102 resultados para interview protocols


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Standardisation of validated communication protocols that aid in the adoption of policies, methods and tools in a secure eHealth setting require a significant cultural shift among clinicians

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification is a wireless identification method that utilizes the reception of electromagnetic radio waves. This research has proposed a novel model to allow for an in-depth security analysis of current protocols and developed new flexible protocols that can be adapted to offer either stronger security or better efficiency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This practice-led PhD project consists of two parts. The first is an exegesis documenting how a fiction writer can enter a dialogue with the oral history project in Australia. I identify two philosophical mandates of the oral history project in Australia that have shaped my creative practice: an emphasis on the analysis of the interviewee’s subjective experience as a means of understanding the past, and the desire to engage a wide audience in order to promote empathy towards the subject. The discussion around fiction in the oral history project is in its infancy. In order to deepen the debate, I draw on the more mature discussion in ethnographic fiction. I rely on literary theorists Steven Greenblatt, Dorrit Cohn and Gerard Genette to develop a clear understanding of the distinct narrative qualities of fiction, in order to explore how fiction can re-present and explore an interviewee’s subjective experience, and engage a wide readership. I document my own methodology for producing a work of fiction that is enriched by oral history methodology and theory, and responds to the mandates of the project. I demonstrate the means by which fiction and the oral history project can enter a dialogue in the truest sense of the word: a two-way conversation that enriches and augments practice in both fields. The second part of the PhD is a novel, set in Brisbane and based on oral history interviews and archival material I gathered over the course of the project. The novel centres on Brisbane artist Evelyn, who has been given an impossible task: a derelict old house is about to be demolished, and she must capture its history in a sculpture that will be built on the site. Evelyn struggles to come up with ideas and create the sculpture, realising that she has no way to discover who inhabited the house. What follows is a series of stories, each set in a different era in Brisbane’s history, which take the reader backwards through the house’s history. Hidden Objects is a novel about the impossibility of grasping the past and the powerful pull of storytelling. The novel is an experiment in a hybrid form and is accompanied by an appendix that identifies the historically accurate sources informing the fiction. The decisions about the aesthetics of the novel were a direct result of my engagement with the mandates of the oral history project in Australia. The novel was shortlisted in the 2012 Queensland Literary Awards, unpublished manuscript category.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Practice-led journalism research techniques were used in this study to produce a ‘first draft of history’ recording the human experience of survivors and rescuers during the January 2011 flash flood disaster in Toowoomba and the Lockyer Valley in Queensland, Australia. The study aimed to discover what can be learnt from engaging in journalistic reporting of natural disasters. This exegesis demonstrates that journalism can be both a creative practice and a research methodology. About 120 survivors, rescuers and family members of victims participated in extended interviews about what happened to them and how they survived. Their stories are the basis for two creative outputs of the study: a radio documentary and a non-fiction book, that document how and why people died, or survived, or were rescued. Listeners and readers are taken "into the flood" where they feel anxious for those in peril, relief when people are saved, and devastated when babies, children and adults are swept away to their deaths. In undertaking reporting about the human experience of the floods, several significant elements about journalistic reportage of disasters were exposed. The first related to the vital role that the online social media played during the disaster for individuals, citizen reporters, journalists and emergency services organisations. Online social media offer reporters powerful new reporting tools for both gathering and disseminating news. The second related to the performance of journalists in covering events involving traumatic experiences. Journalists are often required to cover trauma and are often amongst the first-responders to disasters. This study found that almost all of the disaster survivors who were approached were willing to talk in detail about their traumatic experiences. A finding of this project is that journalists who interview trauma survivors can develop techniques for improving their ability to interview people who have experienced traumatic events. These include being flexible with interview timing and selecting a location; empowering interviewees to understand they don’t have to answer every question they are asked; providing emotional security for interviewees; and by being committed to accuracy. Survivors may exhibit posttraumatic stress symptoms but some exhibit and report posttraumatic growth. The willingness of a high proportion of the flood survivors to participate in the flood research made it possible to document a relatively unstudied question within the literature about journalism and trauma – when and why disaster survivors will want to speak to reporters. The study sheds light on the reasons why a group of traumatised people chose to speak about their experiences. Their reasons fell into six categories: lessons need to be learned from the disaster; a desire for the public to know what had happened; a sense of duty to make sure warning systems and disaster responses to be improved in future; personal recovery; the financial disinterest of reporters in listening to survivors; and the timing of the request for an interview. Feedback to the creative-practice component of this thesis - the book and radio documentary - shows that these issues are not purely matters of ethics. By following appropriate protocols, it is possible to produce stories that engender strong audience responses such as that the program was "amazing and deeply emotional" and "community storytelling at its most important". Participants reported that the experience of the interview process was "healing" and that the creative outcome resulted in "a very precious record of an afternoon of tragedy and triumph and the bitter-sweetness of survival".

