227 resultados para STANDARD AUTOMATED PERIMETRY


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Effective self-management of diabetes is essential for the reduction of diabetes-related complications, as global rates of diabetes escalate. Methods: Randomised controlled trial. Adults with type 2 diabetes (n = 120), with HbA1c greater than or equal to 7.5 %, were randomly allocated (4 × 4 block randomised block design) to receive an automated, interactive telephone-delivered management intervention or usual routine care. Baseline sociodemographic, behavioural and medical history data were collected by self-administered questionnaires and biological data were obtained during hospital appointments. Health-related quality of life (HRQL) was measured using the SF-36. Results: The mean age of participants was 57.4 (SD 8.3), 63 % of whom were male. There were no differences in demographic, socioeconomic and behavioural variables between the study arms at baseline. Over the six-month period from baseline, participants receiving the Australian TLC (Telephone-Linked Care) Diabetes program showed a 0.8 % decrease in geometric mean HbA1c from 8.7 % to 7.9 %, compared with a 0.2 % HbA1c reduction (8.9 % to 8.7 %) in the usual care arm (p = 0.002). There was also a significant improvement in mental HRQL, with a mean increase of 1.9 in the intervention arm, while the usual care arm decreased by 0.8 (p = 0.007). No significant improvements in physical HRQL were observed. Conclusions: These analyses indicate the efficacy of the Australian TLC Diabetes program with clinically significant post-intervention improvements in both glycaemic control and mental HRQL. These observed improvements, if supported and maintained by an ongoing program such as this, could significantly reduce diabetes-related complications in the longer term. Given the accessibility and feasibility of this kind of program, it has strong potential for providing effective, ongoing support to many individuals with diabetes in the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Teacher professional standards have become a key policy mechanism for the reform of teaching and education in recent years. While standards policies claim to improve the quality of teaching and learning in schools today, this paper argues that a disjunction exists between the stated intentions of such programmes and the intelligibility of the practices of government in which they are invested. To this effect, the paper conducts an analytics of government of the recently released National Professional Standards for Teachers (Australian Institute for Teaching and School Leadership, 2011) arguing that the explicit, calculated rationality of the programme exists within a wider field of effects. Such analysis has the critical consequence of calling into question the claims of the programmers themselves thus breaching the self-evidence on which the standards rest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: The high rates of comorbid depression and substance use in young people have been associated with a range of adverse outcomes. Yet, few treatment studies have been conducted with this population. Objective: To determine if the addition of Motivational Interviewing and Cognitive Behaviour Therapy (MI/CBT) to standard alcohol and other drug (AOD) care improves the outcomes of young people with comorbid depression and substance use. Participants and Setting: Participants comprised 88 young people with comorbid depression (Kessler 10 score of > 17) and substance use (mainly alcohol/cannabis) seeking treatment at two youth AOD services in Melbourne, Australia. Sixty young people received MI/CBT in addition to standard care (SC) and 28 received SC alone. Outcomes Measures: Primary outcome measures were depressive symptoms and drug and alcohol use in the past month. Assessments were conducted at baseline, 3 and 6 months follow up. Results and Conclusions: The addition of MI/CBT to SC was associated with a significantly greater rate of change in depression, cannabis use, motivation to change substance use and social contact in the first 3 months. However, those who received SC had achieved similar improvements on these variables by 6 months follow up. All young people achieved significant improvements in functioning and quality of life variables over time, regardless of the treatment group. No changes in alcohol or other drug use were found in either group. The delivery of MI/CBT in addition to standard AOD care may offer accelerated treatment gains in the short-term.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Australia, speeding remains a substantial contributor to road trauma. The National Road Safety Strategy (2011-2020) highlighted the need to harness community support for current and future speed management strategies. Australia is known for intensive speed camera programs which are both automated and manual, employing covert and overt methods. Recent developments in the area of automated speed enforcement in Australia help to illustrate the important link between community attitudes to speed enforcement and subsequent speed camera policy developments. A perceived lack of community confidence in camera programs prompted reviews in New South Wales and Victoria in 2011 by the jurisdictional Auditor-General. This paper explores automated speed camera enforcement in Australia with particular reference to the findings of these two reports as they relate to the level of public support for and community attitudes towards automated speed enforcement. It also provides comment on the evolving nature of automated speed enforcement according to previously identified controversies and dilemmas associated with speed camera programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A comprehensive one-dimensional meanline design approach for radial inflow turbines is described in the present work. An original code was developed in Python that takes a novel approach to the automatic selection