905 resultados para Weaknesses
Resumo:
Few studies have examined the effects of parental MS on children, and those that have suffered from numerous methodological weaknesses, some of which are addressed in this study. This study investigated the effects of parental MS on children by comparing youth of a parent with MS to youth who have no family member with a serious health condition on adjustment outcomes, caregiving, attachment and family functioning. A questionnaire survey methodology was used. Measures included youth somatisation, health, pro-social behaviour, behavioural-social difficulties, caregiving, attachment and family functioning. A total of 126 youth of a parent with MS were recruited from MS Societies in Australia and, were matched one-to-one with youth who had no family member with a health condition drawn from a large community sample. Comparisons showed that youth of a parent with MS did not differ on any of the outcomes except for peer relationship problems: adolescent youth of a parent with MS reported lower peer relationship problems than control adolescents. Overall, results did not support prior research findings suggesting adverse impacts of parental MS on youth.
Resumo:
Bats are an important component of mammalian biodiversity and fill such a wide array of ecological niches that they may offer an important multisensory bioindicator role in assessing ecosystem health. There is a need to monitor population trends of bats for their own sake because many populations face numerous environmental threats related to climate change, habitat loss, fragmentation, hunting, and emerging diseases. To be able to establish bat ultrasonic biodiversity trends as a reliable indicator, it is important to standardize monitoring protocols, data management, and analyses. This chapter discusses the main issues to be considered in developing a bat ultrasonic indicator. It focuses on the results from indicator bats program (iBats), a system for the global acoustic monitoring of bats, in Eastern Europe. Finally, the chapter reviews the strengths and weaknesses of the Program and considers the opportunities and threats that it may face in the future.
Resumo:
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.
Resumo:
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.
Resumo:
The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.
Resumo:
This paper critically evaluates the empirical evidence of 36 studies regarding the comparative cost-effectiveness of group and individual cognitive behaviour therapy (CBT) as a whole, and also for specific mental disorders (e.g. depression, anxiety, substance abuse) or populations (e.g. children). Methods of calculating costs, as well as methods of comparing treatment outcomes were appraised and criticized. Overall, the evidence that group CBT is more cost-effective than individual CBT is mixed, with group CBT appearing to be more cost effective in treating depression and children, but less cost effective in treating drugs and alcohol dependence, anxiety and social phobias. In addition, methodological weaknesses in the studies assessed are noted. There is a need to improve cost calculation methodology, as well as more solid and a greater number of empirical cost-effectiveness studies before a firm conclusion can be reached that group CBT is more cost effective then individual CBT.
Resumo:
Austroads called for responses to a tender to investigate options for rehabilitation in alcohol interlock programs. Following successful application by the Centre for Accident Research and Road Safety – Queensland (CARRS-Q), a program of work was developed. The project has four objectives: 1. Develop a matrix outlining existing policies in national and international jurisdictions with respect to treatment and rehabilitation programs and criteria for eligibility for interlock removal; 2. Critically review the available literature with a focus on evaluation outcomes regarding the effectiveness of treatment and rehabilitation programs; 3. Analyse and assess the strengths and weaknesses of the programs/approaches identified, and; 4. Outline options with an evidence base for consideration by licensing authorities.
Resumo:
Experts are increasingly being called upon to quantify their knowledge, particularly in situations where data is not yet available or of limited relevance. In many cases this involves asking experts to estimate probabilities. For example experts, in ecology or related fields, might be called upon to estimate probabilities of incidence or abundance of species, and how they relate to environmental factors. Although many ecologists undergo some training in statistics at undergraduate and postgraduate levels, this does not necessarily focus on interpretations of probabilities. More accurate elicitation can be obtained by training experts prior to elicitation, and if necessary tailoring elicitation to address the expert’s strengths and weaknesses. Here we address the first step of diagnosing conceptual understanding of probabilities. We refer to the psychological literature which identifies several common biases or fallacies that arise during elicitation. These form the basis for developing a diagnostic questionnaire, as a tool for supporting accurate elicitation, particularly when several experts or elicitors are involved. We report on a qualitative assessment of results from a pilot of this questionnaire. These results raise several implications for training experts, not only prior to elicitation, but more strategically by targeting them whilst still undergraduate or postgraduate students.
Resumo:
This paper reviews the state-of-the-art in the automation of underground mining vehicles and reports on the development of an autonomous navigation system under development through the CMTE with sponsorship arranged by AMIRA. Past attempts at automating LHDs and haul trucks are described and their particular strengths and weaknesses are discussed. The auto-guidance system being developed overcomes some of the limitations of state-of-the-art prototype æcommercialÆ systems. It can be retrofitted to existing remote controlled vehicles, uses minimum installed infrastructure and is flexible enough for rapid relocation to alternate routes. The navigation techniques use data fusion of two separate sets of sensors combining natural feature recognition, nodal maps and inertial navigation techniques. Collision detection is incorporated and people and other traffic are excluded from the tramming area. This paper describes the work being done by the group with regard to auto-tramming and also outlines the future goals.
