924 resultados para hex meshing schemes


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate existing cloud storage schemes and identify limitations in each one based on the security services that they provide. We then propose a new cloud storage architecture that extends CloudProof of Popa et al. to provide availability assurance. This is accomplished by incorporating a proof of storage protocol. As a result, we obtain the first secure storage cloud computing scheme that furnishes all three properties of availability, fairness and freshness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. The FS property was also shown to be achievable in (Hierarchical) Identity-Based Encryption (HIBE) by Yao, Fazio, Dodis, and Lysyanskaya (ACM CCS 2004). Yet, for emerging encryption techniques, offering flexible access control to encrypted data, by means of functional relationships between ciphertexts and decryption keys, FS protection was not known to exist.\smallskip In this paper we introduce FS to the powerful setting of \emph{Hierarchical Predicate Encryption (HPE)}, proposed by Okamoto and Takashima (Asiacrypt 2009). Anticipated applications of FS-HPE schemes can be found in searchable encryption and in fully private communication. Considering the dependencies amongst the concepts, our FS-HPE scheme implies forward-secure flavors of Predicate Encryption and (Hierarchical) Attribute-Based Encryption.\smallskip Our FS-HPE scheme guarantees forward security for plaintexts and for attributes that are hidden in HPE ciphertexts. It further allows delegation of decrypting abilities at any point in time, independent of FS time evolution. It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. As the ``cross-product" approach taken in FS-HIBE is not directly applicable to the HPE setting, our construction resorts to techniques that are specific to existing HPE schemes and extends them with what can be seen as a reminiscent of binary tree encryption from FS-PKE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. Like the Commonwealth Tax regime, state taxation legislation has now ballooned in size from the good old days when life and tax were relatively simple issues. 2. This case study of Queensland state taxation will examine the following taxes affecting churches and charities in this state: (a) Stamp Duty (b) Land Tax; and (c) Local Authority Rates 3. Each type of tax will be considered in turn. A brief legislative history of the statutory instruments governing these taxes will be given with a closer examination of the present schemes. Relevant judicial pronouncements will be considered and some open discussion of real life examples. 4. It is submitted that the regular donors to our worthy charities and the dedicated weekly churchgoers would have absolutely no idea: (a) that indirectly the value of their donations and weekly offerings are increasingly being eroded by the imposts of Government not only in terms of the amounts of those imposts but the enormous administrative burden of coping with the legislation; (b) of the complexity of the taxation legislation affecting their churches and charities; or (c) that their churches and charities are even paying taxes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are a variety of reasons and motivations for people to subscribe to community-supported agriculture (CSA) schemes, many of which include social, ethical, environmental, and economical benefits. The global rise of food allergies and food related health issues in recent years has led to a growing number of initiatives particularly in developing countries to raise more awareness of the current situation amongst individuals, organisations, and government bodies, and to plan for its implications for the existing food and health systems. Based on a mixed method research conducted in Australia, this paper argues that personal health matters are one of the key motivators for consumers to seek out alternative food systems, particularly CSA initiatives. In addition, it presents the willingness for consumers to seek out information about the food they consume and proposes that technology plays a key role in being used as a conduit to share and investigate information relating to alternative food systems. Further research is required to determine the variety of benefits and opportunities alternative food systems can provide consumers with food related health issues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many people take pleasure in visiting waterfalls and much has been written on the subject. Numerous accounts of Niagara Falls were published after Hennepin's late seventeenth-centure descriptions, particularly from the early nineteenth century, but is was only later that other waterfalls became the subject of books. George Holley's Niagara and Other Famous Cataracts of the World, published in 1883, and John Gibson's Great Waterfalls, Cataracts and Geysers, published in 1887, are early examples of global accounts of major falls. Most books about waterfalls are guides to the falls of a particular country, state or region. Apart from a few slim illustrated volumes, few books have been puslished on the world's waterfalls since Edward Rashleigh's Among the Waterfalls (1935). Most of these are slim pictorial volumes, some aimed at the children's market. Geologist Richard Maxwell Pearl published a series of waterfall articles in his journal Earth Science between 1973 and 1975, apparently with the intention of turning them into a book, but this never materialized. My book, the culmination of more than a decade of waterfalls research, is comprehensive in its approach, but is not intended to describe as many of the world's waterfalls as possible. This is far from my aim, and readers may be disappointed at my omission of falls they feel deserved mention. What I have attempted to do is celebrate the delights of these beautiful wonders of nature by considering them from many points of view, emphasizing the roles that they play in the human experience. To be as representative as possible, I draw on examples of waterfalls from all over the world, some famous, many not. North and South America, Europe, Africa, Asia and Oceania and, with recent global warming, the Earth's polar regions, all feature in the discussion. Even though there are already enough books and