120 resultados para Side pixel registration
Resumo:
In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.
Resumo:
This paper presents a new methodology for characterising the energy performance of buildings suitable for city-scale, top-down energy modelling. Building properties that have the greatest impact on simulated energy performance were identified via a review of sensitivity analysis studies. The methodology greatly simplifies the description of a building to decrease labour and simulation processing overheads. The methodology will be used in the EU FP7 INDICATE project which aims to create a master-planning tool that uses dynamic simulation to facilitate the design of sustainable, energy efficient smart cities.
Resumo:
Demand Side Management (DSM) plays an important role in Smart Grid. It has large scale access points, massive users, heterogeneous infrastructure and dispersive participants. Moreover, cloud computing which is a service model is characterized by resource on-demand, high reliability and large scale integration and so on and the game theory is a useful tool to the dynamic economic phenomena. In this study, a scheme design of cloud + end technology is proposed to solve technical and economic problems of the DSM. The architecture of cloud + end is designed to solve technical problems in the DSM. In particular, a construct model of cloud + end is presented to solve economic problems in the DSM based on game theories. The proposed method is tested on a DSM cloud + end public service system construction in a city of southern China. The results demonstrate the feasibility of these integrated solutions which can provide a reference for the popularization and application of the DSM in china.
Resumo:
High Efficiency Video Coding (HEVC) is the most recent video codec coming after currently most popular H.264/MPEG4 codecs and has promising compression capabilities. It is conjectured that it will be a substitute for current video compression standards. However, to the best knowledge of the authors, none of the current video steganalysis methods designed or tested with HEVC video. In this paper, pixel domain steganography applied on HEVC video is targeted for the first time. Also, its the first paper that employs accordion unfolding transformation, which merges temporal and spatial correlation, in pixel domain video steganalysis. With help of the transformation, temporal correlation is incorporated into the system. Its demonstrated for three different feature sets that integrating temporal dependency substantially increased the detection accuracy.
Resumo:
Libertarian paternalism, as advanced by Cass Sunstein, is seriously flawed, but not primarily for the reasons that most commentators suggest. Libertarian paternalism and its attendant regulatory implications are too libertarian, not too paternalistic, and as a result are in considerable tension with ‘thick’ conceptions of human dignity. We make four arguments. The first is that there is no justification for a presumption in favor of nudging as a default regulatory strategy, as Sunstein asserts. It is ordinarily less effective than mandates; such mandates rarely offend personal autonomy; and the central reliance on cognitive failures in the nudging program is more likely to offend human dignity than the mandates it seeks to replace. Secondly, we argue that nudging as a regulatory strategy fits both overtly and covertly, often insidiously, into a more general libertarian program of political economy. Thirdly, while we are on the whole more concerned to reject the libertarian than the paternalistic elements of this philosophy, Sunstein’s work, both in Why Nudge?, and earlier, fails to appreciate how nudging may be manipulative if not designed with more care than he acknowledges. Lastly, because of these characteristics, nudging might even be subject to legal challenges that would give us the worst of all possible regulatory worlds: a weak regulatory intervention that is liable to be challenged in the courts by well-resourced interest groups. In such a scenario, and contrary to the ‘common sense’ ethos contended for in Why Nudge?, nudges might not even clear the excessively low bar of doing something rather than nothing. Those seeking to pursue progressive politics, under law, should reject nudging in favor of regulation that is more congruent with principles of legality, more transparent, more effective, more democratic, and allows us more fully to act as moral agents. Such a system may have a place for (some) nudging, but not one that departs significantly from how labeling, warnings and the like already function, and nothing that compares with Sunstein’s apparent ambitions for his new movement.
Resumo:
A podcast of a talk presented at a conference in Berlin organized by the Vervassungsblog on Choice Architecture in Democracies, in January 2015 - Verfassungsblog - Autonomy vs. Technocracy: Libertarian Paternalism revisited
Resumo:
OBJECTIVES: The Shape of Training report recommended that full registration is aligned with medical school graduation. As part of a General Medical Council-funded study about the preparedness for practice of UK medical graduates, we explored UK stakeholders' views about this proposal using qualitative interviews (30 group and 87 individual interviews) and Framework Analysis.
SETTING: Four UK study sites, one in each country.Save
PARTICIPANTS: 185 individuals from eight stakeholder groups: (1) foundation year 1 (F1) doctors (n=34); (2) fully registered trainee doctors (n=33); (3) clinical educators (n=32); (4) undergraduate/postgraduate Deans, and Foundation Programme Directors (n=30); (5) other healthcare professionals (n=13); (6) employers (n=7); (7) policy and government (n=11); (8) patient and public representatives (n=25).
