916 resultados para ISA, Internal Security Act
Resumo:
The solution for a line source of oscillatory strength kept at the origin in a wall bounding a semi-infinite viscous imcompressible stratified fluid is presented in an integral form. The behaviour of the flow at far field and near field is studied by an asymptotic expansion procedure. The streamlines for different parameters are drawn and discussed. The real characteristic straight lines present in the inviscid problem are modified by the viscosity and the solutions obtained are valid even at the resonance frequency.
Resumo:
This report presents the results of a study exploring the law and practice of mandatory reporting of child abuse and neglect in the Australian Capital Territory. Government administrative data over a decade (2003-2012) were accessed and analysed to map trends in reporting of different types of child abuse and neglect (physical abuse, sexual abuse, emotional abuse, and neglect) by different reporter groups (both mandated reporters e.g., police, teachers, doctors, nurses depending on the jurisdiction, and non-mandated reporters e.g., family members, neighbours, depending on the jurisdiction), and the outcomes of these reports (whether investigated, and whether substantiated or not). The study was funded by the Australian Government and administered through the Government of Victoria.
Resumo:
This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.
Resumo:
Jacalin [Artocarpus integrifolia (jack fruit) agglutinin] is made up of two types of chains, heavy and light, with M(r) values of 16,200 +/- 1200 and 2090 +/- 300 respectively (on the basis of gel-permeation chromatography under denaturing conditions). Its complete amino acid sequence was determined by manual degradation using a 4-dimethylaminoazobenzene 4'-isothiocyanate double-coupling method. Peptide fragments for sequence analysis were obtained by chemical cleavages of the heavy chain with CNBr, hydroxylamine hydrochloride and iodosobenzoic acid and enzymic cleavage with Staphylococcus aureus proteinase. The peptides were purified by a combination gel-permeation and reverse-phase chromatography. The light chains, being only 20 residues long, could be sequenced without fragmentation. Amino acid analyses and carboxypeptidase-Y-digestion C-terminal analyses of the subunits provided supportive evidence for their sequence. Computer-assisted alignment of the jacalin heavy-chain sequence failed to show sequence similarity to that of any lectin for which the complete sequence is known. Analyses of the sequence showed the presence of an internal repeat spanning residues 7-64 and 76-130. The internal repeat was found to be statistically significant.
Resumo:
In recent years, identification of sequence patterns has been given immense importance to understand better their significance with respect to genomic organization and evolutionary processes. To this end, an algorithm has been derived to identify all similar sequence repeats present in a protein sequence. The proposed algorithm is useful to correlate the three-dimensional structure of various similar sequence repeats available in the Protein Data Bank against the same sequence repeats present in other databases like SWISS-PROT, PIR and Genome databases.
Resumo:
The main objective of on-line dynamic security assessment is to take preventive action if required or decide remedial action if a contingency actually occurs. Stability limits are obtained for different contingencies. The mode of instability is one of the outputs of dynamic security analysis. When a power system becomes unstable, it splits initially into two groups of generators, and there is a unique cutset in the transmission network known as critical cutset across which the angles become unbounded. The knowledge of critical cutset is additional information obtained from dynamic security assessment, which can be used for initiating preventive control actions, deciding emergency control actions, and adaptive out-of-step relaying. In this article, an analytical technique for the fast prediction of the critical cutset by system simulation for a short duration is presented. Case studies on the New England ten-generator system are presented. The article also suggests the applications of the identification of critical cutsets.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
Theoretical studies have been carried out to examine internal flow choking in the inert simulators of a dual-thrust motor. Using a two-dimensional k-omega turbulence model, detailed parametric studies have been carried out to examine aerodynamic choking and the existence of a fluid throat at the transition region during the startup transient of dual-thrust motors. This code solves standard k-omega turbulence equations with shear flow corrections using a coupled second-order-implicit unsteady formulation. In the numerical study, a fully implicit finite volume scheme of the compressible, Reynolds-averaged, Navier-Stokes equations is employed. It was observed that, at the subsonic inflow conditions, there is a possibility of the occurrence of internal flow choking in dual-thrust motors due to the formation of a fluid throat at the beginning of the transition region induced by area blockage caused by boundary-layer-displacement thickness. It has been observed that a 55% increase in the upstream port area of the dual-thrust motor contributes to a 25% reduction in blockage factor at the transition region, which could negate the internal How choking and supplement with an early choking of the dual-thrust motor nozzle. If the height of the upstream port relative to the motor length is too small, the developing boundary layers from either side of the port can interact, leading to a choked,flow. On the other hand, if the developing boundary layers are far enough apart, then choking does not occur. The blockage factor is greater in magnitude for the choked case than for the unchoked case. More tangible explanations are presented in this paper for the boundary-layer blockage and the internal flow choking in dual-thrust motors, which hitherto has been unexplored.
