877 resultados para Group Key Exchange


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A customer reported problem (or Trouble Ticket) in software maintenance is typically solved by one or more maintenance engineers. The decision of allocating the ticket to one or more engineers is generally taken by the lead, based on customer delivery deadlines and a guided complexity assessment from each maintenance engineer. The key challenge in such a scenario is two folds, un-truthful (hiked up) elicitation of ticket complexity by each engineer to the lead and the decision of allocating the ticket to a group of engineers who will solve the ticket with in customer deadline. The decision of allocation should ensure Individual and Coalitional Rationality along with Coalitional Stability. In this paper we use game theory to examine the issue of truthful elicitation of ticket complexities by engineers for solving ticket as a group given a specific customer delivery deadline. We formulate this problem as strategic form game and propose two mechanisms, (1) Division of Labor (DOL) and (2) Extended Second Price (ESP). In the proposed mechanisms we show that truth telling by each engineer constitutes a Dominant Strategy Nash Equilibrium of the underlying game. Also we analyze the existence of Individual Rationality (IR) and Coalitional Rationality (CR) properties to motivate voluntary and group participation. We use Core, solution concept from co-operative game theory to analyze the stability of the proposed group based on the allocation and payments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: The present paper documents the uses of plants in traditional herbal medicine for human and veterinary ailments, and those used for dietary supplements, religious purpose, local beverage, and plants used to poison fish and wild animals. Traditional botanical medicine is the primary mode of healthcare for most of the rural population in Arunachal Pradesh. Materials and methods: Field research was conducted between April 2006 and March 2009 with randomly selected 124 key informants using semi-structured questionnaire. The data obtained was analyzed through informant consensus factor (F(IC)) to determine the homogeneity of informant's knowledge on medicinal plants. Results: We documented 50 plants species belonging to 29 families used for treating 22 human and 4 veterinary ailments. Of the medicinal plants reported, the most common growth form was herbs (40%) followed by shrubs, trees, and climbers. Leaves were most frequently used plant parts. The consensus analysis revealed that the dermatological ailments have the highest F(IC) (0.56) and the gastro-intestinal diseases have F(IC) (0.43). F(IC) values indicated that there was high agreement in the use of plants in dermatological and gastro-intestinal ailments category among the users. Gymnocladus assamicus is a critically rare and endangered species used as disinfectant for cleaning wounds and parasites like leeches and lice on livestocks. Two plant species (Illicium griffithii and Rubia cordifolia) are commonly used for traditional dyeing of clothes and food items. Some of the edible plants recorded in this study were known for their treatment against high blood pressure (Clerodendron colebrookianum), diabetes mellitus (Momordica charantia), and intestinal parasitic worms like round and tape worms (Lindera neesiana, Solanum etiopicum, and Solanum indicum). The Monpas of Arunachal Pradesh have traditionally been using Daphne papyracea for preparing hand-made paper for painting and writing religious scripts in Buddhist monasteries. Three plant species (Derris scandens, Aesculus assamica, and Polygonum hydropiper) were frequently used to poison fish during the month of June-July every year and the underground tuber of Aconitum ferrox is widely used in arrow poisoning to kill ferocious animals like bear, wild pigs, gaur and deer. The most frequently cited plant species; Buddleja asiatica and Hedyotis scandens were used as common growth supplements during the preparation of fermentation starter cultures. Conclusion: The traditional pharmacopoeia of the Monpa ethnic group incorporates a myriad of diverse botanical flora. Traditional knowledge of the remedies is passed down through oral traditions without any written document. This traditional knowledge is however, currently threatened mainly due to acculturation and deforestation due to continuing traditional shifting cultivation. This study reveals that the rural populations in Arunachal Pradesh have a rich knowledge of forest-based natural resources and consumption of wild edible plants is still an integral part of their socio-cultural life. Findings of this documentation study can be used as an ethnopharmacological basis for selecting plants for future phytochemical and pharmaceutical studies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ad hoc networks are being used in applications ranging from disaster recovery to distributed collaborative entertainment applications. Ad hoc networks have become one of the most attractive solution for rapid deployment of interconnecting large number of mobile personal devices. The user community of mobile personal devices are demanding a variety of value added multimedia entertainment services. The popularity of peer group is increasing and one or some members of the peer group need to send data to some or all members of the peer group. The increasing demand for group oriented value added services is driving for efficient multicast service over ad hoc networks. Access control mechanisms need to be deployed to provide guarantee