999 resultados para algebraic laws


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this PhD research program is to investigate numerical methods for simulating variably-saturated flow and sea water intrusion in coastal aquifers in a high-performance computing environment. The work is divided into three overlapping tasks: to develop an accurate and stable finite volume discretisation and numerical solution strategy for the variably-saturated flow and salt transport equations; to implement the chosen approach in a high performance computing environment that may have multiple GPUs or CPU cores; and to verify and test the implementation. The geological description of aquifers is often complex, with porous materials possessing highly variable properties, that are best described using unstructured meshes. The finite volume method is a popular method for the solution of the conservation laws that describe sea water intrusion, and is well-suited to unstructured meshes. In this work we apply a control volume-finite element (CV-FE) method to an extension of a recently proposed formulation (Kees and Miller, 2002) for variably saturated groundwater flow. The CV-FE method evaluates fluxes at points where material properties and gradients in pressure and concentration are consistently defined, making it both suitable for heterogeneous media and mass conservative. Using the method of lines, the CV-FE discretisation gives a set of differential algebraic equations (DAEs) amenable to solution using higher-order implicit solvers. Heterogeneous computer systems that use a combination of computational hardware such as CPUs and GPUs, are attractive for scientific computing due to the potential advantages offered by GPUs for accelerating data-parallel operations. We present a C++ library that implements data-parallel methods on both CPU and GPUs. The finite volume discretisation is expressed in terms of these data-parallel operations, which gives an efficient implementation of the nonlinear residual function. This makes the implicit solution of the DAE system possible on the GPU, because the inexact Newton-Krylov method used by the implicit time stepping scheme can approximate the action of a matrix on a vector using residual evaluations. We also propose preconditioning strategies that are amenable to GPU implementation, so that all computationally-intensive aspects of the implicit time stepping scheme are implemented on the GPU. Results are presented that demonstrate the efficiency and accuracy of the proposed numeric methods and formulation. The formulation offers excellent conservation of mass, and higher-order temporal integration increases both numeric efficiency and accuracy of the solutions. Flux limiting produces accurate, oscillation-free solutions on coarse meshes, where much finer meshes are required to obtain solutions with equivalent accuracy using upstream weighting. The computational efficiency of the software is investigated using CPUs and GPUs on a high-performance workstation. The GPU version offers considerable speedup over the CPU version, with one GPU giving speedup factor of 3 over the eight-core CPU implementation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modernized GPS and GLONASS, together with new GNSS systems, BeiDou and Galileo, offer code and phase ranging signals in three or more carriers. Traditionally, dual-frequency code and/or phase GPS measurements are linearly combined to eliminate effects of ionosphere delays in various positioning and analysis. This typical treatment method has imitations in processing signals at three or more frequencies from more than one system and can be hardly adapted itself to cope with the booming of various receivers with a broad variety of singles. In this contribution, a generalized-positioning model that the navigation system independent and the carrier number unrelated is promoted, which is suitable for both single- and multi-sites data processing. For the synchronization of different signals, uncalibrated signal delays (USD) are more generally defined to compensate the signal specific offsets in code and phase signals respectively. In addition, the ionospheric delays are included in the parameterization with an elaborate consideration. Based on the analysis of the algebraic structures, this generalized-positioning model is further refined with a set of proper constrains to regularize the datum deficiency of the observation equation system. With this new model, uncalibrated signal delays (USD) and ionospheric delays are derived for both GPS and BeiDou with a large dada set. Numerical results demonstrate that, with a limited number of stations, the uncalibrated code delays (UCD) are determinate to a precision of about 0.1 ns for GPS and 0.4 ns for BeiDou signals, while the uncalibrated phase delays (UPD) for L1 and L2 are generated with 37 stations evenly distributed in China for GPS with a consistency of about 0.3 cycle. Extra experiments concerning the performance of this novel model in point positioning with mixed-frequencies of mixed-constellations is analyzed, in which the USD parameters are fixed with our generated values. The results are evaluated in terms of both positioning accuracy and convergence time.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Guardianship laws in most Western societies provide decision-making mechanisms for adults with impaired capacity. Since the inception of these laws, the principle of autonomy and recognition of human rights for those coming within guardianship regimes has gained prominence. A new legal model has emerged, which seeks to incorporate ‘assisted decision-making’ models into guardianship laws. Such models legally recognise that an adult’s capacity may be maintained through assistance or support provided by another person, and provide formal recognition of the person in that ‘assisting’ role. This article situates this latest legal innovation within a historical context, examining the social and legal evolution of guardianship laws and determining whether modern assisted decision-making models remain consistent with guardianship reform thus far. It identifies and critically analyses the different assisted decision-making models which exist internationally. Finally, it discusses a number of conceptual, legal and practical concerns that remain unresolved. These issues require serious consideration before assisted decisionmaking models are adopted in guardianship regimes in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"The success of Criminal Laws lies both in its distinctive features and in its appeal to a range of readerships. As one review put it, it is simultaneously a "textbook, casebook, handbook and reference work". As such it is ideal for criminal law and criminal justice courses as a teaching text, combining as it does primary sources with extensive critical commentary and a contextual perspective. It is likewise indispensable to practitioners for its detailed coverage of substantive law and its extensive references and inter-disciplinary approach make it a first point of call for researchers from all disciplines. This fifth edition strengthens these distinctive features. All chapters have been systematically updated to incorporate the plethora of legislative, case law, statistical and research material which has emerged since the previous edition. The critical, thematic, contextual and interdisciplinary perspectives have been continued."