667 resultados para Non- Commutative Ring


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Boolean functions and their Möbius transforms are involved in logical calculation, digital communications, coding theory and modern cryptography. So far, little is known about the relations of Boolean functions and their Möbius transforms. This work is composed of three parts. In the first part, we present relations between a Boolean function and its Möbius transform so as to convert the truth table/algebraic normal form (ANF) to the ANF/truth table of a function in different conditions. In the second part, we focus on the special case when a Boolean function is identical to its Möbius transform. We call such functions coincident. In the third part, we generalize the concept of coincident functions and indicate that any Boolean function has the coincidence property even it is not coincident.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aimed to examine the use of hospital emergency departments and to investigate the level of satisfaction with the emergency department service among patients from a non-English-speaking background compared to those of patients from an English-speaking background in Queensland. The findings of this study might inform health professionals and policy planners to develop educational interventions and policies to ensure equitable use of emergency services among the populations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study was to contrast the role of parental and non-parental (sibling, other family and non-family) supervisors in the supervision of learner drivers in graduated driver licensing systems. The sample consisted of 522 supervisors from the Australian states of Queensland (n = 204, 39%) and New South Wales (n = 318, 61%). The learner licence requirements in these two states are similar, although learners in Queensland are required to accrue 100 h of supervision in a log book while those in New South Wales are required to accrue 120 h. Approximately 50 per cent of the sample (n = 255) were parents of the learner driver while the remainder of the sample were either siblings (n = 72, 13.8%), other family members (n = 153, 29.3%) or non-family (n = 114, 21.8%). Parents were more likely than siblings, other family or non-family members to be the primary supervisor of the learner driver. Siblings provided fewer hours of practice when compared with other supervisor types while the median and mode suggest that parents provided the most hours of practice to learner drivers. This study demonstrates that non-parental supervisors, such as siblings, other family members and non-family, at least in jurisdictions that require 100 or 120 h of practice, are important in facilitating learner drivers to accumulate sufficient supervised driving practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The double Friedel–Crafts acylation of readily accessible biaryls with oxalyl chloride delivers the respective phenanthrene-9,10-diones, providing an alternative to the traditional methods, which require harsh oxidizing conditions and multistep sequences. This simple method allows the synthesis of various symmetrical and non-symmetrical targets, and is even effective for the synthesis of the parent ring system from (unactivated) biphenyl.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Obtaining attribute values of non-chosen alternatives in a revealed preference context is challenging because non-chosen alternative attributes are unobserved by choosers, chooser perceptions of attribute values may not reflect reality, existing methods for imputing these values suffer from shortcomings, and obtaining non-chosen attribute values is resource intensive. This paper presents a unique Bayesian (multiple) Imputation Multinomial Logit model that imputes unobserved travel times and distances of non-chosen travel modes based on random draws from the conditional posterior distribution of missing values. The calibrated Bayesian (multiple) Imputation Multinomial Logit model imputes non-chosen time and distance values that convincingly replicate observed choice behavior. Although network skims were used for calibration, more realistic data such as supplemental geographically referenced surveys or stated preference data may be preferred. The model is ideally suited for imputing variation in intrazonal non-chosen mode attributes and for assessing the marginal impacts of travel policies, programs, or prices within traffic analysis zones.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The profession of law is deeply steeped in tradition and conservatism, which influences the content and pedagogy employed in law faculties across Australia. Indeed, the practice of law and the institutions of legal education are in a relationship of mutual influence; a dénouement which preserves the best aspects of the common law legal system, but also leaves the way we educate, practice and think about the role of law resistant to change. In this article, the authors lay down a challenge to legal education orthodoxy and a call to arms for legal academic progressivists: that alternative dispute resolution (ADR) should be a compulsory, stand alone subject in the law degree. The authors put forward 10 simple arguments as to why every law student should be exposed to a semester-long course of ADR instruction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Some initial EUVL patterning results for polycarbonate based non-chemically amplified resists are presented. Without full optimization the developer a resolution of 60 nm line spaces could be obtained. With slight overexposure (1.4 × E0) 43.5 nm lines at a half pitch of 50 nm could be printed. At 2x E0 a 28.6 nm lines at a half pitch of 50 nm could be obtained with a