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis analyses the performance bounds of amplify-and-forward relay channels which are becoming increasingly popular in wireless communication applications. The statistics of cascaded Nakagami-m fading model which is a major obstacle in evaluating the outage of wireless networks is analysed using Mellin transform. Furthermore, the upper and the lower bounds for the ergodic capacity of the slotted amplify-and-forward relay channel, for finite and infinite number of relays are derived using random matrix theory. The results obtained will enable wireless network designers to optimize the network resources, benefiting the consumers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives This study introduces and assesses the precision of a standardized protocol for anthropometric measurement of the juvenile cranium using three-dimensional surface rendered models, for implementation in forensic investigation or paleodemographic research. Materials and methods A subset of multi-slice computed tomography (MSCT) DICOM datasets (n=10) of modern Australian subadults (birth—10 years) was accessed from the “Skeletal Biology and Forensic Anthropology Virtual Osteological Database” (n>1200), obtained from retrospective clinical scans taken at Brisbane children hospitals (2009–2013). The capabilities of Geomagic Design X™ form the basis of this study; introducing standardized protocols using triangle surface mesh models to (i) ascertain linear dimensions using reference plane networks and (ii) calculate the area of complex regions of interest on the cranium. Results The protocols described in this paper demonstrate high levels of repeatability between five observers of varying anatomical expertise and software experience. Intra- and inter-observer error was indiscernible with total technical error of measurement (TEM) values ≤0.56 mm, constituting <0.33% relative error (rTEM) for linear measurements; and a TEM value of ≤12.89 mm2, equating to <1.18% (rTEM) of the total area of the anterior fontanelle and contiguous sutures. Conclusions Exploiting the advances of MSCT in routine clinical assessment, this paper assesses the application of this virtual approach to acquire highly reproducible morphometric data in a non-invasive manner for human identification and population studies in growth and development. The protocols and precision testing presented are imperative for the advancement of “virtual anthropology” into routine Australian medico-legal death investigation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Before returning from Australia for the BCLA's Pioneers Day, Professor Nathan Efron spoke to OT. Professor Efron, you’re back in the UK for a short while – What tempted you away from Australia’s summer and back to Britain in November...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

So what do you want to know? I was in Paris between ‘75 and ‘78. But about half way through, Sylvère published the Anti-Oedipus issue of Semiotext(e) and, actually, that was for me one of the deciding events that made me decide to come to the United States, to come study at Columbia University. There appeared to be this little group working at Columbia working around these issues. In 1970, in Paris even, Deleuze was a cult – there was an incredibly small number of people following Deleuze... A transcript of my Interview with Kwinter about the Architectural Reception of Deleuze in America, which took place at Jerry’s,' Soho, New York, 15 January 2003. The transcript appeared as an Appendix at the back of my Masters Thesis undertaken at Yale School of Architecture, printed May 2003.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An Interview with Sylvère Lotringer, Jean Baudrillard Chair at the European Graduate School and Professor Emeritus of French Literature and Philosophy at Columbia University, on the Architectural Contribution to Semiotext(e), Schizoculture, and the Early Deleuze and Guattari Scene at Columbia University, which took place at the Department of French, Columbia University, New York City, July 2003. This interview exists as an audio cassette tape recording.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An Interview with John Rajchman, Department of Art History, Columbia University, on Architecture, Deleuze and Foucault at his apartment, Riverside Drive, New York City, February 10, 2003.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.