258 resultados para Lepton pairs
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
Background Exploring self management in End Stage Renal Disease is extremely important for patients as they encounter several challenges including ongoing symptoms, complex treatments and restrictions, uncertainty about life and a dependency on technology, all of which impact upon their autonomy particularly after commencement of haemodialysis. Objective To summarise the effects of nursing interventions which effect selfmanagement of haemodialysis for patients with End Stage Renal Disease. Search strategy Search terms were chosen after reviewing text words and MeSH terms in relevant articles and databases. An extensive search of the literature from 1966 to June 2009 was conducted across a range of health databases including Cochrane Central Register of Controlled Trials, MEDLINE, EMBASE, CINAHL, PsycINFO and Web of Science. Further studies were identified from reference lists of all retrieved studies. Selection criteria We considered randomised controlled trials that compared interventions to improve self management of haemodialysis in patients with ESRD. In the absence of RCTs, comparative studies without randomisation as well as before and after studies were considered for inclusion. Methodological quality Study reports selected for retrieval were assessed by two independent reviewers for methodological quality prior to inclusion in the review using the standardised critical appraisal instruments for the Joanna Briggs Institute System for the Unified Management, Assessment and Review of Information package (SUMARI). Data collection and analysis Data was extracted using the JBI data extraction tool for evidence of effectiveness independently by pairs of review authors. The evidence was reported in narrative summaries due to heterogeneity of the interventions of the studies. Results and conclusions Five randomised controlled trials were included in the review. Overall, the evidence found that psychosocial and educational interventions influenced self management of haemodialysis in this patient population.
Resumo:
Research background For almost 80 years the Chuck Taylor (or Chuck T's) All Star basketball shoe has been an iconic item of fashion apparel. The Chuck T's were first designed in 1921 by Converse, an American shoe company and over the decades they became a popular item not purely for sports and athletic purposes but rather evolved into the shoe of choice for many subcultural groups as a fashion item. In some circles the Chuck Taylor is still seen as the "coolest" sneaker of all time - one which will never go out of fashion regardless of changing trends. With over 600 millions pairs sold all over the world since its release, the Converse shoe is representative of not only a fashion culture - but also of a consumption culture - that evolved as the driving force behind the massive growth of the Western economic system during the 20th Century. Artisan Gallery (Brisbane), in conjunction with the exhibition Reboot: Function, Fashion and the Sneaker, a history of the sneaker, selected 20 designers to customise and re-design the classic Converse Chuck Taylor All Stars shoe and in doing so highlighted the diversity of forms possible for creative outcomes. As Artisan Gallery Curator Kirsten Fitzpatrick states “We were expecting people to draw and paint on them. Instead, we had shoes... mounted as trophies.." referring to the presentation of "Converse Consumption". The exhibition ran from 21 June – 16 August 2012: Research question The Chuck T’s is one of many overwhelmingly commercially successful designs of the last century. Nowadays we are faced with the significant problems of overconsumption and the stress this causes on the natural ecosystem; and on people as a result. As an active member of the industrial design fraternity – a discipline that sits at the core of this problem - how can I use this opportunity to comment on the significant issue of consumption? An effective way to do this was to associate consumption of goods with consumption of sugar. There are significant similarities between our ceaseless desires to consume products and our fervent need to consume indulgent sweet foods. Artisan Statement Delicious, scrumptious, delectable... your pupils dilate, your blood pressure spikes, your liver goes into overdrive. Immediately, your brain cuts off the adenosine receptors, preventing drowsiness. Your body increases dopamine production, in-turn stimulating the pleasure receptors in your brain. Your body absorbs all the sweetness and turns it into fat – while all the nutrients that you actually require are starting to be destroyed, about to be expelled. And this is only after one bite! After some time though, your body comes crashing back to earth. You become irritable and begin to feel sluggish. Your eyelids seem heavy while your breathing pattern changes. Your body has consumed all the energy and destroyed all available nutrients. You literally begin to shut down. These are the physiological effects of sugar consumption. A perfect analogy for our modern day consumer driven world. Enjoy your dessert! Research contribution “Converse Consumption” contributes to the conversation regarding over-consumption by compelling people to reflect on their consumption behaviour through the reconceptualising of the deconstructed Chuck T’s in an attractive edible form. By doing so the viewer has to deal with the desire to consume the indulgent looking dessert with the contradictory fact that it is comprised of a pair of shoes. The fact that the shoes are Chuck T’s make the effect even more powerful due to their iconic status. These clashing motivations are what make “Converse Consumption” a bizarre yet memorable experience. Significance The exhibition was viewed by an excess of 1000 people and generated exceptional media coverage and public exposure/impact. As Artisan Gallery Curator Kirsten Fitzpatrick states “20 of Brisbane's best designers were given the opportunity to customise their own Converse Sneakers, with The Converse Blank Canvas Project.” And to be selected in this category demonstrates the calibre of importance for design prominence.
