918 resultados para collision attack
Resumo:
Detailed mechanisms for the formation of hydroxyl or alkoxyl radicals in the reactions between tetrachloro-p-benzoquinone (TCBQ) and organic hydroperoxides are crucial for better understanding the potential carcinogenicity of polyhalogenated quinones. Herein, the mechanism of the reaction between TCBQ and H2O2 has been systematically investigated at the B3LYP/6-311++G** level of theory in the presence of different numbers of water molecules. We report that the whole reaction can easily take place with the assistance of explicit water molecules. Namely, an initial intermediate is formed first. After that, a nucleophilic attack of H2O2 onto TCBQ occurs, which results in the formation of a second intermediate that contains an OOH group. Subsequently, this second intermediate decomposes homolytically through cleavage of the O-O bond to produce a hydroxyl radical. Energy analyses suggest that the nucleophilic attack is the rate-determining step in the whole reaction. The participation of explicit water molecules promotes the reaction significantly, which can be used to explain the experimental phenomena. In addition, the effects of F, Br, and CH3 substituents on this reaction have also been studied.
Resumo:
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermarking schemes. We consider vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked %(medical or other digital) images, where they could still be verified as authentic, though they are actually not. Experimental results successfully demonstrate the practicability and consequences of the proposed attacks for some relevant schemes. The development of the proposed attack models can be used as a means to systematically examine the security levels of similar watermarking schemes.
Resumo:
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.
Resumo:
This thesis investigates and develops techniques for accurately detecting Internet-based Distributed Denial-of-Service (DDoS) Attacks where an adversary harnesses the power of thousands of compromised machines to disrupt the normal operations of a Web-service provider, resulting in significant down-time and financial losses. This thesis also develops methods to differentiate these attacks from similar-looking benign surges in web-traffic known as Flash Events (FEs). This thesis also addresses an intrinsic challenge in research associated with DDoS attacks, namely, the extreme scarcity of public domain datasets (due to legal and privacy issues) by developing techniques to realistically emulate DDoS attack and FE traffic.
Resumo:
Indigenous peoples have survived the most inhumane acts and violations against them. Despite acts of genocide, Aboriginal Australians and Native Americans have survived. The impact of the past 500 years cannot be separated from understandings of education for Native Americans in the same way that the impact of the past 220 years cannot be separated from the understandings of Australian Aboriginal people’s experiences of education. This chapter is about comparisons in Aboriginal and Native American communities and their collision with the dominant, white European settlers who came to Australia and America. Chomsky (Intervention in Vietnam and Central America: parallels and differences. In: Peck J (ed) The Chomsky Reader. Pantheon Books, New York, p 315, 1987) once remarked that if one took two historical events and compared them for similarities and differences, you would find both. The real test was whether on the similarities they were significant. The position of the coauthors of this chapter is in the affirmative and we take this occasion to lay them out for analysis and review. The chapter begins with a discussion of the historical legacy of oppression and colonization impacting upon Indigenous peoples in Australia and in the United States, followed by a discussion of the plight of Indigenous children in a specific State in America. Through the lens of social justice, we examine those issues and attitudes that continue to subjugate these same peoples in the economic and educational systems of both nations. The final part of the chapter identifies some implications for school leadership.
Resumo:
This paper reports on current research work with children and young people on the importance of public and private space for good health, wellbeing, social, educational and developmental outcomes. In many urban locations in Australia and elsewhere, public space is under attack from developers and attempts by authorities to control public space (Watson 2006). Private space in the home and garden-backyard is also under attack from development densification and trends towards bigger houses on smaller plots of land where gardens disappear altogether or a postage stamp remains (Gleeson and Sipe 2006). At the same time public policy advocates the benefits of outdoor exercise, set alongside fears about using public space exacerbated by notions of ‘stranger danger’ and control measures such as child and youth ‘curfews’. In this increasingly complex context, it is important to discover what children and young people value and need most in using private (home) and public space. In conjunction with the University of Otago, New Zealand, children and young people are consulted to discover how they use public space in parks and shopping centres and home space and the issues encountered and their proposals for improvement, to better inform policy debate, planning and formulation (ARACY 2009).
