439 resultados para R-Statistical computing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present truncated differential analysis of reduced-round LBlock by computing the differential distribution of every nibble of the state. LLR statistical test is used as a tool to apply the distinguishing and key-recovery attacks. To build the distinguisher, all possible differences are traced through the cipher and the truncated differential probability distribution is determined for every output nibble. We concatenate additional rounds to the beginning and end of the truncated differential distribution to apply the key-recovery attack. By exploiting properties of the key schedule, we obtain a large overlap of key bits used in the beginning and final rounds. This allows us to significantly increase the differential probabilities and hence reduce the attack complexity. We validate the analysis by implementing the attack on LBlock reduced to 12 rounds. Finally, we apply single-key and related-key attacks on 18 and 21-round LBlock, respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A largely overlooked aspect of innovative design practices is how workplace surfaces play a role in supporting designers' everyday work. In this paper we introduce the idea of artful surfaces. Artful surfaces (Figure 1) are full of informative, inspirational and creative artefacts that help designers accomplish their everyday design practices. The way these surfaces are created and used could provide information about how designers work. We identify four types of artful surfaces: personal, shared, project-specific and live surfaces; and describe them using examples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Lesser Grain Borer is a major pest of stored grain with a global distribution. This project has, for the first time recorded this pest throughout broad spatial areas, tens of kilometres from grain production or storage. Statistical analysis revealed that different factors such as ambient temperature and the availability of food resources affect R. dominica differently between different habitats. This suggests that, contrary to the prevailing view, this pest is not solely dependent on stored wheat and can continue to persist throughout a range of habitats. These findings have important management implications for Australia's wheat industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter addresses data modelling as a means of promoting statistical literacy in the early grades. Consideration is first given to the importance of increasing young children’s exposure to statistical reasoning experiences and how data modelling can be a rich means of doing so. Selected components of data modelling are then reviewed, followed by a report on some findings from the third-year of a three-year longitudinal study across grades one through three.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Platelet-derived microparticles (PMPs) which are produced during platelet activation contribute to coagulation1 and bind to traumatized endothelium in an animal model2. Such endothelial injury occurs during percutaneous transluminal coronary angioplasty (PTCA), a procedure which restores the diameter of occluded coronary arteries using balloon inflations. However, re-occlusions subsequently develop in 20-25% of patients3, although this is limited by treatment with anti-platelet glycoprotein IIb/IIIa receptor drugs such as abciximab4. However, abciximab only partially decreases the need for revascularisation5, and therefore other mechanisms appear to be involved. As platelet activation occurs during PTCA, it is likely that PMPs may be produced and contribute to restenosis. This study population consisted of 113 PTCA patients, of whom 38 received abciximab. Paired peripheral arterial blood samples were obtained from the PTCA sheath: 1) following heparinisation (baseline); and 2) subsequent to all vessel manipulation (post-PTCA). Blood was prepared with an anti-CD61 (glycoprotein IIIa) fluorescence conjugated antibody to identify PMPs using flow cytometry, and PMP results expressed as a percentage of all CD61 events. The level of PMPs increased significantly from baseline following PTCA in the without abciximab group (paired t test, P=0.019). However, there was no significant change in the level of PMPs following PTCA in patients who received abciximab. Baseline clinical characteristics between patient groups were similar, although patients administered abciximab had more complex PTCA procedures, such as increased balloon inflation pressures (ANOVA, P=0.0219). In this study, we have clearly demonstrated that the level of CD61-positive PMPs increased during PTCA. This trend has been demonstrated previously, although a low sample size prevented statistical significance being attained6. The results of our work also demonstrate that there was no increase in PMPs after PTCA with abiciximab treatment. The increased PMPs may adhere to traumatized endothelium, contributing to re-occlusion of the arteries, but this remains to be determined. References: (1) Holme PA, Brosstad F, Solum NO. Blood Coagulation and Fibrinolysis. 1995;6:302-310. (2) Merten M, Pakala R, Thiagarajan P, Benedict CR. Circulation. 1999;99:2577-2582. (3) Califf RM. American Heart Journal.1995;130:680-684. (4) Coller BS, Scudder LE. Blood. 1985;66:1456-1459. (5) Topol EJ, Califf RM, Weisman HF, Ellis SG, Tcheng JE, Worley S, Ivanhoe R, George BS, Fintel D, Weston M, Sigmon K, Anderson KM, Lee KL, Willerson JT on behalf of the EPIC investigators. Lancet. 1994;343:881-886. (6) Scharf RE, Tomer A, Marzec UM, Teirstein PS, Ruggeri ZM, Harker LA. Arteriosclerosis and Thrombosis. 1992;12:1475-87.