981 resultados para Special Function Prerogative


Relevância:

20.00% 20.00%

Publicador:

Resumo:

RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the attacker can find collision and multi-collision messages with complexity only 6 compress function operations and negligible memory with time complexity 2 13. In addition, we show the hashing algorithm can be distinguishable from a truly random sequence with probability close to one.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ninety-seven percent of children who have special health care needs are cared for by their mothers. These mothers cite that their informal care work can be intrinsically rewarding, however, the role is not without substantial difficulties and consequences. We investigated differences in the health and well-being of mothers whose young children do and do not have special health care needs. Quantitative data are drawn from Growing Up in Australia: The Longitudinal Study of Australian Children. This study employs a matched-case control methodology to compare the experiences of a group of 292 mothers whose children are identified as having long term special health care needs to those mothers whose children are typically developing at two time points; Wave 1 (2004) and Wave 3 (2008). The findings support previous research that mothers of children with special health care needs have poorer general health and mental health than mothers whose children do not have special needs. Mothers of children with special health care needs also perceived life as more difficult. Longitudinally, this study also shows that maternal well-being remains relatively stable during the years when children are transitioning to formal schooling. Implications for policy makers, practitioners and early childhood professionals are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue of the International Journal of Technology Policy and Law considers recent developments in the reconfiguration of communication regulation to account for the impact of media convergence. It is readily apparent that media worldwide are going through a series of transformations, associated with the rise of the internet, user-created content and social media. The papers in the collection draw upon legal and policy developments in Australia, the European union and South Korea, and consider such issues as public participation in media policy and regulation, civic media governance for online platforms, the future copyright laws, the roles and responsibilities of internet intermediaries, and regulatory frameworks for internet protocol television (IPTV).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More children are now being diagnosed with chromosome abnormalities. Some chromosome disorder syndromes are relatively well known; while others are so rare that there is only limited evidence about their likely impact on learning and development. For educators, a basic level of knowledge about chromosome abnormalities is important for understanding the literature and communicating with families and professionals. This paper describes chromosomes, and the numerical and structural anomalies that can occur, usually spontaneously during early cell division. Distinctive features of various chromosome syndromes are summarised before a discussion of the rare chromosome disorders that are labelled, not with a syndrome name, but simply by a description of the chromosome number, size and shape. Because of the potential within-group variability that characterises syndromes, and the scarcity of literature about the rare chromosome disorders, expectations for learning and development of individual students need to be based on the range of possible outcomes that may be achievable.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key derivation function (KDF) is a function that transforms secret non-uniformly random source material together with some public strings into one or more cryptographic keys. These cryptographic keys are used with a cryptographic algorithm for protecting electronic data during both transmission over insecure channels and storage. In this thesis, we propose a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the under-lying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream nalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explored how the social context influences the stress-buffering effects of social support on employee adjustment. It was anticipated that the positive relationship between support from colleagues and employee adjustment would be more marked for those strongly identifying with their work team. Furthermore, as part of a three-way interactive effect, it was predicted that high identification would increase the efficacy of coworker support as a buffer of two role stressors (role overload and role ambiguity). One hundred and 55 employees recruited from first-year psychology courses enrolled at two Australian universities were surveyed. Hierarchical multiple regression analyses revealed that the negative main effect of role ambiguity on job satisfaction was significant for those employees with low levels of team identification, whereas high team identifiers were buffered from the deleterious effect of role ambiguity on job satisfaction. There also was a significant interaction between coworker support and team identification. The positive effect of coworker support on job satisfaction was significant for high team identifiers, whereas coworker support was not a source of satisfaction for those employees with low levels of team identification. A three-way interaction emerged among the focal variables in the prediction of psychological well-being, suggesting that the combined benefits of coworker support and team identification under conditions of high demand may be limited and are more likely to be observed when demands are low.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inflammation of the spinal cord after traumatic spinal cord injury leads to destruction of healthy tissue. This “secondary degeneration” is more damaging than the initial physical damage and is the major contributor to permanent loss of functions. In our previous study we showed that combined delivery of two growth factors, vascular endothelial growth factor (VEGF) and platelet-derived growth factor (PDGF), significantly reduced secondary degeneration after hemi-section injury of the spinal cord in the rat. Growth factor treatment reduced the size of the lesion cavity at 30d compared to control animals and further reduced the cavity at 90d in treated animals while in control animals the lesion cavity continued to increase in size. Growth factor treatment also reduced astrogliosis and reduced macroglia/macrophage activation around the injury site. Treatment with individual growth factors alone had similar effects to control treatments. The present study investigated whether growth factor treatment would improve locomotor behaviour after spinal contusion injury, a more relevant preclinical model of spinal cord injury. The growth factors were delivered for the first 7d to the injury site via osmotic minipump. Locomotor behaviour was monitored at 1-28d after injury using the BBB score and at 30d using automated gait analysis. Treated animals had BBB scores of 18; Control animals scored 10. Treated animals had significantly reduced lesion cavities and reduced macroglia/macrophage activation around the injury site. We conclude that growth factor treatment preserved spinal cord tissues after contusion injury, thereby allowing functional recovery. This treatment has the potential to significantly reduce the severity of human spinal cord injuries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In his sweeping survey of the Australian study of international relations, Martin Indyk1 claimed that ‘a common set of assumptions tends to underpin the work of almost all Australian scholars in the discipline’. If that assertion could have been plausibly extended to the whole region one generation ago, it certainly cannot now. The International Relations scholarship emanating from the Oceanic region regales in a diversity of theoretical, methodological and ethical assumptions. This diversity certainly emerged before the first Oceanic Conference on International Studies (OCIS) was convened in Canberra in 2004, however, subsequent conferences in Melbourne (2006) and Brisbane (2008) have galvanised and enriched that diversity. The state of the discipline in the region is as strong and healthy now as it has ever been, as is its integration into the global discipline, something we believe is reflected in the contributions collected in this Special Issue of Global Change, Peace and Security....

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a method, based on polychotomous discrete choice methods, to impute a continuous measure of income when only a bracketed measure of income is available and for only a subset of the obsevations. The method is shown to perform well with CP5 data. © 1991.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we examine the combined azimuthal and axial shear of a compressible isotropic elastic circular cylindrical tube of finite extent, otherwise referred to as helical shear (which is an isochoric deformation). The equilibrium equations are formulated in terms of the principal stretches, and explicit necessary and sufficient conditions on the strain-energy function for the material to support this deformation are obtained and compared with those obtained previously for this problem. Several classes of strain-energy functions are derived and in some general cases complete solutions of the equilibrium equations are obtained. Existing results are recovered as special cases and some new results for the strain-energy functions derived are determined and discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we examine the combined extension and torsion of a compressible isotropic elastic cylinder of finite extent. The equilibrium equations are formulated in terms of the principal stretches and then applied to the special case of pure torsion superimposed on a uniform extension (an isochoric deformation). Explicit necessary and sufficient conditions on the strain-energy function for the material to support this deformation with vanishing traction on the lateral surfaces of the cylinder are obtained. Some strain-energy functions satisfying these conditions are considered, existing results are recovered as special cases and new results are obtained. We also point out how the strain-energy functions generated from the considered isochoric deformation considered (of a compressible material) can be used to generate energy functions and corresponding solutions for the incompressible theory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained examples of near-collisions for the compression function, but in practice the attack could not be extended to the full function due to large memory requirements and computation time. In this paper we improve the attack and show that it is possible to find near-collisions in practice for any given value of IV. In particular, this means that the full hash function with the prespecified IV is vulnerable in practice, not just in theory. We exhibit an example near-collision for the complete hash function.