725 resultados para dual system encryption
em Queensland University of Technology - ePrints Archive
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
The integration of separate, yet complimentary, cortical pathways appears to play a role in visual perception and action when intercepting objects. The ventral system is responsible for object recognition and identification, while the dorsal system facilitates continuous regulation of action. This dual-system model implies that empirically manipulating different visual information sources during performance of an interceptive action might lead to the emergence of distinct gaze and movement pattern profiles. To test this idea, we recorded hand kinematics and eye movements of participants as they attempted to catch balls projected from a novel apparatus that synchronised or de-synchronised accompanying video images of a throwing action and ball trajectory. Results revealed that ball catching performance was less successful when patterns of hand movements and gaze behaviours were constrained by the absence of advanced perceptual information from the thrower's actions. Under these task constraints, participants began tracking the ball later, followed less of its trajectory, and adapted their actions by initiating movements later and moving the hand faster. There were no performance differences when the throwing action image and ball speed were synchronised or de-synchronised since hand movements were closely linked to information from ball trajectory. Results are interpreted relative to the two-visual system hypothesis, demonstrating that accurate interception requires integration of advanced visual information from kinematics of the throwing action and from ball flight trajectory.
Resumo:
This paper explores a new breed of energy storage system interfacing for grid connected photovoltaic (PV) systems. The proposed system uses the popular dual inverter topology in which one inverter is supplied by a PV cell array and the other by a Battery Energy Storage System (BESS). The resulting conversion structure is controlled in a way that both demand matching and maximum power point tracking of the PV cell array are performed simultaneously. This dual inverter topology can produces 2, 3, 4 and 5 level inverter voltage waveforms at the dc-link voltage ratios of 0:1, 1:1, 2:1 and 3:2 respectively. Since the output voltage of the PV cell array and the battery are uncorrelated and dynamically change, the resulting dc-link voltage ratio can take non-integer values as well. These noninteger dc-link voltage ratios produce unevenly distributed space vectors. Therefore, the main issue with the proposed system is the generation of undistorted current even in the presence of unevenly distributed and dynamically changing space vectors. A modified space vector modulation method is proposed in this paper to address this issue and its efficacy is proved by simulation results. The ability of the proposed system to act as an active power source is also verified.
Resumo:
Background: Exercise could contribute to weight loss by altering the sensitivity of the appetite regulatory system. Objective: The aim of this study was to assess the effects of 12 wk of mandatory exercise on appetite control. Design: Fifty-eight overweight and obese men and women [mean (±SD) body mass index (in kg/m2) = 31.8 ± 4.5, age = 39.6 ± 9.8 y, and maximal oxygen intake = 29.1 ± 5.7 mL · kg–1 · min–1] completed 12 wk of supervised exercise in the laboratory. The exercise sessions were designed to expend 2500 kcal/wk. Subjective appetite sensations and the satiating efficiency of a fixed breakfast were compared at baseline (week 0) and at week 12. An Electronic Appetite Rating System was used to measure subjective appetite sensations immediately before and after the fixed breakfast in the immediate postprandial period and across the whole day. The satiety quotient of the breakfast was determined by calculating the change in appetite scores relative to the breakfast's energy content. Results: Despite large variability, there was a significant reduction in mean body weight (3.2 ± 3.6 kg), fat mass (3.2 ± 2.2 kg), and waist circumference (5.0 ± 3.2 cm) after 12 wk. The analysis showed that a reduction in body weight and body composition was accompanied by an increase in fasting hunger and in average hunger across the day (P < 0.0001). Paradoxically, the immediate and delayed satiety quotient of the breakfast also increased significantly (P < 0.05). Conclusions: These data show that the effect of exercise on appetite regulation involves at least 2 processes: an increase in the overall (orexigenic) drive to eat and a concomitant increase in the satiating efficiency of a fixed meal.
Resumo:
In an automotive environment, the performance of a speech recognition system is affected by environmental noise if the speech signal is acquired directly from a microphone. Speech enhancement techniques are therefore necessary to improve the speech recognition performance. In this paper, a field-programmable gate array (FPGA) implementation of dual-microphone delay-and-sum beamforming (DASB) for speech enhancement is presented. As the first step towards a cost-effective solution, the implementation described in this paper uses a relatively high-end FPGA device to facilitate the verification of various design strategies and parameters. Experimental results show that the proposed design can produce output waveforms close to those generated by a theoretical (floating-point) model with modest usage of FPGA resources. Speech recognition experiments are also conducted on enhanced in-car speech waveforms produced by the FPGA in order to compare recognition performance with the floating-point representation running on a PC.
