148 resultados para one way delay
em Queensland University of Technology - ePrints Archive
Resumo:
Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.
Resumo:
Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.
Resumo:
Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.
Resumo:
Objectives: To investigate if low-dose lithium may counteract the microstructural and metabolic brain changes proposed to occur in individuals at ultra-high risk (UHR) for psychosis. Methods: Hippocampal T2 relaxation time (HT2RT) and proton magnetic resonance spectroscopy (1H-MRS) measurements were performed prior to initiation and following three months of treatment in 11 UHR patients receiving low-dose lithium and 10 UHR patients receiving treatment as usual (TAU). HT2RT and 1H-MRS percentage change scores between scans were compared using one-way ANOVA and correlated with behavioural change scores. Results: Low-dose lithium significantly reduced HT2RT compared to TAU (p=0.018). No significant group by time effects were seen for any brain metabolites as measured with 1H-MRS, although myo-inositol, creatine, choline-containing compounds and NAA increased in the group receiving low-dose lithium and decreased or remained unchanged in subjects receiving TAU. Conclusions: This pilot study suggests that low-dose lithium may protect the microstructure of the hippocampus in UHR states as reflected by significantly decreasing HT2RT. Larger scale replication studies in UHR states using T2 relaxation time as a proxy for emerging brain pathology seem a feasible mean to test neuroprotective strategies such as low-dose lithium as potential treatments to delay or even prevent the progression to full-blown disorder.
Resumo:
Traditional recommendation methods offer items, that are inanimate and one way recommendation, to users. Emerging new applications such as online dating or job recruitments require reciprocal people-to-people recommendations that are animate and two-way recommendations. In this paper, we propose a reciprocal collaborative method based on the concepts of users' similarities and common neighbors. The dataset employed for the experiment is gathered from a real life online dating network. The proposed method is compared with baseline methods that use traditional collaborative algorithms. Results show the proposed method can achieve noticeably better performance than the baseline methods.
Resumo:
One-time proxy signatures are one-time signatures for which a primary signer can delegate his or her signing capability to a proxy signer. In this work we propose two one-time proxy signature schemes with different security properties. Unlike other existing one-time proxy signatures that are constructed from public key cryptography, our proposed schemes are based one-way functions without trapdoors and so they inherit the communication and computation efficiency from the traditional one-time signatures. Although from a verifier point of view, signatures generated by the proxy are indistinguishable from those created by the primary signer, a trusted authority can be equipped with an algorithm that allows the authority to settle disputes between the signers. In our constructions, we use a combination of one-time signatures, oblivious transfer protocols and certain combinatorial objects. We characterise these new combinatorial objects and present constructions for them.
Resumo:
The definition and operationalisation of interactional competence in speaking tests that entail co-construction of discourse is an area of language testing requiring further research. This article explores the reactions of four trained raters to paired candidates who oriented to asymmetric patterns of interaction in a discussion task. Through an analysis of candidate discourse combined with rater notes, stimulated verbal recalls, rater discussions and scores awarded for interactional effectiveness, the article examines the extent to which raters compensate or penalise candidates for their role in co-constructing asymmetric interactional patterns. The article argues that key features of the interaction are perceived by the raters as mutual achievements, and it further suggests that the awarding of shared scores for interactional competence is one way of acknowledging the inherently co-constructed nature of interaction in a paired speaking test.
