982 resultados para 104-642


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed before by Huang and Wong \cite{DBLP:conf/acisp/HuangW07}. We use a direct construction from Kiltz and Galindo's KEM scheme \cite{DBLP:conf/acisp/KiltzG06} to obtain a certificateless KEM in the standard model; our construction is roughly twice as efficient as the generic construction. We also address the security flaw discovered by Selvi et al. \cite{cryptoeprint:2009:462}.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Within contemporary inpatient mental health nursing practice, the psychodynamic model of care considered previously to be central to the nurse-patient relationship now seems a radical concept. It appears to exist only within primary care facilities and public health care practice settings. This naturalistic inquiry aimed to explicate mental health nurses' perspectives and expectations of providing psychodynamic therapeutic care in acute inpatient psychiatric facilities. Ten registered nurses working in acute inpatient mental health facilities were interviewed. Five themes emerged: a career for life, relating in a psychodynamic manner, swimming against the current, adopting a position of difference, and hopeful expectancy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Offering service bundles to the market is a promising option for service providers to strengthen their competitive advantages, cope with dynamic market conditions and deal with heterogeneous consumer demand. Although the expected positive effects of bundling strategies and pricing considerations for bundles are covered well by the available literature, limited guidance can be found regarding the identification of potential bundle candidates and the actual process of bundling. The contribution of this paper is the positioning of bundling based on insights from both business and computer science and the proposition of a structured bundling method, which guides organizations with the composition of bundles in practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Robust image hashing seeks to transform a given input image into a shorter hashed version using a key-dependent non-invertible transform. These image hashes can be used for watermarking, image integrity authentication or image indexing for fast retrieval. This paper introduces a new method of generating image hashes based on extracting Higher Order Spectral features from the Radon projection of an input image. The feature extraction process is non-invertible, non-linear and different hashes can be produced from the same image through the use of random permutations of the input. We show that the transform is robust to typical image transformations such as JPEG compression, noise, scaling, rotation, smoothing and cropping. We evaluate our system using a verification-style framework based on calculating false match, false non-match likelihoods using the publicly available Uncompressed Colour Image database (UCID) of 1320 images. We also compare our results to Swaminathan’s Fourier-Mellin based hashing method with at least 1% EER improvement under noise, scaling and sharpening.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users’ access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer from the assumption that users will (can) not depart from the expected behaviour implicit in the authorisation policy. In reality however, users can and do depart from the canonical behaviour. This paper argues that the conflict of interest between insiders and authorisation mechanisms is analogous to the subset of problems formally studied in the field of game theory. It proposes a game theoretic authorisation model that can ensure users’ potential misuse of a resource is explicitly considered while making an authorisation decision. The resulting authorisation model is dynamic in the sense that its access decisions vary according to the changes in explicit factors that influence the cost of misuse for both the authorisation mechanism and the insider.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Serotonergic hypofunction is associated with a depressive mood state, an increased drive to eat and preference for sweet (SW) foods. High-trait anxiety individuals are characterised by a functional shortage of serotonin during stress, which in turn increases their susceptibility to experience a negative mood and an increased drive for SW foods. The present study examined whether an acute dietary manipulation, intended to increase circulating serotonin levels, alleviated the detrimental effects of a stress-inducing task on subjective appetite and mood sensations, and preference for SW foods in high-trait anxiety individuals. Thirteen high- (eleven females and two males; anxiety scores 45·5 (sd 5·9); BMI 22·9 (sd 3·0)kg/m2) and twelve low- (ten females and two males; anxiety scores 30·4 (sd 4·8); BMI 23·4 (sd 2·5) kg/m2) trait anxiety individuals participated in a placebo-controlled, two-way crossover design. Participants were provided with 40 g α-lactalbumin (LAC; l-tryptophan (Trp):large neutral amino acids (LNAA) ratio of 7·6) and 40 g casein (placebo) (Trp:LNAA ratio of 4·0) in the form of a snack and lunch on two test days. On both the test days, participants completed a stress-inducing task 2 h after the lunch. Mood and appetite were assessed using visual analogue scales. Changes in food hedonics for different taste and nutrient combinations were assessed using a computer task. The results demonstrated that the LAC manipulation did not exert any immediate effects on mood or appetite. However, LAC did have an effect on food hedonics in individuals with high-trait anxiety after acute stress. These individuals expressed a lower liking (P = 0·012) and SW food preference (P = 0·014) after the stressful task when supplemented with LAC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates whether Socially Responsible Investment (SRI) is more or less sensitive to market downturns than conventional investment, and examines the legal implications for fund managers and trustees. Using a market model methodology, we find that over the past 15 years, the beta risk of SRI, both in Australia and internationally, increased more than that of conventional investment during economic downturns. This implies that companies acting as fund trustees, managed investment schemes and traditional institutional fund managers risk breaching their fiduciary or statutory duties if they go long - or remain long - in SRI funds during market downturns, unless perhaps relevant legislation is reformed. If reform is viewed as desirable, possible reforms could include explicitly overriding the common law to allow all traditional funds to invest in SRI; granting immunity to directors of trustee companies from potential personal liability under sections 197 or 588G et seq of the Corporations Act; allowing companies acting as trustees, managed investment schemes and traditional institutional fund managers and trustees to invest in SRI without triggering a substantial capital gains tax liability through trust resettlement; tax concessions for SRI (eg. introducing a 