997 resultados para group signatures
Resumo:
The methoxyamine group represents an ideal protecting group for the nitroxide moiety. It can be easily and selectively introduced in high yield (typically >90%) to a range of functionalised nitroxides using FeSO4.7H2O and H2O2 in DMSO. Its removal is readily achieved under mild conditions in high yield (70-90%) using mCPBA in a Cope-type elimination process.
Resumo:
This paper describes a new method of indexing and searching large binary signature collections to efficiently find similar signatures, addressing the scalability problem in signature search. Signatures offer efficient computation with acceptable measure of similarity in numerous applications. However, performing a complete search with a given search argument (a signature) requires a Hamming distance calculation against every signature in the collection. This quickly becomes excessive when dealing with large collections, presenting issues of scalability that limit their applicability. Our method efficiently finds similar signatures in very large collections, trading memory use and precision for greatly improved search speed. Experimental results demonstrate that our approach is capable of finding a set of nearest signatures to a given search argument with a high degree of speed and fidelity.
Resumo:
This study aimed to explore whether participants' pretherapy coping strategies predicted the outcome of group cognitive behavioral therapy (CBT) for anxiety and depression. It was hypothesized that adaptive coping strategies such as the use of active planning and acceptance would be associated with higher reductions, whereas maladaptive coping strategies such as denial and disengagement would be associated with lower reductions in anxious and depressed symptoms following psychotherapy. There were 144 participants who completed group CBT for anxiety and depression. Measures of coping strategies were administered prior to therapy, whereas measures of depression and anxiety were completed both prior to and following therapy. The results showed that higher levels of denial were associated with a poorer outcome, in terms of change in anxiety but not depression, following therapy. These findings suggest the usefulness of using the Denial subscale from the revised Coping Orientation to Problems Experienced (COPE) as a predictor of outcome in group CBT for anxiety.
A group psychological intervention to enhance the coping and acculturation of international students
Resumo:
There is a shortage of psychological interventions to aid the acculturation of international students. To address this issue, the present study developed and trialled a brief group psychological intervention, the STAR program: Strengths, Transitions, Adjustments, and Resilience. This program was developed using suggestions from international students and university professional and academic staff that had significant dealings and designated roles to guide support international students. It comprises of four weekly two-hour sessions, and is experiential and cognitive-behavioural in nature. The STAR program aims to enhance coping, which is predicted to subsequently improve psychological adaptation (an acculturation outcome). Sixteen international students participated in the pilot trial of the STAR program. The participants completed measures on coping self-efficacy, social self-efficacy, psychological adaptation, and psychological distress pre-intervention, post-intervention, and one-month follow-up. Results showed that participants’ psychological adaptation and coping self-efficacy significantly increased from pre to post, with the treatment gain maintained at the one-month follow-up for psychological adaptation. Increases in social self-efficacy were evident, but these did not reach significance, possibly due to a lack of power. The STAR program did not have an impact on psychological distress; however, participants were only minimally distressed at the commencement of the program. The qualitative feedback gathered from the participants, provided suggestions for further refinement, as well as information about the clinical utility of the STAR program.
Resumo:
The ability of poly(acrylic acid) (PAA) with different end groups and molar masses prepared by Atom Transfer Radical Polymerization (ATRP) to inhibit the formation of calcium carbonate scale at low and elevated temperatures was investigated. Inhibition of CaCO3 deposition was affected by the hydrophobicity of the end groups of PAA, with the greatest inhibition seen for PAA with hydrophobic end groups of moderate size (6–10 carbons). The morphologies of CaCO3 crystals were significantly distorted in the presence of these PAAs. The smallest morphological change was in the presence of PAA with long hydrophobic end groups (16 carbons) and the relative inhibition observed for all species were in the same order at 30 °C and 100 °C. As well as distorting morphologies, the scale inhibitors appeared to stabilize the less thermodynamically favorable polymorph, vaterite, to a degree proportional to their ability to inhibit precipitation.
Resumo:
This article reports on the outcomes of small group deliberations on levels of punitiveness and public confidence in the sentencing functions of Australian criminal courts, conducted as part of a larger project investigating public attitudes to sentencing. One hypothesis of the project as a whole was that a more informed and involved public is likely to be less punitive in their views on the sentencing of offenders, and to express less cynical views about the role of sentencing courts. The aim of the small group deliberations as part of the broader project was to engender a more thoughtful and considered approach by participants to issues around sentencing. It was hypothesised that the opportunity to discuss, deliberate and consider would lead to a measurable reduction in punitiveness and an increase in people’s confidence in the courts. While the results do indeed indicate such changes in attitudes, the current study also shed light on some of the conceptual, methodological and practical challenges inherent in this type of research.
