998 resultados para H. Paul Douglas Lecture
Resumo:
Objective To understand how the formal curriculum experience of an Australian undergraduate pharmacy program supports students’ professional identity formation. Methods A qualitative ethnographic study was conducted over four weeks using participant observation and examined the ‘typical’ student experience from the perspective of a pharmacist. A one-week period of observation was undertaken with each of the four year groups (that is, for years one to four) comprising the undergraduate curriculum. Data were collected through observation of the formal curriculum experience using field notes, a reflective journal and informal interviews with 38 pharmacy students. Data were analyzed thematically using an a priori analytical framework. Results Our findings showed that the observed curriculum was a conventional curricular experience which focused on the provision of technical knowledge and provided some opportunities for practical engagement. There were some opportunities for students to imagine themselves as pharmacists, for example, when the lecture content related to practice or teaching staff described their approach to practice problems. However, there were limited opportunities for students to observe pharmacist role models, experiment with being a pharmacist or evaluate their professional identities. While curricular learning activities were available for students to develop as pharmacists e.g. patient counseling, there was no contact with patients and pharmacist academic staff tended to role model as educators with little evidence of their pharmacist selves. Conclusion These findings suggest that the current conventional approach to the curriculum design may not be fully enabling learning experiences which support students in successfully negotiating their professional identities. Instead it appeared to reinforce their identities as students with a naïve understanding of professional practice, making their future transition to professional practice challenging.
Resumo:
This paper addresses the problem of computing the aggregate QoS of a composite service given the QoS of the services participating in the composition. Previous solutions to this problem are restricted to composite services with well-structured orchestration models. Yet, in existing languages such as WS-BPEL and BPMN, orchestration models may be unstructured. This paper lifts this limitation by providing equations to compute the aggregate QoS for general types of irreducible unstructured regions in orchestration models. In conjunction with existing algorithms for decomposing business process models into single-entry-single-exit regions, these functions allow us to cover a larger set of orchestration models than existing QoS aggregation techniques.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.
Resumo:
Scramjet-based launch systems offer considerable promise for safe, reliable and economical access to space. A general Scramjets introduction is first provided, followed by the specifics of Australian Scramjet Research and the recent progress in inlet-injection radical-farming scramjets as part of the SCRAMSPACE program. Through both flight and ground tests, leveraging Australias world leadership in scramjet R&D, the SCRAMSPACE project is designed to answer key scientific and technological questions and build an industry-ready talent pool for a future Australian space industry. An extensive descriptions of all phases of the development of the SCRAMSPACE I scramjet-powered free-flight experiment are described in these lecture notes.
Resumo:
Environmental monitoring has become increasingly important due to the significant impact of human activities and climate change on biodiversity. Environmental sound sources such as rain and insect vocalizations are a rich and underexploited source of information in environmental audio recordings. This paper is concerned with the classification of rain within acoustic sensor re-cordings. We present the novel application of a set of features for classifying environmental acoustics: acoustic entropy, the acoustic complexity index, spectral cover, and background noise. In order to improve the performance of the rain classification system we automatically classify segments of environmental recordings into the classes of heavy rain or non-rain. A decision tree classifier is experientially compared with other classifiers. The experimental results show that our system is effective in classifying segments of environmental audio recordings with an accuracy of 93% for the binary classification of heavy rain/non-rain.
Resumo:
Podiatry is the medical science of the bones, muscle and skin of the foot. Paul Bennett is sometimes called on by police to help solve crime. He can provide vital evidence by applying his medical expertise and extraordinary talent for pattern recognition to footprints left at crime-scenes. Paul is a senior lecturer at the Quensland University of Technology's School of Clinical Sciences.
Resumo:
The HOXB13 gene has been implicated in prostate cancer (PrCa) susceptibility. We performed a high resolution fine-mapping analysis to comprehensively evaluate the association between common genetic variation across the HOXB genetic locus at 17q21 and PrCa risk. This involved genotyping 700 SNPs using a custom Illumina iSelect array (iCOGS) followed by imputation of 3195 SNPs in 20,440 PrCa cases and 21,469 controls in The PRACTICAL consortium. We identified a cluster of highly correlated common variants situated within or closely upstream of HOXB13 that were significantly associated with PrCa risk, described by rs117576373 (OR 1.30, P = 2.62×10(-14)). Additional genotyping, conditional regression and haplotype analyses indicated that the newly identified common variants tag a rare, partially correlated coding variant in the HOXB13 gene (G84E, rs138213197), which has been identified recently as a moderate penetrance PrCa susceptibility allele. The potential for GWAS associations detected through common SNPs to be driven by rare causal variants with higher relative risks has long been proposed; however, to our knowledge this is the first experimental evidence for this phenomenon of synthetic association contributing to cancer susceptibility.