RESULTS: We identified four main themes: (1) The F1 year as a safety net: patients were protected by close trainee supervision and 'sign off' to prevent errors; trainees were provided with a safe environment for learning on the job; (2) Implications for undergraduate medical education: if the proposal was accepted, a 'radical review' of undergraduate curricula would be needed; undergraduate education might need to be longer; (3) Implications for F1 work practice: steps to protect healthcare team integration and ensure that F1 doctors stay within competency limits would be required; (4) Financial, structural and political implications: there would be cost implications for trainees; clarification of responsibilities between undergraduate and postgraduate medical education would be needed. Typically, each theme comprised arguments for and against the proposal.
CONCLUSIONS: A policy change to align the timing of full registration with graduation would require considerable planning and preliminary work. These findings will inform policymakers' decision-making. Regardless of the decision, medical students should take on greater responsibility for patient care as undergraduates, assessment methods in clinical practice and professionalism domains need development, and good practice in postgraduate supervision and support must be shared.
Resumo:
BACKGROUND: Care of critically ill patients in intensive care units (ICUs) often requires potentially invasive or uncomfortable procedures, such as mechanical ventilation (MV). Sedation can alleviate pain and discomfort, provide protection from stressful or harmful events, prevent anxiety and promote sleep. Various sedative agents are available for use in ICUs. In the UK, the most commonly used sedatives are propofol (Diprivan(®), AstraZeneca), benzodiazepines [e.g. midazolam (Hypnovel(®), Roche) and lorazepam (Ativan(®), Pfizer)] and alpha-2 adrenergic receptor agonists [e.g. dexmedetomidine (Dexdor(®), Orion Corporation) and clonidine (Catapres(®), Boehringer Ingelheim)]. Sedative agents vary in onset/duration of effects and in their side effects. The pattern of sedation of alpha-2 agonists is quite different from that of other sedatives in that patients can be aroused readily and their cognitive performance on psychometric tests is usually preserved. Moreover, respiratory depression is less frequent after alpha-2 agonists than after other sedative agents.
OBJECTIVES: To conduct a systematic review to evaluate the comparative effects of alpha-2 agonists (dexmedetomidine and clonidine) and propofol or benzodiazepines (midazolam and lorazepam) in mechanically ventilated adults admitted to ICUs.
DATA SOURCES: We searched major electronic databases (e.g. MEDLINE without revisions, MEDLINE In-Process & Other Non-Indexed Citations, EMBASE and Cochrane Central Register of Controlled Trials) from 1999 to 2014.
METHODS: Evidence was considered from randomised controlled trials (RCTs) comparing dexmedetomidine with clonidine or dexmedetomidine or clonidine with propofol or benzodiazepines such as midazolam, lorazepam and diazepam (Diazemuls(®), Actavis UK Limited). Primary outcomes included mortality, duration of MV, length of ICU stay and adverse events. One reviewer extracted data and assessed the risk of bias of included trials. A second reviewer cross-checked all the data extracted. Random-effects meta-analyses were used for data synthesis.
RESULTS: Eighteen RCTs (2489 adult patients) were included. One trial at unclear risk of bias compared dexmedetomidine with clonidine and found that target sedation was achieved in a higher number of patients treated with dexmedetomidine with lesser need for additional sedation. The remaining 17 trials compared dexmedetomidine with propofol or benzodiazepines (midazolam or lorazepam). Trials varied considerably with regard to clinical population, type of comparators, dose of sedative agents, outcome measures and length of follow-up. Overall, risk of bias was generally high or unclear. In particular, few trials blinded outcome assessors. Compared with propofol or benzodiazepines (midazolam or lorazepam), dexmedetomidine had no significant effects on mortality [risk ratio (RR) 1.03, 95% confidence interval (CI) 0.85 to 1.24, I (2) = 0%; p = 0.78]. Length of ICU stay (mean difference -1.26 days, 95% CI -1.96 to -0.55 days, I (2) = 31%; p = 0.0004) and time to extubation (mean difference -1.85 days, 95% CI -2.61 to -1.09 days, I (2) = 0%; p < 0.00001) were significantly shorter among patients who received dexmedetomidine. No difference in time to target sedation range was observed between sedative interventions (I (2) = 0%; p = 0.14). Dexmedetomidine was associated with a higher risk of bradycardia (RR 1.88, 95% CI 1.28 to 2.77, I (2) = 46%; p = 0.001).
