521 resultados para Smaller Kidneys


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the presence of many regulations governing the operation of heavy vehicles and supply chains in Australia, the truck driving sector continues to have the highest incidence of fatal injuries compared to all other industries. The working environment has been the focus of attention by safety researchers during the past few decades, with particular consideration been given to the concept ‘safety culture’ and how to maintain, modify and advance responses to occupational risk. One important aspect of the heavy industry which sets it apart is the existence of cultural or sub-cultural influences at an industry wide and occupation-specific level rather than organisational level. This paper reports on the findings of stakeholder’s perceptions of the influences of power and control, and culture on industry safety. In-depth structured interviews were conducted during 2011 with Australian industry stakeholders (n=31). The questioning surrounded decision-making processes with regards to identifying risks, self-monitoring and reducing risky activities; as well as how power-affected relationships may influence the operational performance of supply chains and impacts on driver safety. One of the most significant findings from these interviews relates to the notion of power. The perception that the ‘Customer is King’ was widely viewed, with the majority of stakeholders believing that there exists a ‘master slave mentality’ in the industry. There appears to be great frustration in the industry as to the apparent immunity of customers (particularly retail supply chains) to their responsibilities. There was also a strong perception that the customer holds the balance of power by covertly employing remuneration-related incentives and pressures. Smaller trucking companies are perceived as being more vulnerable to the pressure of customer expectations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Executive Summary Child sexual abuse (CSA) in Christian Institutions continues to be of serious concern in public, criminal justice and institutional discourse. This study was conducted in conjunction with Project Kidsafe Foundation and sought the perspectives of Australian survivors of CSA by Personnel in Christian Institutions (PICIs). In total, 81 individual survivors responded to an online survey which asked them a range of questions about their current and childhood life circumstance; the nature, extent and location of abuse; grooming strategies utilised by perpetrators; their experiences of disclosure; and outcomes of official reporting to both criminal justice agencies and also official processes Christian institutions. Survey participants were given the option to further participate in a qualitative interview with the principal researcher. These interviews are not considered within this report. In summary, survey data examined here indicate that: • Instances of abuse included a range of offences from touching outside of clothing to serious penetrative offences. • The onset of abuse occurred at a young age: between 6 and 10 years for most female participants, and 11 and 13 years for male participants. • In the majority of cases the abuse ceased because of actions by survivors, not by adults within families or the Christian institution. • Participants waited significant time before disclosing their abuse, with many waiting 20 years or more. • Where survivors disclosed to family members or PICIs, they were often met with disbelief and unhelpful responses aimed at minimising the harm. • Where an official report was made, it was most often made to police. In these cases 53% resulted in an official investigations. • The primary reasons for reporting were to protect others from the perpetrator and make the Christian institution accountable to an external agency. • Where reports to Christian institutions were made, most survivors were dissatisfied with outcomes, and a smaller majority was extremely dissatisfied. This report reflects the long-held understanding that responding to CSA is a complex and difficult task. If effective and meaningful responses are not made, however, trauma to the survivor is most often compounded and recovery delayed. This report demonstrates the need for further independent analysis and oversight of responses made to CSA by both criminal justice, religious and social institutions. Meaningful change will only be accessible, however, if family, community and institutional environments are safe places for survivors to disclose their experiences of abuse and begin to seek ways of healing. There is much to be learnt from survivors that have already made this journey.