Resumo:
Debates concerning the veracity, ethics and politics of the documentary form circle endlessly around the function of those who participate in it, and the meaning attributed to their participation. Great significance is attached to the way that documentary filmmakers do or do not participate in the world they seek to represent, just as great significance is attached to those subjects whose participation extends beyond playing the part of eyewitness or expert, such that they become part of the very filmmaking process itself. This Ph.D. explores the interface between documentary practice and participatory culture by looking at how their practices, discursive fields and histories intersect, but also by looking at how participating in one might mean participating in the other. In short, the research is an examination of participatory culture through the lens of documentary practice and documentary criticism. In the process, however, this examination of participatory culture will in turn shed light on documentary thinking, especially the meaning and function of ‘the participant’ in contemporary documentary practice. A number of ways of conceiving of participation in documentary practice are discussed in this research, but one of the ideas that gives purpose to that investigation is the notion that the participant in contemporary documentary practice is someone who belongs to a participatory culture in particular. Not only does this mean that those subjects who play a part in a documentary are already informed by their engagement with a range of everyday media practices before the documentary apparatus arrives, the audience for such films are similarly informed and engaged. This audience have their own expectations about how they should be addressed by media producers in general, a fact that feeds back into their expectations about participatory approaches to documentary practice too. It is the ambition of this research to get closer to understanding the relationship between participants in the audience, in documentary and ancillary media texts, as well as behind the camera, and to think about how these relationships constitute a context for the production and reception of documentary films, but also how this context might provide a model for thinking about participatory culture itself. One way that documentary practice and participatory culture converge in this research is in the kind of participatory documentary that I call the ‘Camera Movie’, a narrow mode of documentary filmmaking that appeals directly to contemporary audiences’ desires for innovation and participation, something that is achieved in this case by giving documentary subjects control of the camera. If there is a certain inevitability about this research having to contend with the notion of the ‘participatory documentary’, the ‘participatory camera’ also emerges strongly in this context, especially as a conduit between producer and consumer. Making up the creative component of this research are two documentaries about the reality television event Band In A Bubble, and participatory media practices more broadly. The single-screen film, Hubbub , gives form to the collective intelligence and polyphonous voice of contemporary audiences who must be addressed and solicited in increasingly innovative ways. One More Like That is a split-screen, DVD-Video with alternate audio channels selected by a user who thereby chooses who listens and who speaks in the ongoing conversation between media producers and media consumers. It should be clear from the description above that my own practice does not extend to highly interactive, multi-authored or web-enabled practices, nor the distributed practices one might associate with social media and online collaboration. Mine is fundamentally a single authored, documentary video practice that seeks to analyse and represent participatory culture on screen, and for this reason the Ph.D. refrains from a sustained discussion of the kinds of collaborative practices listed above. This is not to say that such practices don’t also represent an important intersection of documentary practice and participatory culture, they simply represent a different point of intersection. Being practice-led, this research takes its procedural cues from the nature of the practice itself, and sketches parameters that are most enabling of the idea that the practice sets the terms of its own investigation.
Resumo:
The innovation diffusion and knowledge management literature strongly supports the importance of communities of practice (COP) for enabling knowledge about how to use and adopt innovation initiatives. One of the most powerful tools for innovation diffusion is word-of-mouth wisdom from committed individuals who mentor and support each other. Close proximity for face-to-face interaction is highly effective, however, many organisations are geographically dispersed with projects being virtual linked sub-organisations using ICT to communicate. ICT has also introduced a useful facilitating technology for developing knowledge networks. This paper presents findings from a research program concentrating on ICT innovation diffusion in the Australian construction industry. One way in which ICT diffusion is taking place was found to be through within-company communities of practice. We undertook in-depth unstructured interviews with three of the major 10 to 15 contractors in Australia to discuss their ICT diffusion strategies. We discovered that in all three cases,within company networked communities of practice was a central strategy. Further, effective diffusion of ICT groupware tools can be critical in developing COP where they are geographically dispersed.