that the unauthorized users cannot access the multicast content. In this paper, we present a topology aware key management and distribution scheme for secure overlay multicast over MANET to address node mobility related issues for multicast key management. We use overlay approach for key distribution and our objective is to keep communication overhead low for key management and distribution. We also incorporate reliability using explicit acknowledgments with the key distribution scheme. Through simulations we show that the proposed key management scheme has low communication overhead for rekeying and improves the reliability of key distribution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this work, several tertiary amine-based diaryl diselenides were synthesized and evaluated for their glutathione peroxidase (GPx)-like antioxidant activities using hydrogen peroxide, tert-butyl hydroperoxide and cumene hydroperoxide as substrates and thiophenol (PhSH) and glutathione (GSH) as co-substrates. A comparison of the GPx-like activity of 4-methoxy-substituted N,N-dialkylbenzylamine-based diselenides with that of the corresponding 6-methoxy-substituted compounds indicates that the activity highly depends on the position of the methoxy substituent. Although the methoxy group at 4- and 6-position alters the electronic properties of selenium, the substitution at the 6-position provides the required steric protection for some of the key intermediates in the catalytic cycle. A detailed experimental and theoretical investigation reveals that the 6-methoxy substituent prevents the undesired thiol exchange reactions at the selenium centers in the selenenyl sulfide intermediates. The 6-methoxy substituent also prevents the formation of seleninic and selenonic acids. When PhSH is used as the thiol co-substrate, the 4-methoxy-substituted diselenides exhibit GPx-like activity similar to that of the parent compounds as the 4-methoxy substituent does not block the selenium center in the selenenyl sulfide intermediates from thiol exchange reactions. In contrast, the 4-methoxy substituent significantly enhances the GPx-like activity of the diselenides when glutathione (GSH) is used as the co-substrate. (C) 2012 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A pairwise independent network (PIN) model consists of pairwise secret keys (SKs) distributed among m terminals. The goal is to generate, through public communication among the terminals, a group SK that is information-theoretically secure from an eavesdropper. In this paper, we study the Harary graph PIN model, which has useful fault-tolerant properties. We derive the exact SK capacity for a regular Harary graph PIN model. Lower and upper bounds on the fault-tolerant SK capacity of the Harary graph PIN model are also derived.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An efficient density matrix renormalization group (DMRG) algorithm is presented and applied to Y junctions, systems with three arms of n sites that meet at a central site. The accuracy is comparable to DMRG of chains. As in chains, new sites are always bonded to the most recently added sites and the superblock Hamiltonian contains only new or once renormalized operators. Junctions of up to N = 3n + 1 approximate to 500 sites are studied with antiferromagnetic (AF) Heisenberg exchange J between nearest-neighbor spins S or electron transfer t between nearest neighbors in half-filled Hubbard models. Exchange or electron transfer is exclusively between sites in two sublattices with N-A not equal N-B. The ground state (GS) and spin densities rho(r) = < S-r(z)> at site r are quite different for junctions with S = 1/2, 1, 3/2, and 2. The GS has finite total spin S-G = 2S(S) for even (odd) N and for M-G = S-G in the S-G spin manifold, rho(r) > 0(< 0) at sites of the larger (smaller) sublattice. S = 1/2 junctions have delocalized states and decreasing spin densities with increasing N. S = 1 junctions have four localized S-z = 1/2 states at the end of each arm and centered on the junction, consistent with localized states in S = 1 chains with finite Haldane gap. The GS of S = 3/2 or 2 junctions of up to 500 spins is a spin density wave with increased amplitude at the ends of arms or near the junction. Quantum fluctuations completely suppress AF order in S = 1/2 or 1 junctions, as well as in half-filled Hubbard junctions, but reduce rather than suppress AF order in S = 3/2 or 2 junctions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The possibilities of digital research have altered the production, publication and use of research results. Academic research practice and culture are changing or have already been transformed, but to a large degree the system of academic recognition has not yet adapted to the practices and possibilities of digital research. This applies especially to research data, which are increasingly produced, managed, published and archived, but play hardly a role yet in practices of research assessment. The aim of the workshop was to bring experts and stakeholders from research institutions, universities, scholarly societies and funding agencies together in order to review, discuss and build on possibilities to implement the culture of sharing and to integrate publication of data into research assessment procedures. The report 'The Value of Research Data - Metrics for datasets from a cultural and technical point of view' was presented and discussed. Some of the key finding were that data sharing should be considered normal research practice, in fact not sharing should be considered malpractice. Research funders and universities should support and encourage data sharing. There are a number of important aspects to consider when making data count in research and evaluation procedures. Metrics are a necessary tool in monitoring the sharing of data sets. However, data metrics are at present not very well developed and there is not yet enough experience in what these metrics actually mean. It is important to implement the culture of sharing through codes of conducts in the scientific communities. For further key findings please read the report.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

