurements; and a TEM value of ≤12.89 mm2, equating to <1.18% (rTEM) of the total area of the anterior fontanelle and contiguous sutures. Conclusions Exploiting the advances of MSCT in routine clinical assessment, this paper assesses the application of this virtual approach to acquire highly reproducible morphometric data in a non-invasive manner for human identification and population studies in growth and development. The protocols and precision testing presented are imperative for the advancement of “virtual anthropology” into routine Australian medico-legal death investigation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Advocacy is integral to the work of many TESOL specialists. For several decades, ACTA and the state TESOL associations, along with other professional associations, and individual teachers, researchers and administrators have all engaged with conversations about EAL/D education in public forums. These advocates have drawn attention to implications of policy developments for EAL/D students; they have proffered alternative forms of curriculum, pedagogy and assessment to better account for the particularity of EAL/D learning pathways; they have argued the necessity of specialist EAL/D teaching. In response to the Australian Language and Literacy Policy of the early 1990s, for example, there was “a frenzy of writing responses… a conference… and attempts to publicise what was going on through the press and television” (Moore, 1995, p. 6). It is in this spirit that this double issue of TESOL in Context has been compiled...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this paper is to empirically examine the state of cloud computing adoption in Australia. I specifically focus on the drivers, risks, and benefits of cloud computing from the perspective of IT experts and forensic accountants. I use thematic analysis of interview data to answer the research questions of the study. The findings suggest that cloud computing is increasingly gaining foothold in many sectors due to its advantages such as flexibility and the speed of deployment. However, security remains an issue and therefore its adoption is likely to be selective and phased. Of particular concern are the involvement of third parties and foreign jurisdictions, which in the event of damage may complicate litigation and forensic investigations. This is one of the first empirical studies that reports on cloud computing adoption and experiences in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Presents an obituary for David L. Rosenhan (1929–2012). A distinguished psychologist and professor emeritus at Stanford University, Rosenhan died February 6, 2012, at the age of 82, after a long illness. Born in Jersey City, New Jersey, on November 22, 1929, he received a bachelor’s degree in mathematics (1951) from Yeshiva College and a master’s degree in economics (1953) and a doctorate in psychology (1958) from Columbia University. A professor of law and of psychology at Stanford University from 1971 until his retirement in 1998, Rosenhan was a pioneer in applying psychological methods to the practice of law, including the examination of expert witnesses, jury selection, and jury deliberation. A former president of the American Psychology–Law Society and of the American Board of Forensic Psychology, Rosenhan was a fellow of the American Association for the Advancement of Science, of the American Psychological Association, and of the American Psychological Society. Before joining the Stanford Law School faculty, he was a member of the faculties of Swarthmore College, Princeton University, Haverford College, and the University of Pennsylvania. He also served as a research psychologist at the Educational Testing Service. As generations of Stanford students can attest, David Rosenhan was a spellbinding lecturer who managed to convey the sense that he was speaking to each individual, no matter how large the group. To his graduate students, he was consistently encouraging and optimistic, always ready to share a joke or story, and gently encouraging of their creativity and progressive independence as researchers. The lessons he cared most about offering, in the classroom as in his research, were about human dignity and the need to confront abuse of power and human frailties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"When Susannah Birch was two years old her mother cut her throat, in a ritual sacrifice, Susannah was very lucky to survive. This was the first of her mother’s psychotic episodes as she enacted a passage from The Old Testament...In this moving documentary Susannah and her father describe their memories of this shocking event and how it has affected them."--publisher website

