964 resultados para Socialer Turnverein (Indianapolis, Ind.)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Exposure to cold air, whole body cryotherapy (WBC), is a novel treatment employed by athletes. In WBC individuals dressed in minimal clothing are exposed to a temperature below -100°C for 2-4 min. The use of WBC has been advocated as a treatment for various knee injuries. PURPOSE: To compare the effects of two modalities of cryotherapy, -110°C WBC and 8°C cold water immersion (CWI) on knee skin temperature (Tsk). METHODS: With ethical approval and written informed consent 10 healthy active male participants (26.5±4.9 yr, 183.5±6.0 cm, 90.7±19.9 kg, 26.8±5.0 kg/m2, 23.0±9.3% body fat (measured by DXA), 7.6 ± 2.0 mm patellar skin fold; mean±SD) were exposed to 4 min of CWI and WBC. The treatment order was randomised in a controlled crossover design, with a minimum of 7 days between treatments. During WBC participants stood in a chamber (-60±3°C) for 20 s before entering the main chamber (-110°C±3°C) where they remained for 3 min and 40 s. For CWI participants were seated in a tank filled with cold water (8±0.3°C) and immersed to the level of the sternum for 4 min. Right knee Tsk was assessed via non-contact, infrared thermal imaging. A quadrilateral region of interest was created using inert markers placed 5 cm above and below the most superior and inferior aspect of the patella. Tsk within this quadrilateral was recorded pre, immediately post and every 10 min thereafter for 60 min. Tsk changes were examined using a two-way (treatment x time) repeated measures analyses of variance. In addition, a paired sample t-test was used to compare baseline Tsk before both treatments. RESULTS: Knee Tsk was similar before treatment (WBC: 29.9±0.7°C, CWI: 29.6±0.9°C, p>0.05). There was a significant main effect for treatment (p<0.05) and time (p<0.001). Compared to baseline, Tsk was significantly reduced (p<0.05) immediately post and at 10, 20, 30, 40, 50 and 60 min after both cooling modalities. Knee Tsk was lower (p<0.05) immediately after WBC (19.0±0.9°C) compared to CWI (20.5±0.6°C). However, from 10 to 60 min post, knee Tsk was lower (p<0.05) following the CWI treatment. CONCLUSION: WBC elicited a greater decrease in knee Tsk compared to CWI immediately after treatment. However, both modalities display different recovery patterns and Tsk after CWI was significantly lower than WBC at 10, 20, 30, 40, 50 and 60 min after treatment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Incorporating a learner’s level of cognitive processing into Learning Analytics presents opportunities for obtaining rich data on the learning process. We propose a framework called COPA that provides a basis for mapping levels of cognitive operation into a learning analytics system. We utilise Bloom’s taxonomy, a theoretically respected conceptualisation of cognitive processing, and apply it in a flexible structure that can be implemented incrementally and with varying degree of complexity within an educational organisation. We outline how the framework is applied, and its key benefits and limitations. Finally, we apply COPA to a University undergraduate unit, and demonstrate its utility in identifying key missing elements in the structure of the course.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized by IEEE, but until recently, its security analysis relied only on heuristic arguments. Recently, Stehlé and Steinfeld showed that a slight variant (that we call pNE) could be proven to be secure under chosen-plaintext attack (IND-CPA), assuming the hardness of worst-case problems in ideal lattices. We present a variant of pNE called NTRUCCA, that is IND-CCA2 secure in the standard model assuming the hardness of worst-case problems in ideal lattices, and only incurs a constant factor overhead in ciphertext and key length over the pNE scheme. To our knowledge, our result gives the first IND-CCA2 secure variant of NTRUEncrypt in the standard model, based on standard cryptographic assumptions. As an intermediate step, we present a construction for an All-But-One (ABO) lossy trapdoor function from pNE, which may be of independent interest. Our scheme uses the lossy trapdoor function framework of Peikert and Waters, which we generalize to the case of (k − 1)-of-k-correlated input distributions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose The aim of this study was to assess the predictive validity of three accelerometer prediction equations (Freedson et aL, 1997; Trost et aL, 1998; Puyau et al., 2002) for energy expenditure (EE) during overland walking and running in children and adolescents. Methods 45 healthy children and adolescents aged 10-18 completed the following protocol, each task 5-mins in duration, with a 5-min rest period in between; walking normally; walking briskly; running easily and running fast. During each task participants wore MTI (WAM 7164) Actigraphs on the left and right hips. VO2 was monitored breath by breath using the Cosmed K4b2 portable indirect calorimetry system. For each prediction equation, difference scores were calculated as EE measured minus EE predicted. The percentage of 1-min epochs correctly categorized as light (<3 METs), moderate (3-5.9 METs), and vigorous (≥6 METS) was also calculated. Results The Freedson and Trost equations consistently overestimated MET level. The level of overestimation was statistically significant across all tasks for the Freedson equation, and was significant for only the walking tasks for the Trost equation. The Puyau equation consistently underestimated AEE with the exception of the walking normally task. In terms of categorisation, the Freedson equation (72.8% agreement) demonstrated better agreement than the Puyau (60.6%). Conclusions These data suggest that the three accelerometer prediction equations do not accurately predict EE on a minute-by-minute basis in children and adolescents during overland walking and running. However, the cut points generated by these equations maybe useful for classifying activity as either, light, moderate, or vigorous.