101 resultados para Weak star convergence
Resumo:
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for a wide range of applications; such as mobile phone, pay TV and Internet data transmissions. This research examines the features and properties of the initialisation processes of existing stream ciphers to identify flaws and weaknesses, then presents recommendations to improve the security of future cipher designs. This research investigates well-known stream ciphers: A5/1, Sfinks and the Common Scrambling Algorithm Stream Cipher (CSA-SC). This research focused on the security of the initialisation process. The recommendations given are based on both the results in the literature and the work in this thesis.
Resumo:
This paper emphasizes material nonlinear effects on composite beams with recourse to the plastic hinge method. Numerous combinations of steel and concrete sections form arbitrary composite sections. Secondly, the material properties of composite beams vary remarkably across its section from ductile steel to brittle concrete. Thirdly, concrete is weak in tension, so composite section changes are dependent on load distribution. To this end, the plastic zone approach is convenient for inelastic analysis of composite sections that can evaluate member resistance, including material nonlinearities, by routine numerical integration with respect to every fiber across the composite section. As a result, many researchers usually adopt the plastic zone approach for numerical inelastic analyses of composite structures. On the other hand, the plastic hinge method describes nonlinear material behaviour of an overall composite section integrally. Consequently, proper section properties for use in plastic hinge spring stiffness are required to represent the material behaviour across the arbitrary whole composite section. In view of numerical efficiency and convergence, the plastic hinge method is superior to the plastic zone method. Therefore, based on the plastic hinge approach, how to incorporate the material nonlinearities of the arbitrary composite section into the plastic hinge stiffness formulation becomes a prime objective of the present paper. The partial shear connection in this paper is by virtue of the effective flexural rigidity as AISC 1993 [American Institute of Steel Construction (AISC). Load and resistance factor design specifications. 2nd ed., Chicago; 1993]. Nonlinear behaviour of different kinds of composite beam is investigated in this paper, including two simply supported composite beams, a cantilever and a two span continuous composite beam.
Resumo:
Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.
Resumo:
We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.
Resumo:
A sub‒domain smoothed Galerkin method is proposed to integrate the advantages of mesh‒free Galerkin method and FEM. Arbitrarily shaped sub‒domains are predefined in problems domain with mesh‒free nodes. In each sub‒domain, based on mesh‒free Galerkin weak formulation, the local discrete equation can be obtained by using the moving Kriging interpolation, which is similar to the discretization of the high‒order finite elements. Strain smoothing technique is subsequently applied to the nodal integration of sub‒domain by dividing the sub‒domain into several smoothing cells. Moreover, condensation of DOF can also be introduced into the local discrete equations to improve the computational efficiency. The global governing equations of present method are obtained on the basis of the scheme of FEM by assembling all local discrete equations of the sub‒domains. The mesh‒free properties of Galerkin method are retained in each sub‒domain. Several 2D elastic problems have been solved on the basis of this newly proposed method to validate its computational performance. These numerical examples proved that the newly proposed sub‒domain smoothed Galerkin method is a robust technique to solve solid mechanics problems based on its characteristics of high computational efficiency, good accuracy, and convergence.
Resumo:
Process models specify behavioral aspects by describing ordering constraints between tasks which must be accomplished to achieve envisioned goals. Tasks usually exchange information by means of data objects, i.e., by writing information to and reading information from data objects. A data object can be characterized by its states and allowed state transitions. In this paper, we propose a notion which checks conformance of a process model with respect to data objects that its tasks access. This new notion can be used to tell whether in every execution of a process model each time a task needs to access a data object in a particular state, it is ensured that the data object is in the expected state or can reach the expected state and, hence, the process model can achieve its goals.
Resumo:
Total factor productivity plays an important role in the growth of the Indian economy. Using state-level data from 1993 to 2005 that were recently made available, we find widespread regional variation in productivity changes. In the years immediately following economic liberalization, productivity growth improved technical efficiency; however, in subsequent years, productivity growth was propelled by technological progress. We find a tendency toward convergence with regard to productivity growth among states; however, the states that were technically efficient when the economic reforms were instituted remained innovative in later years.
Resumo:
While economic theory acknowledges that some features of technology (e.g., indivisibilities, economies of scale and specialization) can fundamentally violate the traditional convexity assumption, almost all empirical studies accept the convexity property on faith. In this contribution, we apply two alternative flexible production technologies to measure total factor productivity growth and test the significance of the convexity axiom using a nonparametric test of closeness between unknown distributions. Based on unique field level data on the petroleum industry, the empirical results reveal significant differences, indicating that this production technology is most likely non-convex. Furthermore, we also show the impact of convexity on answers to traditional convergence questions in the productivity growth literature.
