975 resultados para EVEN-EVEN NYLONS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Everything is Political Ben Eltham, Kieran Lord, Jeff Brand, Truna. Chair: Daniel Golding Videogames don’t exist in isolation. They are part of artistic, cultural, and political spheres – even if some would much rather they weren’t. This panel takes a look at the way videogames are used as political tools and how we as developers and critics can better engage with that, and perhaps wrestle some of the conversation back into our hands.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Even though the driving ability of older adults may decline with age, there is evidence that some individuals attempt to compensate for these declines using strategies such as restricting their driving exposure. Such compensatory mechanisms rely on drivers’ ability to evaluate their own driving performance. This paper focuses on one key aspect of driver ability that is associated with crash risk and has been found to decline with age: hazard perception. Three hundred and seven drivers, aged 65 to 96, completed a validated video-based hazard perception test. There was no significant relationship between hazard perception test response latencies and drivers’ ratings of their hazard perception test performance, suggesting that their ability to assess their own test performance was poor. Also, age related declines in hazard perception latency were not reflected in drivers’ self-ratings. Nonetheless, ratings of test performance were associated with self-reported regulation of driving, as was self-rated driving ability. These findings are consistent with the proposal that, while self-assessments of driving ability may be used by drivers to determine the degree to which they restrict their driving, the problem is that drivers have little insight into their own driving ability. This may impact on the potential road safety benefits of self-restriction of driving because drivers may not have the information needed to optimally self-restrict. Strategies for addressing this problem are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Few studies have specifically investigated the functional effects of uncorrected astigmatism on measures of reading fluency. This information is important to provide evidence for the development of clinical guidelines for the correction of astigmatism. Methods: Participants included 30 visually normal, young adults (mean age 21.7 ± 3.4 years). Distance and near visual acuity and reading fluency were assessed with optimal spectacle correction (baseline) and for two levels of astigmatism, 1.00DC and 2.00DC, at two axes (90° and 180°) to induce both against-the-rule (ATR) and with-the-rule (WTR) astigmatism. Reading and eye movement fluency were assessed using standardized clinical measures including the test of Discrete Reading Rate (DRR), the Developmental Eye Movement (DEM) test and by recording eye movement patterns with the Visagraph (III) during reading for comprehension. Results: Both distance and near acuity were significantly decreased compared to baseline for all of the astigmatic lens conditions (p < 0.001). Reading speed with the DRR for N16 print size was significantly reduced for the 2.00DC ATR condition (a reduction of 10%), while for smaller text sizes reading speed was reduced by up to 24% for the 1.00DC ATR and 2.00DC condition in both axis directions (p<0.05). For the DEM, sub-test completion speeds were significantly impaired, with the 2.00DC condition affecting both vertical and horizontal times and the 1.00DC ATR condition affecting only horizontal times (p<0.05). Visagraph reading eye movements were not significantly affected by the induced astigmatism. Conclusions: Induced astigmatism impaired performance on selected tests of reading fluency, with ATR astigmatism having significantly greater effects on performance than did WTR, even for relatively small amounts of astigmatic blur of 1.00DC. These findings have implications for the minimal prescribing criteria for astigmatic refractive errors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The recent exponential rise in the number of behaviour disorders has been the focus of a wide range of commentaries, ranging from the pedagogic and the administrative, to the sociological, and even the legal. This book will be the first to apply, in a systematic and thorough manner, the ideas of the foundational discipline of philosophy. A number of philosophical tools are applied here, tools arising through the medium of the traditional philosophical debates, such as those concerning governance, truth, logic, ethics, free-will, law and language. Each forms a separate chapter, but together they constitute a comprehensive, rigorous and original insight into what is now an important set of concerns for all those interested in the governance of children. The intention is threefold: first, to demonstrate the utility, accessibility and effectiveness of philosophical ideas within this important academic area. Philosophy does not have to be regarded an arcane and esoteric discipline, with only limited contemporary application, far from it. Second, the book offers a new set of approaches and ideas for both researchers and practitioners within education, a field is in danger of continually using the same ideas, to endlessly repeat the same conclusions. Third, the book offers a viable alternative to the dominant psychological model which increasingly employs pathology as its central rationale for conduct. The book would not only be of interest to