931 resultados para cryptographic protocols


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Medical research represents a substantial departure from conventional medical care. Medical care is patient-orientated, with decisions based on the best interests and/or wishes of the person receiving the care. In contrast, medical research is future-directed. Primarily it aims to contribute new knowledge about illness or disease, or new knowledge about interventions, such as drugs, that impact upon some human condition. Current State and Territory laws and research ethics guidelines in Australia relating to the review of medical research appropriately acknowledge that the functions of medical care and medical research differ. Prior to a medical research project commencing, the study must be reviewed and approved by a Human Research Ethics Committee (HREC). For medical research involving incompetent adults, some jurisdictions require an additional, independent safeguard by way of tribunal or court approval of medical research protocols. This extra review process reflects the uncertainty of medical research involvement, and the difficulties surrogate decision-makers of incompetent adults face in making decisions about others, and deliberating about the risks and benefits of research involvement. Parents of children also face the same difficulties when making decisions about their child’s research involvement. However, unlike the position concerning incompetent adults, there are no similar safeguards under Australian law in relation to the approval of medical research involving children. This column questions why this discrepancy exists with a view to generating further dialogue on the topic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A key derivation function is used to generate one or more cryptographic keys from a private (secret) input value. This paper proposes a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the underlying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream finalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Genomic DNA obtained from patient whole blood samples is a key element for genomic research. Advantages and disadvantages, in terms of time-efficiency, cost-effectiveness and laboratory requirements, of procedures available to isolate nucleic acids need to be considered before choosing any particular method. These characteristics have not been fully evaluated for some laboratory techniques, such as the salting out method for DNA extraction, which has been excluded from comparison in different studies published to date. We compared three different protocols (a traditional salting out method, a modified salting out method and a commercially available kit method) to determine the most cost-effective and time-efficient method to extract DNA. We extracted genomic DNA from whole blood samples obtained from breast cancer patient volunteers and compared the results of the product obtained in terms of quantity (concentration of DNA extracted and DNA obtained per ml of blood used) and quality (260/280 ratio and polymerase chain reaction product amplification) of the obtained yield. On average, all three methods showed no statistically significant differences between the final result, but when we accounted for time and cost derived for each method, they showed very significant differences. The modified salting out method resulted in a seven- and twofold reduction in cost compared to the commercial kit and traditional salting out method, respectively and reduced time from 3 days to 1 hour compared to the traditional salting out method. This highlights a modified salting out method as a suitable choice to be used in laboratories and research centres, particularly when dealing with a large number of samples.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines motivations and methods for external evaluators in taking on a brokerage relationship between artists, arts managers and governments (national and local) during an appraisal process of community arts events. The argument is situated in our experience evaluating the Creating Queensland programme, a multifaceted community arts programme presented as part of the one of Australia’s largest arts events the Brisbane Festival, in 2009 and 2010. We use this case to identify a number of principles and processes that may assist in establishing an effective evaluation process – defined, for us, as a process in which partners representing different elements of the community arts project can share information in a learning network, or an innovation network, that embraces the idea of continuous improvement. We explain that we, as consultants, are not necessarily the only participants in the evaluation process in a position to broker the decision making about what to research and report on. We argue that empowering each of the delivery partners to act as brokers, using the principles, protocols and processes to negotiate what should be researched, when, how and how it should be shared, is something each delivery partner can do. This can help create a common understanding that can reduce anxieties about using warts-and-all evaluation data to learn, grow and improve in the arts. It can, as a result, be beneficial both for the participating partners and the community arts sector as a whole.