934 resultados para distributed denial-of-service attack


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tilting-pad hydrodynamic thrust bearings are used in hydroelectric power stations around the world, reliably supporting turbines weighing hundreds of tonnes, over decades of service. Newer designs incorporate hydrostatic recesses machined into the sector-shaped pads to enhance oil film thickness at low rotational speeds. External pressurisation practically eliminates wear and enhances service life and reliability. It follows that older generating plants, lacking such assistance, stand to benefit from being retrofitted with hydrostatic lubrication systems. The design process is not trivial however. The need to increase the groove size to permit spontaneous lifting of the turbine under hydrostatic pressure, conflicts with the need to preserve performance of the original plane pad design. A haphazardly designed recess can induce a significant rise in bearing temperature concomitant with reduced mechanical efficiency and risk of thermal damage. In this work, a numerical study of a sector-shaped pad is undertaken to demonstrate how recess size and shape can affect the performance of a typical bearing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose The purpose of this paper is to investigate the role of multiple actors in the value creation process for a preventative health service, and observe the subsequent impact on key service outcomes of satisfaction and customer behaviour intentions to use a preventative health service again in the future. Design/methodology/approach An online self-completion survey of Australian women (n=797) was conducted to test the proposed framework in the context of a free, government-provided breastscreening service. Data were analysed using Structural Equation Modelling (SEM). Findings The findings indicate that functional and emotional value are created from organisational and customer resources. These findings indicate that health service providers and customers are jointly responsible for the successful creation of value, leading to desirable outcomes for all stakeholders. Practical implications The results highlight to health professionals the aspects of service that can be managed in order to create value with target audiences. The findings also indicate the importance of the resources provided by users in the creation of value, signifying the importance of customer education and management. Originality/value This study provides a significant contribution to social marketing through the provision of an empirically validated model of value creation in a preventative health service. The model demonstrates how the creation and provision of value can lead to the achievement of desirable social behaviours - a key aim of social marketing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Stress corrosion cracking (SCC) is a well known form of environmental attack in low carat gold jewellery. It is desirable to have a quick, easy and cost effective way to detect SCC in alloys and prevent them from being used and later failing in their application. A facile chemical method to investigate SCC of 9 carat gold alloys is demonstrated. It involves a simple application of tensile stress to a wire sample in a corrosive environment such as 1–10 % FeCl3 which induces failure in less than 5 minutes. In this study three quaternary (Au, Ag, Cu and Zn) 9 carat gold alloy compositions were investigated for their resistance to SCC and the relationship between time to failure and processing conditions is studied. It is envisaged that the use of such a rapid and facile screening procedure at the production stage may readily identify alloy treatments that produce jewellery that will be susceptible to SCC in its lifetime.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

• Government reports consistently recognise the importance of Primary Health Care to an efficient health system. Barriers identified in Australia’s Primary Health Care include workforce pressures, increase rate of chronic disease, and equitable access to Primary Health Care services. • General Practitioners (GPs) are the key to the successful delivery of Primary Health Care especially in rural and remote regions such as the Wheatbelt region in Western Australia (WA). • The Wheatbelt region of WA is vast: some 72,500 residents spread across 150,000km2 in 43 Local Government Authorities catchments. Majority of the Wheatbelt residents live in small towns. There is a higher reported rates of chronic disease, more at risk of chronic diseases and less utilisation of Primary Health Care services in this region. • General practice patients in the Wheatbelt are among those most in need of Primary Health Care services. • Wheatbelt GP Network (the “Network”) was established in 1998. It is a key health service delivery stakeholder in the Wheatbelt. • The Network has responded to the health needs of the community by creating a mobile Allied Health Team that works closely with GPs and is adaptive to ensure priority needs are met. • The Medicare Local model introduced by the Australian Government in 2011 aimed to improve the delivery of Primary Health Care services by improved health