56 resultados para distributive lattices
Resumo:
One of the core values to be applied by a body reviewing the ethics of human research is justice. The inclusion of justice as a requirement in the ethical review of human research is relatively recent and its utility had been largely unexamined until debates arose about the conduct of international biomedical research in the late 1990s. The subsequent amendment of authoritative documents in ways that appeared to shift the meaning of conceptions of justice generated a deal of controversy. Another difficulty has been that both the theory and the substance of justice that are applied by researchers or reviewers can be frequently seen to be subjective. Both the concept of justice – whether distributive or commutative - and what counts as a just distribution or exchange – are given different weight and meanings by different people. In this paper, the origins and more recent debates about the requirement to consider justice as a criterion in the ethical review of human research are traced, relevant conceptions of justice are distinguished and the manner in which they can be applied meaningfully in the ethical review all human research is identified. The way that these concepts are articulated in, and the intent and function of, specific paragraphs of the National Statement on Ethical Conduct in Human Research (NHMRC, ARC, UA, 2007) (National Statement) is explained. The National Statement identifies a number of issues that should be considered when a human research ethics committee is reviewing the justice aspects of an application. It also provides guidance to researchers as to how they can show that there is a fair distribution of burdens and benefits in the participant experience and the research outcomes. It also provides practical guidance to researchers on how to think through issues of justice so that they can demonstrate that the design of their research projects meets this ethical requirement is also provided
Resumo:
In this paper, we identify two types of injustice as antecedents of abusive supervision and ultimately of subordinate psychological distress and insomnia. We examine distributive justice (an individual's evaluation of their input to output ratio compared to relevant others) and interactional injustice (the quality of interpersonal treatment received when procedures are implemented). Using a sample of Filipinos in a variety of occupations, we identify two types of injustice experienced by supervisors as stressors that provoke them to display abusive supervision to their subordinates. We examine two consequences of abusive supervision - subordinate psychological distress and insomnia. In addition, we identify two moderators of these relationships, namely, supervisor distress and subordinate self-esteem. We collected survey data from multiple sources including subordinates, their supervisors, and their partners. Data were obtained from 175 matched supervisor-subordinate dyads over a 6-month period, with subordinates' partners providing ratings of insomnia. Results of structural equation modelling analyses provided support for an indirect effects model in which supervisors' experience of unfair treatment cascades down the organization, resulting in subordinate psychological distress and, ultimately in their insomnia. In addition, results partially supported the proposed moderated relationships in the cascading model. © 2010 Taylor & Francis.
Resumo:
This article describes the first steps toward comprehensive characterization of molecular transport within scaffolds for tissue engineering. The scaffolds were fabricated using a novel melt electrospinning technique capable of constructing 3D lattices of layered polymer fibers with well - defined internal microarchitectures. The general morphology and structure order was then determined using T 2 - weighted magnetic resonance imaging and X - ray microcomputed tomography. Diffusion tensor microimaging was used to measure the time - dependent diffusivity and diffusion anisotropy within the scaffolds. The measured diffusion tensors were anisotropic and consistent with the cross - hatched geometry of the scaffolds: diffusion was least restricted in the direction perpendicular to the fiber layers. The results demonstrate that the cross - hatched scaffold structure preferentially promotes molecular transport vertically through the layers ( z - axis), with more restricted diffusion in the directions of the fiber layers ( x – y plane). Diffusivity in the x – y plane was observed to be invariant to the fiber thickness. The characteristic pore size of the fiber scaffolds can be probed by sampling the diffusion tensor at multiple diffusion times. Prospective application of diffusion tensor imaging for the real - time monitoring of tissue maturation and nutrient transport pathways within tissue engineering scaffolds is discussed.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (Geometry of Numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
The recent growth of the coal seam gas industry has increased pressure on regional communities. Debate surrounding the industry is intense and a social licence to operate has yet to be granted to the industry in its entirety. This article presents an analysis of social issues surrounding the coal seam gas industry, making comparisons between two case studies: the Ranger and Jabiluka mines and the Yandicoogina mine. It presents the results of a desktop study, focussed on three topics: community identity; procedural justice and distributive justice, which provides a means for comparison and draws attention to central concerns. It is found that: power imbalances; changing community identities; potentially inequitable distributions of long term benefits and the process to distribute those benefits and negative perceptions of the industry as a whole serve to undermine the provision of a social licence to operate by communities and has the potential to impose significant negative impacts on companies within the industry.
Resumo:
This article will discuss some real life case examples of what will be termed “lawyers behaving badly” where it will be argued that legal representatives have not performed as effectively as they could have in mediation settings. These instances of “lawyer misbehaviour” will be grouped under several broad headings: the Process Thwarter, the Zealous Adversarial Advocate, the Misguided Advisor, the Distributive Bargainer, the Passive Advocate, and the Legal Takeover. Reflecting on these situations will provide guidance to legal educators as to the specific areas of dispute resolution knowledge and skills that future lawyers need to learn and develop.
