902 resultados para GENERIC SIMPLICITY
Resumo:
This paper addresses the voltage rise constraints that are initiated from increased renewable generation resources in low voltage distribution networks. In this paper, an approach which is able to mitigate these voltage rise constraints and allow for increased distributed generator penetration is presented. The proposed approach involves utilizing the distribution transformers static tap changer to reduce the distribution feeder voltage setpoint. The proposed approach is modeled on a generic low voltage distribution network using the PSS SINCAL© simulation software package and is also implemented in a real low voltage distribution network to verify its practicality. Results indicate that this approach can be implemented to mitigate the voltage rise constraint and increase small-scale embedded generator penetration in a high proportion of low voltage feeders while avoiding any substantial network costs.
Resumo:
Paint Spray is developed as a direct sampling ionisation method for mass spectrometric analysis of additives in polymer-based surface coatings. The technique simply involves applying an external high voltage (5 kV) to the wetted sample placed in front of the mass spectrometer inlet and represents a much simpler ionisation technique compared to those currently available. The capabilities of Paint Spray are demonstrated herein with the detection of four commercially available hindered amine light stabilisers; TINUVIN® 770, TINUVIN® 292, TINUVIN® 123 and TINUVIN® 152 directly from thermoset polyester-based coil coatings. Paint Spray requires no sample preparation or pre-treatment and combined with its simplicity - requiring no specialised equipment - makes it ideal for use by non-specialists. The application of Paint Spray for industrial use has significant potential as sample collection from a coil coating production line and Paint Spray ionisation could enable fast quality control screening at high sensitivity.
Resumo:
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.
Resumo:
We offer an exposition of Boneh, Boyen, and Goh’s “uber-assumption” family for analyzing the validity and strength of pairing assumptions in the generic-group model, and augment the original BBG framework with a few simple but useful extensions.
Resumo:
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.
Resumo:
Motivation Awareness is an integral part of remote collaborative work and has been an important theme within the CSCW research. Our project aims at understanding and mediating non-verbal cues between remote participants involved in a design project. Research approach Within the AMIDA project we focus on distributed 'cooperative design' teams. We especially focus on the 'material' signals - signals in which people communicate through material artefacts, locations and their embodied actions. We apply an ethnographic approach to understand the role of physical artefacts in co-located naturalistic design setting. Based on the results we will generate important implications to support remote design work. We plan to develop a mixed-reality interface supported by a shared awareness display. This awareness display will provide information about the activities happening in the design room to remotely located participants. Findings/Design Our preliminary investigation with real-world design teams suggests that both the materiality of designers' work settings and their social practices play an important role in understanding these material signals that are at play. Originality/Value Most research supporting computer mediated communication have focused on either face-to-face or linguistically oriented communication paradigms. Our research focuses on mediating the non-verbal, material cues for supporting collaborative activities without impoverishing what designers do in their day to day working lives. Take away message An ethnographic approach allows us to understand the naturalistic practices of design teams, which can lead to designing effective technologies to support group work. In that respect, the findings of our research will have a generic value beyond the application domain chosen (design teams).
Resumo:
Numerous research studies have evaluated whether distance learning is a viable alternative to traditional learning methods. These studies have generally made use of cross-sectional surveys for collecting data, comparing distance to traditional learners with intent to validate the former as a viable educational tool. Inherent fundamental differences between traditional and distance learning pedagogies, however, reduce the reliability of these comparative studies and constrain the validity of analyses resulting from this analytical approach. This article presents the results of a research project undertaken to analyze expectations and experiences of distance learners with their degree programs. Students were given surveys designed to examine factors expected to affect their overall value assessment of their distance learning program. Multivariate statistical analyses were used to analyze the correlations among variables of interest to support hypothesized relationships among them. Focusing on distance learners overcomes some of the limitations with assessments that compare off- and on-campus student experiences. Evaluation and modeling of distance learner responses on perceived value for money of the distance education they received indicate that the two most important influences are course communication requirements, which had a negative effect, and course logistical simplicity, which revealed a positive effect. Combined, these two factors accounted for approximately 47% of the variability in perceived value for money of the educational program of sampled students. A detailed focus on comparing expectations with outcomes of distance learners complements the existing literature dominated by comparative studies of distance and nondistance learners.