--Publisher's website. Table of Contents: 1. Some themes -- 2. Criminalisation -- 3. The criminal process -- 4. Components of criminal offences -- 5. Homicide: murder and involuntary manslaughter -- 6. Defences -- 7. Assault and sexual assault -- 8. Public order offences -- 9. Drugs offences -- 10. Dishonest acquisition -- 11. Extending criminal liability: complicity, conspiracy and association -- 12. Sentencing and penality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has been populated for more than 40,000 years with Indigenous Australians joined by European settlers only 230 years ago. The first settlers consisted of convicts from more than 28 countries and members of the British army who arrived in 1788 to establish a British penal colony. Mass migration in the nineteenth century with one and a half million immigrants from Europe, principally from the United Kingdom and Ireland (Haines and Shlomowitz, 1992), established the continent as an Anglo society in the Pacific. In the twentieth century immigrants came from many European countries and in the latter decades from many parts of Asia and the Middle East (Collins, 1991, pp.10-13). In the 21st century Australia has an ethnically and culturally diverse population. The original Indigenous population of Australia accounts for approximately 460,000 or 2.5 per cent of the total population (ABS, 2006a). Estimates are that around 4.5m. persons in the population (close to 20 per cent), were born outside Australia with the majority of these arriving from Europe, principally the United Kingdom, and New Zealand (ABS, 2006b). Like many other countries, Australia has a legacy of discrimination and inequality in employment. Propelled by racist ideologies and the male breadwinner ideology, Indigenous Australians, and non-European immigrants, and women were barred from certain jobs and paid less for their work than any white male counterpart. These conditions were legally sanctioned through the industrial relations system and other laws in the nineteenth and first half of the twentieth century. Since the 1960s a dramatic change has occurred in social policy and national legislation and Australia today has an extensive array of laws which forbid employment discrimination on race, ethnicity, gender and many other characteristics, and other approaches which promote proactive organizational plans and actions to achieve equity in employment. This chapter outlines these developments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rapidly increasing electricity demands and capacity shortage of transmission and distribution facilities are the main driving forces for the growth of Distributed Generation (DG) integration in power grids. One of the reasons for choosing a DG is its ability to support voltage in a distribution system. Selection of effective DG characteristics and DG parameters is a significant concern of distribution system planners to obtain maximum potential benefits from the DG unit. This paper addresses the issue of improving the network voltage profile in distribution systems by installing a DG of the most suitable size, at a suitable location. An analytical approach is developed based on algebraic equations for uniformly distributed loads to determine the optimal operation, size and location of the DG in order to achieve required levels of network voltage. The developed method is simple to use for conceptual design and analysis of distribution system expansion with a DG and suitable for a quick estimation of DG parameters (such as optimal operating angle, size and location of a DG system) in a radial network. A practical network is used to verify the proposed technique and test results are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Trivium is a stream cipher candidate of the eStream project. It has successfully moved into phase three of the selection process under the hardware category. No attacks faster than the exhaustive search have so far been reported on Trivium. Bivium-A and Bivium-B are simplified versions of Trivium that are built on the same design principles but with two registers. The simplified design is useful in investigating Trivium type ciphers with a reduced complexity and provides insight into effective attacks which could be extended to Trivium. This paper focuses on an algebraic analysis which uses the boolean satisfiability problem in propositional logic. For reduced variants of the cipher, this analysis recovers the internal state with a minimal amount of keystream observations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What if you could check out of your world, and enter a place where the social environment was different, where real world laws didn't apply, and where the political system could be anything you wanted it to be? What if you could socialize there with family and friends, build your own palace, go skiing, and even hold down a job there? And what if there wasn't one alternate world, there were hundreds, and what if millions of people checked out of Earth and went there every day? Virtual worlds - online worlds where millions of people come to interact, play, and socialize - are a new type of social order. In this Article, we examine the implications of virtual worlds for our understanding of law, and demonstrate how law affects the interests of those within the world. After providing an extensive primer on virtual worlds, including their history and function, we examine two fundamental issues in detail. First, we focus on property, and ask whether it is possible to say that virtual world users have real world property interests in virtual objects. Adopting economic accounts that demonstrate the real world value of these objects and the exchange mechanisms for trading these objects, we show that, descriptively, these types of objects are indistinguishable from real world property interests. Further, the normative justifications for property interests in the real world apply - sometimes more strongly - in the virtual worlds. Second, we discuss whether avatars have enforceable legal and moral rights. Avatars, the user-controlled entities that interact with virtual worlds, are a persistent extension of their human users, and users identify with them so closely that the human-avatar being can be thought of as a cyborg. We examine the issue of cyborg rights within virtual worlds and whether they may have real world significance. The issues of virtual property and avatar rights constitute legal challenges for our online future. Though virtual worlds may be games now, they are rapidly becoming as significant as real-world places where people interact, shop, sell, and work. As society and law begin to develop within virtual worlds, we need to have a better understanding of the interaction of the laws of the virtual worlds with the law of this world.