981 resultados para Positive Definite Functions
Resumo:
Robust hashing is an emerging field that can be used to hash certain data types in applications unsuitable for traditional cryptographic hashing methods. Traditional hashing functions have been used extensively for data/message integrity, data/message authentication, efficient file identification and password verification. These applications are possible because the hashing process is compressive, allowing for efficient comparisons in the hash domain but non-invertible meaning hashes can be used without revealing the original data. These techniques were developed with deterministic (non-changing) inputs such as files and passwords. For such data types a 1-bit or one character change can be significant, as a result the hashing process is sensitive to any change in the input. Unfortunately, there are certain applications where input data are not perfectly deterministic and minor changes cannot be avoided. Digital images and biometric features are two types of data where such changes exist but do not alter the meaning or appearance of the input. For such data types cryptographic hash functions cannot be usefully applied. In light of this, robust hashing has been developed as an alternative to cryptographic hashing and is designed to be robust to minor changes in the input. Although similar in name, robust hashing is fundamentally different from cryptographic hashing. Current robust hashing techniques are not based on cryptographic methods, but instead on pattern recognition techniques. Modern robust hashing algorithms consist of feature extraction followed by a randomization stage that introduces non-invertibility and compression, followed by quantization and binary encoding to produce a binary hash output. In order to preserve robustness of the extracted features, most randomization methods are linear and this is detrimental to the security aspects required of hash functions. Furthermore, the quantization and encoding stages used to binarize real-valued features requires the learning of appropriate quantization thresholds. How these thresholds are learnt has an important effect on hashing accuracy and the mere presence of such thresholds are a source of information leakage that can reduce hashing security. This dissertation outlines a systematic investigation of the quantization and encoding stages of robust hash functions. While existing literature has focused on the importance of quantization scheme, this research is the first to emphasise the importance of the quantizer training on both hashing accuracy and hashing security. The quantizer training process is presented in a statistical framework which allows a theoretical analysis of the effects of quantizer training on hashing performance. This is experimentally verified using a number of baseline robust image hashing algorithms over a large database of real world images. This dissertation also proposes a new randomization method for robust image hashing based on Higher Order Spectra (HOS) and Radon projections. The method is non-linear and this is an essential requirement for non-invertibility. The method is also designed to produce features more suited for quantization and encoding. The system can operate without the need for quantizer training, is more easily encoded and displays improved hashing performance when compared to existing robust image hashing algorithms. The dissertation also shows how the HOS method can be adapted to work with biometric features obtained from 2D and 3D face images.
Resumo:
This thesis investigated the viability of using Frequency Response Functions in combination with Artificial Neural Network technique in damage assessment of building structures. The proposed approach can help overcome some of limitations associated with previously developed vibration based methods and assist in delivering more accurate and robust damage identification results. Excellent results are obtained for damage identification of the case studies proving that the proposed approach has been developed successfully.
Resumo:
Australian TV News: New Forms, Functions, and Futures examines the changing relationships between television, politics and popular culture. Drawing extensively on qualitative audience research and industry interviews, this book demonstrates that while ‘infotainment’ and satirical programmes may not follow the journalism orthodoxy (or, in some cases, reject it outright), they nevertheless play an important role in the way everyday Australians understand what is happening in the world. This therefore throws into question some longstanding assumptions about what form TV news should take, the functions it ought to serve, and the future prospects of the fourth estate.
Resumo:
We define a pair-correlation function that can be used to characterize spatiotemporal patterning in experimental images and snapshots from discrete simulations. Unlike previous pair-correlation functions, the pair-correlation functions developed here depend on the location and size of objects. The pair-correlation function can be used to indicate complete spatial randomness, aggregation or segregation over a range of length scales, and quantifies spatial structures such as the shape, size and distribution of clusters. Comparing pair-correlation data for various experimental and simulation images illustrates their potential use as a summary statistic for calibrating discrete models of various physical processes.
Resumo:
The purpose of this paper is to explore the potential and value of positive management practices to address the pain and suffering that frequently accompanies periods of large-scale austerity in public sectors. Public managers are increasingly asked to implement severe austerity measures and at the same time to build service delivery capacity; contradictory tasks. We draw on and further develop Cameron’s (2012) model of Positive Leadership to identify seven positive shared leadership practices that, while not eliminating the pain and suffering associated with austerity measures at least offer some scope, compared to traditional public management practices, for managing the austerity-build capacity duality in ways that respond to those affected with compassion and respect. We draw on published reports of a large-scale austerity program to highlight the potential and value of positive shared leadership practices for creating what we refer to as positive organisational austerity. The paper contributes to the literature on public management response to crises in two main ways. First, the paper introduces and develops the concept of shared positive leadership (Cameron, 2012; Carson et al. 2007) as a way of managing in austerity. Second, the paper introduces the concept of positive organisational austerity as a means of highlighting a reorientation in thinking about austerity measures and their implementation.