Resumo:
Information Retrieval is an important albeit imperfect component of information technologies. A problem of insufficient diversity of retrieved documents is one of the primary issues studied in this research. This study shows that this problem leads to a decrease of precision and recall, traditional measures of information retrieval effectiveness. This thesis presents an adaptive IR system based on the theory of adaptive dual control. The aim of the approach is the optimization of retrieval precision after all feedback has been issued. This is done by increasing the diversity of retrieved documents. This study shows that the value of recall reflects this diversity. The Probability Ranking Principle is viewed in the literature as the “bedrock” of current probabilistic Information Retrieval theory. Neither the proposed approach nor other methods of diversification of retrieved documents from the literature conform to this principle. This study shows by counterexample that the Probability Ranking Principle does not in general lead to optimal precision in a search session with feedback (for which it may not have been designed but is actively used). Retrieval precision of the search session should be optimized with a multistage stochastic programming model to accomplish the aim. However, such models are computationally intractable. Therefore, approximate linear multistage stochastic programming models are derived in this study, where the multistage improvement of the probability distribution is modelled using the proposed feedback correctness method. The proposed optimization models are based on several assumptions, starting with the assumption that Information Retrieval is conducted in units of topics. The use of clusters is the primary reasons why a new method of probability estimation is proposed. The adaptive dual control of topic-based IR system was evaluated in a series of experiments conducted on the Reuters, Wikipedia and TREC collections of documents. The Wikipedia experiment revealed that the dual control feedback mechanism improves precision and S-recall when all the underlying assumptions are satisfied. In the TREC experiment, this feedback mechanism was compared to a state-of-the-art adaptive IR system based on BM-25 term weighting and the Rocchio relevance feedback algorithm. The baseline system exhibited better effectiveness than the cluster-based optimization model of ADTIR. The main reason for this was insufficient quality of the generated clusters in the TREC collection that violated the underlying assumption.
Resumo:
Predicate encryption has an advantage over traditional public-key or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definitions of delegatable predicate encryption and provide the first delegatable predicate encryption scheme which supports disjunctive predicate evaluations in the public-key setting. We analyze the security of the proposed system and give a security proof. In addition, we present a delegatable predicate encryption in the symmetric-key setting and discuss the related security issues.
Resumo:
Is it possible to control identities using performance management systems (PMSs)? This paper explores the theoretical fusion of management accounting and identity studies, providing a synthesised view of control, PMSs and identification processes. It argues that the effective use of PMSs generates a range of obtrusive mechanistic and unobtrusive organic controls that mediate identification processes to achieve a high level of identity congruency between individuals and collectives—groups and organisations. This paper contends that mechanistic control of PMSs provides sensebreaking effects and also creates structural conditions for sensegiving in top-down identification processes. These processes encourage individuals to continue the bottom-up processes of sensemaking, enacting identity and constructing identity narratives. Over time, PMS activities and conversations periodically mediate several episode(s) of identification to connect past, current and future identities. To explore this relationship, the dual locus of control—collectives and individuals—is emphasised to explicate their interplay. This multidisciplinary approach contributes to explaining the multidirectional effects of PMSs in obtrusive as well as unobtrusive ways, in order to control the nature of collectives and individuals in organisations.
Resumo:
Membranes prepared from Bombyx mori silk fibroin have shown potential as a substrate for human limbal epithelial (L-EC) and stromal cell cultivation. Here we present fibroin as a dual-layer construct containing both an epithelium and underlying stroma for corneolimbal reconstruction. We have compared the growth and phenotype of L-EC on non-porous versus porous fibroin membranes. Furthermore, we have compared the growth of limbal mesenchymal stromal cells (L-MSC) in either serum-supplemented medium or the MesenCult-XF® culture system within fibroin fibrous mats. The co-culture of L-EC and L-MSC in fibroin dual-layer constructs was also examined. L-EC on porous membranes displayed a squamous monolayer; in contrast, L-EC on non-porous fibroin appeared cuboidal and stratified. Both constructs maintained evidence of corneal phenotype (cytokeratin 3/12) and distribution of ΔNp63+ progenitor cells. L-MSC cultivated within fibroin fibrous mats in serum-supplemented medium contained less than 64% of cells expressing the characteristic MSC phenotype of CD73+CD90+CD105+ after two weeks, compared with over 81% in MesenCult-XF® medium. Dual-layer fibroin scaffolds consisting of L-EC and L-MSC maintained a similar phenotype as on the separate layers. These results support the feasibility of a 3D engineered limbus constructed from B. mori silk fibroin, and warrant further studies into the potential benefits it offers to corneolimbal tissue regeneration.
