241 resultados para differential fault attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Differential response has long been utilized by statutory child protection systems in Australia. This article describes the advent and history of Victoria's differential response system, with a particular focus on the Child FIRST and IFS programme. This program entails a partnership arrangement between the Department of Human Services child protection services and community-based, not-for-profit agencies to provide a diverse range of early intervention and prevention services. The findings of a recent external service system evaluation, a judicial inquiry, and the large-scale Child and Family Services Outcomes Survey of parents/carers perspectives of their service experiences are used to critically examine the effectiveness of this differential response approach. Service-user perspectives of the health and wellbeing of children and families are identified, as well as the recognized implementation issues posing significant challenges for the goal of an integrated partnership system. The need for ongoing reform agendas is highlighted along with the policy, program and structural tensions that exist in differential response systems, which are reliant upon partnerships and shared responsibilities for protecting children and assisting vulnerable families. Suggestions are made for utilizing robust research and evaluation that gives voice to service users and promotes their rights and interests.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Environmental factors can influence obesity by epigenetic mechanisms. Adipose tissue plays a key role in obesity-related metabolic dysfunction, and gastric bypass provides a model to investigate obesity and weight loss in humans. Results Here, we investigate DNA methylation in adipose tissue from obese women before and after gastric bypass and significant weight loss. In total, 485,577 CpG sites were profiled in matched, before and after weight loss, subcutaneous and omental adipose tissue. A paired analysis revealed significant differential methylation in omental and subcutaneous adipose tissue. A greater proportion of CpGs are hypermethylated before weight loss and increased methylation is observed in the 3′ untranslated region and gene bodies relative to promoter regions. Differential methylation is found within genes associated with obesity, epigenetic regulation and development, such as CETP, FOXP2, HDAC4, DNMT3B, KCNQ1 and HOX clusters. We identify robust correlations between changes in methylation and clinical trait, including associations between fasting glucose and HDAC4, SLC37A3 and DENND1C in subcutaneous adipose. Genes investigated with differential promoter methylation all show significantly different levels of mRNA before and after gastric bypass. Conclusions This is the first study reporting global DNA methylation profiling of adipose tissue before and after gastric bypass and associated weight loss. It provides a strong basis for future work and offers additional evidence for the role of DNA methylation of adipose tissue in obesity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Patients with a number of psychiatric and neuropathological conditions demonstrate problems in recognising facial expressions of emotion. Research indicating that patients with schizophrenia perform more poorly in the recognition of negative valence facial stimuli than positive valence stimuli has been interpreted as evidence of a negative emotion specific deficit. An alternate explanation rests in the psychometric properties of the stimulus materials. This model suggests that the pattern of impairment observed in schizophrenia may reflect initial discrepancies in task difficulty between stimulus categories, which are not apparent in healthy subjects because of ceiling effects. This hypothesis is tested, by examining the performance of healthy subjects in a facial emotion categorisation task with three levels of stimulus resolution. Results confirm the predictions of the model, showing that performance degrades differentially across emotion categories, with the greatest deterioration to negative valence stimuli. In the light of these results, a possible methodology for detecting emotion specific deficits in clinical samples is discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SIMON is a family of 10 lightweight block ciphers published by Beaulieu et al. from the United States National Security Agency (NSA). A cipher in this family with K -bit key and N -bit block is called SIMON N/K . We present several linear characteristics for reduced-round SIMON32/64 that can be used for a key-recovery attack and extend them further to attack other variants of SIMON. Moreover, we provide results of key recovery analysis using several impossible differential characteristics starting from 14 out of 32 rounds for SIMON32/64 to 22 out of 72 rounds for SIMON128/256. In some cases the presented observations do not directly yield an attack, but provide a basis for further analysis for the specific SIMON variant. Finally, we exploit a connection between linear and differential characteristics for SIMON to construct linear characteristics for different variants of reduced-round SIMON. Our attacks extend to all variants of SIMON covering more rounds compared to any known results using linear cryptanalysis. We present a key recovery attack against SIMON128/256 which covers 35 out of 72 rounds with data complexity 2123 . We have implemented our attacks for small scale variants of SIMON and our experiments confirm the theoretical bias presented in this work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bearing faults are the most common cause of wind turbine failures. Unavailability and maintenance cost of wind turbines are becoming critically important, with their fast growing in electric networks. Early fault detection can reduce outage time and costs. This paper proposes Anomaly Detection (AD) machine learning algorithms for fault diagnosis of wind turbine bearings. The application of this method on a real data set was conducted and is presented in this paper. For validation and comparison purposes, a set of baseline results are produced using the popular one-class SVM methods to examine the ability of the proposed technique in detecting incipient faults.