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Human half-lives of PentaBDE congeners have been estimated from the decline in serum concentrations measured over a 6-12 month period for a population of exchange students moving from North America to Australia. Australian serum PBDE concentrations are typically between 5 -10 times lower than in North America and we can therefore hypothesize that if the biological half-life is sufficiently short we would observe a decline in serum concentration with length of residence in Australia. Thirty students were recruited over a period of 3 years from whom serum were archived every 2 months during their stay in Australia. Australian residents (n=22) were also sampled longitudinally to estimate general population background levels. All serum samples were analyzed by gas chromatography high resolution mass spectrometry. Key findings confirmed that BDE-47 concentrations in the Australians (median 2.3; inding was that BDE-47 concentrations in the North Americans declined as a result of living in Australia for approximately 6 months (average 22% decrease compared to 4% for the Australians). Estimated BDE-47 half-life ranged from 0.5 – 2.3 years. The presentation will discuss full results and is the first study to provide in vivo estimates of half-life data of PentaBDE congeners.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background The impact of socio-environmental factors on suicide has been examined in many studies. Few of them, however, have explored these associations from a spatial perspective, especially in assessing the association between meteorological factors and suicide. This study examined the association of meteorological and socio-demographic factors with suicide across small areas over different time periods. Methods Suicide, population and socio-demographic data (e.g., population of Aboriginal and Torres Strait Islanders (ATSI), and unemployment rate (UNE) at the Local Government Area (LGA) level were obtained from the Australian Bureau of Statistics for the period of 1986 to 2005. Information on meteorological factors (rainfall, temperature and humidity) was supplied by Australian Bureau of Meteorology. A Bayesian Conditional Autoregressive (CAR) Model was applied to explore the association of socio-demographic and meteorological factors with suicide across LGAs. Results In Model I (socio-demographic factors), proportion of ATSI and UNE were positively associated with suicide from 1996 to 2000 (Relative Risk (RR)ATSI = 1.0107, 95% Credible Interval (CI): 1.0062-1.0151; RRUNE = 1.0187, 95% CI: 1.0060-1.0315), and from 2001 to 2005 (RRATSI = 1.0126, 95% CI: 1.0076-1.0176; RRUNE = 1.0198, 95% CI: 1.0041-1.0354). Socio-Economic Index for Area (SEIFA) and IND, however, had negative associations with suicide between 1986 and 1990 (RRSEIFA = 0.9983, 95% CI: 0.9971-0.9995; RRATSI = 0.9914, 95% CI: 0.9848-0.9980). Model II (meteorological factors): a 1°C higher yearly mean temperature across LGAs increased the suicide rate by an average by 2.27% (95% CI: 0.73%, 3.82%) in 1996–2000, and 3.24% (95% CI: 1.26%, 5.21%) in 2001–2005. The associations between socio-demographic factors and suicide in Model III (socio-demographic and meteorological factors) were similar to those in Model I; but, there is no substantive association between climate and suicide in Model III. Conclusions Proportion of Aboriginal and Torres Strait Islanders, unemployment and temperature appeared to be statistically associated with of suicide incidence across LGAs among all selected variables, especially in recent years. The results indicated that socio-demographic factors played more important roles than meteorological factors in the spatial pattern of suicide incidence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Barry recently attributed the non-significant relationship between the cultural dimensions of Individualism (IND) and Masculinity (MASC) to a suppression effect of regional differences. Pairing countries on regional proximity, he showed that a strong correlation between these cultural dimensions emerged. However, we point to significant issues with this analysis, including how countries were paired, ordered, and included/excluded, as well as in the cultural meaningfulness of regional proximity. Re-analysis of the data after addressing these issues shows that IND and MASC were not significantly related at a cultural level after controlling for regional proximity, nor after controlling for two other prominent geographic factors: latitude and climate demands. The weight of evidence suggests that IND and MASC are not correlated at a cultural level.