of feasible machines based on pre-defined performance or geometry characteristics for a given application. It comprises a brute-force search algorithm that traverses the entire search space based on key non-dimensional parameters and rotational speed. In this study, an in-depth analysis and subsequent implementation of relevant loss models as well as selection criteria for radial inflow turbines is addressed. Comparison with previously published designs, as well as other available codes, showed good agreement. Sample (real and theoretical) test cases were trialed and results showed good agreement when compared to other available codes. The presented approach was found to be valid and the model was found to be a useful tool with regards to the preliminary design and performance estimation of radial inflow turbines, enabling its integration with other thermodynamic cycle analysis and three-dimensional blade design codes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producing Java source code for the generated design of a given program. This source code can then be compiled and the resulting Java bytecode program can be used by the tool to assess the program's overall security based on our security metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by ma¬licious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual pro¬perties. Current incidents prove that it is not sufficient anymore to perform manual security tests of the IT infra¬structure based on sporadic security audits. Instead net¬works should be continuously tested against possible attacks. In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT in¬frastructure. Namely, we define an extensible frame¬work which uses public vulnerability databases to identify pro¬bable multi-step attacks in an IT infrastructure, and pro¬vide recommendations in the form of patching strategies, topology changes, and configuration updates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a concrete approach for the automatic mitigation of risks that are detected during process enactment. Given a process model exposed to risks, e.g. a financial process exposed to the risk of approval fraud, we enact this process and as soon as the likelihood of the associated risk(s) is no longer tolerable, we generate a set of possible mitigation actions to reduce the risks' likelihood, ideally annulling the risks altogether. A mitigation action is a sequence of controlled changes applied to the running process instance, taking into account a snapshot of the process resources and data, and the current status of the system in which the process is executed. These actions are proposed as recommendations to help process administrators mitigate process-related risks as soon as they arise. The approach has been implemented in the YAWL environment and its performance evaluated. The results show that it is possible to mitigate process-related risks within a few minutes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A pressing cost issue facing construction is the procurement of off-site pre-manufactured assemblies. In order to encourage Australian adoption of off-site manufacture (OSM), a new approach to underlying processes is required. The advent of object oriented digital models for construction design assumes intelligent use of data. However, the construction production system relies on traditional methods and data sources and is expected to benefit from the application of well-established business process management techniques. The integration of the old and new data sources allows for the development of business process models which, by capturing typical construction processes involving OSM, provides insights into such processes. This integrative approach is the foundation of research into the use of OSM to increase construction productivity in Australia. The purpose of this study is to develop business process models capturing the procurement, resources and information flow of construction projects. For each stage of the construction value chain, a number of sub-processes are identified. Business Process Modelling Notation (BPMN), a mainstream business process modelling standard, is used to create base-line generic construction process models. These models identify OSM decision-making points that could provide cost reductions in procurement workflow and management systems. This paper reports on phase one of an on-going research aiming to develop a proto-type workflow application that can provide semi-automated support to construction processes involving OSM and assist in decision-making in the adoption of OSM thus contributing to a sustainable built environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three dimensional conjugate heat transfer simulation of a standard parabolic trough thermal collector receiver is performed numerically in order to visualize and analyze the surface thermal characteristics. The computational model is developed in Ansys Fluent environment based on some simplified assumptions. Three test conditions are selected from the existing literature to verify the numerical model directly, and reasonably good agreement between the model and the test results confirms the reliability of the simulation. Solar radiation flux profile around the tube is also approximated from the literature. An in house macro is written to read the input solar flux as a heat flux wall boundary condition for the tube wall. The numerical results show that there is an abrupt variation in the resultant heat flux along the circumference of the receiver. Consequently, the temperature varies throughout the tube surface. The lower half of the horizontal receiver enjoys the maximum solar flux, and therefore, experiences the maximum temperature rise compared to the upper part with almost leveled temperature. Reasonable attributions and suggestions are made on this particular type of conjugate thermal system. The knowledge that gained so far from this study will be used to further the