960 resultados para European copyright code
Resumo:
This article suggests that the issue of proportionality in anti-doping sanctions has been inconsistently dealt with by the Court of Arbitration for Sport (CAS). Given CAS’s pre-eminent role in interpreting and applying the World Anti-Doping Code under the anti-doping policies of its signatories, an inconsistent approach to the application of the proportionality principle will cause difficulties for domestic anti-doping tribunals seeking guidance as to the appropriateness of their doping sanctions.
Resumo:
Many commentators have treated the internet as a site of democratic freedom and as a new kind of public sphere. While there are good reasons for optimism, like any social space digital space also has its dark side. Citizens and governments alike have expressed anxiety about cybercrime and cyber-security. In August 2011, the Australian government introduced legislation to give effect to Australia becoming a signatory to the European Convention on Cybercrime (2001). At the time of writing, that legislation is still before the Parliament. In this article, attention is given to how the legal and policy-making process enabling Australia to be compliant with the European Convention on Cybercrime came about. Among the motivations that informed both the development of the Convention in Europe and then the Australian exercise of legislating for compliance with it was a range of legitimate concerns about the impact that cybercrime can have on individuals and communities. This article makes the case that equal attention also needs to be given to ensuring that legislators and policy makers differentiate between legitimate security imperatives and any over-reach evident in the implementation of this legislation that affects rule of law principles, our capacity to engage in democratic practices, and our civic and human rights.
Resumo:
Review of the book 'Access to East European and Eurasian culture: publishing, acquisitions, digitization, metadata', edited by Miranda Remnek, published by Haworth Information Press, 2009.
Resumo:
User interfaces for source code editing are a crucial component in any software development environment, and in many editors visual annotations (overlaid on the textual source code) are used to provide important contextual information to the programmer. This paper focuses on the real-time programming activity of ‘cyberphysical’ programming, and considers the type of visual annotations which may be helpful in this programming context.
Resumo:
The Norfolk Island population in the South Pacific is primarily the product of recent admixture between a small number of British male and Polynesian female founders. We identified and genotyped 128 Ancestry Informative Markers (AIMs) spread across the autosomes, X/Y chromosomes and mitochondrial DNA genome, to explore and quantify the current levels of genetic admixture in the Norfolk Islanders. On the basis of autosomal AIMs, the population shows mean European and Polynesian ancestry proportions of 88 and 12%, respectively. However, there is a substantial variation between individuals ranging from total European ancestry to near total Polynesian origin. There is a strong correlation between individual genetic estimates of Polynesian ancestry and those derived from the extensive pedigree and genealogical records of Islanders. Also in line with historical accounts, there is a substantial asymmetry in the maternal and paternal origins of the Islanders with almost all Y-chromosomes of European origin whereas at least 25% of mtDNAs appear to have a Polynesian origin. Accurate knowledge of ancestry will be important in future attempts to use the Island population in admixture mapping approaches to find the genes that underlie differences in the risk to some diseases between Europeans and Polynesians.
Resumo:
The first version of the Standard PREanalytical Code (SPREC) was developed in 2009 by the International Society for Biological and Environmental Repositories (ISBER) Biospecimen Science Working Group to facilitate documentation and communication of the most important preanalytical quality parameters of different types of biospecimens used for research. This same Working Group has now updated the SPREC to version 2.0, presented here, so that it contains more options to allow for recent technological developments. Existing elements have been fine tuned. An interface to the Biospecimen Reporting for Improved Study Quality (BRISQ) has been defined, and informatics solutions for SPREC implementation have been developed. A glossary with SPRECrelated definitions has also been added.
