185 resultados para Exponential Sorting


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on probabilistic characteristics, which makes their security grow exponentially with the number of rounds N r r. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an overdefined system of algebraic equations (true with probability 1). We show that this is true for both Serpent (due to a small size of S-boxes) and Rijndael (due to unexpected algebraic properties). We study general methods known for solving overdefined systems of equations, such as XL from Eurocrypt’00, and show their inefficiency. Then we introduce a new method called XSL that uses the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly with the number of rounds. The XSL attack would then be polynomial (or subexponential) in N r> , with a huge constant that is double-exponential in the size of the S-box. The exact complexity of such attacks is not known due to the redundant equations. Though the presented version of the XSL attack always gives always more than the exhaustive search for Rijndael, it seems to (marginally) break 256-bit Serpent. We suggest a new criterion for design of S-boxes in block ciphers: they should not be describable by a system of polynomial equations that is too small or too overdefined.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Continuous monitoring of diesel engine performance is critical for early detection of fault developments in an engine before they materialize into a functional failure. Instantaneous crank angular speed (IAS) analysis is one of a few nonintrusive condition monitoring techniques that can be utilized for such a task. Furthermore, the technique is more suitable for mass industry deployments than other non-intrusive methods such as vibration and acoustic emission techniques due to the low instrumentation cost, smaller data size and robust signal clarity since IAS is not affected by the engine operation noise and noise from the surrounding environment. A combination of IAS and order analysis was employed in this experimental study and the major order component of the IAS spectrum was used for engine loading estimation and fault diagnosis of a four-stroke four-cylinder diesel engine. It was shown that IAS analysis can provide useful information about engine speed variation caused by changing piston momentum and crankshaft acceleration during the engine combustion process. It was also found that the major order component of the IAS spectra directly associated with the engine firing frequency (at twice the mean shaft rotating speed) can be utilized to estimate engine loading condition regardless of whether the engine is operating at healthy condition or with faults. The amplitude of this order component follows a distinctive exponential curve as the loading condition changes. A mathematical relationship was then established in the paper to estimate the engine power output based on the amplitude of this order component of the IAS spectrum. It was further illustrated that IAS technique can be employed for the detection of a simulated exhaust valve fault in this study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i  ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numeric sets can be used to store and distribute important information such as currency exchange rates and stock forecasts. It is useful to watermark such data for proving ownership in case of illegal distribution by someone. This paper analyzes the numerical set watermarking model presented by Sion et. al in “On watermarking numeric sets”, identifies it’s weaknesses, and proposes a novel scheme that overcomes these problems. One of the weaknesses of Sion’s watermarking scheme is the requirement to have a normally-distributed set, which is not true for many numeric sets such as forecast figures. Experiments indicate that the scheme is also susceptible to subset addition and secondary watermarking attacks. The watermarking model we propose can be used for numeric sets with arbitrary distribution. Theoretical analysis and experimental results show that the scheme is strongly resilient against sorting, subset selection, subset addition, distortion, and secondary watermarking attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The social media statistics of South Africa reveal an exponential increase in the use of social media. Libraries, as part of a community, cannot ignore this! Social media provide libraries instant and direct connection with their members regardless their geographical location. This paper explores social media use in libraries. The establishment of social media for the SABC Media Libraries is discussed to demonstrate a practical implementation of social media in libraries and archives. Tips and resources, with specific mention to Twitter and Facebook, as well as social media etiquette and social media policy guidelines are supplied. The literature of published articles and Infographic show the changing role of librarians in the social media era and the need for librarians to keep learning and update their skills to accommodate users’ needs. The focus should now be on how well we do social media for the library, not on whether we should do it or not! Keywords: Social Media, Libraries, Web 2.0, Librarians, Archives, SABC, South Africa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The social media statistics of South Africa reveal an exponential increase in the use of social media. Libraries, as part of a community, cannot ignore this! Social media provide libraries instant and direct connection with their members regardless their geographical location. This paper explores social media use in libraries. The establishment of social media for the SABC Media Libraries is discussed to demonstrate a practical implementation of social media in libraries and archives. Tips and resources, with specific mention to Twitter and Facebook, as well as social media etiquette and social media policy guidelines are supplied. The literature of published articles and Infographic show the changing role of librarians in the social media era and the need for librarians to keep learning and update their skills to accommodate users’ needs. The focus should now be on how well we do social media for the library, not on whether we should do it or not!

