643 resultados para Group proceedings
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.
Resumo:
The previous investigations have shown that the modal strain energy correlation method, MSEC, could successfully identify the damage of truss bridge structures. However, it has to incorporate the sensitivity matrix to estimate damage and is not reliable in certain damage detection cases. This paper presents an improved MSEC method where the prediction of modal strain energy change vector is differently obtained by running the eigensolutions on-line in optimisation iterations. The particular trail damage treatment group maximising the fitness function close to unity is identified as the detected damage location. This improvement is then compared with the original MSEC method along with other typical correlation-based methods on the finite element model of a simple truss bridge. The contributions to damage detection accuracy of each considered mode is also weighed and discussed. The iterative searching process is operated by using genetic algorithm. The results demonstrate that the improved MSEC method suffices the demand in detecting the damage of truss bridge structures, even when noised measurement is considered.
Resumo:
This paper describes the approach taken to the clustering task at INEX 2009 by a group at the Queensland University of Technology. The Random Indexing (RI) K-tree has been used with a representation that is based on the semantic markup available in the INEX 2009 Wikipedia collection. The RI K-tree is a scalable approach to clustering large document collections. This approach has produced quality clustering when evaluated using two different methodologies.
Resumo:
NIR and IR spectroscopy has been applied for detection of chemical species and the nature of hydrogen bonding in arsenate complexes. The structure and spectral properties of copper(II) arsenate minerals chalcophyllite and chenevixite are compared with copper(II) sulphate minerals devilline, chalcoalumite and caledonite. Split NIR bands in the electronic spectrum of two ranges 11700-8500 cm-1 and 8500-7200 cm-1 confirm distortion of octahedral symmetry for Cu(II) in the arsenate complexes. The observed bands with maxima at 9860 and 7750 cm-1 are assigned to Cu(II) transitions 2B1g ® 2B2g and 2B1g ® 2A1g. Overlapping bands in the NIR region 4500-4000 cm-1 is the effect of multi anions OH-, (AsO4)3- and (SO4)2-. The observation of broad and diffuse bands in the range 3700-2900 cm-1 confirms strong hydrogen bonding in chalcophyllite relative to chenevixite. The position of the water bending vibrations indicates the water is strongly hydrogen bonded in the mineral structure. The strong absorption feature centred at 1644 cm-1 in chalcophyllite indicates water is strongly hydrogen bonded in the mineral structure. The H2O-bending vibrations shift to low wavenumbers in chenevixite and an additional band observed at 1390 cm-1 is related to carbonate impurity. The characterisation of IR spectra by ν3 antisymmetric stretching vibrations of (SO4)2- and (AsO4)3 ions near 1100 and 800 cm-1 respectively is the result of isomorphic substitution for arsenate by sulphate in both the minerals of chalcophyllite and chenevixite.
Resumo:
The idea of collective unintelligence is examined in this paper to highlight some of the conceptual and practical problems faced in modeling groups. Examples drawn from international crises and economics provide illustrative problems of collective failures to act in intelligent ways, despite the inputs and efforts of many skilled and intelligent parties. Choices made of “appropriate” perceptions, analysis and evaluations are examined along with how these might be combined. A simple vector representation illustrates some of the issues and creative possibilities in multi-party actions. Revealed as manifest (un-)intelligence are the resolutions of various problems and potentials that arise in dealing with the “each and all” of a group (wherein items are necessarily non-parallel and of unequal valency). Such issues challenge those seeking to model collective intelligence, but much may be learned.
Resumo:
The near-infrared (NIR) and infrared (IR) spectroscopy has been applied for characterisation of three complex Cu-Zn sulphate/phosphate minerals, namely ktenasite, orthoserpierite and kipushite. The spectral signatures of the three minerals are quite distinct in relation to their composition and structure. The effect of structural cations substitution (Zn2+ and Cu2+) on band shifts is significant both in the electronic and vibrational spectra of these Cu-Zn minerals. The variable Cu:Zn ratio between Zn-rich and Cu-rich compositions shows a strong effect on Cu(II) bands in the electronic spectra. The Cu(II) spectrum is most significant in kipushite (Cu-rich) with bands displayed at high wavenumbers at11390 and 7545 cm-1. The isomorphic substitution of Cu2+ for Zn2+ is reflected in the NIR and IR spectroscopic signatures. The multiple bands for 3 and 4 (SO4)2- stretching vibrations in ktenasite and orthoserpierite are attributed to the reduction of symmetry to the sulphate ion from Td to C2V. The IR spectrum of kipushite is characterised by strong (PO4)3- vibrational modes at 1090 and 990 cm-1. The range of IR absorption is higher in Ktenasite than in kipushite while it is intermediate in orthoserpierite.
Resumo:
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext policy attribute-based setting. We also extend the paradigm of hybrid encryption to the ciphertext policy attribute-based encryption schemes. A new primitive called encapsulation policy attribute-based key encapsulation mechanism (EP-AB-KEM) is introduced and a notion of chosen ciphertext security is de�ned for EP-AB-KEMs. We propose an EP-AB-KEM from an existing attribute-based encryption scheme and show that it achieves chosen ciphertext security in the generic group and random oracle models. We present a generic one-round AB-AKE protocol that satis�es our AKE-security notion. The protocol is generically constructed from any EP-AB-KEM that satis�es chosen ciphertext security. Instantiating the generic AB-AKE protocol with our EP-AB-KEM will result in a concrete one-round AB-AKE protocol also secure in the generic group and random oracle models.
