98 resultados para FOREST STREAM
Resumo:
An initialisation process is a key component in modern stream cipher design. A well-designed initialisation process should ensure that each key-IV pair generates a different key stream. In this paper, we analyse two ciphers, A5/1 and Mixer, for which this does not happen due to state convergence. We show how the state convergence problem occurs and estimate the effective key-space in each case.
Resumo:
Investigates the use of temporal lip information, in conjunction with speech information, for robust, text-dependent speaker identification. We propose that significant speaker-dependent information can be obtained from moving lips, enabling speaker recognition systems to be highly robust in the presence of noise. The fusion structure for the audio and visual information is based around the use of multi-stream hidden Markov models (MSHMM), with audio and visual features forming two independent data streams. Recent work with multi-modal MSHMMs has been performed successfully for the task of speech recognition. The use of temporal lip information for speaker identification has been performed previously (T.J. Wark et al., 1998), however this has been restricted to output fusion via single-stream HMMs. We present an extension to this previous work, and show that a MSHMM is a valid structure for multi-modal speaker identification
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.
Resumo:
Existing algebraic analyses of the ZUC cipher indicate that the cipher should be secure against algebraic attacks. In this paper, we present an alternative algebraic analysis method for the ZUC stream cipher, where a combiner is used to represent the nonlinear function and to derive equations representing the cipher. Using this approach, the initial states of ZUC can be recovered from 2^97 observed words of keystream, with a complexity of 2^282 operations. This method is more successful when applied to a modified version of ZUC, where the number of output words per clock is increased. If the cipher outputs 120 bits of keystream per clock, the attack can succeed with 219 observed keystream bits and 2^47 operations. Therefore, the security of ZUC against algebraic attack could be significantly reduced if its throughput was to be increased for efficiency.
Resumo:
Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.
Resumo:
This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural components similar to the well-known Grain cipher and the LILI family of keystream generators. Mixer uses a 128-bit key and 64-bit IV to initialise a 217-bit internal state. The analysis is focused on the initialisation function of Mixer and shows that there exist multiple key-IV pairs which, after initialisation, produce the same initial state, and consequently will generate the same keystream. Furthermore, if the number of iterations of the state update function performed during initialisation is increased, then the number of distinct initial states that can be obtained decreases. It is also shown that there exist some distinct initial states which produce the same keystream, resulting in a further reduction of the effective key space
Resumo:
Research over the last two decades has significantly increased our understanding of the evolutionary position of the insects among other arthropods, and the relationships among the insect Orders. Many of these insights have been established through increasingly sophisticated analyses of DNA sequence data from a limited number of genes. Recent results have established the relationships of the Holometabola, but relationships among the hemimetabolous orders have been more difficult to elucidate. A strong consensus on the relationships among the Palaeoptera (Ephemeroptera and Odonata) and their relationship to the Neoptera has not emerged with all three possible resolutions supported by different data sets. While polyneopteran relationships generally have resisted significant resolution, it is now clear that termites, Isoptera, are nested within the cockroaches, Blattodea. The newly discovered order Mantophasmatodea is difficult to place with the balance of studies favouring Grylloblattodea as sister-group. While some studies have found the paraneopteran orders (Hemiptera, Thysanoptera, Phthiraptera and Psocoptera) monophyletic, evidence suggests that parasitic lice (Phthiraptera) have evolved from groups within the book and bark lice (Psocoptera), and may represent parallel evolutions of parasitism within two major louse groups. Within Holometabola, it is now clear that Hymenoptera are the sister to the other orders, that, in turn are divided into two clades, the Neuropteroidea (Coleoptera, Neuroptera and relatives) and the Mecopterida (Trichoptera, Lepidoptera, Diptera and their relatives). The enigmatic order Strepsiptera, the twisted wing insects, have now been placed firmly near Coleoptera, rejecting their close relationship to Diptera that was proposed some 15years ago primarily based on ribosomal DNA data. Phylogenomic-scale analyses are just beginning to be focused on the relationships of the insect orders, and this is where we expect to see resolution of palaeopteran and polyneopteran relationships. Future research will benefit from greater coordination between intra and inter-ordinal analyses. This will maximise the opportunities for appropriate outgroup choice at the intraordinal level and provide the background knowledge for the interordinal analyses to span the maximum phylogenetic scope within groups.
Resumo:
Objective To identify the spatial and temporal clusters of Barmah Forest virus (BFV) disease in Queensland in Australia, using geographical information systems (GIS) and spatial scan statistic (SaTScan). Methods We obtained BFV disease cases, population and statistical local areas boundary data from Queensland Health and Australian Bureau of Statistics respectively during 1992-2008 for Queensland. A retrospective Poisson-based analysis using SaTScan software and method was conducted in order to identify both purely spatial and space-time BFV disease high-rate clusters. A spatial cluster size of a proportion of the population and a 200km circle radius and varying time windows from 1 month to 12 months were chosen (for the space-time analysis). Results The spatial scan statistic detected a most likely significant purely spatial cluster (including 23 SLAs) and a most likely significant space-time cluster (including 24 SLAs) in approximately the same location. Significant secondary clusters were also identified from both the analyses in several locations. Conclusions This study provides evidence of the existence of statistically significant BFV disease clusters in Queensland, Australia. The study also demonstrated the relevance and applicability of SaTScan in analysing on-going surveillance data to identify clusters to facilitate the development of effective BFV disease prevention and control strategies in Queensland, Australia.
Resumo:
The eastern Australian rainforests have experienced several cycles of range contraction and expansion since the late Miocene that are closely correlated with global glaciation events. Together with ongoing aridification of the continent, this has resulted in current distributions of native closed forest that are highly fragmented along the east coast. Several closed forest endemic taxa exhibit patterns of population genetic structure that are congruent with historical isolation of populations in discrete refugia and reflect evolutionary histories dramatically affected by vicariance. Currently, limited data are available regarding the impact of these past climatic fluctuations on freshwater invertebrate taxa. The non-biting midge species Echinocladius martini Cranston is distributed along the east coast and inhabits predominantly montane streams in closed forest habitat. Phylogeographic structure in E. martini was resolved here at a continental scale by incorporating data from a previous pilot study and expanding the sampling design to encompass populations in the Wet Tropics of north-eastern Queensland, south-east Queensland, New South Wales and Victoria. Patterns of phylogeographic structure revealed several deeply divergent mitochondrial lineages from central and south-eastern Australia that were previously unrecognised and were geographically endemic to closed forest refugia. Estimated divergence times were congruent with late Miocene onset of rainforest contractions across the east coast of Australia. This suggested that dispersal and gene flow among E. martini populations isolated in refugia has been highly restricted historically. Moreover, these data imply, in contrast to existing preconceptions about freshwater invertebrates, that this taxon may be acutely susceptible to habitat fragmentation.
Resumo:
Barmah Forest Virus (BFV) disease is the most rapidly emerging mosquito-borne disease in Australia. BFV transmission depends on factors such as climate, virus, vector and the human population. However, the impact of climatic and social factors on BFV remains to be determined. This paper provided an overview of current research and discusses the future research directions on the BFV transmission. These research findings could be regarded as an impetus towards BFV prevention and control strategies.