991 resultados para Kenneth Slessor
Resumo:
We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.
Resumo:
Problem: Chlamydia trachomatis genital tract infections are easily treated with antibiotics, however the majority of infections are asymptomatic and therefore untreated, highlighting the need for a vaccine. Because most infections are asymptomatic, vaccination could potentially be administered to individuals who may have an acute infection at that time. In such individuals the effect of vaccination on the existing infection is unknown; however one potential outcome could be the development of a persistent infection. In vitro chlamydial persistence has been well characterized in various strains, however there have been no reported studies in C. muridarum. Method of Study: We performed ultrastructural characterization, and transcriptome analysis of selected genes. We then used the transcriptional profiles of the selected genes to examine whether intranasal immunization of mice during an active genital infection would induce persistence in the upper reproductive tract of female mice. Results and Conclusions: We found that persistence developed in the oviducts of mice as a result of immunization. This is a significant finding, not only because it is the first time that C. muridarum persistence has been characterized in vitro, but also due to the fact that there is minimal characterization of in vivo persistence of any chlamydial species. This highlights the importance of the timing of vaccination in individuals.
Resumo:
The rank and census are two filters based on order statistics which have been applied to the image matching problem for stereo pairs. Advantages of these filters include their robustness to radiometric distortion and small amounts of random noise, and their amenability to hardware implementation. In this paper, a new matching algorithm is presented, which provides an overall framework for matching, and is used to compare the rank and census techniques with standard matching metrics. The algorithm was tested using both real stereo pairs and a synthetic pair with ground truth. The rank and census filters were shown to significantly improve performance in the case of radiometric distortion. In all cases, the results obtained were comparable to, if not better than, those obtained using standard matching metrics. Furthermore, the rank and census have the additional advantage that their computational overhead is less than these metrics. For all techniques tested, the difference between the results obtained for the synthetic stereo pair, and the ground truth results was small.
Resumo:
Objectives To review the existing research on the effectiveness of heat warning systems (HWSs) in saving lives and reducing harm. Methods A systematic search of major databases was conducted, using “heat, heatwave, high temperature, hot temperature, OR hot climate” AND “warning system”. Results Fifteen articles were retrieved. Six studies asserted that fewer people died of excessive heat after HWS implementation. HWS was associated with reduction in ambulance use. One study estimated the benefits of HWS to be 468millionforsaving117livescomparedto210,000 costs of running the system. Eight studies showed that mere availability of HWS did not lead to behavioral changes. Perceived threat of heat dangers to self/others was the main factor related to heeding warnings and taking proper actions. However, costs and barriers associated with taking protective actions, such as costs of running air conditioners, were of significant concern particularly to the poor. Conclusions Research in this area is limited. Prospective designs applying health behavior theories should establish whether HWS can produce the health benefits they are purported to achieve by identifying the target vulnerable groups.
Resumo:
Heatwaves are associated with significant health risks particularly among vulnerable groups. To minimize these risks, heat warning systems have been implemented. The question therefore is how effective these systems are in saving lives and reducing heat-related harm. We systematically searched and reviewed 15 studies which examined this. Six studies asserted that fewer people died of excessive heat after the implementation of heat warning systems. Demand for ambulance decreased following the implementation of these systems. One study also estimated the costs of running heat warning systems at US$210,000 compared to the US$468 million benefits of saving 117 lives. The remaining eight studies investigated people?s response to heat warning systems and taking appropriate actions against heat harms. Perceived threat of heat dangers emerged as the main factor related to heeding the warnings and taking proper actions. However, barriers, such as costs of running air-conditioners, were of significant concern, particularly to the poor. The weight of the evidence suggests that heat warning systems are effective in reducing mortality and, potentially, morbidity. However, their effectiveness may be mediated by cognitive, emotive and socio-demographic characteristics. More research is urgently required into the cost-effectiveness of heat warning systems? measures and improving the utilization of the services.
Resumo:
Our previous study reported microorganisms in human follicular fluid. The objective of this study was to test human follicular fluid for the presence of microorganisms and to correlate these findings with the in vitro fertilization (IVF) outcomes. In this study, 263 paired follicular fluids and vaginal swabs were collected from women undergoing IVF cycles, with various causes for infertility, and were cultured to detect microorganisms. The cause of infertility and the IVF outcomes for each woman were correlated with the microorganisms detected within follicular fluid collected at the time of trans-vaginal oocyte retrieval. Microorganisms isolated from follicular fluids were classified as: (1) ‘colonizers’ if microorganisms were detected within the follicular fluid, but not within the vaginal swab (at the time of oocyte retrieval); or (2) ‘contaminants’ if microorganisms detected in the vagina at the time of oocyte retrieval were also detected within the follicular fluid. The presence of Lactobacillus spp. in ovarian follicular fluids was associated with embryo maturation and transfer. This study revealed microorganisms in follicular fluid itself and that the presence of particular microorganisms has an adverse affect on IVF outcomes as seen by an overall decrease in embryo transfer rates and pregnancy rates in both fertile and infertile women, and live birth rates in women with idiopathic infertility. Follicular fluid microorganisms are a potential cause of adverse pregnancy outcomes in IVF in both infertile women and in fertile women with infertile male partners.