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study was undertaken in an effort to contribute to the limited knowledge of women who commit murder. Women account for approximately 10% of the total Australian homicides and according to Mouzos (2000), 20% of these female perpetrated homicides result in murder convictions. In her extensive study of female homicide offending in England, Brookman (2005) asserts that nearly two thirds of the victims of women who kill are intimates, to include violent partners and their own children. The other third of the victims consist largely of acquaintances and to lesser degree strangers (Brookman, 2005). This study strives to introduce further knowledge regarding women convicted of murder; the smaller subgroup of female homicide offenders of which less is known. It is comprised of women who killed intimates and non-intimates to include acquaintances. The study engages the narratives of seven women, all of whom were convicted of murder and serving lengthy sentences at the Dame Phyllis Frost Centre, a medium and maximum security prison that is located on the outskirts of Melbourne, Australia. The seven women fall largely outside of the characteristics of female homicide offenders as revealed in the studies from Australia’s National Homicide Monitoring Program (NHMP, 2007), from Canada by Hoffmann, Lavigne, and Dickie (1998) and research from the United States by Scott and Davies (2002). In this study there were no Indigenous women represented. Only one of the women had a previous criminal charge. The women were older on average than the prevailing demographics from western nations. Two of the women had substance abuse and co-occurring mental illness, which reflects a significant lower rate than the literature suggests. This study expands the current understanding of the phenomenon of women who murder. It communicates the narratives of seven women charged and convicted of murder as they attempt to understand their lives and identities. It moves the dialogue beyond the preponderance of feminist criminological research that examines motive and the relationship the woman has with her victim to the social discourses which dominate in her identity formation. This research found that in their attempt to create a favourable identity the women needed to engage with the master script of normative femininity through the feminisation of victimisation, motherhood and domesticity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Speaker diarization is the process of annotating an input audio with information that attributes temporal regions of the audio signal to their respective sources, which may include both speech and non-speech events. For speech regions, the diarization system also specifies the locations of speaker boundaries and assign relative speaker labels to each homogeneous segment of speech. In short, speaker diarization systems effectively answer the question of ‘who spoke when’. There are several important applications for speaker diarization technology, such as facilitating speaker indexing systems to allow users to directly access the relevant segments of interest within a given audio, and assisting with other downstream processes such as summarizing and parsing. When combined with automatic speech recognition (ASR) systems, the metadata extracted from a speaker diarization system can provide complementary information for ASR transcripts including the location of speaker turns and relative speaker segment labels, making the transcripts more readable. Speaker diarization output can also be used to localize the instances of specific speakers to pool data for model adaptation, which in turn boosts transcription accuracies. Speaker diarization therefore plays an important role as a preliminary step in automatic transcription of audio data. The aim of this work is to improve the usefulness and practicality of speaker diarization technology, through the reduction of diarization error rates. In particular, this research is focused on the segmentation and clustering stages within a diarization system. Although particular emphasis is placed on the broadcast news audio domain and systems developed throughout this work are also trained and tested on broadcast news data, the techniques proposed in this dissertation are also applicable to other domains including telephone conversations and meetings audio. Three main research themes were pursued: heuristic rules for speaker segmentation, modelling uncertainty in speaker model estimates, and modelling uncertainty in eigenvoice speaker modelling. The use of heuristic approaches for the speaker segmentation task was first investigated, with emphasis placed on minimizing missed boundary detections. A set of heuristic rules was proposed, to govern the detection and heuristic selection of candidate speaker segment boundaries. A second pass, using the same heuristic algorithm with a smaller window, was also proposed with the aim of improving detection of boundaries around short speaker segments. Compared to single threshold based methods, the proposed heuristic approach was shown to provide improved segmentation performance, leading to a reduction in the overall diarization error rate. Methods to model the uncertainty in speaker model estimates were developed, to address the difficulties associated with making segmentation and clustering decisions with limited data in the speaker segments. The Bayes factor, derived specifically for multivariate Gaussian speaker modelling, was introduced to account for the uncertainty of the speaker model estimates. The use of the Bayes factor also enabled the incorporation of prior information regarding the audio to aid segmentation and clustering decisions. The idea of modelling uncertainty in speaker model estimates was also extended to the eigenvoice speaker modelling framework for the speaker clustering task. Building on the application of Bayesian approaches to the speaker diarization problem, the proposed approach takes into account the uncertainty associated with the explicit estimation of the speaker factors. The proposed decision criteria, based on Bayesian theory, was shown to