987 resultados para Douglas, Prentis
Resumo:
The STIMulate program provides support for learning across maths, science and IT to QUT coursework students. The program has good traction with the diverse QUT student community, with a focus on helping students in threshold skills and concepts across discipline areas. Students who attend learning support programs generally speak highly of these services. However, staff commonly report that many of the students most in need fail to access support. At the end of 2014, we sought feedback from non-users of STIMulate to investigate why they didn’t use the program. Of the 223 respondents, 34% of students had not used STIMulate services. These students were asked why they had not used STIMulate, and what would encourage them to attend STIMulate services. Based on student responses, issues that would encourage students to attend STIMulate can be classified into 6 key areas: marketing, timing, mode, belonging, need and space. These issues are then addressed through actionable recommendations to better enable future students to utilise the STIMulate program.
Resumo:
Background: Haemodialysis nurses form long term relationships with patients in a technologically complex work environment. Previous studies have highlighted that haemodialysis nurses face stressors related to the nature of their work and also their work environments leading to reported high levels of burnout. Using Kanters (1997) Structural Empowerment Theory as a guiding framework, the aim of this study was to explore the factors contributing to satisfaction with the work environment, job satisfaction, job stress and burnout in haemodialysis nurses. Methods: Using a sequential mixed-methods design, the first phase involved an on-line survey comprising demographic and work characteristics, Brisbane Practice Environment Measure (B-PEM), Index of Work Satisfaction(IWS), Nursing Stress Scale (NSS) and the Maslach Burnout Inventory (MBI). The second phase involved conducting eight semi-structured interviews with data thematically analyzed. Results: From the 417 nurses surveyed the majority were female (90.9 %), aged over 41 years of age (74.3 %), and 47.4 % had worked in haemodialysis for more than 10 years. Overall the work environment was perceived positively and there was a moderate level of job satisfaction. However levels of stress and emotional exhaustion (burnout) were high. Two themes, ability to care and feeling successful as a nurse, provided clarity to the level of job satisfaction found in phase 1. While two further themes, patients as quasi-family and intense working teams, explained why working as a haemodialysis nurse was both satisfying and stressful. Conclusions: Nurse managers can use these results to identify issues being experienced by haemodialysis nurses working in the unit they are supervising.
Resumo:
A gyrostabiliser control system and method for stabilising marine vessel motion based on precession information only. The control system employs an Automatic Gain Control (AGC) precession controller (60). This system operates with a gain factor that is always being gradually minimized so as to let the gyro flywheel (12) develop as much precession as possible - the higher the precession, the higher the roll stabilising moment. This continuous gain change provides adaptation to changes in sea state and sailing conditions. The system effectively predicts the likelihood of maximum precession being reached. Should this event be detected, then the gain is rapidly increased so as to provide a breaking precession torque. Once the event has passed, the system again attempts to gradually decrease the gain.
Resumo:
A vessel stabilizer control system includes a sensor fault detection means which senses the availability of sensing signals from a gyrostabilizer precession motion sensor and a vessel roll motion sensor. The control system controls the action of a gyro-actuator which is mechanically coupled to a gyrostabilizer. The benefit of employing fault sensing of the sensors providing the process control variables is that the sensed number of available process control variables (or sensors) can be used to activate a tiered system of control modes. Each tiered control mode is designed to utilize the available process control variables to ensure safe and effective operation of the gyrostabilizer that is tolerant of sensor faults and loss of power supply. A control mode selector is provided for selecting the appropriate control mode based on the number of available process control variables.
Resumo:
Rapid and unplanned growth of Kathmandu Valley towns over the past decades has resulted in the haphazard development of new neighbourhoods with significant consequences on their public space. This paper examines the development of public space in the valley’s new neighbourhoods in the context of the current urban growth. A case study approach of three new neighbourhoods was developed to examine the provision of public space with data collected from site observations, interviews with neighbourhood residents and other secondary sources. The cases studies consist of both planned and unplanned new neighbourhoods. Findings reveal a severe loss of public space in the unplanned new neighbourhoods. In planned new neighbourhoods, the provision of public space remains poor in terms of physical features, and thus, does not support community activities and needs. Several factors, which are an outcome of the lack of proper urban growth initiatives and control measures, such as an overall drawback in the formation of new neighbourhoods, the poor capacity of local community-based organisations and the encroachment of public land are responsible for the present development of neighbourhood public space. The problems with ongoing management of public spaces are a significant issue in both unplanned and planned new neighbourhoods.
Resumo:
Genome-wide association studies (GWAS) have identified numerous common prostate cancer (PrCa) susceptibility loci. We have fine-mapped 64 GWAS regions known at the conclusion of the iCOGS study using large-scale genotyping and imputation in 25 723 PrCa cases and 26 274 controls of European ancestry. We detected evidence for multiple independent signals at 16 regions, 12 of which contained additional newly identified significant associations. A single signal comprising a spectrum of correlated variation was observed at 39 regions; 35 of which are now described by a novel more significantly associated lead SNP, while the originally reported variant remained as the lead SNP only in 4 regions. We also confirmed two association signals in Europeans that had been previously reported only in East-Asian GWAS. Based on statistical evidence and linkage disequilibrium (LD) structure, we have curated and narrowed down the list of the most likely candidate causal variants for each region. Functional annotation using data from ENCODE filtered for PrCa cell lines and eQTL analysis demonstrated significant enrichment for overlap with bio-features within this set. By incorporating the novel risk variants identified here alongside the refined data for existing association signals, we estimate that these loci now explain ∼38.9% of the familial relative risk of PrCa, an 8.9% improvement over the previously reported GWAS tag SNPs. This suggests that a significant fraction of the heritability of PrCa may have been hidden during the discovery phase of GWAS, in particular due to the presence of multiple independent signals within the same region.
