903 resultados para one class SVM


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis studied the emotional climate (EC) of a pre-service science teachers' class in Bhutan. It examined the types of activities students engaged in and the relationship between the tutor and students whose interactions produced both positive and negative EC in the class. The major finding was that the activities involving students' presentations using video clips and models, group activity, and coteaching valenced the class EC positively. Negative EC was identified when the tutor ignored students' responses, during formal lectures, and when the tutor was uncertain of the subject knowledge. The replication of activities that produce positive EC by other Bhutanese tutors may improve the standard of science education in the country.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates the governance attributes of firms that have been subject to securities class actions (SCAs). There has been a recent sizable increase in the number of firms subject to SCAs in Australia. We examine a sample of firms that have been subject to SCAs due to disclosure breaches and match the firms by industry and size to a control sample. First, we examine the compliance culture of the SCA firms via the frequency of Australian Securities Exchange (ASX)queries of the firm and find that the frequency of ASX queries is positively associated with the occurrence of a SCA. Secondly, we provide evidence that SCA firms exhibit weaker levels of corporate governance than the matched control sample. In addition, we contribute to the understanding of firms subject to SCAs and their corporate governance attributes. Our results suggest the presence of a nomination committee may be associated with higher agency costs and that the influence of CEO duality may reduce the effectiveness of a nomination committee.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-exponent d from the public key (N,e) as long as d < N 1/4. Interestingly, Wiener stated that his attack may sometimes also work when d is slightly larger than N 1/4. This raises the question of how much larger d can be: could the attack work with non-negligible probability for d=N 1/4 + ρ for some constant ρ > 0? We answer this question in the negative by proving a converse to Wiener’s result. Our result shows that, for any fixed ε > 0 and all sufficiently large modulus lengths, Wiener’s attack succeeds with negligible probability over a random choice of d < N δ (in an interval of size Ω(N δ )) as soon as δ > 1/4 + ε. Thus Wiener’s success bound dclass of extensions of the Wiener attack, which are guaranteed to succeed even when δ > 1/4. The known attacks in this class (by Verheul and Van Tilborg and Dujella) run in exponential time, so it is natural to ask whether there exists an attack in this class with subexponential run-time. Our second converse result answers this question also in the negative.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One-time proxy signatures are one-time signatures for which a primary signer can delegate his or her signing capability to a proxy signer. In this work we propose two one-time proxy signature schemes with different security properties. Unlike other existing one-time proxy signatures that are constructed from public key cryptography, our proposed schemes are based one-way functions without trapdoors and so they inherit the communication and computation efficiency from the traditional one-time signatures. Although from a verifier point of view, signatures generated by the proxy are indistinguishable from those created by the primary signer, a trusted authority can be equipped with an algorithm that allows the authority to settle disputes between the signers. In our constructions, we use a combination of one-time signatures, oblivious transfer protocols and certain combinatorial objects. We characterise these new combinatorial objects and present constructions for them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most signature schemes are randomised and allow many possible signatures for a single message. In this case, it may be possible to produce a new signature on a previously signed message. Some applications require that this type of forgery also be prevented – this requirement is called strong unforgeability. At PKC2006, Boneh Shen and Waters presented an efficient transform based on any randomised trapdoor hash function which converts a weakly unforgeable signature into a strongly unforgeable signature and applied it to construct a strongly unforgeable signature based on the CDH problem. However, the transform of Boneh et al only applies to a class of so-called partitioned signatures. Although many schemes fall in this class, some do not, for example the DSA signature. Hence it is natural to ask whether one can obtain a truly generic efficient transform based on any randomised trapdoor hash function which converts any weakly unforgeable signature into a strongly unforgeable one. We answer this question in the positive by presenting a simple modification of the Boneh-Shen-Waters transform. Our modified transform uses two randomised trapdoor hash functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is a case study of a young university striving to generate and sustain a vibrant Research Training culture. The university’s research training framework is informed by a belief in a project management approach to achieving successful research candidature. This has led to the definition and reporting of key milestones during candidature. In turn, these milestones have generated a range of training