251 resultados para Entity Authentication
Resumo:
Introduction Natural product provenance is important in the food, beverage and pharmaceutical industries, for consumer confidence and with health implications. Raman spectroscopy has powerful molecular fingerprint abilities. Surface Enhanced Raman Spectroscopy’s (SERS) sharp peaks allow distinction between minimally different molecules, so it should be suitable for this purpose. Methods Naturally caffeinated beverages with Guarana extract, coffee and Red Bull energy drink as a synthetic caffeinated beverage for comparison (20 µL ea.) were reacted 1:1 with Gold nanoparticles functionalised with anti-caffeine antibody (ab15221) (10 minutes), air dried and analysed in a micro-Raman instrument. The spectral data was processed using Principle Component Analysis (PCA). Results The PCA showed Guarana sourced caffeine varied significantly from synthetic caffeine (Red Bull) on component 1 (containing 76.4% of the variance in the data). See figure 1. The coffee containing beverages, and in particular Robert Timms (instant coffee) were very similar on component 1, but the barista espresso showed minor variance on component 1. Both coffee sourced caffeine samples varied with red Bull on component 2, (20% of variance). ************************************************************ Figure 1 PCA comparing a naturally caffeinated beverage containing Guarana with coffee. ************************************************************ Discussion PCA is an unsupervised multivariate statistical method that determines patterns within data. Figure 1 shows Caffeine in Guarana is notably different to synthetic caffeine. Other researchers have revealed that caffeine in Guarana plants is complexed with tannins. Naturally sourced/ lightly processed caffeine (Monster Energy, Espresso) are more inherently different than synthetic (Red Bull) /highly processed (Robert Timms) caffeine, in figure 1, which is consistent with this finding and demonstrates this technique’s applicability. Guarana provenance is important because it is still largely hand produced and its demand is escalating with recognition of its benefits. This could be a powerful technique for Guarana provenance, and may extend to other industries where provenance / authentication are required, e.g. the wine or natural pharmaceuticals industries.
Resumo:
INEX investigates focused retrieval from structured documents by providing large test collections of structured documents, uniform evaluation measures, and a forum for organizations to compare their results. This paper reports on the INEX 2008 evaluation campaign, which consisted of a wide range of tracks: Ad hoc, Book, Efficiency, Entity Ranking, Interactive, QA, Link the Wiki, and XML Mining.
Resumo:
In the current climate of global economic volatility, there are increasing calls for training in enterprising skills and entrepreneurship to underpin the systemic innovation required for even medium-term business sustainability. The skills long-recognised as the essential for entrepreneurship now appear on the list of employability skills demanded by industry. The QUT Innovation Space (QIS) was an experiment aimed at delivering entrepreneurship education (EE), as an extra-curricular platform across the university, to the undergraduate students of an Australian higher education institute. It was an ambitious project that built on overseas models of EE studied during an Australian Learning and Teaching Council (ALTC) Teaching Fellowship (Collet, 2011) and implemented those approaches across an institute. Such EE approaches have not been attempted in an Australian university. The project tested resonance not only with the student population, from the perspective of what worked and what didn’t work, but also with every level of university operations. Such information is needed to inform the development of EE in the Australian university landscape. The QIS comprised a physical co-working space, virtual sites (web, Twitter and Facebook) and a network of entrepreneurial mentors, colleagues, and students. All facets of the QIS enabled connection between like-minded individuals that underpins the momentum needed for a project of this nature. The QIS became an innovation community within QUT. This report serves two purposes. First, as an account of the QIS project and its evolution, the report serves to identify the student demand for skills and training as well as barriers and facilitators of the activities that promote EE in an Australian university context. Second, the report serves as a how-to manual, in the tradition of many tomes on EE, outlining the QIS activities that worked as well as those that failed. The activities represent one measure of QIS outcomes and are described herein to facilitate implementation in other institutes. The QIS initially aimed to adopt an incubation model for training in EE. The ‘learning by doing’ model for new venture creation is a highly