999 resultados para authentication test


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The pull-through/local dimpling failure strength of screwed connections is very important in the design of profiled steel cladding systems to help them resist storms and hurricanes. The current American and European provisions recommend four different test methods for the screwed connections in tension, but the accuracy of these methods in determining the connection strength is not known. It is unlikely that the four test methods are equivalent in all cases and thus it is necessary to reduce the number of methods recommended. This paper presents a review of these test methods based on some laboratory tests on crest- and valley-fixed claddings and then recommends alternative tests methods that reproduce the real behavior of the connections, including the bending and membrane deformations of the cladding around the screw fasteners and the tension load in the fastener.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diagnosis threat is a psychosocial factor that has been proposed to contribute to poor outcomes following mild traumatic brain injury (mTBI). This threat is thought to impair the cognitive test performance of individuals with mTBI because of negative injury stereotypes. University students (N= 45, 62.2% female) with a history of mTBI were randomly allocated to a diagnosis threat (DT, n=15), reduced threat (DT-reduced, n=15) or neutral (n=15) group. The reduced threat condition invoked a positive stereotype (i.e., that people with mTBI can perform well on cognitive tests). All participants were given neutral instructions before they completed baseline tests of: a) objective cognitive function across a number of domains; b) psychological symptoms; and, c) PCS symptoms, including self-reported cognitive and emotional difficulties. Participants then received either neutral, DT or DT-reduced instructions, before repeating the tests. Results were analyzed using separate mixed model ANOVAs; one for each dependent measure. The only significant result was for the 2 X 3 ANOVA on an objective test of attention/working memory, Digit Span, p<.05, such that the DT-reduced group performed better than the other groups, which were not different from each other. Although not consistent with predictions or earlier DT studies, the absence of group differences on most tests fits with several recent DT findings. The results of this study suggest that it is timely to reconsider the role of DT as a unique contributor to poor mTBI outcome.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding people's organ donation decisions may narrow the gap between organ supply and demand. In two studies, participants who had not recorded their posthumous organ donation decision (Study 1, N = 210; Study 2, N = 307) completed items assessing prototype/willingness model (PWM; attitude, subjective norm, donor prototype favorability and similarity, willingness) constructs. Attitude, subjective norm, and prototype similarity predicted willingness to donate. Prototype favorability and a Prototype Favorability × Similarity interaction predicted willingness (Study 2). These findings provide support for the PWM in altruistic health contexts, highlighting the importance of people's perceptions about organ donors in their donation decisions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although the tourism industry has been dramatically altered due to the Internet, there has been limited research published about international entrepreneurial values and Internet use in tourism firms. The findings of this study point to a relationship between the values of Internet-enabled international entrepreneurs in small-sized to medium-sized enterprises and the inclination of the firm to develop and initiate international activity. The findings of this study suggest that Internet-enabled tourism entrepreneurs share similar construct values. Two effective but underutilized qualitative methods were used in this study. The first method, repertory test, is an efficient technique for exploring constructs in decision making; the second method, laddering analysis, facilitates understanding of the perceived consequences and personal values guiding behaviour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A test of the useful field of view was introduced more than two decades ago and was designed to reflect the visual difficulties that older adults experience with everyday tasks. Importantly, the useful field of view is one of the most extensively researched and promising predictor tests for a range of driving outcomes measures, including driving ability and crash risk, as well as other everyday tasks. Currently available commercial versions of the test can be administered using personal computers and measure speed of visual processing speed for rapid detection and localization of targets under conditions of divided visual attention and in the presence and absence of visual clutter. The test is believed to assess higher order cognitive abilities, but performance also relies on visual sensory function since targets must be visible in order to be attended to. The format of the useful field of view test has been modified over the years; the original version estimated the spatial extent of useful field of view, while the latest versions measures visual processing speed. While deficits in the useful field of view are associated with functional impairments in everyday activities in older adults, there is also emerging evidence from several research groups that improvements in visual processing speed can be achieved through training. These improvements have been shown to reduce crash risk, and have a positive impact on health and functional well being, with the potential to increase the mobility and hence independence of older adults.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IEEE 802.11p is the new standard for intervehicular communications (IVC) using the 5.9 GHz frequency band; it is planned to be widely deployed to enable cooperative systems. 802.11p uses and performance have been studied theoretically and in simulations over the past years. Unfortunately, many of these results have not been confirmed by on-tracks experimentation. In this paper, we describe field trials of 802.11p technology with our test vehicles; metrics such as maximum range, latency and frame loss are examined. Then, we propose a detailed modelisation of 802.11p that can be used to accurately simulate its performance within Cooperative Systems (CS) applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design and synthesis of molecularly or supramolecularly defined interfacial architectures have seen in recent years a remarkable growth of interest and scientific research activities for various reasons. On the one hand, it is generally believed that the construction of an interactive interface between the living world of cells, tissue, or whole organisms and the (inorganic or organic) materials world of technical devices such as implants or medical parts requires proper construction and structural (and functional) control of this organism–machine interface. It is still the very beginning of generating a better understanding of what is needed to make an organism tolerate implants, to guarantee bidirectional communication between microelectronic devices and living tissue, or to simply construct interactive biocompatibility of surfaces in general. This exhaustive book lucidly describes the design, synthesis, assembly and characterization, and bio-(medical) applications of interfacial layers on solid substrates with molecularly or supramolecularly controlled architectures. Experts in the field share their contributions that have been developed in recent years.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead and computing efficiency are two parameters to be taken into account when designing a multicast stream protocol. In this paper, we propose to use two families of erasure codes to deal with this problem, namely, rateless codes and maximum distance separable codes. Our constructions will have the following advantages. First, our packet overhead will be small. Second, the number of signature verifications to be performed at the receiver is O(1). Third, every receiver will be able to recover all the original data packets emitted by the sender despite losses and injection occurred during the transmission of information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Design Pressure Test 2013 was a full-day intensive design immersion creative event run on Saturday 3 August 2013, at the QUT Faculty of Creative Industries J Block Design Lab Workshop in Brisbane, Australia, for 25 self-selected high-achieving junior and middle school (year 5-9) students, as part of the Queensland Academies ‘Young Scholars’ Program. Facilitated by tertiary interior design, fashion design and industrial design educators, technicians and six tertiary interior design and fashion design students, the workshop explored design process, environmental impact, the material properties and structural integrity of cardboard, construction techniques, and the production and evaluation of furniture design prototypes. This action research study aimed to facilitate an awareness in young people, of the role and scope of design within our society, the environmental ramifications of design decisions, and the value of design thinking skills in generating strategies to solve basic to complex challenges. It also aimed to investigate the value of collaboration between junior and middle school students, tertiary design educators and students and industry professionals in design awareness, and inspiring post-secondary pathways and idea generation for education. During the creative event, students utilised mathematics skills and developed sketching, making, communication, presentation and collaboration skills to improve their design process, while considering social, cultural and environmental opportunities. Through a series of hands-on collaborative design experiments, participants explored in teams of five, the opportunities available using cardboard as a material – inspiring both functional and aesthetic design solutions. Underpinned by the State Library of Queensland Design Minds Website ‘inquire, ideate and implement’ model of design thinking, the experiments culminated in the development of a detailed client brief, the design and fabrication of a furniture item for seating, and then a team presentation of prototypes to a panel of judges from the professions of architecture, interior design and industrial design, viewed also by parents. The final test for structural integrity was measured by the hoisting down of an adult body weight onto the fabricated seat. The workshop was filmed for the television program ‘Totally Wild’ for dissemination nationally (over 200,000 viewing audience) of the value of design and the Design Minds model to a wider target youth audience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.