Resumo:
The safety of passengers is a major concern to airports. In the event of crises, having an effective and efficient evacuation process in place can significantly aid in enhancing passenger safety. Hence, it is necessary for airport operators to have an in-depth understanding of the evacuation process of their airport terminal. Although evacuation models have been used in studying pedestrian behaviour for decades, little research has been done in considering the evacuees’ group dynamics and the complexity of the environment. In this paper, an agent-based model is presented to simulate passenger evacuation process. Different exits were allocated to passengers based on their location and security level. The simulation results show that the evacuation time can be influenced by passenger group dynamics. This model also provides a convenient way to design airport evacuation strategy and examine its efficiency. The model was created using AnyLogic software and its parameters were initialised using recent research data published in the literature.
Resumo:
Several websites utilise a rule-base recommendation system, which generates choices based on a series of questionnaires, for recommending products to users. This approach has a high risk of customer attrition and the bottleneck is the questionnaire set. If the questioning process is too long, complex or tedious; users are most likely to quit the questionnaire before a product is recommended to them. If the questioning process is short; the user intensions cannot be gathered. The commonly used feature selection methods do not provide a satisfactory solution. We propose a novel process combining clustering, decisions tree and association rule mining for a group-oriented question reduction process. The question set is reduced according to common properties that are shared by a specific group of users. When applied on a real-world website, the proposed combined method outperforms the methods where the reduction of question is done only by using association rule mining or only by observing distribution within the group.
Resumo:
We propose a framework for adaptive security from hard random lattices in the standard model. Our approach borrows from the recent Agrawal-Boneh-Boyen families of lattices, which can admit reliable and punctured trapdoors, respectively used in reality and in simulation. We extend this idea to make the simulation trapdoors cancel not for a specific forgery but on a non-negligible subset of the possible challenges. Conceptually, we build a compactly representable, large family of input-dependent “mixture” lattices, set up with trapdoors that “vanish” for a secret subset which we hope the forger will target. Technically, we tweak the lattice structure to achieve “naturally nice” distributions for arbitrary choices of subset size. The framework is very general. Here we obtain fully secure signatures, and also IBE, that are compact, simple, and elegant.
Resumo:
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.
Resumo:
User evaluations using paper prototypes commonly lack social context. The Group simulation technique described in this paper offers a solution to this problem. The study introduces an early-phase participatory design technique targeted for small groups. The proposed technique is used for evaluating an interface, which enables group work in photo collection creation. Three groups of four users, 12 in total, took part in a simulation session where they tested a low-fidelity design concept that included their own personal photo content from an event that their group attended together. The users’ own content was used to evoke natural experiences. Our results indicate that the technique helped users to naturally engage with the prototype in the session. The technique is suggested to be suitable for evaluating other early-phase concepts and to guide design solutions, especially with the concepts that include users’ personal content and enable content sharing.
Resumo:
User-generated content plays a pivotal role in the current social media. The main focus, however, has been on the explicitly generated user content such as photos, videos and status updates on different social networking sites. In this paper, we explore the potential of implicitly generated user content, based on users’ online consumption behaviors. It is technically feasible to record users’ consumption behaviors on mobile devices and share that with relevant people. Mobile devices with such capabilities could enrich social interactions around the consumed content, but it may also threaten users’ privacy. To understand the potentials of this design direction we created and evaluated a low-fidelity prototype intended for photo sharing within private groups. Our prototype incorporates two design concepts, namely, FingerPrint and MoodPhotos that leverage users’ consumption history and emotional responses. In this paper, we report user values and user acceptance of this prototype from three participatory design workshops.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
A professional development toolkit was developed with an agenda, work sheets and resources to support a review of assessment practices pertaining to group work in a first year undergraduate course. A main contribution is the Rational for Group Work in Higher Education template that allows academic staff to determine the purpose for group work and identify the rationale behind the assessment tasks.
Resumo:
Results of mass spectrometric studies are reported for the collisional dissociation of Group XI (Cu, Ag, Au) metal ion complexes with fatty acids (palmitic, oleic, linoleic and a-linolenic) and glycerolipids. Remarkably, the formation of M2H+ ions (M = Cu, Ag) is observed as a dissociation product of the ion complexes containing more than one metal cation and only if the lipid in the complex contains a double bond. Ag2H+ is formed as the main dissociation channel for all three of the fatty acids containing double bonds that were investigated while Cu2H+ is formed with one of the fatty acids and, although abundant, is not the dominant dissociation channel. Also. Cu(I) and Ag(I) ion complexes were observed with glycerolipids (including triacylglycerols and glycerophospholipids) containing either saturated or unsaturated fatty acid substituents. Interestingly. Ag2H+ ion is formed in a major fragmentation channel with the lipids that are able to form the complex with two metal cations (triacylglycerols and glycerophosphoglycerols), while lipids containing a fixed positive charge (glycerophospocholines) complex only with a single metal cation. The formation of Ag2H+ ion is a significant dissociation channel from the complex ion Ag-2(L-H)(+) where L = Glycerophospholipid (GP) (18:1/18:1). Cu(I) also forms complexes of two metal cations with glycerophospholipids but these do not produce Cu2H+ upon dissociation. Rather organic fragments, not containing Cu(I), are formed, perhaps due to different interactions of these metal cations with lipids resulting from the much smaller ionic radius of Cu(I) compared to Ag(I) (C).