976 resultados para Anisotropic exchange interaction
Resumo:
Intuitive interaction is based on past experience and is fast and often non conscious. We have conducted ten studies into this issue over the past ten years, involving more than 400 participants. Data collection methods have included questionnaires, interviews, observations, concurrent and retrospective protocols, and cognitive measures. Coding schemes have been developed to suit each study and involve robust, literature based heuristics. Some other researchers have investigated this issue and their methods are also examined. The paper traces the development of the methods and compares the various approaches used over the years.
Resumo:
Most one-round key exchange protocols provide only weak forward secrecy at best. Furthermore, one-round protocols with strong forward secrecy often break badly when faced with an adversary who can obtain ephemeral keys. We provide a characterisation of how strong forward secrecy can be achieved in one-round key exchange. Moreover, we show that protocols exist which provide strong forward secrecy and remain secure with weak forward secrecy even when the adversary is allowed to obtain ephemeral keys. We provide a compiler to achieve this for any existing secure protocol with weak forward secrecy.
Resumo:
Partition of heavy metals between particulate and dissolve fraction of stormwater primarily depends on the adsorption characteristics of solids particles. Moreover, the bioavailability of heavy metals is also influenced by the adsorption behaviour of solids. However, due to the lack of fundamental knowledge in relation to the heavy metals adsorption processes of road deposited solids, the effectiveness of stormwater management strategies can be limited. The research study focused on the investigation of the physical and chemical parameters of solids on urban road surfaces and, more specifically, on heavy metal adsorption to solids. Due to the complex nature of heavy metal interaction with solids, a substantial database was generated through a series of field investigations and laboratory experiments. The study sites for the build-up pollutant sample collection were selected from four urbanised suburbs located in a major river catchment. Sixteen road sites were selected from these suburbs and represented typical industrial, commercial and residential land uses. Build-up pollutants were collected using a wet and dry vacuum collection technique which was specially designed to improve fine particle collection. Roadside soil samples were also collected from each suburb for comparison with the road surface solids. The collected build-up solids samples were separated into four particle size ranges and tested for a range of physical and chemical parameters. The solids build-up on road surfaces contained a high fraction (70%) of particles smaller than 150ìm, which are favourable for heavy metal adsorption. These solids particles predominantly consist of soil derived minerals which included quartz, albite, microcline, muscovite and chlorite. Additionally, a high percentage of amorphous content was also identified in road deposited solids. In comparing the mineralogical data of surrounding soil and road deposited solids, it was found that about 30% of the solids consisted of particles generated from traffic related activities on road surfaces. Significant difference in mineralogical composition was noted in different particle sizes of build-up solids. Fine solids particles (<150ìm) consisted of a clayey matrix and high amorphous content (in the region of 40%) while coarse particles (>150ìm) consisted of a sandy matrix at all study sites, with about 60% quartz content. Due to these differences in mineralogical components, particles larger than and smaller than 150ìm had significant differences in their specific surface area (SSA) and effective cation exchange capacity (ECEC). These parameters, in turn, exert a significant influence on heavy metal adsorption. Consequently, heavy metal content in >150ìm particles was lower than in the case of fine particles. The particle size range <75ìm had the highest heavy metal content, corresponding with its high clay forming minerals, high organic matter and low quartz content which increased the SSA, ECEC and the presence of Fe, Al and Mn oxides. The clay forming minerals, high organic matter and Fe, Al and Mn oxides create distinct groups of charge sites on solids surfaces and exhibit different adsorption mechanisms and bond strength, between heavy metal elements and charge sites. Therefore, the predominance of these factors in different particle sizes leads to different heavy metal adsorption characteristics. Heavy metals show preference for association with clay forming minerals in fine solids particles, whilst in coarse particles heavy metals preferentially associate with organic matter. Although heavy metal adsorption to amorphous material is very low, the heavy metals embedded in traffic related materials have a potential impact on stormwater quality.Adsorption of heavy metals is not confined to an individual type of charge site in solids, whereas specific heavy metal elements show preference for adsorption to several different types of charge sites in solids. This is attributed to the dearth of preferred binding sites and the inability to reach the preferred binding sites due to competition between different heavy metal species. This confirms that heavy metal adsorption is significantly influenced by the physical and chemical parameters of solids that lead to a heterogeneity of surface charge sites. The research study highlighted the importance of removal of solids particles from stormwater runoff before they enter into receiving waters to reduce the potential risk posed by the bioavailability of heavy metals. The bioavailability of heavy metals not only results from the easily mobile fraction bound to the solids particles, but can also occur as a result of the dissolution of other forms of bonds by chemical changes in stormwater or microbial activity. Due to the diversity in the composition of the different particle sizes of solids and the characteristics and amount of charge sites on the particle surfaces, investigations using bulk solids are not adequate to gain an understanding of the heavy metal adsorption processes of solids particles. Therefore, the investigation of different particle size ranges is recommended for enhancing stormwater quality management practices.