LIMITATIONS: Trials varied considerably with regard to participants, type of comparators, dose of sedative agents, outcome measures and length of follow-up. Overall, risk of bias was generally high or unclear. In particular, few trials blinded assessors.
CONCLUSIONS: Evidence on the use of clonidine in ICUs is very limited. Dexmedetomidine may be effective in reducing ICU length of stay and time to extubation in critically ill ICU patients. Risk of bradycardia but not of overall mortality is higher among patients treated with dexmedetomidine. Well-designed RCTs are needed to assess the use of clonidine in ICUs and identify subgroups of patients that are more likely to benefit from the use of dexmedetomidine.
STUDY REGISTRATION: This study is registered as PROSPERO CRD42014014101.
FUNDING: The National Institute for Health Research Health Technology Assessment programme. The Health Services Research Unit is core funded by the Chief Scientist Office of the Scottish Government Health and Social Care Directorates.
Resumo:
Access to demographic data that are complete, accurate and up-to-date is fundamental to many aspects of public health, government and academic work and for accurate interpretation of other databases. Health registration data are the prime source of demographic information for health and social care systems; for example, as an indicator of need, as a source of denominators to convert number of events into rates, or in the case of the residential address information as the basis for generating the call-recall invitation letters that are used for most screening programs (e.g. breast, colo-rectal and AAA screening). However, list inflation (ghosts, duplicates or emigrants) and a degree of address inaccuracy are recognised caveats with the health registration data and a recent NILS-related study on breast screening suggests that improved address accuracy might be a fast and efficient means of increasing screening uptake rates in cities and amongst deprived populations. In NI these data are collated by the BSO who uniquely in the UK also have access to data relating to prescribing, dental registrations and use of A&E services. These can be used to supplement the standard demographic and address information by (i) indicating patients who are alive and resident in NI and (ii) providing an independent source of probably improved address information. This study will use the NI Unique Property Reference Number (UPRN), rather than the addresses per se which are difficult to work with, to compare the addresses registered in the BSO with those addresses in the enumerated 2011 census. Assuming that the census is a more accurate source of address information for individuals, a comparison of the health registration addresses with those recorded at the census, the aim of the proposed study will be to (i) characterise the amount and distributions of these differences, (ii) to see what proportion of those who do not attend for screening did not actually receive an invitation letter because the addresses were incorrect, (iii) to determine how much of the social gradient (and urban/rural differences) in screening uptake are due to address inaccuracies, (iv) a comparison of timing of address changes at the BSO will provide information on the delays in updating of addresses.
Resumo:
There is lack of consistent evidence as to how well PD patients are able to accurately time their movements across space with an external acoustic signal. For years, research based on the finger-tapping paradigm, the most popular paradigm for exploring the brain's ability to time movement, has provided strong evidence that patients are not able to accurately reproduce an isochronous interval [i.e., Ref. (1)]. This was undermined by Spencer and Ivry (2) who suggested a specific deficit in temporal control linked to emergent, rhythmical movement not event-based actions, which primarily involve the cerebellum. In this study, we investigated motor timing of seven idiopathic PD participants in event-based sensorimotor synchronization task. Participants were asked to move their finger horizontally between two predefined target zones to synchronize with the occurrence of two sound events at two time intervals (1.5 and 2.5 s). The width of the targets and the distance between them were manipulated to investigate impact of accuracy demands and movement amplitude on timing performance. The results showed that participants with PD demonstrated specific difficulties when trying to accurately synchronize their movements to a beat. The extent to which their ability to synchronize movement was compromised was found to be related to the severity of PD, but independent of the spatial constraints of the task.
Resumo:
Cryptographic algorithms have been designed to be computationally secure, however it has been shown that when they are implemented in hardware, that these devices leak side channel information that can be used to mount an attack that recovers the secret encryption key. In this paper an overlapping window power spectral density (PSD) side channel attack, targeting an FPGA device running the Advanced Encryption Standard is proposed. This improves upon previous research into PSD attacks by reducing the amount of pre-processing (effort) required. It is shown that the proposed overlapping window method requires less processing effort than that of using a sliding window approach, whilst overcoming the issues of sampling boundaries. The method is shown to be effective for both aligned and misaligned data sets and is therefore recommended as an improved approach in comparison with existing time domain based correlation attacks.