172 resultados para 2D barcode based authentication scheme
Resumo:
A crucial issue with hybrid quantum secret sharing schemes is the amount of data that is allocated to the participants. The smaller the amount of allocated data, the better the performance of a scheme. Moreover, quantum data is very hard and expensive to deal with, therefore, it is desirable to use as little quantum data as possible. To achieve this goal, we first construct extended unitary operations by the tensor product of n, n ≥ 2, basic unitary operations, and then by using those extended operations, we design two quantum secret sharing schemes. The resulting dual compressible hybrid quantum secret sharing schemes, in which classical data play a complementary role to quantum data, range from threshold to access structure. Compared with the existing hybrid quantum secret sharing schemes, our proposed schemes not only reduce the number of quantum participants, but also the number of particles and the size of classical shares. To be exact, the number of particles that are used to carry quantum data is reduced to 1 while the size of classical secret shares also is also reduced to l−2 m−1 based on ((m+1, n′)) threshold and to l−2 r2 (where r2 is the number of maximal unqualified sets) based on adversary structure. Consequently, our proposed schemes can greatly reduce the cost and difficulty of generating and storing EPR pairs and lower the risk of transmitting encoded particles.
Resumo:
This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services. The advantages of this architecture scheme is that it is far more scalable, not another certificate-based hierarchy that has problems with certificate revocation management. With the use of a Public File, if the key is compromised: it is a simple matter of the single responsible entity replacing the key pair with a new one and re-performing the data file signing process. Under this proposed architecture, the the Open Data environment does not interfere with the internal security schemes that might be employed by the entity. However, this architecture incorporates, when needed, parameters from the entity, e.g. person who authorized publishing as Open Data, at the time that datasets are created/added.
Resumo:
Structural damage detection using modal strain energy (MSE) is one of the most efficient and reliable structural health monitoring techniques. However, some of the existing MSE methods have been validated for special types of structures such as beams or steel truss bridges which demands improving the available methods. The purpose of this study is to improve an efficient modal strain energy method to detect and quantify the damage in complex structures at early stage of formation. In this paper, a modal strain energy method was mathematically developed and then numerically applied to a fixed-end beam and a three-story frame including single and multiple damage scenarios in absence and presence of up to five per cent noise. For each damage scenario, all mode shapes and natural frequencies of intact structures and the first five mode shapes of assumed damaged structures were obtained using STRAND7. The derived mode shapes of each intact and damaged structure at any damage scenario were then separately used in the improved formulation using MATLAB to detect the location and quantify the severity of damage as compared to those obtained from previous method. It was found that the improved method is more accurate, efficient and convergent than its predecessors. The outcomes of this study can be safely and inexpensively used for structural health monitoring to minimize the loss of lives and property by identifying the unforeseen structural damages.
Resumo:
Discounted Cumulative Gain (DCG) is a well-known ranking evaluation measure for models built with multiple relevance graded data. By handling tagging data used in recommendation systems as an ordinal relevance set of {negative,null,positive}, we propose to build a DCG based recommendation model. We present an efficient and novel learning-to-rank method by optimizing DCG for a recommendation model using the tagging data interpretation scheme. Evaluating the proposed method on real-world datasets, we demonstrate that the method is scalable and outperforms the benchmarking methods by generating a quality top-N item recommendation list.
Resumo:
In 2008 the Australian government introduced the National Rental Affordability Scheme (NRAS) to increase the supply of affordable rental in Australia. This Federal Government initiative was progressively rolled out through four different rounds over the years with fifth round to be announced some time in 2014. Although the scheme has been successful evident there have been numerous setbacks experienced. This paper focuses on understanding lessons learnt from the performance of the scheme to make recommendations for future government initiatives. This evaluation is based on the combination of document analysis, government officers as well as approved NRAS participants operating throughout Queensland. The most significant challenges for the NRAS participants is the involvement of three levels government which cause delays in the scheme approval process.
