32 resultados para Q-BITS

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

CFO and I/Q mismatch could cause significant performance degradation to OFDM systems. Their estimation and compensation are generally difficult as they are entangled in the received signal. In this paper, we propose some low-complexity estimation and compensation schemes in the receiver, which are robust to various CFO and I/Q mismatch values although the performance is slightly degraded for very small CFO. These schemes consist of three steps: forming a cosine estimator free of I/Q mismatch interference, estimating I/Q mismatch using the estimated cosine value, and forming a sine estimator using samples after I/Q mismatch compensation. These estimators are based on the perception that an estimate of cosine serves much better as the basis for I/Q mismatch estimation than the estimate of CFO derived from the cosine function. Simulation results show that the proposed schemes can improve system performance significantly, and they are robust to CFO and I/Q mismatch.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cutaneous malignant melanoma (CMM) is a major health issue in Queensland, Australia, which has the world’s highest incidence. Recent molecular and epidemiologic studies suggest that CMM arises through multiple etiological pathways involving gene-environment interactions. Understanding the potential mechanisms leading to CMM requires larger studies than those previously conducted. This article describes the design and baseline characteristics of Q-MEGA, the Queensland Study of Melanoma: Environmental and Genetic Associations, which followed up 4 population-based samples of CMM patients in Queensland, including children, adolescents, men aged over 50, and a large sample of adult cases and their families, including twins. Q-MEGA aims to investigate the roles of genetic and environmental factors, and their interaction, in the etiology of melanoma. Three thousand, four hundred and seventy-one participants took part in the follow-up study and were administered a computer-assisted telephone interview in 2002-2005. Updated data on environmental and phenotypic risk factors, and 2777 blood samples were collected from interviewed participants as well as a subset of relatives. This study provides a large and well-described population-based sample of CMM cases with follow-up data. Characteristics of the cases and repeatability of sun exposure and phenotype measures between the baseline and the follow-up surveys, from 6 to 17 years later, are also described.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Staff from QUT’s Creative Industries Faculty (Drama, Film & TV) collaborated with CARRS-Q (Centre for Accident Research and Road Safety – Queensland) to research, develop and produce a series of screen products. These products are designed to profile CARRS-Q for a variety of Australian and international audiences including potential students, research colleagues and collaborators, industry partners and professional bodies. They are designed for multiplatform display, including web, DVD and mobile devices. This project entails the adoption of practice-led research methodologies to explore and apply innovative screen production techniques including multi-image display; rapid-cut editing; and a combination of trained and non-trained talent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

a presentation about immersive visualised simulation systems, image analysis and GPGPU Techonology

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Staff and students of the Surveying and Spatial Sciences discipline at QUT have worked collaboratively with the Institute of Sustainable Resources in the creation and development of spatial information layers and infrastructure to support multi-disciplinary research efforts at the Samford Ecological Research Facility (SERF). The SERF property is unique in that it provides staff and students with a semi-rural controlled research base for multiple users. This paper aims to describe the development of a number of spatial information layers and network of survey monuments that assist and support research infrastructure at SERF. A brief historical background about the facility is presented along with descriptions of the surveying and mapping activities undertaken. These broad ranging activities include introducing monument infrastructure and a geodetic control network; surveying activities for aerial photography ground-control targets including precise levelling with barcode instruments; development of an ortho-rectified image spatial information layer; Real-Time-Kinematic Global Positioning Systems (RTK-GPS) surveying for constructing 100metre confluence points/monuments to support science-based disciplines to undertake environmental research transects and long-term ecological sampling; and real-world learning initiative to assist with water engineering projects and student experiential learning. The spatial information layers and physical infrastructure have been adopted by two specific yet diverse user groups with an interest in the long-term research focus of SERF.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[Selection of papers from the Older Road User Safety Symposium, 26 November 2000, Brisbane, Australia.]----- This publication is a selection of papers on older road user safety which were presented at the Older Road User Safety Symposium on Sunday 26 November 2000 at the Sheraton Brisbane Hotel, Queensland, Australia. The Symposium was held on the day before Australia’s annual Road Safety Research, Policing and Education Conference, which provided an opportunity to garner both presenters and participants from the wider road safety community in Australia. Road safety is a large and diverse area of scholarship and practice, and many disciplines are drawn on in the processes of understanding and addressing road safety problems. The safety of older road users is no different. As this selection shows, work on older road user safety can be informed by demography, research on the mental and physical effects of ageing, social research on older people as road users, evaluation of educational and behavioural interventions, road crash analysis, engineering research and practice, and reviews of policy approaches within Australia and elsewhere. It is possible to summarise these into four constellations, which are reflected in the papers selected for this publication: social impacts and responses; physical and cognitive capability; specific road use performance; and environment/ecology. Though three years have passed since the Symposium, the issues raised in these papers remain current.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent research on bicycle helmets and concerns about how public bicycle hire schemes will function in the context of compulsory helmet wearing laws have drawn media attention. This monograph presents the results of research commissioned by the Queensland Department of Transport and Main Roads to review the national and international literature regarding the health outcomes of cycling and bicycle helmets and examine crash and hospital data. It also includes critical examinations of the methodology used by Voukelatos and Rissel (2010), and estimates the likely effects of possible segmented approaches to bicycle helmet wearing legislation. The research concludes that current bicycle helmet wearing rates are halving the number of head injuries experienced by Queensland cyclists. Helmet wearing legislation discouraged people from cycling when it was first introduced but there is little evidence that it continues to do so. Cycling has significant health benefits and should be encouraged in ways that reduce the risk of the most serious injuries. Infrastructure and speed management approaches to improving the safety of cycling should be undertaken as part of a Safe System approach, but protection of the individual by simple and cost-effective methods such as bicycle helmets should also be part of an overall package of measures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Overview of the CARRS-Q Simulators • CARRS-Q has two simulators: The Advanced Driving Simulator and a simpler “Desktop” simulator • Both use the same research grade simulation software SCANeR, produced by French company OKTAL • The Advanced Driving Simulator can integrate three aspects of simulation: – driving simulator – traffic simulator (links to AIMSUN) – control simulator

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Born in Germany, Dr Paul moved to Australia in 2009 to join UniSA’s Mawson Institute. He is currently the Director of ErgoLab, a research facility dedicated to enhancing the field of ergonomics – where products are designed to better fit the people that use them. Dr Paul plays a major role in ergonomic studies from automotive design, to assistive technologies for the elderly and disabled. He currently supervises several PhD students and regularly consults to industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we use a sequence-based visual localization algorithm to reveal surprising answers to the question, how much visual information is actually needed to conduct effective navigation? The algorithm actively searches for the best local image matches within a sliding window of short route segments or 'sub-routes', and matches sub-routes by searching for coherent sequences of local image matches. In contract to many existing techniques, the technique requires no pre-training or camera parameter calibration. We compare the algorithm's performance to the state-of-the-art FAB-MAP 2.0 algorithm on a 70 km benchmark dataset. Performance matches or exceeds the state of the art feature-based localization technique using images as small as 4 pixels, fields of view reduced by a factor of 250, and pixel bit depths reduced to 2 bits. We present further results demonstrating the system localizing in an office environment with near 100% precision using two 7 bit Lego light sensors, as well as using 16 and 32 pixel images from a motorbike race and a mountain rally car stage. By demonstrating how little image information is required to achieve localization along a route, we hope to stimulate future 'low fidelity' approaches to visual navigation that complement probabilistic feature-based techniques.