863 resultados para random regression model
Resumo:
Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.
Resumo:
Motion planning for planetary rovers must consider control uncertainty in order to maintain the safety of the platform during navigation. Modelling such control uncertainty is difficult due to the complex interaction between the platform and its environment. In this paper, we propose a motion planning approach whereby the outcome of control actions is learned from experience and represented statistically using a Gaussian process regression model. This model is used to construct a control policy for navigation to a goal region in a terrain map built using an on-board RGB-D camera. The terrain includes flat ground, small rocks, and non-traversable rocks. We report the results of 200 simulated and 35 experimental trials that validate the approach and demonstrate the value of considering control uncertainty in maintaining platform safety.
Resumo:
Purpose To evaluate the association between retinal nerve fibre layer (RNFL) thickness and diabetic peripheral neuropathy in people with type 2 diabetes, and specifically those at higher risk of foot ulceration. Methods RNFL thicknesses was measured globally and in four quadrants (temporal, superior, nasal and inferior) at 3.45 mm diameter around the optic nerve head using optical coherence tomography (OCT). Severity of neuropathy was assessed using the Neuropathy Disability Score (NDS). Eighty-two participants with type 2 diabetes were stratified according to NDS scores (0-10) as: none, mild, moderate, and severe neuropathy. A control group was additionally included (n=17). Individuals with NDS≥ 6 (moderate and severe neuropathy) have been shown to be at higher risk of foot ulceration. A linear regression model was used to determine the association between RNFL and severity of neuropathy. Age, disease duration and diabetic retinopathy levels were fitted in the models. Independent t-test was employed for comparison between controls and the group without neuropathy, as well as for comparison between groups with higher and lower risk of foot ulceration. Analysis of variance was used to compare across all NDS groups. Results RNFL thickness was significantly associated with NDS in the inferior quadrant (b= -1.46, p=0.03). RNFL thicknesses globally and in superior, temporal and nasal quadrants did not show significant associations with NDS (all p>0.51). These findings were independent of the effect of age, disease duration and retinopathy. RNFL was thinner for the group with NDS ≥ 6 in all quadrants but was significant only inferiorly (p<0.005). RNFL for control participants was not significantly different from the group with diabetes and no neuropathy (superior p=0.07, global and all other quadrants: p>0.23). Mean RNFL thickness was not significantly different between the four NDS groups globally and in all quadrants (p=0.08 for inferior, P>0.14 for all other comparisons). Conclusions Retinal nerve fibre layer thinning is associated with neuropathy in people with type 2 diabetes. This relationship is strongest in the inferior retina and in individuals at higher risk of foot ulceration.
Resumo:
The global financial crisis (GFC) in 2008 rocked local, regional, and state economies throughout the world. Several intermediate outcomes of the GFC have been well documented in the literature including loss of jobs and reduced income. Relatively little research has, however, examined the impacts of the GFC on individual level travel behaviour change. To address this shortcoming, HABITAT panel data were employed to estimate a multinomial logit model to examine mode switching behaviour between 2007 (pre-GFC) and 2009 (post-GFC) of a baby boomers cohort in Brisbane, Australia—a city within a developed country that has been on many metrics the least affected by the GFC. In addition, a Poisson regression model was estimated to model the number of trips made by individuals in 2007, 2008, and 2009. The South East Queensland Travel Survey datasets were used to develop this model. Four linear regression models were estimated to assess the effects of the GFC on time allocated to travel during a day: one for each of the three travel modes including public transport, active transport, less environmentally friendly transport; and an overall travel time model irrespective of mode. The results reveal that individuals were more likely to switch to public transport who lost their job or whose income reduced between 2007 and 2009. Individuals also made significantly fewer trips in 2008 and 2009 compared to 2007. Individuals spent significantly less time using less environmentally friendly transport but more time using public transport in 2009. Baby boomers switched to more environmentally friendly travel modes during the GFC.
Resumo:
The Quantitative Assessment of Solar UV [ultraviolet] Exposure for Vitamin D Synthesis in Australian Adults (AusD) Study aimed to better define the relationship between sun exposure and serum 25-hydroxyvitamin D (25(OH)D) concentration. Cross-sectional data were collected between May 2009 and December 2010 from 1,002 participants aged 18-75 years in 4 Australian sites spanning 24° of latitude. Participants completed the following: 1) questionnaires on sun exposure, dietary vitamin D intake, and vitamin D supplementation; 2) 10 days of personal ultraviolet radiation dosimetry; 3) a sun exposure and physical activity diary; and 4) clinical measurements and blood collection for 25(OH)D determination. Our multiple regression model described 40% of the variance in 25(OH)D concentration; modifiable behavioral factors contributed 52% of the explained variance, and environmental and demographic or constitutional variables contributed 38% and 10%, respectively. The amount of skin exposed was the single strongest contributor to the explained variance (27%), followed by location (20%), season (17%), personal ultraviolet radiation exposure (8%), vitamin D supplementation (7%), body mass index (weight (kg)/height (m)2) (4%), and physical activity (4%). Modifiable behavioral factors strongly influence serum 25(OH)D concentrations in Australian adults. In addition, latitude was a strong determinant of the relative contribution of different behavioral factors.
