946 resultados para Key Agreement Protocol


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cell migration is a behaviour critical to many key biological effects, including wound healing, cancerous cell invasion and morphogenesis, the development of an organism from an embryo. However, given that each of these situations is distinctly different and cells are extremely complicated biological objects, interest lies in more basic experiments which seek to remove conflating factors and present a less complex environment within which cell migration can be experimentally examined. These include in vitro studies like the scratch assay or circle migration assay, and ex vivo studies like the colonisation of the hindgut by neural crest cells. The reduced complexity of these experiments also makes them much more enticing as problems to mathematically model, like done here. The primary goal of the mathematical models used in this thesis is to shed light on which cellular behaviours work to generate the travelling waves of invasion observed in these experiments, and to explore how variations in these behaviours can potentially predict differences in this invasive pattern which are experimentally observed when cell types or chemical environment are changed. Relevant literature has already identified the difficulty of distinguishing between these behaviours when using traditional mathematical biology techniques operating on a macroscopic scale, and so here a sophisticated individual-cell-level model, an extension of the Cellular Potts Model (CPM), is been constructed and used to model a scratch assay experiment. This model includes a novel mechanism for dealing with cell proliferations that allowed for the differing properties of quiescent and proliferative cells to be implemented into their behaviour. This model is considered both for its predictive power and used to make comparisons with the travelling waves which result in more traditional macroscopic simulations. These comparisons demonstrate a surprising amount of agreement between the two modelling frameworks, and suggest further novel modifications to the CPM that would allow it to better model cell migration. Considerations of the model’s behaviour are used to argue that the dominant effect governing cell migration (random motility or signal-driven taxis) likely depends on the sort of invasion demonstrated by cells, as easily seen by microscopic photography. Additionally, a scratch assay simulated on a non-homogeneous domain consisting of a ’fast’ and ’slow’ region is also used to further differentiate between these different potential cell motility behaviours. A heterogeneous domain is a novel situation which has not been considered mathematically in this context, nor has it been constructed experimentally to the best of the candidate’s knowledge. Thus this problem serves as a thought experiment used to test the conclusions arising from the simulations on homogeneous domains, and to suggest what might be observed should this non-homogeneous assay situation be experimentally realised. Non-intuitive cell invasion patterns are predicted for diffusely-invading cells which respond to a cell-consumed signal or nutrient, contrasted with rather expected behaviour in the case of random-motility-driven invasion. The potential experimental observation of these behaviours is demonstrated by the individual-cell-level model used in this thesis, which does agree with the PDE model in predicting these unexpected invasion patterns. In the interest of examining such a case of a non-homogeneous domain experimentally, some brief suggestion is made as to how this could be achieved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cell trajectory data is often reported in the experimental cell biology literature to distinguish between different types of cell migration. Unfortunately, there is no accepted protocol for designing or interpreting such experiments and this makes it difficult to quantitatively compare different published data sets and to understand how changes in experimental design influence our ability to interpret different experiments. Here, we use an individual based mathematical model to simulate the key features of a cell trajectory experiment. This shows that our ability to correctly interpret trajectory data is extremely sensitive to the geometry and timing of the experiment, the degree of motility bias and the number of experimental replicates. We show that cell trajectory experiments produce data that is most reliable when the experiment is performed in a quasi 1D geometry with a large number of identically{prepared experiments conducted over a relatively short time interval rather than few trajectories recorded over particularly long time intervals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Trust is widely recognised as one of the key qualities that a successful leader needs to bring about change within their organization. Browning’s study aimed to identify practices which a school leader can effectively use to inspire, build, and maintain trust between themselves, their staff and Chair of governing body. The study was undertaken in two phases. Phase One was the identification of four highly trusted transformational leaders from the Australian independent schooling sector. Phase Two was a multicase study of the four school leaders. The findings provide practical advice for school leaders wishing to have a positive impact on the outcomes of the students in their school.