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A modularized battery system with Double Star Chopper Cell (DSCC) based modular multilevel converter is proposed for a battery operated electric vehicle (EV). A design concept for the modularized battery micro-packs for DSCC is described. Multidimensional pulse width modulation (MD-PWM) with integrated inter-module SoC balancing and fault tolerant control is proposed and explained. The DSCC can be operated either as an inverter to drive the EV motor or as a synchronous rectifier connected to external three phase power supply equipment for charging the battery micro-packs. The methods of operation as inverter and synchronous rectifier with integrated inter-module SoC balancing and fault tolerant control are discussed. The proposed system operation as inverter and synchronous rectifier are verified through simulations and the results are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The maximum principle for the space and time–space fractional partial differential equations is still an open problem. In this paper, we consider a multi-term time–space Riesz–Caputo fractional differential equations over an open bounded domain. A maximum principle for the equation is proved. The uniqueness and continuous dependence of the solution are derived. Using a fractional predictor–corrector method combining the L1 and L2 discrete schemes, we present a numerical method for the specified equation. Two examples are given to illustrate the obtained results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The output of a differential scanning fluorimetry (DSF) assay is a series of melt curves, which need to be interpreted to get value from the assay. An application that translates raw thermal melt curve data into more easily assimilated knowledge is described. This program, called “Meltdown,” conducts four main activities—control checks, curve normalization, outlier rejection, and melt temperature (Tm) estimation—and performs optimally in the presence of triplicate (or higher) sample data. The final output is a report that summarizes the results of a DSF experiment. The goal of Meltdown is not to replace human analysis of the raw fluorescence data but to provide a meaningful and comprehensive interpretation of the data to make this useful experimental technique accessible to inexperienced users, as well as providing a starting point for detailed analyses by more experienced users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective This study seeks establish whether meaningful subgroups exist within a 14-16 year old adolescent population and if these segments respond differently to the Game On: Know Alcohol (GOKA) intervention, a school-based alcohol social marketing program. Methodology This study is part of a larger cluster randomized controlled evaluation of the Game On: Know Alcohol (GOKA) program implemented in 14 schools in 2013/2014. TwoStep cluster analysis was conducted to segment 2114 high school adolescents (14-16 years old) on the basis of 22 demographic, behavioral and psychographic variables. Program effects on knowledge, attitudes, behavioral intentions, social norms, expectancies and refusal self-efficacy of identified segments was subsequently examined. Results Three segments were identified: (1) Abstainers (2) Bingers (3) Moderate Drinkers. Program effects varied significantly across segments. The strongest positive change effects post participation were observed for the Bingers, while mixed effects were evident for Moderate Drinkers and Abstainers. Conclusions These findings provide preliminary empirical evidence supporting application of social marketing segmentation in alcohol education programs. Development of targeted programs that meet the unique needs of each of the three identified segments is indicated to extend the social marketing footprint in alcohol education.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wind energy, being the fastest growing renewable energy source in the present world, requires a large number of wind turbines to transform wind energy into electricity. One factor driving the cost of this energy is the reliable operation of these turbines. Therefore, it is a growing requirement within the wind farm community, to monitor the operation of the wind turbines on a continuous basis so that a possible fault can be detected ahead of time. As the wind turbine operates in an environment of constantly changing wind speed, it is a challenging task to design a fault detection technique which can accommodate the stochastic operational behavior of the turbines. Addressing this issue, this paper proposes a novel fault detection criterion which is robust against operational uncertainty, as well as having the ability to quantify severity level specifically of the drivetrain abnormality within an operating wind turbine. A benchmark model of wind turbine has been utilized to simulate drivetrain fault condition and effectiveness of the proposed technique has been tested accordingly. From the simulation result it can be concluded that the proposed criterion exhibits consistent performance for drivetrain faults for varying wind speed and has linear relationship with the fault severity level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose a highly reliable fault diagnosis scheme for incipient low-speed rolling element bearing failures. The scheme consists of fault feature calculation, discriminative fault feature analysis, and fault classification. The proposed approach first computes wavelet-based fault features, including the respective relative wavelet packet node energy and entropy, by applying a wavelet packet transform to an incoming acoustic emission signal. The most discriminative fault features are then filtered from the originally produced feature vector by using discriminative fault feature analysis based on a binary bat algorithm (BBA). Finally, the proposed approach employs one-against-all multiclass support vector machines to identify multiple low-speed rolling element bearing defects. This study compares the proposed BBA-based dimensionality reduction scheme with four other dimensionality reduction methodologies in terms of classification performance. Experimental results show that the proposed methodology is superior to other dimensionality reduction approaches, yielding an average classification accuracy of 94.9%, 95.8%, and 98.4% under bearing rotational speeds at 20 revolutions-per-minute (RPM), 80 RPM, and 140 RPM, respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and integrity checks change and the target address will not be computed correctly. In this paper, we present an attack based on tracking stack pointer modifications to break the scheme and provide implementation details. The key element of the attack is to remove the fingerprint and integrity check generating code from the program after disassociating the target address from the fingerprint and integrity value. Using the debugging tools that give vast control to the attacker to track stack pointer operations, we perform both subtractive and watermark replacement attacks. The major steps in the attack are automated resulting in a fast and low-cost attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Brain cells control everything we do - from speaking to walking to breathing. The brain needs a steady supply of blood and oxygen to function properly. Without this vital steady supply of blood, brain cells don't get enough nutrients and oxygen to do their job, and a stroke or 'brain attack' occurs. The human brain is divided into regions that control various motor (movement) and sensory (the senses) functions. Damage from stroke to a specific region may affect the functions it controls. This causes symptoms such as paralysis (loss of movement), difficulty speaking, or loss of coordination. The left side of the brain controls motor and sensory functions on the right side of the body. The left side is also responsible for scientific functions, understanding written and spoken language, number skills and reasoning. The right side of the brain controls motor and sensory functions on the left side of the body. It also controls artistic functions, such as music, art awareness, and insight. If an artery inside the brain or leading to the brain becomes temporarily blocked, the flow of blood to an area of the brain slows or stops. The lack of blood can cause temporary symptoms such as weakness, numbness, problems with speech, dizziness, or loss of vision.