991 resultados para Springer briefs
Resumo:
The Longitudinal Study of Australian Children (LSAC) is a major national study examining the lives of Australian children, using a cross-sequential cohort design and data from parents, children, and teachers for 5,107 infants (3–19 months) and 4,983 children (4–5 years). Its data are publicly accessible and are used by researchers from many disciplinary backgrounds. It contains multiple measures of children’s developmental outcomes as well as a broad range of information on the contexts of their lives. This paper reports on the development of summary outcome indices of child development using the LSAC data. The indices were developed to fill the need for indicators suitable for use by diverse data users in order to guide government policy and interventions which support young children’s optimal development. The concepts underpinning the indices and the methods of their development are presented. Two outcome indices (infant and child) were developed, each consisting of three domains—health and physical development, social and emotional functioning, and learning competency. A total of 16 measures are used to make up these three domains in the Outcome Index for the Child Cohort and six measures for the Infant Cohort. These measures are described and evidence supporting the structure of the domains and their underlying latent constructs is provided for both cohorts. The factorial structure of the Outcome Index is adequate for both cohorts, but was stronger for the child than infant cohort. It is concluded that the LSAC Outcome Index is a parsimonious measure representing the major components of development which is suitable for non-specialist data users. A companion paper (Sanson et al. 2010) presents evidence of the validity of the Index.
Resumo:
Scalable video coding of H.264/AVC standard enables adaptive and flexible delivery for multiple devices and various network conditions. Only a few works have addressed the influence of different scalability parameters (frame rate, spatial resolution, and SNR) on the user perceived quality within a limited scope. In this paper, we have conducted an experiment of subjective quality assessment for video sequences encoded with H.264/SVC to gain a better understanding of the correlation between video content and UPQ at all scalable layers and the impact of rate-distortion method and different scalabilities on bitrate and UPQ. Findings from this experiment will contribute to a user-centered design of adaptive delivery of scalable video stream.
Resumo:
A series of mobile phone prototypes called The Swarm have been developed in response to the user needs identified in a three-year empirical study of young people’s use of mobile phones. The prototypes take cues from user led innovation and provide multiple avatars that allow individuals to define and manage their own virtual identity. This paper briefly maps the evolution of the prototypes and then describes how the pre-defined, color coded avatars in the latest version are being given greater context and personalization through the use of digital images. This not only gives ‘serendipity a nudge’ by allowing groups to come together more easily, it provides contextual information that can reduce gratuitous contact.
Resumo:
Road and highway infrastructure provides the backbone for a nation's economic growth. The versatile dispersion of population in Australia, from sparsely settled communities in remote areas to regenerated inner city suburbs with high density living in metropolitans, calls for continuing development and improvement on roads infrastructure under the current federal government policies and state governments' strategic plans. As road infrastructure projects involve large resources and mechanism, achieving sustainability not only in economic scales but also through environmental and social responsibility becomes a crucial issue. Current efforts are often impeded by different interpretation on sustainability agenda by stakeholders involved in these types of projects. As a result, sustainability deliverables at the project level is not often as transparent and measurable, compared to promises in project briefs and designs. This paper reviews the past studies on sustainable infrastructure construction, focusing on roads and highway projects. Through literature study and consultation with the industry, key sustainability indicators specific to road infrastructure projects have been identified. Based on these findings, this paper introduces an on-going research project aimed at identifying and integrating the different perceptions and priority needs of the stakeholders, and issues that impact on the gap between sustainability foci and its actual realization at project end level. The exploration helps generate an integrated decision-making model for sustainable road infrastructure projects. The research will promote to the industry more systematic and integrated approaches to decision-making on the implementation of sustainability strategies to achieve deliverable goals throughout the development and delivery process of road infrastructure projects in Australia.
Resumo:
Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.
Resumo:
Integral attacks are well-known to be effective against byte-based block ciphers. In this document, we outline how to launch integral attacks against bit-based block ciphers. This new type of integral attack traces the propagation of the plaintext structure at bit-level by incorporating bit-pattern based notations. The new notation gives the attacker more details about the properties of a structure of cipher blocks. The main difference from ordinary integral attacks is that we look at the pattern the bits in a specific position in the cipher block has through the structure. The bit-pattern based integral attack is applied to Noekeon, Serpent and present reduced up to 5, 6 and 7 rounds, respectively. This includes the first attacks on Noekeon and present using integral cryptanalysis. All attacks manage to recover the full subkey of the final round.