programs to support Higher Degree Research (HDR) students to meet these milestones in a timely fashion. Each milestone focuses on a specific set of skills blended with supporting the development of different parts of the doctoral thesis. Data on student progress and completion has provided evidence in highlighting the role that the milestones and training are playing in supporting timely completion. A university-wide reporting cycle generated data on the range of workshops and training provided to Higher Degree Research students and supervisors. The report provided details of thesis topic and format, as well as participation in research training events and participant evaluation of those events. Analysis of the data led to recommendations and comments on the strengths and weaknesses of the current research training program. Discussion considered strategies and drivers for enhancements into the future. In particular, the paper reflects on the significant potential role of centrally curated knowledge systems to support HDR student and supervisor access, and engagement and success. The research training program was developed using blended learning as a model. It covered face-to-face workshops as well as online modules. These were supplemented by web portals that offered a range of services to inform and educate students and supervisors and included opportunities for students to interact with each other. Topics ranged from the research life cycle, writing and publication, ethics, managing research data, managing copyright, and project management to use of software and the University’s Code of Conduct for Research. The challenges discussed included: How to reach off campus students and those studying in external modes? How best to promote events to potential participants? How long and what format is best for face-to-face sessions? What online resources best supplement face-to-face offerings? Is there a place for peer-based learning and what form should this take? These questions are raised by a relatively young university seeking to build and sustain a vibrant research culture. The rapid growth in enrolments in recent years has challenged previous one-to-one models of support. This review of research training is timely in seeking strategies to address changing research training support capacity and student needs. Part of the discussion will focus on supervisory training, noting that good supervision is the one remaining place where one-to-one support is provided. Ensuring that supervisors are appropriately equipped to address student expectations is considered in the context of the research training provisions. The paper concludes with reflection on the challenges faced, and recommended ways forward as the number of research students grows into the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper aims to review the notion of the one-stop shop, particularly as it has developed in Australia. It has three main components. The first focuses on a significant initiative taken by the Coombs Royal Commission on Australian Government Administration as a form of action research in the mid-1970s. The second highlights the associated work on access theory by the late Bernard Schaffer and his associates and explains why this work was of fundamental importance for the development of the idea of the one-stop shop. The third deals with subsequent Australian understandings and a pp lications of the idea.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our research aims to answer the research questions “How do we commonly describe the global start-ups profile as evidenced in prior inductive research?” and “Does this global start-ups profile can effectively explain phenomena in Australian global start-up firms?” We systematically review 29 global start-ups (144 firms) qualitative articles to understand descriptive definitions of global-startup firms. We then triangulate this finding with an Australian high-tech firm. Our contribution is to form a descriptive profile of global start-up phenomenon and raise interesting issues that have potentially fruitful findings for both research and practice. This profile might well be just a deviant from the traditional model that describes how firms establish their footprints, first in their domestic markets followed by moves into cross-border activities. Regardless, government agencies, consultants, and entrepreneurs need to understand the phenomenon. Thus we anticipate that this phenomenon will continue to provide interesting issues for pursuit, both by researchers as well as the practitioner community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Battery-supercapacitor hybrid energy storage systems are becoming popular in the renewable energy sector due to their improved power and energy performances. These hybrid systems require separate dc-dc converters, or at least one dc-dc converter for the supercapacitor bank, to connect them to the dc-link of the grid interfacing inverter. These additional dc-dc converters increase power losses, complexity and cost. Therefore, possibility of their direct connection is investigated in this paper. The inverter system used in this study is formed by cascading two 3-level inverters, named as the “main inverter” and the “auxiliary inverter”, through a coupling transformer. In the test system the main inverter is connected with the rectified output of a wind generator while the auxiliary inverter is directly attached to a battery and a supercapacitor bank. The major issues with this approach are the dynamic changes in dc-link voltages and inevitable imbalances in the auxiliary inverter