923 resultados para Side pixel registration
Resumo:
As pre-registration nurse education programmes evolve within the United Kingdom, it is imperative to involve patient/client groups within the research process, as the outcome may invoke a change in the care delivery of the registered nurse (RN). This paper focuses upon children and how children might hypothetically contribute to informing a generic nursing programme in their capacity as a rights holder and expert in their own lives. Even though their contribution and value has been debated around their capacity as research advisor, research participant and co researcher, this paper explores how the child's view of their experience of hospital and of the good nurse could be best captured. Research is a powerful vehicle that can enable their voice to equally inform UK nurse educators and policy makers so that the child's health care needs are effectively met in hospital by RN's who complete a generic programme.
Resumo:
Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks, or more specifically as used here template attacks, have been shown to be extremely efficient at extracting secret keys. Template attacks assume a strong adversarial model, in that an attacker has an identical device with which to profile the power consumption of various operations. This can then be used to efficiently attack the target device. Inherent in this assumption is that the power consumption across the devices under test is somewhat similar. This central tenet of the attack is largely unexplored in the literature with the research community generally performing the profiling stage on the same device as being attacked. This is beneficial for evaluation or penetration testing as it is essentially the best case scenario for an attacker where the model built during the profiling stage matches exactly that of the target device, however it is not necessarily a reflection on how the attack will work in reality. In this work, a large scale evaluation of this assumption is performed, comparing the key recovery performance across 20 identical smart-cards when performing a profiling attack.
Resumo:
A new homologous series of side-chain liquid crystal polymers, the poly[omega-(4-cyanoazobenzene-4'-oxy)alkyl methacrylate]s, have been prepared in which the length of the flexible alkyl spacer is varied from 3 to 12 methylene units. All the polymers exhibit liquid crystalline behaviour; specifically, crystal E, smectic A and nematic phases are observed. The glass transition temperatures decrease on increasing spacer length before reaching a limiting value at ca. 30 degrees C. The clearing temperatures exhibit an odd-even effect on varying the length and parity of the spacer. This is attributed to the change in the average shape of the side chain as the parity of the spacer is varied. This rationalization also accounts for the observed alternation in the entropy change associated with the clearing transition. A weak relaxation is observed theologically for several members of this polymer series at temperatures above their respective glass transition temperatures. This is attributed either to specific motions of the smectic layers or to 180 degrees reorientational jumps of the long axis of the mesogenic unit about the polymer backbone. (C) 1997 Elsevier Science Ltd. All rights reserved.