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In our laboratory, we have developed methods in real-time detection and quantitative-polymerase chain reaction (Q-PCR) to analyse the relative levels of gene expression in post mortem brain tissues. We have then applied this method to examine differences in gene activity between normal white matter (NWM) and plaque tissue from multiple sclerosis (MS) patients. Genes were selected based on their association with pathology and through identification by previously conducted global gene expression analysis. Plaque tissue was obtained from secondary progressive (SP) patients displaying chronic active, as well as acute pathologies; while NWM from the same location was obtained from age- and sex-matched controls (normal patients). In this study, we used both SYBR Green I supplementation and commercially available mixes to assess both comparative and absolute levels of gene activity. The results of both methods compared favourably for four of the five genes examined (P < 0.05, Pearsons), while differences in gene expression between chronic active and acute pathologies were also identified. For example, a >50-fold increase in osteopontin (Spp1) and inositol 1-4-5 phosphate 3 kinase B (Itpkb) levels in acute plaques contrasted with the 5-fold or less increase in chronic active plaques (P < 0.05, unpaired t test). By contrast, there was no significant difference in the levels of the MS marker and calcium-dependent protease (Calpain, Capns1) in MS plaque tissue. In summary, Q-PCR analysis using SYBR Green I has allowed us to economically obtain what may be clinically significant information from small amounts of the CNS, providing an opportunity for further clinical investigations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In our laboratory we have developed a quantitative-polymerase chain reaction (Q-PCR) strategy to examine the differential expression of adenosine receptor (ADOR), A(1), A(2A), A(2B) and A(3), and estrogen receptors (ER) alpha and beta. Brain and uterine mRNA were first used to optimise specific amplification conditions prior to SYBR Green I real time analysis of receptor subtype expression. SYBR Green I provided a convenient and sensitive means of examining specific PCR amplification product in real time, and allowed the generation of standard curves from which relative receptor abundance could be determined. Real time Q-PCR analysis was then performed, to examine changes in receptor expression levels in brains of adult female Wistar rats 3-month post ovariectomy. Comparison with sham-operated age-matched control rats demonstrated both comparative and absolute-copy number changes in receptor levels. Evaluation of both analytical methods investigated 18S rRNA as an internal reference for comparative gene expression analysis in the brain. The results of this study revealed preferential repression of ADORA(2A) (>4-fold down) and consistent (>2-fold) down-regulation of ADORA(1), ADORA(3), and ER-beta, following ovariectomy. No change was found in ADORA(2B) or ER-alpha. Analysis of absolute copy number in this study revealed a correlation between receptor expression in response to ovariectomy, and relative receptor subtype abundance in the brain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vacuum cleaners can release large concentrations of particles, both in their exhaust air and from resuspension of settled dust. However, the size, variability and microbial diversity of these emissions are unknown, despite evidence to suggest they may contribute to allergic responses and infection transmission indoors. This study aimed to evaluate bioaerosol emission from various vacuum cleaners. We sampled the air in an experimental flow tunnel where vacuum cleaners were run and their airborne emissions sampled with closed-face cassettes. Dust samples were also 35 collected from the dust bag. Total bacteria, total archaea, Penicillium/Aspergillus and total Clostridium cluster 1 were quantified with specific qPCR protocols and emission rates were calculated. Clostridium botulinum, as well as antibiotic resistance genes were detected in each sample using endpoint PCR. Bacterial diversity was also analyzed using denaturing gel electrophoresis (DGGE), image analysis and band sequencing. We demonstrated that emission of bacteria and moulds (Pen/Asp) can reach values as high as 1E05/min and that those emissions are not related to each other. The bag dust bacterial and mould content was also consistently across the vacuums we assessed, reaching up to 1E07 bacteria or moulds equivalent/g. Antibiotic resistance genes were detected in several samples. No archaea or C. botulinum were detected in any air samples. Diversity analyses showed that most bacteria are from human sources, in keeping with other recent results. These results highlight the potential capability of vacuum cleaners to disseminate appreciable quantities of moulds and human-associated bacteria indoors and their role as a source of exposure to bioaerosols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Meal-Induced Thermogenesis (MIT) research findings are highly inconsistent, in part, due to the variety of durations and protocols used to measure MIT. We aimed to determine: 1) the proportion of a 6 h MIT response completed at 3, 4 and 5 h; 2) the associations between the shorter durations and the 6 h measure; 3) whether shorter durations improved the reproducibility of the measurement. MIT was measured in response to a 2410 KJ mixed composition meal in ten individuals (5 male, 5 female) on two occasions. Energy expenditure was measured continuously for 6 h post-meal using indirect calorimetry and MIT was calculated as the increase in energy expenditure above the pre-meal RMR. On average, 76%, 89%, and 96% of the 6 h MIT response was completed within 3, 4 and 5 h respectively, and the MIT at each of these time points was strongly correlated to the 6 h MIT (range for correlations, r = 0.990 to 0.998; p < 0.01). The between-day CV for the 6 h measurement was 33%, but was significantly lower after 3 h of measurement (CV = 26%, p = 0.02). Despite variability in the total MIT between days, the proportion of the MIT that was complete at 3, 4 and 5 h was reproducible (mean CV: 5%). While 6 h is typically required to measure the complete MIT response, 3 h measures provide sufficient information about the magnitude of the MIT response and may be applicable for measuring individuals on repeated occasions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IL-17 is believed to be important for protection against extracellular pathogens, where clearance is dependent on neutrophil recruitment and local activation of epithelial cell defences. However, the role of IL-17 in protection against intracellular pathogens such as Chlamydia is less clear. We have compared (i) the course of natural genital tract C. muridarum infection, (ii) the development of oviduct pathology and (iii) the development of vaccine-induced immunity against infection in wild type (WT) BALB/c and IL-17 knockout mice (IL-17-/-) to