articles about Niagara Falls to fill a large library, it has been impossible to avoid making frequent reference to this great cataract, which has been so important in the history of travel and tourism, power generation, urban development and art. Amoung the issues that I consider is the human impact on waterfalls, particularly the effects of hydropower schemes and tourism development. Also considered are artificial waterfalls, which have long been features of the designed landscape. Their contemporay role is poignantly exemplified in the design of the National September 11 Memorial, in which the footprints of the Twin Towers are traced by walls of waterfalls. A geographer and urban and regional planner by training, I have ventured into many other fields of knowledge that are outside my areas of expertise. I apologize for any errors that I may have made in my book and invite correction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A basic element in advertising strategy is the choice of an appeal. Many researchers have studied communication message form and specifically forms of literalism and symbolism, or some variation. The motives for such study are grounded in increasing the effectiveness of commercial communication messages, especially advertising messages. Advertising research studies typically use forms of literalism (e.g. informativeness) or symbolism (e.g. metaphoric, tropes, schemes figures of speech, and rhetorical figures) as independent variables and compare these against one or more of the traditional advertising effectiveness measures as dependent variable(s). The main challenge in assessing the effectiveness of literalism or symbolism in message content is the discreet identification of the construct. However, no standard, empirically-tested measure was located in the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Problems involving the solution of advection-diffusion-reaction equations on domains and subdomains whose growth affects and is affected by these equations, commonly arise in developmental biology. Here, a mathematical framework for these situations, together with methods for obtaining spatio-temporal solutions and steady states of models built from this framework, is presented. The framework and methods are applied to a recently published model of epidermal skin substitutes. Despite the use of Eulerian schemes, excellent agreement is obtained between the numerical spatio-temporal, numerical steady state, and analytical solutions of the model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Road traffic accidents can be reduced by providing early warning to drivers through wireless ad hoc networks. When a vehicle detects an event that may lead to an imminent accident, the vehicle disseminates emergency messages to alert other vehicles that may be endangered by the accident. In many existing broadcast-based dissemination schemes, emergency messages may be sent to a large number of vehicles in the area and can be propagated to only one direction. This paper presents a more efficient context aware multicast protocol that disseminates messages only to endangered vehicles that may be affected by the emergency event. The endangered vehicles can be identified by calculating the interaction among vehicles based on their motion properties. To ensure fast delivery, the dissemination follows a routing path obtained by computing a minimum delay tree. The multicast protocol uses a generalized approach that can support any arbitrary road topology. The performance of the multicast protocol is compared with existing broadcast protocols by simulating chain collision accidents on a typical highway. Simulation results show that the multicast protocol outperforms the other protocols in terms of reliability, efficiency, and latency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vehicular safety applications, such as cooperative collision warning systems, rely on beaconing to provide situational awareness that is needed to predict and therefore to avoid possible collisions. Beaconing is the continual exchange of vehicle motion-state information, such as position, speed, and heading, which enables each vehicle to track its neighboring vehicles in real time. This work presents a context-aware adaptive beaconing scheme that dynamically adapts the beaconing repetition rate based on an estimated channel load and the danger severity of the interactions among vehicles. The safety, efficiency, and scalability of the new scheme is evaluated by simulating vehicle collisions caused by inattentive drivers under various road traffic densities. Simulation results show that the new scheme is more efficient and scalable, and is able to improve safety better than the existing non-adaptive and adaptive rate schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Every day inboxes are being flooded with invitations to invest money in overseas schemes, notifications of overseas lottery wins and inheritances, as well as emails from banks and other institutions asking for customers to confirm information about their identity and account details. While these requests may seem outrageous, many believe the request to be true and respond, through the sending of money or personal details. This can have devastating consequences, financially, emotionally and physically. While enforcement action is important, greater success is likely to come in the area of prevention, which avoids victim losses in the first place. Considerable victim support is also required by victims who have suffered significant losses, in trying to get their lives back on track. This project examined fraud prevention strategies and support services for victims of online fraud across the United Kingdom, United States of America and Canada. While much work has already been undertaken in Queensland, there is considerable room for improvement and a great deal can be learnt from these overseas jurisdictions. There are several examples of innovative and effective responses, particularly in the area of victim support, that are highlighted throughout this report. It is advocated that Australia can continue to improve its position regarding the prevention and support of online fraud victims, by applying the knowledge and expertise learnt overseas to a local context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric authentication systems (CBAS) are supplied by user traits and characteristics. One of the main types of biometric is keystroke dynamics which has been widely tried and accepted for providing continuous user authentication. Keystroke dynamics is appealing for many reasons. First, it is less obtrusive, since users will be typing on the computer keyboard anyway. Second, it does not require extra hardware. Finally, keystroke dynamics will be available after the authentication step at the start of the computer session. Currently, there is insufficient research in the CBAS with keystroke dynamics field. To date, most of the existing schemes ignore the continuous authentication scenarios which might affect their practicality in different real world applications. Also, the contemporary CBAS with keystroke dynamics approaches use characters sequences as features that are representative of user typing behavior but their selected features criteria do not guarantee features with strong statistical significance which may cause less accurate statistical user-representation. Furthermore, their selected features do not inherently incorporate user typing behavior. Finally, the existing CBAS that are based on keystroke dynamics are typically dependent on pre-defined user-typing models for continuous authentication. This dependency restricts the systems to authenticate only known users whose typing samples are modelled. This research addresses the previous limitations associated with the existing CBAS schemes by developing a generic model to better identify and understand the characteristics and requirements of each type of CBAS and continuous authentication scenario. Also, the research proposes four statistical-based feature selection techniques that have highest statistical significance and encompasses different user typing behaviors which represent user typing patterns effectively. Finally, the research proposes the user-independent threshold approach that is able to authenticate a user accurately without needing any predefined user typing model a-priori. Also, we enhance the technique to detect the impostor or intruder who may take over during the entire computer session.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Building prefabrication is known as Industrialised Building Systems (IBS) in Malaysia. This construction method possesses unique characteristics that are central to sustainable construction. For example, offsite construction enables efficient management of construction wastage by identifying major causes of waste arising during both the design and construction stages. These causes may then be eliminated by the improvement process in IBS component's manufacturing. However, current decisions on using IBS are typically financial driven and hinder the wider ranged adoption. In addition, current IBS misconceptions and the failure of rating schemes in evaluating the sustainability of IBS affect its implementation. A new approach is required to provide better understanding on the sustainability potential of IBS among stakeholders. Such approach should also help project the outcomes of each levels of decision-making to respond to social, economy and environmental challenges. This paper presents interim findings of research aimed at developing a framework for sustainable IBS development and suggests a more holistic approach to achieve sustainability. A framework of embedding sustainability factors is considered in three main phases of IBS construction; 1) Pre-construction, 2) Construction and 3) Post-construction phase. SWOT analysis was used to evaluate the strengths, weaknesses, opportunities and threats involved in the IBS implementations. The action plans are formulated from the analysis of sustainable objectives. This approach will show where and how sustainability should be integrated to improve IBS construction. A mix of quantitative and qualitative methodology was used in this research to explore the potential of IBS in integrating sustainability. The tools used in the study are questionnaires and semi-structured interviews. Outcomes from these tools lead to the identification of viable approaches involving 18 critical factors to improve sustainability in IBS constructions. Finally, guidelines for decision-making are being developed to provide a useful source of information and support to mutual benefit of the stakeholders in integrating sustainability issues and concepts into IBS applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Emergence has the potential to effect complex, creative or open-ended interactions and novel game-play. We report on research into an emergent interactive system. This investigates emergent user behaviors and experience through the creation and evaluation of an interactive system. The system is +-NOW, an augmented reality, tangible, interactive art system. The paper briefly describes the qualities of emergence and +-NOW before focusing on its evaluation. This was a qualitative study with 30 participants conducted in context. Data analysis followed Grounded Theory Methods. Coding schemes, induced from data and external literature are presented. Findings show that emergence occurred in over half of the participants. The nature of these emergent behaviors is discussed along with examples from the data. Other findings indicate that participants found interaction with the work satisfactory. Design strategies for facilitating satisfactory experience despite the often unpredictable character of emergence, are briefly reviewed and potential application areas for emergence are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Glass Pond is an interactive artwork designed to engender exploration and reflection through an intuitive, tangible interface and a simulation agent. It is being developed using iterative methods. A study has been conducted with the aim of illuminating user experience, interface, design, and performance issues.The paper describes the study methodology and process of data analysis including coding schemes for cognitive states and movements. Analysis reveals that exploration and reflection occurred as well as composing behaviours (unexpected). Results also show that participants interacted to varying degrees. Design discussion includes the artwork's (novel) interface and configuration.