148 resultados para active and passive quantum error correction


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Children with Autism Spectrum Disorder experience difficulty in communication and in understanding the social world which can have negative consequences for their relationships, in managing emotions, and generally dealing with the challenges of everyday life. This thesis examines the effectiveness of the Active and Reflective components of the Get REAL program through the assessment of the detailed coding of video-recorded observations and longitudinal quantitative analysis. The aim of Get REAL is to increase the social, emotional, and cognitive learning of children with High Functioning Autism (HFA). Get REAL is a group program designed specifically for use in inclusive primary school settings. The Get REAL program was designed in response to the mixed success of generalisation of learning to new contexts of existing social skills programs. The theoretical foundation of Get REAL is based upon pedagogical theory and learning theory to facilitate transfer of learning, combined with experiential, individualised, evaluative and organisational approaches. This thesis is by publication and consists of four refereed journal papers; 1 accepted for publication and 3 that are under review. Paper 1 describes the development and theoretical basis of the Get REAL program and provides detail of the program structure and learning cycle. The focus of Paper 1 reflects the first question of interest in the thesis which is about the extent to which learning derived from participation in the program can be generalised to other contexts. Participants are 16 children with HFA ranging in age from 8-13 years. Results provided support for the generalisability of learning from Get REAL to home and school evidenced by parent and teacher data collected pre and post participation in Get REAL. Following establishment of the generalisation of learning from Get REAL, Papers 2 and 3 focus on the Active and Reflective components of the program in order to examine how individual and group learning takes place. Participants (N = 12) in the program are video-taped during the Active and Reflective Sessions. Using identical coding protocols of video data, improvements in prosocial behaviour and diminishing of inappropriate behaviours were apparent with the exception of perspective taking. Data also revealed that 2 of the participants had atypical trajectories. An in-depth case study analysis was then conducted with these 2 participants in Paper 4. Data included reports from health care and education professionals within the school and externally (e.g., paediatrician) and identified the multi-faceted nature of care needed for children with comorbid diagnoses and extremely challenging family circumstances as a complex task to effect change. Results of this research support the effectiveness of the Get REAL program in promoting pro social behaviours such as improvements in engaging with others and emotional regulation, and in diminishing unwanted behaviours such as conduct problems. Further, the gains made by the participating children were found to be generalisable beyond Get REAL to home and other school settings. The research contained in the thesis adds to current knowledge about how learning can take place for children with HFA. Results show that an experiential learning framework with a focus on social cognition, together with explicit teaching, scaffolded with video feedback, are key ingredients for the generalisation of social learning to broader contexts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Metastable, active, or nonequilibrium states due to the presence of abnormal structures and various types of defects are well known in metallurgy. The role of such states at gold surfaces in neutral aqueous media (an important electrode system in the microsensor area) was explored using cyclic voltammetry. It was demonstrated that, as postulated in earlier work from this laboratory, there is a close relationship between premonolayer oxidation, multilayer hydrous oxide reduction and electrocatalytic behaviour in the case of this and other metal electrode systems. Some of the most active, and therefore most important, entities at surfaces (e.g., metal adatoms) are not readily imageable or detectable by high resolution surface microscopy techniques. Cyclic voltammetry, however, provides significant, though not highly specific, information about such species. The main conclusion is that further practical and theoretical work on active states of metal surfaces is highly desirable as their behaviour is not simple and is of major importance in many electrocatalytic processes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The synthesis of organic semiconducting materials based on silver and copper-TCNQ (TCNQ = 7,7,8,8-tetracyanoquinodimethane) and their fluorinated analogues has received a significant amount of attention due to their potential use in organic electronic applications. However, there is a scarcity in the identification of different applications for which these interesting materials may be suitable candidates. In this work, we address this by investigating the catalytic properties of such materials for the electron transfer reaction between ferricyanide and thiosulphate ions in aqueous solution, which to date has been almost solely limited to metallic nanomaterials. Significantly it was found that all the materials investigated, namely CuTCNQ, AgTCNQ, CuTCNQF4 and AgTCNQF4, were catalytically active and, interestingly, the fluorinated analogues were superior. AgTCNQF4 demonstrated the highest activity and was tested for its stability and re-usability for up to 50 cycles without degradation in performance. The catalytic reaction was monitored via UV-vis spectroscopy and open circuit potential versus time measurements, as well as an investigation of the transport properties of the films via electrochemical impedance spectroscopy. It is suggested that morphology and bulk conductivity are not the limiting factors, but rather the balance between the accumulated surface charge from electron injection via thiosulphate ions on the catalyst surface and transfer to the ferricyanide ions which controls the reaction rate. The facile fabrication of re-usable surface confined organic materials that are catalytically active