933 resultados para São Roque Group
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
The focus of governments on increasing active travel has motivated renewed interest in cycling safety. Bicyclists are up to 20 times more likely to be involved in serious injury crashes than drivers so understanding the relationship among factors in bicyclist crash risk is critically important for identifying effective policy tools, for informing bicycle infrastructure investments, and for identifying high risk bicycling contexts. This study aims to better understand the complex relationships between bicyclist self reported injuries resulting from crashes (e.g. hitting a car) and non-crashes (e.g. spraining an ankle) and perceived risk of cycling as a function of cyclist exposure, rider conspicuity, riding environment, rider risk aversion, and rider ability. Self reported data from 2,500 Queensland cyclists are used to estimate a series of seemingly unrelated regressions to examine the relationships among factors. The major findings suggest that perceived risk does not appear to influence injury rates, nor do injury rates influence perceived risks of cycling. Riders who perceive cycling as risky tend not to be commuters, do not engage in group riding, tend to always wear mandatory helmets and front lights, and lower their perception of risk by increasing days per week of riding and by increasing riding proportion on bicycle paths. Riders who always wear helmets have lower crash injury risk. Increasing the number of days per week riding tends to decrease both crash injury and non crash injury risk (e.g. a sprain). Further work is needed to replicate some of the findings in this study.
Resumo:
Previous research has shown resistance to extinction of fear conditioned to racial out-group faces, suggesting that these stimuli may be subject to prepared fear learning. The current study replicated and extended previous research by using a different racial out-group, and testing the prediction that prepared fear learning is unaffected by verbal instructions. Four groups of Caucasian participants were trained with male in-group (Caucasian) or out-group (Chinese) faces as conditional stimuli; one paired with an electro-tactile shock (CS+) and one presented alone (CS). Before extinction, half the participants were instructed that no more shocks would be presented. Fear conditioning, indexed by larger electrodermal responses to, and blink startle modulation during the CS+, occurred during acquisition in all groups. Resistance to extinction of fear learning was found only in the racial out-group, no instruction condition. Fear conditioned to a racial out-group face was reduced following verbal instructions, contrary to predictions for the nature of prepared fear learning.
Resumo:
Three types of shop scheduling problems, the flow shop, the job shop and the open shop scheduling problems, have been widely studied in the literature. However, very few articles address the group shop scheduling problem introduced in 1997, which is a general formulation that covers the three above mentioned shop scheduling problems and the mixed shop scheduling problem. In this paper, we apply tabu search to the group shop scheduling problem and evaluate the performance of the algorithm on a set of benchmark problems. The computational results show that our tabu search algorithm is typically more efficient and faster than the other methods proposed in the literature. Furthermore, the proposed tabu search method has found some new best solutions of the benchmark instances.
Resumo:
Acknowledgement that many children in Australia travel in restraints that do not offer them the best protection has led to recent changes in legislation such that the type of restraint for children under 7 years is now specified. This paper reports the results of two studies (observational; focus group/ survey) carried out in the state of Queensland to evaluate the effectiveness of these changes to the legislation. Observations suggested that almost all of the children estimated as aged 0-12 years were restrained (95%). Analysis of the type of restraint used for target-aged children (0-6 year olds) suggests that the proportion using an age-appropriate restraint has increased by an estimated 7% since enactment of the legislation. However, around 1 in 4 children estimated as aged under 7 years were using restraints too large for good fit. Results from the survey and focus group suggested parents were supportive of the changes in legislation. Non-Indigenous parents agreed that the changes had been necessary, were effective at getting children into the right restraints, were easy to understand as well as making it clear what restraint to use with children. Moreover, they did not see the legislation as too complicated or too hard to comply with. Indigenous parents who participated in a focus group also regarded the legislation as improving children’s safety. However, they identified the cost of restraints as an important barrier to compliance. In summary, the legislation appears to have had a positive effect on compliance levels and on raising parental awareness of the need to restrain children child-specific restraints for longer. However, it would seem that an important minority of parents transition their children into larger restraints too early for optimal protection. Intervention efforts should aim to better inform these parents about appropriate ages for transition, especially from forward facing childseats. This could potentially be through use of other important transitions that occur at the same age, such as starting school. The small proportion of parents who do not restrain their children at all are also an important community sector to target. Finally, obtaining restraints presents a significant barrier to compliance for parents on limited incomes and interventions are needed to address this.