mainstream educators, and to those students and academics interested in philosophy, and more specifically, the application of philosophical ideas to educational issues, it would also be an appropriate text for courses on education and difference, and due to the breadth of the philosophical issues addressed, courses on applied philosophy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present a novel algorithm for localization during navigation that performs matching over local image sequences. Instead of calculating the single location most likely to correspond to a current visual scene, the approach finds candidate matching locations within every section (subroute) of all learned routes. Through this approach, we reduce the demands upon the image processing front-end, requiring it to only be able to correctly pick the best matching image from within a short local image sequence, rather than globally. We applied this algorithm to a challenging downhill mountainbiking visual dataset where there was significant perceptual or environment change between repeated traverses of the environment, and compared performance to applying the feature-based algorithm FAB-MAP. The results demonstrate the potential for localization using visual sequences, even when there are no visual features that can be reliably detected.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most one-round key exchange protocols provide only weak forward secrecy at best. Furthermore, one-round protocols with strong forward secrecy often break badly when faced with an adversary who can obtain ephemeral keys. We provide a characterisation of how strong forward secrecy can be achieved in one-round key exchange. Moreover, we show that protocols exist which provide strong forward secrecy and remain secure with weak forward secrecy even when the adversary is allowed to obtain ephemeral keys. We provide a compiler to achieve this for any existing secure protocol with weak forward secrecy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The corset, with its laces and stays, appears to the modern eyes little more than a stylish torture device. However, the corset enjoyed a reputation among the most fashionable women of the nineteenth century. Since small waists were the primary measure of corporeal beauty, corsets were nearly universal among Western women of the middle class upwards. Wearing a corset was also a marker of decency; only lower classes and women of dubious reputation did not wear corsets. From instrument of torture and symbol of submission to its appropriation by women as a marker of sexual liberation, the corset has gone under a sartorial and symbolic transformation remaining the most erotic element of women’s dress. This paper discusses the corset in two Australian films, Picnic at Hanging Rock (Peter Weir, 1974) and Moulin Rouge (Baz Luhrman, 2001), arguing that the corset provides a counterpoint in each film signifying the tension between beauty and respectability, on the one hand, and desire and transgression, on the other. We argue that the corset is the primary prop around which the narrative revolves as well as the key signifying hook for the audience. The fact that erotic motifs are so rare in Australian films makes the centrality of the corset in these films even more powerful as a discursive trope

Relevância:

20.00% 20.00%

Publicador:

Resumo:

You have chosen to enter a profession that can afford you a wonderfully rich career. It is a role that has many areas of speciality and many opportunities and challenges in communicating with a vast array of people including patients, families, peers, and management. Inherent in the role are all sorts of potential stressors such as not having the equipment you need at a time you think you crucially need it, working with people you find difficult, shift work, lack of staffing, overcrowding, and the list is sometimes seemingly endless. But there are also obvious advantages to your role such as meeting a large variety of people, helping people to recover, to feel comfortable in your care and supporting families, patients and colleagues. This brings me to the two primary points to this chapter. The first point of this chapter is to understand that sometimes the challenges you may face in the health arena overwhelm your initial understanding of your capacity to cope. That is to say, there will likely be times when you feel overwhelmed or even distraught in the face of a particular situation. The second point is that these same overwhelming experiences can provide a catalyst for you to grow as a human being; to develop beyond the person you perceived yourself to be beforehand. According to Aaron Antonovsky (1985), stress is inherent in the human condition, but further to that, in your role, there is a very high possibility of traumatic experiences as well.