187 resultados para Keys to Database Searching
Resumo:
Preparing social work students to be effective practitioners is a complex and challenging task undertaken in a dynamic environment both in terms of the field of social work and the higher education sector. There have been recommendations that self knowledge, empirical knowledge, theoretical knowledge and procedural knowledge are the keys to high standards of social work practice. This paper suggests that the concept of practice wisdom is a useful focus for integrating these different aspects of informed practice and for focusing educational programmes for social work. As practice wisdom is more about process than possessed characteristics then there are important motivational and value-based considerations in developing wise practitioners. This discussion considers motivational and personal narrative aspects of practice wisdom so that it can be integrated into social work teaching.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
Recreating an environment that supports and promotes fundamental homeostatic mechanisms is a significant challenge in tissue engineering. Optimizing cell survival, proliferation, differentiation, apoptosis and angiogenesis, and providing suitable stromal support and signalling cues are keys to successfully generating clinically useful tissues. Interestingly, those components are often subverted in the cancer setting, where aberrant angiogenesis, cellular proliferation, cell signalling and resistance to apoptosis drive malignant growth. In contrast to tissue engineering, identifying and inhibiting those pathways is a major challenge in cancer research. The recent discovery of adult tissue-specific stem cells has had a major impact on both tissue engineering and cancer research. The unique properties of these cells and their role in tissue and organ repair and regeneration hold great potential for engineering tissue-specific constructs. The emerging body of evidence implicating stem cells and progenitor cells as the source of oncogenic transformation prompts caution when using these cells for tissue-engineering purposes. While tissue engineering and cancer research may be considered as opposed fields of research with regard to their proclaimed goals, the compelling overlap in fundamental pathways underlying these processes suggests that cross-disciplinary research will benefit both fields. In this review article, tissue engineering and cancer research are brought together and explored with regard to discoveries that may be of mutual benefit.
Resumo:
Two Archaean komatiitic flows, Fred’s Flow in Canada and the Murphy Well Flow in Australia, have similar thicknesses (120 and 160 m) but very different compositions and internal structures. Their contrasting differentiation profiles are keys to determine the cooling and crystallization mechanisms that operated during the eruption of Archaean ultramafic lavas. Fred’s Flow is the type example of a thick komatiitic basalt flow. It is strongly differentiated and consists of a succession of layers with contrasting textures and compositions. The layering is readily explained by the accumulation of olivine and pyroxene in a lower cumulate layer and by evolution of the liquid composition during downward growth of spinifex-textured rocks within the upper crust. The magmas that erupted to form Fred’s Flow had variable compositions, ranging from 12 to 20 wt% MgO, and phenocryst contents from 0 to 20 vol%. The flow was emplaced by two pulses. A first ~20-m-thick pulse was followed by another more voluminous but less magnesian pulse that inflated the flow to its present 120 m thickness. Following the second pulse, the flow crystallized in a closed system and differentiated into cumulates containing 30–38 wt% MgO and a residual gabbroic layer with only 6 wt% MgO. The Murphy Well Flow, in contrast, has a remarkably uniform composition throughout. It comprises a 20-m-thick upper layer of fine-grained dendritic olivine and 2–5 vol% amygdales, a 110–120 m intermediate layer of olivine porphyry and a 20–30 m basal layer of olivine orthocumulate. Throughout the flow, MgO contents vary little, from only 30 to 33 wt%, except for the slightly more magnesian basal layer (38–40 wt%). The uniform composition of the flow and dendritic olivine habits in the upper 20 m point to rapid cooling of a highly magnesian liquid with a composition like that of the bulk of the flow. Under equilibrium conditions, this liquid should have crystallized olivine with the composition Fo94.9, but the most magnesian composition measured by electron microprobe in samples from the flow is Fo92.9. To explain these features, we propose that the parental liquid contained around 32 wt% MgO and 3 wt% H2O. This liquid degassed during the eruption, creating a supercooled liquid that solidified quickly and crystallized olivine with non-equilibrium textures and compositions.
Resumo:
It is well established that the traditional taxonomy and nomenclature of Chironomidae relies on adult males whose usually characteristic genitalia provide evidence of species distinction. In the early days some names were based on female adults of variable distinctiveness – but females are difficult to identify (Ekrem et al. 2010) and many of these names remain dubious. In Russia especially, a system based on larval morphology grew in parallel to the conventional adult-based system. The systems became reconciled with the studies that underlay the production of the Holarctic generic keys to Chironomidae, commencing notably with the larval volume (Wiederholm, 1983). Ever since Thienemann’s pioneering studies, it has been evident that the pupa, notably the cast skins (exuviae) provide a wealth of features that can aid in identification (e.g. Wiederholm, 1986). Furthermore, the pupae can be readily associated with name-bearing adults when a pharate (‘cloaked’) adult stage is visible within the pupa. Association of larvae with the name-bearing later stages has been much more difficult, time-consuming and fraught with risk of failure. Yet it is identification of the larval stage that is needed by most applied researchers due to the value of the immature stages of the family in aquatic monitoring for water quality, although the pupal stage also has advocates (reviewed by Sinclair & Gresens, 2008). Few use the adult stage for such purposes as their provenance and association with the water body can be verified only by emergence trapping, and sampling of adults lies outside regular aquatic monitoring protocols.
