64 resultados para initialisation flaws
Resumo:
Anthony Downs public choice theory proposes that every rational person would try to meet their own desires in preference to those of others, and that such rational persons would attempt to obtain these desires in the most efficient manner possible. This paper will demonstrate that the application of this theory would mean that public servants and politicians would perform acts of corruption and maladministration in order to efficiently meet their desires. As such action is unavoidable, political parties must appear to meet the public demand for accountability systems, but must not make these systems viable lest they expose the corruption and maladministration that would threaten the government’s chance or re-election. It is therefore logical for governments to display a commitment for accountability whilst simultaneously ensuring the systems would not be able to interfere with government control or expose its flaws.
Resumo:
U-Healthcare means that it provides healthcare services "at anytime and anywhere" using wired, wireless and ubiquitous sensor network technologies. As a main field of U-healthcare, Telehealth has been developed as an enhancement of Telemedicine. This system includes two-way interactive web-video communications, sensor technology, and health informatics. With these components, it will assist patients to receive their first initial diagnosis. Futhermore, Telehealth will help doctors diagnose patient's diseases at early stages and recommend treatments to patients. However, this system has a few limitations such as privacy issues, interruption of real-time service and a wrong ordering from remote diagnosis. To deal with those flaws, security procedures such as authorised access should be applied to as an indispensible component in medical environment. As a consequence, Telehealth system with these protection procedures in clinical services will cope with anticipated vulnerabilities of U-Healthcare services and security issues involved.
Resumo:
Background: Patients with chest pain contribute substantially to emergency department attendances, lengthy hospital stay, and inpatient admissions. A reliable, reproducible, and fast process to identify patients presenting with chest pain who have a low short-term risk of a major adverse cardiac event is needed to facilitate early discharge. We aimed to prospectively validate the safety of a predefined 2-h accelerated diagnostic protocol (ADP) to assess patients presenting to the emergency department with chest pain symptoms suggestive of acute coronary syndrome. Methods: This observational study was undertaken in 14 emergency departments in nine countries in the Asia-Pacific region, in patients aged 18 years and older with at least 5 min of chest pain. The ADP included use of a structured pre-test probability scoring method (Thrombolysis in Myocardial Infarction [TIMI] score), electrocardiograph, and point-of-care biomarker panel of troponin, creatine kinase MB, and myoglobin. The primary endpoint was major adverse cardiac events within 30 days after initial presentation (including initial hospital attendance). This trial is registered with the Australia-New Zealand Clinical Trials Registry, number ACTRN12609000283279. Findings: 3582 consecutive patients were recruited and completed 30-day follow-up. 421 (11•8%) patients had a major adverse cardiac event. The ADP classified 352 (9•8%) patients as low risk and potentially suitable for early discharge. A major adverse cardiac event occurred in three (0•9%) of these patients, giving the ADP a sensitivity of 99•3% (95% CI 97•9–99•8), a negative predictive value of 99•1% (97•3–99•8), and a specificity of 11•0% (10•0–12•2). Interpretation: This novel ADP identifies patients at very low risk of a short-term major adverse cardiac event who might be suitable for early discharge. Such an approach could be used to decrease the overall observation periods and admissions for chest pain. The components needed for the implementation of this strategy are widely available. The ADP has the potential to affect health-service delivery worldwide.
Resumo:
This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural components similar to the well-known Grain cipher and the LILI family of keystream generators. Mixer uses a 128-bit key and 64-bit IV to initialise a 217-bit internal state. The analysis is focused on the initialisation function of Mixer and shows that there exist multiple key-IV pairs which, after initialisation, produce the same initial state, and consequently will generate the same keystream. Furthermore, if the number of iterations of the state update function performed during initialisation is increased, then the number of distinct initial states that can be obtained decreases. It is also shown that there exist some distinct initial states which produce the same keystream, resulting in a further reduction of the effective key space
Resumo:
This paper examines the instances and motivations for noble cause corruption perpetrated by NSW police officers. Noble cause corruption occurs when a person tries to produce a just outcome through unjust methods, for example, police manipulating evidence to ensure a conviction of a known offender. Normal integrity regime initiatives are unlikely to halt noble cause corruption as its basis lies in an attempt to do good by compensating for the apparent flaws in an unjust system. This paper suggests that the solution lies in a change of culture through improved leadership and uses the political theories of Roger Myerson to propose a possible solution. Evidence from police officers in transcripts of the Wood Inquiry (1997) are examined to discern their participation in noble cause corruption and their rationalisation of this behaviour. The overall findings are that officers were motivated to indulge in this type of corruption through a desire to produce convictions where they felt the system unfairly worked against their ability to do their job correctly. We have added to the literature by demonstrating that the rewards can be positive. Police are seeking job satisfaction through the ability to convict the guilty. They will be able to do this through better equipment and investigative powers.
