251 resultados para Magazzino automatico utensili modellazione incremento prestazioni FDM prove sperimentali
Resumo:
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to realize functional encryption for access structures from post-quantum hardness assumptions. Specifically, we build an efficient key-policy attribute-based encryption scheme, and prove its security in the selective sense from learning-with-errors intractability in the standard model.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
Attention Deficit Hyperactivity Disorder (ADHD) has achieved celebrity status in many Western countries, yet despite considerable effort to prove its existence as a “real” disorder, ADHD still suffers from a crisis of legitimacy. Nonetheless, diagnosis and prescription of medication has grown at a phenomenal rate since the late 1980s, particularly in Western culture. Numerous accounts exist explaining how the ADHD diagnosis functions as a convenient administrative loophole, providing schools with a medical explanation for school failure, medication to sedate the “problem” into submission, or the means to eject children from mainstream classrooms. This book provides a more holistic interpretation of how to respond to children who might otherwise be diagnosed with and medicated for “ADHD”—a diagnosis which, whether scientifically valid or not, is unhelpful within the confine of the school. Training teachers to recognise and identify “ADHD symptoms” or to understand the functions of restricted pharmaceuticals will only serve to increase the number of children diagnosed and the sale of psychoactive medications. Research has shown that such activities will not help those children learn, nor will it empower their classroom teachers to take responsibility for teaching such children well. This book seeks to provide school practitioners with knowledge that is useful within the educational context to improve the educational experiences and outcomes for children who might otherwise receive a diagnosis of ADHD.
Resumo:
The higher education sector in Australia is under increasing pressure to prove quality and efficacy of education provision, including graduate outcomes. One of the central tasks of higher education has become to prepare nascent professionals as far as possible for initial employment and future working lives beyond this (Boden & Nedeva, 2010). Tertiary educators in the creative arts face significant and distinctive challenges in demonstrating graduate employability, and creative graduates consistently have the poorest outcomes of any subject grouping. In part, this is because the national graduate destinations survey (Graduate Careers Council of Australia, 2012) does not cater to the distinctive ‘portfolio’ nature of creative careers, or take account of the fact that creative careers can take concerted effort over several years to establish (e.g., McCowan & Wyganowska, 2010). However, it is worth asking whether we as tertiary arts educators are doing enough to prepare creative arts students for the world of work, particularly given that the majority of them will be self-employed to some degree (Bureau of Labour Statistics, 2011, Throsby & Zednik, 2010), and will be challenged to build their own careers without recourse to the support of HR departments or intra-firm promotion schemes. It has been demonstrated empirically that career management and creative enterprise skills are among the most important graduate capabilities in determining early creative career success (Bridgstock, 2011), although these skills do not appear in the Learning and Teaching Academic Standards for the Creative and Performing Arts (2010). This paper explores the nature and development of enterprise capabilities for creative arts students (as distinct from students of the business school), examines best practice in the field internationally, and proposes a theoretically-driven creative arts-specific enterprise curriculum model which commences in first year, for demonstrable impact on student enterprise behaviours (such as grant seeking, professional networking and intention to start an enterprise) and employability.
Resumo:
OBJECTIVE: To investigate the role of the dopamine receptor genes, DRD1, DRD3, and DRD5 in the pathogenesis of migraine. BACKGROUND: Migraine is a chronic debilitating disorder affecting approximately 12% of the white population. The disease shows strong familial aggregation and presumably has a genetic basis, but at present, the type and number of genes involved is unclear. The study of candidate genes can prove useful in the identification of genes involved in complex diseases such as migraine, especially if the contribution of the gene to phenotypic expression is minor. Genes coding for proteins involved in dopamine metabolism have been implicated in a number of neurologic conditions and may play a contributory role in migraine. Hence, genes that code for enzymes and receptors modulating dopaminergic activity are good candidates for investigation of the molecular genetic basis of migraine. METHODS: We tested 275 migraineurs and 275 age- and sex-matched individuals free of migraine. Genotypic results were determined by restriction endonuclease digestion of polymerase chain reaction products to detect DRD1 and DRD3 alleles and by Genescan analysis after polymerase chain reaction using fluorescently labelled oligonucleotide primers for the DRD5 marker. RESULTS: Results of chi-square statistical analyses indicated that the allele distribution for migraine cases compared to controls was not significantly different for any of the three tested gene markers (chi2 = 0.1, P =.74 for DRD1; chi2 = 1.8, P =.18 for DRD3; and chi2 = 20.3, P =.08 for DRD5). CONCLUSIONS: These findings offer no evidence for allelic association between the tested dopamine receptor gene polymorphisms and the more prevalent forms of migraine and, therefore, do not support a role for these genes in the pathogenesis of the disorder.