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Across the industrialized west there has been a sharp decline in union membership (Frege and Kelly2003, Peetz 2002). Even more alarming are the lower unionization rates of young people and the steeper decline in these rates compared to older workers (Serrano and Waddington 2000). At the same time increasing numbers of young people still at school are participating in the labour market. There have been a number of explorations internationally of young people's union membership, but most either track membership decline over time, comparing adult and youth union density (Blanden and Machin 2003, Bryson et al. 2005, Haynes, Vowles and Boxall 2005, Canny 2002, OECD 2006), explore the general experience of young people in the labour market (for example, Lizen, Bolton and Pole 1999) or examine young people's view of unions (for example, Bulbeck 2008). This chapter however takes a different approach, exploring union officials' constructions of 'the problem' of low union density amongst youth. While the data in this study was obtained from Australia, the Australian context has strong similarities with those in other industrialized economies, not least because globalization has meant the spread of neo-liberal industrial relations (IR) policies and structures. Assuming that unions have choices open to them as to how they recruit and retain young people, it is important to analyse officials' construction of 'the problem', as this affects union strategizing and action.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: Electrospun nanofibers represent potent guidance substrates for nervous tissue repair. Development of nanofiber-based scaffolds for CNS repair requires, as a first step, an understanding of appropriate neural cell type-substrate interactions. Materials & methods: Astrocyte–nanofiber interactions (e.g., adhesion, proliferation, process extension and migration) were studied by comparing human neural progenitor-derived astrocytes (hNP-ACs) and a human astrocytoma cell line (U373) with aligned polycaprolactone (PCL) nanofibers or blended (25% type I collagen/75% PCL) nanofibers. Neuron–nanofiber interactions were assessed using a differentiated human neuroblastoma cell line (SH-SY5Y). Results & discussion: U373 cells and hNP-AC showed similar process alignment and length when associated with PCL or Type I collagen/PCL nanofibers. Cell adhesion and migration by hNP-AC were clearly improved by functionalization of nanofiber surfaces with type I collagen. Functionalized nanofibers had no such effect on U373 cells. Another clear difference between the U373 cells and hNP-AC interactions with the nanofiber substrate was proliferation; the cell line demonstrating strong proliferation, whereas the hNP-AC line showed no proliferation on either type of nanofiber. Long axonal growth (up to 600 µm in length) of SH-SY5Y neurons followed the orientation of both types of nanofibers even though adhesion of the processes to the fibers was poor. Conclusion: The use of cell lines is of only limited predictive value when studying cell–substrate interactions but both morphology and alignment of human astrocytes were affected profoundly by nanofibers. Nanofiber surface functionalization with collagen significantly improved hNP-AC adhesion and migration. Alternative forms of functionalization may be required for optimal axon–nanofiber interactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Exercise interventions during adjuvant cancer therapy have been shown to increase functional capacity, relieve fatigue and distress and may assist rates of chemotherapy completion. These studies have been limited to breast, gastric and mixed cancer groups and it is not yet known if a similar intervention is even feasible among women with ovarian cancer. We aimed to assess safety, feasibility and potential effect of a walking intervention in women undergoing chemotherapy for ovarian cancer. Methods: Women newly diagnosed with ovarian cancer were recruited to participate in an individualised walking intervention throughout chemotherapy and were assessed pre-and post-intervention. Feasibility measures included session adherence, compliance with exercise physiologist prescribed walking targets and self-reported program acceptability. Changes in objective physical functioning (6 minute walk test), self-reported distress (Hospital Anxiety and Depression Scale), symptoms (Memorial Symptom Assessment Scale - Physical) and quality of life (Functional Assessment of Cancer Therapy - Ovarian) were calculated, and chemotherapy completion and adverse intervention effects recorded. Results: Seventeen women were enrolled (63% recruitment rate). Mean age was 60 years (SD = 8 years), 88% were diagnosed with FIGO stage III or IV disease, 14 women underwent adjuvant and three neo-adjuvant chemotherapy. On average, women adhered to > 80% of their intervention sessions and complied with 76% of their walking targets, with the majority walking four days a week at moderate intensity for 30 minutes per session. Meaningful improvements were found in physical functioning, physical symptoms, physical well-being and ovarian cancerspecific quality of life. Most women (76%) completed ≥85% of their planned chemotherapy dose. There were no withdrawals or serious adverse events and all women reported the program as being helpful. Conclusions: These positive preliminary results suggest that this walking intervention for women receiving chemotherapy for ovarian cancer is safe, feasible and acceptable and could be used in development of future work. Trial registration: ACTRN12609000252213

