931 resultados para cryptographic protocols


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background WSUD implementation in the Gold Coast City Council area commenced more than a decade ago. As a result, Council is expected to be in possession of WSUD assets valued at over tens of million dollars. The Gold Coast City Council is responsible for the maintenance and long-term management of these WSUD assets. Any shortcoming in implementation of best WSUD practices can potentially result in substantial liabilities and ineffective expenditure for the Council in addition to reduced efficiencies and outcomes. This highlights the importance of periodic auditing of WSUD implementation. Project scope The overall study entailed the following tasks: * A state-of-the-art literature review of the conceptual hydraulic and water quality treatment principles, current state of knowledge in relation to industry standards, best practice and identification of knowledge gaps in relation to maintenance and management practices and potential barriers to the implementation of WSUD. * Council stakeholder interviews to understand current practical issues in relation to the implementation of WSUD and the process of WSUD application from development application approval to asset management. * Field auditing of selected WSUD systems for condition assessment and identification of possible strengths and weaknesses in implementation. * Review of the Land Development Guidelines in order to identify any gaps and to propose recommendations for improvement. Conclusions Given below is a consolidated summary of the findings of the study undertaken. State-of-the-art literature review Though the conceptual framework for WSUD implementation is well established, the underlying theoretical knowledge underpinning the treatment processes and maintenance regimes and life cycle costing are still not well understood. Essentially, these are the recurring themes in the literature, namely, the inadequate understanding of treatment processes and lack of guidance to ensure specificity of maintenance regimes and life cycle costing of WSUDs. The fundamental barriers to successful WSUD implementation are: * Lack of knowledge transfer – This essentially relates to the lack of appropriate dissemination of research outcomes and the common absence of protocols for knowledge transfer within the same organisation. * Cultural barriers – These relate to social and institutional factors, including institutional inertia and the lack of clear understanding of the benefits. * Fragmented responsibilities – This results from poor administrative integration within local councils in relation to WSUDs. * Technical barriers – These relate to lack of knowledge on operational and maintenance practices which is compounded by model limitations and the lack of long-term quantitative performance evaluation data. * Lack of engineering standards – Despite the availability of numerous guidelines which are non-enforceable and can sometimes be confusing, there is a need for stringent engineering standards. The knowledge gaps in relation to WSUDs are only closing very slowly. Some of the common knowledge gaps identified in recent publications have been recognised almost a decade ago. The key knowledge gaps identified in the published literature are: * lack of knowledge on operational and maintenance practices; * lack of reliable methodology for identifying life cycle issues including costs; * lack of technical knowledge on system performance; * lack of guidance on retrofitting in existing developments. Based on the review of barriers to WSUD implementation and current knowledge gaps, the following were identified as core areas for further investigation: * performance evaluation of WSUD devices to enhance model development and to assess their viability in the context of environmental, economic and social drivers; establishing realistic life cycle costs to strengthen maintenance and asset management practices; * development of guidelines specific to retrofitting in view of the unique challenges posed by existing urban precincts together with guidance to ensure site specificity; establishment of a process for knowledge translation for enhancing currently available best practice guidelines; * identification of drivers and overcoming of barriers in the areas of institutional fragmentation, knowledge gaps and awareness of WSUD practices. GCCC stakeholder interviews Fourteen staff members involved in WSUD systems management in the Gold Coast City Council, representing four Directorates were interviewed using a standard questionnaire. The primary issues identified by the stakeholders were: * standardisation of WSUD terminology; * clear protocols for safeguarding devices during the construction phase; * engagement of all council stakeholders in the WSUD process from the initial phase; * limitations in the Land Development Guidelines; * ensuring public safety through design; * system siting to avoid conflicts with environmental and public use of open space; * provision of adequate access for maintenance; * integration of social and ecosystem issues to ensure long-term viability of systems in relation to both, vandalism and visual recreation; * lack of performance monitoring and inadequacy of the maintenance budget; * lack of technical training for staff involved in WSUD design approvals and maintenance; incentives for developers for acting responsibly in stormwater management. Field auditing of WSUD systems A representative cross section of WSUD systems in the Gold Coast were audited in the field. The following strengths and weaknesses in WSUD implementation were noted: * The implementation of WSUD systems in the field is not