Resumo:
This paper reviews the state-of-the art in the automation of underground truck haulage. Past attemps at automating LHDs and haul trucks are described and their particular strengths and weaknesses are listed. We argue that the simple auto-tram...
Resumo:
A wide range of decision-making models have been offered to assist in making ethical decisions in the workplace. Those that are based on normative moral frameworks typically include elements of traditional moral philosophy such as consequentialist and/or deontological␣ethics. This paper suggests an alternative model drawing on Jean-Paul Sartre’s existentialism. Accordingly, the model focuses on making decisions in full awareness of one’s freedom and responsibility. The steps of the model are intended to encourage reflection of one’s projects and one’s situation and the possibility of refusing the expectations of others. A case study involving affirmative action in South Africa is used to demonstrate the workings of the model and a number of strengths and weaknesses are identified. Despite several weaknesses that can be raised regarding existential ethics, the model’s success lies in the way that it reframes ethical dilemmas in terms of individual freedom and responsibility, and in its acceptance and analysis of subjective experiences and personal situations
Resumo:
This paper reviews the state-of-the-art in the automation of underground truck haulage. Past attempts at automating LHDs and haul trucks are described and their particular strengths and weaknesses are listed. We argue that the simple auto-tramming systems currently being commercialised, that follow rail-type guides placed along the back, cannot match the performance, flexibility and reliability of systems based on modern mobile robotic principles. In addition, the lack of collision detection research in the underground environment is highlighted.
Resumo:
Population-based brain mapping provides great insight into the trajectory of aging and dementia, as well as brain changes that normally occur over the human life span.We describe three novel brain mapping techniques, cortical thickness mapping, tensor-based morphometry (TBM), and hippocampal surface modeling, which offer enormous power for measuring disease progression in drug trials, and shed light on the neuroscience of brain degeneration in Alzheimer's disease (AD) and mild cognitive impairment (MCI).We report the first time-lapse maps of cortical atrophy spreading dynamically in the living brain, based on averaging data from populations of subjects with Alzheimer's disease and normal subjects imaged longitudinally with MRI. These dynamic sequences show a rapidly advancing wave of cortical atrophy sweeping from limbic and temporal cortices into higher-order association and ultimately primary sensorimotor areas, in a pattern that correlates with cognitive decline. A complementary technique, TBM, reveals the 3D profile of atrophic rates, at each point in the brain. A third technique, hippocampal surface modeling, plots the profile of shape alterations across the hippocampal surface. The three techniques provide moderate to highly automated analyses of images, have been validated on hundreds of scans, and are sensitive to clinically relevant changes in individual patients and groups undergoing different drug treatments. We compare time-lapse maps of AD, MCI, and other dementias, correlate these changes with cognition, and relate them to similar time-lapse maps of childhood development, schizophrenia, and HIV-associated brain degeneration. Strengths and weaknesses of these different imaging measures for basic neuroscience and drug trials are discussed.
Resumo:
This paper presents the results of a research project aimed at examining the capabilities and challenges of two distinct but not mutually exclusive approaches to in-service bridge assessment: visual inspection and installed monitoring systems. In this study, the intended functionality of both approaches was evaluated on its ability to identify potential structural damage and to provide decision-making support. Inspection and monitoring are compared in terms of their functional performance, cost, and barriers (real and perceived) to implementation. Both methods have strengths and weaknesses across the metrics analyzed, and it is likely that a hybrid evaluation technique that adopts both approaches will optimize efficiency of condition assessment and ultimately lead to better decision making.
Resumo:
Perceptions of mentors' practices related to primary science teaching were obtained from final year preservice teachers after a 4-week practicum. Responses to a survey (n=59), constructed through literature-based practices and attributes of effective mentors, identified perceived strengths and weaknesses in the area of mentoring preservice teachers of primary science. Through exploratory factor analysis, this pilot study also tested the unidimensionality of mentoring practices and attributes assigned to categories (factors) that may characterise mentoring in primary science teaching. These suggested factors, namely, personal attributes, system requirements, pedagogical knowledge, modelling, and feedback had Cronbach alpha coefficients of internal consistency reliability of 0.93, 0.78, 0.94, 0.90, and 0.81 respectively. Survey responses indicated that mentors generally do not provide specific mentoring in primary science teaching. It is argued that science education reform requires the identification of factors and associated attributes and practices of mentoring primary science in order to effectively develop preservice teachers in primary science teaching.