Resumo:
We derive an explicit method of computing the composition step in Cantor’s algorithm for group operations on Jacobians of hyperelliptic curves. Our technique is inspired by the geometric description of the group law and applies to hyperelliptic curves of arbitrary genus. While Cantor’s general composition involves arithmetic in the polynomial ring F_q[x], the algorithm we propose solves a linear system over the base field which can be written down directly from the Mumford coordinates of the group elements. We apply this method to give more efficient formulas for group operations in both affine and projective coordinates for cryptographic systems based on Jacobians of genus 2 hyperelliptic curves in general form.
Resumo:
The formation of a venture relies, in part, upon the participants reaching a shared understanding of purpose and process. Yet in circumstances of great complexity and uncertainty how can such a shared understanding be created? If the response to complexity and uncertainty is to seek simplicity in order to find commonality then what is lost and what is at risk? Can shared understandings of purpose and process be arrived at by embracing complexity and uncertainty and if so how? These questions led us to explore the process of dialogue and communication of a team in its formative stages. Our interests were not centred upon the behavioural characteristics of the individuals in the 'forming' stage of group dynamics but rather the process of cognitive and linguistic turns, the wax and wan of ideas and, the formation of shared meaning. This process of cognitive and linguistic turns was focused thematically on the areas of foresight, innovation, entrepreneurship, and public policy. This cross disciplinary exploration sought to explore potential synergies between these domains, in particular in developing a conceptual basis for long term thinking that can inform wiser public policy.
Resumo:
Safety psychology and workplace safety Commitment, Motivational and attitudinal components of safety Leadership Group Dynamics and Group Change Case Study from Construction
Resumo:
Observational seatbelt wearing studies are a valuable tool for obtaining up-to-date information about rates of use. Given that one quarter of vehicle occupants killed on Queensland roads in recent years were not wearing seatbelts, it is important that authorities are able to identify non-wearers and take steps to increase compliance with seatbelt laws to reduce the severity of crashes and, therefore, the road toll. An observational study of seatbelt use was conducted in metropolitan, regional and rural locations throughout Queensland in May and June, 2010. Trained observers took note of seatbelt use of all occupants of passenger vehicles, noting their gender, approximate age group, seating position, vehicle type, licence type (i.e. visible L or P plates), mobile phone use, and the date, time and location of the observation. Of 19,579 observations, 99.04% (19,391) of occupants were observed wearing seatbelts, as only 0.96% of occupants (188) were not wearing a seatbelt. There were differences in seatbelt wearing rates for a number of study variables, although most were very small. However, seatbelt wearing rates were 3.84% lower for drivers observed using a mobile phone than for those who were not. While compliance with seatbelt laws seems to be very high, it is still concerning that so few non-wearers represent a disproportionately large proportion of road fatalities and serious injuries in Queensland. Road safety authorities must therefore continue to find ways to improve seatbelt use, as small gains in wearing rates will translate into significant fatality reductions.
Resumo:
In 2001 China amended its copyright law in accordance with the requirements of the Agreement on Trade Related Aspects of Intellectual Property (TRIPS). This thesis explores the impact of copyright reform on China’s domestic film and music industries. Through extensive interviews with film and music industry workers – directors, producers, executives, judges, lawyers and musicians – it investigates the role of copyright in film and music’s shift from state driven to commercially focussed. The construction and negotiation of a new ‘copyright culture’ in China is examined through the lens of Yurchak’s (1999) concept of ‘entrepreneurial governmentality.’ Administrative structures put in place prior to China’s economic reform are no longer capable of controlling film and music production and consumption and new approaches to managing it are becoming more important. High levels of unauthorised distribution are forcing these industries to adapt their business models so that they can function in a system with weak copyright protection. Legal, economic and political changes have resulted in the emergence of an ‘entrepreneurial governmentality’ among film and music industry professionals. This commercially focussed group is, in turn, increasing pressure on the state to expand the space in which it can function and support efforts to strengthen the copyright system that allows it to exist. It is suggested that the construction and negotiation of a new ‘copyright culture’ is now taking place. This thesis describes the current situation in the film and music industries. It examines the tension between the theoretical possibilities created by copyright law, and the practical challenges of operating in China. It observes innovative business models being applied by film and music businesses in China. It discusses the impact of traditional attitudes to copying and also examines the role that open licensing models might play in helping limit the negative effects of copyright protection on public access to content and in raising levels of education about copyright among key groups within the community.
