117 resultados para Incremental protocol in treadmill


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter will introduce Australia’s Dennis family – a case of ‘incremental entrepreneurship’ in the business transition from the first to the second generation. Following the second generation’s formal involvement and ownership in the business, Dennis Family Corporation (DFC) undertook a major professionalization process to formalize the family business and ensure its continued success. The members of the second generation have successfully sustained the entrepreneurial spirit of their family business (albeit in a different style), adding value to the firm in an ‘incremental’ manner. Throughout the chapter there will be a strong emphasis on the family element of DFC and the roles that each family member has played. Bert Dennis, as the founder and incumbent leader of the firm, has witnessed major changes to the business he built from the ground up. His children, in particular his son Grant Dennis as the primary next generation issue champion, have seen the changes from another perspective – ensuring the business remains within the family into the second generation and beyond. The professionalization process was sparked by a commitment from the second generation to continue to ‘make a real go’ of the family business rather than simply liquidating and distributing the assets. The dedication of all the family members to this objective has ensured the success of this process, and ultimately, the longevity of the firm. Although DFC has become more ‘professional’, it has not lost its entrepreneurial character; rather, it has improved the ways in which entrepreneurialism is fostered and pursued in the company. In essence, this case outlines how the implementation of appropriate governance and management practices has allowed the Dennis family to overcome the challenges and maximize the opportunities associated with owning and operating a multigenerational family fi rm. From a theoretical perspective, this case uses the concepts of entrepreneurial orientation (EO) (Lumpkin and Dess 1996) and the resource- based view (RBV) (Habbershon and Williams 1999; Barney 1991; Wernerfelt 1984) to demonstrate how the fi rm has leveraged its familiness to foster an enduring spirit of entrepreneurship and to maintain a sustained competitive advantage.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose: To assess the effects of pre-cooling volume on neuromuscular function and performance in free-paced intermittent-sprint exercise in the heat. Methods: Ten male, teamsport athletes completed four randomized trials involving an 85-min free-paced intermittentsprint exercise protocol in 33°C±33% relative humidity. Pre-cooling sessions included whole body (WB), head+hand (HH), head (H) and no cooling (CONT), applied for 20-min pre-exercise and 5-min mid exercise. Maximal voluntary contractions (MVC) were assessed pre- and postintervention and mid- and post-exercise. Exercise performance was assessed with sprint times, % decline and distances covered during free-paced bouts. Measures of core(Tc) and skin (Tsk) temperatures, heart rate, perceptual exertion and thermal stress were monitored throughout. Venous and capillary blood was analyzed for metabolite, muscle damage and inflammatory markers. Results: WB pre-cooling facilitated the maintenance of sprint times during the exercise protocol with reduced % decline (P=0.04). Mean and total hard running distances increased with pre cooling 12% compared to CONT (P<0.05), specifically, WB was 6-7% greater than HH (P=0.02) and H (P=0.001) respectively. No change was evident in mean voluntary or evoked force pre- to post-exercise with WB and HH cooling (P>0.05). WB and HH cooling reduced Tc by 0.1-0.3°C compared to other conditions (P<0.05). WB Tsk was suppressed for the entire session(P=0.001). HR responses following WB cooling were reduced(P=0.05; d=1.07) compared to CONT conditions during exercise. Conclusion: A relationship between pre-cooling volume and exercise performance seems apparent, as larger surface area coverage augmented subsequent free-paced exercise capacity, in conjunction with greater suppression of physiological load. Maintenance of MVC with pre-cooling, despite increased work output suggests the role of centrally-mediated mechanisms in exercise pacing regulation and subsequent performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we review the sequential slotted amplify-decode-and-forward (SADF) protocol with half-duplex single-antenna and evaluate its performance in terms of pairwise error probability (PEP). We obtain the PEP upper bound of the protocol and find out that the achievable diversity order of the protocol is two with arbitrary number of relay terminals. To achieve the maximum achievable diversity order, we propose a simple precoder that is easy to implement with any number of relay terminals and transmission slots. Simulation results show that the proposed precoder achieves the maximum achievable diversity order and has similar BER performance compared to some of the existing precoders.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper is part of a larger project described at http://www.law.uq.edu.au/australian-feminist-judgments-project as follows: This project draws its inspiration from two significant recent developments in law and feminist scholarship. The first has been the emergence in Canada and the UK of feminist judgment-writing projects, in which feminist academics, lawyers and activists have written alternative judgments in a series of legal cases, imagining the different decision that might have been made by a feminist judge hearing the case. The second has been the incremental shift in recent years in the number of women judges and Magistrates presiding in courts and tribunals throughout Australia. As part of this project, a group of scholars will write alternative feminist judgments. This paper is one of the alternative feminist judgements. The case used for this discussion is Lodge v Federal Commissioner of Tax [1972] HCA 49. In that case, a woman, earning income by way of commission in her occupation as a law costs clerk, which she carried out at her home, claimed to deduct from her assessable income child care fees that enabled her to devote time and attention to her work. The High Court held that no right to a deduction had arisen. It found that, although the purpose of the expenditure was for gaining assessable income, it did not take place in, or in the course of, preparing bills of cost. Further, the expenditure was of a ‘private or domestic’ nature. This seminal taxation decision, which prevents deductions for childcare, has broad financial ramifications for workers in the home and those with childcare responsibilities. It designates childcare duties as ‘private’, notwithstanding the need for these in order, particularly for women, to work in the public sphere.