881 resultados para Priority messages


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Like most Australian states, the New South Wales Graduated Driver Licensing system requires all provisionally licensed drivers to display ‘P plates’ on their vehicle to indicate their licence status and facilitate enforcement. This paper examines whether the display of P plates increases compliance with driving laws in New South Wales. The driving behaviours of provisional drivers who reported always displaying their P plates were compared with those of drivers who sometimes drove without displaying their P plates. While no differences were found between the two groups on some behaviours, provisional drivers who did not always display their P plates indicated that they were less likely to obey the provisional speed limit and more likely to break the road rules if they knew they would not be caught. These results suggest that the requirement to display a P plate remains a priority to facilitate more general traffic law enforcement initiatives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Women with young children (under 5 years) are a key population group for physical activity intervention. Previous evidence highlights the need for individually tailored programs with flexible delivery mechanisms for this group. Our previous pilot study suggested that an intervention primarily delivered via mobile phone text messaging (MobileMums) increased self-reported physical activity in women with young children. An improved version of the MobileMums program is being compared with a minimal contact control group in a large randomised controlled trial (RCT). Methods/design: This RCT will evaluate the efficacy, feasibility and acceptability, cost-effectiveness, mediators and moderators of the MobileMums program. Primary (moderate-vigorous physical activity) and secondary (intervention implementation data, health service use costs, intervention costs, health benefits, theoretical constructs) outcomes are assessed at baseline, 3-months (end of intervention) and 9-months (following 6-month no contact: maintenance period). The trial is registered with the Australian New Zealand Clinical Trials Registry (ACTRN12611000481976; https://www.anzctr.org.au/Trial/Registration/TrialReview.aspx?id=336109).The intervention commences with a face-to-face session with a behavioural counsellor to initiate rapport and gather information for tailoring the 12-week text message program. During the program participants also have access to a: MobileMums Participant Handbook, MobileMums refrigerator magnet, MobileMums Facebook(C) group, and a MobileMums website with a searchable, on-line exercise directory. A nominated support person also receives text messages for 12-weeks encouraging them to offer their MobileMum social support for physical activity. Discussion: Results of this trial will determine the efficacy and cost-effectiveness of the MobileMums program, and the feasibility of delivering it in a community setting. It will inform the broader literature of physical activity interventions for women with young children and determine whether further investment in the translation of the program is warranted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most large cities around the world are undergoing rapid transport sector development to cater for increased urbanization. Subsequently the issues of mobility, access equity, congestion, operational safety and above all environmental sustainability are becoming increasingly crucial in transport planning and policy making. The popular response in addressing these issues has been demand management, through improvement of motorised public transport (MPT) modes (bus, train, tram) and non-motorized transport (NMT) modes (walk, bicycle); improved fuel technology. Relatively little attention has however been given to another readily available and highly sustainable component of the urban transport system, non-motorized public transport (NMPT) such as the pedicab that operates on a commercial basis and serves as an NMT taxi; and has long standing history in many Asian cities; relatively stable in existence in Latin America; and reemerging and expanding in Europe, North America and Australia. Consensus at policy level on the apparent benefits, costs and management approach for NMPT integration has often been a major transport planning problem. Within this context, this research attempts to provide a more complete analysis of the current existence rationale and possible future, or otherwise, of NMPT as a regular public transport system. The analytical process is divided into three major stages. Stage 1 reviews the status and role condition of NMPT as regular public transport on a global scale- in developing cities and developed cities. The review establishes the strong ongoing and future potential role of NMPT in major developing cities. Stage 2 narrows down the status review to a case study city of a developing country in order to facilitate deeper role review and status analysis of the mode. Dhaka, capital city of Bangladesh, has been chosen due to its magnitude of NMPT presence. The review and analysis reveals the multisectoral and dominant role of NMPT in catering for the travel need of Dhaka transport users. The review also indicates ad-hoc, disintegrated policy planning in management of NMPT and the need for a planning framework to facilitate balanced integration between NMPT and MT in future. Stage 3 develops an integrated, multimodal planning framework (IMPF), based on a four-step planning process. This includes defining the purpose and scope of the planning exercise, determining current deficiencies and preferred characteristics for the proposed IMPF, selection of suitable techniques to address the deficiencies and needs of the transport network while laying out the IMPF and finally, development of a delivery plan for the IMPF based on a selected layout technique and integration approach. The output of the exercise is