165 resultados para Cipher and telegraph codes.

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper focuses on codes of practice in domestic (in-country) and international (out of country) philanthropic giving/grantmaking, their similarities and differences. Codes of principle and practice are interesting not so much because they accurately reflect differences in practice on the ground, but rather because they indicate what is considered important or relevant, as well as aspirational. Codes tell us what people are most concerned about – what is seen to be in need of regulation or reminder.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural components similar to the well-known Grain cipher and the LILI family of keystream generators. Mixer uses a 128-bit key and 64-bit IV to initialise a 217-bit internal state. The analysis is focused on the initialisation function of Mixer and shows that there exist multiple key-IV pairs which, after initialisation, produce the same initial state, and consequently will generate the same keystream. Furthermore, if the number of iterations of the state update function performed during initialisation is increased, then the number of distinct initial states that can be obtained decreases. It is also shown that there exist some distinct initial states which produce the same keystream, resulting in a further reduction of the effective key space

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is much still to learn about how young children’s membership with peers shapes their constructions of moral and social obligations within everyday activities in the school playground. This paper investigates how a small group of girls, aged four to six years, account for their everyday social interactions in the playground. They were video-recorded as they participated in a pretend game of school. Several days later, a video-recorded excerpt of the interaction was shown to them and invited to comment on what was happening in the video. This conversation was audio-recorded. Drawing on a conversation analysis approach, this chapter shows that, despite their discontent and complaining about playing the game of school, the girls’ actions showed their continued orientation to the particular codes of the game, of ‘no going away’ and ‘no telling’. By making relevant these codes, jointly constructed by the girls during the interview, they managed each other’s continued participation within two arenas of action: the pretend, as a player in a pretend game of school; and the real, as a classroom member of a peer group. Through inferences to explicit and implicit codes of conduct, moral obligations were invoked as the girls attempted to socially exclude or build alliances with others, and enforce their own social position. As well, a shared history that the girls re-constructed has moral implications for present and future relationships. The girls oriented to the history as an interactional resource for accounting for their actions in the pretend game. This paper uncovers how children both participate in, and shape, their everyday social worlds through talk and interaction and the consequences a taken-for-granted activity such as playing school has for their moral and social positions in the peer group.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