Resumo:
The Brain Research Institute (BRI) uses various types of indirect measurements, including EEG and fMRI, to understand and assess brain activity and function. As well as the recovery of generic information about brain function, research also focuses on the utilisation of such data and understanding to study the initiation, dynamics, spread and suppression of epileptic seizures. To assist with the future focussing of this aspect of their research, the BRI asked the MISG 2010 participants to examine how the available EEG and fMRI data and current knowledge about epilepsy should be analysed and interpreted to yield an enhanced understanding about brain activity occurring before, at commencement of, during, and after a seizure. Though the deliberations of the study group were wide ranging in terms of the related matters considered and discussed, considerable progress was made with the following three aspects. (1) The science behind brain activity investigations depends crucially on the quality of the analysis and interpretation of, as well as the recovery of information from, EEG and fMRI measurements. A number of specific methodologies were discussed and formalised, including independent component analysis, principal component analysis, profile monitoring and change point analysis (hidden Markov modelling, time series analysis, discontinuity identification). (2) Even though EEG measurements accurately and very sensitively record the onset of an epileptic event or seizure, they are, from the perspective of understanding the internal initiation and localisation, of limited utility. They only record neuronal activity in the cortical (surface layer) neurons of the brain, which is a direct reflection of the type of electrical activity they have been designed to record. Because fMRI records, through the monitoring of blood flow activity, the location of localised brain activity within the brain, the possibility of combining fMRI measurements with EEG, as a joint inversion activity, was discussed and examined in detail. (3) A major goal for the BRI is to improve understanding about ``when'' (at what time) an epileptic seizure actually commenced before it is identified on an eeg recording, ``where'' the source of this initiation is located in the brain, and ``what'' is the initiator. Because of the general agreement in the literature that, in one way or another, epileptic events and seizures represent abnormal synchronisations of localised and/or global brain activity the modelling of synchronisations was examined in some detail. References C. M. Michel, G. Thut, S. Morand, A. Khateb, A. J. Pegna, R. Grave de Peralta, S. Gonzalez, M. Seeck and T. Landis, Electric source imaging of human brain functions, Brain Res. Rev. , 36 (2--3), 2001, 108--118. doi:10.1016/S0165-0173(01)00086-8 S. Ogawa, R. S. Menon, S. G. Kim and K. Ugurbil, On the characteristics of functional magnetic resonance imaging of the brain, Annu. Rev. Bioph. Biom. , 27 , 1998, 447--474. doi:10.1146/annurev.biophys.27.1.447 C. D. Binnie and H. Stefan, Modern electroencephalography: its role in epilepsy management, Clin. Neurophysiol. , 110 (10), 1999, 1671--1697. doi:10.1016/S1388-2457(99)00125-X J. X. Tao, A. Ray, S. Hawes-Ebersole and J. S. Ebersole, Intracranial eeg substrates of scalp eeg interictal spikes, Epilepsia , 46 (5), 2005, 669--76. doi:10.1111/j.1528-1167.2005.11404.x S. Ogawa, D. W. Tank, R. Menon, J. M. Ellermann, S. G. Kim, H. Merkle and K. Ugurbil, Intrinsic signal changes accompanying sensory stimulation: Functional brain mapping with magnetic resonance imaging, P. Natl. Acad. Sci. USA , 89 (13), 1992, 5951--5955. doi:10.1073/pnas.89.13.5951 J. Engel Jr., Report of the ilae classification core group, Epilepsia , 47 (9), 2006, 1558--1568. doi:10.1111/j.1528-1167.2006.00215.x L. Lemieux, A. Salek-Haddadi, O. Josephs, P. Allen, N. Toms, C. Scott, K. Krakow, R. Turner and D. R. Fish, Event-related fmri with simultaneous and continuous eeg: description of the method and initial case r port, NeuroImage , 14 (3), 2001, 780--7. doi:10.1006/nimg.2001.0853 