a planning instrument (decision tool) that can be used to assign a road hierarchy in order to allocate appropriate traffic to appropriate network type, particularly to facilitate the operational balance between MT and NMT. The instrument is based on a partial restriction approach of motorised transport (MT) and NMT, structured on the notion of functional hierarchy approach, and distributes/prioritises MT and NMT such that functional needs of the network category is best complemented. The planning instrument based on these processes and principles offers a six-level road hierarchy with a different composition of network-governing attributes and modal priority, for the current Dhaka transport network, in order to facilitate efficient integration of NMT with MT. A case study application of the instrument on a small transport network of Dhaka also demonstrates the utility, flexibility and adoptability of the instrument in logically allocating corridors with particular positions in the road hierarchy paradigm. Although the tool is useful in enabling balanced distribution of NMPT with MT at different network levels, further investigation is required with reference to detailed modal variations, scales and locations of a network to further generalise the framework application.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Food is a multidimensional construct. It has social, cultural, economic, psychological, emotional, biological, and political dimensions. It is both a material object and a catalyst for a range of social and cultural action. Richly implicated in the social and cultural milieu, food is a central marker of culture and society. Yet little is known about the messages and knowledges in the school curriculum about food. Popular debates around food in schools are largely connected with biomedical issues of obesity, exercise and nutrition. This is a study of the sociological dimensions of food-related messages, practices and knowledge formations in the primary school curriculum. It uses an exploratory, qualitative case study methodology to identify and examine the food activities of a Year 5 class in a Queensland school. Data was gathered over a twoyear period using observation, documentation and interviews methods. Food was found to be an integral part of the primary school's activity. It had economic, symbolic, pedagogic, and instrumental value. Messages about food were found in the official, enacted and hidden curricular which were framed by a food governance framework of legislation, procedures and norms. In the school studied, food knowledge was commodified as a part of a political economy that centred on an 'eat more' message. Certain foods were privileged over others while myths about energy, fruit, fruit juice and sugar shaped student dispositions, values, norms and action. There was little engagement with the cognitive and behavioural dimensions of food and nutrition. The thesis concludes with recommendations for a whole scale reconsideration of food in schools as curricular content and knowledge.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The life course of Australian researchers includes regular funding applications, which incur large personal and time costs. We previously estimated that Australian researchers spent 550 years preparing 3,727 proposals for the 2012 NHMRC Project Grant funding round, at an estimated annual salary cost of AU$66 million. Despite the worldwide importance of funding rounds, there is little evidence on what researchers think of the application process. We conducted a web-based survey of Australian researchers (May–July 2013) asking about their experience with NHMRC Project Grants. Almost all researchers (n=224 at 31 May) supported changes to the application (96%) and peer-review (88%) processes; 73% supported the introduction of shorter initial Expressions of Interest; and half (50%) provided extensive comments on the NHMRC processes. Researchers agreed preparing their proposals always took top priority over other work (97%) and personal (87%) commitments. More than half (57%) provided extensive comments on the ongoing personal impact of concurrent grant-writing and holiday seasons on family, children and other relationships. Researchers with experience on Grant Review Panels (34%) or as External Reviewers (78%) reported many sections of the proposals were rarely or never read, which suggests these sections could be cut with no impact on the quality of peer review. Our findings provide evidence on the experience of Australian researchers as applicants. The process of preparing, submitting and reviewing proposals could be streamlined to minimise the burden on applicants and peer reviewers, giving Australian researchers more time to work on actual research and be with their families.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is a growing awareness worldwide of the significance of social media to communication in times of both natural and human-created disasters and crises. While the media have long been used as a means of broadcasting messages to communities in times of crisis – bushfires, floods, earthquakes etc. – the significance of social media in enabling many-to-many communication through ubiquitous networked computing and mobile media devices is becoming increasingly important in the fields of disaster and emergency management. This paper undertakes an analysis of the uses made of social media during two recent natural disasters: the January 2011 floods in Brisbane and South-East Queensland in Australia, and the February 2011 earthquake in Christchurch, New Zealand. It is part of a wider project being undertaken by a research team based at the Queensland University of Technology in Brisbane, Australia, that is working with the Queensland Department of Community Safety (DCS) and the EIDOS Institute, and funded by the Australian Research Council (ARC) through its Linkages program. The project combines large-scale, quantitative social media tracking and analysis