927 resultados para Equivalence Proof
Resumo:
We have studied the mineral olmiite CaMn\[SiO3(OH)](OH) which forms a series with its calcium analogue poldevaartite CaCa\[SiO3(OH)](OH) using a range of techniques including scanning electron microscopy, thermogravimetric analysis , Raman and infrared spectroscopy. Chemical analysis shows the mineral is pure and contains only calcium and manganese in the formula. Thermogravimetric analysis proves the mineral decomposes at 502°C with a mass loss of 8.8% compared with the theoretical mass loss of 8.737%. A strong Raman band at 853 cm-1 is assigned to the SiO stretching vibration of the SiO3(OH) units. Two Raman bands at 914 and 953 cm-1 are attributed to the antisymmetric vibrations.Two intense Raman bands observed at 3511 and 3550 cm-1 are assigned to the OH stretching vibration of the SiO3(OH) units. The observation of multiple OH bands supports the concept of the non-equivalence of the OH units. Vibrational spectroscopy enables a detailed assessment of the molecular structure of olmiite.
Resumo:
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.
Resumo:
Vibrational spectroscopy enables subtle details of the molecular structure of kapundaite to be determined. Single crystals of a pure phase from a Brazilian pegmatite were used. Kapundaite is the Fe3+ member of the wardite group. The infrared and Raman spectroscopy were applied to compare the structure of kapundaite with wardite. The Raman spectrum of kapundaite in the 800–1400 cm−1 spectral range shows two intense bands at 1089 and 1114 cm−1 assigned to the ν1PO43- symmetric stretching vibrations. The observation of two bands provides evidence for the non-equivalence of the phosphate units in the kapundaite structure. The infrared spectrum of kapundaite in the 500–1300 cm−1 shows much greater complexity than the Raman spectrum. Strong infrared bands are found at 966, 1003 and 1036 cm−1 and are attributed to the ν1PO43- symmetric stretching mode and ν3PO43- antisymmetric stretching mode. Raman bands in the ν4 out of plane bending modes of the PO43- unit support the concept of non-equivalent phosphate units in the kapundaite structure. In the 2600–3800 cm−1 spectral range, Raman bands for kapundaite are found at 2905, 3151, 3311, 3449 and 3530 cm−1. These bands are broad and are assigned to OH stretching vibrations. Broad infrared bands are also found at 2904, 3105, 3307, 3453 and 3523 cm−1 and are attributed to water. Raman spectroscopy complimented with infrared spectroscopy has enabled aspects of the structure of kapundaite to be ascertained and compared with that of other phosphate minerals.
Resumo:
This study of English Coronial practice raises a number of questions about the role played by the Coroner within contemporary governance. Following observations at over 20 inquests into possible suicides and in-depth interviews with six Coroners, three preliminary issue emerged, all of which pointed to a broader and, in many ways, more significant issue. These preliminary issues are concerned with: (1) the existence of considerable slippages between different Coroners over which deaths are likely to be classified as suicide; (2) the high standard of proof required and immense pressure faced by Coroners from family members at inquest to reach any verdict other than suicide, which significantly depresses likely suicide rates, and; (3) Coroners feeling no professional obligation, either individually or collectively, to contribute to the production of consistent and useful social data regarding suicide, arguably rendering comparative suicide statistics relatively worthless. These concerns lead, ultimately, to the second more important question about the role expected of Coroners within social governance and within an effective, contemporary democracy. That is, are Coroners the principal officers in the public administration of death; or are they, first and foremost, a crucial part of the grieving process, one that provides important therapeutic interventions into the mental and emotional health of the community?
Resumo:
This paper explores the use of subarrays as array elements. Benefits of such a concept include improved gain in any direction without significantly increasing the overall size of the array and enhanced pattern control. The architecture for an array of subarrays will be discussed via a systems approach. Individual system designs are explored in further details and proof of principle is illustrated through a manufactured examples.
Resumo:
Auto/biographical documentaries ask audiences to take a ‘leap of faith’, not being able to offer any real ‘proof’ of the people and events they claim to document, other than that of the film-maker’s saying this is what happened. With only memory and history seen through the distorting lens of time, ‘the authenticity of experience functions as a receding horizon of truth in which memory and testimony are articulated as modes of salvage’. Orchids: My Intersex Adventure follows a salvaging of the film-maker’s life events and experiences, being born with an intersex condition, and, via the filming and editing process, revolving around the core question: who am I? From this transformative creative documentary practice evolves a new way of embodying experience and ‘seeing’, playfully dubbed here as the ‘intersex gaze’.
Resumo:
In this paper, a demand-responsive decision support system is proposed by integrating the operations of coal shipment, coal stockpiles and coal railing within a whole system. A generic and flexible scheduling optimisation methodology is developed to identify, represent, model, solve and analyse the coal transport problem in a standard and convenient way. As a result, the integrated train-stockpile-ship timetable is created and optimised for improving overall efficiency of coal transport system. A comprehensive sensitivity analysis based on extensive computational experiments is conducted to validate the proposed methodology. The mathematical proposition and proof are concluded as technical and insightful advices for industry practice. The proposed methodology provides better decision making on how to assign rail rolling-stocks and upgrade infrastructure in order to significantly improve capacity utilisation with the best resource-effectiveness ratio. The proposed decision support system with train-stockpile-ship scheduling optimisation techniques is promising to be applied in railway or mining industry, especially as a useful quantitative decision making tool on how to use more current rolling-stocks or whether to buy additional rolling-stocks for mining transportation.