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
This study is an inquiry into early childhood teacher professional identities. In Australia, workforce reforms in early childhood include major shifts in qualification requirements that call for a university four-year degree-qualified teacher to be employed in child care. This marks a shift in the early years workforce, where previously there was no such requirement. At the same time as these reforms to quality measures are being implemented, and requiring a substantive up skilling of the workforce, there is a growing body of evidence through recent studies that suggests these same four-year degree-qualified early childhood teachers have an aversion to working in child care. Their preferred employment option is to work in the early years of more formal schooling, not in before-school contexts. This collision of agendas warrants investigation. This inquiry is designed to investigate the site at which advocacy for higher qualification requirements meets early childhood teachers who are reluctant to choose child care as a possible career pathway. The key research question for this study is: How are early childhood teachers’ professional identities currently produced? The work of this thesis is to problematise the early childhood teacher in child care through a particular method of discourse analysis. There are two sets of data. The first was a key early childhood political document that read as a "moment of arising" (Foucault, 1984a, p. 83). It is a political document which was selected for its current influence on the early childhood field, and in particular, workforce reforms that call for four-year degree-qualified teachers to work in before-school contexts, including child care. The second data set was generated through four focus group discussions conducted with preservice early childhood teachers. The document and transcripts of the focus groups were both analysed as text, as conceptualised by Foucault (1981). Foucault’s work spans a number of years and a range of philosophical matters. This thesis draws particularly on Foucault’s writings on discourse, power/knowledge, regimes of truth and resistance. In order to consider the production of early childhood teachers’ professional identities, the study is also informed by identity theorists, who have worked on gender, performativity and investment (Davies, 2004/2006; McNay, 1992; Osgood, 2012; Walkerdine, 1990; Weedon, 1997). The ways in which discourses intersect, compete and collide produce the subject (Foucault, 1981) and, in the case of this inquiry, there are a number of competing discourses at play, which produce the early childhood teacher. These particular theories turn particular lenses on the question of professional identities in early childhood, and such a study calls for the application of particular methodologies. Discourse analysis was used as the methodological framework, and the analysis was informed by Foucauldian concepts of discourse. While Foucault did not prescribe a form of discourse analysis as a method, his writings nonetheless provide a valuable framework for illuminating discursive practices and, in turn, how people are affected, through the shifts and distribution of power (Foucault, 1980a). The treatment used with both data sets involved redescription. For the policy document, a technique for reading document-as-text applied a genealogical approach (Foucault, 1984a). For the focus groups, the process of redescription (Rorty, 1989) involved reading talk-as-text. As a method, redescription involves describing "lots and lots of things in new ways until you have created a pattern of linguistic behaviour which will tempt the new generation to adopt it" (Rorty, 1989, p. 9). The development and application of categories (Davies, 2004/2006) built on a poststructuralist theoretical framework and the literature review informed the data analysis method of discourse analysis. Irony provided a rhetorical and playful tool (Haraway, 1991; Rorty, 1989), to look to how seemingly opposing discourses are held together. This opens a space to collapse binary thinking and consider seemingly contradictory terms in a way in which both terms are possible and both are true. Irony resists the choice of one or the other being right, and holds the opposites together in tension. The thesis concludes with proposals for new, ironic categories, which work to bring together seemingly opposing terms, located at sites in the field of early childhood where discourses compete, collide and intersect to produce and maintain early childhood teacher professional identities. The process of mapping these discourses goes some way to investigating the complexities about identities and career choices of early childhood teachers. The category of "the cost of loving" captures the collision between care/love, inherent in child care, and new discourses of investment/economics. Investment/economics has not completely replaced care/love, and these apparent opposites were not read as a binary because both are necessary and both are true (Haraway, 1991). They are held together in tension to produce early childhood teacher professional identities. The policy document under scrutiny was New Directions, released in 2007 by the then opposition ALP leader, Kevin Rudd. The claim was made strongly that the "economic prosperity" of Australia relies on investment in early childhood. The arguments to invest are compelling and the neuroscience/brain