techniques with qualitative cultural analysis of communication efforts by citizens and officials, to enable both emergency management authorities and news media organisations to develop, implement, and evaluate new social media strategies for emergency communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Collisions among trains and cars at road/rail level crossings (LXs) can have severe consequences such as high level of fatalities, injuries and significant financial losses. As communication and positioning technologies have significantly advanced, implementing vehicular ad hoc networks (VANETs) in the vicinity of unmanned LXs, generally LXs without barriers, is seen as an efficient and effective approach to mitigate or even eliminate collisions without imposing huge infrastructure costs. VANETs necessitate unique communication strategies, in which routing protocols take a prominent part in their scalability and overall performance, through finding optimised routes quickly and with low bandwidth overheads. This article studies a novel geo-multicast framework that incorporates a set of models for communication, message flow and geo-determination of endangered vehicles with a reliable receiver-based geo-multicast protocol to support cooperative level crossings (CLXs), which provide collision warnings to the endangered motorists facing road/rail LXs without barriers. This framework is designed and studied as part of a $5.5 m Government and industry funded project, entitled 'Intelligent-Transport-Systems to improve safety at road/rail crossings'. Combined simulation and experimental studies of the proposed geo-multicast framework have demonstrated promising outcomes as cooperative awareness messages provide actionable critical information to endangered drivers who are identified by CLXs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ethiopia has one of Africa’s fastest growing non-oil producing economies and an increasing level of motorisation (AfDB, OECD, UNDP, & UNECA, 2012). This rapidly increasing mobility has created some unique road safety concerns; however there is scant published information and related commentary (United Nations Economic Commission for Africa, 2009). The objective of this paper is to quantify police-reported traffic crashes in Ethiopia and characterise the existing state of road safety. Six years (July 2005 - June 2011) of police-reported crash data were analysed, consisting of 12,140 fatal and 29,454 injury crashes on the country’s road network. The 12,140 fatal crashes involved 1,070 drivers, 5,702 passengers, and 7,770 pedestrians, totalling 14,542 fatalities, an average of 1.2 road user fatalities per crash. An important and glaring trend that emerges is that more than half of the fatalities in Ethiopia involve pedestrians. The majority of the crashes occur during daytime hours, involve males, and involve persons in the 18-50 age group—Ethiopia’s active workforce. Crashes frequently occur in mid blocks or roadways. The predominant collision between motor vehicles and pedestrians was a rollover on a road tangent section. Failing to observe the priority of pedestrians and speeding were the major causes of crashes attributed by police. Trucks and minibus taxis were involved in the majority of crashes, while automobiles (small vehicles) were less involved in crashes relative to other vehicle types, partially because small vehicles tend to be driven fewer kilometres per annum. These data illustrate and justify a high priority to identify and implement effective programs, policies, and countermeasures focused on reducing pedestrian crashes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Non-periodic structural variation has been found in the high Tc cuprates, YBa2Cu3O7-x and Hg0.67Pb0.33Ba2Ca2Cu 3O8+δ, by image analysis of high resolution transmission electron microscope (HRTEM) images. We use two methods for analysis of the HRTEM images. The first method is a means for measuring the bending of lattice fringes at twin planes. The second method is a low-pass filter technique which enhances information contained by diffuse-scattered electrons and reveals what appears to be an interference effect between domains of differing lattice parameter in the top and bottom of the thin foil. We believe that these methods of image analysis could be usefully applied to the many thousands of HRTEM images that have been collected by other workers in the high temperature superconductor field. This work provides direct structural evidence for phase separation in high Tc cuprates, and gives support to recent stripes models that have been proposed to explain various angle resolved photoelectron spectroscopy and nuclear magnetic resonance data. We believe that the structural variation is a response to an opening of an electronic solubility gap where holes are not uniformly distributed in the material but are confined to metallic stripes. Optimum doping may occur as a consequence of the diffuse boundaries between stripes which arise from spinodal decomposition. Theoretical ideas about the high Tc cuprates which treat the cuprates as homogeneous may need to be modified in order to take account of this type of structural variation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A key question in neuroscience is how memory is selectively allocated to neural networks in the brain. This question remains a significant research challenge, in both rodent models and humans alike, because of the inherent difficulty in tracking and deciphering large, highly dimensional neuronal ensembles that support memory (i.e., the engram). In a previous study we showed that consolidation of a new fear memory is allocated to a common topography of amygdala neurons. When a consolidated memory is retrieved, it may enter a labile state, requiring reconsolidation for it to persist. What is not known is whether the original spatial allocation of a consolidated memory changes during reconsolidation. Knowledge about the spatial allocation of