successful and high profile training approach commonly found in overseas contexts. However, the greatest demand of the QUT student population was not for incubation and progression of a developed entrepreneurial intent, but rather for training that instilled enterprising skills in the individual. These two scenarios require different training approaches (Fayolle and Gailly, 2008). The activities of the QIS evolved to meet that student demand. In addressing enterprising skills, the QIS developed the antecedents of entrepreneurialism (i.e., entrepreneurial attitudes, motivation and behaviours) including high-level skills around risk-taking, effective communication, opportunity recognition and action-orientation. In focusing on the would-be entrepreneur and not on the (initial) idea per se, the QIS also fostered entrepreneurial outcomes that would never have gained entry to the rigid stage-gated incubation model proposed for the original QIS framework. Important lessons learned from the project for development of an innovation community include the need to: 1. Evaluate the context of the type of EE program to be delivered and the student demand for the skills training (as noted above). 2. Create a community that builds on three dimensions: a physical space, a virtual environment and a network of mentors and partners. 3. Supplement the community with external partnerships that aid in delivery of skills training materials. 4. Ensure discovery of the community through the use of external IT services to deliver advertising and networking outlets. 5. Manage unrealistic student expectations of billion dollar products. 6. Continuously renew and rebuild simple activities to maintain student engagement. 7. Accommodate the non-university end-user group within the community. 8. Recognise and address the skills bottlenecks that serve as barriers to concept progression; in this case, externally provided IT and programming skills. 9. Use available on-line and published resources rather than engage in constructing project-specific resources that quickly become obsolete. 10. Avoid perceptions of faculty ownership and operate in an increasingly competitive environment. 11. Recognise that the continuum between creativity/innovation and entrepreneurship is complex, non-linear and requires different training regimes during the different phases of the pipeline. One small entity, such as the QIS, cannot address them all. The QIS successfully designed, implemented and delivered activities that included events, workshops, seminars and services to QUT students in the extra-curricular space. That the QIS project can be considered successful derives directly from the outcomes. First, the QIS project changed the lives of emerging QUT student entrepreneurs. Also, the QIS activities developed enterprising skills in students who did not necessarily have a business proposition, at the time. Second, successful outcomes of the QIS project are evidenced as the embedding of most, perhaps all, of the QIS activities in a new Chancellery-sponsored initiative: the Leadership Development and Innovation Program hosted by QUT Student Support Services. During the course of the QIS project, the Brisbane-based innovation ecosystem underwent substantial change. From a dearth of opportunities for the entrepreneurially inclined, there is now a plethora of entities that cater for a diversity of innovation-related activities. While the QIS evolved with the landscape, the demand endpoint of the QIS activities still highlights a gap in the local and national innovation ecosystems. The freedom to experiment and to fail is not catered for by the many new entities seeking to build viable businesses on the back of the innovation push. The onus of teaching the enterprising skills, which are the employability skills now demanded by industry, remains the domain of the higher education sector.
Resumo:
We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.
Resumo:
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-registered passwords to provide card holder authentication and Secure Socket Layer/ Transport Layer Security (SSL/TLS) for data confidentiality over wired networks and Wireless Transport Layer Security (WTLS) between a wireless device and a Wireless Application Protocol (WAP) gateway. The paper presents our analysis of security properties in the proposed protocols using formal method tools: Casper and FDR2. We also highlight issues concerning payment security in the proposed protocols.
Resumo:
The fields of molecular biology and cell biology are being flooded with complex genomic and proteomic datasets of large dimensions. We now recognize that each molecule in the cell and tissue can no longer be viewed as an isolated entity. Instead, each molecule must be considered as one member of an interacting network. Consequently, there is an urgent need for mathematical models to understand the behavior of cell signaling networks in health and in disease.