research/child development together with economic/investment discourses demand that early childhood is funding is increased. The intersection of these discourses produces professional identities of early childhood teachers as a necessary part of the country’s economy, and thus, worthy of high status. The child care sector and work in child care settings are necessary, with children and the early childhood teacher playing key roles in the economy of the nation. Through New Directions it becomes sayable (Foucault, 1972/1989) that the work the early childhood teacher performs is legitimated and valued. The children are produced as "economic units". A focus on what children are able to contribute to the future economy of the nation re-positions children and produces these "smart productive citizens", making future economic contribution. The early childhood teacher is produced through this image of a child and "the cost of loving" is emphasised. A number of these categories were produced through the readings of the document-as text and the talk-as-text. Two ironic categories were read in the analysis of the transcripts of the focus group discussions, when treated as talk-as-text data: the early childhood teacher as a "heroic victim"; and the early childhood teacher as a "glorified babysitter". This thesis raises new questions about professional identities in early childhood. These new questions might go some way to prompt re-thinking of some government policy, as well as some aspects of early childhood teacher education course design. The images of children and images of child care provide provocations to consider preservice teacher education course design. In particular, how child care, as one of the early childhood contexts, is located, conceptualised and spoken throughout the course. Consideration by course designers and teacher educators of what discourses are privileged in course content —what discourses are diminished or silenced—would go some way to reconceptualising child care within preservice teacher education and challenging dominant ways of speaking child care, and work in child care. This inquiry into early childhood teachers’ professional identities has gone some way to exploring the complexities around the early childhood teacher in child care. It is anticipated that the significance of this study will thus have immediate applicably and relevance for the Australian early childhood policy landscape. The early childhood field is in a state of rapid change, and this inquiry has examined some of the disconnects between policy and practice. Awareness of the discourses that are in play in the field will continue to allow space for conversations that challenge dominant assumptions about child care, work in child care and ways of being an early childhood teacher in child care.
Resumo:
This paper describes a risk model for estimating the likelihood of collisions at low-exposure railway level crossings, demonstrating the effect that differences in safety integrity can have on the likelihood of a collision. The model facilitates the comparison of safety benefits between level crossings with passive controls (stop or give-way signs) and level crossings that have been hypothetically upgraded with conventional or low-cost warning devices. The scenario presented illustrates how treatment of a cross-section of level crossings with low cost devices can provide a greater safety benefit compared to treatment with conventional warning devices for the same budget.
Resumo:
Migraine is a common neurological disease with a genetic basis affecting approximately 12% of the population. Pain during a migraine attack is associated with activation of the trigeminal nerve system, which carries pain signals from the meninges and the blood vessels infusing the meninges to the trigeminal nucleus in the brain stem. The release of inflammatory mediators following cortical spreading depression (CSD) may further promote and sustain the activation and sensitization of meningeal nociceptors, inducing the persistent throbbing headache characterised in migraine. Lymphotoxin α (LTA) is a cytokine secreted by lymphocytes and is a member of the tumour necrosis factor (TNF) family. Genetic variation with the TNF and LTA genes may contribute to threshold brain excitability, propagation of neuronal hyperexcitability and thus initiation and maintenance of a migraine attack. Three LTA variants rs2009658, rs2844482 and rs2229094 were identified in a recent pGWAS study conducted in the Norfolk Island population as being potentially implicated in migraine with nominally significant p values of p = 0.0093, p = 0.0088 and p = 0.033 respectively. To determine whether these SNPs played a role in migraine in a general outbred population these SNPs were gentoyped in a large case control Australian Caucasian population and tested for association with migraine. All three SNPs showed no association in our cohort (p > 0.05). Validation of GWAS data in independent case-controls cohorts is essential to establish risk validity within specific population groups. The importance of cytokines in modulating neural inflammation and pain threshold in addition to other studies showing associations between TNF-α and SNPs in the LTA gene with migraine, suggests that LTA could be an important factor contributing to migraine. Although the present study did not support a role for the tested LTA variants in migraine, investigation of other variants within the LTA gene is still warranted.
