197 resultados para 128-798A
Resumo:
The LiteSteel Beam (LSB) is a new hollow flange section with a unique geometry consisting of torsionally rigid rectangular hollow flanges and a relatively slender web. It is subjected to lateral distortional buckling when used as flexural members, which reduces its member moment capacity. An investigation into the flexural behaviour of LSBs using experiments and numerical analyses led to the development of new design rules for LSBs subject to lateral distortional buckling. However, the comparison of moment capacity results with the new design rules showed that they were conservative for some LSB sections while slightly unconservative for others due to the effects of section geometry. It is also unknown whether these design rules are applicable to other hollow flange sections such as hollow flange beams (HFB). This paper presents the details of a study into the lateral distortional buckling behaviour of hollow flange sections such as LSBs, HFBs and their variations. A geometrical parameter defined as the ratio of flange torsional rigidity to the major axis flexural rigidity of the web (GJf/EIxweb) was found to be a critical parameter in evaluating the lateral distortional buckling behaviour and moment capacities of hollow flange sections. New design rules were therefore developed by using a member slenderness parameter modified by K, where K is a function of GJf/EIxweb. The new design rules based on the modified slenderness parameter were found to be accurate in calculating the moment capacities of not only LSBs and HFBs, but also other types of hollow flange sections.
Resumo:
This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural components similar to the well-known Grain cipher and the LILI family of keystream generators. Mixer uses a 128-bit key and 64-bit IV to initialise a 217-bit internal state. The analysis is focused on the initialisation function of Mixer and shows that there exist multiple key-IV pairs which, after initialisation, produce the same initial state, and consequently will generate the same keystream. Furthermore, if the number of iterations of the state update function performed during initialisation is increased, then the number of distinct initial states that can be obtained decreases. It is also shown that there exist some distinct initial states which produce the same keystream, resulting in a further reduction of the effective key space
Resumo:
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.
Resumo:
Motor unit number estimation (MUNE) is a method which aims to provide a quantitative indicator of progression of diseases that lead to loss of motor units, such as motor neurone disease. However the development of a reliable, repeatable and fast real-time MUNE method has proved elusive hitherto. Ridall et al. (2007) implement a reversible jump Markov chain Monte Carlo (RJMCMC) algorithm to produce a posterior distribution for the number of motor units using a Bayesian hierarchical model that takes into account biological information about motor unit activation. However we find that the approach can be unreliable for some datasets since it can suffer from poor cross-dimensional mixing. Here we focus on improved inference by marginalising over latent variables to create the likelihood. In particular we explore how this can improve the RJMCMC mixing and investigate alternative approaches that utilise the likelihood (e.g. DIC (Spiegelhalter et al., 2002)). For this model the marginalisation is over latent variables which, for a larger number of motor units, is an intractable summation over all combinations of a set of latent binary variables whose joint sample space increases exponentially with the number of motor units. We provide a tractable and accurate approximation for this quantity and also investigate simulation approaches incorporated into RJMCMC using results of Andrieu and Roberts (2009).
Resumo:
The rate of emotional and behavioral disturbance in children with intellectual disability (ID) is up to four times higher than that of their typically developing peers. It is important to identify these difficulties in children with ID as early as possible to prevent the chronic co-morbidity of ID and psychopathology. Children with ID have traditionally been assessed via proxy reporting, but appropriate and psychometrically rigorous instruments are needed so that children can report on their own emotions and behaviors. In this study, the factor structure of the self-report version of the Strengths and Difficulties Questionnaire (SDQ) was examined in a population of 128 children with ID (mean age = 12 years). Exploratory and Confirmatory Factor Analysis showed a three factor model (comprising Positive Relationships, Negative Behavior and Emotional Competence) to be a better measure than the original five factor SDQ model in this population.
Resumo:
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.
Resumo:
This paper describes a process undertaken to develop and review five clinical vignettes to be used in geriatric nursing educational research. The purpose of this process was to provide valid depictions of delirium and its subtypes and distinguish delirium from dementia. Five vignettes depicting hospital bedside interactions between nursing staff, family, and an older patient who displayed signs of one of the following conditions: delirium (hyper and hypo-active types respectively), dementia, or delirium (both types) superimposed on dementia were constructed. Vignette accuracy and reliability was established using a multistage process that culminated in formal review by a group of ten international nursing and medical delirium experts. The final five vignettes accurately depicted the given scenario as agreed by the experts and were at an appropriate level of simplicity and clarity. Given the increased interest in vignettes for both nursing research and educational purposes, the described method of vignette development and review has the ability to assist other vignette developers in creating reliable representations of their desired clinical scenarios.
Resumo:
Chlamydia pneumoniae is an enigmatic human and animal pathogen. Originally discovered in association with acute human respiratory disease, it is now associated with a remarkably wide range of chronic diseases as well as having a cosmopolitan distribution within the animal kingdom. Molecular typing studies suggest that animal strains are ancestral to human strains and that C. pneumoniae crossed from animals to humans as the result of at least one relatively recent zoonotic event. Whole genome analyses appear to support this concept – the human strains are highly conserved whereas the single animal strain that has been fully sequenced has a larger genome with several notable differences. When compared to the other, better known chlamydial species that is implicated in human infection, Chlamydia trachomatis, C. pneumoniae demonstrates pertinent differences in its cell biology, development, and genome structure. Here, we examine the characteristic facets of C. pneumoniae biology, offering insights into the diversity and evolution of this silent and ancient pathogen.
Resumo:
The decision of Lockrey v Historic Houses Trust of New South Wales [2012] NSWSC 654 raises an interesting issue about the necessity of seeking the consent of the lessor where there is an assignment of a lease between joint tenants who already hold the lease when one joint tenant sells the business operated on the leased premises to the other joint tenant. A secondary issue raised by the proceedings concerns whether the lessor’s consent was unreasonably withheld under the processes under Retail Leases Act 1994 (NSW) (“the Act”) upon the grounds of lack of provision of information as to the remaining lessee’s financial standing.
Resumo:
Olivier Corten’s The Law Against War is a comprehensive, meticulously-researched study of contemporary international law governing the use of armed force in international relations. As a translated and updated version of a 2008 book published in French, it offers valuable insights into the positivist methodology that underpins much of the European scholarship of international law. Corten undertakes a rigorous analysis of state practice from 1945 onwards, with a view to clarifying the current meaning and scope of international law’s prohibition on the use of force. His central argument is that the majority of states remain attached to a strict interpretation of this rule. For Corten, state practice indicates that the doctrines of anticipatory self-defence, pre-emptive force and humanitarian intervention have no basis in contemporary international law. His overall position accords with a traditional, restrictive view of the circumstances in which states are permitted to use force...