Resumo:
Currently, mass spectrometry-based metabolomics studies extend beyond conventional chemical categorization and metabolic phenotype analysis to understanding gene function in various biological contexts (e.g., mammalian, plant, and microbial). These novel utilities have led to many innovative discoveries in the following areas: disease pathogenesis, therapeutic pathway or target identification, the biochemistry of animal and plant physiological and pathological activities in response to diverse stimuli, and molecular signatures of host-pathogen interactions during microbial infection. In this review, we critically evaluate the representative applications of mass spectrometry-based metabolomics to better understand gene function in diverse biological contexts, with special emphasis on working principles, study protocols, and possible future development of this technique. Collectively, this review raises awareness within the biomedical community of the scientific value and applicability of mass spectrometry-based metabolomics strategies to better understand gene function, thus advancing this application's utility in a broad range of biological fields
Resumo:
Sequences with optimal correlation properties are much sought after for applications in communication systems. In 1980, Alltop (\emph{IEEE Trans. Inf. Theory} 26(3):350-354, 1980) described a set of sequences based on a cubic function and showed that these sequences were optimal with respect to the known bounds on auto and crosscorrelation. Subsequently these sequences were used to construct mutually unbiased bases (MUBs), a structure of importance in quantum information theory. The key feature of this cubic function is that its difference function is a planar function. Functions with planar difference functions have been called \emph{Alltop functions}. This paper provides a new family of Alltop functions and establishes the use of Alltop functions for construction of sequence sets and MUBs.
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
The t(14;18)(q21;q34) BCL2 translocation is a common genetic alteration in follicular and diffuse large B-cell lymphoma. However, it is not invariably associated with BCL2 gene overexpression due to undefined mechanisms that regulate expression from the proximal immunoglobulin heavy-chain (IgH) promoter. The BACH2 transcriptional repressor is able to modulate activity of this promoter. Here we have shown that, in tumor samples with BCL2 translocation, those with high levels of BACH2 had significantly lower BCL2 transcript abundance compared to those with low levels of BACH2. This indicates that BACH2 may be partially responsible for regulation of BCL2 expression from the t(14;18)(q21;q34) translocation.
Resumo:
Background The novel breast cancer metastasis modulator gene signal-induced proliferation-associated 1 (Sipa1) underlies the breast cancer metastasis efficiency modifier locus Mtes 1 and has been shown to influence mammary tumour metastatic efficiency in the mouse, with an ectopically expressing Sipa1 cell line developing 1.5 to 2 fold more surface pulmonary metastases. Sipa1 encodes a mitogen-inducible GTPase activating (GAP) protein for members of the Ras-related proteins; participates in cell adhesion and modulates mitogen-induced cell cycle progression. Germline SIPA1 SNPs showed association with positive lymph node metastasis and hormonal receptor status in a Caucasian cohort. We hypothesized that SIPA1 may also be correlated to breast carcinoma incidence as well as prognosis. Therefore, this study investigated the potential relationship of SIPA1 and human breast cancer incidence by a germline SNP genotype frequency association study in a case-control Caucasian cohort in Queensland, Australia. Methods The SNPs genotyped in this study were identified in a previous study and the genotyping assays were carried out using TaqMan SNP Genotyping Assays. The data were analysed with chi-square method and the Monte Carlo style CLUMP analysis program. Results Results indicated significance with SIPA1 SNP rs3741378; the CC genotype was more frequently observed in the breast cancer group compared to the disease-free control group, indicating the variant C allele was associated with increased breast cancer incidence. Conclusion This observation indicates SNP rs3741378 as a novel potential sporadic breast cancer predisposition SNP. While it showed association with hormonal receptor status in breast cancer group in a previous pilot study, this exonic missense SNP (Ser (S) to Phe (F)) changes a hydrophilic residue (S) to a hydrophobic residue (F) and may significantly alter the protein functions of SIPA1 in breast tumourgenesis. SIPA1 SNPs rs931127 (5' near gene), and rs746429 (synonymous (Ala (A) to Ala (A)), did not show significant associations with breast cancer incidence, yet were associated with lymph node metastasis in the previous study. This suggests that SIPA1 may be involved in different stages of breast carcinogenesis and since this study replicates a previous study of the associated SNP, it implicates variants of the SIPA1 gene as playing a potential role in breast cancer.