P. Federico, D. F. Abbott, R. S. Briellmann, A. S. Harvey and G. D. Jackson, Functional mri of the pre-ictal state, Brain , 128 (8), 2005, 1811-7. doi:10.1093/brain/awh533 C. S. Hawco, A. P. Bagshaw, Y. Lu, F. Dubeau and J. Gotman, bold changes occur prior to epileptic spikes seen on scalp eeg, NeuroImage , 35 (4), 2007, 1450--1458. doi:10.1016/j.neuroimage.2006.12.042 F. Moeller, H. R. Siebner, S. Wolff, H. Muhle, R. Boor, O. Granert, O. Jansen, U. Stephani and M. Siniatchkin, Changes in activity of striato-thalamo-cortical network precede generalized spike wave discharges, NeuroImage , 39 (4), 2008, 1839--1849. doi:10.1016/j.neuroimage.2007.10.058 V. Osharina, E. Ponchel, A. Aarabi, R. Grebe and F. Wallois, Local haemodynamic changes preceding interictal spikes: A simultaneous electrocorticography (ecog) and near-infrared spectroscopy (nirs) analysis in rats, NeuroImage , 50 (2), 2010, 600--607. doi:10.1016/j.neuroimage.2010.01.009 R. S. Fisher, W. Boas, W. Blume, C. Elger, P. Genton, P. Lee and J. Engel, Epileptic seizures and epilepsy: Definitions proposed by the international league against epilepsy (ilae) and the international bureau for epilepsy (ibe), Epilepsia , 46 (4), 2005, 470--472. doi:10.1111/j.0013-9580.2005.66104.x H. Berger, Electroencephalogram in humans, Arch. Psychiat. Nerven. , 87 , 1929, 527--570. C. M. Michel, M. M. Murray, G. Lantz, S. Gonzalez, L. Spinelli and R. G. de Peralta, eeg source imaging, Clin. Neurophysiol. , 115 (10), 2004, 2195--2222. doi:10.1016/j.clinph.2004.06.001 P. L. Nunez and R. B. Silberstein, On the relationship of synaptic activity to macroscopic measurements: Does co-registration of eeg with fmri make sense?, Brain Topogr. , 13 (2), 2000, 79--96. doi:10.1023/A:1026683200895 S. Ogawa, T. M. Lee, A. R. Kay and D. W. Tank, Brain magnetic resonance imaging with contrast dependent on blood oxygenation, P. Natl. Acad. Sci. USA , 87 (24), 1990, 9868--9872. doi:10.1073/pnas.87.24.9868 J. S. Gati, R. S. Menon, K. Ugurbil and B. K. Rutt, Experimental determination of the bold field strength dependence in vessels and tissue, Magn. Reson. Med. , 38 (2), 1997, 296--302. doi:10.1002/mrm.1910380220 P. A. Bandettini, E. C. Wong, R. S. Hinks, R. S. Tikofsky and J. S. Hyde, Time course EPI of human brain function during task activation, Magn. Reson. Med. , 25 (2), 1992, 390--397. K. K. Kwong, J. W. Belliveau, D. A. Chesler, I. E. Goldberg, R. M. Weisskoff, B. P. Poncelet, D. N. Kennedy, B. E. Hoppelm, M. S. Cohen and R. Turner, Dynamic magnetic resonance imaging of human brain activity during primary sensory stimulation, P. Natl. Acad. Sci. USA , 89 (12), 1992, 5675--5679. doi:10.1073/pnas.89.12.5675 J. Frahm, K. D. Merboldt and W. Hnicke, Functional mri of human brain activation at high spatial resolution, Magn. Reson. Med. , 29 (1), 1993, 139--144. P. A. Bandettini, A. Jesmanowicz, E. C. Wong and J. S. Hyde, Processing strategies for time-course data sets in functional MRI of the human brain, Magn. Reson. Med. , 30 (2), 1993, 161--173. K. J. Friston, P. Jezzard and R. Turner, Analysis of functional MRI time-series, Hum. Brain Mapp. , 1 (2), 1994, 153--171. B. Biswal, F. Z. Yetkin, V. M. Haughton and J. S. Hyde, Functional connectivity in the motor cortex of resting human brain using echo-planar mri, Mag. Reson. Med. , 34 (4), 1995, 537--541. doi:10.1002/mrm.1910340409 K. J. Friston, J. Ashburner, C. D. Frith, J. Poline, J. D. Heather and R. S. J. Frackowiak, Spatial registration and normalization of images, Hum. Brain Mapp. , 3 (3), 1995, 165--189. K. J. Friston, S. Williams, R. Howard, R. S. Frackowiak and R. Turner, Movement-related effects in fmri time-series, Magn. Reson. Med. , 35 (3), 1996, 346--355. G. H. Glover, T. Q. Li and D. Ress, Image-based method for retrospective correction of physiological motion effects in fmri: Retroicor, Magn. Reson. Med. , 44 (1), 2000, 162--167. doi:10.1002/1522-2594(200007)44:13.0.CO;2-E K. J. Friston, O. Josephs, G. Rees and R. Turner, Nonlinear event-related responses in fmri, Magn. Reson. Med. , 39 (1), 1998, 41--52. doi:10.1002/mrm.1910390109 K. Ugurbil, L. Toth