Resumo:
Introduction: Evidence concerning the alteration of knee function during landing suffers from a lack of consensus. This uncertainty can be attributed to methodological flaws, particularly in relation to the statistical analysis of variable human movement data. Aim: The aim of this study was to compare single-subject and group analysis in quantifying alterations in the magnitude and within-participant variability of knee mechanics during a step landing task. Methods: A group of healthy men (N = 12) stepped-down from a knee-high platform for 60 consecutive trials, each trial separated by a 1-minute rest. The magnitude and within-participant variability of sagittal knee stiffness and coordination of the landing leg during the immediate postimpact period were evaluated. Coordination of the knee was quantified in the sagittal plane by calculating the mean absolute relative phase of sagittal shank and thigh motion (MARP1) and between knee rotation and knee flexion (MARP2). Changes across trials were compared between both group and single-subject statistical analyses. Results: The group analysis detected significant reductions in MARP1 magnitude. However, the single-subject analyses detected changes in all dependent variables, which included increases in variability with task repetition. Between-individual variation was also present in the timing, size and direction of alterations to task repetition. Conclusion: The results have important implications for the interpretation of existing information regarding the adaptation of knee mechanics to interventions such as fatigue, footwear or landing height. It is proposed that a familiarisation session be incorporated in future experiments on a single-subject basis prior to an intervention.
Resumo:
Dhaka, the capital of Bangladesh, is facing severe traffic congestion. Owing to the flaws in past land use and transport planning decisions, uncontrolled population growth and urbanization, Dhaka’s traffic condition is worsening. Road space is widely regarded in the literature as a utility, so a common view of transport economists is that its usage ought to be charged. Road pricing policy has proven to be effective in managing travel demand, in order to reduce traffic congestion from road networks in a number of cities including London, Stockholm and Singapore. Road pricing as an economic mechanism to manage travel demand can be more effective and user-friendly when revenue is hypothecated into supply alternatives such as improvements to the transit system. This research investigates the feasibility of adopting road pricing in Dhaka with respect to a significant Bus Rapid Transit (BRT) project. Because both are very new concepts for the population of Dhaka, public acceptability would be a principal issue driving their success or failure. This paper explores the travel behaviour of workers in Dhaka and public perception toward Road Pricing with regards to work trips- based on worker’s travel behaviour. A revealed preference and stated preference survey has been conducted on sample of workers in Dhaka. They were asked limited demographic questions, their current travel behaviour and at the end they had been given several hypothetical choices of integrated BRT and road pricing to choose from. Key finding from the survey is the objective of integrated road pricing; subsidies Bus rapid Transit by road pricing to get reduced BRT fare; cannot be achieved in Dhaka. This is because most of the respondent stated that they would choose the cheapest option Walk-BRT-Walk, even though this would be more time consuming and uncomfortable as they have to walk from home to BRT station and also from BRT station to home. Proper economic analysis has to be carried out to find out the appropriate fare of BRT and road charge with some incentive for the low income people.
Resumo:
These are challenging times for new entrepreneurial firms. The development of the Global Financial Crisis shook the very foundations of global markets and institutions that most firms relied on to do business (Claessens, et al., forthcoming). In the midst of institutional flux and resource constraints, entrepreneurial firms, which have been shown to make a range of contributions to the economy (van Praag & Versloot 2007) faced increasing constraints. The Australian Federal Government quickly implemented the Green Loan program in response to the financial crisis. Unfortunately, the green loans program was flawed with obsolete processes and information (Faulkner, 2011), further constraining new firms. Prior research provides few clues regarding how resource-constrained entrepreneurial firms deal with these institutional flaws within institutional change and how they might overcome these challenges and prosper. One promising theory that evaluates behavioural responses to constraints and institutional flaws is bricolage (Levi Strauss, 1967). Bricolage aligns with notions of resourcefulness: defined here as “making do by applying combinations of the resources at hand to new problems and opportunities” (Baker and Nelson 2005: 333). Using three case studies, we consider how institutional flaws impact firm behaviours and illustrate the use of bricolage in attempts to reinforce, shape and change the GL program further extending bricolage domains of Baker and Nelson (2005).
