182 resultados para G-Hilbert Scheme


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce a lightweight biometric solution for user authentication over networks using online handwritten signatures. The algorithm proposed is based on a modified Hausdorff distance and has favorable characteristics such as low computational cost and minimal training requirements. Furthermore, we investigate an information theoretic model for capacity and performance analysis for biometric authentication which brings additional theoretical insights to the problem. A fully functional proof-of-concept prototype that relies on commonly available off-the-shelf hardware is developed as a client-server system that supports Web services. Initial experimental results show that the algorithm performs well despite its low computational requirements and is resilient against over-the-shoulder attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We found that scientists in Australia spent more than five centuries' worth of time preparing research-grant proposals for consideration by the largest funding scheme of 2012. Because just 20.5% of these applications were successful, the equivalent of some four centuries of effort returned no immediate benefit to researchers and wasted valuable research time. The system needs reforming and alternative funding processes should be investigated...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In March 2008, the Australian Government announced its intention to introduce a national Emissions Trading Scheme (ETS), now expected to start in 2015. This impending development provides an ideal setting to investigate the impact an ETS in Australia will have on the market valuation of Australian Securities Exchange (ASX) firms. This is the first empirical study into the pricing effects of the ETS in Australia. Primarily, we hypothesize that firm value will be negatively related to a firm's carbon intensity profile. That is, there will be a greater impact on firm value for high carbon emitters in the period prior (2007) to the introduction of the ETS, whether for reasons relating to the existence of unbooked liabilities associated with future compliance and/or abatement costs, or for reasons relating to reduced future earnings. Using a sample of 58 Australian listed firms (constrained by the current availability of emissions data) which comprise larger, more profitable and less risky listed Australian firms, we first undertake an event study focusing on five distinct information events argued to impact the probability of the proposed ETS being enacted. Here, we find direct evidence that the capital market is indeed pricing the proposed ETS. Second, using a modified version of the Ohlson (1995) valuation model, we undertake a valuation analysis designed not only to complement the event study results, but more importantly to provide insights into the capital market's assessment of the magnitude of the economic impact of the proposed ETS as reflected in market capitalization. Here, our results show that the market assesses the most carbon intensive sample firms a market value decrement relative to other sample firms of between 7% and 10% of market capitalization. Further, based on the carbon emission profile of the sample firms we imply a ‘future carbon permit price’ of between AUD$17 per tonne and AUD$26 per tonne of carbon dioxide emitted. This study is more precise than industry reports, which set a carbon price of between AUD$15 to AUD$74 per tonne.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The risk of vitamin D insufficiency is increased in persons having limited sunlight exposure and dietary vitamin D. Supplementation compliance might be improved with larger doses taken less often, but this may increase the potential for side effects. The objective of the present study was to determine whether a weekly or weekly/monthly regimen of vitamin D supplementation is as effective as daily supplementation without increasing the risk of side effects. Participants were forty-eight healthy adults who were randomly assigned for 3 months to placebo or one of three supplementation regimens: 50 μg/d (2000 IU/d, analysed dose 70 μg/d), 250 μg/week (10 000 IU/week, analysed dose 331 μg/week) or 1250 μg/week (50 000 IU/week, analysed dose 1544 μg/week) for 4 weeks and then 1250 μg/month for 2 months. Daily and weekly doses were equally effective at increasing serum 25-hydroxyvitamin D, which was significantly greater than baseline in all the supplemented groups after 30 d of treatment. Subjects in the 1250 μg treatment group, who had a BMI >26 kg/m2, had a steady increase in urinary Ca in the first 3 weeks of supplementation, and, overall, the relative risk of hypercalciuria was higher in the 1250 μg group than in the placebo group (P= 0·01). Although vitamin D supplementation remains a controversial issue, these data document that supplementing with ≤ 250 μg/week ( ≤ 10 000 IU/week) can improve or maintain vitamin D status in healthy populations without the risk of hypercalciuria, but 24 h urinary Ca excretion should be evaluated in healthy persons receiving vitamin D3 supplementation in weekly single doses of 1250 μg (50 000 IU).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Young novice drivers - that is, drivers aged 16-25 years who are relatively inexperienced in driving on the road and have a novice (Learner, Provisional) driver's licence - have been overrepresented in car crash, injury and fatality statistics around the world for decades. There are numerous persistent characteristics evident in young novice driver crashes, fatalities and offences, including variables relating to the young driver themselves, broader social influences which include their passengers, the car they drive, and when and how they drive, and their risky driving behaviour in particular. Moreover, there are a range of psychosocial factors influencing the behaviour of young novice drivers, including the social influences of parents and peers, and person-related factors such as age-related factors, attitudes, and sensation seeking. Historically, a range of approaches have been developed to manage the risky driving behaviour of young novice drivers. Traditional measures predominantly relying upon education have had limited success in regulating the risky driving behaviour of the