Resumo:
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.
Resumo:
Classroom emotional climates are interrelated with students’ engagement with university courses. Despite growing interest in emotions and emotional climate research, little is known about the ways in which social interactions and different subject matter mediate emotional climates in preservice science teacher education classes. In this study we investigated the emotional climate and associated classroom interactions in a preservice science teacher education class. We were interested in the ways in which salient classroom interactions were related to the emotional climate during lessons centered on debates about science-based issues (e.g., nuclear energy alternatives). Participants used audience response technology to indicate their perceptions of the emotional climate. Analysis of conversation for salient video clips and analysis of non-verbal conduct (acoustic parameters, body movements, and facial expressions) supplemented emotional climate data. One key contribution that this study makes to preservice science teacher education is to identify the micro-processes of successful and unsuccessful class interactions that were associated with positive and neutral emotional climate. The structure of these interactions can inform the practice of other science educators who wish to produce positive emotional climates in their classes. The study also extends and explicates the construct of intensity of emotional climate.
Resumo:
The double-stranded conformation of cellular DNA is a central aspect of DNA stabilisation and protection. The helix preserves the genetic code against chemical and enzymatic degradation, metabolic activation, and formation of secondary structures. However, there are various instances where single-stranded DNA is exposed, such as during replication or transcription, in the synthesis of chromosome ends, and following DNA damage. In these instances, single-stranded DNA binding proteins are essential for the sequestration and processing of single-stranded DNA. In order to bind single-stranded DNA, these proteins utilise a characteristic and evolutionary conserved single-stranded DNA-binding domain, the oligonucleotide/oligosaccharide-binding (OB)-fold. In the current review we discuss a subset of these proteins involved in the direct maintenance of genomic stability, an important cellular process in the conservation of cellular viability and prevention of malignant transformation. We discuss the central roles of single-stranded DNA binding proteins from the OB-fold domain family in DNA replication, the restart of stalled replication forks, DNA damage repair, cell cycle-checkpoint activation, and telomere maintenance.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
Infrared spectra are reported of methyl formate and formaldehyde adsorbed at 300 K on silica, Cu/SiO2 reduced in hydrogen and Cu/SiO2 which had been oxidised by exposure to nitrous oxide after reduction. Silanol groups on silica form hydrogen bonds with carbonyl groups in weakly adsorbed methyl formate molecules. Methyl formate ligates via its carbonyl groups to Cu atoms in the surface of reduced copper. A low residual concentration of surface oxygen on copper promoted the slow reaction of ligated methyl formate to give a bridging formate species on copper and adsorbed methoxy groups. Methyl formate did not ligate to an oxidised copper surface but was rapidly chemisorbed to give unidentate formate and methoxy species. Formaldehyde slowly polymerises on silica to form trioxane and other oxymethylene species. The reaction is faster over Cu/SiO2 which, in the reduced state, also catalyses the formation of bridging formate anions adsorbed on copper. The reaction between formaldehyde and oxidised Cu/SiO2 leads to both unidentate and bidentate formate and adsorbed water.
Resumo:
Infrared spectra are reported of formic acid adsorbed at 300 K on a reduced copper catalyst (Cu/SiO2) and a copper surface which had been oxidised by exposure to nitrous oxide. Formic acid was weakly adsorbed on the silica support. Ligation of formic acid to the copper surface occurred only on the reduced catalyst. Dissociative adsorption resulted in the formation of unidentate formate on the oxidised catalyst. The presence of reduced copper metal instigated a rapid reorientation to a bidentate formate species.
Resumo:
FTIR spectra are reported of CO adsorbed on silica-supported copper catalysts prepared from copper(II) acetate monohydrate. Fully oxidised catalyst gave bands due to CO on CuO, isolated Cu2+ cations on silica and anion vacancy sites in CuO. The highly dispersed CuO aggregated on reduction to metal particles which gave bands due to adsorbed CO characteristic of both low-index exposed planes and stepped sites on high-index planes. Partial surface oxidation with N2O or H2O generated Cu+ adsorption sites which were slowly reduced to Cu° by CO at 300 K. Surface carbonate initially formed from CO was also slowly depleted with time with the generation of CO2. The results are consistent with adsorbed carbonate being an intermediate in the water-gas shift reaction of H2O and CO to H2 and CO2.
Resumo:
Infrared spectra are reported of methanol adsorbed at 295 K on reduced Cu/SiO2 and on Cu/SiO2 which had been preoxidised by exposure to excess nitrous oxide. Methanol was chemisorbed on reduced Cu/SiO2 to give methoxy species on both silica and copper, gave a trace of formate on copper via reaction with residual surface oxygen, and was weakly adsorbed at SiOH sites on the silica support. Heating the adsorbed species at 393 K led to the loss of methoxy groups on copper and the concomitant formation of a bidentate surface formate. Heating reduced Cu/SiO2 in methanol at 538 K initially gave both gaseous and adsorbed (on Cu) methyl formate which subsequently decomposed to CO and hydrogen. The reactions of methanol with oxidised Cu/SiO2 were similar to those for the reduced catalyst although surface oxygen promoted the formation of surface methoxy groups on copper. Subsequent heating at 393 K led first to unidentate formate before the appearance of bidentate formate.