Resumo:
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.
Resumo:
Well-designed initialisation and keystream generation processes for stream ciphers should ensure that each key-IV pair generates a distinct keystream. In this paper, we analyse some ciphers where this does not happen due to state convergence occurring either during initialisation, keystream generation or both. We show how state convergence occurs in each case and identify two mechanisms which can cause state convergence.
Resumo:
Objective The aim of this study was to examine the prevalence of overweight and obesity and the association with demographic, reproductive work variables in a representative cohort of working nurses and midwives. Design A cross sectional study of self reported survey data. Settings Australia, New Zealand and the United Kingdom. Methods Measurement outcomes included BMI categories, demographic (age, gender, marital status, ethnicity), reproductive (parity, number of births, mother's age at first birth, birth type and menopausal status) and workforce (registration council, employment type and principal specialty) variables. Participants 4996 respondents to the Nurses and Midwives e-Cohort study who were currently registered and working in nursing or midwifery in Australia (n=3144), New Zealand (n=778) or the United Kingdom (n=1074). Results Amongst the sample 61.87% were outside the healthy weight range and across all three jurisdictions the prevalence of obesity in nurses and midwives exceeded rates in the source populations by 1.73% up to 3.74%. Being overweight or obese was significantly associated with increasing age (35–44 yrs aOR 1.71, 95% CI 1.41–2.08; 45–55 yrs aOR 1.90, 95%CI 1.56–2.31; 55–64 aOR 2.22, 95% CI 1.71–2.88), and male gender (aOR 1.46, 95% CI 1.15–1.87). Primiparous nurses and midwives were more likely to be overweight or obese (aOR 1.37, 95% CI 1.06–1.76) as were those who had reached menopause (aOR 1.37, 95% CI 1.11–1.69). Nurses and midwives in part-time or casual employment had significantly reduced risk of being overweight or obese, (aOR 0.81, 95% CI 0.70–0.94 and aOR 0.75, 95% CI 0.59–0.96 respectively), whilst working in aged carried increased risk (aOR 1.37, 95% CI 1.04–1.80). Conclusion Nurses and midwives in this study have higher prevalence of obesity and overweight than the general population and those who are older, male, or female primiparous and menopausal have significantly higher risk of overweight or obesity as do those working fulltime, or in aged care. The consequences of overweight and obesity in this occupational group may impact on their workforce participation, their management of overweight and obese patients in their care as well as influencing their individual health behaviours and risks of occupational injury and chronic disease.
Resumo:
Yates et al (1996) provided a review of the literature on educational approaches to improving psychosocial care of terminally ill patients and their families and suggested that there was an urgent need for innovation in this area. A programme of professional development currently being offered to 181 palliative care nurses in Queensland, Australia, was also described. This paper presents research in progress evaluating this programme which involves use of a quasi-experimental pre-post test design. It also includes process and outcome measures to assess effectiveness in improving the participant's ability to provide psychosocial care to patients and families. Research examining the effectiveness of various educational programmes on care of the dying has offered equivocal results (Yates et al 1996). Degner and Gow (1988a) noted that the inconsistencies found in research into death education result from inadequate study designs, variations in the conceptualisation and measurement of the outcomes of the programmes and flaws in data analysis. Such studies have often lacked a theoretical basis, few have employed well-controlled experimental designs, and the programme outcomes have generally been limited to the participant's 'death anxiety', or other death attitudes which have been variously defined and measured. Whilst Degner and Gow (1988b) have reported that undergraduate nursing students who participated in a care of the dying educational programme demonstrated more 'approach caring' behaviours than a control group, the impact of education programmes on patient care has rarely been examined. Failure to link education to nursing practice and subsequent clinical outcomes has, however, been seen as a major limitation of nursing knowledge in this area (Degner et al 1991). This paper describes an approach to researching the effectiveness of professional development programmes for palliative care nurses.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