Resumo:
This paper presents our system to address the CogALex-IV 2014 shared task of identifying a single word most semantically related to a group of 5 words (queries). Our system uses an implementation of a neural language model and identifies the answer word by finding the most semantically similar word representation to the sum of the query representations. It is a fully unsupervised system which learns on around 20% of the UkWaC corpus. It correctly identifies 85 exact correct targets out of 2,000 queries, 285 approximate targets in lists of 5 suggestions.
Resumo:
Abstract Within the field of Information Systems, a good proportion of research is concerned with the work organisation and this has, to some extent, restricted the kind of application areas given consideration. Yet, it is clear that information and communication technology deployments beyond the work organisation are acquiring increased importance in our lives. With this in mind, we offer a field study of the appropriation of an online play space known as Habbo Hotel. Habbo Hotel, as a site of media convergence, incorporates social networking and digital gaming functionality. Our research highlights the ethical problems such a dual classification of technology may bring. We focus upon a particular set of activities undertaken within and facilitated by the space – scamming. Scammers dupe members with respect to their ‘Furni’, virtual objects that have online and offline economic value. Through our analysis we show that sometimes, online activities are bracketed off from those defined as offline and that this can be related to how the technology is classified by members – as a social networking site and/or a digital game. In turn, this may affect members’ beliefs about rights and wrongs. We conclude that given increasing media convergence, the way forward is to continue the project of educating people regarding the difficulties of determining rights and wrongs, and how rights and wrongs may be acted out with respect to new technologies of play online and offline.
Resumo:
Background Designing novel proteins with site-directed recombination has enormous prospects. By locating effective recombination sites for swapping sequence parts, the probability that hybrid sequences have the desired properties is increased dramatically. The prohibitive requirements for applying current tools led us to investigate machine learning to assist in finding useful recombination sites from amino acid sequence alone. Results We present STAR, Site Targeted Amino acid Recombination predictor, which produces a score indicating the structural disruption caused by recombination, for each position in an amino acid sequence. Example predictions contrasted with those of alternative tools, illustrate STAR'S utility to assist in determining useful recombination sites. Overall, the correlation coefficient between the output of the experimentally validated protein design algorithm SCHEMA and the prediction of STAR is very high (0.89). Conclusion STAR allows the user to explore useful recombination sites in amino acid sequences with unknown structure and unknown evolutionary origin. The predictor service is available from http://pprowler.itee.uq.edu.au/star.
Resumo:
In the past decade, policymakers in over 70 markets have introduced corporate governance codes or best practice guidelines. In East Asia, they have been introduced in Hong Kong in 1999 and 2006, Indonesia in 2000 and 2007, Malaysia in 2000 and 2007, the Philippines in 2002, Singapore iu 2001 and 2005, South Korea in 2003, Taiwan iu 2002 and Thailand iu 2006. The common focus of these codes is to encourage but not force companies to improve their corporate governance practices to a specified target level, e.g., board independence of 30%. Another commonality is that the guidelines apply to all listed companies regardless of their ownership structure or other characteristics.
Resumo:
Purpose The purpose of this chapter is to analyse the deviant behaviour of individuals in organisations. Deviants are those who depart from organisational norms. A typology of perceived deviant behaviour is developed from the deviance literature, and subsequently tested. Methodology/approach Star Trek: Into Darkness text is qualitatively analysed as a data source. Three different character arcs are analysed in relation to organisational deviance. Starfleet is the specific, fictional, organisational context. Findings We found that the typology of deviance is conceptually robust, and facilitates categorisation of different types of deviant behaviour, over time. Research limitations/implications Deviance is socially ascribed; so better categorisation of such behaviour improves our understanding of how specific behaviour might deviate from organisational norms, and how different behaviours can mean individuals can be viewed positively or negatively over time. Further research might determine management responses to the different forms of deviance, and unpack the processes where individuals eschew ‘averageness’ and become deviants. Practical implications The typology advanced has descriptive validity to describe deviant behaviour. Social implications Social institutions such as organisations ascribe individual deviants, both negatively and positively. Originality/value This chapter extends our understanding of positive and negative deviance in organisations by developing a new typology of deviant behaviour. This typology has descriptive validity in understanding deviant behaviour. Our understanding of both positive and negative deviance in organisational contexts is enhanced, as well as the utility of science fiction literature in ethical analysis.