731 resultados para security model


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is a continuation of the paper titled “Concurrent multi-scale modeling of civil infrastructure for analyses on structural deteriorating—Part I: Modeling methodology and strategy” with the emphasis on model updating and verification for the developed concurrent multi-scale model. The sensitivity-based parameter updating method was applied and some important issues such as selection of reference data and model parameters, and model updating procedures on the multi-scale model were investigated based on the sensitivity analysis of the selected model parameters. The experimental modal data as well as static response in terms of component nominal stresses and hot-spot stresses at the concerned locations were used for dynamic response- and static response-oriented model updating, respectively. The updated multi-scale model was further verified to act as the baseline model which is assumed to be finite-element model closest to the real situation of the structure available for the subsequent arbitrary numerical simulation. The comparison of dynamic and static responses between the calculated results by the final model and measured data indicated the updating and verification methods applied in this paper are reliable and accurate for the multi-scale model of frame-like structure. The general procedures of multi-scale model updating and verification were finally proposed for nonlinear physical-based modeling of large civil infrastructure, and it was applied to the model verification of a long-span bridge as an actual engineering practice of the proposed procedures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contrary to what might be expected, we show that the natural combination of an ID-based AKE protocol with a public key based AKE protocol cannot provide strong security. We provide the first one-round CL-AKE scheme proven secure in the random oracle model. We introduce two variants of the Diffie-Hellman trapdoor the introduced by \cite{DBLP:conf/eurocrypt/CashKS08}. The proposed key agreement scheme is secure as long as each party has at least one uncompromised secret. Thus, our scheme is secure even if the key generation centre learns the ephemeral secrets of both parties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Maintaining the health of a construction project can help to achieve the desired outcomes of the project. An analogy is drawn to the medical process of a human health check where it is possible to broadly diagnose health in terms of a number of key areas such as blood pressure or cholesterol level. Similarly it appears possible to diagnose the current health of a construction project in terms of a number of Critical Success Factors (CSFs) and key performance indicators (KPIs). The medical analogy continues into the detailed investigation phase where a number of contributing factors are evaluated to identify possible causes of ill health and through the identification of potential remedies to return the project to the desired level of health. This paper presents the development of a model that diagnoses the immediate health of a construction project, investigates the factors which appear to be causing the ill health and proposes a remedy to return the project to good health. The proposed model uses the well-established continuous improvement management model (Deming, 1986) to adapt the process of human physical health checking to construction project health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a novel relative entropy rate (RER) based approach for multiple HMM (MHMM) approximation of a class of discrete-time uncertain processes. Under different uncertainty assumptions, the model design problem is posed either as a min-max optimisation problem or stochastic minimisation problem on the RER between joint laws describing the state and output processes (rather than the more usual RER between output processes). A suitable filter is proposed for which performance results are established which bound conditional mean estimation performance and show that estimation performance improves as the RER is reduced. These filter consistency and convergence bounds are the first results characterising multiple HMM approximation performance and suggest that joint RER concepts provide a useful model selection criteria. The proposed model design process and MHMM filter are demonstrated on an important image processing dim-target detection problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides an overview of the current QUT Spatial Science undergraduate program based in Brisbane, Queensland, Australia. It discusses the development and implementation of a broad-based educational model for the faculty of built environment and engineering courses and specifically to the course structure of the new Bachelor of Urban Development (Spatial Science) study major. A brief historical background of surveying courses is discussed prior to the detailing of the three distinct and complementary learning themes of the new course structure with a graphical course matrix. Curriculum mapping of the spatial science major has been undertaken as the course approaches formal review in late 2010. Work-integrated learning opportunities have been embedded into the curriculum and a brief outline is presented. Some issues relevant to the tertiary surveying/ spatial sector are highlighted in the context of changing higher education environments