150% tax deduction or investment allowance for SRI); and allowing SRI sub-funds to obtain “deductible gift recipient” status or the equivalent from relevant taxation authorities. The research is important and original insofar as the assessment of risk in SRIs during market downturns is an area which has hitherto not been subjected to rigorous empirical investigation, despite its serious legal implications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cloud computing has become a main medium for Software as a Service (SaaS) hosting as it can provide the scalability a SaaS requires. One of the challenges in hosting the SaaS is the placement process where the placement has to consider SaaS interactions between its components and SaaS interactions with its data components. A previous research has tackled this problem using a classical genetic algorithm (GA) approach. This paper proposes a cooperative coevolutionary algorithm (CCEA) approach. The CCEA has been implemented and evaluated and the result has shown that the CCEA has produced higher quality solutions compared to the GA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Localisation of an AUV is challenging and a range of inspection applications require relatively accurate positioning information with respect to submerged structures. We have developed a vision based localisation method that uses a 3D model of the structure to be inspected. The system comprises a monocular vision system, a spotlight and a low-cost IMU. Previous methods that attempt to solve the problem in a similar way try and factor out the effects of lighting. Effects, such as shading on curved surfaces or specular reflections, are heavily dependent on the light direction and are difficult to deal with when using existing techniques. The novelty of our method is that we explicitly model the light source. Results are shown of an implementation on a small AUV in clear water at night.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper aimed to assess the magnitude of sewage pollution in an urban lake in Dhaka, Bangladesh by using Quantitative PCR (qPCR) of sewage-associated Bacteroides HF183 markers. PCR was also used for the quantitative detection of ruminant wastewater-associated CF128 markers along with the enumeration of traditional fecal indicator bacteria, namely, enterococci. The number of enterococci in lake water samples ranged from 1.1 x 104 to 1.9 x 105 CFU/100 ml of water. From the 20 water samples tested, 14 (70%) and 7 (35%) were PCR positive for the HF183 and CF128 markers, respectively. The numbers of the HF183 and CF128 markers in lake water samples were 3.9 x 104 to 6.3 × 107 and 9.3 x 103 to 6.3 x 105 genomic units (GU)/100 ml of water, respectively. The high numbers of enterococci and the HF183 markers indicate sewage pollution and potential health risks to those who use the lake water for non-potable purposes such as bathing and washing clothes. This is the first study that investigated the presence of microbial source tracking (MST) markers in Dhaka, Bangladesh where diarrhoeal diseases is one of the major causes of childhood mortality. The molecular assay as used in this study can provide valuable information on the extent of sewage pollution, thus facilitating the development of robust strategies to minimise potential health risks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the anti-money laundering systems of Australia, the United Arab Emirates (UAE), the United Kingdom (UK) and the United States of America (USA), the extent to which they have implemented the Financial Action Task Force (FATF) recommendations, and how compliance with these recommendations is affected by local cultural and economic factors. The paper makes use of FATF evaluation reports to compare the countries’ compliance; it examines some of the underlying cultural considerations and culture-specific ethical issues that affect the extent of compliance, and how cultural and ethical considerations may affect good governance. The findings indicate that the UK and the USA are the most advanced with regards to their compliance with the FATF recommendations and Australia and the UAE less so. The UAE is in particular found to be least compliant. We relate this finding to previous work on how a country’s legal and financial systems develop in line with its religion, culture and socio-economic situation, and examine how such local factors have affected the UAE’s financial and anti-money laundering and combating the financing of terrorism (AML/CFT) systems. This research will be of interest to policy-makers and government agencies involved in addressing money laundering and its successful detection and prosecution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge of the accuracy of dose calculations in intensity-modulated radiotherapy of the head and neck is essential for clinical confidence in these highly conformal treatments. High dose gradients are frequently placed very close to critical structures, such as the spinal cord, and good coverage of complex shaped nodal target volumes is important for long term-local control. A phantom study is presented comparing the performance of standard clinical pencil-beam and collapsed-cone dose algorithms to Monte Carlo calculation and three-dimensional gel dosimetry measurement. All calculations and measurements are normalized to the median dose in the primary planning target volume, making this a purely relative study. The phantom simulates tissue, air and bone for a typical neck section and is treated using an inverse-planned 5-field IMRT treatment, similar in character to clinically used class solutions. Results indicate that the pencil-beam algorithm fails to correctly model the relative dose distribution surrounding the air cavity, leading to an overestimate of the target coverage. The collapsed-cone and Monte Carlo results are very similar, indicating that the clinical collapsed-cone algorithm is perfectly sufficient for routine clinical use. The gel measurement shows generally good agreement with the collapsed-cone and Monte Carlo calculated dose, particularly in the spinal cord dose and nodal target coverage, thus giving greater confidence in the use of this class solution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predicate encryption has an advantage over traditional public-key or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definitions of delegatable predicate encryption and provide the first delegatable predicate encryption scheme which supports disjunctive predicate evaluations in the public-key setting. We analyze the security of the proposed system and give a security proof. In addition, we present a delegatable predicate encryption in the symmetric-key setting and discuss the related security issues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sections contributed by Jean Sim Agricultural Colleges; p.12 Anzac Park, Townsvile; p.22 Anzac Square, Brisbane; pp.22-23 Benson, Albert Herbert; p.86 Bick, Edward Walter; p.88 Bougainvillea Gardens; p.101 Bowen Park; pp.101-102 Boyd, A.J.; p.103 Brisbane Botanic Gardens; pp.104-105 Bush-house; pp.119-121