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Paint Spray is developed as a direct sampling ionisation method for mass spectrometric analysis of additives in polymer-based surface coatings. The technique simply involves applying an external high voltage (5 kV) to the wetted sample placed in front of the mass spectrometer inlet and represents a much simpler ionisation technique compared to those currently available. The capabilities of Paint Spray are demonstrated herein with the detection of four commercially available hindered amine light stabilisers; TINUVIN® 770, TINUVIN® 292, TINUVIN® 123 and TINUVIN® 152 directly from thermoset polyester-based coil coatings. Paint Spray requires no sample preparation or pre-treatment and combined with its simplicity - requiring no specialised equipment - makes it ideal for use by non-specialists. The application of Paint Spray for industrial use has significant potential as sample collection from a coil coating production line and Paint Spray ionisation could enable fast quality control screening at high sensitivity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been a greater focus on strengthening evaluation capacity building (ECB) within development organisations in recent years. This can be attributed in part to the growing appreciation of the value of participatory and collaborative forms of evaluation. Evaluation is increasingly seen as an ongoing learning process and an important means of strengthening capacity and improving organisational performance (Horton et al., 2003:7). While there are many benefits of using participatory methodologies in ECB projects, our experiences and a review of the literature in this area highlight the many challenges, issues and contradictions that can affect the success of such ECB efforts. We discuss these issues, drawing on our learnings from the ongoing participatory action research (PAR) project 'Assessing Communication for Social Change’ (AC4SC). This four year project, which began in 2007, is a collaboration between communication and development academics and evaluation specialists from two Australian universities and communication for development practitioners and monitoring and evaluation (M&E) staff in the NGO Equal Access Nepal (EAN). The aim is to develop, implement, and evaluate a participatory methodology for assessing the social change impacts of community radio programs produced by EAN. It builds on previous projects that used ethnographic action research (EAR) methodology (Tacchi et al., 2007).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital forensics concerns the analysis of electronic artifacts to reconstruct events such as cyber crimes. This research produced a framework to support forensic analyses by identifying associations in digital evidence using metadata. It showed that metadata based associations can help uncover the inherent relationships between heterogeneous digital artifacts thereby aiding reconstruction of past events by identifying artifact dependencies and time sequencing. It also showed that metadata association based analysis is amenable to automation by virtue of the ubiquitous nature of metadata across forensic disk images, files, system and application logs and network packet captures. The results prove that metadata based associations can be used to extract meaningful relationships between digital artifacts, thus potentially benefiting real-life forensics investigations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a proof of concept for a novel nanosensor for the detection of ultra-trace amounts of bio-active molecules in complex matrices. The nanosensor is comprised of gold nanoparticles with an ultra-thin silica shell and antibody surface attachment, which allows for the immobilization and direct detection of bio-active molecules by surface enhanced Raman spectroscopy (SERS) without requiring a Raman label. The ultra-thin passive layer (~1.3 nm thickness) prevents competing molecules from binding non-selectively to the gold surface without compromising the signal enhancement. The antibodies attached on the surface of the nanoparticles selectively bind to the target molecule with high affinity. The interaction between the nanosensor and the target analyte result in conformational rearrangements of the antibody binding sites, leading to significant changes in the surface enhanced Raman spectra of the nanoparticles when compared to the spectra of the un-reacted nanoparticles. Nanosensors of this design targeting the bio-active compounds erythropoietin and caffeine were able to detect ultra-trace amounts the analyte to the lower quantification limits of 3.5×10−13 M and 1×10−9 M, respectively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To date, designed topologies for DC-AC inversion with both voltage-buck and boost capabilities are mainly focused on two-level circuitries with extensions to three-level possibilities left nearly unexplored. Contributing to this area of research, this paper presents the design of a number of viable buck-boost three-level inverters that can also support bidirectional power conversion. The proposed front-end circuitry is developed from the Cuk-derived buck-boost two-level inverter, and by using the "alternative phase opposition disposition" (APOD) modulation scheme, the buck-boost three-level inverters can perform distinct five-level line voltage and three-level phase voltage switching by simply controlling the active switches located in the designed voltage boost section of the circuits. As a cost saving option, one active switch can further be removed from the voltage-boost section of the circuits by simply re-routing the gating commands of the remaining switches without influencing the ac output voltage amplitude. To verify the validity of the proposed inverters, Matlab/PLECS simulations were performed before a laboratory prototype was implemented for experimental testing.