Resumo:
Background Chronic kidney disease (CKD) is a complex health problem, which requires individuals to invest considerable time and energy in managing their health and adhering to multifaceted treatment regimens. Objectives To review studies delivering self-management interventions to people with CKD (Stages 1–4) and assess whether these interventions improve patient outcomes. Design: Systematic review. Methods Nine electronic databases (MedLine, CINAHL, EMBASE, ProQuest Health & Medical Complete, ProQuest Nursing & Allied Health, The Cochrane Library, The Joanna Briggs Institute EBP Database, Web of Science and PsycINFO) were searched using relevant terms for papers published between January 2003 and February 2013. Results The search strategy identified 2,051 papers, of which 34 were retrieved in full with only 5 studies involving 274 patients meeting the inclusion criteria. Three studies were randomised controlled trials, a variety of methods were used to measure outcomes, and four studies included a nurse on the self-management intervention team. There was little consistency in the delivery, intensity, duration and format of the self-management programmes. There is some evidence that knowledge- and health-related quality of life improved. Generally, small effects were observed for levels of adherence and progression of CKD according to physiologic measures. Conclusion The effectiveness of self-management programmes in CKD (Stages 1–4) cannot be conclusively ascertained, and further research is required. It is desirable that individuals with CKD are supported to effectively self-manage day-to-day aspects of their health.
Resumo:
This report describes results and conclusions from the monitoring component of the Douglas Shire Council (DSC) water quality project. The components of this project that this report addresses are: • Site selection and installation of in-stream and off-paddock automatic water quality monitoring equipment in the Douglas Shire. • Design of appropriate sampling strategies for automatic stations. • Estimation of loads of suspended sediment, total nitrogen and total phosphorus in rivers and also estimation of the changes in nutrient loads from sugar cane under different fertilizer application rates. • Development of a community-based water quality sampling program to complement the automatic sampling efforts. • Design of an optimised, long-term water quality monitoring strategy.
Resumo:
The question of the authority of law has occupied and vexed the literature and philosophy of law for centuries. Law is something that characteristically implies obedience, but the precise nature of law’s authority remains contentious. The return to the writings of the Apostle Paul in contemporary philosophy, theology and jurisprudence begs attention in relation to the authority of law, and so this article will consider his analysis and critique of law with a focus on his Epistle to the Romans. It argues that Paul’s conception of the authority of law is explained on the basis that the law is from God, it externally sanctions obedience by virtue of the civil authorities, and it convicts internally in conscience. This triad is justified by the law of love (‘‘love your neighbor as yourself’’), and will be explained in relation to the natural law tradition as well as converse ideas in positivism. Hence, considering the reasoning of Paul in relation to traditional jurisprudential themes and the law of love provides a useful alternative analysis and basis for further investigation regarding the authority of law and the need for its obedience.
Resumo:
Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.
Resumo:
A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.
Resumo:
Two studies documented the “David and Goliath rule—the tendency for people to perceive criticism of “David” groups (groups with low power and status) as less normatively permissible than criticism of “Goliath groups (groups with high power and status). The authors confirmed the existence of the David and Goliath rule across Western and Chinese cultures (Study 1). However, the rule was endorsed more strongly in Western than in Chinese cultures, an effect mediated by cultural differences in power distance. Study 2 identified the psychological underpinnings of this rule in an Australian sample. Lower social dominance orientation (SDO) was associated with greater endorsement of the rule, an effect mediated through the differential attribution of stereotypes. Specifically, those low in SDO were more likely to attribute traits of warmth and incompetence to David versus Goliath groups, a pattern of stereotypes that was related to the protection of David groups from criticism.
Resumo:
XACML has become the defacto standard for enterprise- wide, policy-based access control. It is a structured, extensible language that can express and enforce complex access control policies. There have been several efforts to extend XACML to support specific authorisation models, such as the OASIS RBAC profile to support Role Based Access Control. A number of proposals for authorisation models that support business processes and workflow systems have also appeared in the literature. However, there is no published work describing an extension to allow XACML to be used as a policy language with these models. This paper analyses the specific requirements of a policy language to express and enforce business process authorisation policies. It then introduces BP-XACML, a new profile that extends the RBAC profile for XACML so it can support business process authorisation policies. In particular, BP-XACML supports the notion of tasks, and constraints at the level of a task instance, which are important requirements in enforcing business process authorisation policies.