Resumo:
Making the University Matter investigates how academics situate themselves simultaneously in the university and the world and how doing so affects the viability of the university setting. The university stands at the intersection of two sets of interests, needing to be at one with the world while aspiring to stand apart from it. In an era that promises intensified political instability, growing administrative pressures, dwindling economic returns and questions about economic viability, lower enrolments and shrinking programs, can the university continue to matter into the future? And if so, in which way? What will help it survive as an honest broker? What are the mechanisms for ensuring its independent voice? Barbie Zelizer brings together some of the leading names in the field of media and communication studies from around the globe to consider a multiplicity of answers from across the curriculum on making the university matter, including critical scholarship, interdisciplinarity, curricular blends of the humanities and social sciences, practical training and policy work. The collection is introduced with an essay by the editor and each section has a brief introduction to contextualise the essays and highlight the issues they raise.
Resumo:
RAP-A was developed to meet the need for a universal resilience building program for teenagers which could be readily implemented in a school setting. A universal program targets all teenagers in a particular grade as opposed to those at higher risk for depression (indicated or selective approaches) or a treatment group. It is easier to recruit and engage adolescents in a universal approach where students do not face the risk of stigmatisation by being singled out for intervention. The Resourceful Adolescent Program (RAP: Shochet, Holland & Whitefield, 1997) was developed to meet this need.
Resumo:
The study shows an alternative solution to existing efforts at solving the problem of how to centrally manage and synchronise users’ Multiple Profiles (MP) across multiple discrete social networks. Most social network users hold more than one social network account and utilise them in different ways depending on the digital context (Iannella, 2009a). They may, for example, enjoy friendly chat on Facebook1, professional discussion on LinkedIn2, and health information exchange on PatientsLikeMe3 In this thesis the researcher proposes a framework for the management of a user’s multiple online social network profiles. A demonstrator, called Multiple Profile Manager (MPM), will be showcased to illustrate how effective the framework will be. The MPM will achieve the required profile management and synchronisation using a free, open, decentralized social networking platform (OSW) that was proposed by the Vodafone Group in 2010. The proposed MPM will enable a user to create and manage an integrated profile (IP) and share/synchronise this profile with all their social networks. The necessary protocols to support the prototype are also proposed by the researcher. The MPM protocol specification defines an Extensible Messaging and Presence Protocol (XMPP) extension for sharing vCard and social network accounts information between the MPM Server, MPM Client, and social network sites (SNSs). . Therefore many web users need to manage disparate profiles across many distributed online sources. Maintaining these profiles is cumbersome, time-consuming, inefficient, and may lead to lost opportunity. The writer of this thesis adopted a research approach and a number of use cases for the implementation of the project. The use cases were created to capture the functional requirements of the MPM and to describe the interactions between users and the MPM. In the research a development process was followed in establishing the prototype and related protocols. The use cases were subsequently used to illustrate the prototype via the screenshots taken of the MPM client interfaces. The use cases also played a role in evaluating the outcomes of the research such as the framework, prototype, and the related protocols. An innovative application of this project is in the area of public health informatics. The researcher utilised the prototype to examine how the framework might benefit patients and physicians. The framework can greatly enhance health information management for patients and more importantly offer a more comprehensive personal health overview of patients to physicians. This will give a more complete picture of the patient’s background than is currently available and will prove helpful in providing the right treatment. The MPM prototype and related protocols have a high application value as they can be integrated into the real OSW platform and so serve users in the modern digital world. They also provide online users with a real platform for centrally storing their complete profile data, efficiently managing their personal information, and moreover, synchronising the overall complete profile with each of their discrete profiles stored in their different social network sites.