Resumo:
As of June 2009, 361 genome-wide association studies (GWAS) had been referenced by the HuGE database. GWAS require DNA from many thousands of individuals, relying on suitable DNA collections. We recently performed a multiple sclerosis (MS) GWAS where a substantial component of the cases (24%) had DNA derived from saliva. Genotyping was done on the Illumina genotyping platform using the Infinium Hap370CNV DUO microarray. Additionally, we genotyped 10 individuals in duplicate using both saliva- and blood-derived DNA. The performance of blood- versus saliva-derived DNA was compared using genotyping call rate, which reflects both the quantity and quality of genotyping per sample and the “GCScore,” an Illumina genotyping quality score, which is a measure of DNA quality. We also compared genotype calls and GCScores for the 10 sample pairs. Call rates were assessed for each sample individually. For the GWAS samples, we compared data according to source of DNA and center of origin. We observed high concordance in genotyping quality and quantity between the paired samples and minimal loss of quality and quantity of DNA in the saliva samples in the large GWAS sample, with the blood samples showing greater variation between centers of origin. This large data set highlights the usefulness of saliva DNA for genotyping, especially in high-density single-nucleotide polymorphism microarray studies such as GWAS.
Resumo:
Purpose/Objective: The basis for poor outcomes in some patients post transfusion remains largely unknown. Despite leukodepletion, there is still evidence of immunomodulatory effects of transfusion that require further study. In addition, there is evidence that the age of blood components transfused significantly affects patient outcomes. Myeloid dendritic cell (DC) and monocyte immune function were studied utilising an in vitro whole blood model of transfusion. Materials and methods: Freshly collected (‘recipient’) whole blood was cultured with ABO compatible leukodepleted PRBC at 25% blood replacement-volume (6hrs). PRBC were assayed at [Day (D) 2, 14, 28and 42 (date-of expiry)]. In parallel, LPS or Zymosan (Zy) were added to mimic infection. Recipients were maintained for the duration of the time course (2 recipients, 4 PRBC units, n = 8).Recipient DC and monocyte intracellular cytokines and chemokines (IL-6, IL-10, IL-12,TNF-a, IL-1a, IL-8, IP-10, MIP-1a, MIP-1b, MCP-1) were measured using flow cytometry. Changes in immune response were calculated by comparison to a parallel no transfusion control (Wilcoxin matched pairs). Influence of storage age was calculated using ANOVA. Results: Significant suppression of DC and monocyte inflammatory responses were evident. DC and monocyte production of IL-1a was reduced following exposure to PRBC regardless of storage age (P < 0.05 at all time points). Storage independent PRBC mediated suppression of DC and monocyte IL-1a was also evident in cultures costimulated with Zy. In cultures co-stimulated with either LPS or Zy, significant suppression of DC and monocyte TNF-a and IL-6 was also evident. PRBC storage attenuated monocyte TNF-a production when co-cultured with LPS (P < 0.01 ANOVA). DC and monocyte production of MIP-1a was significantly reduced following exposure to PRBC (DC: P < 0.05 at D2, 28, 42; Monocyte P < 0.05 all time points). In cultures co-stimulated with LPS and zymosan, a similar suppression of MIP-1a production was also evident, and production of both DC and monocyte MIP-1b and IP-10 were also significantly reduced. Conclusions: The complexity of the transfusion context was reflected in the whole blood approach utilised. Significant suppression of these key DC and monocyte immune responses may contribute to patient outcomes, such as increased risk of infection and longer hospital stay, following blood transfusion.
Resumo:
The purpose of this study was to compare the effectiveness of three different recovery modalities - active (ACT), passive (PAS) and contrast temperature water immersion (CTW) - on the performance of repeated treadmill running, lactate concentration and pH. Fourteen males performed two pairs of treadmill runs to exhaustion at 120% and 90% of peak running speed (PRS) over a 4-hour period. ACT, PAS or CTW was performed for 15-min after the first pair of treadmill runs. ACT consisted of running at 40% PRS, PAS consisted of standing stationary and CTW consisted of alternating between 60-s cold (10°C) and 120-s hot (42°C) water immersion. Run times were converted to time to cover set distance using critical power. Type of recovery modality did not have a significant effect on change in time to cover 400 m (Mean±SD; ACT 2.7±3.6 s, PAS 2.9±4.2 s, CTW 4.2±6.9 s), 1000 m (ACT 2.2±4.0 s, PAS 4.8±8.6 s, CTW 2.1±7.2 s) or 5000 m (ACT 1.4±29.0 s, PAS 16.7±58.5 s, CTW 11.7±33.0 s). Post exercise blood lactate concentration was lower in ACT and CTW compared with PAS. Participants reported an increased perception of recovery in the CTW compared with ACT and PAS. Blood pH was not significantly influenced by recovery modality. Data suggest both ACT and CTW reduce lactate accumulation after high intensity running, but high intensity treadmill running performance is returned to baseline 4-hours after the initial exercise bout regardless of the recovery strategy employed.
