371 resultados para VRML-Format
Resumo:
The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.
Resumo:
Implementation of an electronic tendering (e-tendering) systems requires careful attention to the needs of the system and its various participants. Fairness in an e-tendering is of utmost importance. Current proposals and implementations do not provide fairness and thus, are vulnerable to collusion and favourism. Dishonest participants, either the principal or tenderer may collude to alter or view competing tenders which would give the favoured tenderer a greater chance of winning the contract. This paper proposes an e-tendering system that is secure and fair to all participants. We employ the techniques of anonymous token system along with signed commitment approach to achieve a publicly verifiable fair e-tendering protocol. We also provide an analysis of the protocol that confirms the security of our proposal against security goals for an e-tendering system.
Resumo:
The M¨obius transform of Boolean functions is often involved in cryptographic design and analysis. As studied previously, a Boolean function f is said to be coincident if it is identical with its M¨obius transform fμ, i.e., f = fμ...
Resumo:
Trivium is a stream cipher candidate of the eStream project. It has successfully moved into phase three of the selection process under the hardware category. No attacks faster than the exhaustive search have so far been reported on Trivium. Bivium-A and Bivium-B are simplified versions of Trivium that are built on the same design principles but with two registers. The simplified design is useful in investigating Trivium type ciphers with a reduced complexity and provides insight into effective attacks which could be extended to Trivium. This paper focuses on an algebraic analysis which uses the boolean satisfiability problem in propositional logic. For reduced variants of the cipher, this analysis recovers the internal state with a minimal amount of keystream observations.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
This paper presents the details of an experimental study of a cold-formed steel hollow flange channel beam known as LiteSteel Beam (LSB) subject to web crippling actions (ETF and ITF). Due to the geometry of the LSB, as well as its unique residual stress characteristics and initial geometric imperfections resultant of manufacturing processes, much of the existing research for common cold-formed steel sections is not directly applicable to LSB. Experimental and numerical studies have been carried out to evaluate the behaviour and design of LSBs subject to pure bending actions, predominant shear actions and combined actions. To date, however, no investigation has been conducted into the web crippling behaviour and strength of LSB sections under ETF and ITF load conditions. Hence experimental studies were conducted to assess the web crippling behaviour and strengths of LSBs. Twenty eight web crippling tests were conducted and the results were compared with the current AS/NZS 4600[1] and AISI S100 [2]design equations. Comparison of the ultimate web crippling capacities from tests showed that AS/NZS 4600[1] and AISI S100 [2] design equations are unconservative for LSB sections under ETF and ITF load cases. Hence new equations were proposed to determine the web crippling capacities of LSBs. Suitable design rules were also developed under the DSM format.
Resumo:
Aims To evaluate if a revamped business management course for 4th year undergraduate pharmacy students had achieved the course aims of not only improving pharmacy students’ perceived understanding of pharmacy business management topics but also increasing their confidence in their business management knowledge and skills. Background Student feedback from previous years had indicated that the cohort had struggled to translate theoretical business management concepts learned in the classroom into practice in the workplace. To address this problem the course has been changed to a ‘flipped classroom’ format with face-to-face time focusing on case-based scenarios and interactive classroom discussion with some role plays. Method Both course assessment throughout the semester and a student survey informed the evaluation process. Results After completing the course, students felt they had increased their knowledge of business management concepts but many indicated that they lacked the confidence to undertake basic management functions. Conclusions Further course restructuring is required with a greater focus on skills development.
Resumo:
The selection of cytochrome P450 enzymes from large variant libraries, and the subsequent use of these enzymes in preparative scale biotransformations, remains a formidable challenge due to the complexities of the associated electron transport systems. Here, a powerful approach for the generation and screening of P450cam libraries for new function is presented that is both flexible and robust. A targeted library was generated wherein only the P450cam active-site amino acids Y96 and F98 were fully randomized and biotransformations, using a novel P450cam whole-cell system, were screened by GC–MS for the hydroxylation of diphenylmethane. One in 50 of the reactions screened, including 16 different variants, produced 4-hydroxydiphenylmethane with up to 92% conversion observed in the case of the Y96A variant. These results demonstrate a primary example of the screening of P450cam libraries in a format that is compatible with extension to preparative scale reactions.