Resumo:
INTRODUCTION Inflammation is a protective attempt to facilitate the removal of damaged tissue and to initiate the healing response in other tissues. However, after spinal cord injury (SCI), this response is prolonged leading to secondary degeneration and glial scarring. Here, we investigate the potential of sustained delivery of pro-inflammatory factors vascular endothelial growth factor (VEGF) and platelet derived growth factor (PDGF) to increase early inflammatory events and promote inflammatory resolution. Method Animal ethics approval was obtained from the Queensland University of Technology. Adult Wistar-Kyoto rats (12-16 weeks old) were subjected to laminectomies and T10 hemisections. Animals were then randomised to treatment (implantation of osmotic pump (Alzet) loaded with 5ug VEGF & 5 ug PDGF) or control groups (lesion control or lesion plus pump delivering PBS). Rats were sacrificed at one month and the spinal cords were harvested and examined by immunohistology, using anti-neurofilament-200(NF200) and anti- ionized calcium binding adapter molecule 1 (Iba1). One way ANOVA was used for statistic analysis. Results At 1 month, active pump-treated cords showed a high level of axonal filament throughout the defects as compared to the control groups. The mean lesion size, as measured by NF200, was 0.47mm2 for the lesion control, 0.39mm2 for the vehicle control and 0.078mm2 for the active pump group. Significant differences were detected between the active pump group and the two control groups (AP vs LC p= 0.017 AG vs VC p= 0.004). Iba-1 staining also showed significant differences in the post-injury inflammatory response. Discussion We have shown that axons and activated microglia are co-located in the lesion of the treated cord. We hypothesise the delivery of VEGF/PDGF increases the local vessel permeability to inflammatory cells and activates these along with the resident microglia to threshold population, which ultimately resolved the prolonged inflammation. Here, we have shown that maintaining the inflammatory signals for at least 7 days improved the morphology of the injured cord. Conclusion This study has shown that boosting inflammation, by delivery VEGF/PDGF, in the early phase of SCI helps to reduce secondary degeneration and may promote inflammation resolution. This treatment may provide a platform for other neuro-regenrative therapies.
Resumo:
Online moderation meetings have the potential to support the collaborative professional development of teachers, and the formation of a common understanding of what denotes quality in student work in a standards based assessment system. In doing so systemic calls for consistency across education systems are also being met. In this paper a case for employing online moderation meetings is developed through recourse to the demands of learning in the twenty-first century and the place of assessment within those discourses. It is argued that empirical data is needed on the efficacy of online moderation meetings to guide future practice as the use of information and communication technologies increases in education systems. Online moderation is one way of gathering teachers across vast distances to share their understandings and develop common meanings of assessment. While it is suggested that online moderation is one possible procedure to meet systemic requirements and support teachers’ professional collaboration, the implementation of such a system also introduces new challenges for schools and teachers. Meeting online to discuss professional understandings is a new way of operating for teachers and involves technology that has not yet been fully utilised within education departments. Issues such as the types of interactions that are afforded within such an environment, as well as technical operating problems that occur when using technology impact on the employment of online meetings. Online moderation meetings while potentially solving the issue of developing common understandings across an entire department also pose new issues to be resolved. There is a need for research into the efficacy of online moderation meetings so that future policy decisions may be based on sound empirical data. It is imperative that as new ways of knowing and acting are incorporated into school curriculum and pedagogy, assessment practices are also aligned. Online moderation meetings can support such practices by enabling teachers to communicate with a wider and more diverse group of teachers to establish common understandings.
Resumo:
Dispersion characteristics of respiratory droplets in indoor environments are of special interest in controlling transmission of airborne diseases. This study adopts an Eulerian method to investigate the spatial concentration distribution and temporal evolution of exhaled and sneezed/coughed droplets within the range of 1.0~10.0μm in an office room with three air distribution methods, i.e. mixing ventilation (MV), displacement ventilation (DV), and under-floor air distribution (UFAD). The diffusion, gravitational settling, and deposition mechanism of particulate matters are well accounted in the one-way coupling Eulerian approach. The simulation results find that exhaled droplets with diameters up to 10.0μm from normal respiration process are uniformly distributed in MV, while they are trapped in the breathing height by thermal stratifications in DV and UFAD, resulting in a high droplet concentration and a high exposure risk to other occupants. Sneezed/coughed droplets are diluted much slower in DV/UFAD than in MV. Low air speed in the breathing zone in DV/UFAD can lead to prolonged residence of droplets in the breathing zone.