Injured bone initiates the healing process by forming a blood clot at the damaged site. However, in severe damage, synthetic bone implants are used to provide structural integrity and restore the healing process. The implant unavoidably comes into direct contact with whole blood, leading to a blood clot formation on its surface. Despite this, most research in bone tissue engineering virtually ignores the important role of a blood clot in supporting healing. Surface chemistry of a biomaterial is a crucial property in mediating blood-biomaterials interactions, and hence the formation of the resultant blood clot. Surfaces presenting mixtures of functional groups carboxyl (–COOH) and methyl (–CH3) have been shown to enhance platelet response and coagulation activation, leading to the formation of fibrin fibres. In addition, it has been shown that varying the compositions of these functional groups and the length of alkyl groups further modulate the immune complement response. In this study, we hypothesised that a biomaterial surface with mixture of –COOH/–CH3(methyl), –CH2CH3 (ethyl) or –(CH2)3CH3 (butyl) groups at different ratios would modulate blood coagulation and complement activation, and eventually tailor the structural and functional properties of the blood clot formed on the surface, which subsequently impacts new bone formation. Firstly, we synthesised a series of materials composed of acrylic acid (AA), and methyl (MMA), ethyl (EMA) or butyl methacrylates (BMA) at different ratios and coated on the inner surfaces of incubation vials. Our surface analysis showed that the amount of –COOH groups on the surface coatings was lower than the ratios of AA prepared in the materials even though the surface content of –COOH groups increased with increasing in AA ratios. It was indicated that the surface hydrophobicity increased with increasing alkyl chain length: –CH 3 > –CH2CH3 > –(CH2)3CH3, and decreased with increasing –COOH groups. No significant differences in surface hydrophobicity was found on surfaces with –CH3 and –CH2CH3 groups in the presence of –COOH groups. The material coating was as smooth as uncoated glass and without any major flaws. The average roughness of material-coated surface (3.99 ± 0.54 nm) was slightly higher than that of uncoated glass surface (2.22 ± 0.29 nm). However, no significant differences in surface average roughness was found among surfaces with the same functionalities at different –COOH ratios nor among surfaces with different alkyl groups but the same –COOH ratios. These suggested that the surface functional groups and their compositions had a combined effect on modulating surface hydrophobicity but not surface roughness. The second part of our study was to investigate the effect of surface functional groups and their compositions on blood cascade activation and structural properties of the formed clots. It was found that surfaces with –COOH/–(CH2)3CH3 induced a faster coagulation activation than those with –COOH/–CH3 and –CH2CH3, regardless of the –COOH ratios. An increase in –COOH ratios on –COOH/–CH3 and –CH2CH3 surfaces decreased the rate of activation. Moreover, all material-coated surfaces markedly reduced the complement activation compared to uncoated glass surfaces, and the pattern of complement activation was entirely similar to that of surface-induced coagulation, suggesting there is an interaction between two cascades. The clots formed on material-coated surfaces had thicker fibrin with a tighter network at the exterior when compared to uncoated glass surfaces. Compared to the clot exteriors, thicker fibrins with a loose network were found in clot interiors. Coated surfaces resulted in more rigid clots with a significantly slower fibrinolysis after 1 h of lysis when compared to uncoated glass surfaces. Significant differences in fibrinolysis after 1 h of lysis among clots on material-coated surfaces correlated well with the differences in fibrin thickness and density at clot exterior. In addition, more growth factors were released during clot formation than during clot lysis. From an intact clot, there was a correlation between the amount of PDGF-AB release and fibrin density. Highest amount of PDGF-AB was released from clots formed on surfaces with 40% –COOH/60% –CH 3 (i.e. 65MMA). During clot lysis, the release of PDGF-AB also correlated with the fibrinolytic rate while the release of TGF-â1 was influenced by the fibrin thickness. This suggested that different clot structures led to different release profiles of growth factors in clot intact and degrading stages. We further validated whether the clots formed on material-coatings provide the microenvironment for improved bone healing by using a rabbit femoral defect model. In this pilot study, the implantation of clots formed on 65MMA coatings significantly increased new bone formation with enhanced chondrogenesis, osteoblasts activity and vascularisation, but decreased inflammatory macrophage number at the defects after 4 weeks when compared to commercial bone grafts ChronOSTM â-TCP granules. Empty defects were observed when blood clot formation was inhibited. In summary, our study demonstrated that surface functional groups and their relative ratios on material coatings synergistically modulate activation of blood cascades, resultant fibrin architecture, rigidity, susceptibility to fibrinolysis as well as growth factor release of the formed clots, which ultimately alter the healing microenvironment of injured bones.