341 resultados para Nil Ideal
Resumo:
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes, all ideal threshold schemes can be examined by new points of view and new results on ideal threshold schemes can be discovered.
Resumo:
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restriction of regular mappings to permutations gives a convenient tool for investigation of the relation between permutations and ideal secret sharing generated by them.
Resumo:
We observe that MDS codes have interesting properties that can be used to construct ideal threshold schemes. These schemes permit the combiner to detect cheating, identify cheaters and recover the correct secret. The construction is later generalised so the resulting secret sharing is resistant against the Tompa-Woll cheating.
Resumo:
The work investigates the design of ideal threshold secret sharing in the context of cheating prevention. We showed that each orthogonal array is exactly a defining matrix of an ideal threshold scheme. To prevent cheating, defining matrices should be nonlinear so both the cheaters and honest participants have the same chance of guessing of the valid secret. The last part of the work shows how to construct nonlinear secret sharing based on orthogonal arrays.
Resumo:
We present a novel implementation of the threshold RSA. Our solution is conceptually simple, and leads to an easy design of the system. The signing key is shared in additive form, which is desirable for collaboratively performing cryptographic transformations, and its size, at all times, is logn, where n is the RSA modulus. That is, the system is ideal.
Resumo:
Sortase A is a membrane enzyme responsible for the anchoring of surface-exposed proteins to the cell wall envelope of Gram-positive bacteria. As a well-studied member of the sortase subfamily catalysing the cell wall anchoring of important virulence factors to the surface of staphylococci, enterococci and streptococci, sortase A plays a critical role in Gram-positive bacterial pathogenesis. It is thus considered a promising target for the development of new anti-infective drugs that aim to interfere with important Gram-positive virulence mechanisms, such as adhesion to host tissues, evasion of host defences, and biofilm formation. The additional properties of sortase A as an enzyme that is not required for Gram-positive bacterial growth or viability and is conveniently located on the cell membrane making it more accessible to inhibitor targeting, constitute additional reasons reinforcing the view that sortase A is an ideal target for anti-virulence drug development. Many inhibitors of sortase A have been identified to date using high-throughput or in silico screening of compound libraries (synthetic or natural), and while many have proved useful tools for probing the action model of the enzyme, several are also promising candidates for the development into potent inhibitors. This review is focused on the most promising sortase A inhibitor compounds that are currently in development as leads towards a new class of anti-infective drugs that are urgently needed to help combat the alarming increase in antimicrobial resistance.
Resumo:
Density functional theory (DFT) calculations were performed to study the structural, mechanical, electrical, optical properties, and strain effects in single-layer sodium phosphidostannate(II) (NaSnP). We find the exfoliation of single-layer NaSnP from bulk form is highly feasible because the cleavage energy is comparable to graphite and MoS2. In addition, the breaking strain of the NaSnP monolayer is comparable to other widely studied 2D materials, indicating excellent mechanical flexibility of 2D NaSnP. Using the hybrid functional method, the calculated band gap of single-layer NaSnP is close to the ideal band gap of solar cell materials (1.5 eV), demonstrating great potential in future photovoltaic application. Furthermore, strain effect study shows that a moderate compression (2%) can trigger indirect-to-direct gap transition, which would enhance the ability of light absorption for the NaSnP monolayer. With sufficient compression (8%), the single-layer NaSnP can be tuned from semiconductor to metal, suggesting great applications in nanoelectronic devices based on strain engineering techniques.
Resumo:
This study investigated the development and operation of Learner Driver Mentor Programs (LDMPs). LDMPs are used throughout Australia to assist young learner drivers to gain supervised on-road driving experience through coordinated access to vehicles and supervisors. There is a significant lack of research regarding these programs. In this study, 41 stakeholders including representatives from existing or ceased LDMPs as well as representatives of other groups completed a questionnaire in either survey or interview format. The questionnaire sought information about the objectives of LDMPs, any social problems that were targeted as well as the characteristics of an ideal program and what could be done to improve them. Stakeholders indicated that LDMPs were targeted at local communities and, therefore, there should be a clear local need for the program as well as community ownership and involvement in the program. Additionally, the program needed to be accessible and provide clear positive outcomes for mentees. The most common suggestion to improve LDMPs related to the provision of greater funding and sponsorship, particularly in relation to the vehicles used within the programs. LDMPs appear to have an important role in facilitating young learner drivers to acquire the appropriate number of supervised hours of driving practice. However, while a number of factors appear related to a successful program, the program must remain flexible and suitable for its local community. There is a clear need to complete evaluations of existing programs to ensure that future LDMPs and modifications to existing programs are evidence-based.