may have important uses for many more electron transfer reactions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background & Aims: Access to sufficient amounts of safe and culturally-acceptable foods is a fundamental human right. Food security exists when all people, at all times, have physical, social, and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Food insecurity therefore occurs when the availability or access to sufficient amounts of nutritionally-adequate, culturally-appropriate and safe foods, or, the ability to acquire such foods in socially-acceptable ways, is limited. Food insecurity may result in significant adverse effects for the individual and these outcomes may vary between adults and children. Among adults, food insecurity may be associated with overweight or obesity, poorer self-rated general health, depression, increased health-care utilisation and dietary intakes less consistent with national recommendations. Among children, food insecurity may result in poorer self or parent-reported general health, behavioural problems, lower levels of academic achievement and poor social outcomes. The majority of research investigating the potential correlates of food insecurity has been undertaken in the United States (US), where regular national screening for food insecurity is undertaken using a comprehensive multi-item measurement. In Australia, screening for food insecurity takes place on a three yearly basis via the use of a crude, single-item included in the National Health Survey (NHS). This measure has been shown to underestimate the prevalence of food insecurity by 5%. From 1995 – 2004, the prevalence of food insecurity among the Australian population remained stable at 5%. Due to the perceived low prevalence of this issue, screening for food insecurity was not undertaken in the most recent NHS. Furthermore, there are few Australian studies investigating the potential determinants of food insecurity and none investigating potential outcomes among adults and children. This study aimed to examine these issues by a) investigating the prevalence of food insecurity among households residing in disadvantaged urban areas and comparing prevalence rates estimated by the more comprehensive 18-item and 6-item United States Department of Agriculture (USDA) Food Security Survey Module (FSSM) to those estimated by the current single-item measure used for surveillance in Australia and b) investigating the potential determinants and outcomes of food insecurity, Methods: A comprehensive literature review was undertaken to investigate the potential determinants and consequences of food insecurity among developed countries. This was followed by a cross-sectional study in which 1000 households from the most disadvantaged 5% of Brisbane areas were sampled and data collected via mail-based survey (final response rate = 53%, n = 505). Data were collected for food security status, sociodemographic characteristics (household income, education, age, gender, employment status, housing tenure and living arrangements), fruit and vegetable intakes, meat and take-away consumption, presence of depressive symptoms, presence of chronic disease and body mass index (BMI) among adults. Among children, data pertaining to BMI, parent-reported general health, days away from school and activities and behavioural problems were collected. Rasch analysis was used to investigate the psychometric properties of the 18-, 10- and 6-item adaptations of the USDA-FSSM, and McNemar's test was used to investigate the difference in the prevalence of food insecurity as measured by these three adaptations compared to the current single-item measure used in Australia. Chi square and logistic regression were used to investigate the differences in dietary and health outcomes among adults and health and behavioural outcomes among children. Results were adjusted for equivalised household income and, where necessary, for indigenous status, education and family type. Results: Overall, 25% of households in these urbanised-disadvantaged areas reported experiencing food insecurity; this increased to 34% when only households with children were analysed. The current reliance on a single-item measure to screen for food insecurity may underestimate the true burden among the Australian population, as this measure was shown to significantly underestimate the prevalence of food insecurity by five percentage points. Internationally, major potential determinants of food insecurity included poverty and indicators of poverty, such as low-income, unemployment and lower levels of education. Ethnicity, age, transportation and cooking and financial skills were also found to be potential determinants of food insecurity. Among Australian adults in disadvantaged urban areas, food insecurity was associated with a three-fold increase in experiencing poorer self-rated general health and a two-to-five-fold increase in the risk of depression. Furthermore, adults from food insecure households were twoto- three times more likely to have seen a general practitioner and/or been admitted to hospital within the previous six months, compared to their food secure counterparts. Weight status and intakes of fruits, vegetables and meat were not associated with food insecurity. Among Australian households with children, those in the lowest tertile were over 16 times more likely to experience food insecurity compared to those in the highest tertile for income. After adjustment for equivalised household income, children from food insecure households were three times more likely to have missed days away from school or other activities. Furthermore, children from food insecure households displayed a two-fold increase in atypical emotions and behavioural difficulties. Conclusions: Food insecurity is an important public health issue and may contribute to the burden on the health care system through its associations with depression and increased health care utilisation among adults and behavioural and emotional problems among children. Current efforts to monitor food insecurity in Australia do not occur frequently and use a tool that may underestimate the prevalence of food insecurity. Efforts should be made to improve the regularity of screening for food insecurity via the use of a more accurate screening measure. Most of the current strategies that aim to alleviate food insecurity do not sufficiently address the issue of insufficient financial resources for acquiring food; a factor which is an important determinant of food insecurity. Programs to address this issue should be developed in collaboration with groups at higher risk of developing food insecurity and should incorporate strategies to address the issue of low income as a barrier to food acquisition.