Resumo:
Liuwei Dihuang Wan (LWD), a classic Chinese medicinal formulae, has been used to improve or restore declined functions related to aging and geriatric diseases, such as impaired mobility, vision, hearing, cognition and memory. It has attracted increasingly much attention as one of the most popular and valuable herbal medicines. However, the systematic analysis of the chemical constituents of LDW is difficult and thus has not been well established. In this paper, a rapid, sensitive and reliable ultra-performance liquid chromatography with electrospray ionization quadrupole time-of-flight high-definition mass spectrometry (UPLC-ESI-Q-TOF-MS) method with automated MetaboLynx analysis in positive and negative ion mode was established to characterize the chemical constituents of LDW. The analysis was performed on a Waters UPLCTM HSS T3 using a gradient elution system. MS/MS fragmentation behavior was proposed for aiding the structural identification of the components. Under the optimized conditions, a total of 50 peaks were tentatively characterized by comparing the retention time and MS data. It is concluded that a rapid and robust platform based on UPLC-ESI-Q-TOF-MS has been successfully developed for globally identifying multiple-constituents of traditional Chinese medicine prescriptions. This is the first report on systematic analysis of the chemical constituents of LDW. This article is protected by copyright. All rights reserved.
Resumo:
The importance of applying unsaturated soil mechanics to geotechnical engineering design has been well understood. However, the consumption of time and the necessity for a specific laboratory testing apparatus when measuring unsaturated soil properties have limited the application of unsaturated soil mechanics theories in practice. Although methods for predicting unsaturated soil properties have been developed, the verification of these methods for a wide range of soil types is required in order to increase the confidence of practicing engineers in using these methods. In this study, a new permeameter was developed to measure the hydraulic conductivity of unsaturated soils using the steady-state method and directly measured suction (negative pore-water pressure) values. The apparatus is instrumented with two tensiometers for the direct measurement of suction during the tests. The apparatus can be used to obtain the hydraulic conductivity function of sandy soil over a low suction range (0-10 kPa). Firstly, the repeatability of the unsaturated hydraulic conductivity measurement, using the new permeameter, was verified by conducting tests on two identical sandy soil specimens and obtaining similar results. The hydraulic conductivity functions of the two sandy soils were then measured during the drying and wetting processes of the soils. A significant hysteresis was observed when the hydraulic conductivity was plotted against the suction. However, the hysteresis effects were not apparent when the conductivity was plotted against the volumetric water content. Furthermore, the measured unsaturated hydraulic conductivity functions were compared with predictions using three different predictive methods that are widely incorporated into numerical software. The results suggest that these predictive methods are capable of capturing the measured behavior with reasonable agreement.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
Post-transplantation lymphoproliferative disorders (PTLD) arise in the immunosuppressed and are frequently Epstein-Barr virus (EBV) associated. The most common PTLD histological sub-type is diffuse large B-cell lymphoma (EBV+DLBCL-PTLD). Restoration of EBV-specific T-cell immunity can induce EBV+DLBCL-PTLD regression. The most frequent B-cell lymphoma in the immunocompetent is also DLBCL. ‘EBV-positive DLBCL of the elderly’ (EBV+DLBCL) is a rare but well-recognized DLBCL entity that occurs in the overtly immunocompetent, that has an adverse outcome relative to EBV-negative DLBCL. Unlike PTLD (which is classified as viral latency III), literature suggests EBV+DLBCL is typically latency II, i.e. expression is limited to the immuno-subdominant EBNA1, LMP1 and LMP2 EBV-proteins. If correct, this would be a major impediment for T-cell immunotherapeutic strategies. Unexpectedly we observed EBV+DLBCL-PTLD and EBV+DLBCL both shared features consistent with type III EBV-latency, including expression of the immuno-dominant EBNA3A protein. Extensive analysis showed frequent polymorphisms in EBNA1 and LMP1 functionally defined CD8+ T-cell epitope encoding regions, whereas EBNA3A polymorphisms were very rare making this an attractive immunotherapy target. As with EBV+DLBCL-PTLD, the antigen presenting machinery within lymphomatous nodes was intact. EBV+DLBCL express EBNA3A suggesting it is amenable to immunotherapeutic strategies.