Resumo:
The exchange pavilion offers a dialogue between two Expositions: 1998 in Brisbane and 2010 in Shanghai; and a chance to examine the impact that climate change will have on urban best practice outcomes in cities of the future. The Exchange exhibits the proposition that environmentally sustainable buildings need to interact responsively with a range of technical innovations to enable communities (and hence cities) to control and better manage their immediate environment. The 'Exchange' pavilion is a design experiment that integrates 3 key research elements: * An interactive digital exchange * A living green system wall (vertical and temporal) * A public urban star (horizontal and spatial) The proposition argues that the environmentally sustainability of any city is reliant on harnessing the full spectrum of intellectual and creative capital of the winder community (from universities to Government bodies to citizens) - a true knowledge city.
Resumo:
Living City 2010 was a three-day place-based urban design immersion workshop program held at Logan Road Conference Centre, Stones Corner, for 30 self-selected Year 11 Visual Art Students and 4 Teachers drawn from 11 state and private Brisbane Secondary Schools, that focused on the active Brisbane City Council redevelopment site of Stones Corner, specifically Logan Road, public spaces at Stones Corner Library and rehabilitation of the nearby creek corridor. The workshop, framed within notions of ecological, economic, social and cultural sustainability, aimed to raise awareness of the layered complexity and perspectives involved in the design of shared city spaces and to encourage young people to voice their own concerns as future citizens about the shape and direction of their city. On Day 1, Brisbane City Council Public Art Officers Brendan Doherty and Genevieve Searle, local landscape architect Peter Boyle (Verge) and artists Malcolm Enright and Barbara Heath provided students with an overview of the historic and future context of the area including proposed design and public art interventions, followed by a site walk. The afternoon session, led by Natalie Wright and QUT design staff and students, focused on design tools to assist in the tackling of the redesign of the Stones Corner library precinct, where students worked on ideas. On Day 2, students were mentored by artist Liam Key to participate in a computer animation activity using the built environment as a canvas, and by artist Sebastian Moody to participate in an activity using red helium balloons as a playful catalyst for interaction to activate and create new public space. Later, students worked in teams on their ideas for redevelopment of the site in preparation for their Day 3 presentations. The workshop culminated in an exchange of planning ideas with Georgina Aitchison from Brisbane City Council's Urban Renewal Division. Students were introduced to design methodology, team thinking strategies, the scope of design practices and professions, presentation skills and post-secondary pathways, while participating teachers acquired content and design learning strategies transferable in many other contexts.
Resumo:
Just Fast Keying (JFK) is a simple, efficient and secure key exchange protocol proposed by Aiello et al. (ACM TISSEC, 2004). JFK is well known for its novel design features, notably its resistance to denial-of-service (DoS) attacks. Using Meadows’ cost-based framework, we identify a new DoS vulnerability in JFK. The JFK protocol is claimed secure in the Canetti-Krawczyk model under the Decisional Diffie-Hellman (DDH) assumption. We show that security of the JFK protocol, when reusing ephemeral Diffie-Hellman keys, appears to require the Gap Diffie-Hellman (GDH) assumption in the random oracle model. We propose a new variant of JFK that avoids the identified DoS vulnerability and provides perfect forward secrecy even under the DDH assumption, achieving the full security promised by the JFK protocol.