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background Postoperative chemotherapy is currently not recommended for resected non-small cell lung cancer in many countries and centers. Recently, results of several large randomized clinical trials were reported with conflicting evidence. Accordingly, we sought to determine whether postoperative chemotherapy is associated with improved survival compared with that after surgical intervention alone. Methods Randomized clinical trials with cisplatin- or uracil plus ftorafur-containing regimens were included and evaluated separately. A systematic review that included randomized clinical trials performed before 1995 was identified and found to be of adequate quality. Further randomized controlled trials were identified by searching MEDLINE, EMBASE, and the Cochrane Controlled Trials Register from 1995 through 2004. In addition, the reference lists of articles and conference abstracts were searched. The logarithm of the hazard ratio and its standard error were calculated, and a fixed-effect model was used to combine the estimates. Results There were 7200 patients enrolled in 19 trials included in the analyses. An overall estimate of 13% relative reduction in mortality (95% confidence interval, 7%-19%) was found. There was 11% relative reduction in mortality associated with postoperative cisplatin (95% confidence interval, 4%-18%; P = .004) and 17% associated with uracil plus ftorafur (95% confidence interval, 5%-27%; P = .006) compared with that after surgical intervention alone. This means that there would be an additional survivor at 5 years for 25 patients treated with cisplatin or for 30 patients treated with uracil plus ftorafur. Conclusions Postoperative chemotherapy is associated with improved survival compared with that after surgical intervention alone. Selected patients with completely resected non-small cell lung cancer should be offered chemotherapy. Copyright © 2004 by The American Association for Thoracic Surgery.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An Artificial Neural Network (ANN) is a computational modeling tool which has found extensive acceptance in many disciplines for modeling complex real world problems. An ANN can model problems through learning by example, rather than by fully understanding the detailed characteristics and physics of the system. In the present study, the accuracy and predictive power of an ANN was evaluated in predicting kinetic viscosity of biodiesels over a wide range of temperatures typically encountered in diesel engine operation. In this model, temperature and chemical composition of biodiesel were used as input variables. In order to obtain the necessary data for model development, the chemical composition and temperature dependent fuel properties of ten different types of biodiesels were measured experimentally using laboratory standard testing equipments following internationally recognized testing procedures. The Neural Networks Toolbox of MatLab R2012a software was used to train, validate and simulate the ANN model on a personal computer. The network architecture was optimised following a trial and error method to obtain the best prediction of the kinematic viscosity. The predictive performance of the model was determined by calculating the absolute fraction of variance (R2), root mean squared (RMS) and maximum average error percentage (MAEP) between predicted and experimental results. This study found that ANN is highly accurate in predicting the viscosity of biodiesel and demonstrates the ability of the ANN model to find a meaningful relationship between biodiesel chemical composition and fuel properties at different temperature levels. Therefore the model developed in this study can be a useful tool in accurately predict biodiesel fuel properties instead of undertaking costly and time consuming experimental tests.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Rationale: Anabolic steroids are drugs of abuse. However, the potential for addiction remains unclear. Testosterone induces conditioned place preference in rats and oral self-administration in hamsters. Objectives: To determine if male rats and hamsters consume testosterone by intravenous (IV) or intracerebroventricular (ICV) self- administration. Methods: With each nose-poke in the active hole during daily 4-h tests in an operant condi- tioning chamber, gonad-intact adult rats and hamsters received 50 mg testosterone in an aqueous solution of b-cyclodextrin via jugular cannula. The inactive nose- poke hole served as a control. Additional hamsters received vehicle infusions. Results: Rats (n=7) expressed a significant preference for the active nose-poke hole (10.0€2.8 responses/4 h) over the inactive hole (4.7€1.2 responses/4 h). Similarly, during 16 days of testosterone self-administration IV, hamsters (n=9) averaged 11.7€2.9 responses/4 h and 6.3€1.1 responses/4 h in the active and inactive nose-poke holes, respectively. By contrast, vehicle controls (n=8) failed to develop a preference for the active nose-poke hole (6.5€0.5 and 6.4€0.3 responses/4 h). Hamsters (n=8) also self-administered 1 mg testosterone ICV (active hole:39.8€6.0 nose-pokes/ 4 h; inactive hole: 22.6€7.1 nose-pokes/4 h). When testosterone was replaced with vehicle, nose-poking in the active hole declined from 31.1€7.6 to 11.9€3.2 responses/ 4 h within 6 days. Likewise, reversing active and inactive holes increased nose-poking in the previously inactive hole from 9.1€1.9 to 25.6€5.4 responses/4 h. However, reducing the testosterone dose from 1 mg to 0.2 mg per 1 ml injection did not change nose-poking. Conclu- sions: Compared with other drugs of abuse, testosterone reinforcement is modest. Nonetheless, these data support the hypothesis that testosterone is reinforcing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Governments are challenged by the need to ensure that ageing populations stay active and engaged as they age. Therefore, it is critical to investigate the role of mobility