Resumo:
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
Aligning off-balance sheet risk, on-balance sheet risk and audit fees: a PLS path modelling analysis
Resumo:
This study focuses on using the partial least squares (PLS) path modelling technique in archival auditing research by replicating the data and research questions from prior bank audit fee studies. PLS path modelling allows for inter-correlations among audit fee determinants by establishing latent constructs and multiple relationship paths in one simultaneous PLS path model. Endogeneity concerns about auditor choice can also be addressed with PLS path modelling. With a sample of US bank holding companies for the period 2003-2009, we examine the associations among on-balance sheet financial risks, off-balance sheet risks and audit fees, and also address the pervasive client size effect, and the effect of the self-selection of auditors. The results endorse the dominating effect of size on audit fees, both directly and indirectly via its impacts on other audit fee determinants. By simultaneously considering the self-selection of auditors, we still find audit fee premiums on Big N auditors, which is the second important factor on audit fee determination. On-balance-sheet financial risk measures in terms of capital adequacy, loan composition, earnings and asset quality performance have positive impacts on audit fees. After allowing for the positive influence of on-balance sheet financial risks and entity size on off-balance sheet risk, the off-balance sheet risk measure, SECRISK, is still positively associated with bank audit fees, both before and after the onset of the financial crisis. The consistent results from this study compared with prior literature provide supporting evidence and enhance confidence on the application of this new research technique in archival accounting studies.
Aligning off-balance sheet risk, on-balance sheet risk and audit fees: a PLS path modelling analysis
Resumo:
This study focuses on using the partial least squares (PLS) path modelling methodology in archival auditing research by replicating the data and research questions from prior bank audit fee studies. PLS path modelling allows for inter-correlations among audit fee determinants by establishing latent constructs and multiple relationship paths in one simultaneous PLS path model. Endogeneity concerns about auditor choice can also be addressed with PLS path modelling. With a sample of US bank holding companies for the period 2003-2009, we examine the associations among on-balance sheet financial risks, off-balance sheet risks and audit fees, and also address the pervasive client size effect, and the effect of the self-selection of auditors. The results endorse the dominating effect of size on audit fees, both directly and indirectly via its impacts on other audit fee determinants. By simultaneously considering the self-selection of auditors, we still find audit fee premiums on Big N auditors, which is the second important factor on audit fee determination. On-balance-sheet financial risk measures in terms of capital adequacy, loan composition, earnings and asset quality performance have positive impacts on audit fees. After allowing for the positive influence of on-balance sheet financial risks and entity size on off-balance sheet risk, the off-balance sheet risk measure, SECRISK, is still positively associated with bank audit fees, both before and after the onset of the financial crisis. The consistent results from this study compared with prior literature provide supporting evidence and enhance confidence on the application of this new research technique in archival accounting studies.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
Carcinoma ex pleomorphic adenoma (Ca ex PA) is a carcinoma arising from a primary or recurrent benign pleomorphic adenoma. It often poses a diagnostic challenge to clinicians and pathologists. This study intends to review the literature and highlight the current clinical and molecular perspectives about this entity. The most common clinical presentation of CA ex PA is of a firm mass in the parotid gland. The proportion of adenoma and carcinoma components determines the macroscopic features of this neoplasm. The entity is difficult to diagnose pre-operatively. Pathologic assessment is the gold standard for making the diagnosis. Treatment for Ca ex PA often involves an ablative surgical procedure which may be followed by radiotherapy. Overall, patients with Ca ex PA have a poor prognosis. Accurate diagnosis and aggressive surgical management of patients presenting with Ca ex PA can increase their survival rates. Molecular studies have revealed that the development of Ca ex PA follows a multi-step model of carcinogenesis, with the progressive loss of heterozygosity at chromosomal arms 8q, then 12q and finally 17p. There are specific candidate genes in these regions that are associated with particular stages in the progression of Ca ex PA. In addition, many genes which regulate tumour suppression, cell cycle control, growth factors and cell-cell adhesion play a role in the development and progression of Ca ex PA. It is hopeful that these molecular data can give clues for the diagnosis and management of the disease.
