951 resultados para Arbitrary detention


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Magnetic resonance is a well-established tool for structural characterisation of porous media. Features of pore-space morphology can be inferred from NMR diffusion-diffraction plots or the time-dependence of the apparent diffusion coefficient. Diffusion NMR signal attenuation can be computed from the restricted diffusion propagator, which describes the distribution of diffusing particles for a given starting position and diffusion time. We present two techniques for efficient evaluation of restricted diffusion propagators for use in NMR porous-media characterisation. The first is the Lattice Path Count (LPC). Its physical essence is that the restricted diffusion propagator connecting points A and B in time t is proportional to the number of distinct length-t paths from A to B. By using a discrete lattice, the number of such paths can be counted exactly. The second technique is the Markov transition matrix (MTM). The matrix represents the probabilities of jumps between every pair of lattice nodes within a single timestep. The propagator for an arbitrary diffusion time can be calculated as the appropriate matrix power. For periodic geometries, the transition matrix needs to be defined only for a single unit cell. This makes MTM ideally suited for periodic systems. Both LPC and MTM are closely related to existing computational techniques: LPC, to combinatorial techniques; and MTM, to the Fokker-Planck master equation. The relationship between LPC, MTM and other computational techniques is briefly discussed in the paper. Both LPC and MTM perform favourably compared to Monte Carlo sampling, yielding highly accurate and almost noiseless restricted diffusion propagators. Initial tests indicate that their computational performance is comparable to that of finite element methods. Both LPC and MTM can be applied to complicated pore-space geometries with no analytic solution. We discuss the new methods in the context of diffusion propagator calculation in porous materials and model biological tissues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, there has been a rise in the number of people seeking asylum in Australia, resulting in over-crowded detention centres in various parts of the country. Appropriate management and assistance of asylum seekers has been an issue of major socio-political concern. In mid-2012, the Australian ruling government introduced a ‘first of its kind’ community placement initiative, which involved relocating low-risk asylum seekers from detention centres to homes of those Australian families who volunteered for this program. The present study investigated host families’ motivations for volunteering into this scheme and their resulting experiences. Twenty-four men and women from all over Australia were interviewed in person or over the telephone. Consistent with theoretical frameworks of altruism, acculturation, and intergroup contact, thematic analysis indicated participants’ interest in diversity/humanitarian issues were major factors that motivated them to host asylum seekers. Language and cultural barriers were reported as challenges, but generally, participants found the experience positive and rewarding. The initiative was regarded as an excellent avenue of learning about new cultures. The hosts played a strong role in promoting the English language proficiency and intercultural settlement of the asylum seekers. The scheme was considered as one way of diffusing fear/biases against asylum seekers prevalent amongst the Australian community at-large. Participants also provided suggestions to improve the scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2003 Robert Fardon was the first prisoner to be detained under the Dangerous Prisoners (Sexual Offenders) Act 2003 (Qld), the first of the new generation preventive detention laws enacted in Australia and directed at keeping sex offenders in prison or under supervision beyond the expiry of their sentences where a court decides, on the basis of psychiatric assessments, that unconditional release would create an unacceptable risk to the community. A careful examination of Fardon’s case shows the extent to which the administration of the regime was from the outset governed by politics and political calculation rather than the logic of risk management and community protection. In 2003 Robert Fardon was the first person detained under the Dangerous Prisoners (Sexual Offenders) Act 2003 (Qld) (hereafter DPSOA), a newly enacted Queensland law aimed at the preventive detention of sex offenders. It was the first of a new generation of such laws introduced in Australia, now also in force in NSW, Western Australia and Victoria. The laws have been widely criticized by lawyers, academics and others (Keyzer and McSherry 2009; Edgely 2007). In this article I want to focus on the details of how the Queensland law was administered in Fardon’s case, he being perhaps the most well-known prisoner detained under such laws and certainly the longest held. It will show, I hope, that seemingly abstract rule of law principles invoked by other critics are not simply abstract: they afford a crucial practical safeguard against the corruption of criminal justice in which the ends both of community protection and of justice give way to opportunistic exploitation of ‘the mythic resonance of crime and punishment for electoral purposes’ (Scheingold 1998: 888).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The notion of being sure that you have completely eradicated an invasive species is fanciful because of imperfect detection and persistent seed banks. Eradication is commonly declared either on an ad hoc basis, on notions of seed bank longevity, or on setting arbitrary thresholds of 1% or 5% confidence that the species is not present. Rather than declaring eradication at some arbitrary level of confidence, we take an economic approach in which we stop looking when the expected costs outweigh the expected benefits. We develop theory that determines the number of years of absent surveys required to minimize the net expected cost. Given detection of a species is imperfect, the optimal stopping time is a trade-off between the cost of continued surveying and the cost of escape and damage if eradication is declared too soon. A simple rule of thumb compares well to the exact optimal solution using stochastic dynamic programming. Application of the approach to the eradication programme of Helenium amarum reveals that the actual stopping time was a precautionary one given the ranges for each parameter. © 2006 Blackwell Publishing Ltd/CNRS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Indigenous leader Pat Dodson – who revealed he has met Prime Minister Tony Abbott only once, and then in passing – said last week that removal of frontline services from Indigenous organisations working towards Closing the Gap in Indigenous health “would seem counter intuitive to any fair-minded Australian”. But that, he said in this Age OpEd, has been the result of the Federal Government’s much-awaited Indigenous Advancement Strategy...