a memory, during consolidation and reconsolidation, provides fundamental insight into its core physical structure (i.e., the engram). Using design-based stereology, we operationally define reconsolidation by showing a nearly identical quantity of neurons in the dorsolateral amygdala (LAd) that expressed a plasticity-related protein, phosphorylated mitogen-activated protein kinase, following both memory acquisition and retrieval. Next, we confirm that Pavlovian fear conditioning recruits a stable, topographically organized population of activated neurons in the LAd. When the stored fear memory was briefly reactivated in the presence of the relevant conditioned stimulus, a similar topography of activated neurons was uncovered. In addition, we found evidence for activated neurons allocated to new regions of the LAd. These findings provide the first insight into the spatial allocation of a fear engram in the LAd, during its consolidation and reconsolidation phase.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose The purpose of this paper is to review the growing emphasis on quantifiable performance measures such as social return on investment (SROI) in third sector organisations – specifically, social enterprise – through a legitimacy theory lens. It then examines what social enterprises value (i.e. consider important) in terms of performance evaluation, using a case study approach. Design/methodology/approach Case studies involving interviews, documentary analysis, and observation, of three social enterprises at different life-cycle stages with different funding structures, were constructed to consider “what measures matter” from a practitioner's perspective. Findings Findings highlight a priority on quality outcomes and impacts in primarily qualitative terms to evaluate performance. Further, there is a noticeable lack of emphasis on financial measures other than basic access to financial resources to continue pursuing social goals. Social implications The practical challenges faced by social enterprises – many of which are small to medium sized – in evaluating performance and by implication organisational legitimacy are contrasted with measures such as SROI which are resource intensive and have inherent methodological limitations. Hence, findings suggest the limited and valuable resources of social enterprises would be better allocated towards documenting the actual outcomes and impacts as a first step, in order to evaluate social and financial performance in terms appropriate to each objective, in order to demonstrate organisational legitimacy. Originality/value Findings distinguish between processes which may hold symbolic legitimacy for select stakeholder groups, and processes which hold substantive, cognitive legitimacy for stakeholders more broadly, in the under-researched context of social enterprise.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Previous research has shown that mobile phone use while driving can increase crash risk fourfold while texting results in 23 times greater crash risk for heavy vehicle drivers. However, mobile phone use has changed in recent years with the functional capabilities of smart phones to now also include a range of other common behaviours while driving such as using Facebook, emailing, the use of ‘apps’, and GPS. Research continues to show performance decrements for many such behaviours while driving, however many Australians still openly admit to illegal mobile phone use while driving despite ongoing enforcement efforts and public awareness campaigns. Of most concern are young drivers. ‘Apps’ available to restrict mobile phone use while in motion do not prevent use while a driver is stopped at traffic lights, so are therefore not a wholly viable solution. Vehicle manufacturers continue to develop in-vehicle technology to minimise distraction, however communication with the ‘outside world’ while driving is also perhaps a strong selling point for vehicles. Hence, the safety message that drivers should focus on the driving task solely and not use communication devices is unlikely to ever be internalised by many drivers. This paper reviews the available literature on the topic and argues that a better understanding of perceptions of mobile phone use while driving and motives for use are required to inform public awareness campaign development for specific road user groups. Additionally, illegal phone use while driving may be reinforced by not being apprehended (punishment avoidance), therefore stronger deterrence-focussed messages may also be beneficial.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Beyond Compliance project, which began in July 2011 with funding from the Standards and Trade Development Facility for 2 years, aims to enhance competency and confidence in the South East Asian sub-region by applying a Systems Approach for pest risk management. The Systems Approach involves the use of integrated measures, at least two of which are independent, that cumulatively reduce the risk of introducing exotic pests through trade. Although useful in circumstances where single measures are inappropriate or unavailable, the Systems Approach is inherently more complicated than single-measure approaches, which may inhibit its uptake. The project methodology is to take prototype decision-support tools, such as Control Point-Bayesian Networks (CP-BN), developed in recent plant health initiatives in other regions, including the European PRATIQUE project, and to refine them within this sub-regional context. Case studies of high-priority potential agricultural trade will be conducted by National Plant Protection Organizations of participating South East Asian countries in trials of the tools, before further modifications. Longer term outcomes may include: more robust pest risk management in the region (for exports and imports); greater inclusion of stakeholders in development of pest risk management plans; increased confidence in trade negotiations; and new opportunities for trade.