979 resultados para pre-image attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using density functional theory, we have investigated the catalytic properties of bimetallic complex catalysts PtlAum(CO)n (l + m = 2, n = 1–3) in the reduction of SO2 by CO. Due to the strong coupling between the C-2p and metal 5d orbitals, pre-adsorption of CO molecules on the PtlAum is found to be very effective in not only reducing the activation energy, but also preventing poisoning by sulfur. As result of the coupling, the metal 5d band is broadened and down-shifted, and charge is transferred from the CO molecules to the PtlAum. As SO2 is adsorbed on the catalyst, partial charge moves to the anti-σ bonding orbitals between S and O in SO2, weakening the S–O bond strength. This effect is enhanced by pre-adsorbing up to three CO molecules, therefore the S–O bonds become vulnerable. Our results revealed the mechanism of the excellent catalytic properties of the bimetallic complex catalysts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bushfires are regular occurrences in the Australian landscape which can, under adverse weather conditions, give rise to losses of life, property, infrastructure, environmental and cultural values. Where property loss is involved, historical surveys of house losses have focussed on ember, radiant heat and flame contact as key bushfire attack mechanisms. Although often noted, little work has been done to quantify the impact of fire generated or fire enhanced wind and pyro-convective events on house loss and to improve construction practice within Australia. It is well known that strong winds are always associated with bushfire events. It is less well known, although increasingly shown through anecdotal evidence, that bushfires are not a passive companion of wind, but indeed they interact with winds and can together cause significant damages to exposed buildings and ecological structures. Previous studies have revealed the effects of wind, fire and structure interactions with the result of increased pressure coefficient distributions on the windward side of a building downstream of a fire front. This paper presents a further analysis of the result in relations to the relevant standards and fire weather conditions. A review of wind code and bushfire code was conducted. Based on the result of the current study, the authors believe it is necessary to consider wind as an attack mechanism in bushfire events. The results of the study will also have implications on bushfire emergency management, design of emergency shelters, perception of danger, emergency evacuation and on risk assessment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

NLS is a stream cipher which was submitted to the eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called Crossword Puzzle (CP) attack. NLSv2 is a tweak version of NLS which aims mainly at avoiding the CP attack. In this paper, a new distinguishing attack against NLSv2 is presented. The attack exploits high correlation amongst neighboring bits of the cipher. The paper first shows that the modular addition preserves pairwise correlations as demonstrated by existence of linear approximations with large biases. Next, it shows how to combine these results with the existence of high correlation between bits 29 and 30 of the S-box to obtain a distinguisher whose bias is around 2^−37. Consequently, we claim that NLSv2 is distinguishable from a random cipher after observing around 2^74 keystream words.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background In Australia, the profession of pharmacy has undergone many changes to adapt to the needs of the community. In recent years, concerns have been raised with evidence emerging of workforce saturation in traditional pharmacy practice sectors. It is not known how current final year pharmacy students’ perceive the different pharmacy career paths in this changing environment. Hence investigating students’ current experiences with their pharmacy course, interaction with the profession and developing an understanding of their career intentions would be an important step, as these students would make up a large proportion of future pharmacy workforce Objective The objective of this study was thus to investigate final year students’ career perspectives and the reasons for choosing pharmacy, satisfaction with this choice of pharmacy as a tertiary course and a possible future career, factors affecting satisfaction and intention of future career paths. Methods A quantitative cross sectional survey of final year students from 3 Australian universities followed by a qualitative semi-structured interview of a convenience sample of final year students from the University of Sydney. Results ‘Interest in health and medicine’ was the most important reason for choosing pharmacy (n=238). The majority of students were ‘somewhat satisfied’ with the choice of pharmacy (35.7%) as a course and possible future career. Positive associations were found between satisfaction and reasons for joining pharmacy such as ‘felt pharmacy is a good profession’ (p=0.003) while negative associations included ‘joined pharmacy as a gateway to medicine or dentistry’ (p=0.001). Quantitate and qualitative results showed the most frequent perception of community pharmacy was ‘changing’ while hospital and pharmaceutical industry was described as ‘competitive’ and ‘research’ respectively. The highest career intention was community followed by hospital pharmacy. Conclusion Complex factors including university experiences are involved in shaping students’ satisfaction and perception of career. This may relate to challenges in the community pharmacy sector, job opportunities in hospital and limited understanding of the pharmaceutical industry. The results offer insight for the profession in terms of entry into various roles and also to pharmacy educators for their roles in shaping curricula and placement experiences that attract future graduates to defined career pathways in pharmacy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Venous thromboembolism (VTE) is the term used to describe the disease process which presents as either deep vein thrombosis or pulmonary embolism. It is a major cause of death and disability worldwide and places a large financial burden on healthcare systems. Multiple risk factors have been identified for the development of VTE, including hospitalisation for acute medical illness and surgery. Documentation of VTE risk assessment is a critical part of any patient admission, driven by evidence that a risk assessment is a trigger for VTE prophylaxis to be considered. In the United Kingdom, healthcare services have set targets for VTE risk assessment documentation and financial incentives are linked to targets being met...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

