931 resultados para key schedule
Resumo:
The replacement of the European Union (EU) Clinical Trials Directive by the new Clinical Trials Regulation (CTR), which entered into force on 16 June 2014 but will not apply before 28 May 2016, provides an opportunity to review the legal and political context within which this important aspect of research law and policy sits and to reflect on the implications for public health. My aim in this article is to relate the context to the key purposes and aims of EU law and policy on clinical trials in order to explain and clarify its orientation. On that basis, I argue that the CTR and the changes it introduces to the law on clinical trials are part of the EU's continued focus on market optimisation. It is this focus that orients and directs the wider pharmaceutical development pipeline, but that undermines the achievement of key public health objectives.
Resumo:
The ability to exchange keys between users is vital in any wireless based security system. A key generation technique which exploits the randomness of the wireless channel is a promising alternative to existing key distribution techniques, e.g., public key cryptography. In this paper, a secure key generation scheme based on the subcarriers' channel responses in orthogonal frequency-division multiplexing (OFDM) systems is proposed. We first implement a time-variant multipath channel with its channel impulse response modelled as a wide sense stationary (WSS) uncorrelated scattering random process and demonstrate that each subcarrier's channel response is also a WSS random process. We then define the X% coherence time as the time required to produce an X% correlation coefficient in the autocorrelation function (ACF) of each channel tap, and find that when all the channel taps have the same Doppler power spectrum, all subcarriers' channel responses has the same ACF as the channel taps. The subcarrier's channel response is then sampled every X% coherence time and quantized into key bits. All the key sequences' randomness is tested using National Institute of Standards and Technology (NIST) statistical test suite and the results indicate that the commonly used sampling interval as 50% coherence time cannot guarantee the randomness of the key sequence.
Resumo:
Acute rheumatic fever (ARF) and rheumatic heart disease (RHD) remain major causes of heart failure, stroke and death among African women and children, despite being preventable and imminently treatable. From 21 to 22 February 2015, the Social Cluster of the Africa Union Commission (AUC) hosted a consultation with RHD experts convened by the Pan-African Society of Cardiology (PASCAR) in Addis Ababa, Ethiopia, to develop a 'roadmap' of key actions that need to be taken by governments to eliminate ARF and eradicate RHD in Africa. Seven priority areas for action were adopted: (1) create prospective disease registers at sentinel sites in affected countries to measure disease burden and track progress towards the reduction of mortality by 25% by the year 2025, (2) ensure an adequate supply of high-quality benzathine penicillin for the primary and secondary prevention of ARF/RHD, (3) improve access to reproductive health services for women with RHD and other non-communicable diseases (NCD), (4) decentralise technical expertise and technology for diagnosing and managing ARF and RHD (including ultrasound of the heart), (5) establish national and regional centres of excellence for essential cardiac surgery for the treatment of affected patients and training of cardiovascular practitioners of the future, (6) initiate national multi-sectoral RHD programmes within NCD control programmes of affected countries, and (7) foster international partnerships with multinational organisations for resource mobilisation, monitoring and evaluation of the programme to end RHD in Africa. This Addis Ababa communiqué has since been endorsed by African Union heads of state, and plans are underway to implement the roadmap in order to end ARF and RHD in Africa in our lifetime.
Resumo:
With the maturation of strategic human resource management scholarship, there appears to be a greater call to move from monolithic workforce management to a more strategic and differentiated emphasis on employees with the greatest capacity to enhance competitive advantage. There has been little consideration in the literature as to whether organizations formally identify key groups of employees based on their impact on organizational learning and core competences. Using survey evidence from 260 multinational companies (MNCs), this paper explores the extent to which key groups of employees are formally recognized and whether they are subject to differential compensation practices. The results demonstrate that just in excess of half of these MNCs identify a key group. There was considerable differentiation in the compensation practices between these key groups, managers and the largest occupational group in the workforce. The results give rise to questions worthy of future investigation, namely whether the differentiated approaches used lead to improved performance outcomes.