Resumo:
1. Essential hypertension occurs in people with an underlying genetic predisposition who subject themselves to adverse environmental influences. The number of genes involved is unknown, as is the extent to which each contributes to final blood pressure and the severity of the disease. 2. In the past, studies of potential candidate genes have been performed by association (case-control) analysis of unrelated individuals or linkage (pedigree or sibpair) analysis of families. These studies have resulted in several positive findings but, as one may expect, also an enormous number of negative results. 3. In order to uncover the major genetic loci for essential hypertension, it is proposed that scanning the genome systematically in 100- 200 affected sibships should prove successful. 4. This involves genotyping sets of hypertensive sibships to determine their complement of several hundred microsatellite polymorphisms. Those that are highly informative, by having a high heterozygosity, are most suitable. Also, the markers need to be spaced sufficiently evenly across the genome so as to ensure adequate coverage. 5. Tests are performed to determine increased segregation of alleles of each marker with hypertension. The analytical tools involve specialized statistical programs that can detect such differences. Non- parametric multipoint analysis is an appropriate approach. 6. In this way, loci for essential hypertension are beginning to emerge.
Resumo:
This paper examines a number of issues in sustainable energy generation and distribution, and explores avenues that are available for integration of our society’s energy supplies. In particular, the paper presents a way in which transport vehicle energy supplies could be integrated with distributed generation schemes to achieve synergistic and beneficial outcomes. The worldwide energy system contains fundamental problems that result directly from the use of unsustainable fuels and a lack of energy system integration. There is a need to adopt an integrated, sustainable energy system for our society. The adoption of distributed generation could result in beneficial restructuring of the energy trade, and a change in the role of energy providers. Inherent benefits in distributed generation schemes would directly combat barriers to installation of renewable generation facilities, which might prove distributed renewable energy sources to be more feasible. The presence of fuel cells, batteries, power electronic inverters and intelligent controls in vehicles of the future provides many opportunities for the integration of vehicle energy supplies into a distributed generation scheme. In such a system, vehicles could play a major role in power generation and storage.
Resumo:
This paper examines a number of issues in sustainable energy generation and distribution, and explores avenues that are available for integration of our society’s energy supplies. In particular, the paper presents a way in which transport vehicle energy supplies could be integrated with distributed generation schemes to achieve synergistic and beneficial outcomes. The worldwide energy system contains fundamental problems that result directly from the use of unsustainable fuels and a lack of energy system integration. There is a need to adopt an integrated, sustainable energy system for our society. The adoption of distributed generation could result in beneficial restructuring of the energy trade, and a change in the role of energy providers. Inherent benefits in distributed generation schemes would directly combat barriers to installation of renewable generation facilities, which might prove distributed renewable energy sources to be more feasible. The presence of fuel cells, batteries, power electronic inverters and intelligent controls in vehicles of the future provides many opportunities for the integration of vehicle energy supplies into a distributed generation scheme. In such a system, vehicles could play a major role in power generation and storage.
Resumo:
Mainstream discourse on the revolving around food security is often portrayed by macro level indicators on nutrition, consumption and food production. While these indicators may prove significant in addressing food security in the national and regional levels, it falls short in addressing it among the indigenous peoples’ (IP) communities in the Philippines. Reflecting through the experiences in agricultural production, indigenous knowledge and socio-political institutions are relevant factors that must be seriously considered when food security among IPs are concerned. It is argued that disregarding micro level interactions over macro development policies will not address the issue of food security among marginalized sectors. The paper presents policy recommendations in taking cultural systems seriously in addressing food security among indigenous peoples.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
Lung cancer is the commonest cause of cancer death in the western world. Recent evidence suggests that angiogenesis is related to poor prognosis in many solid tumours including non-small cell lung cancer. Angiogenesis is controlled by a complex interaction between growth and apoptotic factors, proteases and adhesion molecules. The angiogenic process may prove a target for novel therapies such as matrix metalloproteinase inhibitors, growth factor antisense RNA, growth factor receptor antagonists and naturally occurring antiangiogenic peptides. These agents may be used alone or in combination with traditional chemotherapy, radiotherapy and surgery. (C) 2000 Elsevier Science Ireland Ltd.