determine if IL-17-mediated immunity is implicated in the development of infection-induced pathology and/or protection. Both the magnitude and duration of genital infection was significantly reduced in IL-17-/- mice compared to BALB/c. Similarly, hydrosalpinx was also greatly reduced in IL-17-/- mice and this correlated with reduced neutrophil and macrophage infiltration of oviduct tissues. Matrix metalloproteinase (MMP) 9 and MMP2 were increased in WT oviducts compared to IL-17-/- animals at day 7 post-infection. In contrast, oviducts from IL-17-/- mice contained higher MMP9 and MMP2 at day 21. Infection also elicited higher levels of Chlamydia-neutralizing antibody in serum of IL-17-/- mice than WT mice. Following intranasal immunization with C. muridarum Major Outer Membrane Protein (MOMP) and cholera toxin plus CpG adjuvants, significantly higher levels of chlamydial MOMP-specific IgG and IgA were found in serum and vaginal washes of IL-17-/- mice. T cell proliferation and IFNγ production by splenocytes was greater in WT animals following in vitro re-stimulation, however vaccination was only effective at reducing infection in WT, not IL-17-/- mice. Intranasal or transcutaneous immunization protected WT but not IL-17-/- mice against hydrosalpinx development. Our data show that in the absence of IL-17, the severity of C. muridarum genital infection and associated oviduct pathology are significantly attenuated, however neither infection or pathology can be reduced further by vaccination protocols that effectively protect WT mice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Situation awareness, ones understanding of ‘what is going on’, is a critical commodity for road users. Although the concept has received much attention in the driving context, situation awareness in vulnerable road users, such as cyclists, remains unexplored. This paper presents the findings from an exploratory on-road study of cyclist situation awareness, the aim of which was to explore how cyclists develop situation awareness, what their situation awareness comprises, and what the causes of degraded cyclist situation awareness may be. Twenty participants cycled a pre-defined urban on-road study route. A range of data were collected, including verbal protocols, forward scene video and rear video, and a network analysis procedure was used to describe and assess cyclist situation awareness. The analysis produced a number of key findings regarding cyclist situation awareness, including the potential for cyclists’ awareness of other road users to be degraded due to additional situation awareness and decision making requirements that are placed on them in certain road situations. Strategies for improving cyclists’ situation awareness are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Victoria, as in other jurisdictions, there is very little research on the potential risks and benefits of lane filtering by motorcyclists, particularly from a road safety perspective. This on-road proof of concept study aimed to investigate whether and how lane filtering influences motorcycle rider situation awareness at intersections and to address factors that need to be considered for the design of a larger study in this area. Situation awareness refers to road users’ understanding of ‘what is going on’ around them and is a critical commodity for safe performance. Twenty-five experienced motorcyclists rode their own instrumented motorcycle around an urban test route in Melbourne whilst providing verbal protocols. Lane filtering occurred in 27% of 43 possible instances in which there were one or more vehicles in the traffic queue and the traffic lights were red on approach to the intersection. A network analysis procedure, based on the verbal protocols provided by motorcyclists, was used to identify differences in motorcyclist situation awareness between filtering and non-filtering events. Although similarities in situation awareness across filtering and nonfiltering motorcyclists were found, the analysis revealed some differences. For example, filtering motorcyclists placed more emphasis on the timing of the traffic light sequence and on their own actions when moving to the front of the traffic queue, whilst non-filtering motorcyclists paid greater attention to traffic moving through the intersection and approaching from behind. Based on the results of this study, the paper discusses some methodological and theoretical issues to be addressed in a larger study comparing situation awareness between filtering and non-filtering motorcyclists.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Children with Autism Spectrum Disorder experience difficulty in communication and in understanding the social world which can have negative consequences for their relationships, in managing emotions, and generally dealing with the challenges of everyday life. This thesis examines the effectiveness of the Active and Reflective components of the Get REAL program through the assessment of the detailed coding of video-recorded observations and longitudinal quantitative analysis. The aim of Get REAL is to increase the social, emotional, and cognitive learning of children with High Functioning Autism (HFA). Get REAL is a group program designed specifically for use in inclusive primary school settings. The Get REAL program was designed in response to the mixed success of generalisation of learning to new contexts of existing social skills programs. The theoretical foundation of Get REAL is based upon pedagogical theory and learning theory to facilitate transfer of learning, combined with experiential, individualised, evaluative and organisational approaches. This thesis is by publication and consists of four refereed journal papers; 1 accepted for publication and 3 that are under review. Paper 1 describes the development and theoretical basis of the Get REAL program and provides detail of the program structure and learning cycle. The focus of Paper 1 reflects the first question of interest in the thesis which is about the extent to which learning derived from participation in the program can be generalised to other contexts. Participants are 16 children with HFA ranging in age from 8-13 years. Results