Resumo:
Objectives To review the effects of physical activity on health and behavior outcomes and develop evidence-based recommendations for physical activity in youth. Study design A systematic literature review identified 850 articles; additional papers were identified by the expert panelists. Articles in the identified outcome areas were reviewed, evaluated and summarized by an expert panelist. The strength of the evidence, conclusions, key issues, and gaps in the evidence were abstracted in a standardized format and presented and discussed by panelists and organizational representatives. Results Most intervention studies used supervised programs of moderate to vigorous physical activity of 30 to 45 minutes duration 3 to 5 days per week. The panel believed that a greater amount of physical activity would be necessary to achieve similar beneficial effects on health and behavioral outcomes in ordinary daily circumstances (typically intermittent and unsupervised activity). Conclusion School-age youth should participate daily in 60 minutes or more of moderate to vigorous physical activity that is developmentally appropriate, enjoyable, and involves a variety of activities.
Resumo:
Background Parents play a significant role in shaping youth physical activity (PA). However, interventions targeting PA parenting have been ineffective. Methodological inconsistencies related to the measurement of parental influences may be a contributing factor. The purpose of this article is to review the extant peer-reviewed literature related to the measurement of general and specific parental influences on youth PA. Methods A systematic review of studies measuring constructs of PA parenting was conducted. Computerized searches were completed using PubMed, MEDLINE, Academic Search Premier, SPORTDiscus, and PsycINFO. Reference lists of the identified articles were manually reviewed as well as the authors' personal collections. Articles were selected on the basis of strict inclusion criteria and details regarding the measurement protocols were extracted. A total of 117 articles met the inclusionary criteria. Methodological articles that evaluated the validity and reliability of PA parenting measures (n=10) were reviewed separately from parental influence articles (n=107). Results A significant percentage of studies used measures with indeterminate validity and reliability. A significant percentage of articles did not provide sample items, describe the response format, or report the possible range of scores. No studies were located that evaluated sensitivity to change. Conclusion The reporting of measurement properties and the use of valid and reliable measurement scales need to be improved considerably.
Resumo:
There is considerable interest internationally in developing product libraries to support the use of BIM. Product library initiatives are driven by national bodies, manufacturers and private companies who see their potential. A major issue with the production and distribution of product information for BIM is that separate library objects need to be produced for all of the different software systems that are going to use the library. This increases the cost of populating product libraries and also increases the difficulty in maintaining consistency between the representations for the different software over time. This paper describes a project which uses “software transformation” technology from the field of software engineering to support the definition of a single generic representation of a product which can then be automatically converted to the format required by receiving software. The paper covers the current state of implementation of the product library, the technology underlying the transformations for the currently supported software and the business model for creating a national library in Australia. This is placed within the context of other current product library systems to highlight the differences. The responsibilities of the various actors involved in supporting the product library are also discussed.
Resumo:
This series of research vignettes is aimed at sharing current and interesting research findings from our team of international Entrepreneurship researchers. This vignette, written by Professor Per Davidsson, summarises some important, stylized facts about small and medium enterprises (SMEs), growth, and job creation. It was specially prepared for “The G20 Agenda for Growth: Opportunities for SMEs Conference” in Melbourne, June 20, 2014. For this reason its format deviates slightly from other vignettes in the series.
Resumo:
The branded pause advertisement is a recently developed online television-advertising format that displays a full-screen still-image banner ad whenever a viewer pauses a streaming-video program. This study used a controlled lab experiment to compare the effectiveness of branded pause advertisements with normal online television advertisements. The results demonstrate that branded pause advertisements are effective but only when combined with a long-exposure advertisement for the same brand. Despite their short exposure time, pause advertisements function as effective reminders, building awareness through repeat exposure. The findings of the current study were similar regardless of whether pause advertisements were activated as a result of viewers’ pausing at a time of their own choosing or whether viewers were interrupted.
Resumo:
The Bay Area’s Center for Tactical Magic has been performing ‘‘magical’’ art interventions since 2000. The Center’s work augments traditional activist techniques by offering new conceptions of what art and activism can entail in a contemporary urban context. This article explores how Jacques Rancie`re’s reconfigured relationship between art and politics can be applied to the Center’s work, providing new distributions of the sensible for participants.
Resumo:
The political and bureaucratic discourse surrounding non-profit sector reform is centred on streamlining the regulatory framework. Phrases such as 'one-stop shop','reducing red tape' and 'duplicative, burdensome and unclear requirements' fill press releases, government reports and discussion papers. In this chapter, I examine quantitative measures of the current regulatory compliance burden facing non-profit organisations in Australia as a benchmark for measuring progress over the coming years. I focus on regulatory compliance estimates for four key stages of non-profit enterprise activity non-profit enterprise start-up and registrations; fundraising;grant paperwork; and regulation proportionate to the size of the non-profit enterprise.