242 resultados para Unified Model Reference


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents ongoing work toward constructing efficient completely non-malleable public-key encryption scheme based on lattices in the standard (common reference string) model. An encryption scheme is completely non-malleable if it requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti proposed two inefficient constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Recently, two efficient public-key encryption schemes have been proposed, both of them are based on pairing identity-based encryption.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Validation is an important issue in the development and application of Bayesian Belief Network (BBN) models, especially when the outcome of the model cannot be directly observed. Despite this, few frameworks for validating BBNs have been proposed and fewer have been applied to substantive real-world problems. In this paper we adopt the approach by Pitchforth and Mengersen (2013), which includes nine validation tests that each focus on the structure, discretisation, parameterisation and behaviour of the BBNs included in the case study. We describe the process and result of implementing a validation framework on a model of a real airport terminal system with particular reference to its effectiveness in producing a valid model that can be used and understood by operational decision makers. In applying the proposed validation framework we demonstrate the overall validity of the Inbound Passenger Facilitation Model as well as the effectiveness of the validity framework itself.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Curriculum scholars and teachers working for social justice and equity have been caught up in acrimonious and polarizing debates over content, ideology and disciplinary knowledge. At the forefront in cutting through these debates and addressing the practical questions involved, this book is distinctive in looking to the technical form of the curriculum rather than its content for solutions. The editors and contributors, all leading international scholars, advance a unified, principled approach to the design of syllabus documents that aims for high quality/high equity educational outcomes and enhances teacher professionalism.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An increasing concern over the sustainability credentials of food and fiber crops require that farmers and their supply chain partners have access to appropriate and industry-friendly tools to be able to measure and improve the outcomes. This article focuses on one of the sustainability indicators, namely, greenhouse gas (GHG) emissions, and nine internationally accredited carbon footprint calculators were identified and compared on an outcomes basis against the same cropping data from a case study cotton farm. The purpose of this article is to identify the most “appropriate” methodology to be applied by cotton suppliers in this regard. From the analysis of the results, we subsequently propose a new integrated model as the basis for an internationally accredited carbon footprint tool for cotton and show how the model can be applied to evaluate the emission outcomes of different farming practices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The nature of construction projects and their delivery exposes participants to accidents and dangers. Safety climate serves as a frame of reference for employees to make sense of safety measures in the workplace and adapt their behaviors. Though safety climate research abounds, fewer efforts are made to investigate the formation of a safety climate. An effort to explore forming psychological safety climate, an operationalization of safety climate at the individual level, is an appropriate starting point. Taking the view that projects are social processes, this paper develops a conceptual framework of forming the psychological safety climate, and provides a preliminary validation. The model suggests that management can create the desired psychological safety climate by efforts from structural, perceptual, interactive, and cultural perspectives. Future empirical research can be built on the model to provide a more comprehensive and coherent picture of the determinants of safety climate.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud. However, addressing security concerns has been seen as the biggest challenge to the adoption of IT services in the cloud. This study set up a cloud system via VMware suite to emulate hosting unified communications (UC), the integration of two or more real time communication systems, services in the cloud in a laboratory environment. An Internet Protocol Security (IPSec) gateway was also set up to support network-level security for UCaaS against possible security exposures. This study was aimed at analysis of an implementation of UCaaS over IPSec and evaluation of the latency of encrypted UC traffic while protecting that traffic. Our test results show no latency while IPSec is implemented with a G.711 audio codec. However, the performance of the G.722 audio codec with an IPSec implementation affects the overall performance of the UC server. These results give technical advice and guidance to those involved in security controls in UC security on premises as well as in the cloud.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis provides two main contributions. The first one is BP-TRBAC, a unified authorisation model that can support legacy systems as well as business process systems. BP-TRBAC supports specific features that are required by business process environments. BP-TRBAC is designed to be used as an independent enterprise-wide authorisation model, rather than having it as part of the workflow system. It is designed to be the main authorisation model for an organisation. The second contribution is BP-XACML, an authorisation policy language that is designed to represent BPM authorisation policies for business processes. The contribution also includes a policy model for BP-XACML. Using BP-TRBAC as an authorisation model together with BP-XACML as an authorisation policy language will allow an organisation to manage and control authorisation requests from workflow systems and other legacy systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this note, we shortly survey some recent approaches on the approximation of the Bayes factor used in Bayesian hypothesis testing and in Bayesian model choice. In particular, we reassess importance sampling, harmonic mean sampling, and nested sampling from a unified perspective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fleck and Johnson (Int. J. Mech. Sci. 29 (1987) 507) and Fleck et al. (Proc. Inst. Mech. Eng. 206 (1992) 119) have developed foil rolling models which allow for large deformations in the roll profile, including the possibility that the rolls flatten completely. However, these models require computationally expensive iterative solution techniques. A new approach to the approximate solution of the Fleck et al. (1992) Influence Function Model has been developed using both analytic and approximation techniques. The numerical difficulties arising from solving an integral equation in the flattened region have been reduced by applying an Inverse Hilbert Transform to get an analytic expression for the pressure. The method described in this paper is applicable to cases where there is or there is not a flat region.