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the finite element modelling of structural frames, external loads such as wind loads, dead loads and imposed loads usually act along the elements rather than at the nodes only. Conventionally, when an element is subjected to these general transverse element loads, they are usually converted to nodal forces acting at the ends of the elements by either lumping or consistent load approaches. In addition, it is especially important for an element subjected to the first- and second-order elastic behaviour, to which the steel structure is critically prone to; in particular the thin-walled steel structures, when the stocky element section may be generally critical to the inelastic behaviour. In this sense, the accurate first- and second-order elastic displacement solutions of element load effect along an element is vitally crucial, but cannot be simulated using neither numerical nodal nor consistent load methods alone, as long as no equilibrium condition is enforced in the finite element formulation, which can inevitably impair the structural safety of the steel structure particularly. It can be therefore regarded as a unique element load method to account for the element load nonlinearly. If accurate displacement solution is targeted for simulating the first- and second-order elastic behaviour on an element on the basis of sophisticated non-linear element stiffness formulation, the numerous prescribed stiffness matrices must indispensably be used for the plethora of specific transverse element loading patterns encountered. In order to circumvent this shortcoming, the present paper proposes a numerical technique to include the transverse element loading in the non-linear stiffness formulation without numerous prescribed stiffness matrices, and which is able to predict structural responses involving the effect of first-order element loads as well as the second-order coupling effect between the transverse load and axial force in the element. This paper shows that the principle of superposition can be applied to derive the generalized stiffness formulation for element load effect, so that the form of the stiffness matrix remains unchanged with respect to the specific loading patterns, but with only the magnitude of the loading (element load coefficients) being needed to be adjusted in the stiffness formulation, and subsequently the non-linear effect on element loadings can be commensurate by updating the magnitude of element load coefficients through the non-linear solution procedures. In principle, the element loading distribution is converted into a single loading magnitude at mid-span in order to provide the initial perturbation for triggering the member bowing effect due to its transverse element loads. This approach in turn sacrifices the effect of element loading distribution except at mid-span. Therefore, it can be foreseen that the load-deflection behaviour may not be as accurate as those at mid-span, but its discrepancy is still trivial as proved. This novelty allows for a very useful generalised stiffness formulation for a single higher-order element with arbitrary transverse loading patterns to be formulated. Moreover, another significance of this paper is placed on shifting the nodal response (system analysis) to both nodal and element response (sophisticated element formulation). For the conventional finite element method, such as the cubic element, all accurate solutions can be only found at node. It means no accurate and reliable structural safety can be ensured within an element, and as a result, it hinders the engineering applications. The results of the paper are verified using analytical stability function studies, as well as with numerical results reported by independent researchers on several simple frames.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a feasibility study on structural damage alarming and localization of long-span cable-supported bridges using multi-novelty indices formulated by monitoring-derived modal parameters. The proposed method which requires neither structural model nor damage model is applicable to structures of arbitrary complexity. With the intention to enhance the tolerance to measurement noise/uncertainty and the sensitivity to structural damage, an improved novelty index is formulated in terms of auto-associative neural networks (ANNs) where the output vector is designated to differ from the input vector while the training of the ANNs needs only the measured modal properties of the intact structure under in-service conditions. After validating the enhanced capability of the improved novelty index for structural damage alarming over the commonly configured novelty index, the performance of the improved novelty index for damage occurrence detection of large-scale bridges is examined through numerical simulation studies of the suspension Tsing Ma Bridge (TMB) and the cable-stayed Ting Kau Bridge (TKB) incurred with different types of structural damage. Then the improved novelty index is extended to formulate multi-novelty indices in terms of the measured modal frequencies and incomplete modeshape components for damage region identification. The capability of the formulated multi-novelty indices for damage region identification is also examined through numerical simulations of the TMB and TKB.