306 resultados para One-meson-exchange model


Relevância:

40.00% 40.00%

Publicador:

Resumo:

The exchange of design models in the design and construction industry is evolving away from 2-dimensional computer-aided design (CAD) and paper towards semantically-rich 3-dimensional digital models. This approach, known as Building Information Modelling (BIM), is anticipated to become the primary means of information exchange between the various parties involved in construction projects. From a technical perspective, the domain represents an interesting study in model-based interoperability, since the models are large and complex, and the industry is one in which collaboration is a vital part of business. In this paper, we present our experiences with issues of model-based interoperability in exchanging building information models between various tools, and in implementing tools which consume BIM models, particularly using the industry standard IFC data modelling format. We report on the successes and challenges in these endeavours, as the industry endeavours to move further towards fully digitised information exchange.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In Australia, there is only one, newly established, dedicated mental health service catering specifically for the signing *Deaf community. It is staffed by four part-time hearing professionals and based in Brisbane. There are currently no Deaf psychologists or psychiatrists and there is no valid or reliable empirical evidence on outcomes for Deaf people accessing specialised or mainstream mental health services. Further compounding these issues, is the fact that there are no sign language versions of the most common standardised mental health or psychological instruments available to clinicians in Australia. Contemporary counselling literature is acknowledging the role of the therapeutic alliance and the impact of 'common factors' on therapeutic outcomes. However, these issues are complicated by the relationship between the Deaf client and the hearing therapist being a cross-cultural exchange. The disability model of deafness is contentious and few professionals in Australia have the requisite knowledge and understanding of deafness from a cultural perspective to attend to the therapeutic relationship with this in mind. Consequently, Deaf people are severely disadvantaged by the current lack of services, resources and skilled professionals in the field of deafness and psychology in this country. The primary aim of the following program of research has been to propose a model for culturally affirmative service delivery and to provide clinicians with tools to evaluate the effect of their therapeutic work with Deaf people seeking mental health treatment. The research document is presented as a thesis by publication and comprises four specific objectives formulated in response to the lack of existing services and resources. The first objective was to explore the use of social constructionist counselling techniques and a reflecting team with Deaf clients, hearing therapists and an interpreter. Following the establishment of a pilot counselling clinic, indepth semi-structured interviews were conducted with two long-term clients following the one year pilot of this service. These interviews generated recommendations for the development of a new 'enriched' model of counselling to be implemented and evaluated in later stages of the research program. The second objective was to identify appropriate psychometric measures that could be translated into Australian Sign Language (Auslan) for research into efficacy, effectiveness and counselling outcomes. Two instruments were identified as potentially suitable; the Outcome Rating Scale (ORS), a measure of global functioning, and the Session Rating Scale (SRS), a measure of therapeutic alliance. A specialised team of bi-lingual and bi-cultural interpreters, native signers and the primary researcher for this thesis, produced the ORS-Auslan and the SRS-Auslan in DVD format, using the translation and back-translation process. The third objective was to establish the validity and reliability of these new Auslan measures based on normative data from the Deaf community. Data from the ORS-Auslan was collected from one clinical and one non-clinical sample of Deaf people. Statistical analyses revealed that the ORS-Auslan is reliable, valid and adequately distinguishes between clinical and non-clinical presentations. Furthermore, construct validity has been established using a yet to be validated sign language version of the Depression, Anxiety and Stress Scale-21 items (DASS-21), providing a platform for further research using the DASS-21 with Deaf people. The fourth objective was to evaluate counselling outcomes following the implementation of an enriched counselling service, based on the findings generated by the first objective, and using the newly translated Auslan measures. A second university counselling clinic was established and implemented over the course of one year. Practice-based evidence guided the research and the ORS-Auslan and the SRS-Auslan were administered at every session and provided outcome data on Deaf clients' global functioning. Data from six clients over the course of ten months indicated that this culturally affirmative model was an effective approach for these six clients. This is the first time that outcome data have been collected in Australia using valid and reliable Auslan measures to establish preliminary evidence for the effectiveness of any therapeutic intervention for clinical work with adult, signing Deaf clients. The research generated by this thesis contributes theoretical knowledge, professional development and practical resources that can be used by a variety of mental health clinicians in the context of mental health service delivery to Deaf clients in Australia.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Most one-round key exchange protocols provide only weak forward secrecy at best. Furthermore, one-round protocols with strong forward secrecy often break badly when faced with an adversary who can obtain ephemeral keys. We provide a characterisation of how strong forward secrecy can be achieved in one-round key exchange. Moreover, we show that protocols exist which provide strong forward secrecy and remain secure with weak forward secrecy even when the adversary is allowed to obtain ephemeral keys. We provide a compiler to achieve this for any existing secure protocol with weak forward secrecy.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