Resumo:
The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to various regulations that require data and operations to reside in specific geographic locations. Thus, cloud users may want to be sure that their stored data have not been relocated into unknown geographic regions that may compromise the security of their stored data. Albeshri et al. (2012) combined proof of storage (POS) protocols with distance-bounding protocols to address this problem. However, their scheme involves unnecessary delay when utilising typical POS schemes due to computational overhead at the server side. The aim of this paper is to improve the basic GeoProof protocol by reducing the computation overhead at the server side. We show how this can maintain the same level of security while achieving more accurate geographic assurance.
Resumo:
Many cell types form clumps or aggregates when cultured in vitro through a variety of mechanisms including rapid cell proliferation, chemotaxis, or direct cell-to-cell contact. In this paper we develop an agent-based model to explore the formation of aggregates in cultures where cells are initially distributed uniformly, at random, on a two-dimensional substrate. Our model includes unbiased random cell motion, together with two mechanisms which can produce cell aggregates: (i) rapid cell proliferation, and (ii) a biased cell motility mechanism where cells can sense other cells within a finite range, and will tend to move towards areas with higher numbers of cells. We then introduce a pair-correlation function which allows us to quantify aspects of the spatial patterns produced by our agent-based model. In particular, these pair-correlation functions are able to detect differences between domains populated uniformly at random (i.e. at the exclusion complete spatial randomness (ECSR) state) and those where the proliferation and biased motion rules have been employed - even when such differences are not obvious to the naked eye. The pair-correlation function can also detect the emergence of a characteristic inter-aggregate distance which occurs when the biased motion mechanism is dominant, and is not observed when cell proliferation is the main mechanism of aggregate formation. This suggests that applying the pair-correlation function to experimental images of cell aggregates may provide information about the mechanism associated with observed aggregates. As a proof of concept, we perform such analysis for images of cancer cell aggregates, which are known to be associated with rapid proliferation. The results of our analysis are consistent with the predictions of the proliferation-based simulations, which supports the potential usefulness of pair correlation functions for providing insight into the mechanisms of aggregate formation.
Resumo:
The acceptance of broadband ultrasound attenuation for the assessment of osteoporosis suffers from a limited understanding of ultrasound wave propagation through cancellous bone. It has recently been proposed that the ultrasound wave propagation can be described by a concept of parallel sonic rays. This concept approximates the detected transmission signal to be the superposition of all sonic rays that travel directly from transmitting to receiving transducer. The transit time of each ray is defined by the proportion of bone and marrow propagated. An ultrasound transit time spectrum describes the proportion of sonic rays having a particular transit time, effectively describing lateral inhomogeneity of transit times over the surface of the receiving ultrasound transducer. The aim of this study was to provide a proof of concept that a transit time spectrum may be derived from digital deconvolution of input and output ultrasound signals. We have applied the active-set method deconvolution algorithm to determine the ultrasound transit time spectra in the three orthogonal directions of four cancellous bone replica samples and have compared experimental data with the prediction from the computer simulation. The agreement between experimental and predicted ultrasound transit time spectrum analyses derived from Bland–Altman analysis ranged from 92% to 99%, thereby supporting the concept of parallel sonic rays for ultrasound propagation in cancellous bone. In addition to further validation of the parallel sonic ray concept, this technique offers the opportunity to consider quantitative characterisation of the material and structural properties of cancellous bone, not previously available utilising ultrasound.
Resumo:
A SINGLE document was all it took to illuminate a dark secret in the Church of England. The two-page child protection report, unearthed by police in the archives of the diocese of Manchester, was proof, at last, that a former cathedral choirboy -- alleging years of sexual abuse by one of Britain's most senior clergyman -- was not alone. There was another boy. Also a solo soprano, on the other side of the world, who was singing from the same hymn sheet about The Very Reverend Robert Waddington. "There had been a previous referral about sexual impropriety some time ago from Australia, where RW had been the headmaster at a school. An ex-pupil had made a complaint to the Bishop of (north) Queensland who had relayed it to the Archbishop (of York)," the 2003 report says. Eli Ward's family had prompted the secret report when they told church officials, without Ward's knowledge, of the alleged abuse he suffered in the mid-1980s.
Resumo:
This paper describes the development of a novel vision-based autonomous surface vehicle with the purpose of performing coordinated docking manoeuvres with a target, such as an autonomous underwater vehicle, at the water's surface. The system architecture integrates two small processor units; the first performs vehicle control and implements a virtual force based docking strategy, with the second performing vision-based target segmentation and tracking. Furthermore, the architecture utilises wireless sensor network technology allowing the vehicle to be observed by, and even integrated within an ad-hoc sensor network. Simulated and experimental results are presented demonstrating the autonomous vision- based docking strategy on a proof-of-concept vehicle.
Resumo:
Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this work, we construct “Fuzzy” Identity Based Encryption from the hardness of the Learning With Errors (LWE) problem. We note that for our parameters, the underlying lattice problems (such as gapSVP or SIVP) are assumed to be hard to approximate within supexponential factors for adversaries running in subexponential time. We give CPA and CCA secure variants of our construction, for small and large universes of attributes. All our constructions are secure against selective-identity attacks in the standard model. Our construction is made possible by observing certain special properties that secret sharing schemes need to satisfy in order to be useful for Fuzzy IBE. We also discuss some obstacles towards realizing lattice-based attribute-based encryption (ABE).
Resumo:
We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in the construction is a family of lattices for which there are two distinct trapdoors for finding short vectors. One trapdoor enables the real system to generate short vectors in all lattices in the family. The other trapdoor enables the simulator to generate short vectors for all lattices in the family except for one. We extend this basic technique to an adaptively-secure IBE and a Hierarchical IBE.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.