Resumo:
In this paper, we propose a highly reliable fault diagnosis scheme for incipient low-speed rolling element bearing failures. The scheme consists of fault feature calculation, discriminative fault feature analysis, and fault classification. The proposed approach first computes wavelet-based fault features, including the respective relative wavelet packet node energy and entropy, by applying a wavelet packet transform to an incoming acoustic emission signal. The most discriminative fault features are then filtered from the originally produced feature vector by using discriminative fault feature analysis based on a binary bat algorithm (BBA). Finally, the proposed approach employs one-against-all multiclass support vector machines to identify multiple low-speed rolling element bearing defects. This study compares the proposed BBA-based dimensionality reduction scheme with four other dimensionality reduction methodologies in terms of classification performance. Experimental results show that the proposed methodology is superior to other dimensionality reduction approaches, yielding an average classification accuracy of 94.9%, 95.8%, and 98.4% under bearing rotational speeds at 20 revolutions-per-minute (RPM), 80 RPM, and 140 RPM, respectively.
Resumo:
In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and integrity checks change and the target address will not be computed correctly. In this paper, we present an attack based on tracking stack pointer modifications to break the scheme and provide implementation details. The key element of the attack is to remove the fingerprint and integrity check generating code from the program after disassociating the target address from the fingerprint and integrity value. Using the debugging tools that give vast control to the attacker to track stack pointer operations, we perform both subtractive and watermark replacement attacks. The major steps in the attack are automated resulting in a fast and low-cost attack.
Resumo:
Background People with intellectual disabilities (ID) have lower levels of physical activity and quality of life and they have a lot of barriers to face when taking part in physical activity. Other problems are the poor adherence to physical activity such people have so this study is designed to improve adherence to physical activity for people with intellectual disabilities with the assistance of an application for smartphones. The aim of the study will be to improve physical activity and physical condition after multimodal intervention and to analyse the promotion of adherence to physical activity through a multimodal intervention and an app intervention (mHealth) in people with ID. Methods A two-stage study will be conducted. In stage 1 a multimodal intervention will take place will be done with physical activity and educational advice over eight weeks, two days a week. Data will be measured after and before the intervention. In stage 2 a randomized controlled trial will be conducted. In the intervention group we will install an application to a smartphone; this application will be a reminder to do a physical activity and they have to select whether they have or haven’t done a physical activity every day. This application will be installed for 18 weeks. Data will be measured after and before the application is installed in two groups. We will measure results 10 weeks later when the two groups don’t have the reminder. The principal outcome used to measure the adherence to physical activity will be the International Physical Activity Questionnaire; secondary outcomes will be a fun-fitness test and self-report survey about quality of life, self-efficacy and social support. Samples will be randomized by sealed envelope in two groups, with approximately 20 subjects in each group. It’s important to know that the therapist will be blinded and won’t know the subjects of each group. Discussion Offering people with ID a multimodal intervention and tool to increase the adherence to a physical activity may increase the levels of physical activity and quality of life. Such a scheme, if beneficial, could be implemented successfully within public health sense. Trial registration ClinicalTrials.gov Identifier: NCT01915381.
Resumo:
The capabilities of the mechanical resonator-based nanosensors in detecting ultra-small mass or force shifts have driven a continuing exploration of the palette of nanomaterials for such application purposes. Based on large-scale molecular dynamics simulations, we have assessed the applicability of a new class of carbon nanomaterials for nanoresonator usage, i.e. the single-wall carbon nanotube (SWNT) network. It is found that SWNT networks inherit excellent mechanical properties from the constituent SWNTs, possessing a high natural frequency. However, although a high quality factor is suggested from the simulation results, it is hard to obtain an unambiguous Q-factor due to the existence of vibration modes in addition to the dominant mode. The nonlinearities resulting from these extra vibration modes are found to exist uniformly under various testing conditions including different initial actuations and temperatures. Further testing shows that these modes can be effectively suppressed through the introduction of axial strain, leading to an extremely high quality factor in the order of 109 estimated from the SWNT network with 2% tensile strain. Additional studies indicate that the carbon rings connecting the SWNTs can also be used to alter the vibrational properties of the resulting network. This study suggests that the SWNT network can be a good candidate for applications as nanoresonators.
