890 resultados para Magazzino automatico utensili modellazione incremento prestazioni FDM prove sperimentali
Resumo:
The approach adopted for investigating the relationship between rainfall characteristics and pollutant wash-off process is commonly based on the use of parameters which represent the entire rainfall event. This does not permit the investigation of the influence of rainfall characteristics on different sectors of the wash-off process such as first flush where there is a high pollutant wash-off load at the initial stage of the runoff event. This research study analysed the influence of rainfall characteristics on the pollutant wash-off process using two sets of innovative parameters by partitioning wash-off and rainfall characteristics. It was found that the initial 10% of the wash-off process is closely linked to runoff volume related rainfall parameters including rainfall depth and rainfall duration while the remaining part of the wash-off process is primarily influenced by kinetic energy related rainfall parameters, namely, rainfall intensity. These outcomes prove that different sectors of the wash-off process are influenced by different segments of a rainfall event.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.
Resumo:
Introduction The presentation of pulmonary embolism to the emergency department (ED) can prove challenging because of the myriad of potential disease processes that mimic its signs and symptoms. The incidence of pulmonary embolism and indeed the mortality associated with it is relatively high. Early diagnosis and treatment is crucial in off-setting the potential deleterious effects associated with this condition. The aim of this article is to present a nursing case review of a patient presenting to the ED with a diagnosis of pulmonary embolism. Method We chose to use a case review to highlight the nursing and medical care that was provided for a patient who presented to the emergency department acutely with dyspnoea, chest pain and pyrexia. The use of case reviews are useful in reporting unusual or rare cases and this format is typically seen more in medicine than in nursing. They can naturally take one of two formats—a single case report or a series of case reports; in this case we opted to report on a single case. Discussion The gentleman in question was an ambulance admissionto the ED with a three day history of chest pain, shortness of breath and one episode of syncope which brought him to the ED. Over the course of his admission a variety of treatment modalities were used successfully to alleviate the problem. More notable from a nursing perspective was the use of diagnostic tools as an interpretation to guide his care and provide a platform from which a deeper understanding and appreciation of the intricacies the critically ill patient often presents. Conclusion We found the use of case review very enlightening in understanding the disease process and the decision-making that accompanies this. Whilst our patient was successfully rehabilitated home, we learnt a lot from the experience which has been most beneficial in supporting our understanding of pulmonary embolism.
Resumo:
We present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, we construct two new hierarchical identity-based encryption (HIBE) schemes, with and without random oracles. The resulting systems are very different from earlier lattice-based HIBEs and in some cases result in shorter ciphertexts and private keys. We prove security from classic lattice hardness assumptions.
Resumo:
Construction delay has been a protracted problem for the Malaysian construction industry. Recent report showed that 80% of public sector projects are behind schedule. This underachieving time performance has led to many problems including public complaints, loss of reputation and revenue for the government and a slump in the industry’s GDP contribution. Research in the area of project delay has mushroomed worldwide with attempts to place mitigation plans, but delay remains a global phenomenon. There is now an urgent need for revolutionizing construction practices and past research, backed up with few successful cases suggests that Supply Chain Management (SCM) could prove beneficial to reduce or eliminate delays in construction. SCM which originated from the automotive manufacturing industry promotes a more collaborative approach to construction management and has recently gained attention of the construction industry. However every country, including Malaysia, would certainly have disparities of their own compared to others being it from the cultural point of view, nature of problems, locality or improvements needed. Therefore, this paper will present part of a Ph.D. research which aims at illustrating the Malaysian construction industry experts’ perception of the Malaysian public sector project delay, provide insight into these dilemmas, highlights the problems with current practices, its effects and the improvements needed. Subsequently, this paper would propose ratification to the problems using SCM. A semi-structured interview has been conducted to practitioners with at least 20 years’ experience in the industry. The findings showed that Malaysia may be unique compared to other countries and that by considering a number of additional factors, SCM could prove beneficial to increase efficiency of the Malaysian public sector projects.
Resumo:
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that for any related-key differential characteristic on full-round PRESENT-80, the probability of the characteristic only in the 64-bit state is not higher than 2−64. To overcome the exponential (in the state and key sizes) computational complexity of the search we use truncated differences, however as the key schedule is not nibble oriented, we switch to actual differences and apply early abort techniques to prune the tree-based search. With a new method called extended split approach we are able to make the whole search feasible and we implement and run it in real time. Our approach targets the PRESENT-80 cipher however,with small modifications can be reused for other lightweight ciphers as well.