Resumo:
BACKGROUND: Transcatheter closure of patent foramen ovale (PFO) has rapidly evolved as the preferred management strategy for the prevention of recurrent cerebrovascular events in patients with cryptogenic stroke and presumed paradoxical embolus. There is limited outcome data in patients treated with this therapy particularly for the newer devices. METHODS: Data from medical records, catheter, and echocardiography databases on 70 PFO procedures performed was collected prospectively. RESULTS: The cohort consisted of 70 patients (mean age 43.6 years, range 19 to 77 years), of whom 51% were male. The indications for closure were cryptogenic cerebrovascular accident (CVA) or transient ischemic attack (TIA) in 64 (91%) and peripheral emboli in two (2.8%) patients and cryptogenic ST-elevation myocardial infarction in one (1.4%), refractory migraine in one (1.4%), decompression sickness in one (1.4%), and orthodeoxia in one (1.4%) patient, respectively. All patients had demonstrated right-to-left shunting on bubble study. The procedures were guided by intracardiac echocardiography in 53%, transesophageal echocardiography in 39%, and the remainder by transthoracic echo alone. Devices used were the Amplatzer PFO Occluder (AGA Medical) (sizes 18-35 mm) in 49 (70%) and the Premere device (St. Jude Medical) in 21 (30%). In-hospital complications consisted of one significant groin hematoma with skin infection. Echocardiographic follow-up at 6 months revealed that most patients had no or trivial residual shunt (98.6%), while one patient (1.4%) had a mild residual shunt. At a median of 11 months' follow-up (range 1 month to 4.3 years), no patients (0%) experienced further CVA/TIAs or paradoxical embolic events during follow-up. CONCLUSION: PFO causing presumed paradoxical embolism can be closed percutaneously with a low rate of significant residual shunting and very few complications. Recurrent index events are uncommon at medium-term (up to 4 years) follow-up.
Resumo:
Introduction Gene expression profiling has enabled us to demonstrate the heterogeneity of breast cancers. The potential of a tumour to grow and metastasise is partly dependant on its ability to initiate angiogenesis or growth and remodelling of new blood vessels, usually from a pre-existing vascular network, to ensure delivery of oxygen, nutrients, and growth factors to rapidly dividing transformed cells along with access to the systemic circulation. Cell–cell signalling of semaphorin ligands through interaction with their plexin receptors is important for the homeostasis and morphogenesis of many tissues and has been widely studied for a role in neural connectivity, cancer, cell migration and immune responses. This study investigated the role of four semaphorin/plexin signalling genes in human breast cancers in vivo and in vitro. Materials and methods mRNA was extracted from formalin fixed paraffin embedded archival breast invasive ductal carcinoma tissue samples of progressive grades (grades I–III) and compared to tissue from benign tumours. Gene expression profiles were determined by microarray using the Affymetrix GeneChip® Human Genome U133 Plus 2.0 Arrays and validated by Q-PCR using a Corbett RotorGene 6000. Following validation, the gene expression profile of the identified targets was correlated with those of the human breast cancer cell lines MCF-7 and MDA-MD-231. Results The array data revealed that 888 genes were found to be significantly (p ≤ 0.05) differentially expressed between grades I and II tumours and 563 genes between grade III and benign tumours. From these genes, we identified four genes involved in semaphorin–plexin signalling including SEMA4D which has previously been identified as being involved in increased angiogenesis in breast cancers, and three other genes, SEMA4F, PLXNA2 and PLXNA3, which in the literature were associated with tumourigenesis, but not directly in breast tumourigenesis. The microarray analysis revealed that SEMA4D was significantly (P = 0.0347) down-regulated in the grade III tumours compared to benign tumours; SEMA4F, was significantly (P = 0.0159) down-regulated between grades I and II tumours; PLXNA2 was significantly (P = 0.036) down-regulated between grade III and benign tumours and PLXNA3 significantly (P = 0.042) up-regulated between grades I and II tumours. Gene expression of SEMA4D was validated using Q-PCR, demonstrating the same expression profile in both data sets. When the sample set was increased to incorporate more cases, SEMA4D continued to follow the same expression profile, including statistical significance for the differences observed and small standard deviations. In vitro the same pattern was present where expression for SEMA4D was significantly higher in MDA-MB-231 cells when compared to MCF-7 cells. The expression of SEMA4F, PLXNA2 and PLXNA3 could not be validated using Q-PCR, however in vitro analysis of these three genes revealed that both SEMA4F and PLXNA3 followed the microarray trend in expression, although they did not reach significance. In contrast, PLXNA2 demonstrated statistical significance and was in concordance with the literature. Discussion We, and others, have proposed SEMA4D to be a gene with a potentially protective effect in benign tumours that contributes to tumour growth and metastatic suppression. Previous data supports a role for SEMA4F as a tumour suppressor in the peripheral nervous system but our data seems to indicate that the gene is involved in tumour progression in breast cancer. Our in vitro analysis of PLXNA2 revealed that the gene has higher expression in more aggressive breast cancer cell types. Finally, our in vitro analysis on PLXNA3 also suggest that this gene may have some form of growth suppressive role in breast cancer, in addition to a similar role for the gene previously reported in ovarian cancer. From the data obtained in this study, SEMA4D may have a role in more aggressive and potentially metastatic breast tumours. Conclusions Semaphorins and their receptors, the plexins, have been implicated in numerous aspects of neural development, however their expression in many other epithelial tissues suggests that the semaphorin–plexin signalling system also contributes to blood vessel growth and development. These findings warrant further investigation of the role of semaphorins and plexins and their role in normal and tumour-induced angiogenesis in vivo and in vitro. This may represent a new front of attack in anti-angiogenic therapies of breast and other cancers.