Resumo:
An innovative cement-based soft-hard-soft (SHS) multi-layer composite has been developed for protective infrastructures. Such composite consists of three layers including asphalt concrete (AC), high strength concrete (HSC), and engineered cementitious composites (ECC). A three dimensional benchmark numerical model for this SHS composite as pavement under blast load was established using LSDYNA and validated by field blast test. Parametric studies were carried out to investigate the influence of a few key parameters including thickness and strength of HSC and ECC layers, interface properties, soil conditions on the blast resistance of the composite. The outcomes of this study also enabled the establishment of a damage pattern chart for protective pavement design and rapid repair after blast load. Efficient methods to further improve the blast resistance of the SHS multi-layer pavement system were also recommended.
Resumo:
This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.
Resumo:
To date, a number of two-dimensional (2D) topological insulators (TIs) have been realized in Group 14 elemental honeycomb lattices, but all are inversionsymmetric. Here, based on first-principles calculations, we predict a new family of 2D inversion-asymmetric TIs with sizeable bulk gaps from 105 meV to 284 meV, in X2–GeSn (X = H, F, Cl, Br, I) monolayers, making them in principle suitable for room-temperature applications. The nontrivial topological characteristics of inverted band orders are identified in pristine X2–GeSn with X = (F, Cl, Br, I), whereas H2–GeSn undergoes a nontrivial band inversion at 8% lattice expansion. Topologically protected edge states are identified in X2–GeSn with X = (F, Cl, Br, I), as well as in strained H2–GeSn. More importantly, the edges of these systems, which exhibit single-Dirac-cone characteristics located exactly in the middle of their bulk band gaps, are ideal for dissipationless transport. Thus, Group 14 elemental honeycomb lattices provide a fascinating playground for the manipulation of quantum states.
Resumo:
Law is saturated with stories. People tell their stories to lawyers; lawyers tell their client's stories to courts; and legislators develop regulation to respond to their constituent's stories of injustice or inequality. My approach to first-year legal education respects this narrative tradition. Both my curriculum design and assessment scheme in the compulsory first-year subject Australian Legal System deploy narrative methodology as the central teaching and learning device. Throughout the course, students work on resolving the problems of four hypothetical clients. Like a murder mystery, pieces of the puzzle come together as students learn more about legal institutions and the texts they produce, the process of legal research, the analysis and interpretation of primary legal sources, the steps in legal problem-solving, the genre conventions of legal writing style, the practical skills and ethical dimensions of professional practice, and critical inquiry into the normative underpinnings and impacts of the law. The assessment scheme mirrors this design. In their portfolio-based assignment, for example, students devise their own client profile, research the client's legal position and prepare a memorandum of advice.
Resumo:
This paper presents a combined experimental and numerical study on the damage and performance of a soft-hard-soft (SHS) multi-layer cement based composite subjected to blast loading which can be used for protective structures and infrastructures to resist extreme loadings, and the composite consists of three layers of construction materials including asphalt concrete (AC) on the top, high strength concrete (HSC) in the middle, and engineered cementitious composites (ECC) at the bottom. To better characterize the material properties under dynamic loading, interface properties of the composite were investigated through direct shear test and also used to validate the interface model. Strain rate effects of the asphalt concrete were also studied and both compressive and tensile dynamic increase factor (DIF) curves were improved based on split Hopkinson pressure bar (SHPB) test. A full-scale field blast test investigated the blast behavior of the composite materials. The numerical model was established by taking into account the strain rate effect of all concrete materials. Furthermore, the interface properties were also considered into the model. The numerical simulation using nonlinear finite element software LS-DYNA agrees closely with the experimental data. Both the numerical and field blast test indicated that the SHS composite exhibited high resistance against blast loading.
Resumo:
RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.