234 resultados para tablet compression
Resumo:
Lymphoedema following cancer treatment is characterized by swelling, and adversely influences mobility, function and quality of life. There is no cure, but without treatment lymphedema may progress. Since lymphedema treatment options are costly and time consuming, understanding the influence of these, and other potential barriers, on treatment adherence is vital in reducing the public health burden of lymphedema. Complex physical therapy and compression are supported by scientific evidence and patients also perceive these treatments as effective for improving symptoms and function. Multiple treatments may be required to treat all aspects of the condition. Patients and health professionals should consider effect and costs when identifying optimal treatment strategies.
Resumo:
The mechanical properties of microfilament networks are systematically summarized at different special scales in this paper. We have presented the mechanical models of single microfilaments and microfilament networks at microscale. By adopting a coarse-grained simulation strategy, the mechanical stability of microfilaments related cellular structures are analysed. Structural analysis is conducted to microfilament networks to understand the stress relaxation under compression. The nanoscale molecular mechanisms of the microfilaments deformation is also summarized from the viewpoint of molecular dynamics simulation. This paper provides the fundaments of multiscale modelling framework for the mechanical behaviours simulation of hierarchical microfilament networks.
Resumo:
Differential settlement at the bridge approach between the deck and rail track on ground is often considered as a source of challenging technical and economical problem. This caused by the sudden stiffness changes between the bridge deck and the track on ground, and changes in soil stiffness of backfill and sub-grade with soil moisture content and loading history. To minimise the negative social and economic impacts due to poor performances of railway tracks at bridge transition zones, it is important, a special attention to be given at design, construction and maintenance stages. It is critically challenging to obtain an appropriate design solution for any given site condition and most of the existing conventional design approaches are unable to address the actual on-site behaviour due to their inherent assumptions of continuity and lack of clarifying of the local effects. An evaluation of existing design techniques is considered to estimate their contributions to a potential solution for bridge transition zones. This paper analyses five different approaches: the Chinese Standard, the European Standard with three different approaches, and the Australian approach. Each design approach is used to calculate the layer thicknesses, accounting critical design features such as the train speed, the axle load, the backfill subgrade condition, and the dynamic loading response. Considering correlation between track degradation and design parameters, this paper concludes that there is still a need of an optimised design approach for bridge transition zones.
Resumo:
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong et al. at FSE 2006. This cryptanalysis is based on some unexpected differentials existing for the step transformation. We show their possible uses in different attack scenarios by giving a 1-bit (resp. 2-bit) near collision attack against the full compression function of FORK-256 running with complexity of 2^125 (resp. 2^120) and with negligible memory, and by exhibiting a 22-bit near pseudo-collision. We also show that we can find collisions for the full compression function with a small amount of memory with complexity not exceeding 2^126.6 hash evaluations. We further show how to reduce this complexity to 2^109.6 hash computations by using 273 memory words. Finally, we show that this attack can be extended with no additional cost to find collisions for the full hash function, i.e. with the predefined IV.
Resumo:
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained examples of near-collisions for the compression function, but in practice the attack could not be extended to the full function due to large memory requirements and computation time. In this paper we improve the attack and show that it is possible to find near-collisions in practice for any given value of IV. In particular, this means that the full hash function with the prespecified IV is vulnerable in practice, not just in theory. We exhibit an example near-collision for the complete hash function.
Resumo:
Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.
Resumo:
This paper presents the fire performance results of light gauge steel frame (LSF) walls lined with single and double plasterboards, and externally insulated with rock fibre insulation as obtained using a finite element analysis based parametric study. A validated numerical model was used to study the influence of various fire curves developed for a range of compartment characteristics. Data from the parametric study was utilized to develop a simplified method to predict the fire resistance ratings of LSF walls exposed to realistic design fire curves. Further, this paper also presents the details of suitable fire design rules based on current cold-formed steel standards and the modifications proposed by previous researchers. Of these the recently developed design rules by Gunalan and Mahendran [1] were investigated to determine their applicability to predict the axial compression strengths and fire resistance ratings (FRR) of LSF walls exposed to realistic design fires. Finally, the stud failure times obtained from fire design rules and finite element studies were compared for LSF walls lined with single and double plasterboards, and externally insulated with rock fibres under realistic design fire curves.
Resumo:
This paper investigates compressed sensing using hidden Markov models (HMMs) and hence provides an extension of recent single frame, bounded error sparse decoding problems into a class of sparse estimation problems containing both temporal evolution and stochastic aspects. This paper presents two optimal estimators for compressed HMMs. The impact of measurement compression on HMM filtering performance is experimentally examined in the context of an important image based aircraft target tracking application. Surprisingly, tracking of dim small-sized targets (as small as 5-10 pixels, with local detectability/SNR as low as − 1.05 dB) was only mildly impacted by compressed sensing down to 15% of original image size.
Resumo:
Digital devices like smart phones and tablet computers are becoming commonplace in young children’s lives for play, entertainment, learning and communication. Recently, there has been a great deal of focus on the educational potential of devices like iPads in both formal and informal educational settings. There is now an abundance of educational ‘apps’ available to children, parents, and kindergarten and pre-school teachers that claim to enhance children’s early literacy and numeracy development and creativity. To date, though, there has been very little formal investigation of the educational potential of these devices. This book discusses the impact on children’s learning when iPads were introduced in three very different kindergartens in Brisbane, Australia. Chapters outline how researchers worked with pre-school teachers and parents to explore how iPads can assist with letter and word recognition, the development of oral literacy and talk around play. The book also considers the possibilities for using iPads for creativity and arts education through photography, storytelling, drawing, music creation and audio recording.