planning and coordinating service delivery. • Little if any recognition has been given to the outstanding work that many Divisions of General Practice have done in improving the delivery of Primary Health Care services such as the Network. • The Network has continued to support GPs and general practices and created a complementary system that integrated general practice with the work of an Allied Health Team. Its program mix is extensive. • The Network has consistently delivered on-required contract outputs and has a fifteen (15) years history of operating successfully in a large geographical area comprising in the main smaller communities that cannot support the traditional health services model. • The complexity of supporting International Medical Graduates in the region requires special attention. • The introduction of the Medicare Local in the South West of WA and their intention to take over the delivery of health services, thus effectively shutting the Network will have catastrophic consequences and cannot be supported economically. • The Network proposes to create a new model, built on its past work that increases the delivery of Primary Health Care services through its current Allied Health Team. • The proposal uses the Wheatbelt GP Super Clinic currently under construction in Northam, part of the Network and funded by the Australian Government is a key to the proposed new model. • Wheatbelt GP Super Clinic is different from existing models of GP Super Clinics around Australia which focus predominately on co-location of services. Wheatbelt GP Super Clinic utilises a hub and spoke model of service outreach to small rural towns to ensure equitable Primary Health Care coverage and continuum of care in a financially responsible and viable manner. In particular, the Wheatbelt GP Super Clinic recognises the importance of Allied Health Professionals and will involve them in a collaborative model with rural general practice. • The proposed model advocated by the Network aims to substitute the South West WA Medicare Local direct service delivery proposed for the Wheatbelt. The Network’s proposed model is to expand on the current hub and spoke model of Primary Health Care delivery to otherwise small unviable Wheatbelt towns. A flexible and adaptive skill mix of Allied Health Professionals, Nurse Practitioners and GPs ensure equitable access to service. Expanded scope of practices are utilised to reduce duplication of service and concentration of services in major towns. This involves a partnership approach. • If the proposed model not funded, the Network and the Wheatbelt region will stand to lose 16 Allied Health Professionals and defeats the purpose of Australian Government current funding for the construction of the Wheatbelt GP Super Clinic. • The Network has considered how its model can best be funded. It proposes a re-allocation of funds made available to the South West WA Medicare Local. • This submission argues that the proposal for the South West WA Medicare Local to take over the service delivery of Primary Health Care services in the Wheatbelt makes no economic sense when an existing agency (the Network) has the infrastructure in place, is experienced in working in this geographical area that has special needs and is capable to expand its programs to meet demand.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

‘SUGAR: Service users and carers group advising on research’ is an exciting initiative established to develop collaborative working in mental health nursing research between mental health service users, carers, researchers and practitioners at City University London, UK. This paper will describe the background to SUGAR and how and why it was established; how the group operates; some of the achievements to date including researcher reflections; and case studies of how this collaboration influences our research. Written reflective narratives of service user and carer experiences of SUGAR were analysed using constant comparative methods by the members. Common themes are presented with illustrative quotes. The article highlights the benefits and possible limitations identified so far by members of SUGAR; outlines future plans and considers the findings in relation to literature on involvement and empowerment. This paper has been written by staff and members of SUGAR and is the first venture into collaborative writing of the group and reflects the shared ethos of collaborative working.