consistent. * The concerns raised by the stakeholders during the interviews in relation to WSUD implementation was validated from the observations from the field auditing, particularly in relation to the following: * safeguarding of devices during the construction phase * public safety * accessibility for maintenance * lack of performance monitoring by Council to assess system performance * inadequate maintenance of existing systems to suit site specific requirements. * A treatment train approach is not being consistently adopted. * Most of the systems audited have satisfactorily catered for public safety. Accessibility for maintenance has been satisfactorily catered for in most of the systems that were audited. * Systems are being commissioned prior to construction activities being substantially completed. * The hydraulic design of most systems appears to be satisfactory. * The design intent of the systems is not always clear. Review of Land Development Guidelines The Land Development Guidelines (TDG) was extensively reviewed and the following primary issues were noted in relation to WSUD implementation: * the LDG appears to have been prepared primarily to provide guidance to developers. It is not clear to what extent the guidelines are applicable to Council staff involved in WSUD maintenance and management; * Section 13 is very voluminous and appears to be a compilation of a series of individual documents resulting in difficulties in locating specific information, a lack of integration and duplication of information; * the LDG has been developed with a primary focus on new urban precinct development and the retrofitting of systems in existing developments has not been specifically discussed; * WSUDs are discussed in two different sections in the LDG and it is not clear which section takes precedence as there are inconsistencies between the two sections; there is inconsistent terminology being used; * there is a need for consolidation of information provided in different sections in the LDG; * there are inconsistencies in the design criteria provided; * there is a need for regular updating of the LDG to ensure that the information provided encompasses the state-of-the-art; * there is limited guidance provided for the preparation of maintenance plans and life cycle costing to assist developers in asset handover and to assist Council staff in assessment. * Based on these observations, eleven recommendations have been provided which are discussed below. Additionally, the stakeholder provided the following specific comments during the interviews in relation to the LDG: * lack of flexibility to cover the different stages of the life cycle of the systems; * no differentiation in projects undertaken by developers and Council; * inadequate information with regards to safety issues such as maximum standing water depth, fencing and safety barriers and public access; * lack of detailed design criteria in relation to Crime Prevention through Environmental Design, safety, amenity, environment, surrounding uses and impacts on surroundings; * inadequate information regarding maintenance requirements specific to the assessment and compliance phases; * recommendations for plantings are based primarily on landscape requirements rather than pollutant uptake capability. Recommendations With regards to the Land Development Guidelines, the following specific recommendations are provided: 1. the relevant sections and their extent of applicability to Council should be clearly identified; 2. integration of the different subsections within Section 13 and re-formatting the document for easy reference; 3. the maintenance guidelines provided in Section 13 should be translated to a maintenance manual for guidance of Council staff; 4. should consider extending the Guidelines to specifically encompass retrofitting of WSUD systems to existing urban precincts; 5. Section 3 needs to be revised to be made consistent with Section 13, to ensure priority for WSUD practices in urban precincts and to move away from conventional stormwater drainage design such as kerb and channelling; 6. it would also be good to specify as to which Section takes predominance in relation to stormwater drainage. It is expected that Section 13 would take predominance over the other sections in the LDG; 7. terminology needs to be made consistent to avoid confusion among developers and Council staff. Water Sensitive Urban Design is the term commonly used in Australia for stormwater quality treatment, rather than Stormwater Quality Improvement Devices. This once again underlines the need for ensuring consistency between Section 3 and Section 13; 8. it would also be good if there is a glossary of commonly used terms in relation to WSUD for use by all stakeholders and which should also be reflected in the LDG; 9. consolidation of all WSUD information into one section should be considered together with appropriate indicators in other LDG Sections regarding the availability of WSUD information. Ensuring consistency in the information provided is implied; 10. Section 13 should be updated at regular intervals to ensure the incorporation of the latest in research outcomes and incorporating criteria and guidance based on the state-of-the-art knowledge. The updating could be undertaken, say, in five year cycles. This would help to overcome the current lack of knowledge transfer; 11. the Council should consider commissioning specialised studies to extend the current knowledge base in relation to WSUD maintenance and life cycle costing. Additionally, Recommendation 10 is also applicable in this instance. The following additional recommendations are made based on the state-of-the-art literature review, stakeholder interviews and field auditing of WSUD systems: 1. Performance monitoring of existing systems to assess improvements to water quality, identify modifications and enhancements to improve performance; 2. Appropriate and monitored maintenance during different phases of development of built assets over time is needed to investigate the most appropriate time/phase of development to commission the final WSUD asset. 