55 resultados para 512

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Designers and artists have integrated recent advances in interactive, tangible and ubiquitous computing technologies to create new forms of interactive environments in the domains of work, recreation, culture and leisure. Many designs of technology systems begin with the workplace in mind, and with function, ease of use, and efficiency high on the list of priorities. [1] These priorities do not fit well with works designed for an interactive art environment, where the aims are many, and where the focus on utility and functionality is to support a playful, ambiguous or even experimental experience for the participants. To evaluate such works requires an integration of art-criticism techniques with more recent Human Computer Interaction (HCI) methods, and an understanding of the different nature of engagement in these environments. This paper begins a process of mapping a set of priorities for amplifying engagement in interactive art installations. I first define the concept of ludic engagement and its usefulness as a lens for both design and evaluation in these settings. I then detail two fieldwork evaluations I conducted within two exhibitions of interactive artworks, and discuss their outcomes and the future directions of this research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing trauma registries in Australia and New Zealand play an important role in monitoring the management of injured patients. Over the past decade, such monitoring has been translated into changes in clinical processes and practices. Monitoring and changes have been ad hoc, as there are currently no Australasian benchmarks for “optimal” injury management. A binational trauma registry is urgently needed to benchmark injury management to improve outcomes for injured patients.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective We aimed to predict sub-national spatial variation in numbers of people infected with Schistosoma haematobium, and associated uncertainties, in Burkina Faso, Mali and Niger, prior to implementation of national control programmes. Methods We used national field survey datasets covering a contiguous area 2,750 × 850 km, from 26,790 school-aged children (5–14 years) in 418 schools. Bayesian geostatistical models were used to predict prevalence of high and low intensity infections and associated 95% credible intervals (CrI). Numbers infected were determined by multiplying predicted prevalence by numbers of school-aged children in 1 km2 pixels covering the study area. Findings Numbers of school-aged children with low-intensity infections were: 433,268 in Burkina Faso, 872,328 in Mali and 580,286 in Niger. Numbers with high-intensity infections were: 416,009 in Burkina Faso, 511,845 in Mali and 254,150 in Niger. 95% CrIs (indicative of uncertainty) were wide; e.g. the mean number of boys aged 10–14 years infected in Mali was 140,200 (95% CrI 6200, 512,100). Conclusion National aggregate estimates for numbers infected mask important local variation, e.g. most S. haematobium infections in Niger occur in the Niger River valley. Prevalence of high-intensity infections was strongly clustered in foci in western and central Mali, north-eastern and northwestern Burkina Faso and the Niger River valley in Niger. Populations in these foci are likely to carry the bulk of the urinary schistosomiasis burden and should receive priority for schistosomiasis control. Uncertainties in predicted prevalence and numbers infected should be acknowledged and taken into consideration by control programme planners.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A complete series of cross-sectional computed tomography (CT) scans were obtained of a mummy of an Egyptian priestess, Tjenmutengebtiu, (Jeni), who lived in the twenty-second Dynasty (c. 945-715 BC). The purpose of this joint British Museum and St. Thomas’ Hospital project was effectively to ‘unwrap’ a mummy using cross-sectional X-rays. Jeni is encased in a beautifully decorated anthropomorphic cartonnage coffin. The head and neck were scanned with 2mm slices, the teeth with 1mm slices and the rest of the body with 4 mm slices, a 512 x 512 matrix was used. The 2D CT images, and 3D surface reconstruction’s, demonstrate many features of the embalming techniques and funerary customs of the XXII Dynasty. The presence of cloth protruding from the nasal cavities into the otherwise empty cranial cavity indicates that the brain was extracted via the nose. The remains of the heart can be seen as well as four organ packs corresponding to the mummified and repackaged lungs, intestines, stomach and liver. Each of the organ packs encloses a wax figurine representing one of the four sons of Horus. The teeth are in very good condition with little signs of wear, which, considering the gritty diet of the Egyptians, indicates that Jeni must have been very young when she died. A young age of death is also suggested by analysis of the shape of the molar teeth. The body is generally in very good condition demonstrating the consummate skill of the twenty-second Dynasty embalmers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although placing reflective markers on pedestrians’ major joints can make pedestrians more conspicuous to drivers at night, it has been suggested that this “biological motion” effect may be reduced when visual clutter is present. We tested whether extraneous points of light affected the ability of 12 younger and 12 older drivers to see pedestrians as they drove on a closed road at night. Pedestrians wore black clothing alone or with retroreflective markings in four different configurations. One pedestrian walked in place and was surrounded by clutter on half of the trials. Another was always surrounded by visual clutter but either walked in place or stood still. Clothing configuration, pedestrian motion, and driver age influenced conspicuity but clutter did not. The results confirm that even in the presence of visual clutter pedestrians wearing biological motion configurations are recognized more often and at greater distances than when they wear a reflective vest.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a previous column of Queensland Lawyer,1 the case of Scott v CAL No 14 Pty Ltd (No 2) (2009) 256 ALR 512 was discussed. Special leave to appeal against the decision of the Full Court of the Supreme Court of Tasmania was granted and on 10 November 2009 the High Court handed down its decision.