880 resultados para Conference on Security, Stability, Development, and Cooperation in Africa (1992)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Existing algebraic analyses of the ZUC cipher indicate that the cipher should be secure against algebraic attacks. In this paper, we present an alternative algebraic analysis method for the ZUC stream cipher, where a combiner is used to represent the nonlinear function and to derive equations representing the cipher. Using this approach, the initial states of ZUC can be recovered from 2^97 observed words of keystream, with a complexity of 2^282 operations. This method is more successful when applied to a modified version of ZUC, where the number of output words per clock is increased. If the cipher outputs 120 bits of keystream per clock, the attack can succeed with 219 observed keystream bits and 2^47 operations. Therefore, the security of ZUC against algebraic attack could be significantly reduced if its throughput was to be increased for efficiency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Camp Kilda (CK) is regarded as being a quality early childhood center, and has many features you would typically expect to see in settings across Australia. The children are busily engaged in hands-on activity, playing indoors and outdoors, in the sandpit, under the shade of a big mango tree. The learning environment is planned to offer a variety of activities, including dramatic play, climbing equipment, balls, painting, drawing, clay, books, blocks, writing materials, scissors, manipulative materials. The children are free to access all the materials, and they play either individually or in small groups. The teachers encourage and stimulate the children’s learning, through interactions and thoughtful planning. Learning and assessment at CK is embedded within the cultural and social contexts of the children and their community. Children’s learning is made visible through a rich variety of strategies, including recorded observations, work samples, photographs, and other artifacts. Parents are actively encouraged to build on these “stories” of their children. Planning is based around the teachers’ analysis of the information they gather daily as they interact with the children and their families.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aim: Competency standards support a range of professional activities including the accreditation of university courses. Reviewing these standards is essential to ensure universities continue to produce well equipped graduates, who can meet the challenge of changing workforce requirements. This paper has two aims: a) to provide an overview of the methodological approaches utilised for compilation and review of the Competency Standards for Dietetics and b) to evaluate the Dietitians Association of Australia’s Competency Standards and capture emerging and contemporary dietetic practice. Methods: A literature review of the methods used to develop Competency Standards for dietitians in Australia, including entry level, advanced level and DAA Fellow competencies and other specific areas of competency, such as public health nutrition and nutrition education is outlined and compared to other allied health professions. The mixed methods methodology used in the most recent review is described in more detail. Results: The history of Dietetic Competency Standards development and review in Australia is compared to dietetic Competency Standards internationally and within other health professions in Australia. The political context in which these standards have been developed in Australia and which has determined their format is also discussed. The results of the most recent Competency Standards review are reported to highlight emerging practice in Australia. Conclusion: The mixed methods approach used in this review provides rich data about contemporary dietetic practice. Our view supports a planned review of all Competency Standards to ensure practice informs education and credentialling and we recommend the Dietitians Association of Australia consider this in future

Relevância:

100.00% 100.00%

Publicador:

Resumo:

RC4(n, m) is a stream cipher based on RC4 and is designed by G. Gong et al. It can be seen as a generalization of the famous RC4 stream cipher designed by Ron Rivest. The authors of RC4(n, m) claim that the cipher resists all the attacks that are successful against the original RC4. The paper reveals cryptographic weaknesses of the RC4(n, m) stream cipher. We develop two attacks. The first one is based on non-randomness of internal state and allows to distinguish it from a truly random cipher by an algorithm that has access to 24·n bits of the keystream. The second attack exploits low diffusion of bits in the KSA and PRGA algorithms and recovers all bytes of the secret key. This attack works only if the initial value of the cipher can be manipulated. Apart from the secret key, the cipher uses two other inputs, namely, initial value and initial vector. Although these inputs are fixed in the cipher specification, some applications may allow the inputs to be under the attacker control. Assuming that the attacker can control the initial value, we show a distinguisher for the cipher and a secret key recovery attack that for the L-bit secret key, is able to recover it with about (L/n) · 2n steps. The attack has been implemented on a standard PC and can reconstruct the secret key of RC(8, 32) in less than a second.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The concept of affordance has different interpretations in the field of Human-Computer Interaction (HCI). However, its treatment has been merely as a one-to-one relationship between a user and a technology. We believe that a broader view of affordances is needed which encompasses social and cultural aspects of our everyday life. We propose an interaction-centered view of affordance that can be useful for developing better understandings of designed artefacts. An interaction-centered view of affordance suggests that affordance is an interpretative relationship between users and the technology that emerges during the users' interaction with the technology in the lived environments. We distinguish two broad classes of affordances: affordance in Information and affordance in Articulation. Affordance in information refers to users' understanding of a technology based on their semantic and syntactic interpretation; and affordance in articulation refers to users' interpretations about the use of the technology. We also argue that the notion of affordance should be treated at two levels: at the 'artefact level' and at the 'practice level'. Consequently, we provide two examples to demonstrate our arguments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As the current computing systems move from desktop and work settings into our everyday lives (e.g. mobile and ubiquitous systems) a growing interest is seen for designing interactive systems with experiential support. Some conceptual work already exists that tries to analyze and understand users? experience with interactive systems but in practice this is still not frequently used. Drawing on the concepts from the domain of art, this paper introduces a way to conceptualize users? experience as the meanings or interpretations they construct during their interaction with or through the interactive systems. We consequently apply this conceptualization in a design project where we use it at an early concept design stage for designing aware technologies in care-taking situations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper critically examines research on consumer attitudes and behavior towards solar photovoltaic (PV) and renewable energy technology in Australia. The uptake of renewable energy technology by residential consumers in Australia in the past decade has transformed the electricity supply and demand paradigm. Thus, this paper reviews Australian research on consumer behavior, understanding and choices in order to identify gaps in knowledge. As the role of the consumer transforms there is a critical need to understand the ways consumers may respond to future energy policies to mitigate unforeseen negative social and economic consequence of programs designed to achieve positive environmental outcomes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