3. Undertake focussed investigations in the areas of WSUD maintenance and asset management in order to establish more realistic life cycle costs of systems and maintenance schedules; 4. the engagement of all relevant Council stakeholders from the initial stage of concept planning through to asset handover, and ongoing monitoring. This close engagement of internal stakeholders will assist in building a greater understanding of responsibilities and contribute to overcoming constraints imposed by fragmented responsibilities; 5. the undertaking of a public education program to inform the community of the benefits and ecosystem functions of WSUD systems; 6. technical training to impart state-of-the-art knowledge to staff involved in the approval of designs and maintenance and management of WSUD projects; 7. during the construction phase, it is important to ensure that appropriate measures to safeguard WSUD devices are implemented; 8. risks associated with potential public access to open water zones should be minimised with the application of appropriate safety measures; 9. system siting should ensure that potential conflicts are avoided with respect to public and ecosystem needs; 10. integration of social and ecosystem issues to ensure long-term viability of systems; provide incentives to developers who are proactive and responsible in the area of stormwater management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Technological growth in the 21st century is exponential. Simultaneously, development of the associated risk, uncertainty and user acceptance are scattered. This required appropriate study to establish people accepting controversial technology (PACT). The Internet and services around it, such as World Wide Web, e-mail, instant messaging and social networking are increasingly becoming important in many aspects of our lives. Information related to medical and personal health sharing using the Internet is controversial and demand validity, usability and acceptance. Whilst literature suggest, Internet enhances patients and physicians’ positive interactions some studies establish opposite of such interaction in particular the associated risk. In recent years Internet has attracted considerable attention as a means to improve health and health care delivery. However, it is not clear how widespread the use of Internet for health care really is or what impact it has on health care utilisation. Estimated impact of Internet usage varies widely from the locations locally and globally. As a result, an estimate (or predication) of Internet use and their effects in Medical Informatics related decision-making is impractical. This open up research issues on validating and accepting Internet usage when designing and developing appropriate policy and processes activities for Medical Informatics, Health Informatics and/or e-Health related protocols. Access and/or availability of data on Internet usage for Medical Informatics related activities are unfeasible. This paper presents a trend analysis of the growth of Internet usage in medical informatics related activities. In order to perform the analysis, data was extracted from ERA (Excellence Research in Australia) ranked “A” and “A*” Journal publications and reports from the authenticated public domain. The study is limited to the analyses of Internet usage trends in United States, Italy, France and Japan. Projected trends and their influence to the field of medical informatics is reviewed and discussed. The study clearly indicates a trend of patients becoming active consumers of health information rather than passive recipients.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Robust hashing is an emerging field that can be used to hash certain data types in applications unsuitable for traditional cryptographic hashing methods. Traditional hashing functions have been used extensively for data/message integrity, data/message authentication, efficient file identification and password verification. These applications are possible because the hashing process is compressive, allowing for efficient comparisons in the hash domain but non-invertible meaning hashes can be used without revealing the original data. These techniques were developed with deterministic (non-changing) inputs such as files and passwords. For such data types a 1-bit or one character change can be significant, as a result the hashing process is sensitive to any change in the input. Unfortunately, there are certain applications where input data are not perfectly deterministic and minor changes cannot be avoided. Digital images and biometric features are two types of data where such changes exist but do not alter the meaning or appearance of the input. For such data types cryptographic hash functions cannot be usefully applied. In light of this, robust hashing has been developed as an alternative to cryptographic hashing and is designed to be robust to minor changes in the input. Although similar in name, robust hashing is fundamentally different from cryptographic hashing. Current robust hashing techniques are not based on cryptographic methods, but instead on pattern recognition techniques. Modern robust hashing algorithms consist of feature extraction followed by a randomization stage that introduces non-invertibility and compression, followed