275 resultados para Equivalence Proof
Resumo:
An optical system which performs the multiplication of binary numbers is described and proof-of-principle experiments are performed. The simultaneous generation of all partial products, optical regrouping of bit products, and optical carry look-ahead addition are novel features of the proposed scheme which takes advantage of the parallel operations capability of optical computers. The proposed processor uses liquid crystal light valves (LCLVs). By space-sharing the LCLVs one such system could function as an array of multipliers. Together with the optical carry look-ahead adders described, this would constitute an optical matrix-vector multiplier.
Resumo:
Historical information can be used, in addition to pedigree, traits and genotypes, to map quantitative trait locus (QTL) in general populations via maximum likelihood estimation of variance components. This analysis is known as linkage disequilibrium (LD) and linkage mapping, because it exploits both linkage in families and LD at the population level. The search for QTL in the wild population of Soay sheep on St. Kilda is a proof of principle. We analysed the data from a previous study and confirmed some of the QTLs reported. The most striking result was the confirmation of a QTL affecting birth weight that had been reported using association tests but not when using linkage-based analyses. Copyright © Cambridge University Press 2010.
Resumo:
The 1st July 1997 heralded the implementation of a number of amendments to the Queensland Criminal Code including some intriguing changes affecting the principal property offences of stealing (section 398) and dishonest application (section 408C). This article discusses the impact of the changes. It examines the extent of the amendments and then aims to delineate the ambit of each offence drawing on some of the more recent judgments in the area. It concludes that the offences are moving closer together while retaining many of the complexities of proof experienced in the past.
Resumo:
The secondary phosphate mineral sigloite Fe3+Al2(PO4)2(OH)3·7H2O is the exception to the rule that phosphate mineral paragenesis is related to the final phase of hydrothermal mineralization at low temperatures. Sigloite was formed as an oxidation pseudomorph after paravauxite, during the last supergene paragenetic stage. We have studied the secondary phosphate mineral sigloite Fe3+Al2(PO4)2(OH)3·7H2O using vibrational spectroscopic techniques. Because the mineral is a phosphate mineral, it is readily studied by spectroscopic techniques as the phosphate and hydrogen phosphate units are readily measured. Indeed, sigloite shows the presence of both phosphate and hydrogen phosphate units in its structure. Raman bands at 1009 cm−1 with shoulders at 993 and 1039 cm−1 are assigned to stretching vibrations of and units. The Raman band at 993 cm−1 is assigned to the ν1 symmetric stretching mode of the POH units, whereas the Raman band at 1009 cm−1 is assigned to the ν1 symmetric stretching mode. Raman bands observed at 506, 528, 571, 596, 619 and 659 cm−1 are attributed to the ν4 out of plane bending modes of the PO4 and H2PO4 units. The Raman bands at 2988, 3118 and 3357 cm−1 are assigned to water stretching vibration. The series of bands at 3422, 3449, 3493, 3552 and 3615 cm−1 are assigned to the OH stretching vibrations of the hydroxyl units. The observation of multiple bands gives credence to the non-equivalence of the OH units in the sigloite structure.
Resumo:
The purpose of this study was to determine factors (internal and external) that influenced Canadian provincial (state) politicians when making funding decisions about public libraries. Using the case study methodology, Canadian provincial/state level funding for public libraries in the 2009-10 fiscal year was examined. After reviewing funding levels across the country, three jurisdictions were chosen for the case: British Columbia's budget revealed dramatically decreased funding, Alberta's budget showed dramatically increased funding, and Ontario's budget was unchanged from the previous year. The primary source of data for the case was a series of semi-structured interviews with elected officials and senior bureaucrats from the three jurisdictions. An examination of primary and secondary documents was also undertaken to help set the political and economic context as well as to provide triangulation for the case interviews. The data were analysed to determine whether Cialdini's theory of influence (2001) and specifically any of the six tactics of influence (i.e, commitment and consistency, authority, liking, social proof, scarcity and reciprocity) were instrumental in these budget processes. Findings show the principles of "authority", "consistency and commitment" and "liking" were relevant, and that "liking" were especially important to these decisions. When these decision makers were considering funding for public libraries, they most often used three distinct lenses: the consistency lens (what are my values? what would my party do?), the authority lens (is someone with hierarchical power telling me to do this? are the requests legitimate?), and most importantly, the liking lens (how much do I like and know about the requester?). These findings are consistent with Cialdini's theory, which suggests the quality of some relationships is one of six factors that can most influence a decision maker. The small number of prior research studies exploring the reasons for increases or decreases in public library funding allocation decisions have given little insight into the factors that motivate those politicians involved in the process and the variables that contribute to these decisions. No prior studies have examined the construct of influence in decision making about funding for Canadian public libraries at any level of government. Additionally, no prior studies have examined the construct of influence in decision making within the context of Canadian provincial politics. While many public libraries are facing difficult decisions in the face of uncertain funding futures, the ability of the sector to obtain favourable responses to requests for increases may require a less simplistic approach than previously thought. The ability to create meaningful connections with individuals in many communities and across all levels of government should be emphasised as a key factor in influencing funding decisions.