Resumo:
To describe barefoot, shod and in-shoe kinematics during stance phase of walking gait in a normal arched adult population. An equal sample of males and females (n = 24) was recruited. In order to quantify the effect of footwear independent of technical design features, an ASICS shoe (Onitsuka Tiger-Mexico 66, Japan) was used in this study. Markers were applied to three conditions; barefoot, shod, and in-shoe. The calibration markers were used to define static pose. The order of testing was randomised. Participants completed five trials in each condition. Kinematic data were captured using a 12 camera VICON MX40 motion capture system at 100 Hz and processed in Visual3D. A previously developed model was used to describe joint angles [1]. A univariate two-way ANOVA was used to identify any differences between the pairs of conditions. Post-hoc Sheffé tests were used to further interrogate the data for differences. At peak hallux dorsiflexion (Figure 1), during propulsion, the metatarsophalangeal joint (MPTJ) was significantly more dorsiflexed in the barefoot condition compared to the shod condition (p = 0.004). At the same gait event, the tibiocalcaneal joint (TCJ) was significantly more plantarflexed than both the shod and in-shoe conditions (p < 0.001), and the tarsometatarsal joint (TMTJ) was significantly less dorsiflexed in the barefoot condition compared to the shod and in-shoe conditions (p < 0.001). The findings of the current study demonstrate that footwear has significant effects on sagittal plane MPTJ joint dorsiflexion at peak hallux dorsiflexion, which results in compensations at proximal foot joints.
Resumo:
OBJECTIVE To compare different reliability coefficients (exact agreement, and variations of the kappa (generalised, Cohen's and Prevalence Adjusted and Biased Adjusted (PABAK))) for four physiotherapists conducting visual assessments of scapulae. DESIGN Inter-therapist reliability study. SETTING Research laboratory. PARTICIPANTS 30 individuals with no history of neck or shoulder pain were recruited with no obvious significant postural abnormalities. MAIN OUTCOME MEASURES Ratings of scapular posture were recorded in multiple biomechanical planes under four test conditions (at rest, and while under three isometric conditions) by four physiotherapists. RESULTS The magnitude of discrepancy between the two therapist pairs was 0.04 to 0.76 for Cohen's kappa, and 0.00 to 0.86 for PABAK. In comparison, the generalised kappa provided a score between the two paired kappa coefficients. The difference between mean generalised kappa coefficients and mean Cohen's kappa (0.02) and between mean generalised kappa and PABAK (0.02) were negligible, but the magnitude of difference between the generalised kappa and paired kappa within each plane and condition was substantial; 0.02 to 0.57 for Cohen's kappa and 0.02 to 0.63 for PABAK, respectively. CONCLUSIONS Calculating coefficients for therapist pairs alone may result in inconsistent findings. In contrast, the generalised kappa provided a coefficient close to the mean of the paired kappa coefficients. These findings support an assertion that generalised kappa may lead to a better representation of reliability between three or more raters and that reliability studies only calculating agreement between two raters should be interpreted with caution. However, generalised kappa may mask more extreme cases of agreement (or disagreement) that paired comparisons may reveal.
Resumo:
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for a wide range of applications; such as mobile phone, pay TV and Internet data transmissions. This research examines the features and properties of the initialisation processes of existing stream ciphers to identify flaws and weaknesses, then presents recommendations to improve the security of future cipher designs. This research investigates well-known stream ciphers: A5/1, Sfinks and the Common Scrambling Algorithm Stream Cipher (CSA-SC). This research focused on the security of the initialisation process. The recommendations given are based on both the results in the literature and the work in this thesis.
Resumo:
This retrospective review examines healing in different sites on a porcine burn model; 24 pairs of burns on 18 pigs from other animal trials were selected for analysis. Each pair of burns was located on the either the cranial or the caudal part of the thoracic ribs region, on the same side of the animal. The burns were 40-50 cm(2) in size and of uniform deep-dermal partial thickness. Caudal burns healed significantly better than cranial burns, demonstrated by earlier closure of wounds, less scar formation and better cosmesis. To our knowledge, this is the first detailed study reporting that burn healing is affected by location on a porcine burn model. We recommend that similar symmetrical burns should be used for future comparative assessments of burn healing.