generally outperform their non- Bayesian counterparts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Three porous amorphous silica minerals, including diatomite, opal and porous precipitated SiO2wereadopted to prepare supported TiO2catalysts by hydrolysis–deposition method. The prepared compoundmaterials were characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), Fouriertransform infrared spectroscopy (FT-IR), transmission electron microscopy (TEM) and X-ray photo-electron spectroscopy (XPS). Through morphology and physical chemistry properties of the resultingTiO2/amorphous SiO2catalysts, it was proposed that the nature of silica supports could affect the particlesize and the crystal form of TiO2and then further influence the photocatalytic property of TiO2/amorphousSiO2catalysts. The catalytic properties of these porous amorphous silica supported photocatalysts(TiO2/SiO2) were investigated by UV-assisted degradation of Rhodamine B (RhB). Compared with pureTiO2(P25) and the other two TiO2/amorphous SiO2catalysts, TiO2/diatomite photocatalyst exhibits bet-ter catalytic performance at different calcined temperatures, the decoloration rate of which can be upto over 85% even at a relatively low calcined temperature. The TiO2/diatomite photocatalyst possessesmixed-phase TiO2with relatively smaller particles size, which might be responsible for higher photo-catalytic activity. Moreover, the stable and much inerter porous microstructure of diatomite could beanother key factor in improving its activity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The marsupial genus Macropus includes three subgenera, the familiar large grazing kangaroos and wallaroos of M. (Macropus) and M. (Osphranter), as well as the smaller mixed grazing/browsing wallabies of M. (Notamacropus). A recent study of five concatenated nuclear genes recommended subsuming the predominantly browsing Wallabia bicolor (swamp wallaby) into Macropus. To further examine this proposal we sequenced partial mitochondrial genomes for kangaroos and wallabies. These sequences strongly favour the morphological placement of W. bicolor as sister to Macropus, although place M. irma (black-gloved wallaby) within M. (Osphranter) rather than as expected, with M. (Notamacropus). Species tree estimation from separately analysed mitochondrial and nuclear genes favours retaining Macropus and Wallabia as separate genera. A simulation study finds that incomplete lineage sorting among nuclear genes is a plausible explanation for incongruence with the mitochondrial placement of W. bicolor, while mitochondrial introgression from a wallaroo into M. irma is the deepest such event identified in marsupials. Similar such coalescent simulations for interpreting gene tree conflicts will increase in both relevance and statistical power as species-level phylogenetics enters the genomic age. Ecological considerations in turn, hint at a role for selection in accelerating the fixation of introgressed or incompletely sorted loci. More generally the inclusion of the mitochondrial sequences substantially enhanced phylogenetic resolution. However, we caution that the evolutionary dynamics that enhance mitochondria as speciation indicators in the presence of incomplete lineage sorting may also render them especially susceptible to introgression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Eccentric exercise commonly results in muscle damage. The primary sequence of events leading to exercise-induced muscle damage is believed to involve initial mechanical disruption of sarcomeres, followed by impaired excitation-contraction coupling and calcium signaling, and finally, activation of calcium-sensitive degradation pathways. Muscle damage is characterized by ultrastructural changes to muscle architecture, increased muscle proteins and enzymes in the bloodstream, loss of muscular strength and range of motion and muscle soreness. The inflammatory response to exercise-induced muscle damage is characterized by leukocyte infiltration and production of pro-inflammatory cytokines within damaged muscle tissue, systemic release of leukocytes and cytokines, in addition to alterations in leukocyte receptor expression and functional activity. Current evidence suggests that inflammatory responses to muscle damage are dependent on the type of eccentric exercise, previous eccentric loading (repeated bouts), age and gender. Circulating neutrophil counts and systemic cytokine responses are greater after eccentric exercise using a large muscle mass (e.g. downhill running, eccentric cycling) than after other types of eccentric exercise involving a smaller muscle mass. After an initial bout of eccentric exercise, circulating leukocyte counts and cell surface receptor expression are attenuated. Leukocyte and cytokine responses to eccentric exercise are impaired in elderly individuals, while cellular infiltration into skeletal muscle is greater in human females than males after eccentric exercise. Whether alterations in intracellular calcium homeostasis influence inflammatory responses to muscle damage is uncertain. Furthermore, the effects of antioxidant supplements are variable, and the limited data available indicates that anti-inflammatory drugs largely have no influence on inflammatory responses to eccentric exercise. In this review, we compare local versus systemic inflammatory responses, and discuss some of the possible mechanisms regulating the inflammatory responses to exercise-induced muscle damage in humans.