818 resultados para security and protection
Resumo:
International evidence confirms that early childhood educators can enter professional practice unprepared for child protection due to inadequate pre-service preparation. This paper makes an original contribution by using the Child Protection Questionnaire for Educators (CPQE) to examine the pre- and post- intervention child maltreatment and protection knowledge of early childhood and primary teaching students. While students’ knowledge increases significantly after participating in a child protection training programme, Pastoral Pathways, as part of their undergraduate study, post-intervention scores vary between groups. The study provides evidence of programme effectiveness and future training needs of pre-service educators. Findings are relevant to teacher educators and child care training providers in relation to programme content development and evidencing knowledge and skills acquisition.
Resumo:
The synthesis and in vitro evaluation of four cationic lipid gene delivery vectors, characterized by acyclic or macrocyclic, and saturated or unsaturated hydrophobic regions, is described. The synthesis employed standard protocols, including ring-closing metathesis for macrocyclic lipid construction. All lipoplexes studied, formulated from plasmid DNA and a liposome composed of a synthesized lipid, 1,2-dimyristoyl-sn-glycero-3-ethylphosphocholine (EPC), and either 1,2-dioleoyl-sn-glycero-3-phosphoethanolamine (DOPE) or cholesterol as co-lipid, exhibited plasmid DNA binding and protection from DNase I degradation, and concentration dependent cytotoxicity using Chinese hamster ovary-K1 cells. The transfection efficiency of formulations with cholesterol outperformed those with DOPE, and in many cases the EPC/cholesterol control, and formulations with a macrocyclic lipid (+/- 10:1) outperformed their acyclic counterparts (+/- 3:1).
Resumo:
Automatic gender classification has many security and commercial applications. Various modalities have been investigated for gender classification with face-based classification being the most popular. In some real-world scenarios the face may be partially occluded. In these circumstances a classification based on individual parts of the face known as local features must be adopted. We investigate gender classification using lip movements. We show for the first time that important gender specific information can be obtained from the way in which a person moves their lips during speech. Furthermore our study indicates that the lip dynamics during speech provide greater gender discriminative information than simply lip appearance. We also show that the lip dynamics and appearance contain complementary gender information such that a model which captures both traits gives the highest overall classification result. We use Discrete Cosine Transform based features and Gaussian Mixture Modelling to model lip appearance and dynamics and employ the XM2VTS database for our experiments. Our experiments show that a model which captures lip dynamics along with appearance can improve gender classification rates by between 16-21% compared to models of only lip appearance.
Resumo:
This article reviews ongoing work to increase awareness of, and raise standards in relation to, freedom of peaceful assembly across Europe, the South Caucasus, and Central Asia. The work is led by the Office of Democratic Institutions and Human Rights (ODIHR) at the Organisation of Security and Co-operation in Europe (OCSE). The article begins by highlighting the importance of freedom of peaceful assembly within democratic societies, and then describes the development of the ODIHR Guidelines on Peaceful Assembly. The article outlines some of the key issues of contention relating to the regulation of freedom of assembly, and discusses the process of reviewing the existing and draft legislation against the standards articulated in the Guidelines. In this context, the article also explores the potential for constructive engagement between government, civil society, and the OSCE to facilitate legislative amendments that respect key human rights norms and principles. Finally, the article reviews recent developments in training monitors of public assemblies with the aim of building local monitoring capacity and thus developing an evidence base of the practical implementation of laws relating to freedom of peaceful assembly. © The Author (2009). Published by Oxford University Press. All rights reserved.
Resumo:
A PMU based WAMS is to be placed on a weakly coupled section of distribution grid, with high levels of distributed generation. In anticipation of PMU data a Siemens PSS/E model of the electrical environment has been used to return similar data to that expected from the WAMS. This data is then used to create a metric that reflects optimization, control and protection in the region. System states are iterated through with the most desirable one returning the lowest optimization metric, this state is assessed against the one returned by PSS/E under normal circumstances. This paper investigates the circumstances that trigger SPS in the region, through varying generation between 0 and 110% and compromising the network through line loss under summer minimum and winter maximum conditions. It is found that the optimized state can generally tolerate an additional 2 MW of generation (3% of total) before encroaching the same thresholds and in one instance moves the triggering to 100% of generation output.
Resumo:
Many children and young people in conflict with the law in Northern Ireland have experienced living in poverty, truancy or exclusion from school, limited educational attainment, neglect or abuse within their families, placement in alternative care, drug or alcohol misuse, physical and mental ill-health. However, their lives are also affected by the legacy and particular circumstances of a society in transition from conflict. In addition to historical under-investment in services for children and their families, this includes discriminatory policing alongside informal regulation by ‘paramilitaries’ or members of ‘the community’ and community-based restorative justice schemes as an alternative way of dealing with low-level crime and ‘anti-social’ behaviour.
Following a Criminal Justice Review, the 2002 Justice (Northern Ireland) Act affirmed that the principal aim of the youth justice system is to protect the public by preventing offending by children’. Youth justice initiatives therefore encompass a range of responses: early intervention to prevent offending and the application of civil Anti-Social Behaviour Orders, diversionary measures (including community-based restorative justice schemes), non-custodial disposals for those found guilty of offences, and custodial sentences. While ‘policy transfer’ prevailed during periods of ‘direct rule’ from Westminster, the punitive responses to ‘sub-criminal’ and ‘anti-social’ behaviour introduced by the 1998 Crime and Disorder Act in England and Wales were resisted or not implemented in the same way in Northern Ireland.
