725 resultados para dual system encryption
Resumo:
Growth rods are commonly used for the treatment of scoliosis in the immature spine. Many variations have been proposed but breakage of implants is a common problem. Growth rod insertion commonly involves large exposures at initial insertion followed by multiple smaller procedures for lengthening. We present our early experiences using a percutaneous technique of insertion of a new titanium mobile bearing implant (Medtronic Inc). The implant allows some rotatory motion in the middle of the construct thus reducing construct stresses and thus possibly reducing rod breakage risk. Based on this small initial series with 12 months follow-up, percutaneous insertion of growth rods using the new implant is a safe and reliable technique although the infection rate in our sample was of note. This may be related to the titanium wear and inflammation seen in the soft tissues at time of operation and visualised on histology. No implants have required removal due to infection, and all infections were treated with debridement at next lengthening and suppressive antibiotics. Propionibacterium is one of the commonest infections seen with spinal implants and sometimes does not respond to simple antibiotic suppression. The technique allows preservation of the soft tissues until definitive fusion is needed and may lead to a decrease in hospital stay. The implant is low profile and seems to offer advantages over other systems on the market. Further follow up is needed to look at longer term outcomes with this new implant type.
Resumo:
With the application of GIS methodologies to spatial data, researchers can now identify patterns of occurrence for many social problems including health-issues and crime. Further more, since this type of data also contains clues as to the underlying causes of social problems, it can be used to make well-educated and consequently, more effective policy decisions.
Resumo:
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
Internationally, recognition of the role of assessment to inform the learning process has received much attention in recent years. Assessment for learning, not just of learning is being supported by an increasing body of literature providing strategies that teachers and their students can incorporate to support the learning process (Assessment Reform Group, 2002; Broadfoot & Black, 2004; James, 2006). Concurrently there has been an increase internationally in systemic accountability requirements of schools in terms of student results. The convergence of these two movements has resulted in some education systems promoting standards-driven reform involving authentic assessment and a re-examination of the relationship between the teacher and the student in the learning process. In this context standards are intended to be used as the basis for judgements of student achievement; while the results from assessment tasks are meant to both inform the teaching/learning process, and to report and track student progress. In such system, the role and reliability of teacher judgement takes centre stage.
Resumo:
The computing tools and technologies with urban information systems are designed to enhance planners’ capability to deal with complex urban environments and to plan for prosperous and liveable communities. This paper examines the role of Online Urban Information Systems or in another words Internet based Geographic Information Systems as spatial decision support systems to aid local planning process. This paper introduces a prototype Internet GIS model that aims to integrate a public oriented interactive decision support system for urban planning process. This model, referred as a ‘Community based Internet GIS’, incorporates advanced information technologies and community involvement in decision making processes on the web environment. This innovative model has been recently applied to a pilot case in Tokyo and this paper concludes with the preliminary results of this project.
Resumo:
The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.
Resumo:
The lack of satisfactory consensus for characterizing the system intelligence and structured analytical decision models has inhibited the developers and practitioners to understand and configure optimum intelligent building systems in a fully informed manner. So far, little research has been conducted in this aspect. This research is designed to identify the key intelligent indicators, and develop analytical models for computing the system intelligence score of smart building system in the intelligent building. The integrated building management system (IBMS) was used as an illustrative example to present a framework. The models presented in this study applied the system intelligence theory, and the conceptual analytical framework. A total of 16 key intelligent indicators were first identified from a general survey. Then, two multi-criteria decision making (MCDM) approaches, the analytic hierarchy process (AHP) and analytic network process (ANP), were employed to develop the system intelligence analytical models. Top intelligence indicators of IBMS include: self-diagnostic of operation deviations; adaptive limiting control algorithm; and, year-round time schedule performance. The developed conceptual framework was then transformed to the practical model. The effectiveness of the practical model was evaluated by means of expert validation. The main contribution of this research is to promote understanding of the intelligent indicators, and to set the foundation for a systemic framework that provide developers and building stakeholders a consolidated inclusive tool for the system intelligence evaluation of the proposed components design configurations.