and D. Kim, How accurate is magnetic resonance imaging of brain function?, Trends Neurosci. , 26 (2), 2003, 108--114. doi:10.1016/S0166-2236(02)00039-5 D. S. Kim, I. Ronen, C. Olman, S. G. Kim, K. Ugurbil and L. J. Toth, Spatial relationship between neuronal activity and bold functional mri, NeuroImage , 21 (3), 2004, 876--885. doi:10.1016/j.neuroimage.2003.10.018 A. Connelly, G. D. Jackson, R. S. Frackowiak, J. W. Belliveau, F. Vargha-Khadem and D. G. Gadian, Functional mapping of activated human primary cortex with a clinical mr imaging system, Radiology , 188 (1), 1993, 125--130. L. Allison, Hidden Markov Models, Technical Report , School of Computer and Software Engineering, Monash University, 2000. R. J. Elliott, L. Aggoun and J.B. Moore, Hidden Markov Models: Estimation and Control, Appl. Math.-Czech. , 2004. B. Bhavnagri, Discontinuities of plane functions projected from a surface with methods for finding these , Technical Report, 2009. B. Bhavnagri, Computer Vision using Shape Spaces , Technical Report,1996, University of Adelaide. B. Bhavnagri, A method for representing shape based on an equivalence relation on polygons, Pattern Recogn. , 27 (2), 1994, 247--260. doi:10.1016/0031-3203(94)90057-4 D. F. Abbott, A. B. Waites, A. S. Harvey and G. D. Jackson, Exploring epileptic seizure onset with fmri, NeuroImage , 36(S1) (344TH-PM), 2007. M. C. Mackey and L. Glass, Oscillation and chaos in physiological control systems, Science , 197 , 1977, 287--289. S. H. Strogatz, SYNC - The Emerging Science of Spontaneous Order , Theia, New York, 2003. J. W. Kim, J. A. Roberts and P. A. Robinson, Dynamics of epileptic seizures: Evolution, spreading, and suppression, J. Theor. Biol. , 257 (4), 2009, 527--532. doi:10.1016/j.jtbi.2008.12.009 Y. Kuramoto, T. Aoyagi, I. Nishikawa, T. Chawanya T and K. Okuda, Neural network model carrying phase information with application to collective dynamics, J. Theor. Phys. , 87 (5), 1992, 1119--1126. V. B. Mountcastle, The columnar organization of the neocortex, Brain , 120 (4), 1997, 701. doi:10.1093/brain/120.4.701 F. L. Silva, W. Blanes, S. N. Kalitzin, J. Parra, P. Suffczynski and D. N. Velis, Epilepsies as dynamical diseases of brain systems: Basic models of the transition between normal and epileptic activity, Epilepsia , 44 (12), 2003, 72--83. F. H. Lopes da Silva, W. Blanes, S. N. Kalitzin, J. Parra, P. Suffczynski and D. N. Velis, Dynamical diseases of brain systems: different routes to epileptic seizures, ieee T. Bio-Med. Eng. , 50 (5), 2003, 540. L.D. Iasemidis, Epileptic seizure prediction and control, ieee T. Bio-Med. Eng. , 50 (5), 2003, 549--558. L. D. Iasemidis, D. S. Shiau, W. Chaovalitwongse, J. C. Sackellares, P. M. Pardalos, J. C. Principe, P. R. Carney, A. Prasad, B. Veeramani, and K. Tsakalis, Adaptive epileptic seizure prediction system, ieee T. Bio-Med. Eng. , 50 (5), 2003, 616--627. K. Lehnertz, F. Mormann, T. Kreuz, R.G. Andrzejak, C. Rieke, P. David and C. E. Elger, Seizure prediction by nonlinear eeg analysis, ieee Eng. Med. Biol. , 22 (1), 2003, 57--63. doi:10.1109/MEMB.2003.1191451 K. Lehnertz, R. G. Andrzejak, J. Arnhold, T. Kreuz, F. Mormann, C. Rieke, G. Widman and C. E. Elger, Nonlinear eeg analysis in epilepsy: Its possible use for interictal focus localization, seizure anticipation, and prevention, J. Clin. Neurophysiol. , 18 (3), 2001, 209. B. Litt and K. Lehnertz, Seizure prediction and the preseizure period, Curr. Opin. Neurol. , 15 (2), 2002, 173. doi:10.1097/00019052-200204000-00008 B. Litt and J. Echauz, Prediction of epileptic seizures, Lancet Neurol. , 1 (1), 2002, 22--30. doi:10.1016/S1474-4422(02)00003-0 M. M{a}kiranta, J. Ruohonen, K Suominen, J. Niinim{a}ki, E. Sonkaj{a}rvi, V. Kiviniemi, T. Sepp{a}nen, S. Alahuhta, V. J{a}ntti and O. Tervonen, {bold} signal increase preceeds eeg spike activity--a dynamic penicillin induced focal epilepsy in deep anesthesia, NeuroImage , 27 (4), 2005, 715--724. doi:10.1016/j.neuroimage.2005.05.025 K. Lehnertz, F. Mormann, H. Osterhage, A. M{u}ller, J. Prusseit, A. Chernihovskyi, M. Staniek, D. Krug, S. Bialonski and