Resumo:
INTRODUCTION Health disparity between urban and rural regions in Australia is well-documented. In the Wheatbelt catchments of Western Australia there is higher incidence and rate of avoidable hospitalisation for chronic diseases. Structured care approach to chronic illnesses is not new but the focus has been on single disease state. A recent ARC Discovery Project on general practice nurse-led chronic disease management of diabetes, hypertension and stable ischaemic heart disease reported improved communication and better medical administration.[1] In our study we investigated the sustainability of such a multi-morbidities general practice –led collaborative model of care in rural Australia. METHODS A QUAN(qual) design was utilised. Eight pairs of rural general practices were matched. Inclusion criteria used were >18 years and capable of giving informed consent, at least one identified risk factor or diagnosed with chronic conditions. Patients were excluded if deemed medically unsuitable. A comprehensive care plan was formulated by the respective general practice nurse in consultation with the treating General Practitioner (GP) and patient based on the individual’s readiness to change, and was informed by available local resource. A case management approach was utilised. Shediaz-Rizkallah and Lee’s conceptual framework on sustainability informed our evaluation.[2] Our primary outcome on measures of sustainability was reduction in avoidable hospitalisation. Secondary outcomes were patients and practitioners acceptance and satisfaction, and changes to pre-determined interim clinical and process outcomes. RESULTS The qualitative interviews highlighted the community preference for a ‘sustainable’ local hospital in addition to general practice. Costs, ease of access, low prioritisation of self chronic care, workforce turnover and perception of losing another local resource if underutilised influenced the respondents’ decision to present at local hospital for avoidable chronic diseases regardless. CONCLUSIONS Despite the pragmatic nature of rural general practice in Australia, the sustainability of chronic multi-morbidities management in general practice require efficient integration of primary-secondary health care and consideration of other social determinants of health. What this study adds: What is already known on this subject: Structured approach to chronic disease management is not new and has been shown to be effective for reducing hospitalisation. However, the focus has been on single disease state. What does this study add: Sustainability of collaborative model of multi-morbidities care require better primary-secondary integration and consideration of social determinants of health.
Resumo:
We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.
Resumo:
Rakaposhi is a synchronous stream cipher, which uses three main components: a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering function (NLF). NLFSR consists of 128 bits and is initialised by the secret key K. DLFSR holds 192 bits and is initialised by an initial vector (IV). NLF takes 8-bit inputs and returns a single output bit. The work identifies weaknesses and properties of the cipher. The main observation is that the initialisation procedure has the so-called sliding property. The property can be used to launch distinguishing and key recovery attacks. The distinguisher needs four observations of the related (K,IV) pairs. The key recovery algorithm allows to discover the secret key K after observing 29 pairs of (K,IV). Based on the proposed related-key attack, the number of related (K,IV) pairs is 2(128 + 192)/4 pairs. Further the cipher is studied when the registers enter short cycles. When NLFSR is set to all ones, then the cipher degenerates to a linear feedback shift register with a non-linear filter. Consequently, the initial state (and Secret Key and IV) can be recovered with complexity 263.87. If DLFSR is set to all zeros, then NLF reduces to a low non-linearity filter function. As the result, the cipher is insecure allowing the adversary to distinguish it from a random cipher after 217 observations of keystream bits. There is also the key recovery algorithm that allows to find the secret key with complexity 2 54.
Resumo:
In 1992 the Queensland University of Technology (QUT) Convocation initiated the Mentor Scheme to assist students to better prepare for the transition to employment. The scheme has developed over the past six years and in 1998 more than 130 pairs of employers and students from 12 different disciplines participated in it. Evaluations indicate the positive impact the scheme has made on both mentors and mentees, particularly in enhancing mentees' career development.
Resumo:
Analysis of behavioural consistency is an important aspect of software engineering. In process and service management, consistency verification of behavioural models has manifold applications. For instance, a business process model used as system specification and a corresponding workflow model used as implementation have to be consistent. Another example would be the analysis to what degree a process log of executed business operations is consistent with the corresponding normative process model. Typically, existing notions of behaviour equivalence, such as bisimulation and trace equivalence, are applied as consistency notions. Still, these notions are exponential in computation and yield a Boolean result. In many cases, however, a quantification of behavioural deviation is needed along with concepts to isolate the source of deviation. In this article, we propose causal behavioural profiles as the basis for a consistency notion. These profiles capture essential behavioural information, such as order, exclusiveness, and causality between pairs of activities of a process model. Consistency based on these profiles is weaker than trace equivalence, but can be computed efficiently for a broad class of models. In this article, we introduce techniques for the computation of causal behavioural profiles using structural decomposition techniques for sound free-choice workflow systems if unstructured net fragments are acyclic or can be traced back to S- or T-nets. We also elaborate on the findings of applying our technique to three industry model collections.