in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides new results about efficient arithmetic on Jacobi quartic form elliptic curves, y 2 = d x 4 + 2 a x 2 + 1. With recent bandwidth-efficient proposals, the arithmetic on Jacobi quartic curves became solidly faster than that of Weierstrass curves. These proposals use up to 7 coordinates to represent a single point. However, fast scalar multiplication algorithms based on windowing techniques, precompute and store several points which require more space than what it takes with 3 coordinates. Also note that some of these proposals require d = 1 for full speed. Unfortunately, elliptic curves having 2-times-a-prime number of points, cannot be written in Jacobi quartic form if d = 1. Even worse the contemporary formulae may fail to output correct coordinates for some inputs. This paper provides improved speeds using fewer coordinates without causing the above mentioned problems. For instance, our proposed point doubling algorithm takes only 2 multiplications, 5 squarings, and no multiplication with curve constants when d is arbitrary and a = ±1/2.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Harmful Algal Blooms (HABs) are a worldwide problem that have been increasing in frequency and extent over the past several decades. HABs severely damage aquatic ecosystems by destroying benthic habitat, reducing invertebrate and fish populations and affecting larger species such as dugong that rely on seagrasses for food. Few statistical models for predicting HAB occurrences have been developed, and in common with most predictive models in ecology, those that have been developed do not fully account for uncertainties in parameters and model structure. This makes management decisions based on these predictions more risky than might be supposed. We used a probit time series model and Bayesian Model Averaging (BMA) to predict occurrences of blooms of Lyngbya majuscula, a toxic cyanophyte, in Deception Bay, Queensland, Australia. We found a suite of useful predictors for HAB occurrence, with Temperature figuring prominently in models with the majority of posterior support, and a model consisting of the single covariate average monthly minimum temperature showed by far the greatest posterior support. A comparison of alternative model averaging strategies was made with one strategy using the full posterior distribution and a simpler approach that utilised the majority of the posterior distribution for predictions but with vastly fewer models. Both BMA approaches showed excellent predictive performance with little difference in their predictive capacity. Applications of BMA are still rare in ecology, particularly in management settings. This study demonstrates the power of BMA as an important management tool that is capable of high predictive performance while fully accounting for both parameter and model uncertainty.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We examine the use of randomness extraction and expansion in key agreement (KA) pro- tocols to generate uniformly random keys in the standard model. Although existing works provide the basic theorems necessary, they lack details or examples of appropriate cryptographic primitives and/or parameter sizes. This has lead to the large amount of min-entropy needed in the (non-uniform) shared secret being overlooked in proposals and efficiency comparisons of KA protocols. We therefore summa- rize existing work in the area and examine the security levels achieved with the use of various extractors and expanders for particular parameter sizes. The tables presented herein show that the shared secret needs a min-entropy of at least 292 bits (and even more with more realistic assumptions) to achieve an overall security level of 80 bits using the extractors and expanders we consider. The tables may be used to �nd the min-entropy required for various security levels and assumptions. We also �nd that when using the short exponent theorems of Gennaro et al., the short exponents may need to be much longer than they suggested.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work aims to take advantage of recent developments in joint factor analysis (JFA) in the context of a phonetically conditioned GMM speaker verification system. Previous work has shown performance advantages through phonetic conditioning, but this has not been shown to date with the JFA framework. Our focus is particularly on strategies for combining the phone-conditioned systems. We show that the classic fusion of the scores is suboptimal when using multiple GMM systems. We investigate several combination strategies in the model space, and demonstrate improvement over score-level combination as well as over a non-phonetic baseline system. This work was conducted during the 2008 CLSP Workshop at Johns Hopkins University.