What are the ethical and political implications when the very foundations of life —things of awe and spiritual significance — are translated into products accessible to few people? This book critically analyses this historic recontextualisation. Through mediation — when meaning moves ‘from one text to another, from one discourse to another’ — biotechnology is transformed into analysable data and into public discourses. The unique book links biotechnology with media and citizenship. As with any ‘commodity’, biological products have been commodified. Because enormous speculative investment rests on this, risk will be understated and benefit will be overstated. Benefits will be unfairly distributed. Already, the bioprospecting of Southern megadiverse nations, legally sanctioned by U.S. property rights conventions, has led to wealth and health benefits in the North. Crucial to this development are biotechnological discourses that shift meanings from a “language of life” into technocratic discourses, infused with neo-liberal economic assumptions that promise progress and benefits for all. Crucial in this is the mass media’s representation of biotechnology for an audience with poor scientific literacy. Yet, even apparently benign biotechnology spawned by the Human Genome Project such as prenatal screening has eugenic possibilities, and genetic codes for illness are eagerly sought by insurance companies seeking to exclude certain people. These issues raise important questions about a citizenship that is founded on moral responsibility for the wellbeing of society now and into the future. After all, biotechnology is very much concerned with the essence of life itself. This book provides a space for alternative and dissident voices beyond the hype that surrounds biotechnology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study investigates the everyday practices of young children acting in their social worlds within the context of the school playground. It employs an ethnographic ethnomethodological approach using conversation analysis. In the context of child participation rights advanced by the United Nations Convention on the Rights of the Child (UNCRC) and childhood studies, the study considers children’s social worlds and their participation agendas. The participants of the study were a group of young children in a preparatory year setting in a Queensland school. These children, aged 4 to 6 years, were videorecorded as they participated in their day-to-day activities in the classroom and in the playground. Data collection took place over a period of three months, with a total of 26 hours of video data. Episodes of the video-recordings were shown to small groups of children and to the teacher to stimulate conversations about what they saw on the video. The conversations were audio-recorded. This method acknowledged the child’s standpoint and positioned children as active participants in accounting for their relationships with others. These accounts are discussed as interactionally built comments on past joint experiences and provided a starting place for analysis of the video-recorded interaction. Four data chapters are presented in this thesis. Each data chapter investigates a different topic of interaction. The topics include how children use “telling” as a tactical tool in the management of interactional trouble, how children use their “ideas” as possessables to gain ownership of a game and the interactional matters that follow, how children account for interactional matters and bid for ownership of “whose idea” for the game and finally, how a small group of girls orientated to a particular code of conduct when accounting for their actions in a pretend game of “school”. Four key themes emerged from the analysis. The first theme addresses two arenas of action operating in the social world of children, pretend and real: the “pretend”, as a player in a pretend game, and the “real”, as a classroom member. These two arenas are intertwined. Through inferences to explicit and implicit “codes of conduct”, moral obligations are invoked as children attempt to socially exclude one another, build alliances and enforce their own social positions. The second theme is the notion of shared history. This theme addresses the history that the children reconstructed, and acts as a thread that weaves through their interactions, with implications for present and future relationships. The third theme is around ownership. In a shared context, such as the playground, ownership is a highly contested issue. Children draw on resources such as rules, their ideas as possessables, and codes of behaviour as devices to construct particular social and moral orders around owners of the game. These themes have consequences for children’s participation in a social group. The fourth theme, methodological in nature, shows how the researcher was viewed as an outsider and novice and was used as a resource by the children. This theme is used to inform adult-child relationships. The study was situated within an interest in participation rights for children and perspectives of children as competent beings. Asking children to account for their participation in playground activities situates children as analysers of their own social worlds and offers adults further information for understanding how children themselves construct their social interactions. While reporting on the experiences of one group of children, this study opens up theoretical questions about children’s social orders and these influences on their everyday practices. This thesis uncovers how children both participate in, and shape, their everyday social worlds through talk and interaction. It investigates the consequences that taken-for-granted activities of “playing the game” have for their social participation in the wider culture of the classroom. Consideration of this significance may assist adults to better understand and appreciate the social worlds of young children in the school playground.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present several new observations on the SMS4 block cipher, and discuss their cryptographic significance. The crucial observation is the existence of fixed points and also of simple linear relationships between the bits of the input and output words for each component of the round functions for some input words. This implies that the non-linear function T of SMS4 does not appear random and that the linear transformation provides poor diffusion. Furthermore, the branch number of the linear transformation in the key scheduling algorithm is shown to be less than optimal. The main security implication of these observations is that the round function is not always non-linear. Due to this linearity, it is possible to reduce the number of effective rounds of SMS4 by four. We also investigate the susceptibility of SMS4 to further cryptanalysis. Finally, we demonstrate a successful differential attack on a slightly modified variant of SMS4. These findings raise serious questions on the security provided by SMS4.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A study of crowds drawn to Australian football matches in colonial Victoria illuminates key aspects of the code's genesis, development and popularity. Australian football was codified by a middle-class elite that, as in Britain, created forms of mass entertainment that were consistent with the kind of industrial capitalist society they were attempting to organise. But the 'lower orders' were inculcated with traditional British folkways in matters of popular amusement, and introduced a style of 'barracking' for this new code that resisted the hegemony of the elite football administrators. By the end of the colonial period Australian football was firmly entrenched as a site of contestation between plebeian and bourgeois codes of spectating that reflected the social and ethnic diversity of the clubs making up the Victorian competition. Australian football thereby offers a classic vignette in the larger history of 'resistance through ritual'.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present paper presents and discusses the use of dierent codes regarding the numerical simulation of a radial-in ow turbine. A radial-in ow turbine test case was selected from published literature [1] and commercial codes (Fluent and CFX) were used to perform the steady-state numerical simulations. An in-house compressible- ow simulation code, Eilmer3 [2] was also adapted in order to make it suitable to perform turbomachinery simulations and preliminary results are presented and discussed. The code itself as well as its adaptation, comprising the addition of terms for the rotating frame of reference, programmable boundary conditions for periodic boundaries and a mixing plane interface between the rotating and non-rotating blocks are also discussed. Several cases with dierent orders of complexity in terms of geometry were considered and the results were compared across the dierent codes. The agreement between these results and published data is also discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: The treatment for deep surgical site infection (SSI) following primary total hip arthroplasty (THA) varies internationally and it is at present unclear which treatment approaches are used in Australia. The aim of this study is to identify current treatment approaches in Queensland, Australia, show success rates and quantify the costs of different treatments. METHODS: Data for patients undergoing primary THA and treatment for infection between January 2006 and December 2009 in Queensland hospitals were extracted from routinely used hospital databases. Records were linked with pathology information to confirm positive organisms. Diagnosis and treatment of infection was determined using ICD-10-AM and ACHI codes, respectively. Treatment costs were estimated based on AR-DRG cost accounting codes assigned to each patient hospital episode. RESULTS: A total of n=114 patients with deep surgical site infection were identified. The majority of patients (74%) were first treated with debridement, antibiotics and implant retention (DAIR), which was successful in eradicating the infection in 60.3% of patients with an average cost of $13,187. The remaining first treatments were 1-stage revision, successful in 89.7% with average costs of $27,006, and 2-stage revisions, successful in 92.9% of cases with average costs of $42,772. Multiple treatments following 'failed DAIR' cost on average $29,560, for failed 1-stage revision were $24,357, for failed 2-stage revision were $70,381 and were $23,805 for excision arthroplasty. CONCLUSIONS: As treatment costs in Australia are high primary prevention is important and the economics of competing treatment choices should be carefully considered. These currently vary greatly across international settings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Celebration (and the celebritisation) of the Australian-ness of children’s authors who enjoy critical or commercial international success, and especially of those who win international prizes speaks to a desire to partake in both national and international cultural spheres. Prizing is often presumed to both guarantee and emerge from a creator's reputation at home and abroad. Australian artist and writer Shaun Tan has received a wide array of cultural and literary prizes, ranging from Australian book awards, to an Academy Award, to the Astrid Lindgren Memorial Prize. This paper considers logics of evaluation and interpretation as they can be traced in the intratextual, intertextual, and extratextual codes of Shaun Tan’s picture book, The Lost Thing (2000), the animated film adaptation of The Lost Thing (2010). It further considers the ways in which the desire for a global audience may necessitate an erasure of the national culture which is traded on in a global market.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article argues that a semantic shift in the crowd in Vietnam over the last decade has allowed public space to become a site through which transgressive ideologies and desires may have an outlet. At a time of accelerating social change, the state has effectively delimited public criticism yet a fragile but assertive form of Vietnamese democratic practice has arisen in public space, at the margins of official society, in sites previously equated with state control. Official state functions attract only small audiences, and rather than celebrating the dominance of the party, reveal the disengagement of the populace in the party's activities. Where crowds were always a component of state (stage)-managed events, now public spaces are attracting large numbers of people for supposedly non-political activities which may become transgressive acts condemned by the regime. In support of the notion that crowding is an opening up of the possibility of more subversive political actions, the paper presents an analysis of recent crowd formations and the state's reaction to them. The analysis reveals the modalities through which popular culture has provided the public with the means to transcend the constraints of official, authorized, and legitimate codes of behaviour in public space. Changes in the use of public space, it is argued, map the sets of relations between the public and the state, making these transforming relationships visible, although fraught with contradictions and anomalies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Advanced composite materials offer remarkable potential in the upgrade of civil engineering structures. The evolution of CFRP (carbon fibre reinforced polymer) technologies and their versatility for applications in civil constructions require comprehensive and reliable codes of practice. Guidelines are available on the rehabilitation and retrofit of concrete structures with advanced composite materials. However, there is a need to develop appropriate design guidelines for CFRP strengthened steel structures. It is important to understand the bond characteristics between CFRP and steel plates. This paper describes a series of double strap shear tests loaded in tension to investigate the bond between CFRP sheets and steel plates. Both normal modulus (240 GPa) and high modulus (640 GPa) CFRPs were used in the test program. Strain gauges were mounted to capture the strain distribution along the CFRP length. Different failure modes were observed for joints with normal modulus CFRP and those with high modulus CFRP. The strain distribution along the CFRP length is similar for the two cases. A shorter effective bond length was obtained for joints with high modulus CFRP whereas larger ultimate load carrying capacity can be achieved for joints with normal modulus CFRP when the bond length is long enough.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Understanding ethics and law in health care is an essential part of nurses’ and midwives’ professional standards. Ethics, Law and Health Care focuses on teaching applied ethics and law in a manner that illustrates the real world applications of these core components of the nursing and midwifery curriculum and practice. It equips readers with the ability to recognise and address legal and ethical issues that will arise in their professional practice. The book uses the four principles of biomedical ethics (autonomy, non-maleficence, beneficence and justice) together with the use of both the Nursing and Midwifery Codes of Ethics and Codes of Professional Conduct, issued by the Nursing and Midwifery Board of Australia, as a central means through which to analyse and approach ethical and legal issues. Ethics, Law and Health Care is scaffolded to assist readers in understanding legal and ethical principles, to integrate them in the context of a particular issue within professional practice, and provide them with a decision-making framework to take action in a professional context by utilising the Codes as well as state and federal law. Aided by pedagogical features such as case studies, review questions, further reading and a glossary of common terms, this book is an essential resource for students, academics and practitioners.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

