540 resultados para 332.642
Resumo:
The core principles of CSR are being integrated into the core policy objectives of different economies and global companies and are also moving beyond their individual business initiatives. This integration can be seen from individual states’ perspectives; states are also accepting these issues in their socio-economic strategies and thus are establishing these issues within national economies. Given this background, this chapter explicates the trends in implementing CSR principles in the EU and USA. It demonstrates that companies in the developed countries use a mix of different strategies to incorporate CSR principles in their self-regulatory mechanisms. Strategies based on legal regulation are not foremost in this mix; rather, in these countries regulation-based strategy is meant to assist the non-legal drivers of CSR.
Resumo:
Recent studies have started to explore context-awareness as a driver in the design of adaptable business processes. The emerging challenge of identifying and considering contextual drivers in the environment of a business process are well understood, however, typical methods and models for business process design do not yet consider this context. In this paper, we describe our work on the design of a method framework and appropriate models to enable a context-aware process design approach. We report on our ongoing work with an Australian insurance provider and describe the design science we employed to develop innovative and useful artifacts as part of a context-aware method framework. We discuss the utility of these artifacts in an application in the claims handling process at the case organization.
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
A key derivation function is used to generate one or more cryptographic keys from a private (secret) input value. This paper proposes a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the underlying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream finalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.
Resumo:
Community support agencies routinely employ a web presence to provide information on their services. While this online information provision helps to increase an agency’s reach, this paper argues that it can be further extended by mapping relationships between services and by facilitating two-way communication and collaboration with local communities. We argue that emergent technologies, such as locative media and networking tools, can assist in harnessing this social capital. However, new applications must be designed in ways that both persuade and support community members to contribute information and support others in need. An analysis of the online presence of community service agencies and social benefit applications is presented against Fogg’s Behaviour Model. From this evaluation, design principles are proposed for developing new locative, collaborative online applications for social benefit.
Resumo:
Familial hemiplegic migraine is a severe, rare subtype of migraine. Gene mutations on chromosome 19 have been identified in the calcium channel, voltage-dependent, P/Q type, alpha-1A subunit gene (chromosome 19p13) for familial hemiplegic migraine. Recently a gene mutation (Serine-218-Leucine) for a dramatic syndrome associated with familial hemiplegic migraine, commonly named “migraine coma”, has implicated exon 5 of this gene. The occurrence of trivial head trauma, in such familial hemiplegic migraine patients, may also be complicated by severe, sometimes even fatal, cerebral edema and coma occurring after a lucid interval. Sporadic hemiplegic migraine shares a similar spectrum of clinical presentation and genetic heterogeneity. The case report presented in this article implicates the involvement of the Serine-218-Leucine mutation in the extremely rare disorder of minor head trauma–induced migraine coma. We conclude that the Serine-218-Leucine mutation in the calcium channel, voltage-dependent, P/Q type, alpha-1A subunit gene is involved in sporadic hemiplegic migraine, delayed cerebral edema and coma after minor head trauma.
Resumo:
Drawing on three case studies of work in the fields of participatory design, interaction design and electronic arts, we reflect on the implications of these studies for haptic interface research. We propose three themes: gestural; emergent; and expressive; as signposts for a program of research into haptic interaction that could point the way towards novel approaches to haptic interaction and move us from optic to haptic ways of seeing.
Resumo:
A microgrid can span over a large area, especially in rural townships. In such cases, the distributed generators (DGs) must be controlled in a decentralized fashion, based on the locally available measurements. The main concerns are control of system voltage magnitude and frequency, which can either lead to system instability or voltage collapse. In this chapter, the operational challenges of load frequency control in a microgrid are discussed and few methods are proposed to meet these challenges. In particular, issues of power sharing, power quality and system stability are addressed, when the system operates under decentralized control. The main focus of this chapter is to provide solutions to improve the system performance in different situations. The scenarios considered are (a) when the system stability margin is low, (b) when the line impedance has a high R to X ratio, (c) when the system contains unbalanced and/or distorted loads. Also a scheme is proposed in which a microgrid can be frequency isolated from a utility grid while being capable of bidirectional power transfer. In all these cases, the use of angle droop in converter interfaced DGs is adopted. It has been shown that this results in a more responsive control action compared to the traditional frequency based droop control.
Resumo:
We propose a cluster ensemble method to map the corpus documents into the semantic space embedded in Wikipedia and group them using multiple types of feature space. A heterogeneous cluster ensemble is constructed with multiple types of relations i.e. document-term, document-concept and document-category. A final clustering solution is obtained by exploiting associations between document pairs and hubness of the documents. Empirical analysis with various real data sets reveals that the proposed meth-od outperforms state-of-the-art text clustering approaches.
Resumo:
This paper introduces a parallel implementation of an agent-based model applied to electricity distribution grids. A fine-grained shared memory parallel implementation is presented, detailing the way the agents are grouped and executed on a multi-threaded machine, as well as the way the model is built (in a composable manner) which is an aid to the parallelisation. Current results show a medium level speedup of 2.6, but improvements are expected by incor-porating newer distributed or parallel ABM schedulers into this implementa-tion. While domain-specific, this parallel algorithm can be applied to similarly structured ABMs (directed acyclic graphs).
Resumo:
This paper presents the outcome of a study that investigated the relationships between technology prior experience, self-efficacy, technology anxiety, complexity of interface (nested versus flat) and intuitive use in older people. The findings show that, as expected, older people took less time to complete the task on the interface that used a flat structure when compared to the interface that used a complex nested structure. All age groups also used the flat interface more intuitively. However, contrary to what was hypothesised, older age groups did better under anxious conditions. Interestingly, older participants did not make significantly more errors compared with younger age groups on either interface structures.
Resumo:
Collisions between distinct road users (e.g. drivers and motorcyclists) make a substantial contribution to the road trauma burden. Although evidence suggests distinct road users interpret the same road situations differently, it is not clear how road users’ situation awareness differs, nor is it clear which differences might lead to conflicts. This article presents the findings from an on-road study which examined driver, cyclist, motorcyclist and pedestrian situation awareness at intersections. The findings suggest that situation awareness at intersection is markedly different across the four road user groups studied, and that some of these differences may create conflicts between the different road users. The findings also suggest that the causes of the differences identified relate to road design and road user experience. In closing, the key role of road design and training in supporting safe interactions between distinct road users is discussed.
Resumo:
This article examines manual textual categorisation by human coders with the hypothesis that the law of total probability may be violated for difficult categories. An empirical evaluation was conducted to compare a one step categorisation task with a two step categorisation task using crowdsourcing. It was found that the law of total probability was violated. Both a quantum and classical probabilistic interpretations for this violation are presented. Further studies are required to resolve whether quantum models are more appropriate for this task.
Resumo:
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.
Resumo:
Trees are capable of portraying the semi-structured data which is common in web domain. Finding similarities between trees is mandatory for several applications that deal with semi-structured data. Existing similarity methods examine a pair of trees by comparing through nodes and paths of two trees, and find the similarity between them. However, these methods provide unfavorable results for unordered tree data and result in yielding NP-hard or MAX-SNP hard complexity. In this paper, we present a novel method that encodes a tree with an optimal traversing approach first, and then, utilizes it to model the tree with its equivalent matrix representation for finding similarity between unordered trees efficiently. Empirical analysis shows that the proposed method is able to achieve high accuracy even on the large data sets.