Resumo:
Migraine is a debilitating neurovascular disorder, with a substantial genetic component. The exact cause of a migraine attack is unknown; however cortical hyperexcitability is thought to play a role. As Gamma-aminobutyric Acid (GABA) is the major inhibitory neurotransmitter in the brain, malfunctioning of this system may be a cause of the hyperexcitability. To date, there has been limited research examining the gene expression or genetics of GABA receptors in relation to migraine. The aim of our study was to determine if GABA receptors play a role in migraine by investigating their gene expression using profile in migraine affected individuals and non-affected controls by Q-PCR. Gene expression of GABA(A) receptor subunit isoforms (GABRA3, GABRB3, GABRQ) and GABA(B) receptor 2 (GABBR2) was quantified in mRNA obtained from peripheral blood leukocytes from 28 migraine subjects and 22 healthy control subjects. Analysis of results showed that two of the tested genes, GABRA3 and GABBR2, were significantly down regulated in migraineurs (P=0.018; P=0.017), compared to controls. Results from the other tested genes did not show significant gene expression variation. The results indicate that there may be specific GABA receptor gene expression variation in migraine, particularly involving the GABRA3 and GABBR2 genes. This study also identifies GABRA3 and GABBR2 as potential biomarkers to select migraineurs that may be more responsive to GABA agonists with future investigations in this area warranted.
Resumo:
Essential hypertension is a common multifactorial trait that results in a significantly increased risk for heart attack and stroke. The condition has a genetic basis, although at present the number of genes is unknown. In order to identify such genes, we are utilising a linkage scanning approach using microsatellite markers and affected sibships. Here we provide evidence for the location of at least one hypertension susceptibility locus on chromosome 17. Analysis of 177 affected sibpairs gave evidence for significant excess allele sharing to D17S949 (SPLINK: P=0.0029; MAPMAKER SIBS: P=0.0033; ASPEX: P=0.0061; GENEHUNTER: P=0.0096; ANALYZE (SIBPAIR): P=0.0025) on 17q22–24, with significant allele sharing also indicated for an additional marker, D17S799 (SPLINK: P=0.025; MAPMAKER SIBS: P= 0.025) located close to the centromere. Since these two genomic regions are well separated, our results indicate that there may be more than one chromosome 17 locus affecting human blood pressure. Moreover, further investigation of this chromosome, utilizing a polymorphism within the promoter of the iNOS candidate gene, NOS2A, revealed both increased allele sharing among sibpairs (SPLINK: P=0.02; ASPEX: P=0.00004) and positive association (P= 0.034) of NOS2A to essential hypertension. Hence these results indicate that chromosome 17 and, more specifically, the NOS2A gene may play a role in human essential hypertension.
Resumo:
Fruit flies are the insects which cause maggots in your backyard fruit and vegetables. They are not just a nuisance to gardeners, but the single greatest insect threat to commercial and subsistence fruit growers throughout Asia, Australia and the Pacific. Queensland fruit fly, the focus of this PhD, costs Australia an estimated $100million per year. I focused specifically on how Queensland fruit fly uses different commercial citrus varieties. I identified specific plant related mechanisms which increase a fruit’s resistance to fruit fly attack. This information can be used by plant breeders to make fruit less prone to fruit fly damage.