Resumo:
Metasearch engines are an intuitive method for improving the performance of Web search by increasing coverage, returning large numbers of results with a focus on relevance, and presenting alternative views of information needs. However, the use of metasearch engines in an operational environment is not well understood. In this study, we investigate the usage of Dogpile.com, a major Web metasearch engine, with the aim of discovering how Web searchers interact with metasearch engines. We report results examining 2,465,145 interactions from 534,507 users of Dogpile.com on May 6, 2005 and compare these results with findings from other Web searching studies. We collect data on geographical location of searchers, use of system feedback, content selection, sessions, queries, and term usage. Findings show that Dogpile.com searchers are mainly from the USA (84% of searchers), use about 3 terms per query (mean = 2.85), implement system feedback moderately (8.4% of users), and generally (56% of users) spend less than one minute interacting with the Web search engine. Overall, metasearchers seem to have higher degrees of interaction than searchers on non-metasearch engines, but their sessions are for a shorter period of time. These aspects of metasearching may be what define the differences from other forms of Web searching. We discuss the implications of our findings in relation to metasearch for Web searchers, search engines, and content providers.
Resumo:
Customer perceived value is concerned with the experiences of consumers when using a service and is often referred to in the context of service provision or on the basis of service quality (Auh, et al., 2007; Chang, 2008; Jackson, 2007; Laukkanen, 2007; Padgett & Mulvey, 2007; Shamdasani, Mukherjee & Malhotra, 2008). Understanding customer perceived value has benefits for social marketing and allows scholars and practitioners alike to identify why consumers engage in positive social behaviours through the use of services. Understanding consumers’ use of wellness services in particular is important, because the use of wellness services demonstrates the fulfilment of social marketing aims; performing pro-active, positive social behaviours that are of benefit to the individual and to society (Andreasen, 1994). As consumers typically act out of self-interest (Rothschild, 1999), this research posits that a value proposition must be made to consumers in order to encourage behavioural change. Thus, this research seeks to identify how value is created for consumers of wellness services in social marketing. This results in the overall research question of this research: How is value created in social marketing wellness services? A traditional method towards understanding value has been the adoption of an economic approach, which considers the utility gained and where value is a direct outcome of a cost-benefit analysis (Payne & Holt, 1999). However, there has since been a shift towards the adoption of an experiential approach in understanding value. This experiential approach considers the consumption experience of the consumer which extends beyond the service exchange and includes pre- and post-consumption stages (Russell-Bennett, Previte & Zainuddin, 2009). As such, this research uses an experiential approach to identify the value that exists in social marketing wellness services. Four dimensions of value have been commonly conceptualised and identified in the commercial marketing literature; functional, emotional, social, and altruistic value (Holbrook, 1994; Sheth, Newman & Gross, 1991; Sweeney & Soutar, 2001). It is not known if these value dimensions also exist in social marketing. In addition, sources of value said to influence value dimensions have been conceptualised in the literature. Sources of value such as information, interaction, environment, service, customer co-creation, and social mandate have been conceptually identified both in the commercial and social marketing literature (Russell-Bennet, Previte & Zainuddin, 2009; Smith & Colgate, 2007). However, it is not clear which sources of value contribute to the creation of value for users of wellness services. Thus, this research seeks to explore these relationships. This research was conducted using a wellness service context, specifically breast cancer screening services. The primary target consumer of these services is women aged 50 to 69 years old (inclusive) who have never been diagnosed with breast cancer. It is recommended that women in this target group have a breast screen every 2 years in order to achieve the most effective medical outcomes from screening. A two-study mixed method approach was utilised. Study 1 was a qualitative exploratory study that analysed individual-depth interviews with 25 information-rich respondents. The interviews were transcribed verbatim and analysed using NVivo 8 software. The qualitative results provided evidence of the existence of the four value dimensions in social marketing. The results also allowed for the development of a typology of experiential value by synthesising current understanding of the value dimensions, with the activity aspects of experiential value identified by Holbrook (1994) and Mathwick, Malhotra and Rigdon (2001). The qualitative results also provided evidence for the existence of sources of value in social marketing, namely information, interaction, environment and consumer