Resumo:
The contextuality of changing attitudes makes them extremely difficult to model. This paper scales up Quantum Decision Theory (QDT) to a social setting, using it to model the manner in which social contexts can interact with the process of low elaboration attitude change. The elements of this extended theory are presented, along with a proof of concept computational implementation in a low dimensional subspace. This model suggests that a society's understanding of social issues will settle down into a static or frozen configuration unless that society consists of a range of individuals with varying personality types and norms.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
The degree of diversity or similarity detected in comets depends primarily on the lifetimes of the individual cometary nuclei at the time of analysis. It is inherent in our understanding of cometary orbital dynamics and the seminal model of comet origins that cometary evolution is the natural order of events in our Solar System. Thus, predictions of cometary behaviour in terms of bulk physical, mineralogical or chemical parameters should contain an appreciation of temporal variation(s). Previously, Rietmeijer and Mackinnon [1987] developed mineralogical bases for the chemical evolution of cometary nuclei primarily with regard to the predominantly silicate fraction of comet nuclei. We suggested that alteration of solids in cometary nuclei should be expected and that indications of likely reactants and products can be derived from judicious comparison with terrestrial diagenetic environments which include hydrocryogenic and low-temperature aqueous alterations. In a further development of this concept, Rietmeijer [1988] provides indirect evidence for the formation of sulfides and oxides in comet nuclei. Furthermore, Rietmeijer [1988] noted that timescales for hydrocryogenic and low-temperature reactions involving liquid water are probably adequate for relatively mature comets, e.g. P/comet Halley. In this paper, we will address the evolution of comet nuclei physical parameters such as solid particle grain size, porosity and density. In natural environments, chemical evolution (e.g. mineral reactions) is often accompanied by changes in physical properties. These concurrent changes are well-documented in the terrestrial geological literature, especially in studies of sediment diagenesis and we suggest that similar basic principles apply within the upper few meters of active comet nuclei. The database for prediction of comet nuclei physical parameters is, in principle, the same as used for the proposition of chemical evolution. We use detailed mineralogical studies of chondritic interplanetary dust particles (IDPS) as a guide to the likely constitution of mature comets traversing the inner Solar System. While there is, as yet, no direct proof that a specific sub-group or type of chondritic IDP is derived from a specific comet, it is clear that these particles are extraterrestrial in origin and that a certain portion of the interplanetary flux received by the Earth is cometary in origin. Two chondritic porous (CP) IDPS, sample numbers W701OA2 and W7029CI, from the Johnson Space Center Cosmic Dust Collection have been selected for this study of putative cometary physical parameters. This particular type of particle is considered a likely candidate for a cometary origin on the basis of mineralogy, bulk composition and morphology. While many IDPs have been subjected to intensive study over the past decade, we can develop a physical parameter model on only these two CP IDPs because few others have been studied in sufficient detail.
Resumo:
This study of English Coronial practice raises a number of questions, not only regarding state investigations of suicide, but also of the role of the Coroner itself. Following observations at over 20 inquests into possible suicides, and in-depth interviews with six Coroners, three main issue emerged: first, there exists considerable slippage between different Coroners over which deaths are likely to be classified as suicide; second, the high standard of proof required, and immense pressure faced by Coroners from family members at inquest to reach any verdict other than suicide, can significantly depress likely suicide rates; and finally, Coroners feel no professional obligation, either individually or collectively, to contribute to the production of consistent and useful social data regarding suicide—arguably rendering comparative suicide statistics relatively worthless. These issues lead, ultimately, to a more important question about the role we expect Coroners to play within social governance, and within an effective, contemporary democracy.
Resumo:
We present a tool for automatic analysis of computational indistinguishability between two strings of information. This is designed as a generic tool for proving cryptographic security based on a formalism that provides computational soundness preservation. The tool has been implemented and tested successfully with several cryptographic schemes.
Resumo:
The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud provider. The method is based on combining existing proof-of-storage schemes with distance-bounding protocols. Specifically, cloud customers will be able to verify the confidentiality, integrity, availability, fairness (or mutual non-repudiation), data freshness, geographic assurance and replication of their stored data directly, without having to rely on the word of the cloud provider.