C. E. Elger, State-of-the-art of seizure prediction, J. Clin. Neurophysiol. , 24 (2), 2007, 147. doi:10.1097/WNP.0b013e3180336f16 F. Mormann, T. Kreuz, C. Rieke, R. G. Andrzejak, A. Kraskov, P. David, C. E. Elger and K. Lehnertz, On the predictability of epileptic seizures, Clin. Neurophysiol. , 116 (3), 2005, 569--587. doi:10.1016/j.clinph.2004.08.025 F. Mormann, R. G. Andrzejak, C. E. Elger and K. Lehnertz, Seizure prediction: the long and winding road, Brain , 130 (2), 2007, 314--333. doi:10.1093/brain/awl241 Z. Rogowski, I. Gath and E. Bental, On the prediction of epileptic seizures, Biol. Cybern. , 42 (1), 1981, 9--15. Y. Salant, I. Gath, O. Henriksen, Prediction of epileptic seizures from two-channel eeg, Med. Biol. Eng. Comput. , 36 (5), 1998, 549--556. doi:10.1007/BF02524422 J. Gotman and D.J. Koffler, Interictal spiking increases after seizures but does not after decrease in medication, Evoked Potential , 72 (1), 1989, 7--15. J. Gotman and M. G. Marciani, Electroencephalographic spiking activity, drug levels, and seizure occurence in epileptic patients, Ann. Neurol. , 17 (6), 1985, 59--603. A. Katz, D. A. Marks, G. McCarthy and S. S. Spencer, Does interictal spiking change prior to seizures?, Electroen. Clin. Neuro. , 79 (2), 1991, 153--156. A. Granada, R. M. Hennig, B. Ronacher, A. Kramer and H. Herzel, Phase Response Curves: Elucidating the dynamics of couples oscillators, Method Enzymol. , 454 (A), 2009, 1--27. doi:10.1016/S0076-6879(08)03801-9 doi:10.1016/S0076-6879(08)03801-9 H. Kantz and T. Schreiber, Nonlinear time series analysis , 2004, Cambridge Univ Press. M. V. L. Bennett and R. S Zukin, Electrical coupling and neuronal synchronization in the mammalian brain, Neuron , 41 (4), 2004, 495 --511. doi:10.1016/S0896-6273(04)00043-1 L.D. Iasemidis, J. Chris Sackellares, H. P. Zaveri and W. J. Williams, Phase space topography and the Lyapunov exponent of electrocorticograms in partial seizures, Brain Topogr. , 2 (3), 1990, 187--201. doi:10.1007/BF01140588 M. Le Van Quyen, J. Martinerie, V. Navarro, M. Baulac and F. J. Varela, Characterizing neurodynamic changes before seizures, J. Clin. Neurophysiol. , 18 (3), 2001, 191. J. Martinerie, C. Adam, M. Le Van Quyen, M. Baulac, S. Clemenceau, B. Renault and F. J. Varela, Epileptic seizures can be anticipated by non-linear analysis, Nat. Med. , 4 (10), 1998, 1173--1176. doi:10.1038/2667 A. Pikovsky, M. Rosenblum, J. Kurths and R. C. Hilborn, Synchronization: A universal concept in nonlinear science, Amer. J. Phys. , 70 , 2002, 655. H. R. Wilson and J. D. Cowan, Excitatory and inhibitory interactions in localized populations of model neurons, Biophys. J. , 12 (1), 1972, 1--24. D. Cumin and C. P. Unsworth, Generalising the Kuramoto model for the study of neuronal synchronisation in the brain, Physica D , 226 (2), 2007, 181--196. doi:10.1016/j.physd.2006.12.004 F. K. Skinner, H. Bazzazi and S. A. Campbell, Two-cell to N-cell heterogeneous, inhibitory networks: Precise linking of multistable and coherent properties, J. Comput. Neurosci. , 18 (3), 2005, 343--352. doi:10.1007/s10827-005-0331-1 W. W. Lytton, Computer modelling of epilepsy, Nat. Rev. Neurosci. , 9 (8), 2008, 626--637. doi:10.1038/nrn2416 R. D. Traub, A. Bibbig, F. E. N. LeBeau, E. H. Buhl and M. A. Whittington, Cellular mechanisms of neuronal population oscillations in the hippocampus in vitro, Ann. Rev. , 2004. R. D. Traub, A. Draguhn, M. A. Whittington, T. Baldeweg, A. Bibbig, E. H. Buhl and D. Schmitz, Axonal gap junc ions between principal neurons: A novel source of network oscillations, and perhaps epileptogenesis., Rev. Neuroscience , 13 (1), 2002, 1. doi:10.1146/annurev.neuro.27.070203.144303 M. Scheffer, J. Bascompte, W. A. Brock, V. Brovkin, S. R. Carpenter, V. Dakos, H. Held, E. H. van Nes, M. Rietkerk and G. Sugihara, Early-warning signals for critical transitions, Nature , 461 (7260), 2009, 53--59. doi:10.1038/nature08227 K. Murphy, A Brief Introduction to Graphical Models and Bayesian Networks , 2008, http://www.cs.ubc.ca/murphyk/Bayes/bnintro.html . R. C. Bradley, An elementary
Resumo:
We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giant-step algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human identification protocols in the literature is further reduced. We show that our protocol preserves similar usability while achieves better security than these protocols. A comprehensive security analysis is provided which suggests parameters guaranteeing desired levels of security.
Resumo:
Bandwidths and offsets are important components in vehicle traffic control strategies. This article proposes new methods for quantifying and selecting them. Bandwidth is the amount of green time available for vehicles to travel through adjacent intersections without the requirement to stop at the second traffic light. The offset is the difference between the starting-time of ``green'' periods at two adjacent intersections, along a given route. The core ideas in this article were developed during the 2013 Maths and Industry Study Group in Brisbane, Australia. Analytical expressions for computing bandwidth, as a function of offset, are developed. An optimisation model, for selecting offsets across an arterial, is proposed. Arterial roads were focussed upon, as bandwidth and offset have a greater impact on these types of road as opposed to a full traffic network. A generic optimisation-simulation approach is also proposed to refine an initial starting solution, according to a specified metric. A metric that reflects the number of stops, and the distance between stops, is proposed to explicitly reduce the dissatisfaction of road users, and to implicitly reduce fuel consumption and emissions. Conceptually the optimisation-simulation approach is superior as it handles real-life complexities and is a global optimisation approach. The models and equations in this article can be used in road planning and traffic control.
Resumo:
Nuclei and electrons in condensed matter and/or molecules are usually entangled, due to the prevailing (mainly electromagnetic) interactions. However, the "environment" of a microscopic scattering system (e.g. a proton) causes ultrafast decoherence, thus making atomic and/or nuclear entanglement e®ects not directly accessible to experiments. However, our neutron Compton scattering experiments from protons (H-atoms) in condensed systems and molecules have a characteristic collisional time about 100|1000 attoseconds. The quantum dynamics of an atom in this ultrashort, but ¯nite, time window is governed by non-unitary time evolution due to the aforementioned decoherence. Unexpectedly, recent theoretical investigations have shown that decoherence can also have the following energetic consequences. Disentangling two subsystems A and B of a quantum system AB is tantamount to erasure of quantum phase relations between A and B. This erasure is widely believed to be an innocuous process, which e.g. does not a®ect the energies of A and B. However, two independent groups proved recently that disentangling two systems, within a su±ciently short time interval, causes increase of their energies. This is also derivable by the simplest Lindblad-type master equation of one particle being subject to pure decoherence. Our neutron-proton scattering experiments with H2 molecules provide for the first time experimental evidence of this e®ect. Our results reveal that the neutron-proton collision, leading to the cleavage of the H-H bond in the attosecond timescale, is accompanied by larger energy transfer (by about 2|3%) than conventional theory predicts. Preliminary results from current investigations show qualitatively the same e®ect in the neutron-deuteron Compton scattering from D2 molecules. We interpret the experimental findings by treating the neutron-proton (or neutron-deuteron) collisional system as an entangled open quantum system being subject to fast decoherence caused by its "environment" (i.e., two electrons plus second nucleus of H2 or D2). The presented results seem to be of generic nature, and may have considerable consequences for various processes in condensed matter and molecules, e.g. in elementary chemical reactions.