participation. In particular, a categorisation of sources of value was developed as a result of the findings from Study 1, which identify organisational, consumer, and third party sources of value. A proposed model of value co-creation and a set of hypotheses were developed based on the results of Study 1 for further testing in Study 2. Study 2 was a large-scale quantitative confirmatory study that sought to test the proposed model of value co-creation and the hypotheses developed. An online-survey was administered Australia-wide to women in the target audience. A response rate of 20.1% was achieved, resulting in a final sample of 797 useable responses after removing ineligible respondents. Reliability and validity analyses were conducted on the data, followed by Exploratory Factor Analysis (EFA) in PASW18, followed by Confirmatory Factor Analysis (CFA) in AMOS18. Following the preliminary analyses, the data was subject to Structural Equation Modelling (SEM) in AMOS18 to test the path relationships hypothesised in the proposed model of value creation. The SEM output revealed that all hypotheses were supported, with the exception of one relationship which was non-significant. In addition, post hoc tests revealed seven further significant non-hypothesised relationships in the model. The quantitative results show that organisational sources of value as well as consumer participation sources of value influence both functional and emotional dimensions of value. The experience of both functional and emotional value in wellness services leads to satisfaction with the experience, followed by behavioural intentions to perform the behaviour and use the service again. One of the significant non-hypothesised relationships revealed that emotional value leads to functional value in wellness services, providing further empirical evidence that emotional value features more prominently than functional value for users of wellness services. This research offers several contributions to theory and practice. Theoretically, this research addresses a gap in the literature by using social marketing theory to provide an alternative method of understanding individual behaviour in a domain that has been predominantly investigated in public health. This research also clarifies the concept of value and offers empirical evidence to show that value is a multi-dimensional construct with separate and distinct dimensions. Empirical evidence for a typology of experiential value, as well as a categorisation of sources of value is also provided. In its practical contributions, this research identifies a framework that is the value creation process and offers health services organisations a diagnostic tool to identify aspects of the service process that facilitate the value creation process.
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.
Resumo:
The introduction of the Australian curriculum, the use of standardised testing (e.g. NAPLAN) and the My School website are couched in a context of accountability. This circumstance has stimulated and in some cases renewed a range of boundaries in Australian Education. The consequences that arise from standardised testing have accentuated the boundaries produced by social reproduction in education which has led to an increase in the numbers of students disengaging from mainstream education and applying for enrolment at the Edmund Rice Education Australia Flexible Learning Centre Network (EREAFLCN). Boundaries are created for many young people who are denied access to credentials and certification as a result of being excluded from or in some way disengaging from standardised education and testing. Young people who participate at the EREAFLCN arrive with a variety of forms of cultural capital that are not valued in current education and employment fields. This is not to say that these young people’s different forms of cultural capital have no value, but rather that such funds of knowledge, repertoires and cultural capital are not valued by the majority of powerful agents in educational and employment fields. How then can the qualitative value of traditionally unorthodox - yet often intricate, ingenious, and astute - versions of cultural capital evident in the habitus of many young people be made to count, be recognised, be valuated? Can a process of educational assessment be a field of capital exchange and a space which breaches boundaries through a valuating process? This paper reports on the development of an innovative approach to assessment in an alternative education institution designed for the re-engagement of ‘at risk’ youth who have left formal schooling. A case study approach has been used to document the engagement of six young people, with an educational approach described as assessment for learning as a field of exchange across two sites in the EREAFLCN. In order to capture the broad range of students’ cultural and social capital, an electronic portfolio system (EPS) is under trial. The model draws on categories from sociological models of capital and reconceptualises the eportfolio as a sociocultural zone of learning and development. Results from the trial show a general tendency towards engagement with the EPS and potential for the attainment of socially valued cultural capital in the form of school credentials. In this way restrictive boundaries can be breached and a more equitable outcome achieved for many young Australians.