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aromatic radicals form in a variety of reacting gas-phase systems, where their molecular weight growth reactions with unsaturated hydrocarbons are of considerable importance. We have investigated the ion-molecule reaction of the aromatic distonic N-methyl-pyridinium-4-yl (NMP) radical cation with 2-butyne (CH3C CCH3) using ion trap mass spectrometry. Comparison is made to high-level ab initio energy surfaces for the reaction of NMP and for the neutral phenyl radical system. The NMP radical cation reacts rapidly with 2-butyne at ambient temperature, due to the apparent absence of any barrier. The activated vinyl radical adduct predominantly dissociates via loss of a H atom, with lesser amounts of CH3 loss. High-resolution Fourier transform ion cyclotron resonance (FT-ICR) mass spectrometry allows us to identify small quantities of the collisionally deactivated reaction adduct. Statistical reaction rate theory calculations (master equation/RRKM theory) on the NMP + 2-butyne system support our experimental findings, and indicate a mechanism that predominantly involves an allylic resonance-stabilized radical formed via H atom shuttling between the aromatic ring and the C-4 side-chain, followed by cyclization and/or low-energy H atom beta-scission reactions. A similar mechanism is demonstrated for the neutral phenyl radical (Ph center dot)+2-butyne reaction, forming products that include 3-methylindene. The collisionally deactivated reaction adduct is predicted to be quenched in the form of a resonance-stabilized methylphenylallyl radical. Experiments using a 2,5-dichloro substituted methyl-pyridiniumyl radical cation revealed that in this case CH3 loss from the 2-butyne adduct is favoured over H atom loss, verifying the key role of ortho H atoms, and the shuttling mechanism, in the reactions of aromatic radicals with alkynes. As well as being useful phenyl radical analogues, pyridiniumyl radical cations may form in the ionosphere of Titan, where they could undergo rapid molecular weight growth reactions to yield polycyclic aromatic nitrogen hydrocarbons (PANHs).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An important responsibility of the Environment Protection Authority, Victoria, is to set objectives for levels of environmental contaminants. To support the development of environmental objectives for water quality, a need has been identified to understand the dual impacts of concentration and duration of a contaminant on biota in freshwater streams. For suspended solids contamination, information reported by Newcombe and Jensen [ North American Journal of Fisheries Management , 16(4):693--727, 1996] study of freshwater fish and the daily suspended solids data from the United States Geological Survey stream monitoring network is utilised. The study group was requested to examine both the utility of the Newcombe and Jensen and the USA data, as well as the formulation of a procedure for use by the Environment Protection Authority Victoria that takes concentration and duration of harmful episodes into account when assessing water quality. The extent to which the impact of a toxic event on fish health could be modelled deterministically was also considered. It was found that concentration and exposure duration were the main compounding factors on the severity of effects of suspended solids on freshwater fish. A protocol for assessing the cumulative effect on fish health and a simple deterministic model, based on the biology of gill harm and recovery, was proposed. References D. W. T. Au, C. A. Pollino, R. S. S Wu, P. K. S. Shin, S. T. F. Lau, and J. Y. M. Tang. Chronic effects of suspended solids on gill structure, osmoregulation, growth, and triiodothyronine in juvenile green grouper epinephelus coioides . Marine Ecology Press Series , 266:255--264, 2004. J.C. Bezdek, S.K. Chuah, and D. Leep. Generalized k-nearest neighbor rules. Fuzzy Sets and Systems , 18:237--26, 1986. E. T. Champagne, K. L. Bett-Garber, A. M. McClung, and C. Bergman. {Sensory characteristics of diverse rice cultivars as influenced by genetic and environmental factors}. Cereal Chem. , {81}:{237--243}, {2004}. S. G. Cheung and P. K. S. Shin. Size effects of suspended particles on gill damage in green-lipped mussel perna viridis. Marine Pollution Bulletin , 51(8--12):801--810, 2005. D. H. Evans. The fish gill: site of action and model for toxic effects of environmental pollutants. Environmental Health Perspectives , 71:44--58, 1987. G. C. Grigg. The failure of oxygen transport in a fish at low levels of ambient oxygen. Comp. Biochem. Physiol. , 29:1253--1257, 1969. G. Holmes, A. Donkin, and I.H. Witten. {Weka: A machine learning workbench}. In Proceedings of the Second Australia and New Zealand Conference on Intelligent Information Systems , volume {24}, pages {357--361}, {Brisbane, Australia}, {1994}. {IEEE Computer Society}. D. D. Macdonald and C. P. Newcombe. Utility of the stress index for predicting suspended sediment effects: response to comments. North American Journal of Fisheries Management , 13:873--876, 1993. C. P. Newcombe. Suspended sediment in aquatic ecosystems: ill effects as a function of concentration and duration of exposure. Technical report, British Columbia Ministry of Environment, Lands and Parks, Habitat Protection branch, Victoria, 1994. C. P. Newcombe and J. O. T. Jensen. Channel suspended sediment and fisheries: A synthesis for quantitative assessment of risk and impact. North American Journal of Fisheries Management , 16(4):693--727, 1996. C. P. Newcombe and D. D. Macdonald. Effects of suspended sediments on aquatic ecosystems. North American Journal of Fisheries Management , 11(1):72--82, 1991. K. Schmidt-Nielsen. Scaling. Why is animal size so important? Cambridge University Press, NY, 1984. J. S. Schwartz, A. Simon, and L. Klimetz. Use of fish functional traits to associate in-stream suspended sediment transport metrics with biological impairment. Environmental Monitoring and Assessment , 179(1--4):347--369, 2011. E. Al Shaw and J. S. Richardson. Direct and indirect effects of sediment pulse duration on stream invertebrate assemb ages and rainbow trout ( Oncorhynchus mykiss ) growth and survival. Canadian Journal of Fish and Aquatic Science , 58:2213--2221, 2001. P. Tiwari and H. Hasegawa. {Demand for housing in Tokyo: A discrete choice analysis}. Regional Studies , {38}:{27--42}, {2004}. Y. Tramblay, A. Saint-Hilaire, T. B. M. J. Ouarda, F. Moatar, and B Hecht. Estimation of local extreme suspended sediment concentrations in california rivers. Science of the Total Environment , 408:4221--