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: To demonstrate properties of the International Classification of the External Cause of Injury (ICECI) as a tool for use in injury prevention research. Methods: The Childhood Injury Prevention Study (CHIPS) is a prospective longitudinal follow up study of a cohort of 871 children 5–12 years of age, with a nested case crossover component. The ICECI is the latest tool in the International Classification of Diseases (ICD) family and has been designed to improve the precision of coding injury events. The details of all injury events recorded in the study, as well as all measured injury related exposures, were coded using the ICECI. This paper reports a substudy on the utility and practicability of using the ICECI in the CHIPS to record exposures. Interrater reliability was quantified for a sample of injured participants using the Kappa statistic to measure concordance between codes independently coded by two research staff. Results: There were 767 diaries collected at baseline and event details from 563 injuries and exposure details from injury crossover periods. There were no event, location, or activity details which could not be coded using the ICECI. Kappa statistics for concordance between raters within each of the dimensions ranged from 0.31 to 0.93 for the injury events and 0.94 and 0.97 for activity and location in the control periods. Discussion: This study represents the first detailed account of the properties of the ICECI revealed by its use in a primary analytic epidemiological study of injury prevention. The results of this study provide considerable support for the ICECI and its further use.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The activities of governments, by their very nature, involve interactions with a broad array of public and private sector entities, from other governments, to business, academia and individual citizens. In the current era, there is a growing expectation that government programs and services will be delivered in a ‘simple, seamless and connected’ manner,1 leading to increased efficiency in government operations and improved service delivery.2 Achieving ‘collaborative, effective and efficient government and the delivery of seamless government services’ requires the implementation of interoperable technologies and procedures.3 Standards, which aim to enable organisations, platforms and systems to work with each other, are fundamental to interoperability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several lines of evidence implicate the p38 mitogen-activated protein kinase (p38 MAPK) in the proinflammatory response to bacterial agents and cytokines. Equally, the transcription factor, nuclear factor (NF)-kappaB, is recognized to be a critical determinant of the inflammatory response in intestinal epithelial cells (IECs). However, the precise inter-relationship between the activation of p38 MAPK and activation of the transcription factor NF-kappaB in the intestinal epithelial cell (IEC) system, remains unknown. Here we show that interleukin (IL)-1beta activates all three MAPKs in Caco-2 cells. The production of IL-8 and monocyte chemotactic protein 1 (MCP-1) was attenuated by 50% when these cells were preincubated with the p38 MAPK inhibitor, SB 203580. Further investigation of the NF-kappaB signalling system revealed that the inhibitory effect was independent of the phosphorylation and degradation of IkappaBalpha, the binding partner of NF-kappaB. This effect was also independent of the DNA binding of the p65 Rel A subunit, as well as transactivation, determined by an NF-kappaB luciferase construct, using both SB 203580 and dominant-negative p38 MAPK. Evaluation of IL-8 and MCP-1 RNA messages by reverse transcription-polymerase chain reaction (RT-PCR) revealed that the inhibitory effect of SB 203580 was associated with a reduction in this parameter. Using an IL-8-luciferase promoter construct, an effect of p38 upon its activation by both pharmacological and dominant-negative p38 construct co-transfection was demonstrated. It is concluded that p38 MAPK influences the expression of chemokines in intestinal epithelial cells, through an effect upon the activation of the chemokine promoter, and does not directly involve the activation of the transcription factor NF-kappaB

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless network technologies, such as IEEE 802.11 based wireless local area networks (WLANs), have been adopted in wireless networked control systems (WNCS) for real-time applications. Distributed real-time control requires satisfaction of (soft) real-time performance from the underlying networks for delivery of real-time traffic. However, IEEE 802.11 networks are not designed for WNCS applications. They neither inherently provide quality-of-service (QoS) support, nor explicitly consider the characteristics of the real-time traffic on networked control systems (NCS), i.e., periodic round-trip traffic. Therefore, the adoption of 802.11 networks in real-time WNCSs causes challenging problems for network design and performance analysis. Theoretical methodologies are yet to be developed for computing the best achievable WNCS network performance under the constraints of real-time control requirements. Focusing on IEEE 802.11 distributed coordination function (DCF) based WNCSs, this paper analyses several important NCS network performance indices, such as throughput capacity, round trip time and packet loss ratio under the periodic round trip traffic pattern, a unique feature of typical NCSs. Considering periodic round trip traffic, an analytical model based on Markov chain theory is developed for deriving these performance indices under a critical real-time traffic condition, at which the real-time performance constraints are marginally satisfied. Case studies are also carried out to validate the theoretical development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper argues that young people need to be given the opportunity to recognise the interaction between their own understandings of the world as it is now and the vision of what it might become. To support this argument, we discuss an urban planning project, known as the Lower Mill Site Project, which involved active participation of high school students from the local community. The outcomes of this project demonstrate the positive contributions young people can make to the process of urban redevelopment, the advantages of using a participatory design approach, and the utopian possibilities that can emerge when young people are invited to be part of an intergenerational community project.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the effect of electric field enhancement on Pt/nanostructured ZnO Schottky diode based hydrogen sensors under reverse bias condition has been investigated. Current-voltage characteristics of these diodes have been studied at temperatures from 25 to 620 °C and their free carrier density concentration was estimated by exposing the sensors to hydrogen gas. The experimental results show a significantly lower breakdown voltage in reversed bias current-voltage characteristics than the conventional Schottky diodes and also greater lateral voltage shift in reverse bias operation than the forward bias. This can be ascribed to the increased localized electric fields emanating from the sharp edges and corners of the nanostructured morphologies. At 620 °C, voltage shifts of 114 and 325 mV for 0.06% and 1% hydrogen have been recorded from dynamic response under the reverse bias condition. © 2010 Elsevier B.V. All rights reserved.