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Extensive research has highlighted the positive and exponential relationship between vehicle speed and crash risk and severity. Speed enforcement policies and practices throughout the world have developed dramatically as new technology becomes available, however speeding remains a pervasive problem internationally that significantly contributes to road trauma. This paper adopted a three-pronged approach to review speed enforcement policies and practices by: (i) describing and comparing policies and practices adopted in a cross-section of international jurisdictions; (ii) reviewing the available empirical evidence evaluating the effectiveness of various approaches, and; (iii) providing recommendations for the optimisation speed enforcement. The review shows the enforcement strategies adopted in various countries differ both in terms of the approaches used and how they are specifically applied. The literature review suggests strong and consistent evidence that police speed enforcement, in particular speed cameras, can be an effective tool for reducing vehicle speeds and subsequent traffic crashes. Drawing from this evidence, recommendations for best practice are proposed, including the specific instances in which various speed enforcement approaches typically produce the greatest road safety benefits, and perhaps most importantly, that speed enforcement programs must utilise a variety of strategies tailored to specific situations, rather than a one-size-fits-all approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Detailed knowledge of the past history of an active volcano is crucial for the prediction of the timing, frequency and style of future eruptions, and for the identification of potentially at-risk areas. Subaerial volcanic stratigraphies are often incomplete, due to a lack of exposure, or burial and erosion from subsequent eruptions. However, many volcanic eruptions produce widely-dispersed explosive products that are frequently deposited as tephra layers in the sea. Cores of marine sediment therefore have the potential to provide more complete volcanic stratigraphies, at least for explosive eruptions. Nevertheless, problems such as bioturbation and dispersal by currents affect the preservation and subsequent detection of marine tephra deposits. Consequently, cryptotephras, in which tephra grains are not sufficiently concentrated to form layers that are visible to the naked eye, may be the only record of many explosive eruptions. Additionally, thin, reworked deposits of volcanic clasts transported by floods and landslides, or during pyroclastic density currents may be incorrectly interpreted as tephra fallout layers, leading to the construction of inaccurate records of volcanism. This work uses samples from the volcanic island of Montserrat as a case study to test different techniques for generating volcanic eruption records from marine sediment cores, with a particular relevance to cores sampled in relatively proximal settings (i.e. tens of kilometres from the volcanic source) where volcaniclastic material may form a pervasive component of the sedimentary sequence. Visible volcaniclastic deposits identified by sedimentological logging were used to test the effectiveness of potential alternative volcaniclastic-deposit detection techniques, including point counting of grain types (component analysis), glass or mineral chemistry, colour spectrophotometry, grain size measurements, XRF core scanning, magnetic susceptibility and X-radiography. This study demonstrates that a set of time-efficient, non-destructive and high-spatial-resolution analyses (e.g. XRF core-scanning and magnetic susceptibility) can be used effectively to detect potential cryptotephra horizons in marine sediment cores. Once these horizons have been sampled, microscope image analysis of volcaniclastic grains can be used successfully to discriminate between tephra fallout deposits and other volcaniclastic deposits, by using specific criteria related to clast morphology and sorting. Standard practice should be employed when analysing marine sediment cores to accurately identify both visible tephra and cryptotephra deposits, and to distinguish fallout deposits from other volcaniclastic deposits.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australian Indigenous students' mathematics performance continues to be below that of non-Indigenous students. This occurs from the early years of school, due largely to knowledge and social differences on entry to formal schooling. This paper reports on a mathematics research project conducted in one Aboriginal community school in New South Wales, Australia. The project aimed to identify and explain the ways that young Australian Indigenous students (age 2-4 years) learn number language and processes, specifically attribute language, sorting, 1-1 correspondence and, counting. The project adopted a mixed methods approach. That is, the methodology was decolonising (Smith 1999) in that it collaborated with and gave benefit back to the Indigenous community and school being researched. It was qualitative and interpretative (Burns 2000) and incorporated an action-research teaching-experiment approach where and teachers collaborated with the researchers to try new teaching methods. This paper draws on data pertaining to students' response to diagnostic interview questions, the pre- and post-test results of the interview and photographic evidence as observations during mathematics learning time. Participants referred to in this paper include one female principal (N = 1), and the transition class of students' pre- (N = 6) and post-test (N = 3) results of the pre-foundational processes (also referred to as attributes). The results were encouraging with improvements in colour (34%), patterns (33%); capacity (38%). As a result of this project, our epistemology regarding the importance of finding out about students' pre-foundational knowledge and understandings and providing a culturally appropriate learning environment with resources has been built upon.