by quantization and binary encoding to produce a binary hash output. In order to preserve robustness of the extracted features, most randomization methods are linear and this is detrimental to the security aspects required of hash functions. Furthermore, the quantization and encoding stages used to binarize real-valued features requires the learning of appropriate quantization thresholds. How these thresholds are learnt has an important effect on hashing accuracy and the mere presence of such thresholds are a source of information leakage that can reduce hashing security. This dissertation outlines a systematic investigation of the quantization and encoding stages of robust hash functions. While existing literature has focused on the importance of quantization scheme, this research is the first to emphasise the importance of the quantizer training on both hashing accuracy and hashing security. The quantizer training process is presented in a statistical framework which allows a theoretical analysis of the effects of quantizer training on hashing performance. This is experimentally verified using a number of baseline robust image hashing algorithms over a large database of real world images. This dissertation also proposes a new randomization method for robust image hashing based on Higher Order Spectra (HOS) and Radon projections. The method is non-linear and this is an essential requirement for non-invertibility. The method is also designed to produce features more suited for quantization and encoding. The system can operate without the need for quantizer training, is more easily encoded and displays improved hashing performance when compared to existing robust image hashing algorithms. The dissertation also shows how the HOS method can be adapted to work with biometric features obtained from 2D and 3D face images.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Knowledge of current trends in nurse-administered procedural sedation and analgesia (PSA) in the cardiac catheterisation laboratory (CCL) may provide important insights into how to improve safety and effectiveness of this practice. Objective To characterise current practice as well as education and competency standards regarding nurse-administered PSA in Australian and New Zealand CCLs. Design A quantitative, cross-sectional, descriptive survey design was used. Methods Data were collected using a web-based questionnaire on practice, educational standards and protocols related to nurse-administered PSA. Descriptive statistics were used to analyse data. Results A sample of 62 nurses, each from a different CCL, completed a questionnaire that focused on PSA practice. Over half of the estimated total number of CCLs in Australia and New Zealand was represented. Nurse-administered PSA was used in 94% (n = 58) of respondents CCLs. All respondents indicated that benzodiazepines, opioids or a combination of both is used for PSA (n = 58). One respondent indicated that propofol was also used. 20% (n = 12) indicated that deep sedation is purposefully induced for defibrillation threshold testing and cardioversion without a second medical practitioner present. Sedation monitoring practices vary considerably between institutions. 31% (n = 18) indicated that comprehensive education about PSA is provided. 45% (n = 26) indicated that nurses who administer PSA should undergo competency assessment. Conclusion By characterising nurse-administered PSA in Australian and New Zealand CCLs, a baseline for future studies has been established. Areas of particular importance to improve include protocols for patient monitoring and comprehensive PSA education for CCL nurses in Australia and New Zealand.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The cardiac catheterisation laboratory (CCL) is a specialised medical radiology facility where both chronic-stable and life-threatening cardiovascular illness is evaluated and treated. Although there are many potential sources of discomfort and distress associated with procedures performed in the CCL, a general anaesthetic is not usually required. For this reason, an anaesthetist is not routinely assigned to the CCL. Instead, to manage pain, discomfort and anxiety during the procedure, nurses administer a combination of sedative and analgesic medications according to direction from the cardiologist performing the procedure. This practice is referred to as nurse-administered procedural sedation and analgesia (PSA). While anecdotal evidence suggested that nurse-administered PSA was commonly used in the CCL, it was clear from the limited information available that current nurse-led PSA administration and monitoring practices varied and that there was contention around some aspects of practice including the type of medications that were suitable to be used and the depth of sedation that could be safely induced without an anaesthetist present. The overall aim of the program of research presented in this thesis was to establish an evidence base for nurse-led sedation practices in the CCL context. A sequential mixed methods design was used over three phases. The objective of the first phase was to appraise the existing evidence for nurse-administered PSA in the CCL. Two studies were conducted. The first study was an integrative review of empirical research studies and clinical practice guidelines focused on nurse-administered PSA in the CCL as well as in other similar procedural settings. This was the first review to systematically appraise the available evidence supporting the use of nurse-administered PSA in the CCL. A major finding was that, overall, nurse-administered PSA in the CCL was generally deemed to be safe. However, it was concluded from the analysis of the