Resumo:
PURPOSE Colorectal signet-ring cell carcinoma (SRCC) is rare, and very little detailed information on the molecular biology of the disease is available. METHODS The literature on the clinical, pathological and, in particular, the molecular biology of this rare entity was critically reviewed. The reviewed articles take into account a total of 1,817 cases of SRCC, but only 143 cases have molecular data available. The characteristics of two patients with colorectal SRCC were also discussed. RESULTS Colorectal SRCC mostly occurs in younger patients, is larger and has different site predilection compared with conventional colorectal adenocarcinoma. It can occur as one of the synchronous cancers in the colorectum. The cancer is usually diagnosed at advanced stages because of the late manifestation of symptoms, and aggressive treatment strategy is required. Limited reports in the literature have shown that the variant of colorectal cancer demonstrated a different pattern of genetic alterations of common growth kinase-related oncogenes (K-ras, BRAF), tumour suppressor genes (p53, p16), gene methylation and cell adhesion-related genes related to the Wingless signalling pathway (E-cadherin and beta-catenin) from conventional colorectal adenocarcinoma. Colorectal SRCC also showed high expression of mucin-related genes and genes related to the gastrointestinal system. There was also a higher prevalence of microsatellite instability-high tumours and low Cox-2 expression in colorectal SRCC as opposed to conventional adenocarcinoma. CONCLUSIONS Colorectal SRCC has unique molecular pathological features. The unique molecular profiles in SRCC may provide molecular-based improvements to patient management in colorectal SRCC.
Resumo:
The follicular variant of papillary thyroid carcinoma (FVPTC) presents a type of papillary thyroid cancer that has created continuous diagnosis and treatment controversies among clinicians and pathologists. In this review, we describe the nomenclature, the clinical features, diagnostic problems and the molecular biology of FVPTC. It is important for clinicians to understand this entity as the diagnosis and management of this group of patient may be different from other patients with conventional PTC. The literature suggests that FVPTC behaves in a way similar, clinically, to conventional papillary thyroid carcinoma. However, there are some genotypic differences which may characterise this neoplasm. These parameters may account for the phenotypic variation described by some scientists in this type of cancer. Further understanding can only be achieved by defining strict pathological criteria, in-depth study of the molecular biology and long term follow-up of the optional patients with FVPTC.
Resumo:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.
Resumo:
This paper reports on the 2nd ShARe/CLEFeHealth evaluation lab which continues our evaluation resource building activities for the medical domain. In this lab we focus on patients' information needs as opposed to the more common campaign focus of the specialised information needs of physicians and other healthcare workers. The usage scenario of the lab is to ease patients and next-of-kins' ease in understanding eHealth information, in particular clinical reports. The 1st ShARe/CLEFeHealth evaluation lab was held in 2013. This lab consisted of three tasks. Task 1 focused on named entity recognition and normalization of disorders; Task 2 on normalization of acronyms/abbreviations; and Task 3 on information retrieval to address questions patients may have when reading clinical reports. This year's lab introduces a new challenge in Task 1 on visual-interactive search and exploration of eHealth data. Its aim is to help patients (or their next-of-kin) in readability issues related to their hospital discharge documents and related information search on the Internet. Task 2 then continues the information extraction work of the 2013 lab, specifically focusing on disorder attribute identification and normalization from clinical text. Finally, this year's Task 3 further extends the 2013 information retrieval task, by cleaning the 2013 document collection and introducing a new query generation method and multilingual queries. De-identified clinical reports used by the three tasks were from US intensive care and originated from the MIMIC II database. Other text documents for Tasks 1 and 3 were from the Internet and originated from the Khresmoi project. Task 2 annotations originated from the ShARe annotations. For Tasks 1 and 3, new annotations, queries, and relevance assessments were created. 50, 79, and 91 people registered their interest in Tasks 1, 2, and 3, respectively. 24 unique teams participated with 1, 10, and 14 teams in Tasks 1, 2 and 3, respectively. The teams were from Africa, Asia, Canada, Europe, and North America. The Task 1 submission, reviewed by 5 expert peers, related to the task evaluation category of Effective use of interaction and targeted the needs of both expert and novice users. The best system had an Accuracy of 0.868 in Task 2a, an F1-score of 0.576 in Task 2b, and Precision at 10 (P@10) of 0.756 in Task 3. The results demonstrate the substantial community interest and capabilities of these systems in making clinical reports easier to understand for patients. The organisers have made data and tools available for future research and development.