Resumo:
Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some information on the secret, namely the shape of the parallelepiped, which has been exploited on practical attacks [24]. NTRUSign was an extremely efficient scheme, and thus there has been a noticeable interest on developing countermeasures to the attacks, but with little success [6]. In [8] Gentry, Peikert and Vaikuntanathan proposed a randomized version of Babai’s nearest plane algorithm such that the distribution of a reduced vector modulo a secret parallelepiped only depended on the size of the base used. Using this algorithm and generating large, close to uniform, public keys they managed to get provably secure GGH-like lattice-based signatures. Recently, Stehlé and Steinfeld obtained a provably secure scheme very close to NTRUSign [26] (from a theoretical point of view). In this paper we present an alternative approach to seal the leak of NTRUSign. Instead of modifying the lattices and algorithms used, we do a classic leaky NTRUSign signature and hide it with gaussian noise using techniques present in Lyubashevky’s signatures. Our main contributions are thus a set of strong NTRUSign parameters, obtained by taking into account latest known attacks against the scheme, a statistical way to hide the leaky NTRU signature so that this particular instantiation of CVP-based signature scheme becomes zero-knowledge and secure against forgeries, based on the worst-case hardness of the O~(N1.5)-Shortest Independent Vector Problem over NTRU lattices. Finally, we give a set of concrete parameters to gauge the efficiency of the obtained signature scheme.
Resumo:
Nth-Dimensional Truncated Polynomial Ring (NTRU) is a lattice-based public-key cryptosystem that offers encryption and digital signature solutions. It was designed by Silverman, Hoffstein and Pipher. The NTRU cryptosystem was patented by NTRU Cryptosystems Inc. (which was later acquired by Security Innovations) and available as IEEE 1363.1 and X9.98 standards. NTRU is resistant to attacks based on Quantum computing, to which the standard RSA and ECC public-key cryptosystems are vulnerable to. In addition, NTRU has higher performance advantages over these cryptosystems. Considering this importance of NTRU, it is highly recommended to adopt NTRU as part of a cipher suite along with widely used cryptosystems for internet security protocols and applications. In this paper, we present our analytical study on the implementation of NTRU encryption scheme which serves as a guideline for security practitioners who are novice to lattice-based cryptography or even cryptography. In particular, we show some non-trivial issues that should be considered towards a secure and efficient NTRU implementation.
Resumo:
To date, a number of two-dimensional (2D) topological insulators (TIs) have been realized in Group 14 elemental honeycomb lattices, but all are inversionsymmetric. Here, based on first-principles calculations, we predict a new family of 2D inversion-asymmetric TIs with sizeable bulk gaps from 105 meV to 284 meV, in X2–GeSn (X = H, F, Cl, Br, I) monolayers, making them in principle suitable for room-temperature applications. The nontrivial topological characteristics of inverted band orders are identified in pristine X2–GeSn with X = (F, Cl, Br, I), whereas H2–GeSn undergoes a nontrivial band inversion at 8% lattice expansion. Topologically protected edge states are identified in X2–GeSn with X = (F, Cl, Br, I), as well as in strained H2–GeSn. More importantly, the edges of these systems, which exhibit single-Dirac-cone characteristics located exactly in the middle of their bulk band gaps, are ideal for dissipationless transport. Thus, Group 14 elemental honeycomb lattices provide a fascinating playground for the manipulation of quantum states.
Resumo:
In this thesis the use of enforceable undertakings is examined as a sanction for a breach in work, health and safety legislation through the lens of organisational justice. A framework of justice types - distributive, procedural and interactional - is developed and the perceptions of the three parties to the process - the regulator, the business entity and the worker as the affected third party - are explored. It is argued that the three parties perceive the sanction to be distributively unfair, but procedurally and interactionally just.
Resumo:
The development of low energy cost membranes to separate He from noble gas mixtures is highly desired. In this work, we studied He purification using recently experimentally realized, two-dimensional stanene (2D Sn) and decorated 2D Sn (SnH and SnF) honeycomb lattices by density functional theory calculations. To increase the permeability of noble gases through pristine 2D Sn at room temperature (298 K), two practical strategies (i.e., the application of strain and functionalization) are proposed. With their high concentration of large pores, 2D Sn-based membrane materials demonstrate excellent helium purification and can serve as a superior membrane over traditionally used, porous materials. In addition, the separation performance of these 2D Sn-based membrane materials can be significantly tuned by application of strain to optimize the He purification properties by taking both diffusion and selectivity into account. Our results are the first calculations of He separation in a defect-free honeycomb lattice, highlighting new interesting materials for helium separation for future experimental validation.