Resumo:
Intravitreal injections of GABA antagonists, dopamine agonists and brief periods of normal vision have been shown separately to inhibit form-deprivation myopia (FDM). Our study had three aims: (i) establish whether GABAergic agents modify the myopia protective effect of normal vision, (ii) investigate the receptor sub-type specificity of any observed effect, and (iii) consider an interaction with the dopamine (DA) system. Prior to the period of normal vision GABAergic agents were applied either (i) individually, (ii) in combination with other GABAergic agents (an agonist with an antagonist), or (iii) in combination with DA agonists and antagonists. Water injections were given to groups not receiving drug treatments so that all experimental eyes received intravitreal injections. As shown previously, constant form-deprivation resulted in high myopia and when diffusers were removed for 2 h per day the period of normal vision greatly reduced the FDM that developed. GABA agonists inhibited the protective effect of normal vision whereas antagonists had the opposite effect. GABAA/C agonists and D2 DA antagonists when used in combination were additive in suppressing the protective effect of normal vision. A D2 DA agonist restored some of the protective effect of normal vision that was inhibited by a GABA agonist (muscimol). The protective effect of normal vision against form-deprivation is modifiable by both the GABAergic and DAergic pathways.
Resumo:
Purpose The purpose of this paper is to attempt to bridge the gap between sustainable housing and the use of smart technologies to improve the level of sustainability in the housing construction in Saudi Arabia, by discussing the barriers and enablers concerned with applying sustainability to housing construction in Saudi Arabia, which utilises smart technologies. Design/methodology/approach A Delphi method survey was employed, for which 25 individuals from three key stakeholder groups of the Saudi housing sector participated. They were asked about their degree of agreement (or disagreement) about the various barriers and enablers of applying sustainability to housing construction in Saudi Arabia, which utilises smart technologies. This research paper must be considered as an indicative study of selected experts that do not represent in any way the total population of Saudi Arabia. Findings Lack of public awareness has been identified as the most significant barrier in implementing sustainable housing development in Saudi Arabia, which utilises smart technologies. Raising awareness of the public to the benefits of sustainable housing and enlightening key project stakeholders in the design of sustainable housing are both essential in order to overcome the barriers discussed in this paper. In addition, it is important to adopt smart sustainable construction methods, exemplified by but not limited to, appropriate water preservation and wastewater treatment systems that are simultaneously smart and sustainable. Research limitations/implications This particular research has dealt with only barriers and enablers in the application of sustainability to housing in Saudi Arabia, which utilises smart technologies. For a more complete understanding, there is a need for further analysis of supplementary factors. Practical implications A study such as this, which identifies and prioritises barriers and enablers, could prove useful in guiding or encouraging the relevant ministry in Saudi Arabia to develop policies founded in the implementation of sustainability to the housing sector. Originality/value This research is a preliminary investigation into the implementation of sustainable housing development as it relates to Saudi Arabia.
Resumo:
A fractional differential equation is used to describe a fractal model of mobile/immobile transport with a power law memory function. This equation is the limiting equation that governs continuous time random walks with heavy tailed random waiting times. In this paper, we firstly propose a finite difference method to discretize the time variable and obtain a semi-discrete scheme. Then we discuss its stability and convergence. Secondly we consider a meshless method based on radial basis functions (RBFs) to discretize the space variable. In contrast to conventional FDM and FEM, the meshless method is demonstrated to have distinct advantages: calculations can be performed independent of a mesh, it is more accurate and it can be used to solve complex problems. Finally the convergence order is verified from a numerical example which is presented to describe a fractal model of mobile/immobile transport process with different problem domains. The numerical results indicate that the present meshless approach is very effective for modeling and simulating fractional differential equations, and it has good potential in the development of a robust simulation tool for problems in engineering and science that are governed by various types of fractional differential equations.