Resumo:
Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.
Resumo:
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access keys and tokens in a connected world. Although many existing solutions can be employed to protect a long secret using a short password, those solutions typically require certain assumptions on the distribution of the secret and/or the password, and are helpful against only a subset of the possible attackers. After briefly reviewing a variety of approaches, we propose a user-centric comprehensive model to capture the possible threats posed by online and offline attackers, from the outside and the inside, against the security of both the plaintext and the password. We then propose a few very simple protocols, adapted from the Ford-Kaliski server-assisted password generator and the Boldyreva unique blind signature in particular, that provide the best protection against all kinds of threats, for all distributions of secrets. We also quantify the concrete security of our approach in terms of online and offline password guesses made by outsiders and insiders, in the random-oracle model. The main contribution of this paper lies not in the technical novelty of the proposed solution, but in the identification of the problem and its model. Our results have an immediate and practical application for the real world: they show how to implement single-sign-on stateless roaming authentication for the internet, in a ad-hoc user-driven fashion that requires no change to protocols or infrastructure.
Resumo:
A cross-sectional survey of female office workers (n=333) was undertaken to determine the level of neck pain and disability (Neck Disability Index—NDI) and to explore the relationship between individual and workplace risk factors with the NDI score and the presence of pain. Workers reported nil (32%), mild (53%), moderate (14%) and severe (1%) neck pain. There were more risk factors associated with the NDI score than the presence of neck pain. The presence of neck pain was associated with a history of neck trauma (OR: 4.8), using a graduated lens (OR: 4.6), and negative affectivity (OR: 2.7) in the multiple regression model. Factors associated with higher NDI score were using the computer mouse for more than 6 h per day, higher negative affectivity, older age and an uncomfortable workstation. These results suggest that measuring the level of neck pain and disability rather than just the presence of neck pain provides more specific directives for the prevention and management of this disorder.
Resumo:
This study investigated the relative contribution of individual, workplace, psychosocial and physiological features associated with neck pain in female office workers towards developing appropriate intervention programs. Workers without disability (Neck Disability Index (NDI) score≤8, n=33); workers with neck pain and disability (NDI≥9/100, n=52) and 22 controls (women who did not work and without neck pain) participated in this study. Two logistic regression models were constructed to test the association between various measures in (1) workers with and without disability, and (2) workers without disability and controls. Measures included those found to be significantly associated with higher NDI in our previous studies: psychosocial domains; individual factors; task demands; quantitative sensory measures and measures of motor function. In the final model, higher score on negative affectivity scale (OR=4.47), greater activity in the neck flexors during cranio-cervical flexion (OR=1.44), cold hyperalgesia (OR=1.27) and longer duration of symptoms (OR=1.19) remained significantly associated with neck pain in workers. Workers without disability and controls could only be differentiated by greater muscle activity in the cervical flexors and extensors during a typing task. No psychosocial domains remained in either regression model. These results suggest that impairments in the sensory and motor system should be considered in any assessment of the office worker with neck pain and may have stronger influences on the presenting symptoms than workplace and psychosocial features.
Resumo:
Background Accelerometers have become one of the most common methods of measuring physical activity (PA). Thus, validity of accelerometer data reduction approaches remains an important research area. Yet, few studies directly compare data reduction approaches and other PA measures in free-living samples. Objective To compare PA estimates provided by 3 accelerometer data reduction approaches, steps, and 2 self-reported estimates: Crouter's 2-regression model, Crouter's refined 2-regression model, the weighted cut-point method adopted in the National Health and Nutrition Examination Survey (NHANES; 2003-2004 and 2005-2006 cycles), steps, IPAQ, and 7-day PA recall. Methods A worksite sample (N = 87) completed online-surveys and wore ActiGraph GT1M accelerometers and pedometers (SW-200) during waking hours for 7 consecutive days. Daily time spent in sedentary, light, moderate, and vigorous intensity activity and percentage of participants meeting PA recommendations were calculated and compared. Results Crouter's 2-regression (161.8 +/- 52.3 minutes/day) and refined 2-regression (137.6 +/- 40.3 minutes/day) models provided significantly higher estimates of moderate and vigorous PA and proportions of those meeting PA recommendations (91% and 92%, respectively) as compared with the NHANES weighted cut-point method (39.5 +/- 20.2 minutes/day, 18%). Differences between other measures were also significant. Conclusions When comparing 3 accelerometer cut-point methods, steps, and self-report measures, estimates of PA participation vary substantially.
Resumo:
This research quantifies the lag effects and vulnerabilities of temperature effects on cardiovascular disease in Changsha—a subtropical climate zone of China. A Poisson regression model within a distributed lag nonlinear models framework was used to examine the lag effects of cold- and heat-related CVD mortality. The lag effect for heat-related CVD mortality was just 0–3 days. In contrast, we observed a statistically significant association with 10–25 lag days for cold-related CVD mortality. Low temperatures with 0–2 lag days increased the mortality risk for those ≥65 years and females. For all ages, the cumulative effects of cold-related CVD mortality was 6.6% (95% CI: 5.2%–8.2%) for 30 lag days while that of heat-related CVD mortality was 4.9% (95% CI: 2.0%–7.9%) for 3 lag days. We found that in Changsha city, the lag effect of hot temperatures is short while the lag effect of cold temperatures is long. Females and older people were more sensitive to extreme hot and cold temperatures than males and younger people.