State and local governments frequently look to flagship cultural projects to improve the city image and catalyze tourism but, in the process, often overlook their potential to foster local arts development. To better understand this role, the article examines if and how cultural institutions in Los Angeles and San Francisco attract and support arts-related activity. The analysis reveals that cultural flagships have mixed success in generating arts-based development and that their ability may be improved through attention to the local context, facility and institutional characteristics, and the approach of the sponsoring agencies. Such knowledge is useful for planners to enhance their revitalization efforts, particularly as the economic development potential of arts organizations and artists has become more apparent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examined the delay causes of Malaysian public sector projects. Using a systematic approach, the researcher identified the main delay factors and categorised them into pathogens. The pathogens were matched with beneficial Supply Chain Management (SCM) tools and developed into a holistic SCM framework to facilitate improvements in Malaysian public sector projects. The researcher concluded that SCM is the potential saviour for the delay dilemma and that it is necessary for the Malaysian government to initiate the revolutionary practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Current evidence to support non-medical prescribing is predominantly qualitative, with little evaluation of appropriateness. This study aims to evaluate the appropriateness of prescribing, and significance of omissions, from a doctor pharmacist collaborative prescribing model in an elective surgery pre admission clinic (PAC). Method A modified version of the Medication Appropriate Index (MAI) was developed, piloted and subsequently used by an expert panel, comprised of a surgeon, anaesthetist, clinical pharmacologist, pharmacist, resident medical officer (RMO) and clinical nurse. The tool was used to rate the appropriateness of prescribing of medications, and the significance of omissions in a 5% sample (N=19) of the total cohort from a randomised, controlled two arm trial of doctor-pharmacist collaborative prescribing. Results When reviewer assessments were combined, 32 out of 294 (10.9%) medications assessed for appropriateness in the control arm were classed as inappropriate, compared to 13 of 266 (4.9%) in the intervention arm. Out of 89 regular medications in the control arm, 25 (28%) were omitted from the medication charts, compared to 1 out of 55 (2%) in the intervention arm (p<0.001, fishers exact) On average, 52% of omissions in the control arm were judged to have potential for patient harm or ward inconvenience. Conclusion For the appropriateness of prescribing, overall results were similar between arms, as judged by individual panel members. Medication charts in the control arm contained significantly more omissions than in the intervention arm, a number of which were rated by the panel members as having the potential for patient harm or ward inconvenience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cleavage and polyadenylation factor (CPF) is a multi‐protein complex that functions in pre‐mRNA 3′‐end formation and in the RNA polymerase II (RNAP II) transcription cycle. Ydh1p/Cft2p is an essential component of CPF but its precise role in 3′‐end processing remained unclear. We found that mutations in YDH1 inhibited both the cleavage and the polyadenylation steps of the 3′‐end formation reaction in vitro. Recently, we demonstrated that an important function of CPF lies in the recognition of poly(A) site sequences and RNA binding analyses suggesting that Ydh1p/Cft2p interacts with the poly(A) site region. Here we show that mutant ydh1 strains are deficient in the recognition of the ACT1 cleavage site in vivo. The C‐terminal domain (CTD) of RNAP II plays a major role in coupling 3′‐end processing and transcription. We provide evidence that Ydh1p/Cft2p interacts with the CTD of RNAP II, several other subunits of CPF and with Pcf11p, a component of CF IA. We propose that Ydh1p/Cft2p contributes to the formation of important interaction surfaces that mediate the dynamic association of CPF with RNAP II, the recognition of poly(A) site sequences and the assembly of the polyadenylation machinery on the RNA substrate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pcf11p, an essential subunit of the yeast cleavage factor IA, is required for pre‐mRNA 3′ end processing, binds to the C‐terminal domain (CTD) of the largest subunit of RNA polymerase II (RNAP II) and is involved in transcription termination. We show that the conserved CTD interaction domain (CID) of Pcf11p is essential for cell viability. Interestingly, the CTD binding and 3′ end processing activities of Pcf11p can be functionally uncoupled from each other and provided by distinct Pcf11p fragments in trans. Impaired CTD binding did not affect the 3′ end processing activity of Pcf11p and a deficiency of Pcf11p in 3′ end processing did not prevent CTD binding. Transcriptional run‐on analysis with the CYC1 gene revealed that loss of cleavage activity did not correlate with a defect in transcription termination, whereas loss of CTD binding did. We conclude that Pcf11p is a bifunctional protein and that transcript cleavage is not an obligatory step prior to RNAP II termination.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In increasingly competitive labour markets, attracting and retaining talent has become a prime concern of organisations. Employers need to understand the range of factors that influence career decision making and the role of employer branding in attracting human capital that best fits and contributes to the strategic aims of an organisation. This chapter identifies the changing factors that attract people to certain employment and industries and discusses the importance of aligning employer branding with employee branding to create a strong, genuine and lasting employer brand. Whilst organisations have long used marketing and branding practices to engender loyalty in customers, they are increasingly expanding this activity to differentiate organisations and make them attractive from an employee perspective. This chapter discusses employer branding and industry image as two important components of attraction strategies and describes ways companies can maximise their brand awareness in the employment market to both current and future employees.