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Imagined Landscapes teams geocritical analysis with digital visualization techniques to map and interrogate films, novels, and plays in which space and place figure prominently. Drawing upon A Cultural Atlas of Australia, a database-driven interactive digital map that can be used to identify patterns of representation in Australia’s cultural landscape, the book presents an integrated perspective on the translation of space across narrative forms and pioneers new ways of seeing and understanding landscape. It offers fresh insights on cultural topography and spatial history by examining the technical and conceptual challenges of georeferencing fictional and fictionalized places in narratives. Among the items discussed are Wake in Fright, a novel by Kenneth Cook, adapted iconically to the screen and recently onto the stage; the Australian North as a mythic space; spatial and temporal narrative shifts in retellings of the story of Alexander Pearce, a convict who gained notoriety for resorting to cannibalism after escaping from a remote Tasmanian penal colony; travel narratives and road movies set in Western Australia; and the challenges and spatial politics of mapping spaces for which there are no coordinates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The leader protease (L-pro) and capsid-coding sequences (P1) constitute approximately 3 kb of the foot-and-mouth disease virus (FMDV). We studied the phylogenetic relationship of 46 FMDV serotype A isolates of Indian origin collected during the period 1968-2005 and also eight vaccine strains using the neighbour-joining tree and Bayesian tree methods. The viruses were categorized under three major groups - Asian, Euro-South American and European. The Indian isolates formed a distinct genetic group among the Asian isolates. The Indian isolates were further classified into different genetic subgroups (<5% divergence). Post-1995 isolates were divided into two subgroups while a few isolates which originated in the year 2005 from Andhra Pradesh formed a separate group. These isolates were closely related to the isolates of the 1970s. The FMDV isolates seem to undergo reverse mutation or onvergent evolution wherein sequences identical to the ancestors are present in the isolates in circulation. The eight vaccine strains included in the study were not related to each other and belonged to different genetic groups. Recombination was detected in the L-pro region in one isolate (A IND 20/82) and in the VP1 coding 1D region in another isolate (A RAJ 21/96). Positive selection was identified at aa positions 23 in the L-pro (P<0.05; 0.046*) and at aa 171 in the capsid protein VP1 (P<0.01; 0.003**).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Indo-Pacific mangrove swamps and seagrass beds are commonly located in close proximity to each other, often creating complex ecosystems linked by biological and physical processes. Although they are thought to provide important nursery habitats for fish, only limited information exists about their usage by fish outside of estuaries. The present study investigated fish assemblages in non-estuarine intertidal habitats where mangroves and seagrass overlap (the mangrove-seagrass continuum). Three habitats (mangrove, mangrove edge, seagrass) were sampled at 4 sites of the Wakatobi Marine National Park, Indonesia, using underwater visual census. Ninety-one species of fish were observed at a mean density of 130.1 +/- 37.2 ind. 1000 m(-2). Predatory fish (fish that feed on invertebrates and/or fish) were the most dominant feeding groups in the mangroves, whilst omnivores dominated on the mangrove edge and in the seagrass. Although the habitats along the mangrove-seagrass continuum were observed to be important for many fish, only 22 of the 942 coral reef species known within the area utilised mangroves as nursery habitat and only 15 utilised seagrass. Despite finding evidence that nursery grounds in mangroves and seagrass may not directly support high coral reef fish diversity, many of the coral reef nursery species found in this study are likely to be key herbivores or apex predators as adult fish on local coral reefs, and thus highly important to local fisheries. Although mangroves are not permanently inundated by the tide, this study highlights their importance as fish habitats, which at high tide support a greater abundance of fish than seagrass beds. In the light of the high rate of destruction of these habitats, their role in supporting fish assemblages requires consideration in marine resource management programs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is shown that the a;P?lication of the Poincare-Bertrand fcm~ulaw hen made in a suitable manner produces the s~lutiano f certain singular integral equations very quickly, thc method of arriving at which, otherwise, is too complicaled. Two singular integral equations are considered. One of these quaiions is with a Cauchy-tyge kcrnel arid the other is an equalion which appears in the a a w guide theory and the theory of dishcations. Adifferent approach i? alw made here to solve the singular integralquation> of the waveguide theor? ind this i ~ v o l v eth~e use of the inversion formula of the Cauchy-type singular integral equahn and dudion to a system of TIilberl problems for two unknowns which can be dwupled wry easily to obi& tbe closed form solutim of the irilegral equatlou at band. The methods of the prescnt paper avoid all the complicaled approaches of solving the singular integral equaticn of the waveguide theory knowr todate.