studies and the guidelines that were included in the review, that the management of sedation in the CCL was impacted by a variety of contextual factors including local hospital policy, workforce constraints and cardiologists’ preferences for the type of sedation used. The second study in the first phase was conducted to identify a sedation scale that could be used to monitor level of sedation during nurse-administered PSA in the CCL. It involved a structured literature review and psychometric analysis of scale properties. However, only one scale was found that was developed specifically for the CCL, which had not undergone psychometric testing. Several weaknesses were identified in its item structure. Other sedation scales that were identified were developed for the ICU. Although these scales have demonstrated validity and reliability in the ICU, weaknesses in their item structure precluded their use in the CCL. As findings indicated that no existing sedation scale should be applied to practice in the CCL, recommendations for the development and psychometric testing of a new sedation scale were developed. The objective of the second phase of the program of research was to explore current practice. Three studies were conducted in this phase using both quantitative and qualitative research methods. The first was a qualitative explorative study of nurses’ perceptions of the issues and challenges associated with nurse-administered PSA in the CCL. Major themes emerged from analysis of the qualitative data regarding the lack of access to anaesthetists, the limitations of sedative medications, the barriers to effective patient monitoring and the impact that the increasing complexity of procedures has on patients' sedation requirements. The second study in Phase Two was a cross-sectional survey of nurse-administered PSA practice in Australian and New Zealand CCLs. This was the first study to quantify the frequency that nurse-administered PSA was used in the CCL setting and to characterise associated nursing practices. It was found that nearly all CCLs utilise nurse-administered PSA (94%). Of note, by characterising nurse-administered PSA in Australian and New Zealand CCLs, several strategies to improve practice, such as setting up protocols for patient monitoring and establishing comprehensive PSA education for CCL nurses, were identified. The third study in Phase Two was a matched case-control study of risk factors for impaired respiratory function during nurse-administered PSA in the CCL setting. Patients with acute illness were found to be nearly twice as likely to experience impaired respiratory function during nurse-administered PSA (OR=1.78; 95%CI=1.19-2.67; p=0.005). These significant findings can now be used to inform prospective studies investigating the effectiveness of interventions for impaired respiratory function during nurse-administered PSA in the CCL. The objective of the third and final phase of the program of research was to develop recommendations for practice. To achieve this objective, a synthesis of findings from the previous phases of the program of research informed a modified Delphi study, which was conducted to develop a set of clinical practice guidelines for nurse-administered PSA in the CCL. The clinical practice guidelines that were developed set current best practice standards for pre-procedural patient assessment and risk screening practices as well as the intra and post-procedural patient monitoring practices that nurses who administer PSA in the CCL should undertake in order to deliver safe, evidence-based and consistent care to the many patients who undergo procedures in this setting. In summary, the mixed methods approach that was used clearly enabled the research objectives to be comprehensively addressed in an informed sequential manner, and, as a consequence, this thesis has generated a substantial amount of new knowledge to inform and support nurse-led sedation practice in the CCL context. However, a limitation of the research to note is that the comprehensive appraisal of the evidence conducted, combined with the guideline development process, highlighted that there were numerous deficiencies in the evidence base. As such, rather than being based on high-level evidence, many of the recommendations for practice were produced by consensus. For this reason, further research is required in order to ascertain which specific practices result in the most optimal patient and health service outcomes. Therefore, along with necessary guideline implementation and evaluation projects, post-doctoral research is planned to follow up on the research gaps identified, which are planned to form part of a continuing program of research in this field.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a tool for automatic analysis of computational indistinguishability between two strings of information. This is designed as a generic tool for proving cryptographic security based on a formalism that provides computational soundness preservation. The tool has been implemented and tested successfully with several cryptographic schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Practice-led journalism research techniques were used in this study to produce a ‘first draft of history’ recording the human experience of survivors and rescuers during the January 2011 flash flood disaster in Toowoomba and the Lockyer Valley in Queensland, Australia. The study aimed to discover what can be learnt from engaging in journalistic reporting of natural disasters. This exegesis demonstrates that journalism can be both a creative practice and a research methodology. About 120 survivors, rescuers and family members of victims participated in extended