841 resultados para stated risks
Resumo:
Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.
Resumo:
This paper presents results from three studies in 25 custodial facilities in three Australian states, including nutrient analyses of menus and focus groups exploring inmate attitudes. Both cook-fresh and cook-chill production systems are used. Non-selective cycle menus of 4-6 weeks are common but inmates can supplement meals by purchase of additional food items (‘buy-ups’). Menus included adequate variety and met most nutritional standards, with the possible exception of fruit. The sodium content of menus is above recommended levels. Protein, fibre, vitamins A, C, thiamin, riboflavin, calcium, iron and zinc were more than adequate, and the percentage energy from fat is close to or meets national recommendations. Focus groups identified 16 themes, including meal quality, food available at ‘buy-ups’, cooking facilities, and concerns about possible food safety risks associated with inmates storing food in cells. Many complaints were about factors not under the control of the foodservice manager.
Resumo:
Rodenticide use in agriculture can lead to the secondary poisoning of avian predators. Currently the Australian sugarcane industry has two rodenticides, Racumin® and Rattoff®, available for in-crop use but, like many agricultural industries, it lacks an ecologically-based method of determining the potential secondary poisoning risk the use of these rodenticides poses to avian predators. The material presented in this thesis addresses this by: a. determining where predator/prey interactions take place in sugar producing districts; b. quantifying the amount of rodenticide available to avian predators and the probability of encounter; and c. developing a stochastic model that allows secondary poisoning risk under various rodenticide application scenarios to be investigated. Results demonstrate that predator/prey interactions are highly constrained by environmental structure. Rodents used crops that provided high levels of canopy cover and therefore predator protection and poorly utilised open canopy areas. In contrast, raptors over-utilised areas with low canopy cover and low rodent densities, but which provided high accessibility to prey. Given this pattern of habitat use, and that industry baiting protocols preclude rodenticide application in open canopy crops, these results indicate that secondary poisoning can only occur if poisoned rodents leave closed canopy crops and become available for predation in open canopy areas. Results further demonstrate that after in-crop rodenticide application, only a small proportion of rodents available in open areas are poisoned and that these rodents carry low levels of toxicant. Coupled with the low level of rodenticide use in the sugar industry, the high toxic threshold raptors have to these toxicants and the low probability of encountering poisoned rodents, results indicate that the risk of secondary poisoning events occurring is minimal. A stochastic model was developed to investigate the effect of manipulating factors that might influence secondary poisoning hazard in a sugarcane agro-ecosystem. These simulations further suggest that in all but extreme scenarios, the risk of secondary poisoning is also minimal. Collectively, these studies demonstrate that secondary poisoning of avian predators associated with the use of the currently available rodenticides in Australian sugar producing districts is minimal. Further, the ecologically-based method of assessing secondary poisoning risk developed in this thesis has broader applications in other agricultural systems where rodenticide use may pose risks to avian predators.
Resumo:
This paper reports on the development of a school-based intervention to reduce risk-taking and associated injuries. There is limited but important evidence that intervention design should ensure participation does not lead to an increase in target risk behaviors with some studies in alcohol and drug prevention finding unexpected negative effects. The short-term evaluation of Skills for Preventing Injury in Youth (SPIY) examined change in interpersonal violence, alcohol and transport-related risks. Intervention (n = 360) and comparison (n = 180) students were surveyed pre/post-intervention. A qualitative analysis based on focus groups (70 students) explored experiences of change. Findings indicate significant positive changes reinforced by students’ reports. A decrease in reported risk-taking for the intervention group and an increase in the comparison group were observed. These findings endorse SPIY as a useful curriculum approach to reducing injuries and lend support to the future conduct of a long-term outcome evaluation.
Resumo:
This paper reports on a study investigating preferred driving speeds and frequency of speeding of 320 Queensland drivers. Despite growing community concern about speeding and extensive research linking it to road trauma, speeding remains a pervasive, and arguably, socially acceptable behaviour. This presents an apparent paradox regarding the mismatch between beliefs and behaviours, and highlights the necessity to better understand the factors contributing to speeding. Utilising self-reported behaviour and attitudinal measures, results of this study support the notion of a speed paradox. Two thirds of participants agreed that exceeding the limit is not worth the risks nor is it okay to exceed the posted limit. Despite this, more than half (58.4%) of the participants reported a preference to exceed the 100km/hour speed limit, with one third preferring to do so by 10 to 20 km/hour. Further, mean preferred driving speeds on both urban and open roads suggest a perceived enforcement tolerance of 10%, suggesting that posted limits have limited direct influence on speed choice. Factors that significantly predicted the frequency of speeding included: exposure to role models who speed; favourable attitudes to speeding; experiences of punishment avoidance; and the perceived certainty of punishment for speeding. These findings have important policy implications, particularly relating to the use of enforcement tolerances.
