818 resultados para high security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A significant amount (ca. 15-25 GL/a) of PRW (Purified Recycled Water) from urban areas is foreseen as augmentation of the depleted groundwater resources of the Lockyer Valley (approx. 80 km west of Brisbane). Theresearch project uses field investigations, lab trials and modelling techniques to address the key challenges: (i) how to determine benefits of individual users from the augmentation of a natural common pool resource; (ii) how to minimise impacts of applying different quality water on the Lockyer soils, to creeks and on aquifier materials; (iii) how to minimuse mobilisation of salts in the unsaturated and saturated zones as a result of increased deep drainage; (iv) determination of potential for direct aquifer recharge using injection wells?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Lockyer Valley, southeast Queensland, hosts intensive irrigated agriculture using groundwater from over 5000 alluvial bores. A current project is considering introduction of PRW (purified recycled water) to augment groundwater supplies. To assess this, a valley-wide MODFLOW simulation model is being developed plus a new unsaturated zone flow model. To underpin these models and provide a realistic understanding of the aquifer framework a 3D visualisation model has been developed using Groundwater Visualisation System (GVS) software produced at QUT.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The application of high-speed machine vision for close-loop position control, or visual servoing, of a robot manipulator. It provides a comprehensive coverage of all aspects of the visual servoing problem: robotics, vision, control, technology and implementation issues. While much of the discussion is quite general the experimental work described is based on the use of a high-speed binary vision system with a monocular "eye-in-hand" camera.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present study investigated metabolic responses to fat and carbohydrate ingestion in lean male individuals consuming an habitual diet high or low in fat. Twelve high-fat phenotypes (HF) and twelve low-fat phenotypes (LF) participated in the study. Energy intake and macronutrient intake variables were assessed using a food frequency questionnaire. Resting (RMR) and postprandial metabolic rate and substrate oxidation (respiratory quotient; RQ) were measured by indirect calorimetry. HF had a significantly higher RMR and higher resting heart rate than LF. These variables remained higher in HF following the macronutrient challenge. In all subjects the carbohydrate load increased metabolic rate and heart rate significantly more than the fat load. Fat oxidation (indicated by a low RQ) was significantly higher in HF than in LF following the fat load; the ability to oxidise a high carbohydrate load did not differ between the groups. Lean male subjects consuming a diet high in fat were associated with increased energy expenditure at rest and a relatively higher fat oxidation in response to a high fat load; these observations may be partly responsible for maintaining energy balance on a high-fat (high-energy) diet. In contrast, a low consumer of fat is associated with relatively lower energy expenditure at rest and lower fat oxidation, which has implications for weight gain if high-fat foods or meals are periodically introduced to the diet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on lin- ear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to non-LFSR based stream ciphers. Specifically, we perform an algebraic analysis on the RC4 family of stream ciphers, an example of stream ciphers based on dynamic tables, and inves- tigate its implications to potential algebraic attacks on the cipher. This is, to our knowledge, the first pa- per that evaluates the security of RC4 against alge- braic attacks through providing a full set of equations that describe the complex word manipulations in the system. For an arbitrary word size, we derive alge- braic representations for the three main operations used in RC4, namely state extraction, word addition and state permutation. Equations relating the inter- nal states and keystream of RC4 are then obtained from each component of the cipher based on these al- gebraic representations, and analysed in terms of their contributions to the security of RC4 against algebraic attacks. Interestingly, it is shown that each of the three main operations contained in the components has its own unique algebraic properties, and when their respective equations are combined, the resulting system becomes infeasible to solve. This results in a high level of security being achieved by RC4 against algebraic attacks. On the other hand, the removal of an operation from the cipher could compromise this security. Experiments on reduced versions of RC4 have been performed, which confirms the validity of our algebraic analysis and the conclusion that the full RC4 stream cipher seems to be immune to algebraic attacks at present.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: During hospitalisation older people often experience functional decline which impacts on their future independence. The objective of this study was to evaluate a multifaceted transitional care intervention including home-based exercise strategies for at-risk older people on functional status, independence in activities of daily living, and walking ability. Methods: A randomised controlled trial was undertaken in a metropolitan hospital in Australia with 128 patients (64 intervention, 64 control) aged over 65 years with an acute medical admission and at least one risk factor for hospital readmission. The intervention group received an individually tailored program for exercise and follow-up care which was commenced in hospital and included regular visits in hospital by a physiotherapist and a Registered Nurse, a home visit following discharge, and regular telephone follow-up for 24 weeks following discharge. The program was designed to improve health promoting behaviours, strength, stability, endurance and