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective To determine the burden of hospitalised, radiologically confirmed pneumonia (World Health Organization protocol) in Northern Territory Indigenous children. Design, setting and participants Historical, observational study of all hospital admissions for any diagnosis of NT resident Indigenous children, aged between >= 29 days and < 5 years, 1 April 1997 to 31 March 2005. Intervention All chest radiographs taken during these admissions, regardless of diagnosis, were assessed for pneumonia in accordance with the WHO protocol. Main outcome measure The primary outcome was endpoint consolidation (dense fluffy consolidation [alveolar infiltrate] of a portion of a lobe or the entire lung) present on a chest radiograph within 3 days of hospitalisation. Results We analysed data on 24 115 hospitalised episodes of care for 9492 children and 13 683 chest radiographs. The average annual cumulative incidence of endpoint consolidation was 26.6 per 1000 population per year (95% Cl, 25.3-27.9); 57.5 per 1000 per year in infants aged 1-11 months, 38.3 per 1000 per year in those aged 12-23 months, and 13.3 per 1000 per year in those aged 24-59 months. In all age groups, rates of endpoint consolidation in children in the arid southern region of NT were about twice that of children in the tropical northern region. Conclusion The rates of severe pneumonia in hospitalised NT Indigenous children are among the highest reported in the world. Reducing this unacceptable burden of disease should be a national health priority.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Implementation of an electronic tendering (e-tendering) systems requires careful attention to the needs of the system and its various participants. Fairness in an e-tendering is of utmost importance. Current proposals and implementations do not provide fairness and thus, are vulnerable to collusion and favourism. Dishonest participants, either the principal or tenderer may collude to alter or view competing tenders which would give the favoured tenderer a greater chance of winning the contract. This paper proposes an e-tendering system that is secure and fair to all participants. We employ the techniques of anonymous token system along with signed commitment approach to achieve a publicly verifiable fair e-tendering protocol. We also provide an analysis of the protocol that confirms the security of our proposal against security goals for an e-tendering system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose The purpose of this study was to evaluate the validity of the CSA activity monitor as a measure of children's physical activity using energy expenditure (EE) as a criterion measure. Methods Thirty subjects aged 10 to 14 performed three 5-min treadmill bouts at 3, 4, and 6 mph, respectively. While on the treadmill, subjects wore CSA (WAM 7164) activity monitors on the right and left hips. (V) over dot O-2 was monitored continuously by an automated system. EE was determined by multiplying the average (V) over dot O-2 by the caloric equivalent of the mean respiratory exchange ratio. Results Repeated measures ANOVA indicated that both CSA monitors were sensitive to changes in treadmill speed. Mean activity counts from each CSA unit were not significantly different and the intraclass reliability coefficient for the two CSA units across all speeds was 0.87. Activity counts from both CSA units were strongly correlated with EE (r = 0.86 and 0.87, P < 0.001). An EE prediction equation was developed from 20 randomly selected subjects and cross-validated on the remaining 10. The equation predicted mean EE within 0.01 kcal.min(-1). The correlation between actual and predicted values was 0.93 (P < 0.01) and the SEE was 0.93 kcal.min(-1). Conclusion These data indicate that the CSA monitor is a valid and reliable tool for quantifying treadmill walking and running in children.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background As financial constraints can be a barrier to accessing HIV antiretroviral therapy (ART), we argue for the removal of copayment requirements from HIV medications in South Australia. Methods Using a simple mathematical model informed by available behavioural and biological data and reflecting the HIV epidemiology in South Australia, we calculated the expected number of new HIV transmissions caused by persons who are not currently on ART compared with transmissions for people on ART. The extra financial investment required to cover the copayments to prevent an HIV infection was compared with the treatment costs saved due to averting HIV infections. Results It was estimated that one HIV infection is prevented per year for every 31.4 persons (median, 24.0–42.7 interquartile range (IQR)) who receive treatment. By considering the incremental change in costs and outcomes of a change in program from the current status quo, it would cost the health sector $17 860 per infection averted (median, $13 651–24 287 IQR) if ART is provided as a three-dose, three-drug combination without requirements for user-pay copayments. Conclusions The costs of removing copayment fees for ART are less than the costs of treating extra HIV infections that would result under current conditions. Removing the copayment requirement for HIV medication would be cost-effective from a governmental perspective.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified their protocol’s security by data reduction method with the learning parity with noise (LPN) and also formally verified the functionality of the proposed scheme by Colored Petri Nets. In this paper, we investigate RIPTA-DA’s security. We present an efficient secret disclosure attack against the protocol which can be used to mount both de-synchronization and traceability attacks against the protocol. Thus our attacks show that RIPTA-DA protocol is not a RIPTA-DA.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The world has experienced a large increase in the amount of available data. Therefore, it requires better and more specialized tools for data storage and retrieval and information privacy. Recently Electronic Health Record (EHR) Systems have emerged to fulfill this need in health systems. They play an important role in medicine by granting access to information that can be used in medical diagnosis. Traditional systems have a focus on the storage and retrieval of this information, usually leaving issues related to privacy in the background. Doctors and patients may have different objectives when using an EHR system: patients try to restrict sensible information in their medical records to avoid misuse information while doctors want to see as much information as possible to ensure a correct diagnosis. One solution to this dilemma is the Accountable e-Health model, an access protocol model based in the Information Accountability Protocol. In this model patients are warned when doctors access their restricted data. They also enable a non-restrictive access for authenticated doctors. In this work we use FluxMED, an EHR system, and augment it with aspects of the Information Accountability Protocol to address these issues. The Implementation of the Information Accountability Framework (IAF) in FluxMED provides ways for both patients and physicians to have their privacy and access needs achieved. Issues related to storage and data security are secured by FluxMED, which contains mechanisms to ensure security and data integrity. The effort required to develop a platform for the management of medical information is mitigated by the FluxMED's workflow-based architecture: the system is flexible enough to allow the type and amount of information being altered without the need to change in your source code.