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aims of this study were to examine the plasma concentrations of inflammatory mediators including cytokines induced by a single bout of eccentric exercise and again 4 weeks later by a second bout of eccentric exercise of the same muscle group. Ten untrained male subjects performed two bouts of the eccentric exercise involving the elbow flexors (6 sets of 5 repetitions) separated by four weeks. Changes in muscle soreness, swelling, and function following exercise were compared between the bouts. Blood was sampled before, immediately after, 1 h, 3 h, 6 h, 24 h (1 d), 48 h (2 d), 72 h (3 d), 96 h (4 d) following exercise bout to measure plasma creatine kinase (CK) activity, plasma concentrations of myoglobin (Mb), interleukin (IL)-1beta, IL-1 receptor antagonist (IL-1ra), IL-4, IL-6, IL-8, IL-10, IL-12p40, tumor necrosis factor (TNF)-alpha, granulocyte colony-stimulating factor (G-CSF), myeloperoxidase (MPO), prostaglandin E2 (PGE2), heat shock protein (HSP) 60 and 70. After the first bout, muscle soreness increased significantly, and there was also significant increase in upper arm circumference; muscle function decreased and plasma CK activity and Mb concentration increased significantly. These changes were significantly smaller after the second bout compared to the first bout, indicating muscle adaptation to the repeated bouts of the eccentric exercise. Despite the evidence of greater muscle damage after the first bout, the changes in cytokines and other inflammatory mediators were quite minor, and considerably smaller than that following endurance exercise. These results suggest that eccentric exercise-induced muscle damage is not associated with the significant release of cytokines into the systemic circulation. After the first bout, plasma G-CSF concentration showed a small but significant increase, whereas TNF-alpha and IL-8 showed significant decreases compared to the pre-exercise values. After the second bout, there was a significant increase in IL-10, and a significant decrease in IL-8. In conclusion, although there was evidence of severe muscle damage after the eccentric exercise, this muscle damage was not accompanied by any large changes in plasma cytokine concentrations. The minor changes in systemic cytokine concentration found in this study might reflect more rapid clearance from the circulation, or a lack of any significant metabolic or oxidative demands during this particular mode of exercise. In relation to the adaptation to the muscle damage, the anti-inflammatory cytokine IL-10 might work as one of the underlying mechanisms of action.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current older adult capability data-sets fail to account for the effects of everyday environmental conditions on capability. This article details a study that investigates the effects of everyday ambient illumination conditions (overcast, 6000 lx; in-house lighting, 150 lx and street lighting, 7.5 lx) and contrast (90%, 70%, 50% and 30%) on the near visual acuity (VA) of older adults (n= 38, 65-87 years). VA was measured at a 1-m viewing distance using logarithm of minimum angle of resolution (LogMAR) acuity charts. Results from the study showed that for all contrast levels tested, VA decreased by 0.2 log units between the overcast and street lighting conditions. On average, in overcast conditions, participants could detect detail around 1.6 times smaller on the LogMAR charts compared with street lighting. VA also significantly decreased when contrast was reduced from 70% to 50%, and from 50% to 30% in each of the ambient illumination conditions. Practitioner summary: This article presents an experimental study that investigates the impact of everyday ambient illumination levels and contrast on older adults' VA. Results show that both factors have a significant effect on their VA. Findings suggest that environmental conditions need to be accounted for in older adult capability data-sets/designs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent advances in computational geodynamics are applied to explore the link between Earth’s heat, its chemistry and its mechanical behavior. Computational thermal-mechanical solutions are now allowing us to understand Earth patterns by solving the basic physics of heat transfer. This approach is currently used to solve basic convection patterns of terrestrial planets. Applying the same methodology to smaller scales delivers promising similarities between observed and predicted structures which are often the site of mineral deposits. The new approach involves a fully coupled solution to the energy, momentum and continuity equations of the system at all scales, allowing the prediction of fractures, shear zones and other typical geological patterns out of a randomly perturbed initial state. The results of this approach are linking a global geodynamic mechanical framework over regional-scale mineral deposits down to the underlying micro-scale processes. Ongoing work includes the challenge of incorporating chemistry into the formulation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The texture of agricultural crops changes during harvesting, post harvesting and processing stages due to different loading processes. There are different source of loading that deform agricultural crop tissues and these include impact, compression, and