907 resultados para morphological convergence


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 'Queensland Model' grew out of three convergent agendas: educational renewal, urban redevelopment, and the Queensland state government's 'Smart State' strategy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An initialisation process is a key component in modern stream cipher design. A well-designed initialisation process should ensure that each key-IV pair generates a different key stream. In this paper, we analyse two ciphers, A5/1 and Mixer, for which this does not happen due to state convergence. We show how the state convergence problem occurs and estimate the effective key-space in each case.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Estimates of the half-life to convergence of prices across a panel of cities are subject to bias from three potential sources: inappropriate cross-sectional aggregation of heterogeneous coefficients, presence of lagged dependent variables in a model with individual fixed effects, and time aggregation of commodity prices. This paper finds no evidence of heterogeneity bias in annual CPI data for 17 U.S. cities from 1918 to 2006, but correcting for the “Nickell bias” and time aggregation bias produces a half-life of 7.5 years, shorter than estimates from previous studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Follicle classification is an important aid to the understanding of follicular development and atresia. Some bovine primordial follicles have the classical primordial shape, but ellipsoidal shaped follicles with some cuboidal granulosa cells at the poles are far more common. Preantral follicles have one of two basal lamina phenotypes, either a single aligned layer or one with additional layers. In antral follicles <5 mm diameter, half of the healthy follicles have columnar shaped basal granulosa cells and additional layers of basal lamina, which appear as loops in cross section (‘loopy’). The remainder have aligned single-layered follicular basal laminas with rounded basal cells, and contain better quality oocytes than the loopy/columnar follicles. In sizes >5 mm, only aligned/rounded phenotypes are present. Dominant and subordinate follicles can be identified by ultrasound and/or histological examination of pairs of ovaries. Atretic follicles <5 mm are either basal atretic or antral atretic, named on the basis of the location in the membrana granulosa where cells die first. Basal atretic follicles have considerable biological differences to antral atretic follicles. In follicles >5 mm, only antral atresia is observed. The concentrations of follicular fluid steroid hormones can be used to classify atresia and distinguish some of the different types of atresia; however, this method is unlikely to identify follicles early in atresia, and hence misclassify them as healthy. Other biochemical and histological methods can be used, but since cell death is a part of normal homoeostatis, deciding when a follicle has entered atresia remains somewhat subjective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 21" century business environment is dominated by unprecedented change across a broad spectrum of social, economic, technological and cultural factors (Nowotny, Scott & Gibbons 2001). Among these, two broad trends -economic globalisation and rising knowledge intensity (Hart 2006)have come to distinguish organisational life. Under the weight of these transformational influences, the developed world, it seems, has arrived at a transformational moment. The far-reaching effects of the global financial crisis and its shadowy twin: the threat of a double dip recession, continue to exert an unsteadying influence on global and corporate finances. Growth in developed economies has slumped, share prices have declined, the market value of corporations has slipped and unemployment rates, in the vast majority of developed economies, have risen. Gross domestic product (GDP) growth has retreated from the strong growth experienced in the late 1990s to negative growth in 2009 and a sluggish and unsteady recovery in 2010. In response, the reach of Government in terms of its participation in markets has been extended, bringing with it the need to transition to new governance and regulatory arrangements. Ongoing concerns regarding the pace and sustainability of the recovery remains a front-of-mind concern with bailouts, buybacks, borrowings and BP dominating news services: 'We are witnessing the reweaving of the social, political and economic fabric that binds our planet, with long-term consequences that are as or more profound than those of the industrial era' (Tapscott & Williams 2006, p. 59).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Various time-memory tradeoffs attacks for stream ciphers have been proposed over the years. However, the claimed success of these attacks assumes the initialisation process of the stream cipher is one-to-one. Some stream cipher proposals do not have a one-to-one initialisation process. In this paper, we examine the impact of this on the success of time-memory-data tradeoff attacks. Under the circumstances, some attacks are more successful than previously claimed while others are less. The conditions for both cases are established.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As an international norm, the Responsibility to Protect (R2P) has gained substantial influence and institutional presence—and created no small controversy—in the ten years since its first conceptualisation. Conversely, the Protection of Civilians in Armed Conflict (PoC) has a longer pedigree and enjoys a less contested reputation. Yet UN Security Council action in Libya in 2011 has thrown into sharp relief the relationship between the two. UN Security Council Resolutions 1970 and 1973 follow exactly the process envisaged by R2P in response to imminent atrocity crimes, yet the operative paragraphs of the resolutions themselves invoke only PoC. This article argues that, while the agendas of PoC and R2P converge with respect to Security Council action in cases like Libya, outside this narrow context it is important to keep the two norms distinct. Peacekeepers, humanitarian actors, international lawyers, individual states and regional organisations are required to act differently with respect to the separate agendas and contexts covered by R2P and PoC. While overlap between the two does occur in highly visible cases like Libya, neither R2P nor PoC collapses normatively, institutionally or operationally into the other.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whereas many good examples can be found of the study of urban morphology informing the design of new residential areas in Europe, it is much more difficult to find examples relating to other land uses and outside of Europe. This paper addresses a particular issue, the control and coordination of large and complex development schemes within cities, and, in doing so, considers commercial and mixed-use schemes outside of Europe. It is argued that urban morphology has much to offer for both the design of such development and its implementation over time. Firstly, lessons are drawn from the work of Krier and Rossi in Berlin, the form-based guidance developed in Chelmsford, UK, and the redesign and coordination of the Melrose Arch project in Johannesburg, SA. A recent development at Boggo Road in Brisbane, Australia, is then subjected to a more detailed examination. It is argued that the scheme has been unsatisfactory in terms of both design and implementation. An alternative framework based on historical morphological studies is proposed that would overcome these deficiencies. It is proposed that this points the way to a general approach that could be incorporated within the planning process internationally.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article is a response to Kim Dalton's 2011 Henry Mayer Lecture. It focuses on Dalton's discussion of Australian content in the context of the government's ongoing Convergence Review.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural components similar to the well-known Grain cipher and the LILI family of keystream generators. Mixer uses a 128-bit key and 64-bit IV to initialise a 217-bit internal state. The analysis is focused on the initialisation function of Mixer and shows that there exist multiple key-IV pairs which, after initialisation, produce the same initial state, and consequently will generate the same keystream. Furthermore, if the number of iterations of the state update function performed during initialisation is increased, then the number of distinct initial states that can be obtained decreases. It is also shown that there exist some distinct initial states which produce the same keystream, resulting in a further reduction of the effective key space

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several track-before-detection approaches for image based aircraft detection have recently been examined in an important automated aircraft collision detection application. A particularly popular approach is a two stage processing paradigm which involves: a morphological spatial filter stage (which aims to emphasize the visual characteristics of targets) followed by a temporal or track filter stage (which aims to emphasize the temporal characteristics of targets). In this paper, we proposed new spot detection techniques for this two stage processing paradigm that fuse together raw and morphological images or fuse together various different morphological images (we call these approaches morphological reinforcement). On the basis of flight test data, the proposed morphological reinforcement operations are shown to offer superior signal to-noise characteristics when compared to standard spatial filter options (such as the close-minus-open and adaptive contour morphological operations). However, system operation characterised curves, which examine detection verses false alarm characteristics after both processing stages, illustrate that system performance is very data dependent.