366 resultados para Boyd, Mike
Resumo:
Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were introduced. They achieve optimal communication complexity and better online processing complexity. Unfortunately, all secure coprocessor-based PIR protocols require heavy periodical preprocessing. In this paper, we propose a new protocol, which is free from the periodical preprocessing while offering the optimal communication complexity and almost optimal online processing complexity. The proposed protocol is proven to be secure.
Resumo:
Insulated rail joints (IRJs) are an integral part of the rail track signaling system and pose significant maintenance and replacement costs due to their low and fluctuating service lives. Failure occurs mainly in rail head region, bolt- holes of fishplates and web-holes of the rails. Propagation of cracks is influenced by the evolution of internal residual stresses in rails during rail manufacturing (hot-rolling, roller-straightening, and head-hardening process), and during service, particularly in heavy rail haul freight systems where loads are high. In this investigation, rail head accumulated residual stresses were analysed using neutron diffraction at the Australian Nuclear Science and Technology Organisation (ANSTO). Two ex-service two head-hardened rail joints damaged under different loading were examined and results were compared with those obtained from an unused rail joint reference sample in order to differentiate the stresses developed during rail manufacturing and stresses accumulated during rail service. Neutron diffraction analyses were carried out on the samples in longitudinal, transverse and vertical directions, and on 5mm thick sliceed samples cut by Electric Discharge Machining (EDM). For the rail joints from the service line, irrespective of loading conditions and in-service times, results revealed similar depth profiles of stress distribution. Evolution of residual stress fields in rails due to service was also accompanied by evidence of larger material flow based on reflected light and scanning electron microscopy studies. Stress evolution in the vicinity of rail ends was characterised by a compressive layer, approximately 5 mm deep, and a tension zone located approximately 5- 15mm below the surfaces. A significant variation of d0 with depth near the top surface was detected and was attributed to decarburization in the top layer induced by cold work. Stress distributions observed in longitudinal slices of the two different deformed rail samples were found to be similar. For the undeformed rail, the stress distributions obtained could be attributed to variations associated with thermo-mechanical history of the rail.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.
Resumo:
Two newspaper numbers games based on simple arithmetic relationships are discussed. One is rather trivial, but very useful as an introduction to the second, whose potential to give students of elementary algebra practice in semi ad-hoc reasoning and to build general arithmetic reasoning skills was explored theoretically in an earlier paper. Preliminary results on the effectiveness of this general approach are presented, with student performance and feedback on an assignment task and formal examination included, and recommendations for future work.
Resumo:
It has been predicted that sea level will rise about 0.8 m by 2100. Consequently, seawater can intrude into the coastal aquifers and change the level of groundwater table. A raise in groundwater table due to seawater intrusion threats the coastal infrastructure such as road pavements. The mechanical properties of subgrade materials will change due to elevated rise of groundwater table, leading to pavement weakening and decreasing the subgrade strength and stiffness. This paper presents an assessment of the vulnerability of subgrade in coastal areas to change in groundwater table due to sea-level rise. A simple bathtub approach is applied for estimating the groundwater level changes according to sea-level rise. Then the effect of groundwater level changes on the soil water content (SWC) of a single column of fine-sand soil is simulated using MIKE SHE. The impact of an increase in moisture content on subgrade strength/stiffness is assessed for a number of scenarios.
Resumo:
This paper gives an overview of an ongoing project endeavouring to advance theory-based production and project management, and the rationale for this approach is briefly justified. The status of the theoretical foundation of production management, project management and allied disciplines is discussed, with emphasis on metaphysical grounding of theories, as well as the nature of the heuristic solution method commonly used in these disciplines. Then, on-going work related to different aspects of production and project management is reviewed from both theoretical and practical orientation. Next, information systems agile project management is explored with a view to its re-use in generic project management. In production management, the consequences and implementation of a new, wider theoretical basis are analyzed. The theoretical implications and negative symptoms of the peculiarities of the construction industry for supply chains and supply chain management in construction are observed. Theoretical paths for improvements of inter-organisational relationships in construction which are fundamental for improvement of construction supply chains are described. To conclude, the observations made in this paper vis-à-vis production, project and supply chain management are related again to the theoretical basis of this paper, and finally directions for theory development and future research are given and discussed.
Resumo:
Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient
Resumo:
To evaluate the validity of the ActiGraph accelerometer for the measurement of physical activity intensity in children and adolescents with cerebral palsy (CP) using oxygen uptake (VO 2) as the criterion measure. Thirty children and adolescents with CP (mean age 12.6 ± 2.0 years) wore an ActiGraph 7164 and a Cosmed K4b 2 portable indirect calorimeter during four activities; quiet sitting, comfortable paced walking, brisk paced walking and fast paced walking. VO 2 was converted to METs and activity energy expenditure and classiWed as sedentary, light or moderate-to-vigorous intensity according to the conventions for children. Mean ActiGraph counts min -1 were classiWed as sedentary, light or moderate-to-vigorous (MVPA) intensity using four diVerent sets of cut-points. VO 2 and counts min¡1 increased signiWcantly with increases in walking speed (P < 0.001). Receiver operating characteristic (ROC) curve analysis indicated that, of the four sets of cut-points evaluated, the Evenson et al. (J Sports Sci 26(14):1557-1565, 2008) cut-points had the highest classiWcation accuracy for sedentary (92%) and MVPA (91%), as well as the second highest classiWcation accuracy for light intensity physical activity (67%). A ROC curve analysis of data from our participants yielded a CP-speciWc cut-point for MVPA that was lower than the Evenson cut-point (2,012 vs. 2,296 counts min¡1), however, the diVerence in classiWcation accuracy was not statistically signiWcant 94% (95% CI = 88.2-97.7%) vs. 91% (95% CI = 83.5-96.5%). In conclusion, among children and adolescents with CP, the ActiGraph is able to diVerentiate between diVerent intensities of walking. The use of the Evenson cut-points will permit the estimation of time spent in MVPA and allows comparisons to be made between activity measured in typically developing adolescents and adolescents with CP. © 2011 Springer-Verlag.
