342 resultados para Ideal
Resumo:
Preneel, Govaerts and Vandewalle (PGV) analysed the security of single-block-length block cipher based compression functions assuming that the underlying block cipher has no weaknesses. They showed that 12 out of 64 possible compression functions are collision and (second) preimage resistant. Black, Rogaway and Shrimpton formally proved this result in the ideal cipher model. However, in the indifferentiability security framework introduced by Maurer, Renner and Holenstein, all these 12 schemes are easily differentiable from a fixed input-length random oracle (FIL-RO) even when their underlying block cipher is ideal. We address the problem of building indifferentiable compression functions from the PGV compression functions. We consider a general form of 64 PGV compression functions and replace the linear feed-forward operation in this generic PGV compression function with an ideal block cipher independent of the one used in the generic PGV construction. This modified construction is called a generic modified PGV (MPGV). We analyse indifferentiability of the generic MPGV construction in the ideal cipher model and show that 12 out of 64 MPGV compression functions in this framework are indifferentiable from a FIL-RO. To our knowledge, this is the first result showing that two independent block ciphers are sufficient to design indifferentiable single-block-length compression functions.
Resumo:
Summary form only given. Geometric simplicity, efficiency and polarization purity make slot antenna arrays ideal solutions for many radar, communications and navigation applications, especially when high power, light weight and limited scan volume are priorities. Resonant arrays of longitudinal slots have a slot spacing of one-half guide wavelength at the design frequency, so that the slots are located at the standing wave peaks. Planar arrays are implemented using a number of rectangular waveguides (branch line guides), arranged side-by-side, while waveguides main lines located behind and at right angles to the branch lines excite the radiating waveguides via centered-inclined coupling slots. Planar slotted waveguide arrays radiate broadside beams and all radiators are designed to be in phase.
Resumo:
Purpose Using the Theory of Planned Behaviour (TPB) framework, this study explored whether the standard TPB constructs explained variance in Gen Y individuals’ intentions to join their ideal organisation. Design/methodology/approach A mixed methods approach was used featuring qualitative and quantitative methods. Findings The overall TPB model accounted for a significant 51.6% of the variance in intention to join one’s ideal organisation in the next six months with the significant predictors in the model being subjective norm and perceived behaviour control but not attitude. Research limitations/implications Using graduating students from a single Australian university sample may mean that the current findings may not extend to all Gen Y individuals. The current study has demonstrated the explanatory utility of the TPB in relation to graduate Gen Y’s intention to join their ideal organisation, providing further evidence of the robustness of the TPB framework in an organisational setting. Practical implications These findings have implications for enhancing understanding of the most effective recruitment processes for Gen Y students entering the workforce. The findings could inform recruitment policies and strategies to attract Gen Y applicants. Originality/value To our knowledge this study is the first application of the TPB to this topic. The current research extends the recruitment literature with a theoretically-based investigation. Identification of factors which inform organisational recruitment strategies, allow organisations to stand out from their competitors and potentially achieve a larger application pool from which to select the best human capital and sustain competitive advantage.
Resumo:
Whilst the dynamics informing processes have taken time to become clear, civic resistance initiated by young people using new media began in Egypt in 2010 against the Mubarak regime, soon widened to Tunisia, Yemen and Libya. Known as the 'Arab Spring', this phenomenon re-ignited discussion about the political role of digital space and its democratic potential. While parallels between authoritarian regimes and universities and educational institutions might seem overdrawn to some readers, I suggest there is value in considering the 'Digital Spring' (apropos the 'Arab Spring') as a metaphor to suggest the possibility that similar processes are taking place in schools and universities. This invites discussion about the political significance of digital space and its democratic potential in those institutions. To assess how some young people engage in digitally mediated politics within schools and universities, I identify five propositions which amalgamate descriptive and normative elements derived from Habermas and Dahlgren. These propositions offer an ideal taxonomy of normative and descriptive elements to establish whether digital technology promotes participation and debate in ways that sustain democratic practice.
Resumo:
Plasmid DNA for therapeutic and vaccination purposes must be highly purified. The high selectivity of affinity chromatography makes it ideal for the isolation of pDNA from complex biological feed stocks. Affinity chromatography makes use of the biological function and/or individual chemical structure of the interacting molecules. However, the success of any affinity purification protocol is dependent on the availability of suitable ligands. In this study, surface plasmon resonance (SPR) based Biacore system has been employed for the detection and quantification of the binding between lac operon (lacO) sequence contained in a pDNA and synthetic peptides based on the DNA-binding domain of the lac repressor protein, lad. The equilibrium dissociation constant (K D) and association and dissociation rate constants (ka, kd) for the interaction between plasmid DNA and designed peptides were determined.
Resumo:
The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths shorter than that of the permutation. Under this assumption, we propose a permutation based compression function and prove its security with respect to collision and (second) preimage attacks in the ideal permutation model. The proposed compression function can be seen as a generalization of the compression function of MD6 hash function.
Resumo:
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.
Resumo:
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl. Grøstl is a so-called wide-pipe construction where the size of the internal state is significantly larger than the size of the output. This has the effect that all known, generic attacks on the hash function are made much more difficult. Grøstl has good performance on a wide range of platforms and counter-measures against side-channel attacks are well-understood from similar work on the AES.