mobility. Data were collected at baseline, then 4, 12 and 24 weeks following discharge using the Index of Activities of Daily Living (ADL), Instrumental Index of Activities of Daily Living (IADL), and the Walking Impairment Questionnaire (Modified). Results: Significant improvements were found in the intervention group in IADL scores (p<.001), ADL scores (p<.001), and WIQ scale scores (p<.001) in comparison to the control group. The greatest improvements were found in the first four weeks following discharge. Conclusions: Early introduction of a transitional model of care incorporating a tailored exercise program and regular telephone follow-up for hospitalised at-risk older adults can improve independence and functional ability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective. To provide a preliminary test of a Theory of Planned Behavior (TPB) belief-based intervention to increase adolescents’ sun protective behaviors in a high risk area, Queensland, Australia. Methods. In the period of October-November, 2007 and May-June, 2008, 80 adolescents (14.53 ± 0.69 years) were recruited from two secondary schools (one government and one private) in Queensland after obtaining student, parental, and school informed consent. Adolescents were allocated to either a control or intervention condition based on the class they attended. The intervention comprised three, one hour in-school sessions facilitated by Cancer Council Queensland employees with sessions covering the belief basis of the TPB (i.e., behavioral, normative, and control [barrier and motivator] sun-safe beliefs). Participants completed questionnaires assessing sun-safety beliefs, intentions, and behavior pre- and post-intervention. Repeated Measures Multivariate Analysis of Variance was used to test the effect of the intervention across time on these constructs. Results. Students completing the intervention reported stronger sun-safe normative and motivator beliefs and intentions and the performance of more sun-safe behaviors across time than those in the control condition. Conclusion. Strengthening beliefs about the approval of others and motivators for sun protection may encourage sun-safe cognitions and actions among adolescents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users’ access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer from the assumption that users will (can) not depart from the expected behaviour implicit in the authorisation policy. In reality however, users can and do depart from the canonical behaviour. This paper argues that the conflict of interest between insiders and authorisation mechanisms is analogous to the subset of problems formally studied in the field of game theory. It proposes a game theoretic authorisation model that can ensure users’ potential misuse of a resource is explicitly considered while making an authorisation decision. The resulting authorisation model is dynamic in the sense that its access decisions vary according to the changes in explicit factors that influence the cost of misuse for both the authorisation mechanism and the insider.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the early part of 2008, a major political upset was pulled off in the Southeast Asian nation of Malaysia when the ruling coalition, Barisan Nasional (National Front), lost its long-held parliamentary majority after the general elections. Given the astonishingly high profile of political bloggers and relatively well established alternative online new sites within the nation, it was not surprising that many new media proponents saw the result as a major triumph of the medium. Through a brief account of the Hindraf (Hindu Rights Action Force) saga and the socio-political dissent nursed, in part, through new media in contemporary Malaysia, this paper seeks to lend context to the events that precede and surround the election as an example of the relationship between media and citizenship in praxis. In so doing it argues that the political turnaround, if indeed it proves to be, cannot be considered the consequence of new media alone. Rather, that to comprehensively assess the implications of new media for citizenship is to take into account the specific histories, conditions and actions (or lack of) of the various social actors involved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Serotonergic hypofunction is associated with a depressive mood state, an increased drive to eat and preference for sweet (SW) foods. High-trait anxiety individuals are characterised by a functional shortage of serotonin during stress, which in turn increases their susceptibility to experience a negative mood and an increased drive for SW foods. The present study examined whether an acute dietary manipulation, intended to increase circulating serotonin levels, alleviated the detrimental effects of a stress-inducing task on subjective appetite and mood sensations, and preference for SW foods in high-trait anxiety individuals. Thirteen high- (eleven females and two males; anxiety scores 45·5 (sd 5·9); BMI 22·9 (sd 3·0)kg/m2) and twelve low- (ten females and two males; anxiety scores 30·4 (sd 4·8); BMI 23·4 (sd 2·5) kg/m2) trait anxiety individuals participated in a placebo-controlled, two-way crossover design. Participants were provided with 40 g α-lactalbumin (LAC; l-tryptophan (Trp):large neutral amino acids (LNAA) ratio of 7·6) and 40 g casein (placebo) (Trp:LNAA ratio of 4·0) in the form of a snack and lunch on two test days. On both the test days, participants completed a stress-inducing task 2 h after the lunch. Mood and appetite were assessed using visual analogue scales. Changes in food hedonics for different taste and nutrient combinations were assessed using a computer task. The results demonstrated that the LAC manipulation did not exert any immediate effects on mood or appetite. However, LAC did have an effect on food hedonics in individuals with high-trait anxiety after acute stress. These individuals expressed a lower liking (P = 0·012) and SW food preference (P = 0·014) after the stressful task when supplemented with LAC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.