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dedicated Short Range Communication (DSRC) is the emerging key technology supporting cooperative road safety systems within Intelligent Transportation Systems (ITS). The DSRC protocol stack includes a variety of standards such as IEEE 802.11p and SAE J2735. The effectiveness of the DSRC technology depends on not only the interoperable cooperation of these standards, but also on the interoperability of DSRC devices manufactured by various manufacturers. To address the second constraint, the SAE defines a message set dictionary under the J2735 standard for construction of device independent messages. This paper focuses on the deficiencies of the SAE J2735 standard being developed for deployment in Vehicular Ad-hoc Networks (VANET). In this regard, the paper discusses the way how a Basic Safety Message (BSM) as the fundamental message type defined in SAE J2735 is constructed, sent and received by safety communication platforms to provide a comprehensive device independent solution for Cooperative ITS (C-ITS). This provides some insight into the technical knowledge behind the construction and exchange of BSMs within VANET. A series of real-world DSRC data collection experiments was conducted. The results demonstrate that the reliability and throughput of DSRC highly depend on the applications utilizing the medium. Therefore, an active application-dependent medium control measure, using a novel message-dissemination frequency controller, is introduced. This application level message handler improves the reliability of both BSM transmissions/receptions and the Application layer error handling which is extremely vital to decentralized congestion control (DCC) mechanisms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Gestational diabetes mellitus (GDM) is increasing, along with obesity and type 2 diabetes (T2DM), with Aboriginal and Torres Strait Islander people* in Australia particularly affected. GDM causes serious complications in pregnancy, birth, and the longer term, for both women and their infants. Women diagnosed with GDM have an eightfold risk of developing T2DM after pregnancy, compared with women who have not had GDM. Indigenous women have an even higher risk, at a younger age, and progress more quickly from GDM to T2DM, compared to non-Indigenous women. If left undetected and untreated, T2DM can lead to heart disease, stroke, renal disease, kidney failure, amputations and blindness. A GDM diagnosis offers a ‘window of opportunity’ for diabetes health interventions and it is vital that acceptable and effective prevention, treatment, and post-pregnancy care are provided. Low rates of post-pregnancy screening for T2DM are reported among non-Aboriginal women in Australia and among Indigenous women in other countries, however data for Aboriginal women are scarce. Breastfeeding, a healthy diet, and exercise can also help to prevent T2DM, and together with T2DM screening are recommended elements of ‘post-pregnancy care’ for women with GDM, This paper describes methods for a data linkage study to investigate rates of post-pregnancy care among women with GDM. Methods/Design: This retrospective cohort includes all women who gave birth at Cairns Base Hospital in Far North Queensland, Australia, from 2004 to 2010, coded as having GDM in the Cairns Base Hospital Clinical Coding system. Data linkage is being conducted with the Queensland Perinatal Data Collection, and three laboratories. Hospital medical records are being reviewed to validate the accuracy of GDM case ascertainment, and gather information on breastfeeding and provision of dietary advice. Multiple logistic regression is being used to compare post-pregnancy care between Aboriginal and non-Aboriginal women, while adjusting for other factors may impact on post-pregnancy care. Survival analysis is being used to estimate the rates of progression from GDM to T2DM. Discussion: There are challenges to collecting post-pregnancy data for women with GDM. However, research is urgently needed to ensure adequate post-pregnancy care is provided for women with GDM in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key derivation function is used to generate one or more cryptographic keys from a private (secret) input value. This paper proposes a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the underlying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream finalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article presents a study which investigated the reasons why advice related to the removal of mats or rags by older people with visual impairments had a low rate of acceptance. The researchers speculated that it may have been due to older people's need to maintain a sense of control and autonomy and to arrange their environments in a way that they decided or a belief that the recommended modification would not reduce the risk of falling. A telephone survey of subsample of the participants was conducted in the Visually Impaired Persons (VIP) Trial. All 30 interviewees had rugs or mats in their homes. Of the 30 participants, 20 had moved the rugs or mats as a result of recommendations, and 10 had not.