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Limbal microvascular endothelial cells (L-MVEC) contribute to formation of the corneal-limbal stem cell niche and to neovascularization of diseased and injuries corneas. Nevertheless, despite these important roles in corneal health and disease, few attempts have been made to isolate L-MVEC with the view to studying their biology in vitro. We therefore explored the feasibility of generating primary cultures of L-MVEC from cadaveric human tissue. We commenced our study by evaluating growth conditions (MesenCult-XF system) that have been previously found to be associated with expression of the endothelial cell surface marker thrombomodulin/CD141, in crude cultures established from collagenase-digests of limbal stroma. The potential presence of L-MVEC in these cultures was examined by flow cytometry using a more specific marker for vascular endothelial cells, CD31/PECAM-1. These studies demonstrated that the presence of CD141 in crude cultures established using the MesenCult-XF system is unrelated to L-MVEC. Thus we subsequently explored the use of magnetic assisted cell sorting (MACS) for CD31 as a tool for generating cultures of L-MVEC, in conjunction with more traditional endothelial cell growth conditions. These conditions consisted of gelatin-coated tissue culture plastic and MCDB-131 medium supplemented with fetal bovine serum (10% v/v), D-glucose (10 mg/mL), epidermal growth factor (10 ng/mL), heparin (50 μg/mL), hydrocortisone (1 μg/mL) and basic fibroblast growth factor (10 ng/mL). Our studies revealed that use of endothelial growth conditions are insufficient to generate significant numbers of L-MVEC in primary cultures established from cadaveric corneal stroma. Nevertheless, through use of positive-MACS selection for CD31 we were able to routinely observe L-MVEC in cultures derived from collagenase-digests of limbal stroma. The presence of L-MVEC in these cultures was confirmed by immunostaining for von Willebrand factor (vWF) and by ingestion of acetylated low-density lipoprotein. Moreover, the vWF+ cells formed aligned cell-to-cell ‘trains’ when grown on Geltrex™. The purity of L-MVEC cultures was found to be unrelated to tissue donor age (32 to 80 years) or duration in eye bank corneal preservation medium prior to use (3 to 10 days in Optisol) (using multiple regression test). Optimal purity of L-MVEC cultures was achieved through use of two rounds of positive-MACS selection for CD31 (mean ± s.e.m, 65.0 ± 20.8%; p<0.05). We propose that human L-MVEC cultures generated through these techniques, in conjunction with other cell types, will provide a useful tool for exploring the mechanisms of blood vessel cell growth in vitro.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a novel framework for the modelling of passenger facilitation in a complex environment. The research is motivated by the challenges in the airport complex system, where there are multiple stakeholders, differing operational objectives and complex interactions and interdependencies between different parts of the airport system. Traditional methods for airport terminal modelling do not explicitly address the need for understanding causal relationships in a dynamic environment. Additionally, existing Bayesian Network (BN) models, which provide a means for capturing causal relationships, only present a static snapshot of a system. A method to integrate a BN complex systems model with stochastic queuing theory is developed based on the properties of the Poisson and exponential distributions. The resultant Hybrid Queue-based Bayesian Network (HQBN) framework enables the simulation of arbitrary factors, their relationships, and their effects on passenger flow and vice versa. A case study implementation of the framework is demonstrated on the inbound passenger facilitation process at Brisbane International Airport. The predicted outputs of the model, in terms of cumulative passenger flow at intermediary and end points in the inbound process, are found to have an R2 goodness of fit of 0.9994 and 0.9982 respectively over a 10 h test period. The utility of the framework is demonstrated on a number of usage scenarios including causal analysis and ‘what-if’ analysis. This framework provides the ability to analyse and simulate a dynamic complex system, and can be applied to other socio-technical systems such as hospitals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background The benign reputation of Plasmodium vivax is at odds with the burden and severity of the disease. This reputation, combined with restricted in vitro techniques, has slowed efforts to gain an understanding of the parasite biology and interaction with its human host. Methods A simulation model of the within-host dynamics of P. vivax infection is described, incorporating distinctive characteristics