23 resultados para 2D barcode based authentication scheme

em University of Queensland eSpace - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper considers the problem of inducing low-risk individuals of all ages to buy private health insurance in Australia. Our proposed subsidy scheme improves upon the age-based penalty scheme under the current "Australian Lifetime Cover" (LTC) scheme. We generate an alternative subsidy profile that obviates adverse selection in private health insurance markets with mandated, age-based, community rating. Our proposal is novel in that we generate subsidies that are both risk- and age-specific, based upon actual risk probabilities. The approach we take may prove useful in other jurisdictions where the extant law mandates community rating in private health insurance markets. Furthermore, our approach is useful in jurisdictions that seek to maintain private insurance to complement existing universal public systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper is the initial part of a comprehensive bipartite monograph of palynomorphs (viz., acritarchs, prasinophyte phycomata, and chitinozoans) that are represented profusely in marine lower Palaeozoic strata of the Canning Basin, Western Australia. The prime aim is to establish a palynologically based zonal scheme for the Ordovician sequence as represented in five cored boreholes drilled through the Lower to Middle Ordovician strata of the central-northeastern Canning Basin. These strata embrace the Oepikodus communis through Phragmodus-Plectodina conodont zonal interval and comprise (in ascending order) the Willara, Goldwyer, and Nita formations, of inferred early Arenig to Llanvirn age. All three formations contain moderately diverse and variably preserved palynomorphs. The palynomorph taxa, detailed systematically in the current Part One of this monograph, comprise 66 species of acritarchs and six of prasinophytes. Of these, two species of prasinophytes and 11 of acritarchs are newly established: Cymatiosphaera meandrica and Pterospermella franciniae; Aremoricanium hyalinum, A. solaris, Baltisphaeridium tenuicomatum, Gorgonisphaeridium crebrum, Lophosphaeridium aequalium, L. aspersum, Micrhystridium infrequens, Pylantios hadrus, Sertulidium amplexum, Striatotheca indistincta, and Tribulidium globosum. Pylantios (typified by P. hadrus), Sertulidium (typified by S. amplexum), and Tribulidium (typified by T globosum); are defined as new acritarch genera. Three new combinations are instituted: Baltisphaeridium pugiatum (PLAYFORD & MARTIN 1984), Polygonium canningianum (COMRAZ & PENIGUEL 1972), and Sacculidium furtivum (PLAYFORD & MARTIN 1984); and Ammonidium macilentum PLAYFORD & MARTIN 1984 and Sacculidium furtivum (PLAYFORD & MARTIN 1984) are emended. An appreciable number of palynomorph species are not formally named owing to lack of sufficient or adequately preserved specimens; others are compared but not positively identified with previously instituted species. The ensuing Part Two of this study will complete the systematic-descriptive documentation, i.e., chitinozoans, and evaluate the Canning Basin palynoflora in terms of its chronological and stratigraphic-correlative significance.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

User requirements of multimedia authentication are various. In some cases, the user requires an authentication system to monitor a set of specific areas with respective sensitivity while neglecting other modification. Most current existing fragile watermarking schemes are mixed systems, which can not satisfy accurate user requirements. Therefore, in this paper we designed a sensor-based multimedia authentication architecture. This system consists of sensor combinations and a fuzzy response logic system. A sensor is designed to strictly respond to given area tampering of a certain type. With this scheme, any complicated authentication requirement can be satisfied, and many problems such as error tolerant tamper method detection will be easily resolved. We also provided experiments to demonstrate the implementation of the sensor-based system

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents a new low-complexity multicarrier modulation (MCM) technique based on lattices which achieves a peak-to-average power ratio (PAR) as low as three. The scheme can be viewed as a drop in replacement for the discrete multitone (DMT) modulation of an asymmetric digital subscriber line modem. We show that the lattice-MCM retains many of the attractive features of sinusoidal-MCM, and does so with lower implementation complexity, O(N), compared with DMT, which requires O(N log N) operations. We also present techniques for narrowband interference rejection and power profiling. Simulation studies confirm that performance of the lattice-MCM is superior, even compared with recent techniques for PAR reduction in DMT.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