WG-7 is a stream cipher based on WG stream cipher and has been designed by Luo et al. (2010). This cipher is designed for low cost and lightweight applications (RFID tags and mobile phones, for instance). This paper addresses cryptographic weaknesses of WG-7 stream cipher. We show that the key stream generated by WG-7 can be distinguished from a random sequence after knowing 213.5 keystream bits and with a negligible error probability. Also, we investigate the security of WG-7 against algebraic attacks. An algebraic key recovery attack on this cipher is proposed. The attack allows to recover both the internal state and the secret key with the time complexity about 2/27.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

RC4(n, m) is a stream cipher based on RC4 and is designed by G. Gong et al. It can be seen as a generalization of the famous RC4 stream cipher designed by Ron Rivest. The authors of RC4(n, m) claim that the cipher resists all the attacks that are successful against the original RC4. The paper reveals cryptographic weaknesses of the RC4(n, m) stream cipher. We develop two attacks. The first one is based on non-randomness of internal state and allows to distinguish it from a truly random cipher by an algorithm that has access to 24·n bits of the keystream. The second attack exploits low diffusion of bits in the KSA and PRGA algorithms and recovers all bytes of the secret key. This attack works only if the initial value of the cipher can be manipulated. Apart from the secret key, the cipher uses two other inputs, namely, initial value and initial vector. Although these inputs are fixed in the cipher specification, some applications may allow the inputs to be under the attacker control. Assuming that the attacker can control the initial value, we show a distinguisher for the cipher and a secret key recovery attack that for the L-bit secret key, is able to recover it with about (L/n) · 2n steps. The attack has been implemented on a standard PC and can reconstruct the secret key of RC(8, 32) in less than a second.