1000 resultados para Protection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research presented improved watermarking methods for mono and stereo audio signals. To enhance the performance, novel methods are developed using echo hiding techniques and patchwork-based algorithms. The superior performances of the proposed methods are demonstrated by theoretical analysis and simulation examples, in comparison with the existing methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis addressed the critical issue of retention in the child protection workforce. Key predictors of a workers 'intention to stay' or the 'likelihood of staying' were lifestyle factors and whether a worker had contemplated leaving the organisation. The degree of satisfaction was not in itself predictive of either intentions to stay or the actual 'likelihood of staying'.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article provides an overview of the emerging plant variety protection (PVP) systems in Southeast Asia. The case studies are from countries that form part of the regional Association of Southeast Asian Nations (ASEAN), mainly Indonesia, Malaysia, Philippines and Thailand. The focus will be on the intersection between intellectual property rights (IPRs) and popular demands for the protection of the traditional knowledge (TK) of local communities. Factors that fuelled the emergence and shaped the content of the PVP laws were the obligation to comply with art 27(3)(b) of the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS Agreement), aspirations for the development of the biotechnology industry, avoidance of possible sanction under the US ‘Special 301’ procedure, Free Trade Agreements (FTAs), the role played by the International Union for the Protection of New Plant Varieties (UPOV), technical assistance from UPOV member countries, membership of international biodiversity treaties and demands from civil society organisations for protection of TK. The PVP laws that resulted present an uneasy amalgam of conventional property rights with some aspects of protection of TK. It is very likely that the local communities claiming TK rights will face legal hurdles, in as much as government agencies implementing the law will face administrative and technical complications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cloud computing is an emerging evolutionary computing model that provides highly scalable services over highspeed Internet on a pay-as-usage model. However, cloud-based solutions still have not been widely deployed in some sensitive areas, such as banking and healthcare. The lack of widespread development is related to users’ concern that their confidential data or privacy would leak out in the cloud’s outsourced environment. To address this problem, we propose a novel active data-centric framework to ultimately improve the transparency and accountability of actual usage of the users’ data in cloud. Our data-centric framework emphasizes “active” feature which packages the raw data with active properties that enforce data usage with active defending and protection capability. To achieve the active scheme, we devise the Triggerable Data File Structure (TDFS). Moreover, we employ the zero-knowledge proof scheme to verify the request’s identification without revealing any vital information. Our experimental outcomes demonstrate the efficiency, dependability, and scalability of our framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The detrimental effects of UV radiation are having a significant impact on our life and environment. The development of effective UV shielding agents is therefore of great importance to our society. ZnO nanoparticles are considered to be one of the most effective UV blocking agents. However, the development of ZnO-based UV shielding products is currently hindered due to the adverse effects of the inherent photocatalytic activity exhibited by ZnO. This paper reports our recent study on the possibility of reducing the photoactivity of ZnO nanoparticles via surface modification and impurity doping. It was found that the photoactivity was drastically reduced by SiO2-coatings that were applied to ZnO quantum dots using the Stöber method and a microemulsion technique. The effect of transition metal doping on the photoactivity was also studied using mechanochemical processing and a co-precipitation method. Cobalt doping reduced the photoactivity, while manganese doping led to mixed results, possibly due to the difference in the location of dopant ions derived from the difference in the synthesis methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is concerned with the question of whether Australia would be better served by the inclusion of an entrenched Bill of Rights in the Constitution of the Commonwealth of Australia. In particular, attention will focus on the abuses of minorities that are all but certain to arise in any society that is based on majoritarian rule. This paper will also examine the question of whether an entrenched Bill of Rights would serve as an effective safeguard against such abuses, especially where the rights of unpopular minorities are involved. The analysis to follow is undertaken against the backdrop of the efficacy, or the lack thereof, of the Constitution of the United States in preventing such abuses, and particularly that portion of the American Constitution that is known as the Bill of Rights.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite numerous government inquiries and reforms, child sexual abuse in remote Aboriginal communities is a well-documented, ongoing problem. Established in Western Australia in 2009, Operation RESET is a multi-agency proactive community engagement initiative designed to improve the ability of communities and supporting agencies to detect, respond to and prevent child sexual abuse through the implementation of community engagement, capacity building and educational strategies. This comment describes the three core principles of Operation RESET: tackling child sexual abuse requires a collaborative, proactive approach between government and communities; the underlying causes and context of child sexual abuse must be recognised; and children's overall safety and wellbeing must be enhanced through integrated services that strengthen and empower families and communities. It also enumerates the seven phases of the operation's implementation, from identifying target communities to deploying an exit strategy. The comment ends by addressing the importance of empirical evaluation.