Resumo:
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two �fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl
Resumo:
This project develops the required guidelines to assure stable and accurate operation of Power-Hardware-in-the-Loop implementations. The proposals of this research have been theoretically analyzed and practically examined using a Real-Time Digital Simulator. In this research, the interaction between software simulated power network and the physical power system has been studied. The conditions for different operating regimes have been derived and the corresponding analyses have been presented.
Resumo:
This thesis investigated the complexity of busway operation with stopping and non-stopping buses using field data and microscopic simulation modelling. The proposed approach made significant recommendations to transit authorities to achieve the most practicable system capacity for existing and new busways. The empirical equations developed in this research and newly introduced analysis methods will be ideal tools for transit planners to achieve optimal reliability of busways.
Resumo:
Australian universities are publishing previously unpublished works such as theses in institutional repositories or by publishing scholarly journals on their own presses. This re-invented role of publisher is due in part, to the availability of digital age technologies which scaffold the publishing process and facilitate inexpensive production of digital-only journals. The global push for Open Access to the outputs of publicly-funded research has also been a major driver. Research funder mandates and institutional Open Access policies apply only to publications for which the authors have no expectation of commercial gain. In all cases the primary motivation is to disseminate widely for maximum uptake with attribution to the author thereby increasing impact. This makes works published in institutional repositories and on university presses ideal candidates for Creative Commons licences.
Resumo:
Engineered biphasic osteochondral tissues may have utility in cartilage defect repair. As bone-marrow-derived mesenchymal stem/stromal cells (MSC) have the capacity to make both bone-like and cartilage-like tissues, they are an ideal cell population for use in the manufacture of osteochondral tissues. Effective differentiation of MSC to bone-like and cartilage-like tissues requires two unique medium formulations and this presents a challenge both in achieving initial MSC differentiation and in maintaining tissue stability when the unified osteochondral tissue is subsequently cultured in a single medium formulation. In this proof-of-principle study, we used an in-house fabricated microwell platform to manufacture thousands of micropellets formed from 166 MSC each. We then characterized the development of bone-like and cartilage-like tissue formation in the micropellets maintained for 8–14 days in sequential combinations of osteogenic or chondrogenic induction medium. When bone-like or cartilage-like micropellets were induced for only 8 days, they displayed significant phenotypic changes when the osteogenic or chondrogenic induction medium, respectively, was swapped. Based on these data, we developed an extended 14-day protocol for the pre-culture of bone-like and cartilage-like micropellets in their respective induction medium. Unified osteochondral tissues were formed by layering 12,000 osteogenic micropellets and 12,000 chondrogenic micropellets into a biphasic structure and then further culture in chondrogenic induction medium. The assembled tissue was cultured for a further 8 days and characterized via histology. The micropellets had amalgamated into a continuous structure with distinctive bone-like and cartilage-like regions. This proof-of-concept study demonstrates the feasibility of micropellet assembly for the formation of osteochondral-like tissues for possible use in osteochondral defect repair.
Resumo:
The mining industry presents us with a number of ideal applications for sensor based machine control because of the unstructured environment that exists within each mine. The aim of the research presented here is to increase the productivity of existing large compliant mining machines by retrofitting with enhanced sensing and control technology. The current research focusses on the automatic control of the swing motion cycle of a dragline and an automated roof bolting system. We have achieved: * closed-loop swing control of an one-tenth scale model dragline; * single degree of freedom closed-loop visual control of an electro-hydraulic manipulator in the lab developed from standard components.
Resumo:
Travellers are spoilt by holiday choice, and yet will usually only seriously consider a few destinations during the decision process. With thousands of destination marketing organisations (DMOs) competing for attention, places are becoming increasingly substitutable. The study of destination competitiveness is an emerging field, and thesis contributes to an enhanced understanding by addressing three topics that have received relatively little attention in the tourism literature: destination positioning, the context of short break holidays, and domestic travel in New Zealand. A descriptive model of positioning as a source of competitive advantage is developed, and tested through 12 propositions. The destination of interest is Rotorua, which was arguably New Zealand’s first tourist destination. The market of interest is Auckland, which is Rotorua’s largest visitor market. Rotorua’s history is explored to identify factors that may have contributed to the destination’s current image in the Auckland market. A mix of qualitative and quantitative procedures is then utilised to determine Rotorua’s position, relative to a competing set of destinations. Based on an applied research problem, the thesis attempts to bridge the gap between academia and industry by providing useable results and benchmarks for five regional tourism organisations (RTOs). It is proposed that, in New Zealand, the domestic short break market represents a valuable opportunity not explicitly targeted by the competitive set of destinations. Conceptually, the thesis demonstrates the importance of analysing a destination’s competitive position, from the demand perspective, in a travel context; and then the value of comparing this ‘ideal’ position with that projected by the RTO. The thesis concludes Rotorua’s market position in the Auckland short break segment represents a source of comparative advantage, but is not congruent with the current promotional theme, which is being used in all markets. The findings also have implications for destinations beyond the context of the thesis. In particular, a new definition for ‘destination attractiveness’ is proposed, which warrants consideration in the design of future destination positioning analyses.