While prior research has addressed how collective workplace outcomes are negotiated between employers and trade unions, less attention has been afforded to the ‘everyday’, micro-level exchanges between managers and employees in adjusting work, alongside the ‘standard’ terms and conditions set out in employment contracts. Building on previous work on idiosyncratic deals and requests for flexible scheduling, this article presents the findings from a survey of Australian parents which addressed manager-employee exchanges which led to customized work arrangements. The survey examined the frequency with which various employment terms and conditions were negotiated, who initiated the interactions, where they occurred, and the extent of perceived compromise. The study revealed that manager-employee exchanges occur frequently in the context of roles in nuclear and extended families, and are influenced by the parameters around which formal childcare and educational settings function. Women rated the exchanges as more important than men, but men and women were similarly comfortable with the interactions and satisfied with outcomes. The findings have important implications for managers and organizations in terms of balancing the goals of efficiency with employees’ preferences for workplace flexibility and other terms beyond those which are standardized.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The exchange of iron species from iron (III) chloride solutions with a strong acid cation resin has been investigated in relation to a variety of water and wastewater applications. A detailed equilibrium isotherm analysis was conducted wherein models such as Langmuir Vageler, Competitive Langmuir, Freundlich, Temkin, Dubinin Astakhov, Sips and Brouers-Sotolongo were applied to the experimental data. An important conclusion was that both the bottle-point method and solution normality used to generate the ion exchange equilibrium information influenced which sorption model fitted the isotherm profiles optimally. Invariably, the calculated value for the maximum loading of iron on strong acid cation resin was substantially higher than the value of 47.1 g/kg of resin which would occur if one Fe3+ ion exchanged for three “H+” sites on the resin surface. Consequently, it was suggested that above pH 1, various iron complexes sorbed to the resin in a manner which required less than 3 sites per iron moiety. Column trials suggested that the iron loading was 86.6 g/kg of resin when 1342 mg/L Fe (III) ions in water were flowed at 31.7 bed volumes per hour. Regeneration with 5 to 10 % HCl solutions reclaimed approximately 90 % of exchange sites.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

BACKGROUND CONTEXT: The Neck Disability Index frequently is used to measure outcomes of the neck. The statistical rigor of the Neck Disability Index has been assessed with conflicting outcomes. To date, Confirmatory Factor Analysis of the Neck Disability Index has not been reported for a suitably large population study. Because the Neck Disability Index is not a condition-specific measure of neck function, initial Confirmatory Factor Analysis should consider problematic neck patients as a homogenous group. PURPOSE: We sought to analyze the factor structure of the Neck Disability Index through Confirmatory Factor Analysis in a symptomatic, homogeneous, neck population, with respect to pooled populations and gender subgroups. STUDY DESIGN: This was a secondary analysis of pooled data. PATIENT SAMPLE: A total of 1,278 symptomatic neck patients (67.5% female, median age 41 years), 803 nonspecific and 475 with whiplash-associated disorder. OUTCOME MEASURES: The Neck Disability Index was used to measure outcomes. METHODS: We analyzed pooled baseline data from six independent studies of patients with neck problems who completed Neck Disability Index questionnaires at baseline. The Confirmatory Factor Analysis was considered in three scenarios: the full sample and separate sexes. Models were compared empirically for best fit. RESULTS: Two-factor models have good psychometric properties across both the pooled and sex subgroups. However, according to these analyses, the one-factor solution is preferable from both a statistical perspective and parsimony. The two-factor model was close to significant for the male subgroup (p<.07) where questions separated into constructs of mental function (pain, reading headaches and concentration) and physical function (personal care, lifting, work, driving, sleep, and recreation). CONCLUSIONS: The Neck Disability Index demonstrated a one-factor structure when analyzed by Confirmatory Factor Analysis in a pooled, homogenous sample of neck problem patients. However, a two-factor model did approach significance for male subjects where questions separated into constructs of mental and physical function. Further investigations in different conditions, subgroup and sex-specific populations are warranted.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The issue of ‘rigour vs. relevance’ in IS research has generated an intense, heated debate for over a decade. It is possible to identify, however, only a limited number of contributions on how to increase the relevance of IS research without compromising its rigour. Based on a lifecycle view of IS research, we propose the notion of ‘reality checks’ in order to review IS research outcomes in the light of actual industry demands. We assume that five barriers impact the efficient transfer of IS research outcomes; they are lack of awareness, lack of understandability, lack of relevance, lack of timeliness, and lack of applicability. In seeking to understand the effect of these barriers on the transfer of mature IS research into practice, we used focus groups. We chose DeLone and McLean’s IS success model as our stimulus because it is one of the more widely researched areas of IS.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Business Process Management (BPM) has been identified as the number one business priority by a recent Gartner study (Gartner, 2005). However, BPM has a plethora of facets as its origins are in Business Process Reengineering, Process Innovation, Process Modelling, and Workflow Management to name a few. Organisations increasingly recognize the requirement for an increased process orientation and require appropriate comprehensive frameworks, which help to scope and evaluate their BPM initiative. This research project aims toward the development of a holistic and widely accepted BPM maturity model, which facilitates the assessment of BPM capabilities. This paper provides an overview about the current model with a focus on the actual model development utilizing a series of Delphi studies. The development process includes separate studies that focus on further defining and expanding the six core factors within the model, i.e. strategic alignment, governance, method, Information Technology, people and culture.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The firm is faced with a decision concerning the nature of intra-organizational exchange relationships with internal human resources and the nature or inter-organizational exchange relationships with market firms. In both situations, the firm can develop an exchange that ranges from a discrete exchange to a relational exchange. Transaction Cost Economics (TCE) and the Resource Dependency View (RDV) represent alternative efficiency-based explanations fo the nature of the exchange relationship. The aim of the paper is to test these two theories in respect of air conditioning maintenance in retail centres. Multiple sources of information are genereated from case studies of Australian retail centres to test these theories in respoect of internalized operations management (concerning strategic aspects of air conditioning maintenance) and externalized planned routine air conditioning maintenance. The analysis of the data centres on pattern matching. It is concluded that the data supports TCE - on the basis of a development in TCE's contractual schema. Further research is suggested towards taking a pluralistic stance and developing a combined efficiency and power hypothesis - upon which Williamson has speculated. For practice, the conclusions also offer a timely cautionary note concerning the adoption of one approach in all exchange relationships.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.