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer resource allocation represents a significant challenge particularly for multiprocessor systems, which consist of shared computing resources to be allocated among co-runner processes and threads. While an efficient resource allocation would result in a highly efficient and stable overall multiprocessor system and individual thread performance, ineffective poor resource allocation causes significant performance bottlenecks even for the system with high computing resources. This thesis proposes a cache aware adaptive closed loop scheduling framework as an efficient resource allocation strategy for the highly dynamic resource management problem, which requires instant estimation of highly uncertain and unpredictable resource patterns. Many different approaches to this highly dynamic resource allocation problem have been developed but neither the dynamic nature nor the time-varying and uncertain characteristics of the resource allocation problem is well considered. These approaches facilitate either static and dynamic optimization methods or advanced scheduling algorithms such as the Proportional Fair (PFair) scheduling algorithm. Some of these approaches, which consider the dynamic nature of multiprocessor systems, apply only a basic closed loop system; hence, they fail to take the time-varying and uncertainty of the system into account. Therefore, further research into the multiprocessor resource allocation is required. Our closed loop cache aware adaptive scheduling framework takes the resource availability and the resource usage patterns into account by measuring time-varying factors such as cache miss counts, stalls and instruction counts. More specifically, the cache usage pattern of the thread is identified using QR recursive least square algorithm (RLS) and cache miss count time series statistics. For the identified cache resource dynamics, our closed loop cache aware adaptive scheduling framework enforces instruction fairness for the threads. Fairness in the context of our research project is defined as a resource allocation equity, which reduces corunner thread dependence in a shared resource environment. In this way, instruction count degradation due to shared cache resource conflicts is overcome. In this respect, our closed loop cache aware adaptive scheduling framework contributes to the research field in two major and three minor aspects. The two major contributions lead to the cache aware scheduling system. The first major contribution is the development of the execution fairness algorithm, which degrades the co-runner cache impact on the thread performance. The second contribution is the development of relevant mathematical models, such as thread execution pattern and cache access pattern models, which in fact formulate the execution fairness algorithm in terms of mathematical quantities. Following the development of the cache aware scheduling system, our adaptive self-tuning control framework is constructed to add an adaptive closed loop aspect to the cache aware scheduling system. This control framework in fact consists of two main components: the parameter estimator, and the controller design module. The first minor contribution is the development of the parameter estimators; the QR Recursive Least Square(RLS) algorithm is applied into our closed loop cache aware adaptive scheduling framework to estimate highly uncertain and time-varying cache resource patterns of threads. The second minor contribution is the designing of a controller design module; the algebraic controller design algorithm, Pole Placement, is utilized to design the relevant controller, which is able to provide desired timevarying control action. The adaptive self-tuning control framework and cache aware scheduling system in fact constitute our final framework, closed loop cache aware adaptive scheduling framework. The third minor contribution is to validate this cache aware adaptive closed loop scheduling framework efficiency in overwhelming the co-runner cache dependency. The timeseries statistical counters are developed for M-Sim Multi-Core Simulator; and the theoretical findings and mathematical formulations are applied as MATLAB m-file software codes. In this way, the overall framework is tested and experiment outcomes are analyzed. According to our experiment outcomes, it is concluded that our closed loop cache aware adaptive scheduling framework successfully drives co-runner cache dependent thread instruction count to co-runner independent instruction count with an error margin up to 25% in case cache is highly utilized. In addition, thread cache access pattern is also estimated with 75% accuracy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The majority of Australians will work, sleep and die in the garments of the mass market. Yet, as Ian Griffiths has termed it, the designers of these garments are ‘invisible’ (2000). To the general public, the values, opinions and individual design processes of these designers are as unknown as their names. However, the designer’s role is crucial in making decisions which will have impacts throughout the life of the garment. The high product volume within the mass market ensures that even a small decision in the design process to source a particular fabric, or to use a certain trim or textile finish, can have a profound environmental or social effect. While big companies in Australia have implemented some visible strategies for sustainability, it is uncertain how these may have flowed through to design practices. To explore this question, this presentation will discuss preliminary findings from in-depth semi-structured interviews with Australian mass market fashion designers and product developers. The aim of the interviews was to hear the voice of the insider – to listen to mass market designers describe their design process, discuss the Australian fashion industry and its future challenges and opportunities, and to comment on what a ‘sustainability’ for their industry could look like. These interviews will be discussed within the framework of design philosopher Tony Fry’s writing on design redirection for sustainability.