Resumo:
Introduction : For the past decade, three dimensional (3D) culture has served as a foundation for regenerative medicine study. With an increasing awareness of the importance of cell-cell and cell-extracellular matrix interactions which are lacking in 2D culture system, 3D culture system has been employed for many other applications namely cancer research. Through development of various biomaterials and utilization of tissue engineering technology, many in vivo physiological responses are now better understood. The cellular and molecular communication of cancer cells and their microenvironment, for instance can be studied in vitro in 3D culture system without relying on animal models alone. Predilection of prostate cancer (CaP) to bone remains obscure due to the complexity of the mechanisms and lack of proper model for the studies. In this study, we aim to investigate the interaction between CaP cells and osteoblasts simulating the natural bone metastasis. We also further investigate the invasiveness of CaP cells and response of androgen sensitve CaP cells, LNCaP to synthetic androgen.----- Method : Human osteoblast (hOB) scaffolds were prepared by seeding hOB on medical grade polycaprolactone-tricalcium phosphate (mPLC-TCP) scaffolds and induced to produce bone matrix. CaP cell lines namely wild type PC3 (PC3-N), overexpressed prostate specific antigen PC3 (PC3k3s5) and LNCaP were seeded on hOB scaffolds as co-cultures. Morphology of cells was examined by Phalloidin-DAPI and SEM imaging. Gelatin zymography was performed on the 48 hours conditioned media (CM) from co-cultures to determine matrix metalloproteinase (MMP) activity. Gene expression of hOB/LNCaP co-cultures which were treated for 48 hours with 1nM synthetic androgen R1881 were analysed by quantitative real time PCR (qRT-PCR).----- Results : Co-culture of PCC/hOB revealed that the morphology of PCCs on the tissue engineered bone matrix varied from homogenous to heterogenous clusters. Enzymatically inactive pro-MMP2 was detected in CM from hOBs and PCCs cultured on scaffolds. Elevation in MMP9 activity was found only in hOB/PC3N co-culture. hOB/LNCaP co-culture showed increase in expression of key enzymes associated with steroid production which also corresponded to an increase in prostate specific antigen (PSA) and MMP9.----- Conclusions : Upregulation of MMP9 indicates involvement of ECM degradation during cancer invasion and bone metastases. Expression of enzymes involved in CaP progression, PSA, which is not expressed in osteoblasts, demonstrates that crosstalk between PCCs and osteoblasts may play a part in the aggressiveness of CaP. The presence of steroidogenic enzymes, particularly, RDH5, in osteoblasts and stimulated expression in co-culture, may indicate osteoblast production of potent androgens, fuelling cancer cell proliferation. Based on these results, this practical 3D culture system may provide greater understanding into CaP mediated bone metastasis. This allows the role of the CaP/hOB interaction with regards to invasive property and steroidogenesis to be further explored.
Resumo:
Troubled dynamics between residents of an Aboriginal town in Queensland and the local health system were established during colonisation and consolidated during those periods of Australian history where the policies of 'protection' (segregation), integration and then assimilation held sway. The status of Aboriginal health is, in part, related to interactions between the residents' current and historical experiences of the health and criminal justice systems as together these agencies used medical and moral policing to legitimate dispossession, marginalisation, institutionalisation and control of the residents. The punitive regulations and ethnocentric strategies used by these institutions are within the living memory of many of the residents or in the published accounts of preceding generations. This paper explores current residents' memories and experiences.
Resumo:
This report presents the demonstration of software agents prototype system for improving maintenance management [AIMM] including: • Developing and implementing a user focused approach for mining the maintenance data of buildings. This report presents the demonstration of software agents prototype system for improving maintenance management [AIMM] including: • Developing and implementing a user focused approach for mining the maintenance data of buildings. • Refining the development of a multi agent system for data mining in virtual environments (Active Worlds) by developing and implementing a filtering agent on the results obtained from applying data mining techniques on the maintenance data. • Integrating the filtering agent within the multi agents system in an interactive networked multi-user 3D virtual environment. • Populating maintenance data and discovering new rules of knowledge.
Resumo:
This paper reports the initial steps of research on planning of rural networks for MV and LV. In this paper, two different cases are studied. In the first case, 100 loads are distributed uniformly on a 100 km transmission line in a distribution network and in the second case, the load structure become closer to the rural situation. In case 2, 21 loads are located in a distribution system so that their distance is increasing, distance between load 1 and 2 is 3 km, between 2 and 3 is 6 km, etc). These two models to some extent represent the distribution system in urban and rural areas, respectively. The objective function for the design of the optimal system consists of three main parts: cost of transformers, and MV and LV conductors. The bus voltage is expressed as a constraint and should be maintained within a standard level, rising or falling by no more than 5%.
Resumo:
An earlier CRC-CI project on ‘automatic estimating’ (AE) has shown the key benefit of model-based design methodologies in building design and construction to be the provision of timely quantitative cost evaluations. Furthermore, using AE during design improves design options, and results in improved design turn-around times, better design quality and/or lower costs. However, AEs for civil engineering structures do not exist; and research partners in the CRC-CI expressed interest in exploring the development of such a process. This document reports on these investigations. The central objective of the study was to evaluate the benefits and costs of developing an AE for concrete civil engineering works. By studying existing documents and through interviews with design engineers, contractors and estimators, we have established that current civil engineering practices (mainly roads/bridges) do not use model-based planning/design. Drawings are executed in 2D and only completed at the end of lengthy planning/design project management lifecycle stages. We have also determined that estimating plays two important, but different roles. The first is part of project management (which we have called macro level estimating). Estimating in this domain sets project budgets, controls quality delivery and contains costs. The second role is estimating during planning/design (micro level estimating). The difference between the two roles is that the former is performed at the end of various lifecycle stages, whereas the latter is performed at any suitable time during planning/design.