Resumo:
Key generation from the randomness of wireless channels is a promising technique to establish a secret cryptographic key securely between legitimate users. This paper proposes a new approach to extract keys efficiently from channel responses of individual orthogonal frequency-division multiplexing (OFDM) subcarriers. The efficiency is achieved by (i) fully exploiting randomness from time and frequency domains and (ii) improving the cross-correlation of the channel measurements. Through the theoretical modelling of the time and frequency autocorrelation relationship of the OFDM subcarrier's channel responses, we can obtain the optimal probing rate and use multiple uncorrelated subcarriers as random sources. We also study the effects of non-simultaneous measurements and noise on the cross-correlation of the channel measurements. We find the cross-correlation is mainly impacted by noise effects in a slow fading channel and use a low pass filter (LPF) to reduce the key disagreement rate and extend the system's working signal-to-noise ratio range. The system is evaluated in terms of randomness, key generation rate, and key disagreement rate, verifying that it is feasible to extract randomness from both time and frequency domains of the OFDM subcarrier's channel responses.
Resumo:
Key generation from the randomness of wireless channels is a promising alternative to public key cryptography for the establishment of cryptographic keys between any two users. This paper reviews the current techniques for wireless key generation. The principles, performance metrics and key generation procedure are comprehensively surveyed. Methods for optimizing the performance of key generation are also discussed. Key generation applications in various environments are then introduced along with the challenges of applying the approach in each scenario. The paper concludes with some suggestions for future studies.
Resumo:
This paper presents a key generation system derived from the channel response of individual subcarrier in orthogonal frequency-division multiplexing (OFDM) systems. Practical aspects of the security were investigated by implementing our key generation scheme on a wireless open-access research platform (WARP), which enables us to obtain channel estimation of individual OFDM subcarriers, a feature not currently available in most commercial wireless interface cards. Channel response of individual OFDM subcarrier is usually a wide sense stationary random process, which allows us to find the optimal probing period and maximize the key generation rate. The implementation requires cross layer design as it involves interaction between physical and MAC layer. We have experimentally verified the feasibility and principles of key generation, and also evaluated the performance of our system in terms of randomness, key generation rate and key disagreement rate, which proves that OFDM subcarrier's channel responses are valid for key generation.
Resumo:
Key generation from wireless channels is a promising alternative to public key cryptography for the establishment of cryptographic keys. It is the first paper to experimentally study the channel reciprocity principle of key generation, through investigating and quantifying channel measurements' cross-correlation relationship affected by noise and non-simultaneous measurements. Channel measurements, both received signal strength and channel state information, are collected from a real experimental platform using the wireless open access research platform (WARP) in a multipath office room. We found that in a slow fading channel (e.g., with a coherence time of about 50~ms), the channel cross-correlation is impacted greatly by noise but little by non-simultaneous measurements with a small sampling time difference (e.g., 0.06 ms). The resolution of the sampling time difference can be satisfied by wireless systems such as IEEE 802.11 to maintain an acceptable cross-correlation coefficient without affecting the bandwidth and communication efficiency.
Resumo:
The genus Bursaphelenchus includes B. xylophilus (Steiner et Buhrer, 1934) Nickle, 1981, which is of world economic and quarantine importance. Distinction among several species of the pinewood nematodes species complex (PWNSC) is often difficult. Besides standard morphology, morphometrics and molecular biology, new tools are welcome to better understand this group. The computerized (or e-) key of this genus, presented in this communication, includes 74 species (complete list of valid species of the world fauna) and 35 characters, that were used by the taxonomic experts of this group, in the original descriptions. Morphology of sex organs (male spicules and female vulval region) was digitized and classified to distinguish alternative types. Several qualitative characters with overlapping character states (expressions) were transformed into the morphometric indices with the discontinuous ranges (characters of ratios of the spicule dimensions). Characters and their states (expressions) were illustrated in detail and supplied by brief user-friendly comments. E-key was created in the BIKEY identification system (Dianov & Lobanov, 1996-2004). The system has built-algorithm ranging characters depending on their diagnostic values at each step of identification. Matrix of species and the character states (structural part of the e-key database) may be easily transformed using statistical packages into the dendrograms of general phenetic similarities (UPGMA, standard distance: mean character difference). It may be useful in the detailed analysis of taxonomy and evolution of the genus and in its splitting to the species groups based on morphology. The verification of the dendrogram using the information on the species links with insect vectors and their associated plants, provided an opportunity to recognize the five clusters (xylophilus, hunti, eremus sensu stricto, tusciae and piniperdae sensu stricto), which seem to be the natural species groups. The hypothesis about the origin and the first stages of the genus evolution is proposed. A general review of the genus Bursaphelenchus is presented.