Resumo:
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.
Effect of poly(acrylic acid) end-group functionality on inhibition of calcium oxalate crystal growth
Resumo:
A number of series of poly(acrylic acids) (PAA) of differing end-groups and molecular weights prepared using atom transfer radical polymerization were used as inhibitors for the crystallization of calcium oxalate at 23 and 80°C. As measured by turbidimetry and conductivity and as expected from previous reports, all PAA series were most effective for inhibition of crystallization at molecular weights of 1500–4000. However, the extent of inhibition was in general strongly dependent on the hydrophobicity and molecular weight of the end-group. These results may be explicable in terms of adsorption/desorption of PAA to growth sites on crystallites. The overall effectiveness of the series didn't follow a simple trend with end-group hydrophobicity, suggesting self-assembly behavior or a balance between adsorption and desorption rates to crystallite surfaces may be critical in the mechanism of inhibition of calcium oxalate crystallization.
Resumo:
A number of series of poly(acrylic acids) (PAA) of differing end-groups and molecular mass were used to study the inhibition of calcium oxalate crystallization. The effects of the end-group on crystal speciation and morphology were significant and dramatic, with hexyl-isobutyrate end groups giving preferential formation of calcium oxalate dihydrate (COD) rather than the more stable calcium oxalate monohydrate (COM), while both more hydrophobic end-groups and less-hydrophobic end groups led predominantly to formation of the least thermodynamically stable form of calcium oxalate, calcium oxalate trihydrate. Conversely, molecular mass had little impact on calcium oxalate speciation or crystal morphology. It is probable that the observed effects are related to the rate of desorption of the PAA moiety from the crystal (lite) surfaces and that the results point to a major role for end-group as well as molecular mass in controlling desorption rate.
Resumo:
Illegal street racing has received increased attention in recent years from the media, governments and road safety professionals. At the same time, there has been a shift from treating illegal street racing as a public nuisance issue to a road safety problem in Australia, as this behaviour now attracts a penalty of increased periods of vehicle impoundment leading to permanent vehicle forfeiture for repeat offences. This severe vehicle sanction is typically applied to repeat drink driving offenders and drivers who breach suspensions and disqualifications in North American jurisdictions, but was first introduced in Australia to deal with illegal street racing and associated risky driving behaviours, grouped together under the label of ‘hooning’ in Australian jurisdictions. This paper describes how Australian jurisdictions are dealing with this issue. The research described in this paper drew on multiple data sources to explore illegal street racing and the management of this issue in Australia. First, the paper reviews the relevant legislation in each Australian state to describe the cross-jurisdictional similarities and differences in approaches. It also describes some results from focus group discussions and a quantitative online survey with drivers who self-report engaging in illegal street racing and associated behaviours in Queensland, Australia. It was found that approaches to dealing with illegal street racing and associated risky driving behaviours in each Australian state are similar, with increasing periods of vehicle impoundment (leading to vehicle forfeiture) applied to repeat hooning offences within prescribed periods. Participants in the focus groups and respondents to the questionnaire generally felt these penalty periods were severe, with perceptions of severity increasing with the length of the penalty period. It was concluded that there is a need for each jurisdiction to objectively evaluate the effectiveness of their vehicle impoundment and forfeiture programs for hooning. These evaluations should compare the relative costs of these programs (e.g., enforcement, unrecovered towing and storage fees, and court costs) to the observed benefits (e.g., reduction in target behaviours, reduction in community complaints, and reduction in the number and severity of associated crashes).
Resumo:
In public venues, crowd size is a key indicator of crowd safety and stability. In this paper we propose a crowd counting algorithm that uses tracking and local features to count the number of people in each group as represented by a foreground blob segment, so that the total crowd estimate is the sum of the group sizes. Tracking is employed to improve the robustness of the estimate, by analysing the history of each group, including splitting and merging events. A simplified ground truth annotation strategy results in an approach with minimal setup requirements that is highly accurate.
Resumo:
This paper argues that management education needs to consider a trend in learning design which advances more creative learning through an alliance with art-based pedagogical processes. A shift is required from skills training to facilitating transformational learning through experiences that expand human potential, facilitated by artistic processes. In this paper the authors discuss the necessity for creativity and innovation in the workplace and the need to develop better leaders and managers. The inclusion of arts-based processes enhances artful behaviour, aesthetics and creativity within management and organisational behaviour, generating important implications for business innovation. This creative learning focus stems from an analysis of an arts-based intervention for management development. Entitled Management Jazz the program was conducted over three years at a large Australian University. The paper reviews some of the salient literature in the field. It considers four stages of the learning process: capacity, artful event, increased capability, and application/action to produce product. One illustrative example of an arts-based learning process is provided from the Management Jazz program. Research findings indicate that artful learning opportunities enhance capacity for awareness of creativity in one’s self and in others. This capacity correlates positively with a perception that engaging in artful learning enhances the capability of managers in changing collaborative relationships and habitat constraint. The authors conclude that it is through engagement and creative alliance with the arts that management education can explore and discover artful approaches to building creativity and innovation. The illustration presented in this paper will be delivered as a brief workshop at the Fourth Art of Management Conference. The process of bricolage and articles at hand will be used to explore creative constraints and prototypes while generating group collaboration. The mini-workshop will conclude with discussion of the arts-based process and capability enhancement outcomes.
Resumo:
a presentation about immersive visualised simulation systems, image analysis and GPGPU Techonology