provided support for the generalisability of learning from Get REAL to home and school evidenced by parent and teacher data collected pre and post participation in Get REAL. Following establishment of the generalisation of learning from Get REAL, Papers 2 and 3 focus on the Active and Reflective components of the program in order to examine how individual and group learning takes place. Participants (N = 12) in the program are video-taped during the Active and Reflective Sessions. Using identical coding protocols of video data, improvements in prosocial behaviour and diminishing of inappropriate behaviours were apparent with the exception of perspective taking. Data also revealed that 2 of the participants had atypical trajectories. An in-depth case study analysis was then conducted with these 2 participants in Paper 4. Data included reports from health care and education professionals within the school and externally (e.g., paediatrician) and identified the multi-faceted nature of care needed for children with comorbid diagnoses and extremely challenging family circumstances as a complex task to effect change. Results of this research support the effectiveness of the Get REAL program in promoting pro social behaviours such as improvements in engaging with others and emotional regulation, and in diminishing unwanted behaviours such as conduct problems. Further, the gains made by the participating children were found to be generalisable beyond Get REAL to home and other school settings. The research contained in the thesis adds to current knowledge about how learning can take place for children with HFA. Results show that an experiential learning framework with a focus on social cognition, together with explicit teaching, scaffolded with video feedback, are key ingredients for the generalisation of social learning to broader contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Expert searchers engage with information as information brokers, researchers, reference librarians, information architects, faculty who teach advanced search, and in a variety of other information-intensive professions. Their experiences are characterized by a profound understanding of information concepts and skills and they have an agile ability to apply this knowledge to interacting with and having an impact on the information environment. This study explored the learning experiences of searchers to understand the acquisition of search expertise. The research question was: What can be learned about becoming an expert searcher from the learning experiences of proficient novice searchers and highly experienced searchers? The key objectives were: (1) to explore the existence of threshold concepts in search expertise; (2) to improve our understanding of how search expertise is acquired and how novice searchers, intent on becoming experts, can learn to search in more expertlike ways. The participant sample drew from two population groups: (1) highly experienced searchers with a minimum of 20 years of relevant professional experience, including LIS faculty who teach advanced search, information brokers, and search engine developers (11 subjects); and (2) MLIS students who had completed coursework in information retrieval and online searching and demonstrated exceptional ability (9 subjects). Using these two groups allowed a nuanced understanding of the experience of learning to search in expertlike ways, with data from those who search at a very high level as well as those who may be actively developing expertise. The study used semi-structured interviews, search tasks with think-aloud narratives, and talk-after protocols. Searches were screen-captured with simultaneous audio-recording of the think-aloud narrative. Data were coded and analyzed using NVivo9 and manually. Grounded theory allowed categories and themes to emerge from the data. Categories represented conceptual knowledge and attributes of expert searchers. In accord with grounded theory method, once theoretical saturation was achieved, during the final stage of analysis the data were viewed through lenses of existing theoretical frameworks. For this study, threshold concept theory (Meyer & Land, 2003) was used to explore which concepts might be threshold concepts. Threshold concepts have been used to explore transformative learning portals in subjects ranging from economics to mathematics. A threshold concept has five defining characteristics: transformative (causing a shift in perception), irreversible (unlikely to be forgotten), integrative (unifying separate concepts), troublesome (initially counter-intuitive), and may be bounded. Themes that emerged provided evidence of four concepts which had the characteristics of threshold concepts. These were: information environment: the total information environment is perceived and understood; information structures: content, index structures, and retrieval algorithms are understood; information vocabularies: fluency in search behaviors related to language, including natural language, controlled vocabulary, and finesse using proximity, truncation, and other language-based tools. The fourth threshold concept was concept fusion, the integration of the other three threshold concepts and further defined by three properties: visioning (anticipating next moves), being light on one's 'search feet' (dancing property), and profound ontological shift (identity as searcher). In addition to the threshold concepts, findings were reported that were not concept-based, including praxes and traits of expert searchers. A model of search expertise is proposed with the four threshold concepts at its core that also integrates the traits and praxes elicited from the study, attributes which are likewise long recognized in LIS research as present in professional searchers. The research provides a deeper understanding of the transformative learning experiences involved in the acquisition of search expertise. It adds to our understanding of search expertise in the context of today's information environment and has implications for teaching advanced search, for research more broadly within library and information science, and for methodologies used to explore threshold concepts.