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There has been growing recognition of the contribution that Sessional Academics make to student learning in higher education; with recent studies concluding that around half Australian university teaching is now performed by casual staff [Red Report 2008; May, 2013]. However, sector-wide research and institutional audits continue to raise concerns about academic development and quality assurance, as well as the recognition and retention of Sessional Academics. In response, universities offer academic development programs. However, while such centrally offered programs are undoubtedly useful, they are necessarily generic and cannot address the local contexts of faculties or provide ‘on the ground’ support. This paper presents a new, distributed model of academic support and development for Sessional academics at Queensland University of Technology. Entitled the Sessional Academic Success program, it employs the principles of distributed leadership. Experienced Sessional academics are trained and supported to assume roles as Sessional Academic Success Advisors within their schools. Complementing our central programs, they design bespoke, locally situated, peer-to-peer academic development for new Sessional teachers; provide ‘just in time’, safe and reliable advice; and build supportive communities of teaching practice in their local contexts. This distributed model re-envisages the forms and places of academic development and support. It helps ensure that new Sessional Academics are embraced by faculty life. And, recognizing that experienced Sessional Academics have much to contribute to the advancement of learning and teaching, it builds their capacity through leadership opportunities. As the designer/facilitator of the program and a Sessional Academic Success Advisor, the authors take a dialogic approach and together describe the design, implementation and outcomes of the program.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective To describe the changing prevalence of healthcare- and community-associated MRSA. Methods Susceptibility phenotypes of MRSA were observed from 2000 to 2012 using routine susceptibility data. Phenotypic definitions of major clones were validated by genotyping isolates from a nested period prevalence survey in 2011. Results The predominant healthcare-associated (AUS-2/3 like) MRSA phenotype decreased from 42 to 14 isolates per million occasions of service in outpatients (P < 0.0001) and from 650 to 75 isolates per million accrued patient days in inpatients (P 0.0005), while the respective rates of the healthcare-related EMRSA-15 like phenotype increased from 1 to 19 in outpatients (P < 0.0001) and from 11 to 83 in inpatients (P < 0.0001) and those of the community-associated MRSA phenotype increased from 17 to 296 in outpatients (P < 0.0001) and from 71 to 486 in inpatients (P < 0.0001). When compared with single nucleotide polymorphism genotyping the AUS-2/3 like phenotype had a sensitivity and positive predictive value (PPV) for CC239 of 1 and 0.791 respectively, while the EMRSA-15 like phenotype had a sensitivity and PPV for CC22 of 0.903 and 0.774. PVL-positive CA-MRSA, predominantly ST93 and CC30, accounted for 60.8% of MRSA, while PVL-negative CA-MRSA, mainly CC5 and CC1, accounted for 21.4%. Conclusions The initially dominant healthcare-associated MRSA clone has been progressively replaced, mainly by four community-associated lineages.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objectives Current evidence to support non-medical prescribing is predominantly qualitative, with little evaluation of accuracy, safety and appropriateness. Our aim was to evaluate a new model of service for the Australia healthcare system, of inpatient medication prescribing by a pharmacist in an elective surgery preadmission clinic (PAC) against usual care, using an endorsed performance framework. Design Single centre, randomised controlled, two-arm trial. Setting Elective surgery PAC in a Brisbane-based tertiary hospital. Participants 400 adults scheduled for elective surgery were randomised to intervention or control. Intervention A pharmacist generated the inpatient medication chart to reflect the patient's regular medication, made a plan for medication perioperatively and prescribed venous thromboembolism (VTE) prophylaxis. In the control arm, the medication chart was generated by the Resident Medical Officers. Outcome measures Primary outcome was frequency of omissions and prescribing errors when compared against the medication history. The clinical significance of omissions was also analysed. Secondary outcome was appropriateness of VTE prophylaxis prescribing. Results There were significantly less unintended omissions of medications: 11 of 887 (1.2%) intervention orders compared with 383 of 1217 (31.5%) control (p<0.001). There were significantly less prescribing errors involving selection of drug, dose or frequency: 2 in 857 (0.2%) intervention orders compared with 51 in 807 (6.3%) control (p<0.001). Orders with at least one component of the prescription missing, incorrect or unclear occurred in 208 of 904 (23%) intervention orders and 445 of 1034 (43%) controls (p<0.001). VTE prophylaxis on admission to the ward was appropriate in 93% of intervention patients and 90% controls (p=0.29). Conclusions Medication charts in the intervention arm contained fewer clinically significant omissions, and prescribing errors, when compared with controls. There was no difference in appropriateness of VTE prophylaxis on admission between the two groups.