interviews about what happened to them and how they survived. Their stories are the basis for two creative outputs of the study: a radio documentary and a non-fiction book, that document how and why people died, or survived, or were rescued. Listeners and readers are taken "into the flood" where they feel anxious for those in peril, relief when people are saved, and devastated when babies, children and adults are swept away to their deaths. In undertaking reporting about the human experience of the floods, several significant elements about journalistic reportage of disasters were exposed. The first related to the vital role that the online social media played during the disaster for individuals, citizen reporters, journalists and emergency services organisations. Online social media offer reporters powerful new reporting tools for both gathering and disseminating news. The second related to the performance of journalists in covering events involving traumatic experiences. Journalists are often required to cover trauma and are often amongst the first-responders to disasters. This study found that almost all of the disaster survivors who were approached were willing to talk in detail about their traumatic experiences. A finding of this project is that journalists who interview trauma survivors can develop techniques for improving their ability to interview people who have experienced traumatic events. These include being flexible with interview timing and selecting a location; empowering interviewees to understand they don’t have to answer every question they are asked; providing emotional security for interviewees; and by being committed to accuracy. Survivors may exhibit posttraumatic stress symptoms but some exhibit and report posttraumatic growth. The willingness of a high proportion of the flood survivors to participate in the flood research made it possible to document a relatively unstudied question within the literature about journalism and trauma – when and why disaster survivors will want to speak to reporters. The study sheds light on the reasons why a group of traumatised people chose to speak about their experiences. Their reasons fell into six categories: lessons need to be learned from the disaster; a desire for the public to know what had happened; a sense of duty to make sure warning systems and disaster responses to be improved in future; personal recovery; the financial disinterest of reporters in listening to survivors; and the timing of the request for an interview. Feedback to the creative-practice component of this thesis - the book and radio documentary - shows that these issues are not purely matters of ethics. By following appropriate protocols, it is possible to produce stories that engender strong audience responses such as that the program was "amazing and deeply emotional" and "community storytelling at its most important". Participants reported that the experience of the interview process was "healing" and that the creative outcome resulted in "a very precious record of an afternoon of tragedy and triumph and the bitter-sweetness of survival".

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud provider. The method is based on combining existing proof-of-storage schemes with distance-bounding protocols. Specifically, cloud customers will be able to verify the confidentiality, integrity, availability, fairness (or mutual non-repudiation), data freshness, geographic assurance and replication of their stored data directly, without having to rely on the word of the cloud provider.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mesenchymal stem cells (MSCs) represent multipotent stromal cells that can differentiate into a variety of cell types, including osteoblasts (bone cells), chondrocytes (cartilage cells), and adipocytes (fat cells). Their multi-potency provides a great promise as a cell source for tissue engineering and cell-based therapy for many diseases, particularly bone diseases and bone formation. To be able to direct and modulate the differentiation of MSCs into the desired cell types in situ in the tissue, nanotechnology is introduced and used to facilitate or promote cell growth and differentiation. These nano-materials can provide a fine structure and tuneable surface in nanoscales to help the cell adhesion and promote the cell growth and differentiation of MSCs. This could be a dominant direction in future for stem cells based therapy or tissue engineering for various diseases. Therefore, the isolation, manipulation, and differentiation of MSCs are very important steps to make meaningful use of MSCs for disease treatments. In this chapter, we have described a method of isolating MSC from human bone marrow, and how to culture and differentiate them in vitro. We have also provided research methods on how to use MSCs in an in vitro model and how to observe MSC biological response on the surface of nano-scaled materials.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Currently, mass spectrometry-based metabolomics studies extend beyond conventional chemical categorization and metabolic phenotype analysis to understanding gene function in various biological contexts (e.g., mammalian, plant, and microbial). These novel utilities have led to many innovative discoveries in the following areas: disease pathogenesis, therapeutic pathway or target identification, the biochemistry of animal and plant physiological and pathological activities in response to diverse stimuli, and molecular signatures of host-pathogen interactions during microbial infection. In this review, we critically evaluate the representative applications of mass spectrometry-based metabolomics to better understand gene function in diverse biological contexts, with special emphasis on working principles, study protocols, and possible future development of this technique. Collectively, this review raises awareness within the biomedical community of the scientific value and applicability of mass spectrometry-based metabolomics strategies to better understand gene function, thus advancing this application's utility in a broad range of biological fields