Resumo:
Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
The work of Gilles Deleuze has influenced an increasing number of music scholars and practicing musicians, particularly those interested in experimental, electronic and popular music. This is despite the notoriously complex nature of his writings, and the specialised theoretical vocabulary that he employs. This thesis both demystifies some of the key terms and concepts of this vocabulary, before demonstrating how Deleuze’s ideas may be put to work in new and fruitful ways; this is achieved with specific reference to the relationships that music has with thought, time and machines. In Chapter 1, Deleuze’s understanding of the power of thought is examined, in particular his approach to communication, transcendence and immanence, and the “powers of thought.” Each of these concepts helps us to understand Deleuze’s work within broad problem of how to think about music immanently: that is, how to maintain that thought and music are both immanent aspects of life and experience. Chapter 2 examines time within a Deleuzian framework, linking his work on cinema with the concept of the “refrain”; both of these areas prove crucial to his understanding of music, as seen in Deleuze’s approach to the work of Varese, Messiaen, and Boulez. In addition, Deleuze’s understanding of time proves fruitful in examining various aspects of music production, as seen in contemporary electronic dance music. Finally, Chapter 3 looks at the concept of the machine, as developed by Deleuze and Guattari, with reference to the sorts of “machinic” connections that a Deleuzian approach encourages us to seek out in music. Once again, examples from contemporary electronic music are presented, in relation to the notions of becoming and subjectivity. Throughout these chapters, Deleuze’s broad understanding of philosophy as the “creation of concepts” is deployed. This means introducing new ideas and specific types of music that encourage creative and novel engagements with the study of music.
Resumo:
In this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the impact of differential trails for block ciphers on collision attacks for various hash function constructions based on block ciphers. Further, we prove the lower bound for finding a pair that follows some truncated differential in case of a random permutation. Then we present open-key differential distinguishers for some well known round-reduced block ciphers.
Resumo:
In coastal areas, extreme weather events, such as floods and cyclones, can have debilitating effects on the social and economic viability of marine-based industries. In March 2011, the Great Barrier Reef Marine Park Authority implemented an Extreme Weather Response Program, following a period of intense flooding and cyclonic activity between December 2010 and February 2011. In this paper, we discuss the results of a project within the Program, which aimed to: (1) assess the impacts of extreme weather events on regional tourism and commercial fishing industries; and (2) develop and road-test an impact assessment matrix to improve government and industry responses to extreme weather events. Results revealed that extreme weather events both directly and indirectly affected all five of the measured categories, i.e. ecological, personal, social, infrastructure and economic components. The severity of these impacts, combined with their location and the nature of their business, influenced how tourism operators and fishers assessed the impact of the events (low, medium, high or extreme). The impact assessment tool was revised following feedback obtained during stakeholder workshops and may prove useful for managers in responding to potential direct and indirect impacts of future extreme weather events on affected marine industries. © 2013 Planning Institute Australia.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
A dynamic accumulator is an algorithm, which gathers together a large set of elements into a constant-size value such that for a given element accumulated, there is a witness confirming that the element was indeed included into the value, with a property that accumulated elements can be dynamically added and deleted into/from the original set such that the cost of an addition or deletion operation is independent of the number of accumulated elements. Although the first accumulator was presented ten years ago, there is still no standard formal definition of accumulators. In this paper, we generalize formal definitions for accumulators, formulate a security game for dynamic accumulators so-called Chosen Element Attack (CEA), and propose a new dynamic accumulator for batch updates based on the Paillier cryptosystem. Our construction makes a batch of update operations at unit cost. We prove its security under the extended strong RSA (es-RSA) assumption
Resumo:
Guanxi has become a common term in the wider business environment and has attracted the increasing attention of researchers. Despite this, a consistent understanding of the concept continues to prove elusive. We review the extant business literature to highlight the major inconsistencies in the way guanxi is currently conceptualized: the breadth, linguistic-cultural depth, temporality, and level of analysis. We conclude with a clearer conceptualization of guanxi which separates the core elements from antecedents and consequences of guanxi. Furthermore, we compare and contrast guanxi with western correlates such as social networks and social capitals to further consolidate our understanding of guanxi.
Resumo:
Background Transcription factors (TFs) co-ordinately regulate target genes that are dispersed throughout the genome. This co-ordinate regulation is achieved, in part, through the interaction of transcription factors with conserved cis-regulatory motifs that are in close proximity to the target genes. While much is known about the families of transcription factors that regulate gene expression in plants, there are few well characterised cis-regulatory motifs. In Arabidopsis, over-expression of the MYB transcription factor PAP1 (PRODUCTION OF ANTHOCYANIN PIGMENT 1) leads to transgenic plants with elevated anthocyanin levels due to the co-ordinated up-regulation of genes in the anthocyanin biosynthetic pathway. In addition to the anthocyanin biosynthetic genes, there are a number of un-associated genes that also change in expression level. This may be a direct or indirect consequence of the over-expression of PAP1. Results Oligo array analysis of PAP1 over-expression Arabidopsis plants identified genes co-ordinately up-regulated in response to the elevated expression of this transcription factor. Transient assays on the promoter regions of 33 of these up-regulated genes identified eight promoter fragments that were transactivated by PAP1. Bioinformatic analysis on these promoters revealed a common cis-regulatory motif that we showed is required for PAP1 dependent transactivation. Conclusion Co-ordinated gene regulation by individual transcription factors is a complex collection of both direct and indirect effects. Transient transactivation assays provide a rapid method to identify direct target genes from indirect target genes. Bioinformatic analysis of the promoters of these direct target genes is able to locate motifs that are common to this sub-set of promoters, which is impossible to identify with the larger set of direct and indirect target genes. While this type of analysis does not prove a direct interaction between protein and DNA, it does provide a tool to characterise cis-regulatory sequences that are necessary for transcription activation in a complex list of co-ordinately regulated genes.