On 23-24 September 2009 an international discussion workshop on “Main Drivers for Successful Re-Use of Research Data” was held in Berlin, prepared and organised by the Knowledge Exchange working group on Primary Research Data. The main focus of the workshop was on the benefits, challenges and obstacles of re-using data from a researcher’s perspective. The use cases presented by researchers from a variety of disciplines were supplemented by two key notes and selected presentations by specialists from infrastructure institutions, publishers, and funding bodies on national and European level. Researchers' perspectives The workshop provided a critical evaluation of what lessons have been learned on sharing and re-using research data from a researcher’s perspective and what actions might be taken on to still improve the successful re-use. Despite the individual differences characterising the diverse disciplines it became clear that important issues are comparable. Combine forces to support re-use and sharing of data Apart from several technical challenges such as metadata exchange standards and quality assurance it was obvious that the most important obstacles to re-using research data more efficiently are socially determined. It was agreed that in order to overcome this problem more efforts should be made to rise awareness and combine forces to support re-using and sharing of research data on all levels (researchers, institutions, publishers, funders, governments).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The report on the ‘Pathways to Open Scholarship’ conference, organised by Knowledge Exchange to celebrate its 10th anniversary, contains an overview of the views that invited speakers and experts in the audience expressed on Open Scholarship developments. Open Scholarship is not yet a reality of everyday research and education. The event reported on, addressed the concept of "open scholarship" by debating issues and key challenges with the aim to identify pathways forward. Four central themes which represent crucial dimensions of open scholarship have been explored: Benefits, risks and limitations of Open Scholarship; Success as a researcher; Technology; and Publishing and publication services. The report contains views, expectations, wishes and frustrations that experts have on open scholarship, as well as new and promising initiatives and approaches. The report is a starting point for future planning of KE activity and input for a range of consultation talks with respected experts and leaders in the research community in KE countries and beyond.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Alliance for Coastal Technologies (ACT) Workshop entitled "Technologies for Measuring Currents in Coastal Environments" was held in Portland, Maine, October 26-28, 2005, with sponsorship by the Gulf of Maine Ocean Observing System (GoMOOS), an ACT partner organization. The primary goals of the event were to summarize recent trends in nearshore research and management applications for current meter technologies, identify how current meters can assist coastal managers to fulfill their regulatory and management objectives, and to recommend actions to overcome barriers to use of the technologies. The workshop was attended by 25 participants representing state and federal environmental management agencies, manufacturers of current meter technologies, and researchers from academic institutions and private industry. Common themes that were discussed during the workshop included 1) advantages and limitations of existing current measuring equipment, 2) reliability and ease of use with each instrument type, 3) data decoding and interpretation procedures, and 4) mechanisms to facilitate better training and guidance to a broad user group. Seven key recommendations, which were ranked in order of importance during the last day of the workshop are listed below. 1. Forums should be developed to facilitate the exchange of information among users and industry: a) On-line forums that not only provide information on specific instruments and technologies, but also provide an avenue for the exchange of user experiences with various instruments (i.e. problems encountered, cautions, tips, advantages, etc). (see References for manufacturer websites with links to application and technical forums at end of report) b) Regional training/meetings for operational managers to exchange ideas on methods for measuring currents and evaluating data. c) Organize mini-meetings or tutorial sessions within larger conference venues. 