Resumo:
This paper seeks to review the operation of Australian corporate law rescue regimes in the context of those originally contemplated by Sir Kenneth Cork and more latterly in Australia, primarily in the hands of Ron Harmer. In doing so, it draws upon some of the observations made by Professor Fletcher in the second wave of 20th century corporate rescue reform in the United Kingdom.
Resumo:
Human trafficking as a global phenomenon continues to elude accurate quantitative measure, and remains a controversial policy domain significantly influenced by anecdotal evidence. Drawing on the policy analysis framework of Bacchi (1999; 2007) the problem representation of trafficking through narratives can be considered a direct antecedent of contemporary anti-human trafficking policy. This article explores the construction of human trafficking within the Trafficking in Persons Reports, published annually by the United States of America’s Department of State. An examination of the victim and offender narratives contained within the reports published between 2001 and 2012 demonstrates that human trafficking is predominantly represented as a crime committed by ideal offenders against idealized victims, consistent with Christie’s (1986) landmark criteria of ideal victimization. This representation of an ideal prototype has the potential to inform policy that diverts focus from the causative role of global socioeconomic injustice towards criminal justice policies targeting individual offenders.
Resumo:
Communications are important for relationships within a marketing channel from both a theoretical and managerial perspective. Yet it is a problematic area for scholars. Thus, this research addresses the problem of how do customers of a financial services institution perceive communications with an ideal institution? This study's case research methodology used in-depth interviews with 34 carefully selected customers of a building society. The factors that make up customers' attitudes about corporate communications for an ideal financial services institution were identified and actual perceptions were compared against that ideal. The findings confirmed the importance of communications for customers in a relationship with a financial services provider and suggested communication priorities for customers in this context. In addition, the findings suggested sources of communication dissatisfaction for customers. These findings build upon the literature that speculates about customer perceptions of communications with organizations but provides little evidence to support hypotheses. The contributions arose from the emphasis on the customers' own attitudes and the patterns found within them.
Resumo:
Research on the impact of Information Systems (IS) reported in both academic literature and popular press has reported confounding results. Some studies have reported encouraging results of IS, while others have reported nil or detrimental results. The contradictory results of these research studies can be partially attributed to the weaknesses in survey instruments. In an attempt to increase the validity of conclusions of IS assessment studies, survey instrument design should follow a rigorous and scientific procedure. This paper illustrates key validity and reliability issues in measuring Information Systems performance, using examples from a study designed to assess Enterprise Resource Planning systems success. The article emphasizes on the importance of the survey method and the theoretical considerations of item derivation, scale development and item evaluation. Examples are provided from the ERP assessment study to supplement the readers understanding of the theoretical concepts of survey design.
Resumo:
Organisations invest enormous sums of money in acquiring Enterprise Resource Planning (ERP) systems, presumably expecting positive impacts to the organisation and its functions. Despite the optimistic motives some ERP projects have reported nil or detrimental impacts. This paper studies the proposition that the size of an organisation (e.g. small, large) may have contributed to the differences in receiving benefits reported in prior studies in this domain. The alleged differences in organisational performance are empirically measured using a prior validated model, using five constructs and fortytwo sub-constructs. Information is gathered from three hundred and ten respondents representing twenty-seven public sector organisations. Results suggests that (1) larger organisations have received more benefits compared to small organisations, (2) small organisations demonstrated higher reliance on their ERP systems, (3) employment cohorts demonstrate significant differences in perceived benefits in small and large organisations.
Resumo:
Participatory evaluation and participatory action research (PAR) are increasingly used in community-based programs and initiatives and there is a growing acknowledgement of their value. These methodologies focus more on knowledge generated and constructed through lived experience than through social science (Vanderplaat 1995). The scientific ideal of objectivity is usually rejected in favour of a holistic approach that acknowledges and takes into account the diverse perspectives, values and interpretations of participants and evaluation professionals. However, evaluation rigour need not be lost in this approach. Increasing the rigour and trustworthiness of participatory evaluations and PAR increases the likelihood that results are seen as credible and are used to continually improve programs and policies.----- Drawing on learnings and critical reflections about the use of feminist and participatory forms of evaluation and PAR over a 10-year period, significant sources of rigour identified include:----- • participation and communication methods that develop relations of mutual trust and open communication----- • using multiple theories and methodologies, multiple sources of data, and multiple methods of data collection----- • ongoing meta-evaluation and critical reflection----- • critically assessing the intended and unintended impacts of evaluations, using relevant theoretical models----- • using rigorous data analysis and reporting processes----- • participant reviews of evaluation case studies, impact assessments and reports.
Resumo:
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.