Resumo:
The Order Aphelenchida contains several genera of economic importance, namely Aphelenchoides and Bursaphelenchus. Nematode species belonging to these 2 genera frequently co-habit with other genera such as Laimaphelenchus. It is therefore important to clearly distinguish them, as well as understand the group´s biodiversity. A computerized, or e-key, for the genus Laimaphelenchus Fuchs has been developed in the BiKey Identification system (Dianov & Lobanov, 1996-2004). The e-key includes 14 species and 34 characters (from 2 to 6 character states each). It also includes the built-in algorithm ranging characters according their diagnostic values to minimize the number of the diagnosis steps (average number of steps is 2.7; values are re-calculated at each step). The most important characters (as calculated by BiKey) are: length of posterior branch of the female genital system; excretory pore position; vulval anterior flap shape; number pairs of mail tale papillae; male bursa shape (ventral view); number of tail tip setae in female; female tail tip stub shape; presence of mucro on tail tip in male. Key is pictorial (image-operating), multientry, as other BiKey products.
Resumo:
This thesis contributes to the advancement of Fiber-Wireless (FiWi) access technologies, through the development of algorithms for resource allocation and energy efficient routing. FiWi access networks use both optical and wireless/cellular technologies to provide high bandwidth and ubiquity, required by users and current high demanding services. FiWi access technologies are divided in two parts. In one of the parts, fiber is brought from the central office to near the users, while in the other part wireless routers or base stations take over and provide Internet access to users. Many technologies can be used at both the optical and wireless parts, which lead to different integration and optimization problems to be solved. In this thesis, the focus will be on FiWi access networks that use a passive optical network at the optical section and a wireless mesh network at the wireless section. In such networks, two important aspects that influence network performance are: allocation of resources and traffic routing throughout the mesh section. In this thesis, both problems are addressed. A fair bandwidth allocation algorithm is developed, which provides fairness in terms of bandwidth and in terms of experienced delays among all users. As for routing, an energy efficient routing algorithm is proposed that optimizes sleeping and productive periods throughout the wireless and optical sections. To develop the stated algorithms, game theory and networks formation theory were used. These are powerful mathematical tools that can be used to solve problems involving agents with conflicting interests. Since, usually, these tools are not common knowledge, a brief survey on game theory and network formation theory is provided to explain the concepts that are used throughout the thesis. As such, this thesis also serves as a showcase on the use of game theory and network formation theory to develop new algorithms.
Resumo:
Background: Monitoring of emerging modes of drug consumption in France has identified new patterns of injection among youths with diverse social backgrounds, which may explain the persistence of high rates of hepatitis C virus infection. The circumstances surrounding the first injection have been poorly documented in the group of heavy drug users and in the context of the French opioid substitution treatment (OST) policy that provides expanded access to high-dosage buprenorphine (BHD). Methods: An Internet survey (Priminject) was conducted from October 2010 to March 2011 with French drug users. Four time periods were compared based on critical dates throughout the implementation of the Harm Reduction Policy in France. Results: Compared with drug users who injected for the first time prior to 1995, the aspects of drug use for users who recently injected for the first time were as follows: (1) experimentation with miscellaneous drugs before the first injection; (2) an older age at the time of first injection; (3) heroin as the drug of choice for an individual’s first injection, notwithstanding the increased usage of stimulant drugs; (4) BHD did not appear to be a pathway to injection; and (5) an increased number of users who injected their first time alone, without the help or presence of another individual. Conclusion: The PrimInject study showed that there is a group of injection drug users that is larger than the group of injection drug users observed in previous studies; therefore, it is necessary to diversify programs to reach the entire spectrum of high-risk users.
Resumo:
The South Carolina Department of Natural Resources provides maps to recreational and state shellfish grounds, available to the public for recreational harvesting or to commercial harvest. This map shows the location of Bird Key S200 Recreational Shellfish Ground in Charleston County.