2. A committee of major stakeholders should be convened to develop common standards (similar to the Institute of Electrical and Electronics Engineers (IEEE) committee) that enable users to switch sensors without losing software or display capabilities. (pdf contains 28 pages)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim of this study is to develop a reference model for intervention in the language processes applied to the transformation of language normalisation within organisations of a socio-economic nature. It is based on the case study of an experience carried out over10 years within a trades’ union confederation, and has pursued a strategy of a basically qualitative research carried out in three stages: 1) undertaking field work through application of action-research methodology, 2) reconstructing experiences following processes of systematisation and conceptualisation of the systematised data, applying methodologies for the Systematisation of Experiences and Grounded Theory, and 3) formulating a model for intervention, applying the Systems Approach methodology. Finally, we identified nine key ideas that make up the conceptual framework for the ENEKuS reference model, which is structured in nine ‘action points', each having an operating sub-model applicable in practice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The synthesis and X-ray diffraction study of bis(pentamethylcyclopentadienyl) ethylene titanium (I) are reported. This complex represents the first example of an isolable ethylene adduct of a group IV metal, a key intermediate in Ziegler-Natta olefin polymerization schemes. While treatment of I with ethylene leads to only traces of polymer after months, I participates in a wide range of stoichiometric and catalytic reactions. These include the catalytic conversion of ethylene specifically to butadiene and ethane and the catalytic isomerization of alkenes. Detailed studies have been carried out on the stoichiometric reactions of I with nitriles and alkynes. At low temperatures, nitriles react to form metallacycloimine species which more slowly undergo a formal 1,3-hydrogen shift to generate metallacycloeneamines. The lowest energy pathway for this rearrangement is an intramolecular hydrogen shift which is sensitive to the steric bulk of the R substituent. The reactions of I with alkynes yield metallacyclopentene complexes with high regioisomer selectivity. Carbonylation of the metallacyclopentene (η-C5Me55)2TiC(CH3)=C(CH3)CH2 under relatively mild conditions cleanly produces the corresponding cyclopentenone and [C5(CH3)5]2Ti(CO)2. Compounds derived from CO2 and acetaldehyde have also been isolated.

The synthesis and characterization of bis-(η-pentamethylcyclopentadienyl) niobium(III) tetrahydroborate (II) are described and a study of its temperature-dependent proton NMR spectroscopic behavior is reported. The complex is observed to undergo a rapid intramolecular averaging process at elevated temperatures. The free energy of activation, ΔG = 16.4 ± 0.4 kcal/mol, is calculated. The reinvestigation of a related compound, bis(η-cyclopentadienyl)niobium(III) tetrahydroborate, established ΔG = 14.6 ± 0.2 kcal/mol for the hydrogen exchange process. The tetrahydroborate complex, II reacts with pyridine and dihydrogen to yield (η-C5Me55)2NbH3 (III). The reactivity of III with CO and ethylene is reported.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

I. Crossing transformations constitute a group of permutations under which the scattering amplitude is invariant. Using Mandelstem's analyticity, we decompose the amplitude into irreducible representations of this group. The usual quantum numbers, such as isospin or SU(3), are "crossing-invariant". Thus no higher symmetry is generated by crossing itself. However, elimination of certain quantum numbers in intermediate states is not crossing-invariant, and higher symmetries have to be introduced to make it possible. The current literature on exchange degeneracy is a manifestation of this statement. To exemplify application of our analysis, we show how, starting with SU(3) invariance, one can use crossing and the absence of exotic channels to derive the quark-model picture of the tensor nonet. No detailed dynamical input is used.

II. A dispersion relation calculation of the real parts of forward π±p and K±p scattering amplitudes is carried out under the assumption of constant total cross sections in the Serpukhov energy range. Comparison with existing experimental results as well as predictions for future high energy experiments are presented and discussed. Electromagnetic effects are found to be too small to account for the expected difference between the π-p and π+p total cross sections at higher energies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Technology roadmapping workshops are essentially a social mechanism for exploring, creating, shaping and implementing ideas. The front-end of a roadmapping session is based on brainstorming in order to tap into the group's diverse knowledge. The aim of this idea stimulation activity is to capture and share as many perspectives as possible across the full scope of the area of interest. The premise to such group brainstorming is that the sharing and exchange of ideas leads to cognitive stimulation resulting in a greater overall group idea generation performance in terms of the number, variety and originality of ideas. However, it must be recognized that the ideation stage in a roadmapping workshop is a complex psychosocial phenomenon with underlying cognitive and social processes. Thus, there are downsides to group interactions and these must be addressed in order to fully benefit from the power of a roadmapping workshop. This paper will highlight and discuss the key cognitive and social inhibitors involved. These include: production blocking, evaluation apprehension, free riding/social loafing, low norm setting/matching. Facilitation actions and process adjustments to counter such negative factors will be identified so as to provide a psychosocial basis for improving the running of roadmapping workshops. © 2009 PICMET.