954 resultados para security complex


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Migraine is a common neurological disorder classified by the World Health Organisation (WHO) as one of the top twenty most debilitating diseases in the developed world. Current therapies are only effective for a proportion of sufferers and new therapeutic targets are desperately needed to alleviate this burden. Recently the role of epigenetics in the development of many complex diseases including migraine has become an emerging topic. By understanding the importance of acetylation, methylation and other epigenetic modifications, it then follows that this modification process is a potential target to manipulate epigenetic status with the goal of treating disease. Bisulphite sequencing and methylated DNA immunoprecipitation have been used to demonstrate the presence of methylated cytosines in the human D-loop of mitochondrial DNA (mtDNA), proving that the mitochondrial genome is methylated. For the first time, it has been shown that there is a difference in mtDNA epigenetic status between healthy controls and those with disease, especially for neurodegenerative and age related conditions. Given co-morbidities with migraine and the suggestive link between mitochondrial dysfunction and the lowered threshold for triggering a migraine attack, mitochondrial methylation may be a new avenue to pursue. Creative thinking and new approaches are needed to solve complex problems and a systems biology approach, where multiple layers of information are integrated is becoming more important in complex disease modelling.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australian labour law, at least from the mid-twentieth century, was dominated by the employment paradigm: the assumption that labour law’s scope was the regulation of employment relationships –full-time and part-time, and continuing, fixed term or casual – with a single (usually corporate) entity employer. But no sooner had the employment paradigm established and consolidated its shape, it began to fall apart. Since the 1980s there has been a significant growth of patterns of work that fall outside this paradigm, driven by organisational restructuring and management techniques such as labour hire, sub-contracting and franchising. Beyond Employment analyses the way in which Australian labour law is being reframed in this shift away from the pre-eminence of the employment paradigm. Its principal concern is with the legal construction and regulation of various forms of contracting, including labour hire arrangements, complex contractual chains and modern forms like franchising, and of casual employment. It outlines the current array of work relationships in Australia, and describes and analyses the way in which those outside continuous and fixed term employment are regulated. The book seeks to answer the central question: How does law (legal rules and principles) construct these work relationships, and how does it regulate these relationships? The book identifies the way in which current law draws the lines between the various work relationships through the use of contract and property ownership, and describes, analyses and synthesises the legal rules that govern these different forms of work relationships. The legal rules that govern work relationships are explored through the traditional lens of labour law’s protective function, principally in four themes: control of property, and the distribution of risks and rewards; maintenance of income security; access to collective voice mechanisms, focusing on collective bargaining; and health, safety and welfare. The book critically evaluates the gaps in the coverage and content of these rules and principles, and the implications of these gaps for workers. It also reflects upon the power relationships that underpin the work arrangements that are the focus of the book and that are enhanced through the laws of contract and property. Finally, it frames an agenda to address the gaps and identified weaknesses insofar as they affect the economic wellbeing, democratic voice, and health and safety of workers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition systems (SCADA) are widely used to control critical infrastructure automatically. Capturing and analyzing packet-level traffic flowing through such a network is an essential requirement for problems such as legacy network mapping and fault detection. Within the framework of captured network traffic, we present a simple modeling technique, which supports the mapping of the SCADA network topology via traffic monitoring. By characterizing atomic network components in terms of their input-output topology and the relationship between their data traffic logs, we show that these modeling primitives have good compositional behaviour, which allows complex networks to be modeled. Finally, the predictions generated by our model are found to be in good agreement with experimentally obtained traffic.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Designed for undergraduate and postgraduate students, academic researchers and industrial practitioners, this book provides comprehensive case studies on numerical computing of industrial processes and step-by-step procedures for conducting industrial computing. It assumes minimal knowledge in numerical computing and computer programming, making it easy to read, understand and follow. Topics discussed include fundamentals of industrial computing, finite difference methods, the Wavelet-Collocation Method, the Wavelet-Galerkin Method, High Resolution Methods, and comparative studies of various methods. These are discussed using examples of carefully selected models from real processes of industrial significance. The step-by-step procedures in all these case studies can be easily applied to other industrial processes without a need for major changes and thus provide readers with useful frameworks for the applications of engineering computing in fundamental research problems and practical development scenarios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia is a multicultural immigrant society created by public policy and direct state action over a period of two hundred years. It is now one of the world’s most diverse societies. However, like many nations, Australia faces challenges to managing ‘unauthorized arrivals’ who claim to be refugees. The issue of how to deal with unauthorized arrivals is controversial and highly emotive as it challenges public policy and government capacity to manage the multicultural ‘mix’ of Australia’s population. It also raises questions about border security. Given that it is impossible to discern beforehand who is a ‘proper’ refugee and who is not, claims to refugee status by unauthorised arrivals in Australia need to be tested against international convention criteria devised by the United Nations High Commissioner for Refugees (UNHCR). There are no simple solutions to controversial questions such as how and where should unauthorised arrivals, and the children accompanying them, be housed whilst their claims are investigated? Moreover, as this issue continues to prompt division and heated debate in Australian society, teachers new to the profession are often reluctant to explore it in the classroom. However, there are opportunities in national and state curriculum documents for the values dimensions of curriculum inquiries into controversial issues such as this to be addressed. For example, the most recent national statement on the goals for schooling in Australia, the Melbourne Declaration (MCEETYA, 2008), makes clear that Australian students need to be prepared for the challenges of the 21st century and to develop the capacity for innovation and complex problem-solving. The Melbourne Declaration informs the first national curriculum to be implemented in the Australian states and territories, and all other national and state initiatives. Its focus on developing active and informed citizens who can contribute to a socially cohesive society implies a capacity to deal with a range of issues associated with cultural diversity, This chapter explores the ways in which pre-service and early career teachers in one Australian state reflect upon curriculum opportunities to address controversial issues in the social sciences and history classroom. As part of their pre-service education, all the participants in this study completed a final year social science curriculum method unit that embedded a range of controversial issues, including the placement of children in Australian Immigration Detention Centres (IDCs), for investigation. By drawing from interviews and focus groups conducted with different cohorts of pre-service teachers in their final year of university study and beginning years of teaching, this chapter analyses the range of perceptions about how controversial issues can be examined in the secondary classroom as part of fostering informed citizenship. The discussion and analysis of the qualitative data in this study makes no claims for the representativeness of its findings, rather, a range of beginner teacher insights into a complex and important facet of teaching in a period of change and uncertainty is offered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wellbeing is an area that has gained increased global focus, particularly when considering children’s lives. With the growing focus on children’s wellbeing, it is apparent that this is an important aspect that is being considered in the policy and provision designed for children. The decision-making surrounding wellbeing provision for children typically occurs without the direct input of the children that these services are designed to benefit. With the children’s capacities being variably considered in wider society, opportunities for children to participate in decision-making on matters that affect them are often limited. The absence of children’s perspectives on matters that affect their lives, such as wellbeing, reveal that adults may be missing a key perspective when seeking to understand and cater for children’s wellbeing needs. This article outlines the results of a study that investigated how children aged 8 to 12 years o age (tweens) defined and conceptualised wellbeing. This article proposes that children can be included in the conceptualisation and development of policy and provision designed to benefit them and argues for increased presence of the voice and participation of children in wider societal initiatives.