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current forensic practice in age estimation relies on the application of morphological standards as a means to characterize complex threedimensional skeletal surfaces. Research in our laboratory has demonstrated that the application of the morphologically based Suchey-Brooks method to a contemporary Queensland, Australian population demonstrated significant inaccuracy in age-estimation. Consequently, this study presents preliminary results to quantify age-related skeletal changes of the pubic symphysis in Queensland individuals using novel geometric and micro-architectural protocols that have the potential of improving age estimation in the forensic context. Computed tomography scans of the right and left pubis were obtained from Caucasian individuals aged 15–70 years (n=195) from the Queensland Health Forensic and Scientific Services. Morphometric variables including surface area, circumference, maximum height and width of the symphyseal surface, and micro-architectural assessment of cortical and trabecular bone structure were conducted in Rapidform XOS and Osteomeasure, respectively. Morphometric analysis demonstrated increases in maximum height and width of the surface with age independent of gender, with most significant (P<0.05) changes between the 25–34 and 55–64 year subsets. Sexual dimorphism and bilateral asymmetry were prominent features in the Queensland population. Micro-architectural analysis demonstrated degradation of cortical composition with age, with differential bone resorption between the medial, ventral and dorsal aspects of the symphysis. The ability to quantitatively model age-related changes to the pubic symphysis provides potential for future methodological refinement, where rigor and robust geometric assessment of the surface may remove the subjectivity associated with aging the pubic symphysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Establishing age-at-death for skeletal remains is a vital component of forensic anthropology. The Suchey-Brooks (S-B) method of age estimation has been widely utilised since 1986 and relies on a visual assessment of the pubic symphyseal surface in comparison to a series of casts. Inter-population studies (Kimmerle et al., 2005; Djuric et al., 2007; Sakaue, 2006) demonstrate limitations of the S-B method, however, no assessment of this technique specific to Australian populations has been published. Aim: This investigation assessed the accuracy and applicability of the S-B method to an adult Australian Caucasian population by highlighting error rates associated with this technique. Methods: Computed tomography (CT) and contact scans of the S-B casts were performed; each geometrically modelled surface was extracted and quantified for reference purposes. A Queensland skeletal database for Caucasian remains aged 15 – 70 years was initiated at the Queensland Health Forensic and Scientific Services – Forensic Pathology Mortuary (n=350). Three-dimensional reconstruction of the bone surface using innovative volume visualisation protocols in Amira® and Rapidform® platforms was performed. Samples were allocated into 11 sub-sets of 5-year age intervals and changes associated with the surface geometry were quantified in relation to age, gender and asymmetry. Results: Preliminary results indicate that computational analysis was successfully applied to model morphological surface changes. Significant differences in observed versus actual ages were noted. Furthermore, initial morphological assessment demonstrates significant bilateral asymmetry of the pubic symphysis, which is unaccounted for in the S-B method. These results propose refinements to the S-B method, when applied to Australian casework. Conclusion: This investigation promises to transform anthropological analysis to be more quantitative and less invasive using CT imaging. The overarching goal contributes to improving skeletal identification and medico-legal death investigation in the coronial process by narrowing the range of age-at-death estimation in a biological profile.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

eHealth systems promise enviable benefits and capabilities for healthcare delivery. However, the technologies that make these capabilities possible introduce undesirable drawbacks such as information security related threats, which need to be appropriately addressed. Lurking in these threats are information privacy concerns. Addressing them has proven to be difficult because they often conflict with information access requirements of healthcare providers. Therefore, it is important to achieve an appropriate balance between these requirements. We contend that information accountability (IA) can achieve this balance. In this paper, we introduce accountable-eHealth (AeH) systems, which are eHealth systems that utilise IA as a measure of information privacy. We discuss how AeH system protocols can successfully achieve the aforementioned balance of requirements. As a means of implementation feasibility, we compare characteristics of AeH systems with Australia’s Personally Controlled Electronic Health Record (PCEHR) sys-tem and identify similarities and highlight the differences and the impact those differences would have to the eHealth domain.