Resumo:
The aim of the study was to evaluate long-term results of operative treatment for Hirschsprung's disease(HD) and internal anal sphincter achalasia. Fecal continence and quality of life were evaluated by a questionnaire in 100 adult patients who had undergone surgery for HD, during 1950-75. Fecal continence was evaluated using a numerical scoring described by Holschneider. Fifty-four of the 100 patients underwent clinical examination, rigid sigmoidoscopy and manometric evaluation. In anorectal manometry basal resting pressure(BRP)and maximal squeeze pressure(MSP) were measured and voluntary sphincter force(VSF) was calculated by subtracting the BRP from MSP. The results of operative treatment for adult HD were compared with the results of the patients operated in childhood. In adult HD the symptoms are such mild that the patients attain adolescence or even adulthood. The patients with HD and cartilage-hair-hypoplasia were specifically evaluated. The outcome of the patients with internal anal sphincter achalasia operated on by myectomy was evaluated by a questionnaire and continence was evaluated using a numerical scoring described by Holschneider. Of the 100 patients operated on for HD 38 patients had completely normal bowel habits. A normal or good continence score was found in 91 our of 100 patients. Nine patients had fair continence. One of the patients with fair continence had Down's syndrome and two were mentally retarded for other reasons. Only one patient suffered from constipation. In anorectal manometry the difference in BRP between patients with normal and good continence was statistically significant, whereas the difference between good and fair continence groups was not statistically significant. The differences on MSP and VSF between patient groups with different continence outcome were not statistically significant. The differences between patient groups and normal controls were statistically significant in BRP and MSP. In VSF there was not statistically significant difference between the patients and the normal controls. The VSF reflects the working power of the muscles including external sphincter, levator ani and gluteal muscles. The patients operated at adult age had as good continence as patients operated in childhood. The patients with HD and cartilage-hair-hypoplasia had much more morbidity and mortality than non-cartilage-hair-hypoplasia HD patients. The mortality was as high as 38%. In patients with internal anal sphincter achalasia the constipation was cured or alleviated by myectomy whereas a significant number suffered from soiling-related social problems.
Resumo:
(CH3)4NGeCl3 is prepared, characterized and studied using 1H NMR spin lattice relaxation time and second moment to understand the internal motions and quantum rotational tunneling. Proton second moment is measured at 7 MHz as function of temperature in the range 300-77 K and spin lattice relaxation time (T1) is measured at two Larmor frequencies, as a function of temperature in the range 270-17 K employing a homemade wide-line/pulsed NMR spectrometers. T1 data are analyzed in two temperature regions using relevant theoretical models. The relaxation in the higher temperatures (270-115 K) is attributed to the hindered reorientations of symmetric groups (CH3 and (CH3)4N). Broad asymmetric T1 minima observed below 115 K down to 17 K are attributed to quantum rotational tunneling of the inequivalent methyl groups.
Resumo:
A methodology for reliability based optimum design of reinforced soil structures subjected to horizontal and vertical sinusoidal excitation based on pseudo-dynamic approach is presented. The tensile strength of reinforcement required to maintain the stability is computed using logarithmic spiral failure mechanism. The backfill soil properties, geometric and strength properties of reinforcement are treated as random variables. Effects of parameters like soil friction angle, horizontal and vertical seismic accelerations, shear and primary wave velocities, amplification factors for seismic acceleration on the component and system probability of failures in relation to tension and pullout capacities of reinforcement have been discussed. In order to evaluate the validity of the present formulation, static and seismic reinforcement force coefficients computed by the present method are compared with those given by other authors. The importance of the shear wave velocity in the estimation of the reliability of the structure is highlighted. The Ditlevsen's bounds of system probability of failure are also computed by taking into account the correlations between three failure modes, which is evaluated using the direction cosines of the tangent planes at the most probable points of failure. (c) 2009 Elsevier Ltd. All rights reserved.
Resumo:
The Body Area Network (BAN) is an emerging technology that focuses on monitoring physiological data in, on and around the human body. BAN technology permits wearable and implanted sensors to collect vital data about the human body and transmit it to other nodes via low-energy communication. In this paper, we investigate interactions in terms of data flows between parties involved in BANs under four different scenarios targeting outdoor and indoor medical environments: hospital, home, emergency and open areas. Based on these scenarios, we identify data flow requirements between BAN elements such as sensors and control units (CUs) and parties involved in BANs such as the patient, doctors, nurses and relatives. Identified requirements are used to generate BAN data flow models. Petri Nets (PNs) are used as the formal modelling language. We check the validity of the models and compare them with the existing related work. Finally, using the models, we identify communication and security requirements based on the most common active and passive attack scenarios.
Resumo:
In 2015, Victoria passed laws removing the time limit in which a survivor of child sexual abuse can commence a civil claim for personal injury. The law applies also to physical abuse, and to psychological injury arising from those forms of abuse. In 2016, New South Wales made almost identical legal reforms. These reforms were partly motivated by the recommendations of inquiries into institutional child abuse. Of particular relevance is that the Australian Royal Commission Into Institutional Responses to Child Sexual Abuse recommended in 2015 that all States and Territories remove their time limits for civil claims. This presentation explores the problems with standard time limits when applied to child sexual abuse cases (whether occurring within or beyond institutions), the scientific, ethical and legal justifications for lifting the time limits, and solutions for future law reform.