High-stakes testing is changing what it means to be a ‘good teacher’ in the contemporary school. This paper uses Deleuze and Guattari's ideas on the control society and dividuation in the context of National Assessment Program Literacy and Numeracy (NAPLAN) testing in Australia to suggest that the database generates new understandings of the ‘good teacher’. Media reports are used to look at how teachers are responding to the high-stakes database through manipulating the data. This article argues that manipulating the data is a regrettable, but logical, response to manifestations of teaching where only the data counts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a model study to understand the effect of surfactants on the physicochemical properties of human hair. FT-IR ATR spectroscopy has been employed to understand the chemical changes induced by sodium dodecyl sulfate (SDS) on human scalp hair. In particular, the SDS induced changes in the secondary structure of protein present in the outer protective layer of hair, i.e. cuticle, have been investigated. Conformational changes in the secondary structure of protein were studied by curve fitting of the amide I band after every phase of SDS treatment. It has been found that SDS brings rearrangements in the protein backbone conformations by transforming beta-sheet structure to random coil and beta-turn. Additionally, AFM and SEM studies were carried out to understand the morphological changes induced on the hair surface. SEM and AFM images demonstrated the rupture and partial erosion of cuticle sublayers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

CuO nanowires are synthesized by heating Cu foil, rod and grid in ambient without employing a catalyst or gas flow at temperatures ranging from 400 to 800 degrees C for a duration of 1-12 h. Scanning electron microscopy (SEM) investigation reveals the formation of nanowires. The structure, morphology and phase of the as-synthesized nanowires are analyzed by various techniques such as X-ray diffraction (XRD), transmission electron microscopy (TEM), X-ray photoelectron spectroscopy (XPS), thermogravimetric analysis (TGA) and Fourier transform infrared spectroscopy (FTIR). It is found that these nanowires are composed of CuO phase and the underlying film is of Cu2O. A systematic study is carried out to find the possibilities for the transformation of one phase to another completely. A possible growth mechanism for the nanowires is also discussed. (C) 2011 Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware signatures to detect such cyber attacks. These signatures are represented using Regular Expressions (REs) and strings. Regular Expressions, because of their higher expressive power, are preferred over simple strings to write these signatures. We present Cascaded Automata Architecture to perform memory efficient Regular Expression pattern matching using existing string matching solutions. The proposed architecture performs two stage Regular Expression pattern matching. We replace the substring and character class components of the Regular Expression with new symbols. We address the challenges involved in this approach. We augment the Word-based Automata, obtained from the re-written Regular Expressions, with counter-based states and length bound transitions to perform Regular Expression pattern matching. We evaluated our architecture on Regular Expressions taken from Snort rulesets. We were able to reduce the number of automata states between 50% to 85%. Additionally, we could reduce the number of transitions by a factor of 3 leading to further reduction in the memory requirements.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fisheries technical staff from the North West Central Area of the National Rivers Authority (NRA) currently provide a service for the ageing of salmon scales from fish caught by anglers on the Rivers Ribble and Hodder in order to gather information on the biological characteristics of the salmon population on the River Ribble system in terms of weight, freshwater age and sea age. At the beginning of each fishing season, scale envelopes are distributed by the NRA to angling clubs and some individual anglers. Scales taken from salmon caught on the rivers are returned to the NRA Central Area Office by the anglers, or more often, by NRA bailiffs. The age of each fish caught is then determined by the identification and counting of annuli for both the river and sea zones on the scale. Information is provided by the angler on the scale packet concerning the length and weight of the fish caught, and the date, location and method of capture. Both this information and the age of the fish is recorded on a database. These data can be used to investigate the distribution, and exploitation patterns of the different age classes of the salmon stock within the river system. This report is principally concerned with the scale samples received in 1994, although comparison is also made with samples from 1993 and 1992. References to data will all relate to that received in 1994 unless an alternate year is stated.