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This project advances the current understanding of intraurban rail passengers and their travel experiences to help rail industry leaders tailor policy approaches to fit specific, relevant segments of their target population. Using a Q-sorting technique and cluster analysis, preliminary research identified five perspectives occurring in a small sample of rail passengers who varied in their frequency and location of rail travel as well as certain sociodemographic characteristics. Revealed perspectives (named to capture the gist of their content) included "Rail travel is about the destination, not the journey"; "Despite challenges, public transport is still the best option"; "Rail travel is fine"; "Rail travel? So far, so good"; and "Bad taste for rail travel." This paper discusses each of the perspectives in detail and considers them in relation to tailored policy implications. An overarching finding from this study is that improving railway travel access requires attention to physical, psychological, financial, and social facets of accessibility. For example, designing waiting areas to be more socially functional and comfortable has the potential to increase ridership by addressing social forms of access, decreasing perceived wait times, and making time at the station feel like time well spent. Even at this preliminary stage, the Q-sorting technique promises to provide a valuable, holistic, albeit fine-grained, analysis of passenger attitudes and experiences that will assist industry efforts in increasing ridership.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Natural distributions of most freshwater taxa are restricted geographically, a pattern that reflects dispersal limitation. Macrobrachium rosenbergii is unusual because it occurs naturally in rivers from near Pakistan in the west, across India and Bangladesh to the Malay Peninsula, and across the Sunda Shelf and Indonesian archipelago to western Java. Individuals cannot tolerate full marine conditions, so dispersal between river drainage basins must occur at limited geographical scales when ecological or climatic factors are favorable. We examined molecular diversity in wild populations of M. rosenbergii across its complete natural range to document patterns of diversity and to relate them to factors that have driven evolution of diversity in this species. We found 3 clades in the mitochondrial deoxyribonucleic acid (mtDNA) data set that corresponded geographically with eastern, central, and western sets of haplotypes that last shared a common ancestor 1 × 106 y ago. The eastern clade was closest to the common ancestor of all 3 clades and to the common ancestor with its congener, Macrobrachium spinipes, distributed east of Huxley's Line. Macrobrachium rosenbergii could have evolved in the western Indonesian archipelago and spread westward during the early to mid-Pleistocene to India and Sri Lanka. Additional groups identified in the nuclear DNA data set in the central and western clades probably indicate secondary contact via dispersal between regions and modern introductions that have mixed nuclear and mtDNA genes. Pleistocene sea-level fluctuations can explain dispersal across the Indonesian archipelago and parts of mainland southeastern Asia via changing river drainage connections in shallow seas on wide continental shelves. At the western end of the modern distribution where continental shelves are smaller, intermittent freshwater plumes from large rivers probably permitted larval dispersal across inshore areas of lowered salinity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Enterprise architectures are exposed to fast emerging business and information technology capabilities. A prominent example is the paradigm of service-orientation, which leads to its own architectural requirements and impacts the design and ongoing evolution of Enterprise Architectures. This thesis develops the first theoretical model describing enterprise architecture evolution and outcomes in light of a changing IT landscape such as service-oriented architectures. The developed theoretical model explains enterprise architecture evolution, its main stages and related capabilities. This model can be used to derive theoretical, sound guidelines to manage enterprise architectures in a changing environment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Service-oriented architectures and Web services mature and have become more widely accepted and used by industry. This growing adoption increased the demands for new ways of using Web service technology. Users start re-combining and mediating other providers’ services in ways that have not been anticipated by their original provider. Within organisations and cross-organisational communities, discoverable services are organised in repositories providing convenient access to adaptable end-to-end business processes. This idea is captured in the term Service Ecosystem. This paper addresses the question of how quality management can be performed in such service ecosystems. Service quality management is a key challenge when services are composed of a dynamic set of heterogeneous sub-services from different service providers. This paper contributes to this important area by developing a reference model of quality management in service ecosystems. We illustrate the application of the reference model in an exploratory case study. With this case study, we show how the reference model helps to derive requirements for the implementation and support of quality management in an exemplary service ecosystem in public administration.