of the parasite such as the preferential invasion of reticulocytes and hypnozoite production. The developed model is fitted using digitized time-series’ from historic neurosyphilis studies, and subsequently validated against summary statistics from a larger study of the same population. The Chesson relapse pattern was used to demonstrate the impact of released hypnozoites. Results The typical pattern for dynamics of the parasite population is a rapid exponential increase in the first 10 days, followed by a gradual decline. Gametocyte counts follow a similar trend, but are approximately two orders of magnitude lower. The model predicts that, on average, an infected naïve host in the absence of treatment becomes infectious 7.9 days post patency and is infectious for a mean of 34.4 days. In the absence of treatment, the effect of hypnozoite release was not apparent as newly released parasites were obscured by the existing infection. Conclusions The results from the model provides useful insights into the dynamics of P. vivax infection in human hosts, in particular the timing of host infectiousness and the role of the hypnozoite in perpetuating infection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most standard algorithms for prediction with expert advice depend on a parameter called the learning rate. This learning rate needs to be large enough to fit the data well, but small enough to prevent overfitting. For the exponential weights algorithm, a sequence of prior work has established theoretical guarantees for higher and higher data-dependent tunings of the learning rate, which allow for increasingly aggressive learning. But in practice such theoretical tunings often still perform worse (as measured by their regret) than ad hoc tuning with an even higher learning rate. To close the gap between theory and practice we introduce an approach to learn the learning rate. Up to a factor that is at most (poly)logarithmic in the number of experts and the inverse of the learning rate, our method performs as well as if we would know the empirically best learning rate from a large range that includes both conservative small values and values that are much higher than those for which formal guarantees were previously available. Our method employs a grid of learning rates, yet runs in linear time regardless of the size of the grid.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The fractional Fokker-Planck equation is an important physical model for simulating anomalous diffusions with external forces. Because of the non-local property of the fractional derivative an interesting problem is to explore high accuracy numerical methods for fractional differential equations. In this paper, a space-time spectral method is presented for the numerical solution of the time fractional Fokker-Planck initial-boundary value problem. The proposed method employs the Jacobi polynomials for the temporal discretization and Fourier-like basis functions for the spatial discretization. Due to the diagonalizable trait of the Fourier-like basis functions, this leads to a reduced representation of the inner product in the Galerkin analysis. We prove that the time fractional Fokker-Planck equation attains the same approximation order as the time fractional diffusion equation developed in [23] by using the present method. That indicates an exponential decay may be achieved if the exact solution is sufficiently smooth. Finally, some numerical results are given to demonstrate the high order accuracy and efficiency of the new numerical scheme. The results show that the errors of the numerical solutions obtained by the space-time spectral method decay exponentially.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the society matures, there was an increasing pressure to preserve historic buildings. The economic cost in maintaining these important heritage legacies has become the prime consideration of every state. Dedicated intelligent monitoring systems supplementing the traditional building inspections will enable the stakeholder to carry out not only timely reactive response but also plan the maintenance in a more vigilant approach; thus, preventing further degradation which was very costly and difficult to address if neglected. The application of the intelligent structural health monitoring system in this case studies of ‘modern heritage’ buildings is on its infancy but it is an innovative approach in building maintenance. ‘Modern heritage’ buildings were the product of technological change and were made of synthetic materials such as reinforced concrete and steel. Architectural buildings that was very common in Oceania and The Pacific. Engineering problems that arose from this type of building calls for immediate engineering solution since the deterioration rate is exponential. The application of this newly emerging monitoring system will improve the traditional maintenance system on heritage conservation. Savings in time and resources can be achieved if only pathological results were on hand. This case study will validate that approach. This publication will serve as a position paper to the on-going research regarding application of (Structural Health Monitoring) SHM systems to heritage buildings in Brisbane, Australia. It will be investigated with the application of the SHM systems and devices to validate the integrity of the recent structural restoration of the newly re-strengthened heritage building, the Brisbane City Hall.