968 resultados para Edward Castaneda
Resumo:
Aim: This paper is a report of a study to explore the phenomenon of resilience in the lives of adult patients of mental health services who have experienced mental illness. ---------- Background: Mental illness is a major health concern worldwide, and the majority experiencing it will continue to battle with relapses throughout their lives. However, in many instances people go on to overcome their illness to lead productive and socially engaged lives. Contemporary mental health nursing practice primarily focuses on symptom reduction, and working with resilience has not generally been a consideration. ---------- Method: A descriptive phenomenological study was carried out in 2006. One participant was recruited through advertisements in community newspapers and newsletters and the others using the snowballing method. Information was gathered through in-depth individual interviews which were tape-recorded and subsequently transcribed. Colaizzi's original seven-step approach was used for data analysis, with the inclusion of two additional steps. ---------- Findings: The following themes were identified: Universality, Acceptance, Naming and knowing, Faith, Hope, Being the fool and Striking a balance, Having meaning and meaningful relationships, and 'Just doing it'. The conceptualization identified as encapsulating the themes was 'Viewing life from the ridge with eyes wide open', which involved knowing the risks and dangers ahead and making a decision for life amid ever-present hardships. ---------- Conclusion: Knowledge about resilience should be included in the theoretical and practical education of nursing students and experienced nurses. Early intervention, based on resilience factors identified through screening processes, is needed for people with mental illness.
Resumo:
This paper examines the algebraic cryptanalysis of small scale variants of the LEX-BES. LEX-BES is a stream cipher based on the Advanced Encryption Standard (AES) block cipher. LEX is a generic method proposed for constructing a stream cipher from a block cipher, initially introduced by Biryukov at eSTREAM, the ECRYPT Stream Cipher project in 2005. The Big Encryption System (BES) is a block cipher introduced at CRYPTO 2002 which facilitates the algebraic analysis of the AES block cipher. In this paper, experiments were conducted to find solution of the equation system describing small scale LEX-BES using Gröbner Basis computations. This follows a similar approach to the work by Cid, Murphy and Robshaw at FSE 2005 that investigated algebraic cryptanalysis on small scale variants of the BES. The difference between LEX-BES and BES is that due to the way the keystream is extracted, the number of unknowns in LEX-BES equations is fewer than the number in BES. As far as the author knows, this attempt is the first at creating solvable equation systems for stream ciphers based on the LEX method using Gröbner Basis computations.
Resumo:
Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for authentication mechanisms. They consist of a Linear Feedback Shift Register (LFSR) and a nonlinear Boolean function to mask the linearity of the LFSR output. Properties of the output of a nonlinear filter are not well studied. Anderson noted that the m-tuple output of a nonlinear filter with consecutive taps to the filter function is unevenly distributed. Current designs use taps which are not consecutive. We examine m-tuple outputs from nonlinear filter generators constructed using various LFSRs and Boolean functions for both consecutive and uneven (full positive difference sets where possible) tap positions. The investigation reveals that in both cases, the m-tuple output is not uniform. However, consecutive tap positions result in a more biased distribution than uneven tap positions, with some m-tuples not occurring at all. These biased distributions indicate a potential flaw that could be exploited for cryptanalysis.
Resumo:
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users’ access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer from the assumption that users will (can) not depart from the expected behaviour implicit in the authorisation policy. In reality however, users can and do depart from the canonical behaviour. This paper argues that the conflict of interest between insiders and authorisation mechanisms is analogous to the subset of problems formally studied in the field of game theory. It proposes a game theoretic authorisation model that can ensure users’ potential misuse of a resource is explicitly considered while making an authorisation decision. The resulting authorisation model is dynamic in the sense that its access decisions vary according to the changes in explicit factors that influence the cost of misuse for both the authorisation mechanism and the insider.
Resumo:
The focus of this paper questions how the performance place was transformed to a performance space. This major change in distinction holds an ongoing significance to the development of the actors, scenographers, animators, writers and film directors craft within current digitally mediated and interactive performance environments. As part of this discussion this paper traces the crucial seed of the revolution that transformed modern scenographic practice from the droll of the romantic realism of the Victorian stage to the open potential of the performance environment of today. This is achieved through close readings on the practical work of Edward Gordon Craig and Adolphe Appia as well as the scenographic discussions of Chris Baugh.
Resumo:
Presentation on intelligent transport systems profects and traffic engineering,simulation and modelling by QUT researchers
Resumo:
A software tool (DRONE) has been developed to evaluate road traffic noise in a large area with the consideration of network dynamic traffic flow and the buildings. For more precise estimation of noise in urban network where vehicles are mainly in stop and go running conditions, vehicle sound power level (for acceleration/deceleration cruising and ideal vehicle) is incorporated in DRONE. The calculation performance of DRONE is increased by evaluating the noise in two steps of first estimating the unit noise database and then integrating it with traffic simulation. Details of the process from traffic simulation to contour maps are discussed in the paper and the implementation of DRONE on Tsukuba city is presented