954 resultados para multi-factor authentication
Resumo:
Generalized fractional partial differential equations have now found wide application for describing important physical phenomena, such as subdiffusive and superdiffusive processes. However, studies of generalized multi-term time and space fractional partial differential equations are still under development. In this paper, the multi-term time-space Caputo-Riesz fractional advection diffusion equations (MT-TSCR-FADE) with Dirichlet nonhomogeneous boundary conditions are considered. The multi-term time-fractional derivatives are defined in the Caputo sense, whose orders belong to the intervals [0, 1], [1, 2] and [0, 2], respectively. These are called respectively the multi-term time-fractional diffusion terms, the multi-term time-fractional wave terms and the multi-term time-fractional mixed diffusion-wave terms. The space fractional derivatives are defined as Riesz fractional derivatives. Analytical solutions of three types of the MT-TSCR-FADE are derived with Dirichlet boundary conditions. By using Luchko's Theorem (Acta Math. Vietnam., 1999), we proposed some new techniques, such as a spectral representation of the fractional Laplacian operator and the equivalent relationship between fractional Laplacian operator and Riesz fractional derivative, that enabled the derivation of the analytical solutions for the multi-term time-space Caputo-Riesz fractional advection-diffusion equations. © 2012.
Resumo:
Multi-term time-fractional differential equations have been used for describing important physical phenomena. However, studies of the multi-term time-fractional partial differential equations with three kinds of nonhomogeneous boundary conditions are still limited. In this paper, a method of separating variables is used to solve the multi-term time-fractional diffusion-wave equation and the multi-term time-fractional diffusion equation in a finite domain. In the two equations, the time-fractional derivative is defined in the Caputo sense. We discuss and derive the analytical solutions of the two equations with three kinds of nonhomogeneous boundary conditions, namely, Dirichlet, Neumann and Robin conditions, respectively.
Resumo:
Data mining techniques extract repeated and useful patterns from a large data set that in turn are utilized to predict the outcome of future events. The main purpose of the research presented in this paper is to investigate data mining strategies and develop an efficient framework for multi-attribute project information analysis to predict the performance of construction projects. The research team first reviewed existing data mining algorithms, applied them to systematically analyze a large project data set collected by the survey, and finally proposed a data-mining-based decision support framework for project performance prediction. To evaluate the potential of the framework, a case study was conducted using data collected from 139 capital projects and analyzed the relationship between use of information technology and project cost performance. The study results showed that the proposed framework has potential to promote fast, easy to use, interpretable, and accurate project data analysis.
Resumo:
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.
Resumo:
Background Coronary heart disease (CHD) and depression are leading causes of disease burden globally and the two often co-exist. Depression is common after Myocardial Infarction (MI) and it has been estimated that 15-35% of patients experience depressive symptoms. Co-morbid depression can impair health related quality of life (HRQOL), decrease medication adherence and appropriate utilisation of health services, lead to increased morbidity and suicide risk, and is associated with poorer CHD risk factor profiles and reduced survival. We aim to determine the feasibility of conducting a randomised, multi-centre trial designed to compare a tele-health program (MoodCare) for depression and CHD secondary prevention, with Usual Care (UC). Methods Over 1600 patients admitted after index admission for Acute Coronary Syndrome (ACS) are being screened for depression at six metropolitan hospitals in the Australian states of Victoria and Queensland. Consenting participants are then contacted at two weeks post-discharge for baseline assessment. One hundred eligible participants are to be randomised to an intervention or a usual medical care control group (50 per group). The intervention consists of up to 10 × 30-40 minute structured telephone sessions, delivered by registered psychologists, commencing within two weeks of baseline screening. The intervention focuses on depression management, lifestyle factors (physical activity, healthy eating, smoking cessation, alcohol intake), medication adherence and managing co-morbidities. Data collection occurs at baseline (Time 1), 6 months (post-intervention) (Time 2), 12 months (Time 3) and 24 months follow-up for longer term effects (Time 4). We are comparing depression (Cardiac Depression Scale [CDS]) and HRQOL (Short Form-12 [SF-12]) scores between treatment and UC groups, assessing the feasibility of the program through patient acceptability and exploring long term maintenance effects. A cost-effectiveness analysis of the costs and outcomes for patients in the intervention and control groups is being conducted from the perspective of health care costs to the government. Discussion This manuscript presents the protocol for a randomised, multi-centre trial to evaluate the feasibility of a tele-based depression management and CHD secondary prevention program for ACS patients. The results of this trial will provide valuable new information about potential psychological and wellbeing benefits, cost-effectiveness and acceptability of an innovative tele-based depression management and secondary prevention program for CHD patients experiencing depression.