young novice driver. In contrast, interventions such as graduated driver licensing (GDL) which acknowledges young novice drivers' limitations - principally pertaining to their chronological and developmental age, and their driving inexperience - have shown to be effective in ameliorating this pervasive public health problem. In practice, GDL is a risk management tool that is designed to reduce driving at risky times (e.g., at night) or in risky driving conditions (e.g., with passengers), while still enabling novice drivers to obtain experience. In this regard, the GDL program in Queensland, Australia, was considerably enhanced in July 2007, and major additions to the program include mandated Learner practice of 100 hours recorded in a logbook, and passenger limits during night driving in the Provisional phase. Road safety researchers have also continued to consider the influential role played by the young driver's psychosocial characteristics, including psychological traits and states. In addition, whilst the majority of road safety user research is epidemiological in nature, contemporary road safety research is increasingly applying psychological and criminological theories. Importantly, such theories not only can guide young novice driver research, they can also inform the development and evaluation of countermeasures targeting their risky driving behaviour. The research is thus designed to explore the self-reported behaviours - and the personal, psychosocial, and structural influences upon the behaviours - of young novice drivers This thesis incorporates three stages of predominantly quantitative research to undertake a comprehensive investigation of the risky driving behaviour of young novices. Risky driving behaviour increases the likelihood of the young novice driver being involved in a crash which may harm themselves or other road users, and deliberate risky driving such as driving in excess of the posted speed limits is the focus of the program of research. The extant literature examining the nature of the risky behaviour of the young novice driver - and the contributing factors for this behaviour - while comprehensive, has not led to the development of a reliable instrument designed specifically to measure the risky behaviour of the young novice driver. Therefore the development and application of such a tool (the Behaviour of Young Novice Drivers Scale, or BYNDS) was foremost in the program of research. In addition to describing the driving behaviours of the young novice, a central theme of this program of research was identifying, describing, and quantifying personal, behavioural, and environmental influences upon young novice driver risky behaviour. Accordingly the 11 papers developed from the three stages of research which comprise this thesis are framed within Bandura's reciprocal determinism model which explicitly considers the reciprocal relationship between the environment, the person, and their behaviour. Stage One comprised the foundation research and operationalised quantitative and qualitative methodologies to finalise the instrument used in Stages Two and Three. The first part of Stage One involved an online survey which was completed by 761 young novice drivers who attended tertiary education institutions across Queensland. A reliable instrument for measuring the risky driving behaviour of young novices was developed (the BYNDS) and is currently being operationalised in young novice driver research in progress at the Centre for Injury Research and Prevention in Philadelphia, USA. In addition, regression analyses revealed that psychological distress influenced risky driving behaviour, and the differential influence of depression, anxiety, sensitivity to punishments and rewards, and sensation seeking propensity were explored. Path model analyses revealed that punishment sensitivity was mediated by anxiety and depression; and the influence of depression, anxiety, reward sensitivity and sensation seeking propensity were moderated by the gender of the driver. Specifically, for males, sensation seeking propensity, depression, and reward sensitivity were predictive of self-reported risky driving, whilst for females anxiety was also influential. In the second part of Stage One, 21 young novice drivers participated in individual and small group interviews. The normative influences of parents, peers, and the Police were explicated. Content analysis supported four themes of influence through punishments, rewards, and the behaviours and attitudes of parents and friends. The Police were also influential upon the risky driving behaviour of young novices. The findings of both parts of Stage One informed the research of Stage Two. Stage Two was a comprehensive investigation of the pre-Licence and Learner experiences, attitudes, and behaviours, of young novice drivers. In this stage, 1170 young novice drivers from across Queensland completed an online or paper survey exploring their experiences, behaviours and attitudes as a pre- and Learner driver. The majority of novices did not drive before they were licensed (pre-Licence driving) or as an unsupervised Learner, submitted accurate logbooks, intended to follow the road rules as a Provisional driver, and reported practicing predominantly at the end of the Learner period. The experience of Learners in the enhanced-GDL program were also examined and compared to those of Learner drivers who progressed through the former-GDL program (data collected previously by Bates, Watson, & King, 2009a). Importantly, current-GDL Learners reported significantly more driving practice and a longer Learner period, less difficulty obtaining practice, and less offence detection and crash involvement than Learners in the former-GDL program. The findings of Stage Two informed the research of Stage Three. Stage Three was a comprehensive exploration of the driving experiences, attitudes and behaviours of young novice drivers during their first six months of Provisional 1 licensure. In this stage, 390 of the 1170 young novice drivers from Stage Two completed another survey, and data collected during Stages Two and Three allowed a longitudinal investigation of self-reported risky driving behaviours, such as GDL-specific and general road rule compliance; risky behaviour such as pre-Licence driving, crash involvement and offence detection; and