LER that was just above expected for mask roughness. Upon being irradiated with EUV photons, these polymers undergo chain scission with the loss of carbon dioxide and carbon monoxide. The remaining photoproducts appear to be non-volatile under standard EUV irradiation conditions, but do exhibit increased solubility in developer compared to the unirradiated polymer. The sensitivity of the polymers to EUV light is related to their oxygen content and ways to increase the sensitivity of the polymers to 10 mJ cm-2 is discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three strategies for approaching the design and synthesis of non-chemically amplified resists (non-CARs) are presented. These are linear polycarbonates, star polyester-blk-poly(methyl methacrylate) and comb polymers with polysulfone backbones. The linear polycarbonates were designed to cleave when irradiated with 92 eV photons and high Tg alicyclic groups were incorporated into the backbone to increase Tg and etch resistance. The star block copolymers were designed to have a core that is sensitive to 92 eV photons and arms that have the potential to provide properties such as high Tg and etch resistance. Similarly the polysulfone comb polymers were designed to have an easily degradable polymer backbone and comb-arms that impart favorable physical properties. Initial patterning results are presented for a number of the systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents ongoing work toward constructing efficient completely non-malleable public-key encryption scheme based on lattices in the standard (common reference string) model. An encryption scheme is completely non-malleable if it requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti proposed two inefficient constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Recently, two efficient public-key encryption schemes have been proposed, both of them are based on pairing identity-based encryption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this study was to assess the accuracy of placement of pelvic binders and to determine whether circumferential compression at the level of the greater trochanters is the best method of reducing a symphyseal diastasis. Patients were identified by a retrospective review of all pelvic radiographs performed at a military hospital over a period of 30 months. We analysed any pelvic radiograph on which the buckle of the pelvic binder was clearly visible. The patients were divided into groups according to the position of the buckle in relation to the greater trochanters: high, trochanteric or low. Reduction of the symphyseal diastasis was measured in a subgroup of patients with an open-book fracture, which consisted of an injury to the symphysis and disruption of the posterior pelvic arch (AO/OTA 61-B/C). We identified 172 radiographs with a visible pelvic binder. Five cases were excluded due to inadequate radiographs. In 83 (50%) the binder was positioned at the level of the greater trochanters. A high position was the most common site of inaccurate placement, occurring in 65 (39%). Seventeen patients were identified as a subgroup to assess the effect of the position of the binder on reduction of the diastasis. The mean gap was 2.8 times greater (mean difference 22 mm) in the high group compared with the trochanteric group (p < 0.01). Application of a pelvic binder above the level of the greater trochanters is common and is an inadequate method of reducing pelvic fractures and is likely to delay cardiovascular recovery in these seriously injured patients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Deprotonated o, m-, and p-methoxyacetanilide show pronounced peaks in their collision-induced tandem mass spectra (MS/MS) produced by losses of the elements of C2H6. It is proposed that this reaction is a 'cross-ring' internal S(N)2 reaction involving an incipient methyl anion. For example, p-CH3O-C6H4-N--CO-CH3--> [(p.CH3O-C6H4-N=C=O)CH3-]--> O---C6H4-N=C=O+C2H6.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The M¨obius transform of Boolean functions is often involved in cryptographic design and analysis. As studied previously, a Boolean function f is said to be coincident if it is identical with its M¨obius transform fμ, i.e., f = fμ...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The wind field of an intense idealised downburst wind storm has been studied using an axisymmetric, dry, non-hydrostatic numerical sub-cloud model. The downburst driving processes of evaporation and melting have been paramaterized by an imposed cooling source that triggers and sustains a downdraft. The simulated downburst exhibits many characteristics of observed full-scale downburst events, in particular the presence of a primary and counter rotating secondary ring vortex at the leading edge of the diverging front. The counter-rotating vortex is shown to significantly influence the development and structure of the outflow. Numerical forcing and environmental characteristics have been systematically varied to determine the influence on the outflow wind field. Normalised wind structure at the time of peak outflow intensity was generally shown to remain constant for all simulations. Enveloped velocity profiles considering the velocity structure throughout the entire storm event show much more scatter. Assessing the available kinetic energy within each simulated storm event, it is shown that the simulated downburst wind events had significantly less energy available for loading isolated structures when compared with atmospheric boundary layer winds. The discrepancy is shown to be particularly prevalent when wind speeds were integrated over heights representative of tall buildings. A similar analysis for available full scale measurements led to similar findings.