Resumo:
Objective: To provide an overview of the incidence and mortality of female breast cancer for countries in the Asia-Pacific region. Methods: Statistical information about breast cancer was obtained from publicly available cancer registry and mortality databases (such as GLOBOCAN), and supplemented with data requested from individual cancer registries. Rates were directly age-standardised to the Segi World Standard population and trends were analysed using joinpoint models. Results: Breast cancer was the most common type of cancer among females in the region, accounting for 18% of all cases in 2012, and was the fourth most common cause of cancer-related deaths (9%). Although incidence rates remain much higher in New Zealand and Australia, rapid rises in recent years were observed in several Asian countries. Large increases in breast cancer mortality rates also occurred in many areas, particularly Malaysia and Thailand, in contrast to stabilising trends in Hong Kong and Singapore, while decreases have been recorded in Australia and New Zealand. Mortality trends tended to be more favourable for women aged under 50 compared to those who were 50 years or older. Conclusion: It is anticipated that incidence rates of breast cancer in developing countries throughout the Asia-Pacific region will continue to increase. Early detection and access to optimal treatment are the keys to reducing breast cancer-related mortality, but cultural and economic obstacles persist. Consequently, the challenge is to customise breast cancer control initiatives to the particular needs of each country to ensure the best possible outcomes.
Resumo:
Secure communication channels are typically constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties and establishes shared secret keys, and a secure data transmission layer, which uses the secret keys to encrypt data. We address the partial leakage of communicating parties' long-term secret keys due to various side-channel attacks, and the partial leakage of plaintext due to data compression. Both issues can negatively affect the security of channel establishment and data transmission. In this work, we advance the modelling of security for AKE protocols by considering more granular partial leakage of parties' long-term secrets. We present generic and concrete constructions of two-pass leakage-resilient key exchange protocols that are secure in the proposed security models. We also examine two techniques--heuristic separation of secrets and fixed-dictionary compression--for enabling compression while protecting high-value secrets.
Resumo:
Free association norms indicate that words are organized into semantic/associative neighborhoods within a larger network of words and links that bind the net together. We present evidence indicating that memory for a recent word event can depend on implicitly and simultaneously activating related words in its neighborhood. Processing a word during encoding primes its network representation as a function of the density of the links in its neighborhood. Such priming increases recall and recognition and can have long lasting effects when the word is processed in working memory. Evidence for this phenomenon is reviewed in extralist cuing, primed free association, intralist cuing, and single-item recognition tasks. The findings also show that when a related word is presented to cue the recall of a studied word, the cue activates it in an array of related words that distract and reduce the probability of its selection. The activation of the semantic network produces priming benefits during encoding and search costs during retrieval. In extralist cuing recall is a negative function of cue-to-distracter strength and a positive function of neighborhood density, cue-to-target strength, and target-to cue strength. We show how four measures derived from the network can be combined and used to predict memory performance. These measures play different roles in different tasks indicating that the contribution of the semantic network varies with the context provided by the task. We evaluate spreading activation and quantum-like entanglement explanations for the priming effect produced by neighborhood density.
Resumo:
A key issue in the field of inclusive design is the ability to provide designers with an understanding of people's range of capabilities. Since it is not feasible to assess product interactions with a large sample, this paper assesses a range of proxy measures of design-relevant capabilities. It describes a study that was conducted to identify which measures provide the best prediction of people's abilities to use a range of products. A detailed investigation with 100 respondents aged 50-80 years was undertaken to examine how they manage typical household products. Predictor variables included self-report and performance measures across a variety of capabilities (vision, hearing, dexterity and cognitive function), component activities used in product interactions (e.g. using a remote control, touch screen) and psychological characteristics (e.g. self-efficacy, confidence with using electronic devices). Results showed, as expected, a higher prevalence of visual, hearing, dexterity, cognitive and product interaction difficulties in the 65-80 age group. Regression analyses showed that, in addition to age, performance measures of vision (acuity, contrast sensitivity) and hearing (hearing threshold) and self-report and performance measures of component activities are strong predictors of successful product interactions. These findings will guide the choice of measures to be used in a subsequent national survey of design-relevant capabilities, which will lead to the creation of a capability database. This will be converted into a tool for designers to understand the implications of their design decisions, so that they can design products in a more inclusive way.
Resumo:
Database security techniques are available widely. Among those techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and an approach for searching and retrieval efficiencies that are implemented. In this paper we analyze the database queries and the data properties and propose a suitable mechanism to query the encrypted database. We proposed and analyzed the new database encryption algorithm using the Bloom Filter with the bucket index method. Finally, we demonstrated the superiority of the proposed algorithm through several experiments that should be useful for database encryption related research and application activities.
Resumo:
The Queensland University of Technology (QUT) Library bas recently commenced teaching higher degree students to search online systems such as BRS, ORBIT and STN. The emphasis is on education rather than training. with students being required to familiarise themselves with system commands and database structures whilst receiving necessarily limited tutorial help. The teaching strategies used and problems encountered in the program are outlined. Student responses to the experience of learning to online search are discussed.
Resumo:
Motivation: Gene silencing, also called RNA interference, requires reliable assessment of silencer impacts. A critical task is to find matches between silencer oligomers and sites in the genome, in accordance with one-to-many matching rules (G-U matching, with provision for mismatches). Fast search algorithms are required to support silencer impact assessments in procedures for designing effective silencer sequences.Results: The article presents a matching algorithm and data structures specialized for matching searches, including a kernel procedure that addresses a Boolean version of the database task called the skyline search. Besides exact matches, the algorithm is extended to allow for the location-specific mismatches applicable in plants. Computational tests show that the algorithm is significantly faster than suffix-tree alternatives. © The Author 2010. Published by Oxford University Press. All rights reserved.