4,495 research outputs found

    Some facts about migrant workers in Taiwan

    Get PDF
    Panel: Currents of Migratio

    MODIFIED BODIPY PROBES TO EXPLORE PEROXISOME FUNCTION

    Get PDF
    This research aims to use fluorescent BODIPY probes to measure biological function within a plant cell. In particular developing BODIPY fluors with emission at near-infrared and long wavelength that provides considerable benefit for specific organelle monitoring will be explored. The work described in this thesis was mainly focused on the synthesis of the BODIPY and the photoaffinity labelling group. We present an effective synthesis of several BODIPY analogues with different meso-substituents. 3-Methoxy trifluoromethyl diazirine was successfully synthesised with the aim at coupling to the BODIPY dyes. However, although many borylation and bromination reactions on meta and para methoxy substituted trifluoromethyl diazirines, were attempted these were not successful. In an alternative approach, 4-benzoylphenylboronic acid was used as the pro-photoaffinity labelling residue. This could successfully be coupled with iodo-BODIPY for future use as cell-labelling fluorophore

    Sex trafficked women in Taiwan : an examination of the trafficking process and implications for policy

    Get PDF
    Research on the trafficking of women in Taiwan has hitherto largely explored the perceptions and roles of governmental officials and non governmental organisations. Very rarely has research focused on the lived experiences of women who have experienced sex trafficking, as reported by the women themselves. This thesis considers how sex trafficking operates in Taiwan through analysis of the current policy context and empirical data from semi structured interviews carried out with trafficked women and a number of key professionals working on combating sex trafficking in Taiwan. It outlines the processes of recruitment, transportation and coercion deployed in the trafficking process, and examines the similarities, as well as some differences, in the experiences of women who were smuggled into Taiwan or who came through `fake marriage', as well as those who came for `true marriage' or tourism. Mechanisms of control and regulation have been identified through analysis of the accounts of these women's experiences which provide a context for understanding their involvement in prostitution. The accounts of the women were contrasted with government policy and the ways professionals defined sex trafficked women. Based on this analysis, I recommend that the mechanisms through which women said they were controlled, forced and/or deceived have not been sufficiently acknowledged by policy makers, and that an important consequence of this under-acknowledgement is that law enforcement officials can fail to investigate the whole range of the trafficking process, which may lead to some women not being identified as being trafficked and not being given access to appropriate services and support as a result. This prompts a broader consideration of definitions of and policy frameworks on sexual trafficking in Taiwan and, related to this, the implications for relevant professionals, in particular the need to explore more fully the background of women who present themselves as having been trafficked.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Sex trafficked women in Taiwan : an examination of the trafficking process and implications for policy

    Get PDF
    Research on the trafficking of women in Taiwan has hitherto largely explored the perceptions and roles of governmental officials and non governmental organisations. Very rarely has research focused on the lived experiences of women who have experienced sex trafficking, as reported by the women themselves. This thesis considers how sex trafficking operates in Taiwan through analysis of the current policy context and empirical data from semi structured interviews carried out with trafficked women and a number of key professionals working on combating sex trafficking in Taiwan. It outlines the processes of recruitment, transportation and coercion deployed in the trafficking process, and examines the similarities, as well as some differences, in the experiences of women who were smuggled into Taiwan or who came through `fake marriage', as well as those who came for `true marriage' or tourism. Mechanisms of control and regulation have been identified through analysis of the accounts of these women's experiences which provide a context for understanding their involvement in prostitution. The accounts of the women were contrasted with government policy and the ways professionals defined sex trafficked women. Based on this analysis, I recommend that the mechanisms through which women said they were controlled, forced and/or deceived have not been sufficiently acknowledged by policy makers, and that an important consequence of this under-acknowledgement is that law enforcement officials can fail to investigate the whole range of the trafficking process, which may lead to some women not being identified as being trafficked and not being given access to appropriate services and support as a result. This prompts a broader consideration of definitions of and policy frameworks on sexual trafficking in Taiwan and, related to this, the implications for relevant professionals, in particular the need to explore more fully the background of women who present themselves as having been trafficked.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Three-Phase Detection and Classification for Android Malware Based on Common Behaviors