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Review question/objective What is the effect of using the teach-back method for health education to improve adherence to treatment regimen and self-management in chronic disease? Inclusion criteria Types of participants This review will consider all studies that include adult patients (aged 18 years and over) in any healthcare setting, either as inpatients (eg acute care, medical and surgical wards) or those who attend primary health care, family medical practice, general medical practice, clinics, outpatient departments, rehabilitation or community settings. Participants need to have been diagnosed as having one or more chronic diseases including heart failure, diabetes, cardiovascular disease, cancer, respiratory disease, asthma, chronic obstructive pulmonary disease, chronic kidney disease, arthritis, epilepsy or a mental health condition. Studies that include seriously ill patients, and/or those who have impairments in verbal communication and cognitive function will be excluded. Types of intervention This review will consider studies that investigate the use of the teach-back method alone or in combination with other supporting education, either in routine or research intervention education programs; regardless of how long the programs were and whether or not a follow-up was conducted. The intervention could be delivered by any healthcare professional. The comparator will be any health education for chronic disease that does not include the teach-back method. Types of outcomes Primary outcomes of interest are disease-specific knowledge, adherence, and self-management knowledge, behavior and skills measured using patient report, nursing observation or validated measurement scales. Secondary outcomes include knowledge retention, self-efficacy, hospital readmission, hospitalization, and quality of life, also measured using patient report, nursing observation, hospital records or validated measurement scales.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This series of research vignettes is aimed at sharing current and interesting research findings from our team of international Entrepreneurship researchers. This vignette, written by Professor Per Davidsson, reports on a paper which synthesizes available research on the effects of VC funding on the performance of the funded firm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is an increasing interest in the use of information technology as a participatory planning tool, particularly the use of geographical information technologies to support collaborative activities such as community mapping. However, despite their promise, the introduction of such technologies does not necessarily promote better participation nor improve collaboration. In part this can be attributed to a tendency for planners to focus on the technical considerations associated with these technologies at the expense of broader participation considerations. In this paper we draw on the experiences of a community mapping project with disadvantaged communities in suburban Australia to highlight the importance of selecting tools and techniques which support and enhance participatory planning. This community mapping project, designed to identify and document community-generated transport issues and solutions, had originally intended to use cadastral maps extracted from the government’s digital cadastral database as the foundation for its community mapping approach. It was quickly discovered that the local residents found the cadastral maps confusing as the maps lacked sufficient detail to orient them to their suburb (the study area). In response to these concerns and consistent with the project’s participatory framework, a conceptual base map based on resident’s views of landmarks of local importance was developed to support the community mapping process. Based on this community mapping experience we outline four key lessons learned regarding the process of community mapping and the place of geographical information technologies within this process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the effects (benefits and harms) of whole-body cryotherapy (cold air exposure) for preventing and treating muscle soreness after exercise in adults." -- publisher website

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background The prevalence of type 2 diabetes is rising internationally. Patients with diabetes have a higher risk of cardiovascular events accounting for substantial premature morbidity and mortality, and health care expenditure. Given healthcare workforce limitations, there is a need to improve interventions that promote positive self-management behaviours that enable patients to manage their chronic conditions effectively, across different cultural contexts. Previous studies have evaluated the feasibility of including telephone and Short Message Service (SMS) follow up in chronic disease self-management programs, but only for single diseases or in one specific population. Therefore, the aim of this study is to evaluate the feasibility and short-term efficacy of incorporating telephone and text messaging to support the care of patients with diabetes and cardiac disease, in Australia and in Taiwan. Methods/design A randomised controlled trial design will be used to evaluate a self-management program for people with diabetes and cardiac disease that incorporates the use of simple remote-access communication technologies. A sample size of 180 participants from Australia and Taiwan will be recruited and randomised in a one-to-one ratio to receive either the intervention in addition to usual care (intervention) or usual care alone (control). The intervention will consist of in-hospital education as well as follow up utilising personal telephone calls and SMS reminders. Primary short term outcomes of interest include self-care behaviours and self-efficacy assessed at baseline and four weeks. Discussion If the results of this investigation substantiate the feasibility and efficacy of the telephone and SMS intervention for promoting self management among patients with diabetes and cardiac disease in Australia and Taiwan, it will support the external validity of the intervention. It is anticipated that empirical data from this investigation will provide valuable information to inform future international collaborations, while providing a platform for further enhancements of the program, which has potential to benefit patients internationally.