An optical quantum memory scheme using two narrow-linewidth cavities and some optical fibers is proposed. The cavities are connected via an optical fiber, and the gap of each cavity can be adjusted to allow photons with a certain bandwidth to transmit through or reflect back. Hence, each cavity acts as a shutter and the photons can be stored in the optical fiber between the cavities at will. We investigate the feasibility of using this device in storing a single photon. We estimate that with current technology storage of a photon qubit for up to 50 clock cycles (round trips) could be achieved with a probability of success of 85%. We discuss how this figure could be improved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Quantum computers promise to increase greatly the efficiency of solving problems such as factoring large integers, combinatorial optimization and quantum physics simulation. One of the greatest challenges now is to implement the basic quantum-computational elements in a physical system and to demonstrate that they can be reliably and scalably controlled. One of the earliest proposals for quantum computation is based on implementing a quantum bit with two optical modes containing one photon. The proposal is appealing because of the ease with which photon interference can be observed. Until now, it suffered from the requirement for non-linear couplings between optical modes containing few photons. Here we show that efficient quantum computation is possible using only beam splitters, phase shifters, single photon sources and photo-detectors. Our methods exploit feedback from photo-detectors and are robust against errors from photon loss and detector inefficiency. The basic elements are accessible to experimental investigation with current technology.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A significant problem in the collection of responses to potentially sensitive questions, such as relating to illegal, immoral or embarrassing activities, is non-sampling error due to refusal to respond or false responses. Eichhorn & Hayre (1983) suggested the use of scrambled responses to reduce this form of bias. This paper considers a linear regression model in which the dependent variable is unobserved but for which the sum or product with a scrambling random variable of known distribution, is known. The performance of two likelihood-based estimators is investigated, namely of a Bayesian estimator achieved through a Markov chain Monte Carlo (MCMC) sampling scheme, and a classical maximum-likelihood estimator. These two estimators and an estimator suggested by Singh, Joarder & King (1996) are compared. Monte Carlo results show that the Bayesian estimator outperforms the classical estimators in almost all cases, and the relative performance of the Bayesian estimator improves as the responses become more scrambled.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A thermodynamic approach based on the Bender equation of state is suggested for the analysis of supercritical gas adsorption on activated carbons at high pressure. The approach accounts for the equality of the chemical potential in the adsorbed phase and that in the corresponding bulk phase and the distribution of elements of the adsorption volume (EAV) over the potential energy for gas-solid interaction. This scheme is extended to subcritical fluid adsorption and takes into account the phase transition in EAV The method is adapted to gravimetric measurements of mass excess adsorption and has been applied to the adsorption of argon, nitrogen, methane, ethane, carbon dioxide, and helium on activated carbon Norit R I in the temperature range from 25 to 70 C. The distribution function of adsorption volume elements over potentials exhibits overlapping peaks and is consistently reproduced for different gases. It was found that the distribution function changes weakly with temperature, which was confirmed by its comparison with the distribution function obtained by the same method using nitrogen adsorption isotherm at 77 K. It was shown that parameters such as pore volume and skeleton density can be determined directly from adsorption measurements, while the conventional approach of helium expansion at room temperature can lead to erroneous results due to the adsorption of helium in small pores of activated carbon. The approach is a convenient tool for analysis and correlation of excess adsorption isotherms over a wide range of pressure and temperature. This approach can be readily extended to the analysis of multicomponent adsorption systems. (C) 2002 Elsevier Science (USA).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In vitro evolution imitates the natural evolution of genes and has been very successfully applied to the modification of coding sequences, but it has not yet been applied to promoter sequences. We propose an alternative method for functional promoter analysis by applying an in vitro evolution scheme consisting of rounds of error-prone PCR, followed by DNA shuffling and selection of mutant promoter activities. We modified the activity in embryogenic sugarcane cells of the promoter region of the Goldfinger isolate of banana streak virus and obtained mutant promoter sequences that showed an average mutation rate of 2.5% after applying one round of error-prone PCR and DNA shuffling. Selection and sequencing of promoter sequences with decreased or unaltered activity allowed us to rapidly map the position of one cis-acting element that influenced promoter activity in embryogenic sugarcane cells and to discover neutral mutations that did not affect promoter Junction. The selective-shotgun approach of this promoter analysis method immediately after the promoter boundaries have been defined by 5' deletion analysis dramatically reduces the labor associated with traditional linker-scanning deletion analysis to reveal the position of functional promoter domains. Furthermore, this method allows the entire promoter to be investigated at once, rather than selected domains or nucleotides, increasing the, prospect of identifying interacting promoter regions.