Resumo:
Vibrational spectroscopy has been used to characterize the sulphate mineral khademite Al(SO4)F∙5(H2O). Raman band at 991 cm-1 with a shoulder at 975 cm-1 is assigned to the ν1 (SO4)2- symmetric stretching mode. The observation of two symmetric stretching modes suggests that the sulphate units are not equivalent. Two low intensity Raman bands at 1104 and 1132 cm-1 are assigned to the ν3 (SO4)2- antisymmetric stretching mode. The broad Raman band at 618 cm-1 is assigned to the v4 (SO4)2- bending modes. Raman bands at 455, 505 and 534 cm-1 are attributable to the doubly degenerate v2 (SO4)2- bending modes. Raman bands at 2991, 3146 and 3380 cm-1 are assigned to the OH stretching bands of water. Five infrared bands are noted at 2458, 2896, 3203, 3348 and 3489 cm-1 are also due to water stretching bands. The observation of multiple water stretching vibrations gives credence to the non-equivalence of water units in the khademite structure. Vibrational spectroscopy enables an assessment of the structure of khademite.
Resumo:
We introduce the use of Ingenuity Pathway Analysis to analyzing global metabonomics in order to characterize phenotypically biochemical perturbations and the potential mechanisms of the gentamicin-induced toxicity in multiple organs. A single dose of gentamicin was administered to Sprague Dawley rats (200 mg/kg, n = 6) and urine samples were collected at -24-0 h pre-dosage, 0-24, 24-48, 48-72 and 72-96 h post-dosage of gentamicin. The urine metabonomics analysis was performed by UPLC/MS, and the mass spectra signals of the detected metabolites were systematically deconvoluted and analyzed by pattern recognition analyses (Heatmap, PCA and PLS-DA), revealing a time-dependency of the biochemical perturbations induced by gentamicin toxicity. As result, the holistic metabolome change induced by gentamicin toxicity in the animal's organisms was characterized. Several metabolites involved in amino acid metabolism were identified in urine, and it was confirmed that gentamicin biochemical perturbations can be foreseen from these biomarkers. Notoriously, it was found that gentamicin induced toxicity in multiple organs system in the laboratory rats. The proof-of-knowledge based Ingenuity Pathway Analysis revealed gentamicin induced liver and heart toxicity, along with the previously known toxicity in kidney. The metabolites creatine, nicotinic acid, prostaglandin E2, and cholic acid were identified and validated as phenotypic biomarkers of gentamicin induced toxicity. Altogether, the significance of the use of metabonomics analyses in the assessment of drug toxicity is highlighted once more; furthermore, this work demonstrated the powerful predictive potential of the Ingenuity Pathway Analysis to study of drug toxicity and its valuable complementation for metabonomics based assessment of the drug toxicity.
Resumo:
Attention Deficit Hyperactivity Disorder (ADHD) has achieved celebrity status in many Western countries, yet despite considerable effort to prove its existence as a “real” disorder, ADHD still suffers from a crisis of legitimacy. Nonetheless, diagnosis and prescription of medication has grown at a phenomenal rate since the late 1980s, particularly in Western culture. Numerous accounts exist explaining how the ADHD diagnosis functions as a convenient administrative loophole, providing schools with a medical explanation for school failure, medication to sedate the “problem” into submission, or the means to eject children from mainstream classrooms. This book provides a more holistic interpretation of how to respond to children who might otherwise be diagnosed with and medicated for “ADHD”—a diagnosis which, whether scientifically valid or not, is unhelpful within the confine of the school. Training teachers to recognise and identify “ADHD symptoms” or to understand the functions of restricted pharmaceuticals will only serve to increase the number of children diagnosed and the sale of psychoactive medications. Research has shown that such activities will not help those children learn, nor will it empower their classroom teachers to take responsibility for teaching such children well. This book seeks to provide school practitioners with knowledge that is useful within the educational context to improve the educational experiences and outcomes for children who might otherwise receive a diagnosis of ADHD.
Resumo:
This book provides a general framework for specifying, estimating, and testing time series econometric models. Special emphasis is given to estimation by maximum likelihood, but other methods are also discussed, including quasi-maximum likelihood estimation, generalized method of moments estimation, nonparametric estimation, and estimation by simulation. An important advantage of adopting the principle of maximum likelihood as the unifying framework for the book is that many of the estimators and test statistics proposed in econometrics can be derived within a likelihood framework, thereby providing a coherent vehicle for understanding their properties and interrelationships. In contrast to many existing econometric textbooks, which deal mainly with the theoretical properties of estimators and test statistics through a theorem-proof presentation, this book squarely addresses implementation to provide direct conduits between the theory and applied work.