Resumo:
Background Promoting participation physical activity (PA) is an important means of promoting healthy growth and development in children with cerebral palsy (CP). The ActiGraph is a uniaxial accelerometer that provides a realtime measure of PA intensity, duration and frequency. Its small, light weight design makes it a promising measure of activity in children with CP. To date no study has validated the use of accelerometry as a measure of PA in ambulant adolescents with CP. Objectives To evaluate the validity of the ActiGraph accelerometer for measuring PA intensity in adolescents with CP, using oxygen consumption (VO2), measured using portable indirect calorimetry (Cosmed K4b2), as the criterion measure. Design Validation Study Participants/Setting: Ambulant adolescents with CP aged 10–16 years, GMFCS rating of I-III. The recruitment target is 30 (10 in each GMFCS level). Materials/Methods Participants wore the ActiGraph (counts/min) and a Cosmed K4b2 indirect calorimeter (mL/kg/min) during six activity trials: quiet sitting (QS), comfortable paced walking (CPW), brisk paced walking (BPW), fast paced walking (FPW), a ball-kicking protocol (KP) and a ball-throwing protocol (TP). MET levels (multiples of resting metabolism) for each activity were predicted from ActiGraph counts using the Freedson age-specific equation (Freedson et al. 2005) and compared with actual MET levels measured by the Cosmed. Predicted and measured METs for each activity trial were classified as light (> 1.5 METs and <4.6 METs) or moderate to vigorous intensity (≥ 4.6 METs). Results To date 36 bouts of activity have been completed (6 participants x 6 activities). Mean VO2 increased linearly as the intensity of the walking activity increased (CPW=9.47±2.16, BPW=14.06±4.38, FPW=19.21±5.68 ml/kg/min) and ActiGraph counts reflected this pattern (CPW=1099±574, BPW=2233±797 FPW=4707±1013 counts/min). The throwing protocol recording the lowest VO2 (TP=7.50±3.86 ml/kg/min) and lowest overall counts/min (TP=31±27 counts/min). When each of the 36 bouts were classified as either light or moderate to vigorous intensity using measured VO2 as the criterion measure, the Freedson equation correctly classified 28 from 36 bouts (78%). Conclusion/Clinical Implications These preliminary findings suggest that there is a relationship between the intensity of PA and direct measure of oxygen consumption and that therefore the ActiGraph may be a promising tool for accurately measuring free living PA in the community. Further data collection of the complete sample will enable secondary analysis of the relationship between PA and severity of CP (GMFCS level).
Resumo:
Twitter is a social media service that has managed very successfully to embed itself deeply in the daily lives of its users. Its short message length (140 characters), and one-way connections (‘following’ rather than ‘friending’), lead themselves effectively to random and regular updates on almost any form of personal or professional activity. Thus, it has found uses from the interpersonal (e.g. Boyd et al., 2010) through crisis communication (e.g. Bruns et al., 2012), to political debate (e.g. Burgess & Bruns, 2012). In such uses, Twitter does not necessarily replace existing media channels, such as broadcasting or online mainstream media, but often complements them, providing its users with alternative opportunities to contribute more actively to the wider media sphere. This is true especially where Twitter is used alongside television, as a simple backchannel to live programming or for more sophisticated uses. In this article, we outline four aspects and dimensions, of the way that the old medium of television intersects, and in some cases, interacts with the new medium of Twitter. Tweeting about the television has always been a social media form. It has also consistently provided key ‘talking points’ for western societies...
Resumo:
The Australasian Information Security Conference (AISC) 2011 was held on 18th-19th January 2011 in Perth, Australia, as a part of the Australasian Computer Science Week 2011. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.
Resumo:
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
Resumo:
This study was conducted to assess the vulnerability of coastal road infrastructures due to climate change induced sea level rise and extreme weather conditions through the estimation of road subgrade strength reduction as a result of changes in soil moisture content. The study area located in the Gold Coast, Australia highlighted that the risk is significant. In wet seasons or areas with wet condition, the groundwater table is already high, so even a small change in the groundwater table can raise the risk of inundation; particularly, in areas with existing shallow groundwater. The predicted risk of a high groundwater table on road infrastructure is a long-term hazard. Therefore, there is time to undertake some management plans to decrease the possible risks, for instance, some deep root plants could be planted along the roads with a high level of risk, to decrease the groundwater table elevation.
Resumo:
While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.
Resumo:
This chapter uses as a beginning point Walter Benjamin’s famous essay ‘The work of art in the age of technological reproducibility’(1935/2008) to discuss Media Arts education. It locates ‘Media Arts’ at the intersection of three key ideas: 1) media arts products as objects for popular and everyday consumption and intervention by individuals and broader audiences; 2) materiality and how individuals use their bodies and technologies to produce, combine and share digital materials and; 3) the construction of aesthetic knowledge and how this relates to critical and conceptual thinking. These ideas are discussed in the context of the development of curriculum for students at all ages of schooling, with specific attention given to the knowledge and skills students might develop within Media Arts education in primary schools. Examples from a Media Arts project in a primary school in Australia – where a new Media Arts national curriculum has been developed –are provided to illustrate the key ideas discussed in the chapter.