Resumo:
The encryption method is a well established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data. In this paper we review the conventional encryption method which can be partially queried and propose the encryption method for numerical data which can be effectively queried. The proposed system includes the design of the service scenario, and metadata.
Resumo:
Electronic Health Record (EHR) retrieval processes are complex demanding Information Technology (IT) resources exponentially in particular memory usage. Database-as-a-service (DAS) model approach is proposed to meet the scalability factor of EHR retrieval processes. A simulation study using ranged of EHR records with DAS model was presented. The bucket-indexing model incorporated partitioning fields and bloom filters in a Singleton design pattern were used to implement custom database encryption system. It effectively provided faster responses in the range query compared to different types of queries used such as aggregation queries among the DAS, built-in encryption and the plain-text DBMS. The study also presented with constraints around the approach should consider for other practical applications.
Resumo:
In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive medical data should be encrypted in databases. There are many encryption/ decryption techniques and algorithms with regard to preserving privacy and security. Currently their performance is an important factor while the medical data is being managed in databases. Another important factor is that the stakeholders should decide more cost-effective ways to reduce the total cost of ownership. As an alternative, DAS (Data as Service) is a popular outsourcing model to satisfy the cost-effectiveness but it takes a consideration that the encryption/ decryption modules needs to be handled by trustworthy stakeholders. This research project is focusing on the query response times in a DAS model (AES-DAS) and analyses the comparison between the outsourcing model and the in-house model which incorporates Microsoft built-in encryption scheme in a SQL Server. This research project includes building a prototype of medical database schemas. There are 2 types of simulations to carry out the project. The first stage includes 6 databases in order to carry out simulations to measure the performance between plain-text, Microsoft built-in encryption and AES-DAS (Data as Service). Particularly, the AES-DAS incorporates implementations of symmetric key encryption such as AES (Advanced Encryption Standard) and a Bucket indexing processor using Bloom filter. The results are categorised such as character type, numeric type, range queries, range queries using Bucket Index and aggregate queries. The second stage takes the scalability test from 5K to 2560K records. The main result of these simulations is that particularly as an outsourcing model, AES-DAS using the Bucket index shows around 3.32 times faster than a normal AES-DAS under the 70 partitions and 10K record-sized databases. Retrieving Numeric typed data takes shorter time than Character typed data in AES-DAS. The aggregation query response time in AES-DAS is not as consistent as that in MS built-in encryption scheme. The scalability test shows that the DBMS reaches in a certain threshold; the query response time becomes rapidly slower. However, there is more to investigate in order to bring about other outcomes and to construct a secured EMR (Electronic Medical Record) more efficiently from these simulations.
Resumo:
Recent studies have implicated the hypocretin/orexinergic system in reward-seeking behavior. Almorexant, a dual orexin/hypocretin R1 and R2 receptor antagonist, has proven effective in preclinical studies in promoting sleep in animal models and was in Phase III clinical trials for sleep disorders. The present study combines behavioral assays with in vitro biochemical and electrophysiological techniques to elucidate the role of almorexant in ethanol and sucrose intake. Using an operant self-administration paradigm, we demonstrate that systemic administration of almorexant decreased operant selfadministration of both 20% ethanol and 5% sucrose. We further demonstrate that intraventral tegmental area (VTA) infusions, but not intra substantia nigra infusions, of almorexant reduced ethanol self-administration. Extracellular recordings performed in VTA neurons revealed that orexin-A increased firing and this enhancement of firing was blocked by almorexant. The results demonstrate that orexin/hypocretin receptors in distinct brain regions regulate ethanol and sucrose mediated behaviors.