Resumo:
Adolescents experience many benefits from bicycling; however, there are also potentially significant injury consequences. One effective counter-measure for the prevention of adolescent bicycling injuries is to promote bicycle helmet wearing. An overview is provided of injury risks of bicycle riding with particular attention to the role of helmet wearing and associated countermeasures such as legislation and school and community approaches. The findings are presented of a study conducted in Australia that examined the effectiveness of a theory-based injury prevention program, Skills for Preventing Injury in Youth (SPIY) for ninth-grade students (age 13 to 14 years). The findings showed a significant, 20.2% decrease in cycling without a helmet among the intervention students (n = 360) and no change for the students in the comparison group (n = 363) after 6 months. In addition, it was found that failing to wear a helmet was significantly associated with engaging in other transport-related risks, being male, having friends who do not wear a helmet and are specific targets of change in the SPIY program, showing a negative attitude toward risk, failing to intervene in friends' risk-taking, and having low knowledge of first aid. Overall, the SPIY program appeared to be an effective theory-based intervention to increase helmet wearing among early adolescents, a group not often targeted in school and community helmet-wearing programs.
Resumo:
Mirroring the trends in other developed countries, levels of household debt in Australia have risen markedly in recent years. As one example, the total amount lent by banks to individuals has risen from $175.5 billion in August 1995 to $590.5 billion in August 2005.1 Consumer groups an~ media commentators here have long raised concerns about the risks of increasing levels of household debt and over-commitment, linking these issues at least in part to irresponsible lending practices. And more recently, the Reserve Bank Governor has also expressed concerns about the ability 'of some households to manage if personal or economic circumstances change.2
Resumo:
Cyber bullying – or bullying through the use of technology – is a growing phenomenon which is currently most commonly experienced by young people and the consequences manifested in schools. Cyber bullying shares many of the same attributes as face-to-face bullying such as a power imbalance and a sense of helplessness on the part of the target. Not surprisingly, targets of face-to-face bullying are increasingly turning to the law, and it is likely that targets of cyber bullying may also do so in an appropriate case. This article examines the various criminal, civil and vilification laws that may apply to cases of cyber bullying and assesses the likely effectiveness of these laws as a means of redressing that power imbalance between perpetrator and target.
Resumo:
The Queensland University of Technology (QUT) is known for several flagship eResearch centres. It also has a number of mature, centralised research support services that address a several of areas of eResearch. The university has openly stated its aspiration to be an institution with a strongly embedded eResearch capability and to this end it has expressed the desire to establish a university-wide eResearch support service. However, articulating this desire is much easier than realising it. During 2008 QUT undertook a major review into eResearch that made recommendations on the development of university-wide eResearch support service and the building of eResearch capabilities and capacity throughout the university. The results of this review were reported last year at this conference. In 2009, QUT is progressing a second, follow-on project – Building eResearch Support Capability and Capacity. It has been designed to build upon existing strengths in HPC, repositories, data management, and the delivery of integrated skills for eresearch. The purpose of this presentation is to give an update on QUT’s journey, one year on from its first major report into eResearch. It will outline how the university is approaching this challenge, the current work being carried out and the strategies being employed. We will also discuss the lessons learned.
Resumo:
The case study of Lusoponte illustrates the concession awarded by the Portuguese Government to finance, design, build and operate two bridges over the Tagus in Lisbon, Portugal. It includes an overview of the project's background and an analysis of the main risk categories stating both the actual risks encountered and the mitigation measures adopted. Throughout the project a great attention was given to whole life cycle costs, and gains in efficiency and cost control. Among the lessons that can be learned from both the public and private sector is that a complete risk management analysis must include not only the technical factors but also a realistic assessment of environmental and social risks. These were the risks that were somewhat overseen and that caused the main problems to the project's development.