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It has been recognised that brands play a role in industrial markets, but to date a comprehensive model of business-to-business (B2B) branding does not exist, nor has there been an empirical study of the applicability of a full brand equity model in a B2B context. This paper is the first to begin to address these issues. The paper introduces the Customer- Based Brand Equity (CBBE) model by Kevin Keller (1993; 2001; 2003), and empirically tests its applicability in the market of electronic tracking systems for waste management. While Keller claims that the CBBE pyramid can be applied in a B2B context, this research highlights challenges of such an application, and suggests changes to the model are required. Assessing the equity of manufacturers’ brand names is more appropriate than measuring the equity of individual product brands as suggested by Keller. Secondly, the building blocks of Keller’s model appear useful in an organisational context, although differences in the subdimensions are required. Brand feelings appear to lack relevance in the industrial market investigated, and the pinnacle of Keller’s pyramid, resonance, needs serious modifications. Finally, company representatives play a role in building brand equity, indicating a need for this human element to be recognised in a B2B model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – The importance of branding in industrial contexts has increased, yet a comprehensive model of business-to-business (B2B) branding does not exist, nor has there been a thoroughempirical study of the applicability of a full brand equitymodel in a B2B context. This paper aims to discuss the suitability and limitations of Keller’s customer-based brand equity model and tests its applicability in a B2B market. Design/methodology/approach – The study involved the use of semi-structured interviews with senior buyers of technology for electronic tracking of waste management. Findings – Findings suggest that amongst organisational buyers there is a much greater emphasis on the selling organisation, including its corporate brand, credibility and staff, than on individual brands and their associated dimensions. Research limitations/implications – The study investigates real brands with real potential buyers, so there is a risk that the results may represent industry-specific factors that are not representative of all B2B markets. Future research that validates the importance of the Keller elements in other industrial marketing contexts would be beneficial. Practical implications – The findings are relevant for marketing practitioners, researchers and managers as a starting-point for their B2B brand equity research. Originality/value – Detailed insights and key lessons from the field with regard to how B2B brand equity should be conceptualised and measured are offered. A revised brand equity model for B2B application is also presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current study aims to investigate the non-linear relationship between the JD-R model and work engagement. Previous research has identified linear relationships between these constructs; however there are strong theoretical arguments for testing curvilinear relationships (e.g., Warr, 1987). Data were collected via a self-report online survey from officers of one Australian police service (N = 2,626). Results demonstrated a curvilinear relationship between job demands and job resources and engagement. Gender (as a control variable) was also found to be a significant predictor of work engagement. The results indicated that male police officers experienced significantly higher job demands and colleague support than female officers. However, female police officers reported significantly higher levels of work engagement than male officers. This study emphasises the need to test curvilinear relationships, as well as simple linear associations, when measuring psychological health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sexually transmitted chlamydial infection initially establishes in the endocervix in females, but if the infection ascends the genital tract, significant disease, including infertility, can result. Many of the mechanisms associated with chlamydial infection kinetics and disease ascension are unknown. We attempt to elucidate some of these processes by developing a novel mathematical model, using a cellular automata–partial differential equation model. We matched our model outputs to experimental data of chlamydial infection of the guinea-pig cervix and carried out sensitivity analyses to determine the relative influence of model parameters. We found that the rate of recruitment and action of innate immune cells to clear extracellular chlamydial particles and the rate of passive movement of chlamydial particles are the dominant factors in determining the early course of infection, magnitude of the peak chlamydial time course and the time of the peak. The rate of passive movement was found to be the most important factor in determining whether infection would ascend to the upper genital tract. This study highlights the importance of early innate immunity in the control of chlamydial infection and the significance of motility-diffusive properties and the adaptive immune response in the magnitude of infection and in its ascension.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We develop and test a theoretically-based integrative model of organizational innovation adoption. Confirmatory factor analyses using responses from 134 organizations showed that the hypothesized second-order model was a better fit to the data than the traditional model of independent factors. Furthermore, although not all elements were significant, the hypothesized model fit adoption better than the traditional model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This appendix describes the Order Fulfillment process followed by a fictitious company named Genko Oil. The process is freely inspired by the VICS (Voluntary Inter-industry Commerce Solutions) reference model1 and provides a demonstration of YAWL’s capabilities in modelling complex control-flow, data and resourcing requirements.