Resumo:
The introduction of the Australian curriculum, the use of standardised testing (e.g. NAPLAN) and the My School website have stimulated and in some cases renewed a range of boundaries for young people in Australian Education. Standardised testing has accentuated social reproduction in education with an increase in the numbers of students disengaging from mainstream education and applying for enrolment at the Edmund Rice Education Australia Flexible Learning Centre Network (EREAFLCN). Many young people are denied access to credentials and certification as they become excluded from standardised education and testing. The creativity and skills of marginalised youth are often evidence of general capabilities and yet do not appear to be recognised in mainstream educational institutions when standardised approaches are adopted. Young people who participate at the EREAFLCN arrive with a variety of forms of cultural capital, frequently utilising general capabilities, which are not able to be valued in current education and employment fields. This is not to say that these young people‟s different forms of cultural capital have no value, but rather that such funds of knowledge, repertoires and cultural capital are not valued by the majority of powerful agents in educational and employment fields. How then can the inherent value of traditionally unorthodox - yet often intricate, ingenious, and astute-versions of cultural capital evident in the habitus of many young people be made to count, be recognised, be valuated?Can a process of educational assessment be a field of capital exchange and a space which crosses boundaries through a valuating process? This paper reports on the development of an innovative approach to assessment in an alternative education institution designed for the re engagement of „at risk‟ youth who have left formal schooling. A case study approach has been used to document the engagement of six young people, with an educational approach described as assessment for learning as a field of exchange across two sites in the EREAFLCN. In order to capture the broad range of students‟ cultural and social capital, an electronic portfolio system (EPS) is under trial. The model draws on categories from sociological models of capital and reconceptualises the eportfolio as a sociocultural zone of learning and development. Results from the trial show a general tendency towards engagement with the EPS and potential for the attainment of socially valued cultural capital in the form of school credentials. In this way restrictive boundaries can be breached and a more equitable outcome achieved for many young Australians.
Resumo:
Standardised testing does not recognise the creativity and skills of marginalised youth. Young people who come to the Edmund Rice Education Australia Flexible Learning Centre Network (EREAFLCN) in Australia arrive with forms of cultural capital that are not valued in the field of education and employment. This is not to say that young people‟s different modes of cultural capital have no value, but rather that such funds of knowledge, repertoires and cultural capital are not valued by the powerful agents in educational and employment fields. The forms of cultural capital which are valued by these institutions are measurable in certain structured formats which are largely inaccessible for what is seen in Australia to be a growing segment of the community. How then can the inherent value of traditionally unorthodox - yet often intricate, adroit, ingenious, and astute - versions of cultural capital evident in the habitus of many young people be made to count, be recognised, be valuated? Can a process of educational assessment be used as a marketplace, a field of capital exchange? This paper reports on the development of an innovative approach to assessment in an alternative education institution designed for the re-engagement of „at risk‟ youth who have left formal schooling. In order to capture the broad range of students‟ cultural and social capital, an electronic portfolio system (EPS) is under trial. The model draws on categories from sociological models of capital and reconceptualises the eportfolio as a sociocultural zone of learning and development. Initial results from the trial show a general tendency towards engagement with the EPS and potential for the attainment of socially valued cultural capital in the form of school credentials.
Resumo:
A precise definition of interaction behavior between services is a prerequisite for successful business-to-business integration. Service choreographies provide a view on message exchanges and their ordering constraints from a global perspective. Assuming message sending and receiving as one atomic step allows to reduce the modelers’ effort. As downside, problematic race conditions resulting in deadlocks might appear when realizing the choreography using services that exchange messages asynchronously. This paper presents typical issues when desynchronizing service choreographies. Solutions from practice are discussed and a formal approach based on Petri nets is introduced for identifying desynchronizable choreographies.