This Chapter will critically analyse the debates informing recent developments, noting key issues raised by the 2011 review of youth justice initiated as a priority following the devolution of justice and policing to the Northern Ireland Assembly. It will focus on promotion and protection of the rights of children and young people in conflict with the law.
Resumo:
Nanotechnology has emerged as a technological advancement that could develop and transform the entire agri-food sector, with the potential to increase agricultural productivity, food security and economic growth for industries. Though as still a relatively new concept there are concerns over its safety, regulation and acceptance by the industry and consumers. This review set out to address the implications of nanotechnology for the agri-food industry by examining the potential benefits, risks and opportunities. Existing scientific gaps in knowledge are believed to be a prohibitive factor in addition to uncertainties in the level of awareness and attitudes towards the use of nanotechnology by the industry.
Resumo:
NAD(P)H quinone oxidoreductase 1 is involved in antioxidant defence and protection from cancer, stabilizing the apoptosis regulator p53 towards degradation. Here, we studied the enzymological, biochemical and biophysical properties of two cancer-associated variants (p.R139W and p.P187S). Both variants (especially p.187S) have lower thermal stability and greater susceptibility to proteolysis compared to the wild-type. p.P187S also has reduced activity due to a lower binding affinity for the FAD cofactor as assessed by activity measurements and direct titrations. Native gel electrophoresis and dynamic light scattering also suggest that p.P187S has a higher tendency to populate unfolded states under native conditions. Detailed thermal stability studies showed that all variants irreversibly denature causing dimer dissociation, while addition of FAD restores the stability of the polymorphic forms to wild-type levels. The kinetic destabilization induced by polymorphisms as well as the kinetic protection exerted by FAD was confirmed by measuring denaturation kinetics at temperatures close to physiological. Our data suggest that the main molecular mechanisms associated with these cancer-related variants are their low binding affinity for FAD and/or kinetic instability. Thus, pharmacological chaperones may be useful in the treatment of patients bearing these polymorphisms.
Resumo:
Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.
Resumo:
Many graph datasets are labelled with discrete and numeric attributes. Most frequent substructure discovery algorithms ignore numeric attributes; in this paper we show how they can be used to improve search performance and discrimination. Our thesis is that the most descriptive substructures are those which are normative both in terms of their structure and in terms of their numeric values. We explore the relationship between graph structure and the distribution of attribute values and propose an outlier-detection step, which is used as a constraint during substructure discovery. By pruning anomalous vertices and edges, more weight is given to the most descriptive substructures. Our method is applicable to multi-dimensional numeric attributes; we outline how it can be extended for high-dimensional data. We support our findings with experiments on transaction graphs and single large graphs from the domains of physical building security and digital forensics, measuring the effect on runtime, memory requirements and coverage of discovered patterns, relative to the unconstrained approach.
Resumo:
A PSS/E 32 model of a real section of the Northern Ireland electrical grid was dynamically controlled with Python 2.5. In this manner data from a proposed wide area monitoring system was simulated. The area is of interest as it is a weakly coupled distribution grid with significant distributed generation. The data was used to create an optimization and protection metric that reflected reactive power flow, voltage profile, thermal overload and voltage excursions. Step changes in the metric were introduced upon the operation of special protection systems and voltage excursions. A wide variety of grid conditions were simulated while tap changer positions and switched capacitor banks were iterated through; with the most desirable state returning the lowest optimization and protection metric. The optimized metric was compared against the metric generated from the standard system state returned by PSS/E. Various grid scenarios were explored involving an intact network and compromised networks (line loss) under summer maximum, summer minimum and winter maximum conditions. In each instance the output from the installed distributed generation is varied between 0 MW and 80 MW (120% of installed capacity). It is shown that in grid models the triggering of special protection systems is delayed by between 1 MW and 6 MW (1.5% to 9% of capacity), with 3.5 MW being the average. The optimization and protection metric gives a quantitative value for system health and demonstrates the potential efficacy of wide area monitoring for protection and control.
Resumo:
CCAAT enhancer binding protein α (C/EBPα) plays an essential role in cellular differentiation, growth, and energy metabolism. Here, we investigate the correlation between C/EBPα and hepatocellular carcinoma (HCC) patient outcomes and how C/EBPα protects cells against energy starvation. Expression of C/EBPα protein was increased in the majority of HCCs examined (191 pairs) compared with adjacent nontumor liver tissues in HCC tissue microarrays. Its upregulation was correlated significantly with poorer overall patient survival in both Kaplan-Meier survival (P = 0.017) and multivariate Cox regression (P = 0.028) analyses. Stable C/EBPα-silenced cells failed to establish xenograft tumors in nude mice due to extensive necrosis, consistent with increased necrosis in human C/EBPα-deficient HCC nodules. Expression of C/EBPα protected HCC cells in vitro from glucose and glutamine starvation-induced cell death through autophagy-involved lipid catabolism. Firstly, C/EBPα promoted lipid catabolism during starvation, while inhibition of fatty acid beta-oxidation significantly sensitized cell death. Secondly, autophagy was activated in C/EBPα-expressing cells, and the inhibition of autophagy by ATG7 knockdown or chloroquine treatment attenuated lipid catabolism and subsequently sensitized cell death. Finally, we identified TMEM166 as a key player in C/EBPα-mediated autophagy induction and protection against starvation.
CONCLUSION: The C/EBPα gene is important in that it links HCC carcinogenesis to autophagy-mediated lipid metabolism and resistance to energy starvation; its expression in HCC predicts poorer patient prognosis.