    Get PDF
    Android is one of the most popular operating systems used in mobile devices. Its popularity also renders it a common target for attackers. We propose an efficient and accurate three-phase behavior-based approach for detecting and classifying malicious Android applications. In the proposedapproach, the first two phases detect a malicious application and the final phase classifies the detected malware. The first phase quickly filters out benign applications based on requested permissions and the remaining samples are passed to the slower second phase, which detects malicious applications based on system call sequences. The final phase classifies malware into known or unknown types based on behavioral or permission similarities. Our contributions are three-fold: First, we propose a self-contained approach for Android malware identification and classification. Second, we show that permission requests from an Application are beneficial to benign application filtering. Third, we show that system call sequences generated from an application running inside a virtual machine can be used for malware detection. The experiment results indicate that the multi-phase approach is more accurate than the single-phase approach. The proposed approach registered true positive and false positive rates of 97% and 3%, respectively. In addition, more than 98% of the samples were correctly classified into known or unknown types of malware based on permission similarities.We believe that our findings shed some lights on future development of malware detection and classification

    Three-Phase Detection and Classification for Android Malware Based on Common Behaviors

    Get PDF
    Android is one of the most popular operating systems used in mobile devices. Its popularity also renders it a common target for attackers. We propose an efficient and accurate three-phase behavior-based approach for detecting and classifying malicious Android applications. In the proposed approach, the first two phases detect a malicious application and the final phase classifies the detected malware. The first phase quickly filters out benign applications based on requested permissions and the remaining samples are passed to the slower second phase, which detects malicious applications based on system call sequences. The final phase classifies malware into known or unknown types based on behavioral or permission similarities. Our contributions are three-fold: First, we propose a self-contained approach for Android malware identification and classification. Second, we show that permission requests from an Application are beneficial to benign application filtering. Third, we show that system call sequences generated from an application running inside a virtual machine can be used for malware detection. The experiment results indicate that the multi-phase approach is more accurate than the single-phase approach. The proposed approach registered true positive and false positive rates of 97% and 3%, respectively. In addition, more than 98% of the samples were correctly classified into known or unknown types of malware based on permission similarities.We believe that our findings shed some lights on future development of malware detection and classification

    Advances in research on personalized venous thromboembolism risk assessment tools

    Get PDF
    AbstractThis paper describes the definition of venous thromboembolism and introduces to personalized venous thromboembolism risk assessment tools overseas. Thoughts are given on the development, amendment, application and validation of these tools. The paper provides a reference for building personalized venous thromboembolism risk assessment tools in China

    Novel Mutation in Boy With Cartilage-hair Hypoplasia

    Get PDF
    BackgroundCartilage-hair hypoplasia (MIM 250250) is an autosomal recessive disease with diverse clinical manifestations. The clinical phenotypes include variable degrees of bone and hair dysplasia, deficient cellular and/or humoral immunity, and a predisposition to malignancy.MethodsWe performed genetic studies of a patient with disproportionate short stature and brittle scalp hair. Genetic studies were also carried out in the patient's parents.ResultsA novel maternal mutation that consisted of a duplication of 14 nucleotides at position −13 of the RNA component of the RNA component of mitochondrial RNA processing endoribonuclease gene (RMRP; g. −26 to −13 dupTACTACTCTGTGAA, promoter region) and a paternal mutation base substitution of C to T at nucleotide + 230 (designated as + 1 in the transcription initiation site) in the coding sequence of RMRP were detected in this patient.ConclusionA novel maternal RMRP mutation was found in a Chinese boy with typical cartilage-hair hypoplasia
    corecore