voltages, which results in unevenly distributed space vectors. A modified SVM technique is proposed to solve this issue. A PWM based time sharing method is proposed for power sharing between the battery and the supercapacitor. Simulation results are presented to verify the efficacy of the proposed modulation and control techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The one-step preparation of highly anisotropic polymer semiconductor thin films directly from solution is demonstrated. The conjugated polymer poly(3-hexylthiophene) (P3HT) as well as P3HT:fullerene bulk-heterojunction blends can be spin-coated from a mixture of the crystallizable solvent 1,3,5-trichlorobenzene (TCB) and a second carrier solvent such as chlorobenzene. Solidification is initiated by growth of macroscopic TCB spherulites followed by epitaxial crystallization of P3HT on TCB crystals. Subsequent sublimation of TCB leaves behind a replica of the original TCB spherulites. Thus, highly ordered thin films are obtained, which feature square-centimeter-sized domains that are composed of one spherulite-like structure each. A combination of optical microscopy and polarized photoluminescence spectroscopy reveals radial alignment of the polymer backbone in case of P3HT, whereas P3HT:fullerene blends display a tangential orientation with respect to the center of spherulite-like structures. Moreover, grazing-incidence wide-angle X-ray scattering reveals an increased relative degree of crystallinity and predominantly flat-on conformation of P3HT crystallites in the blend. The use of other processing methods such as dip-coating is also feasible and offers uniaxial orientation of the macromolecule. Finally, the applicability of this method to a variety of other semi-crystalline conjugated polymer systems is established. Those include other poly(3-alkylthiophene)s, two polyfluorenes, the low band-gap polymer PCPDTBT, a diketopyrrolopyrrole (DPP) small molecule as well as a number of polymer:fullerene and polymer:polymer blends. Macroscopic spherulite-like structures of the conjugated polymer poly(3-hexylthiophene) (P3HT) grow directly during spin-coating. This is achieved by processing P3HT or P3HT:fullerene bulk heterojunction blends from a mixture of the crystallizable solvent 1,3,5-trichlorobenzene and a second carrier solvent such as chlorobenzene. Epitaxial growth of the polymer on solidified solvent crystals gives rise to circular-symmetric, spherulite-like structures that feature a high degree of anisotropy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores the possibility of connecting two Wind Turbine Generators (WTG) to the grid using a single three level inverter. In the proposed system the rectified output of one WTG is connected across the upper dc-link capacitor of a standard diode clamped three level inverter. Similarly the rectified output of the other WTG is connected across the lower capacitor. This particular combination has several advantages such as, direct connection to the grid, reduced parts count, improved reliability and high power capacity. However, the major problem in the proposed system is the imminent imbalance of dc-link voltages. Under such conditions conventional modulation methods fail to produce desired voltage and current waveforms. A detailed analysis on this issue and a novel space vector modulation method, as the solution, are proposed in this paper. To track the Maximum power point of each WTG a power sharing algorithm is proposed. Simulation results are presented to attest the efficacy of the proposed system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Age-related Macular Degeneration (AMD) is one of the major causes of vision loss and blindness in ageing population. Currently, there is no cure for AMD, however early detection and subsequent treatment may prevent the severe vision loss or slow the progression of the disease. AMD can be classified into two types: dry and wet AMDs. The people with macular degeneration are mostly affected by dry AMD. Early symptoms of AMD are formation of drusen and yellow pigmentation. These lesions are identified by manual inspection of fundus images by the ophthalmologists. It is a time consuming, tiresome process, and hence an automated diagnosis of AMD screening tool can aid clinicians in their diagnosis significantly. This study proposes an automated dry AMD detection system using various entropies (Shannon, Kapur, Renyi and Yager), Higher Order Spectra (HOS) bispectra features, Fractional Dimension (FD), and Gabor wavelet features extracted from greyscale fundus images. The features are ranked using t-test, Kullback–Lieber Divergence (KLD), Chernoff Bound and Bhattacharyya Distance (CBBD), Receiver Operating Characteristics (ROC) curve-based and Wilcoxon ranking methods in order to select optimum features and classified into normal and AMD classes using Naive Bayes (NB), k-Nearest Neighbour (k-NN), Probabilistic Neural Network (PNN), Decision Tree (DT) and Support Vector Machine (SVM) classifiers. The performance of the proposed system is evaluated using private (Kasturba Medical Hospital, Manipal, India), Automated Retinal Image Analysis (ARIA) and STructured Analysis of the Retina (STARE) datasets. The proposed system yielded the highest average classification accuracies of 90.19%, 95.07% and 95% with 42, 54 and 38 optimal ranked features using SVM classifier for private, ARIA and STARE datasets respectively. This automated AMD detection system can be used for mass fundus image screening and aid clinicians by making better use of their expertise on selected images that require further examination.