Resumo:
In the paper, the flow-shop scheduling problem with parallel machines at each stage (machine center) is studied. For each job its release and due date as well as a processing time for its each operation are given. The scheduling criterion consists of three parts: the total weighted earliness, the total weighted tardiness and the total weighted waiting time. The criterion takes into account the costs of storing semi-manufactured products in the course of production and ready-made products as well as penalties for not meeting the deadlines stated in the conditions of the contract with customer. To solve the problem, three constructive algorithms and three metaheuristics (based one Tabu Search and Simulated Annealing techniques) are developed and experimentally analyzed. All the proposed algorithms operate on the notion of so-called operation processing order, i.e. the order of operations on each machine. We show that the problem of schedule construction on the base of a given operation processing order can be reduced to the linear programming task. We also propose some approximation algorithm for schedule construction and show the conditions of its optimality.
Resumo:
This project aims to develop a methodology for designing and conducting a systems engineering analysis to build and fly continuously, day and night, propelled uniquely by solar energy for one week with a 0.25Kg payload consuming 0.5 watt without fuel or pollution. An airplane able to fly autonomously for many days could find many applications. Including coastal or border surveillance, atmospherical and weather research and prediction, environmental, forestry, agricultural, and oceanic monitoring, imaging for the media and real-estate industries, etc. Additional advantages of solar airplanes are their low cost and the simplicity with which they can be launched. For example, in the case of potential forest fire risks during a warm and dry period, swarms of solar airplanes, easily launched with the hand, could efficiently monitor a large surface, reporting rapidly any fire starts. This would allow a fast intervention and thus reduce the cost of such disaster, in terms of human and material losses. At higher dimension, solar HALE platforms are expected to play a major role as communication relays and could replace advantageously satellites in a near future.
Resumo:
The global financial crisis has highlighted the vulnerability of our economy to systemic risks. While its causes are numerous and relate to complex problems deeply embedded in capital markets, ‘short-termism’ (excessive focus on short-term outcomes at the expense of long-term wealth creation and sustainability) has frequently been flagged as a major contributor to this crisis. Although short-termism is not new, the global financial crisis has highlighted the presence of short-termism among institutional investors, and the failure of global markets and regulators to deal with such perverse and destructive behaviour (Guyatt 2009). Solutions are clearly needed. Although there is a body of research that provides evidence of the presence of short-termism in capital markets and the consequences of short-term decision-making on the financial wellbeing of both individuals and organisations, there is no consensus on mitigating solutions to short-termism. What emerges from the literature is the need to take a broad interdisciplinary perspective in seeking solutions to the problem.
Resumo:
What does it mean when we design for accessibility, inclusivity and "dissolving boundaries" -- particularly those boundaries between the design philosophy, the software/interface actuality and the stated goals? This paper is about the principles underlying a research project called 'The Little Grey Cat engine' or greyCat. GreyCat has grown out of our experience in using commercial game engines as production environments for the transmission of culture and experience through the telling of individual stories. The key to this endeavour is the potential of the greyCat software to visualize worlds and the manner in which non-formal stories are intertwined with place. The apparently simple dictum of "show, don't tell" and the use of 3D game engines as a medium disguise an interesting nexus of problematic issues and questions, particularly in the ramifications for cultural dimensions and participatory interaction design. The engine is currently in alpha and the following paper is its background story. In this paper we discuss the problematic, thrown into sharp relief by a particular project, and we continue to unpack concepts and early designs behind the greyCat itself.
Resumo:
This paper examines accountability in the context of New Zealand's state-owned enterprises (SOEs), and considers an accountability framework which extends beyond traditional (upward and outward) dimensions. While traditional accountability dimensions are clearly detailed in the legislation, less clear are the dilemmas and contradictions faced by SOEs, balancing multiple interests, and at times, conflicting objectives. These issues are explored through interviews conducted in two phases over a two year period with senior executives from 12 of the then 17 SOEs operating in New Zealand. Findings reveal a number of dimensions of accountability that extend beyond current conceptualisations of accountability in the public sector, often including multiple directions of accountability. Implications suggest the need for a more explicit framework of accountability relevant to the SOE context, which may serve useful in identifying potential pathways to conflict mitigation.