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Increasing threat of terrorism highlights the importance of enhancing the resilience of underground tunnels to all hazards. This paper develops, applies and compares the Arbitrary Lagrangian Eulerian (ALE) and Smooth Particle Hydrodynamics (SPH) techniques to treat the response of buried tunnels to surface explosions. The results and outcomes of the two techniques were compared, along with results from existing test data. The comparison shows that the ALE technique is a better method for describing the tunnel response for above ground explosion with regards to modeling accuracy and computational efficiency. The ALE technique was then applied to treat the blast response of different types of segmented bored tunnels buried in dry sand. Results indicate that the most used modern ring type segmented tunnels were more flexible for in-plane response, however, they suffered permanent drifts between the rings. Hexagonal segmented tunnels responded with negligible drifts in the longitudinal direction, but the magnitudes of in-plane drifts were large and hence hazardous for the tunnel. Interlocking segmented tunnels suffered from permanent drifts in both the longitudinal and transverse directions. Multi-surface radial joints in both the hexagonal and interlocking segments affected the flexibility of the tunnel in the transverse direction. The findings offer significant new information in the behavior of segmented bored tunnels to guide their future implementation in civil engineering applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A number of international human rights frameworks protect the rights of young people in contact with the criminal justice system in states parties, including Australia. These frameworks inform youth justice policy in Australia’s jurisdictions. While the frameworks protect young people’s right to non-discrimination on the grounds of ‘race’, religion and political opinion, the rights of young people to non-discrimination on the grounds of sexuality and gender diversity are not explicitly protected. This is problematic given that lesbian, gay, bisexual, trans, intersex and queer (LGBTIQ) young people appear over-represented in youth justice systems. This article argues that the exclusion of this group from human rights frameworks has an important flow-on effect: the marginalisation of the right of LGBTIQ young people to non-discrimination in policy and discourse that is informed by international human rights frameworks. After outlining the relevant frameworks, this article examines the evidence about LGBTIQ young people’s interactions with youth justice agencies, particularly police. The evidence indicates that the human rights of LGBTIQ young people are frequently breached in these interactions. We conclude by arguing that it is timely to consider how best to protect the human rights of LBGTIQ young people and keep their rights on the agenda.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an uncertainty quantification study of the performance analysis of the high pressure ratio single stage radial-inflow turbine used in the Sundstrand Power Systems T-100 Multi-purpose Small Power Unit. A deterministic 3D volume-averaged Computational Fluid Dynamics (CFD) solver is coupled with a non-statistical generalized Polynomial Chaos (gPC) representation based on a pseudo-spectral projection method. One of the advantages of this approach is that it does not require any modification of the CFD code for the propagation of random disturbances in the aerodynamic and geometric fields. The stochastic results highlight the importance of the blade thickness and trailing edge tip radius on the total-to-static efficiency of the turbine compared to the angular velocity and trailing edge tip length. From a theoretical point of view, the use of the gPC representation on an arbitrary grid also allows the investigation of the sensitivity of the blade thickness profiles on the turbine efficiency. The gPC approach is also applied to coupled random parameters. The results show that the most influential coupled random variables are trailing edge tip radius coupled with the angular velocity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a visual SLAM method for temporary satellite dropout navigation, here applied on fixed- wing aircraft. It is designed for flight altitudes beyond typical stereo ranges, but within the range of distance measurement sensors. The proposed visual SLAM method consists of a common localization step with monocular camera resectioning, and a mapping step which incorporates radar altimeter data for absolute scale estimation. With that, there will be no scale drift of the map and the estimated flight path. The method does not require simplifications like known landmarks and it is thus suitable for unknown and nearly arbitrary terrain. The method is tested with sensor datasets from a manned Cessna 172 aircraft. With 5% absolute scale error from radar measurements causing approximately 2-6% accumulation error over the flown distance, stable positioning is achieved over several minutes of flight time. The main limitations are flight altitudes above the radar range of 750 m where the monocular method will suffer from scale drift, and, depending on the flight speed, flights below 50 m where image processing gets difficult with a downwards-looking camera due to the high optical flow rates and the low image overlap.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Back in 1995, Peter Drahos wrote a futuristic article called ‘Information feudalism in the information society’. It took the form of an imagined history of the information society in the year 2015. Drahos provided a pessimistic vision of the future, in which the information age was ruled by the private owners of intellectual property. He ended with the bleak, Hobbesian image: "It is unimaginable that the information society of the 21st century could be like this. And yet if abstract objects fall out of the intellectual commons and are enclosed by private owners, private, arbitrary, unchecked global power will become a part of life in the information society. A world in which seed rights, algorithms, DNA, and chemical formulas are owned by a few, a world in which information flows can be coordinated by information-media barons, might indeed be information feudalism (p. 222)." This science fiction assumed that a small number of states would dominate the emerging international regulatory order set up under the World Trade Organization. In Information Feudalism: Who Owns the Knowledge Economy?, Peter Drahos and his collaborator John Braithwaite reprise and expand upon the themes first developed in that article. The authors contend: "Information feudalism is a regime of property rights that is not economicallyefficient, and does not get the balance right between rewarding innovation and diffusing it. Like feudalism, it rewards guilds instead of inventive individual citizens. It makes democratic citizens trespassers on knowledge that should be the common heritage of humankind, their educational birthright. Ironically, information feudalism, by dismantling the publicness of knowledge, will eventually rob the knowledge economy of much of its productivity (p. 219)." Drahos and Braithwaite emphasise that the title Information Feudalism is not intended to be taken at face value by literal-minded readers, and crudely equated with medieval feudalism. Rather, the title serves as a suggestive metaphor. It designates the transfer of knowledge from the intellectual commons to private corporation under the regime of intellectual property.