Resumo:
Genome-wide association studies have identified more than 80 risk variants for prostate cancer, mainly in European or Asian populations. The generalizability of these variants in other racial/ethnic populations needs to be understood before the loci can be used widely in risk modeling. In our study, we examined 82 previously reported risk variants in 4,853 prostate cancer cases and 4,678 controls of African ancestry. We performed association testing for each variant using logistic regression adjusted for age, study and global ancestry. Of the 82 known risk variants, 68 (83%) had effects that were directionally consistent in their association with prostate cancer risk and 30 (37%) were significantly associated with risk at p < 0.05, with the most statistically significant variants being rs116041037 (p = 3.7 × 10(-26) ) and rs6983561 (p = 1.1 × 10(-16) ) at 8q24, as well as rs7210100 (p = 5.4 × 10(-8) ) at 17q21. By exploring each locus in search of better markers, the number of variants that captured risk in men of African ancestry (p < 0.05) increased from 30 (37%) to 44 (54%). An aggregate score comprised of these 44 markers was strongly associated with prostate cancer risk [per-allele odds ratio (OR) = 1.12, p = 7.3 × 10(-98) ]. In summary, the consistent directions of effects for the vast majority of variants in men of African ancestry indicate common functional alleles that are shared across populations. Further exploration of these susceptibility loci is needed to identify the underlying biologically relevant variants to improve prostate cancer risk modeling in populations of African ancestry.
Resumo:
This book provides a comprehensive analysis of the practical and theoretical issues encountered in Australian civil procedure, including alternative dispute resolution. Each chapter features in-depth questions and notes together with lists of further reading to aid understanding of the issue. It also examines and discusses each substantive and procedural step in the trial process. Topics include jurisdiction of a court to consider a matter, alternative dispute resolution, limitations of actions, commencing proceedings, group proceedings, pleading, summary disposition, gathering evidence, affidavits, interlocutory procedures, settlement, trial and appeal, costs Each of the state, territory and federal procedures is covered.
Resumo:
We examined the effect of surface-applied treatments on the above-ground decay resistance of the tenon of mortice-and-tenon timber joints designed to simulate joinery that is exposed to the weather. Joints made from untreated radiata pine, Douglas-fir, brush box, spotted gum and copper-chrome-arsenic (CCA) treated radiata pine were exposed to the weather for 9 y on above-ground racks at five sites throughout eastern Australia. Results indicate (1) a poorly maintained external paint film generally accelerated decay, (2) a brush coat of water-repellent preservative inside the joints often extended serviceability (in some cases by a factor of up to seven times that of untreated joints) and (3) the level of protection provided by a coat of primer applied inside the joint varied and in most cases was not as effective as the water-repellent preservative treatment.
Resumo:
Prediction of the initiation, appearance and emergence of leaves is critically important to the success of simulation models of crop canopy development and some aspects of crop ontogeny. Data on leaf number and crop ontogeny were collected on five cultivars of maize differing widely in maturity and genetic background grown under natural and extended photoperiods, and planted on seven sowing dates from October 1993 to March 1994 at Gatton, South-east Queensland. The same temperature coefficients were established for crop ontogeny before silking, and the rates of leaf initiation, leaf tip appearance and full leaf expansion, the base, optimum and maximum temperatures for each being 8, 34 and 40 degrees C. After silking, the base temperature for ontogeny was 0 degrees C, but the optimum and maximum temperatures remained unchanged. The rates of leaf initiation, appearance of leaf tips and full leaf expansion varied in a relatively narrow range across sowing times and photoperiod treatments, with average values of 0.040 leaves (degrees Cd)-1, 0.021 leaves (degrees Cd)-1, and 0.019 leaves (degrees Cd)-1, respectively. The relationships developed in this study provided satisfactory predictions of leaf number and crop ontogeny (tassel initiation to silking, emergence to silking and silking to physiological maturity) when assessed using independent data from Gatton (South eastern Queensland), Katherine and Douglas Daly (Northern Territory), Walkamin (North Queensland) and Kununurra (Western Australia).
Resumo:
Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie--Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.
Resumo:
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving—a form of self-enforcement—and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer; we show an additional application of these new extractable trapdoor functions to standard digital signatures.
Resumo:
Growing agricultural crops in wide row spacings has been widely adopted to conserve water, to control pests and diseases, and to minimise problems associated with sowing into stubble. The development of herbicide resistance combined with the advent of precision agriculture has resulted in a further reason for wide row spacings to be adopted: weed control. Increased row spacing enables two different methods of weed control to be implemented with non-selective chemical and physical control methods utilised in the wide inter-row zone, with or without selective chemicals used on the on-row only. However, continual application of herbicides and tillage on the inter-row zone brings risks of herbicide resistance, species shifts and/or changes in species dominance, crop damage, increased costs, yield losses, and more expensive weed management technology.