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The concept of cloud computing services is appealing to the small and medium enterprises (SMEs), with the opportunity to acquire modern information technology resources as a utility and avoid costly capital investments in technology resources. However, the adoption of the cloud computing services presents significant challenges to the SMEs. The SMEs need to determine a path to adopting the cloud computing services that would ensure their sustainable presence in the cloud computing environment. Information about approaches to adopting the cloud computing services by the SMEs is fragmented. Through an interpretive design, we suggest that the SMEs need to have a strategic and incremental intent, understand their organizational structure, understand the external factors, consider the human resource capacity, and understand the value expectations from the cloud computing services to forge a successful path to adopting the cloud computing services. These factors would contribute to a model of cloud services for SMEs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The placement of the mappers and reducers on the machines directly affects the performance and cost of the MapReduce computation in cloud computing. From the computational point of view, the mappers/reducers placement problem is a generalization of the classical bin packing problem, which is NP-complete. Thus, in this paper we propose a new heuristic algorithm for the mappers/reducers placement problem in cloud computing and evaluate it by comparing with other several heuristics on solution quality and computation time by solving a set of test problems with various characteristics. The computational results show that our heuristic algorithm is much more efficient than the other heuristics. Also, we verify the effectiveness of our heuristic algorithm by comparing the mapper/reducer placement for a benchmark problem generated by our heuristic algorithm with a conventional mapper/reducer placement. The comparison results show that the computation using our mapper/reducer placement is much cheaper while still satisfying the computation deadline.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

MapReduce is a computation model for processing large data sets in parallel on large clusters of machines, in a reliable, fault-tolerant manner. A MapReduce computation is broken down into a number of map tasks and reduce tasks, which are performed by so called mappers and reducers, respectively. The placement of the mappers and reducers on the machines directly affects the performance and cost of the MapReduce computation. From the computational point of view, the mappers/reducers placement problem is a generation of the classical bin packing problem, which is NPcomplete. Thus, in this paper we propose a new grouping genetic algorithm for the mappers/reducers placement problem in cloud computing. Compared with the original one, our grouping genetic algorithm uses an innovative coding scheme and also eliminates the inversion operator which is an essential operator in the original grouping genetic algorithm. The new grouping genetic algorithm is evaluated by experiments and the experimental results show that it is much more efficient than four popular algorithms for the problem, including the original grouping genetic algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Software-as-a-Service or SaaS can be delivered in a composite form, consisting of a set of application and data components that work together to deliver higher-level functional software. Components in a composite SaaS may need to be scaled – replicated or deleted, to accommodate the user’s load. It may not be necessary to replicate all components of the SaaS, as some components can be shared by other instances. On the other hand, when the load is low, some of the instances may need to be deleted to avoid resource underutilisation. Thus, it is important to determine which components are to be scaled such that the performance of the SaaS is still maintained. Extensive research on the SaaS resource management in Cloud has not yet addressed the challenges of scaling process for composite SaaS. Therefore, a hybrid genetic algorithm is proposed in which it utilises the problem’s knowledge and explores the best combination of scaling plan for the components. Experimental results demonstrate that the proposed algorithm outperforms existing heuristic-based solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Service-oriented Architectures, business processes can be realized by composing loosely coupled services. The problem of QoS-aware service composition is widely recognized in the literature. Existing approaches on computing an optimal solution to this problem tackle structured business processes, i.e., business processes which are composed of XOR-block, AND-block, and repeat loop orchestration components. As of yet, OR-block and unstructured orchestration components have not been sufficiently considered in the context of QoS-aware service composition. The work at hand addresses this shortcoming. An approach for computing an optimal solution to the service composition problem is proposed considering the structured orchestration components, such as AND/XOR/OR-block and repeat loop, as well as unstructured orchestration components.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A method is proposed to describe force or compound muscle action potential (CMAP) trace data collected in an electromyography study for motor unit number estimation (MUNE). Experimental data was collected using incre- mental stimulation at multiple durations. However, stimulus information, vital for alternate MUNE methods, is not comparable for multiple duration data and therefore previous methods of MUNE (Ridall et al., 2006, 2007) cannot be used with any reliability. Hypothesised ring combinations of motor units are mod- elled using a multiplicative factor and Bayesian P-spline formulation. The model describes the process for force and CMAP in a meaningful way.