Resumo:
Lung cancer is the most important cause of cancer-related mortality. Resectability and eligibility for treatment with adjuvant chemotherapy is determined by staging according to the TNM classification. Other determinants of tumour behaviour that predict disease outcome, such as molecular markers, may improve decision-making. Activation of the gene encoding human telomerase reverse transcriptase (hTERT) is implicated in the pathogenesis of lung cancer, and consequently detection of hTERT mRNA might have prognostic value for patients with early stage lung cancer. A cohort of patients who underwent a complete resection for early stage lung cancer was recruited as part of the European Early Lung Cancer (EUELC) project. In 166 patients expression of hTERT mRNA was determined in tumour tissue by quantitative real-time RT-PCR and related to that of a house-keeping gene (PBGD). Of a subgroup of 130 patients tumour-distant normal tissue was additionally available for hTERT mRNA analysis. The correlation between hTERT levels of surgical samples and disease-free survival was determined using a Fine and Gray hazard model. Although hTERT mRNA positivity in tumour tissue was significantly associated with clinical stage (Fisher's exact test p=0.016), neither hTERT mRNA detectability nor hTERT mRNA levels in tumour tissue were associated with clinical outcome. Conversely, hTERT positivity in adjacent normal samples was associated with progressive disease, 28% of patients with progressive disease versus 7.5% of disease-free patients had detectable hTERT mRNA in normal tissue [adjusted HR: 3.60 (1.64-7.94), p=0.0015]. hTERT mRNA level in tumour tissue has no prognostic value for patients with early stage lung cancer. However, detection of hTERT mRNA expression in tumour-distant normal lung tissue may indicate an increased risk of progressive disease.
Resumo:
The genomes of an Australian and a Canadian isolate of potato leafroll virus have been cloned and sequenced. The sequences of both isolates are similar (about 93%), but the Canadian isolate (PLRV-C) is more closely related (about 98% identity) to a Scottish (PLRV-S) and a Dutch isolate (PLRV-N) than to the Australian isolate (PLRV-A). The 5'-terminal 18 nucleotide residues of PLRV-C, PLRV-A, PLRV-N and beet western yellows virus have 17 residues in common. In contrast, PLRV-S shows no obvious similarity in this region. PLRV-A and PLRV-C genomic sequences have localized regions of marked diversity, in particular a 600 nucleotide residue sequence in the polymerase gene. These data provide a world-wide perspective on the molecular biology of PLRV strains and their comparison with other luteoviruses and related RNA plant viruses suggests that there are two major subgroups in the plant luteoviruses.
Resumo:
This paper is interested in the way in which the heritage of another place, time, and culture is repurposed for popular consumption in an experience economy, as well as the way in which the visitors experience their own past and the past of others. We trace the processes of engagement, education and nostalgia that occur when the European heritage is presented in a postcolonial context and an Australian environment. The information presented includes the results of qualitative and quantitative research conducted at the Abbey Museum over the December-Jan. period of 2012-13.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
language (such as C++ and Java). The model used allows to insert watermarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic watermarking schemes were presented and their security discussed.
Resumo:
Phishing and related cybercrime is responsible for billions of dollars in losses annually. Gartner reported more than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008 (Gartner 2009). This paper asks whether the majority of organised phishing and related cybercrime originates in Eastern Europe rather than elsewhere such as China or the USA. The Russian “Mafiya” in particular has been popularised by the media and entertainment industries to the point where it can be hard to separate fact from fiction but we have endeavoured to look critically at the information available on this area to produce a survey. We take a particular focus on cybercrime from an Australian perspective, as Australia was one of the first places where Phishing attacks against Internet banks were seen. It is suspected these attacks came from Ukrainian spammers. The survey is built from case studies both where individuals from Eastern Europe have been charged with related crimes or unsolved cases where there is some nexus to Eastern Europe. It also uses some earlier work done looking at those early Phishing attacks, archival analysis of Phishing attacks in July 2006 and new work looking at correlation between the Corruption Perception Index, Internet penetration and tertiary education in Russia and the Ukraine. The value of this work is to inform and educate those charged with responding to cybercrime where a large part of the problem originates and try to understand why.
Resumo:
The present study explores reproducing the closest geometry of a high pressure ratio single stage radial-inflow turbine applied in the Sundstrans Power Systems T-100 Multipurpose Small Power Unit. The commercial software ANSYS-Vista RTD along with a built in module, BladeGen, is used to conduct a meanline design and create 3D geometry of one flow passage. Carefully examining the proposed design against the geometrical and experimental data, ANSYS-TurboGrid is applied to generate computational mesh. CFD simulations are performed with ANSYS-CFX in which three-dimensional Reynolds-Averaged Navier-Stokes equations are solved subject to appropriate boundary conditions. Results are compared with numerical and experimental data published in the literature in order to generate the exact geometry of the existing turbine and validate the numerical results against the experimental ones.