Resumo:
We tested direct and indirect measures of benthic metabolism as indicators of stream ecosystem health across a known agricultural land-use disturbance gradient in southeast Queensland, Australia. Gross primary production (GPP) and respiration (R24) in benthic chambers in cobble and sediment habitats, algal biomass (as chlorophyll a) from cobbles and sediment cores, algal biomass accrual on artificial substrates and stable carbon isotope ratios of aquatic plants and benthic sediments were measured at 53 stream sites, ranging from undisturbed subtropical rainforest to catchments where improved pasture and intensive cropping are major land-uses. Rates of benthic GPP and R24 varied by more than two orders of magnitude across the study gradient. Generalised linear regression modelling explained 80% or more of the variation in these two indicators when sediment and cobble substrate dominated sites were considered separately, and both catchment and reach scale descriptors of the disturbance gradient were important in explaining this variation. Model fits were poor for net daily benthic metabolism (NDM) and production to respiration ratio (P/R). Algal biomass accrual on artificial substrate and stable carbon isotope ratios of aquatic plants and benthic sediment were the best of the indirect indicators, with regression model R2 values of 50% or greater. Model fits were poor for algal biomass on natural substrates for cobble sites and all sites. None of these indirect measures of benthic metabolism was a good surrogate for measured GPP. Direct measures of benthic metabolism, GPP and R24, and several indirect measures were good indicators of stream ecosystem health and are recommended in assessing process-related responses to riparian and catchment land use change and the success of ecosystem rehabilitation actions.
Resumo:
Objective: To examine the effects of personal and community characteristics, specifically race and rurality, on lengths of state psychiatric hospital and community stays using maximum likelihood survival analysis with a special emphasis on change over a ten year period of time. Data Sources: We used the administrative data of the Virginia Department of Mental Health, Mental Retardation, and Substance Abuse Services (DMHMRSAS) from 1982-1991 and the Area Resources File (ARF). Given these two sources, we constructed a history file for each individual who entered the state psychiatric system over the ten year period. Histories included demographic, treatment, and community characteristics. Study Design: We used a longitudinal, population-based design with maximum likelihood estimation of survival models. We presented a random effects model with unobserved heterogeneity that was independent of observed covariates. The key dependent variables were lengths of inpatient stay and subsequent length of community stay. Explanatory variables measured personal, diagnostic, and community characteristics, as well as controls for calendar time. Data Collection: This study used secondary, administrative, and health planning data. Principal Findings: African-American clients leave the community more quickly than whites. After controlling for other characteristics, however, race does not affect hospital length of stay. Rurality does not affect length of community stays once other personal and community characteristics are controlled for. However, people from rural areas have longer hospital stays even after controlling for personal and community characteristics. The effects of time are significantly smaller than expected. Diagnostic composition effects and a decrease in the rate of first inpatient admissions explain part of this reduced impact of time. We also find strong evidence for the existence of unobserved heterogeneity in both types of stays and adjust for this in our final models. Conclusions: Our results show that information on client characteristics available from inpatient stay records is useful in predicting not only the length of inpatient stay but also the length of the subsequent community stay. This information can be used to target increased discharge planning for those at risk of more rapid readmission to inpatient care. Correlation across observed and unobserved factors affecting length of stay has significant effects on the measurement of relationships between individual factors and lengths of stay. Thus, it is important to control for both observed and unobserved factors in estimation.
Efficient extension of standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Resumo:
Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.
Resumo:
A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt (Stɛ) schemes as far as both efficiency and security are concerned. A security model for signcryption, and thus joint encryption and signing, has been recently defined which considers possible attacks and security goals. Such a scheme is considered secure if the encryption part guarantees indistinguishability and the signature part prevents existential forgeries, for outsider but also insider adversaries. We propose two schemes of parallel signcryption, which are efficient alternative to Commit-then-Sign-and- Encrypt (Ct&G3&S). They are both provably secure in the random oracle model. The first one, called generic parallel encrypt and sign, is secure if the encryption scheme is semantically secure against chosen-ciphertext attacks and the signature scheme prevents existential forgeries against random-message attacks. The second scheme, called optimal parallel encrypt. and sign, applies random oracles similar to the OAEP technique in order to achieve security using encryption and signature components with very weak security requirements — encryption is expected to be one-way under chosen-plaintext attacks while signature needs to be secure against universal forgeries under random-plaintext attack, that is actually the case for both the plain-RSA encryption and signature under the usual RSA assumption. Both proposals are generic in the sense that any suitable encryption and signature schemes (i.e. which simply achieve required security) can be used. Furthermore they allow both parallel encryption and signing, as well as parallel decryption and verification. Properties of parallel encrypt and sign schemes are considered and a new security standard for parallel signcryption is proposed.