tension. Scanning Electron Microscope (SEM) method is a common way of analysing cellular changes of materials before and after these loading operations. This paper examines the structural changes of pumpkin peel and flesh tissues under mechanical loading. Compression and indentation tests were performed on peel and flesh samples. Samples structure were then fixed and dehydrated in order to capture the cellular changes under SEM. The results were compared with the images of normal peel and flesh tissues. The findings suggest that normal flesh tissue had bigger size cells, while the cellular arrangement of peel was smaller. Structural damage was clearly observed in tissue structure after compression and indentation. However, the damages that resulted from the flat end indenter was much more severe than that from the spherical end indenter and compression test. An integrated deformed tissue layer was observed in compressed tissue, while the indentation tests shaped a deformed area under the indenter and left the rest of the tissue unharmed. There was an obvious broken layer of cells on the walls of the hole after the flat end indentations, whereas the spherical indenter created a squashed layer all around the hole. Furthermore, the influence of loading was lower on peel samples in comparison with the flesh samples. The experiments have shown that the rate of damage on tissue under constant rate of loading is highly dependent on the shape of equipment. This fact and observed structural changes after loading underline the significance of deigning post harvesting equipments to reduce the rate of damage on agricultural crop tissues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A nanocomposite of Mn3O4 wrapped in graphene sheets (GSs) was successfully synthesized via a facile, effective, energy-saving, and scalable microwave hydrothermal technique. The morphology and microstructures of the fabricated GS–Mn3O4 nanocomposite were characterized using various techniques. The results indicate that the particle size of the Mn3O4 particles in the nanocomposite markedly decreased to nearly 20 nm, significantly smaller than that for the bare Mn3O4. Electrochemical measurements demonstrated a high specific capacity of more than 900 mA h g−1 at 40 mA g−1, and excellent cycling stability with no capacity decay can be observed up to 50 cycles. All of these properties are also interpreted by experimental studies and theoretical calculations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction. Calculating segmental (vertebral level-by-level) torso masses in Adolescent Idiopathic Scoliosis (AIS) patients allows the gravitational loading on the scoliotic spine during relaxed standing to be determined. This study used CT scans of AIS patients to measure segmental torso masses and explores how joint moments in the coronal plane are affected by changes in the position of the intervertebral joint’s axis of rotation; particularly at the apex of a scoliotic major curve. Methods. Existing low dose CT data from the Paediatric Spine Research Group was used to calculate vertebral level-by-level torso masses and joint torques occurring in the spine for a group of 20 female AIS patients (mean age 15.0 ± 2.7 years, mean Cobb angle 53 ± 7.1°). Image processing software, ImageJ (v1.45 NIH USA) was used to threshold the T1 to L5 CT images and calculate the segmental torso volume and mass corresponding to each vertebral level. Body segment masses for the head, neck and arms were taken from published anthropometric data. Intervertebral (IV) joint torques at each vertebral level were found using principles of static equilibrium together with the segmental body mass data. Summing the torque contributions for each level above the required joint, allowed the cumulative joint torque at a particular level to be found. Since there is some uncertainty in the position of the coronal plane Instantaneous Axis of Rotation (IAR) for scoliosis patients, it was assumed the IAR was located in the centre of the IV disc. A sensitivity analysis was performed to see what effect the IAR had on the joint torques by moving it laterally 10mm in both directions. Results. The magnitude of the torso masses from T1-L5 increased inferiorly, with a 150% increase in mean segmental torso mass from 0.6kg at T1 to 1.5kg at L5. The magnitudes of the calculated coronal plane joint torques during relaxed standing were typically 5-7 Nm at the apex of the curve, with the highest apex joint torque of 7Nm being found in patient 13. Shifting the assumed IAR by 10mm towards the convexity of the spine, increased the joint torque at that level by a mean 9.0%, showing that calculated joint torques were moderately sensitive to the assumed IAR location. When the IAR midline position was moved 10mm away from the convexity of the spine, the joint torque reduced by a mean 8.9%. Conclusion. Coronal plane joint torques as high as 7Nm can occur during relaxed standing in scoliosis patients, which may help to explain the mechanics of AIS progression. This study provides new anthropometric reference data on vertebral level-by-level torso mass in AIS patients which will be useful for biomechanical models of scoliosis progression and treatment. However, the CT scans were performed in supine (no gravitational load on spine) and curve magnitudes are known to be smaller than those measured in standing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.