Resumo:
Key topics: Since the birth of the Open Source movement in the mid-80's, open source software has become more and more widespread. Amongst others, the Linux operating system, the Apache web server and the Firefox internet explorer have taken substantial market shares to their proprietary competitors. Open source software is governed by particular types of licenses. As proprietary licenses only allow the software's use in exchange for a fee, open source licenses grant users more rights like the free use, free copy, free modification and free distribution of the software, as well as free access to the source code. This new phenomenon has raised many managerial questions: organizational issues related to the system of governance that underlie such open source communities (Raymond, 1999a; Lerner and Tirole, 2002; Lee and Cole 2003; Mockus et al. 2000; Tuomi, 2000; Demil and Lecocq, 2006; O'Mahony and Ferraro, 2007;Fleming and Waguespack, 2007), collaborative innovation issues (Von Hippel, 2003; Von Krogh et al., 2003; Von Hippel and Von Krogh, 2003; Dahlander, 2005; Osterloh, 2007; David, 2008), issues related to the nature as well as the motivations of developers (Lerner and Tirole, 2002; Hertel, 2003; Dahlander and McKelvey, 2005; Jeppesen and Frederiksen, 2006), public policy and innovation issues (Jullien and Zimmermann, 2005; Lee, 2006), technological competitions issues related to standard battles between proprietary and open source software (Bonaccorsi and Rossi, 2003; Bonaccorsi et al. 2004, Economides and Katsamakas, 2005; Chen, 2007), intellectual property rights and licensing issues (Laat 2005; Lerner and Tirole, 2005; Gambardella, 2006; Determann et al., 2007). A major unresolved issue concerns open source business models and revenue capture, given that open source licenses imply no fee for users. On this topic, articles show that a commercial activity based on open source software is possible, as they describe different possible ways of doing business around open source (Raymond, 1999; Dahlander, 2004; Daffara, 2007; Bonaccorsi and Merito, 2007). These studies usually look at open source-based companies. Open source-based companies encompass a wide range of firms with different categories of activities: providers of packaged open source solutions, IT Services&Software Engineering firms and open source software publishers. However, business models implications are different for each of these categories: providers of packaged solutions and IT Services&Software Engineering firms' activities are based on software developed outside their boundaries, whereas commercial software publishers sponsor the development of the open source software. This paper focuses on open source software publishers' business models as this issue is even more crucial for this category of firms which take the risk of investing in the development of the software. Literature at last identifies and depicts only two generic types of business models for open source software publishers: the business models of ''bundling'' (Pal and Madanmohan, 2002; Dahlander 2004) and the dual licensing business models (Välimäki, 2003; Comino and Manenti, 2007). Nevertheless, these business models are not applicable in all circumstances. Methodology: The objectives of this paper are: (1) to explore in which contexts the two generic business models described in literature can be implemented successfully and (2) to depict an additional business model for open source software publishers which can be used in a different context. To do so, this paper draws upon an explorative case study of IdealX, a French open source security software publisher. This case study consists in a series of 3 interviews conducted between February 2005 and April 2006 with the co-founder and the business manager. It aims at depicting the process of IdealX's search for the appropriate business model between its creation in 2000 and 2006. This software publisher has tried both generic types of open source software publishers' business models before designing its own. Consequently, through IdealX's trials and errors, I investigate the conditions under which such generic business models can be effective. Moreover, this study describes the business model finally designed and adopted by IdealX: an additional open source software publisher's business model based on the principle of ''mutualisation'', which is applicable in a different context. Results and implications: Finally, this article contributes to ongoing empirical work within entrepreneurship and strategic management on open source software publishers' business models: it provides the characteristics of three generic business models (the business model of bundling, the dual licensing business model and the business model of mutualisation) as well as conditions under which they can be successfully implemented (regarding the type of product developed and the competencies of the firm). This paper also goes further into the traditional concept of business model used by scholars in the open source related literature. In this article, a business model is not only considered as a way of generating incomes (''revenue model'' (Amit and Zott, 2001)), but rather as the necessary conjunction of value creation and value capture, according to the recent literature about business models (Amit and Zott, 2001; Chresbrough and Rosenblum, 2002; Teece, 2007). Consequently, this paper analyses the business models from these two components' point of view.