analysis and to design an efficient concentrator photovoltaic collector in near future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Due to the development of XML and other data models such as OWL and RDF, sharing data is an increasingly common task since these data models allow simple syntactic translation of data between applications. However, in order for data to be shared semantically, there must be a way to ensure that concepts are the same. One approach is to employ commonly usedschemas—called standard schemas —which help guarantee that syntactically identical objects have semantically similar meanings. As a result of the spread of data sharing, there has been widespread adoption of standard schemas in a broad range of disciplines and for a wide variety of applications within a very short period of time. However, standard schemas are still in their infancy and have not yet matured or been thoroughly evaluated. It is imperative that the data management research community takes a closer look at how well these standard schemas have fared in real-world applications to identify not only their advantages, but also the operational challenges that real users face. In this paper, we both examine the usability of standard schemas in a comparison that spans multiple disciplines, and describe our first step at resolving some of these issues in our Semantic Modeling System. We evaluate our Semantic Modeling System through a careful case study of the use of standard schemas in architecture, engineering, and construction, which we conducted with domain experts. We discuss how our Semantic Modeling System can help the broader problem and also discuss a number of challenges that still remain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study assessed the workday step counts of lower active (<10,000 daily steps) university employees using an automated, web-based walking intervention (Walk@Work). METHODS: Academic and administrative staff (n=390; 45.6±10.8years; BMI 27.2±5.5kg/m2; 290 women) at five campuses (Australia [x2], Canada, Northern Ireland and the United States), were given a pedometer, access to the website program (2010-11) and tasked with increasing workday walking by 1000 daily steps above baseline, every two weeks, over a six week period. Step count changes at four weeks post intervention were evaluated relative to campus and baseline walking. RESULTS: Across the sample, step counts significantly increased from baseline to post-intervention (1477 daily steps; p=0.001). Variations in increases were evident between campuses (largest difference of 870 daily steps; p=0.04) and for baseline activity status. Those least active at baseline (<5000 daily steps; n=125) increased step counts the most (1837 daily steps; p=0.001), whereas those most active (7500-9999 daily steps; n=79) increased the least (929 daily steps; p=0.001). CONCLUSIONS: Walk@Work increased workday walking by 25% in this sample overall. Increases occurred through an automated program, at campuses in different countries, and were most evident for those most in need of intervention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Automated process discovery techniques aim at extracting models from information system logs in order to shed light into the business processes supported by these systems. Existing techniques in this space are effective when applied to relatively small or regular logs, but otherwise generate large and spaghetti-like models. In previous work, trace clustering has been applied in an attempt to reduce the size and complexity of automatically discovered process models. The idea is to split the log into clusters and to discover one model per cluster. The result is a collection of process models -- each one representing a variant of the business process -- as opposed to an all-encompassing model. Still, models produced in this way may exhibit unacceptably high complexity. In this setting, this paper presents a two-way divide-and-conquer process discovery technique, wherein the discovered process models are split on the one hand by variants and on the other hand hierarchically by means of subprocess extraction. The proposed technique allows users to set a desired bound for the complexity of the produced models. Experiments on real-life logs show that the technique produces collections of models that are up to 64% smaller than those extracted under the same complexity bounds by applying existing trace clustering techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reasons for performing study: Many domestic horses and ponies are sedentary and obese due to confinement to small paddocks and stables and a diet of infrequent, high-energy rations. Severe health consequences can be associated with this altered lifestyle. Objectives: The aims of this study were to investigate the ability of horses to learn to use a dynamic feeder system and determine the movement and behavioural responses of horses to the novel system. Methods: A dynamic feed station was developed to encourage horses to exercise in order to access ad libitum hay. Five pairs of horses (n = 10) were studied using a randomised crossover design with each pair studied in a control paddock containing a standard hay feeder and an experimental paddock containing the novel hay feeder. Horse movement was monitored by a global positioning system (GPS) and horses observed and their ability to learn to use the system and the behavioural responses to its use assessed. Results: With initial human intervention all horses used the novel feeder within 1 h. Some aggressive behaviour was observed between horses not well matched in dominance behaviour. The median distance walked by the horses was less (P = 0.002) during a 4 h period (117 [57–185] m) in the control paddock than in the experimental paddock (630 [509–719] m). Conclusions: The use of an automated feeding system promotes increased activity levels in horses housed in small paddocks, compared with a stationary feeder.