in older people's engagement in out-of-home activities, and to identify the experiences they have within their communities. This research investigates the use of transportation by older people and its implications for their out-of-home activities within suburban environments. The qualitative, mixed-method approach employs data collection methods which include a daily travel diary (including a questionnaire), Global Positioning System (GPS) tracking and semi-structured interviews with older people living in suburban environments in Brisbane, Australia. Results show that older people are mobile throughout the city, and their car provides them with that opportunity to access desired destinations. This ability to drive allows older people to live independently and to assist others who do not drive, particularly where transport alternatives are not as accessible. The ability to transport goods and other people is a significant advantage of the private car over other transport options. People with no access to private transportation who live in low-density environments are disadvantaged when it comes to participation within the community. Further research is needed to better understand the relationship between transportation and participation within the community environment, to assist policy makers and city and transportation planners to develop strategies for age-friendly environments within the community.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The study investigated the influence of traffic and land use parameters on metal build-up on urban road surfaces. Mathematical relationships were developed to predict metals originating from fuel combustion and vehicle wear. The analysis undertaken found that nickel and chromium originate from exhaust emissions, lead, copper and zinc from vehicle wear, cadmium from both exhaust and wear and manganese from geogenic sources. Land use does not demonstrate a clear pattern in relation to the metal build-up process, though its inherent characteristics such as traffic activities exert influence. The equation derived for fuel related metal load has high cross-validated coefficient of determination (Q2) and low Standard Error of Cross-Validation (SECV) values indicates that the model is reliable, while the equation derived for wear-related metal load has low Q2 and high SECV values suggesting its use only in preliminary investigations. Relative Prediction Error values for both equations are considered to be well within the error limits for a complex system such as an urban road surface. These equations will be beneficial for developing reliable stormwater treatment strategies in urban areas which specifically focus on mitigation of metal pollution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an efficient hybrid evolutionary optimization algorithm based on combining Ant Colony Optimization (ACO) and Simulated Annealing (SA), called ACO-SA, for distribution feeder reconfiguration (DFR) considering Distributed Generators (DGs). Due to private ownership of DGs, a cost based compensation method is used to encourage DGs in active and reactive power generation. The objective function is summation of electrical energy generated by DGs and substation bus (main bus) in the next day. The approach is tested on a real distribution feeder. The simulation results show that the proposed evolutionary optimization algorithm is robust and suitable for solving DFR problem.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Accounting education is critical and any improvements in tertiary education of accounting students should result in better prepared graduates entering the profession. This study evaluates accounting students’ learning styles and the interaction of learning styles and teaching methodologies during degree programmes. Nine classes of accounting students (648 students) spread across four years and two degree programmes were evaluated. Students self-evaluated their learning style, pre-instruction. They were then subject to two separate teaching techniques (one active and one passive) in each course. Learning styles were then re-assessed and teaching techniques evaluated. Accounting students displayed a preference for passive learning, even those far advanced in their degrees. Furthermore, when learning styles matched teaching methods used, usefulness was assessed as high but when learning styles and teaching methods differed, usefulness deteriorated. Overall, the teaching methods were deemed more effective by active rather than passive learners. The implications are significant. To maximise educational benefit for the accounting profession, student learning styles should be assessed before designing appropriate teaching methodologies. This has resource implications which would have to be considered.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This cross-sectional study examined the association between psychosocial factors (mothers’ perception of own and child weight, maternal self-efficacy in feeding and involvement of the mother-in-law in child-feeding) and controlling feeding practices (monitoring, restriction, pressure to eat and passive feeding). Participants were 531 affluent-Indian mothers in Australia and Mumbai with children aged 1-5 years. The psychosocial variables and feeding practices were measured using a combination of previously validated scales and study-developed items/scales. Multivariable regression analyses were stratified by sample (Australia and Mumbai) to investigate psychosocial factors related to the feeding practices, adjusting for covariates. Self-efficacy in feeding was associated with each of the feeding practices in at least one of the samples (β values between 0.1-0.2, p= 0.04-0.005). The greater involvement of the mother-in-law in child-feeding was related to the higher use of restriction in both samples (β values ≥0.2, p=0.02). In contrast, maternal weight perceptions were not consistently associated with feeding practices in either sample. The findings highlighted that unique (self-efficacy in feeding) and culturally-specific (involvement of the mother-in-law) variables not extensively researched within the context of child-feeding were important factors associated with Indian mothers’ feeding practices. Greater consideration of these factors may be required when tailoring child-feeding interventions for Indian mothers.