Resumo:
The title of this book, Hard Lesson: Reflections on Crime control in Late Modernity, contains a number of clues about its general theoretical direction. It is a book concerned, fist and foremost, with the vagaries of crime control in western neo-liberal and English speaking countries. More specifically, Hard Lessons draws attention to a number of examples in which discrete populations – those who have in one way or another offended against the criminal law - have become the subjects of various forms of stare intervention, regulation and control. We are concerned most of all with the ways in which recent criminal justice policies and practices have resulted in what are variously described as unintended consequences, unforeseen outcomes, unanticipated results, counter-productive effects or negative side effects. At their simplest, such terms refer to the apparent gulf between intention and outcome; they often form the basis for considerable amount of policy reappraisal, soul searching and even nihilistic despair among the mamandirns of crime control. Unintended consequences can, of course, be both positive and negative. Occasionally, crime control measures may result in beneficial outcomes, such as the use of DNA to acquit wrongly convicted prisoners. Generally, however, unforeseen effects tend to be negative and even entirely counterproductive, and/or directly opposite to what were originally intended. All this, of course, presupposes some sort of rational, well meaning and transparent policy making process so beloved by liberal social policy theorists. Yet, as Judith Bessant points out in her chapter, this view of policy formulation tends to obscure the often covert, regulatory and downright malevolent intentions contained in many government policies and practices. Indeed, history is replete with examples of governments seeking to mask their real aims from a prying public eye. Denials and various sorts of ‘techniques of neutralisation’ serve to cloak the real or ‘underlying’ aims of the powerful (Cohen 2000). The latest crop of ‘spin doctors’ and ‘official spokespersons’ has ensured that the process of governmental obfuscation, distortion and concealment remains deeply embedded in neo-liberal forms of governance. There is little new or surprising in this; nor should we be shocked when things ‘go wrong’ in the domain of crime control since many unintended consequences are, more often than not, quite predictable. Prison riots, high rates of recidivism and breaches of supervision orders, expansion rather than contraction of control systems, laws that create the opposite of what was intended – all these are normative features of western crime control. Indeed, without the deep fault lines running between policy and outcome it would be hard to imagine what many policy makers, administrators and practitioners would do: their day to day work practices and (and incomes) are directly dependent upon emergent ‘service delivery’ problems. Despite recurrent howls of official anguish and occasional despondency it is apparent that those involved in the propping up the apparatus of crime control have a vested interest in ensuring that polices and practices remain in an enduring state of review and reform.
Resumo:
This article describes some of the issues that teachers might encounter when scaffolding students’ thinking during mathematical investigations. It describes four episodes where a teacher’s scaffolding failed to support students’ mathematical thinking and explores the reasons why the scaffolding was ineffective. Understanding what is ineffective and why is one way to improve pedagogical practice. As a background to these episodes, we first provide an overview of the mathematical investigation. Our paper concludes with some recommendations for judicious scaffolding during investigations.
Resumo:
Children and adolescents are now using online communication to form and/or maintain relationships with strangers and/or friends. Relationships in real life are important for children and adolescents in identity formation and general development. However, social relationships can be difficult for those who experience feelings of loneliness and social anxiety. The current study aimed to replicate and extend research conducted by Valkenburg and Peter (2007b), by investigating differences in online communication patterns between children and adolescents with and without selfreported loneliness and social anxiety. Six hundred and twenty-six students aged 10-16 years completed a questionnaire survey about the amount of time they engaged in online communication, the topics they discussed, who they communicated with, and their purposes of online communication. Following Valkenburg and Peter (2007b), loneliness was measured with a shortened version of the UCLA Loneliness Scale (Version 3) developed by Russell (1996), whereas social anxiety was assessed with a sub-scale of the Social Anxiety Scale for Adolescents (La Greca & Lopez, 1998). The sample was divided into four groups of children and adolescents: 220 were “non-socially anxious and non-lonely”, 139 were “socially anxious but not lonely”, 107 were “lonely but not socially anxious”, and 159 were “lonely and socially anxious”. A one-way ANOVA and chi-square tests were conducted to evaluate the aforementioned differences between these groups. The results indicated that children and adolescents who reported being lonely used online communication differently from those who did not report being lonely. Essentially, the former communicated online more frequently about personal things and intimate topics, but also to compensate for their weak social skills and to meet new people. Further analyses on gender differences within lonely children and adolescents revealed that boys and girls communicated online more frequently with different partners. It was concluded that for these vulnerable individuals online communication may fulfil needs of self-disclosure, identity exploration, and social interactions. However, future longitudinal studies combining a quantitative with a qualitative approach would better address the relationship between Internet use and psychosocial well-being. The findings also suggested the need for further exploration of how such troubled children and adolescents can use the Internet beneficially.