230 resultados para Green functions
Resumo:
Structural damage detection using measured dynamic data for pattern recognition is a promising approach. These pattern recognition techniques utilize artificial neural networks and genetic algorithm to match pattern features. In this study, an artificial neural network–based damage detection method using frequency response functions is presented, which can effectively detect nonlinear damages for a given level of excitation. The main objective of this article is to present a feasible method for structural vibration–based health monitoring, which reduces the dimension of the initial frequency response function data and transforms it into new damage indices and employs artificial neural network method for detecting different levels of nonlinearity using recognized damage patterns from the proposed algorithm. Experimental data of the three-story bookshelf structure at Los Alamos National Laboratory are used to validate the proposed method. Results showed that the levels of nonlinear damages can be identified precisely by the developed artificial neural networks. Moreover, it is identified that artificial neural networks trained with summation frequency response functions give higher precise damage detection results compared to the accuracy of artificial neural networks trained with individual frequency response functions. The proposed method is therefore a promising tool for structural assessment in a real structure because it shows reliable results with experimental data for nonlinear damage detection which renders the frequency response function–based method convenient for structural health monitoring.
Resumo:
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.
Resumo:
This paper addresses the research question, ‘What are the diffusion determinants for green urbanism innovations in Australia?’ This is a significant topic given the global movement towards green urbanism. The study reported here is based on desktop research that provides new insights through (1) synthesis of the latest research findings on green urbanism innovations and (2) interpretation of diffusion issues through our innovation system model. Although innovation determinants have been studied extensively overseas and in Australia, there is presently a gap in the literature when it comes to these determinants for green urbanism in Australia. The current paper fills this gap. Using a conceptual framework drawn from the innovation systems literature, this paper synthesises and interprets the literature to map the current state of green urbanism innovations in Australia and to analyse the drivers for, and obstacles to, their optimal diffusion. The results point to the importance of collaboration between project-based actors in the implementation of green urbanism. Education, training and regulation across the product system is also required to improve the cultural and technical context for implementation. The results are limited by their exploratory nature and future research is planned to quantify barriers to green urbanism.
Resumo:
In recent years there has been increasing interest in the use of water resources generated within the urban boundary for potable supply substitution as a means of augmenting the current supply capacity. These urban water resources include roof and stormwater runoff. Expanding the use of stormwater runoff to add to the water supply and reduce water pollution are important objectives all over Australia. This book presents the background, significance and objectives of the research, as well as the reasons why stormwater plays a significant role as an alternative source of water.
Resumo:
In its report for World Health Day 2008 entitled ‘Protecting Health from Climate Change’, the World Health Organization urged health sectors to lead by example in undertaking sustainability initiatives to protect people from the effects of climate change. This report suggested actions which included ensuring the health sector was involved in key policy making around sustainable development, and also, that it should work towards reducing its carbon footprint through better management of energy use, transport and procurement. However, healthcare professionals need to understand the negative effects on health of unsustainable development in order to accept that they need to change the way they deliver healthcare services...
Resumo:
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto’04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least 226 and 254, respectively. Our herding and multicollision attacks on the hash functions based on generic checksum functions (e.g., one-way) are a special case of the attacks on the cascaded iterated hash functions previously analysed by Dunkelman and Preneel and are not better than their attacks. On hash functions with easily invertible checksums, our multicollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman and Preneel.
Resumo:
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.
Resumo:
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.
Resumo:
In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.
Resumo:
This paper traces aspects of the development of a ‘green’ criminology. It starts with personal reflections and then describes the emergence of explicit statements of a green criminological perspective. Initially these statements were independently voiced, in different parts of the world but they reflected shared concerns. These works have found unification as a ‘green’, ‘eco-global’ or ‘conservation’ criminology. The paper reviews the classifications available when talking about not only legally-defined crimes but also legally perpetrated harms, as well as typologies of such harms and crimes. It then looks at the integration of ‘green’ and ‘traditional’ criminological thinking before briefly exploring four dimensions of concern for today and the future.
Resumo:
Over the last two decades, "green criminology" has emerged as a unique area of study, bringing together criminologists and sociologists from a wide range of research backgrounds and varying theoretical orientations. It spans the micro to the macro—from individual-level environmental crimes and victimization to business/corporate violations and state transgressions. There have been few attempts, however, to explicitly or implicitly integrate cultural criminology into green criminology (or vice versa). This book moves towards articulating a green cultural criminological perspective. Brisman and South examine existing overlapping research and offer a platform to support future excursions by green criminologists into cultural criminology’s concern with media images and representations, consumerism and consumption, and resistance. At the same time, they offer an invitation to cultural criminologists to adopt a green view of the consumption landscape and the growth (and depictions) of environmental harms.
Green-fluorescent protein facilitates rapid in vivo detection of genetically transformed plant cells
Resumo:
Early detection of plant transformation events is necessary for the rapid establishment and optimization of plant transformation protocols. We have assessed modified versions of the green fluorescent protein (GFP) from Aequorea victoria as early reporters of plant transformation using a dissecting fluorescence microscope with appropriate filters. Gfp-expressing cells from four different plant species (sugarcane, maize, lettuce, and tobacco) were readily distinguished, following either Agrobacterium-mediated or particle bombardment-mediated transformation. The identification of gfp-expressing sugarcane cells allowed for the elimination of a high proportion of non-expressing explants and also enabled visual selection of dividing transgenic cells, an early step in the generation of transgenic organisms. The recovery of transgenic cell clusters was streamlined by the ability to visualize gfp-expressing tissues in vitro.
Resumo:
In parts of the Indo-Pacific, large-scale exploitation of the green turtle Chelonia mydas continues to pose a serious threat to the persistence of this species; yet very few studies have assessed the pattern and extent of the impact of such harvests. We used demographic and genetic data in an age-based model to investigate the viability of an exploited green turtle stock from Aru, south-east Indonesia. We found that populations are decreasing under current exploitation pressures. The effects of increasingly severe exploitation activities at foraging and nesting habitat varied depending on the migratory patterns of the stock. Our model predicted a rapid decline of the Aru stock in Indonesia under local exploitation pressure and a shift in the genetic composition of the stock. We used the model to investigate the influence of different types of conservation actions on the persistence of the Aru stock. The results show that local management actions such as nest protection and reducing harvests of adult nesting and foraging turtles can have considerable conservation outcomes and result in the long-term persistence of genetically distinct management units. © 2010 The Authors. Animal Conservation © 2010 The Zoological Society of London.
Resumo:
Urban green infrastructure can help cities adapt to climate change. Spatial planning can play an important role in utilizing green infrastructure for adaptation. Yet climate change risks represent a different sort of challenge for planning institutions. This paper aims to address two issues arising from this challenge. First, it defines the concept of green infrastructure within the context of climate adaptation. Second, it identifies and puts into perspective institutional barriers to adopting green infrastructure for climate adaptation, including path dependence. We begin by arguing that there is growing confusion among planners and policy makers about what constitutes green infrastructure. Definitional ambiguity may contribute to inaction on climate change adaptation, because it muddies existing programs and initiatives that are to do with green-space more broadly, which in turn feeds path dependency. We then report empirical findings about how planners perceive the institutional challenge arising from climate change and the adoption of green infrastructure as an adaptive response. The paper concludes that spatial planners generally recognize multiple rationales associated with green infrastructure. However they are not particularly keen on institutional innovation and there is a tendency for path dependence. We propose a conceptual model that explicitly recognizes such institutional factors. This paper contributes to the literature by showing that agency and institutional dimensions are a limiting factor in advancing the concept of green infrastructure within the context of climate change adaptation.