vehicle ownership, paying attention to Police presence, and punishment avoidance. Whilst the majority of Learner and Provisional drivers reported compliance with GDL-specific and general road rules, 33% of Learners and 50% of Provisional drivers reported speeding by 10-20 km/hr at least occasionally. Twelve percent of Learner drivers reported pre-Licence driving, and these drivers were significantly more risky as Learner and Provisional drivers. Ten percent of males and females reported being involved in a crash, and 10% of females and 18% of males had been detected for an offence, within the first six months of independent driving. Additionally, 75% of young novice drivers reported owning their own car within six months of gaining their Provisional driver's licence. Vehicle owners reported significantly shorter Learner periods and more risky driving exposure as a Provisional driver. Paying attention to Police presence on the roads appeared normative for young novice drivers: 91% of Learners and 72% of Provisional drivers reported paying attention. Provisional drivers also reported they actively avoided the Police: 25% of males and 13% of females; 23% of rural drivers and 15% of urban drivers. Stage Three also allowed the refinement of the risky behaviour measurement tool (BYNDS) created in Stage One; the original reliable 44-item instrument was refined to a similarly reliable 36-item instrument. A longitudinal exploration of the influence of anxiety, depression, sensation seeking propensity and reward sensitivity upon the risky behaviour of the Provisional driver was also undertaken using data collected in Stages Two and Three. Consistent with the research of Stage One, structural equation modeling revealed anxiety, reward sensitivity and sensation seeking propensity predicted self-reported risky driving behaviour. Again, gender was a moderator, with only reward sensitivity predicting risky driving for males. A measurement model of Akers' social learning theory (SLT) was developed containing six subscales operationalising the four constructs of differential association, imitation, personal attitudes, and differential reinforcement, and the influence of parents and peers was captured within the items in a number of these constructs. Analyses exploring the nature and extent of the psychosocial influences of personal characteristics (step 1), Akers' SLT (step 2), and elements of the prototype/willingness model (PWM) (step 3) upon self-reported speeding by the Provisional driver in a hierarchical multiple regression model found the following significant predictors: gender (male), car ownership (own car), reward sensitivity (greater sensitivity), depression (greater depression), personal attitudes (more risky attitudes), and speeding (more speeding) as a Learner. The research findings have considerable implications for road safety researchers, policy-makers, mental health professionals and medical practitioners alike. A broad range of issues need to be considered when developing, implementing and evaluating interventions for both the intentional and unintentional risky driving behaviours of interest. While a variety of interventions have been historically utilised, including education, enforcement, rehabilitation and incentives, caution is warranted. A multi-faceted approach to improving novice road safety is more likely to be effective, and new and existing countermeasures should capitalise on the potential of parents, peers and Police to be a positive influence upon the risky behaviour of young novice drivers. However, the efficacy of some interventions remains undetermined at this time. Notwithstanding this caveat, countermeasures such as augmenting and strengthening Queensland's GDL program and targeting parents and adolescents particularly warrant further attention. The findings of the research program suggest that Queensland's current-GDL can be strengthened by increasing compliance of young novice drivers with existing conditions and restrictions. The rates of speeding reported by the young Learner driver are particularly alarming for a number of reasons. The Learner is inexperienced in driving, and travelling in excess of speed limits places them at greater risk as they are also inexperienced in detecting and responding appropriately to driving hazards. In addition, the Learner period should provide the foundation for a safe lifetime driving career, enabling the development and reinforcement of non-risky driving habits. Learners who sped reported speeding by greater margins, and at greater frequencies, when they were able to drive independently. Other strategies could also be considered to enhance Queensland's GDL program, addressing both the pre-Licence adolescent and their parents. Options that warrant further investigation to determine their likely effectiveness include screening and treatment of novice drivers by mental health professionals and/or medical practitioners; and general social skills training. Considering the self-reported pre-licence driving of the young novice driver, targeted education of parents may need to occur before their child obtains a Learner licence. It is noteworthy that those participants who reported risky driving during the Learner phase also were more likely to report risky driving behaviour during the Provisional phase; therefore it appears vital that the development of safe driving habits is encouraged from the beginning of the novice period. General education of parents and young novice drivers should inform them of the considerably-increased likelihood of risky driving behaviour, crashes and offences associated with having unlimited access to a vehicle in the early stages of intermediate licensure. Importantly, parents frequently purchase the car that is used by the Provisional driver, who typically lives at home with their parents, and therefore parents are ideally positioned to monitor the journeys of their young novice driver during this early stage of independent driving. Parents are pivotal in the development of their driving child: they are models who are imitated and are sources of attitudes, expectancies, rewards and punishments; and they provide the most driving instruction for the Learner. High rates of self-reported speeding by Learners suggests that GDL programs specifically consider the nature of supervision during the Learner period, encouraging supervisors to be vigilant to compliance with general and GDL-specific road rules, and especially driving in excess of speed limit. Attitudes towards driving are formed before the adolescent reaches the age when they can be legally licensed. Young novice drivers with risky personal attitudes towards driving reported more risky driving behaviour, suggesting that countermeasures should target such attitudes and that such interventions might be implemented before the adolescent is licensed. The risky behaviours and attitudes of friends were also found to be influential, and given that young novice drivers tend to carry their friends as their passengers, a group intervention such as provided in a school class context may prove more effective. Social skills interventions that encourage the novice to resist the negative influences of their friends and their peer passengers, and to not imitate the risky driving behaviour of their friends, may also be effective. The punishments and rewards anticipated from and administered by friends were also found to influence the self-reported risky behaviour of the young novice driver; therefore young persons could be encouraged to sanction the risky, and to reward the non-risky, driving of their novice friends. Adolescent health programs and related initiatives need to more specifically consider the risks associated with driving. Young novice drivers are also adolescents, a developmental period associated with depression and anxiety. Depression, anxiety, and sensation seeking propensity were found to be predictive of risky driving; therefore interventions targeting psychological distress, whilst discouraging the expression of sensation seeking propensity whilst driving, warrant development and trialing. In addition, given that reward sensitivity was also predictive, a scheme which rewards novice drivers for safe driving behaviour - rather than rewarding the novice through emotional and instrumental rewards for risky driving behaviour - requires further investigation. The Police were also influential in the risky driving behaviour of young novices. Young novice drivers who had been detected for an offence, and then avoided punishment, reacted differentially, with some drivers appearing to become less risky after the encounter, whilst for others their risky behaviour appeared to be reinforced and therefore was more likely to be performed again. Such drivers saw t

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report on an accurate numerical scheme for the evolution of an inviscid bubble in radial Hele-Shaw flow, where the nonlinear boundary effects of surface tension and kinetic undercooling are included on the bubble-fluid interface. As well as demonstrating the onset of the Saffman-Taylor instability for growing bubbles, the numerical method is used to show the effect of the boundary conditions on the separation (pinch-off) of a contracting bubble into multiple bubbles, and the existence of multiple possible asymptotic bubble shapes in the extinction limit. The numerical scheme also allows for the accurate computation of bubbles which pinch off very close to the theoretical extinction time, raising the possibility of computing solutions for the evolution of bubbles with non-generic extinction behaviour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new optimal control model of the interactions between a growing tumour and the host immune system along with an immunotherapy treatment strategy is presented. The model is based on an ordinary differential equation model of interactions between the growing tu- mour and the natural killer, cytotoxic T lymphocyte and dendritic cells of the host immune system, extended through the addition of a control function representing the application of a dendritic cell treat- ment to the system. The numerical solution of this model, obtained from a multi species Runge–Kutta forward-backward sweep scheme, is described. We investigate the effects of varying the maximum al- lowed amount of dendritic cell vaccine administered to the system and find that control of the tumour cell population is best effected via a high initial vaccine level, followed by reduced treatment and finally cessation of treatment. We also found that increasing the strength of the dendritic cell vaccine causes an increase in the number of natural killer cells and lymphocytes, which in turn reduces the growth of the tumour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New Australian research has found scientists spent the equivalent of 550 working years applying for grants from the country's largest health and medical research grants scheme in 2012, and that around 75% of this time was spent on unsuccessful applications. The Queensland University of Technology (QUT) study also found that spending more time on a funding proposal did not equate to a greater chance of success.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines an innovative and feasible flight control scheme for a rotary-wing unmanned aerial system (RUAS) with guaranteed safety and reliable flight quality in a gusty environment. The proposed control methodology aims to increase gust-attenuation capability of a RUAS to ensure improved flight performance when strong gusts occur. Based on the design of an effective estimator, an altitude controller is firstly constructed to synchronously compensate for fluctuations of the main rotor thrust which might lead to crashes in a gusty environment. Afterwards, a nonlinear state feedback controller is proposed to stabilize horizontal positions of the RUAS with gust-attenuation property. Performance of the proposed control framework is evaluated using parameters of a Vario XLC helicopter and high-fidelity simulations show that the proposed controllers can effectively reduce side-effect of gusts and demonstrate performance improvement when compared with the proportional-integral-derivative (PID) controllers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key derivation function is used to generate one or more cryptographic keys from a private (secret) input value. This paper proposes a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the underlying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream finalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.