962 resultados para contents of identity


Relevância:

90.00% 90.00%

Publicador:

Resumo:

We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7). Moreover, we briefly mention heuristic lattice based collision attacks that use small memory but require very long messages that are expected to find collisions much faster than 2 x/2. All of these attacks exploit the designers’ choice of an all zero IV. We then consider whether LASH can be patched simply by changing the IV. In this case, we show that LASH is vulnerable to a 2(7x/8) preimage attack. We also show that LASH is trivially not a PRF when any subset of input bytes is used as a secret key. None of our attacks depend upon the particular contents of the LASH matrix – we only assume that the distribution of elements is more or less uniform.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Background Through an account of prevailing experiences of art and mental illness, this paper aims to raise awareness, open dialogue and create agency about art created by people with experience of mental illness. Methods This paper draws on personal narrative and inquiry by an artist with mental illness and data collected as part of a larger participatory action research project that investigated understandings of identity, art and mental illness. Result An inquiry through art raised awareness and attentiveness to the importance of choice in identity construction and exposed frequent dichotomies in art and mental illness that were negotiated to eschew prescribed social stratification. As an artist, the first author challenged values present in one idea and absent in the other, and the options and concessions available to authorise her own dialogue and agency of being an artist. Conclusion Constructing an identity is an important part of being human, the labels that we choose or are chosen for us attribute to our identity. Reflections and recommendations are offered to consider expanded ways of thinking about art and mental illness and the functions that art play in identity construction.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Cleaning of sugar mill evaporators is an expensive exercise. Identifying the scale components assists in determining which chemical cleaning agents would result in effective evaporator cleaning. The current methods (based on x-ray diffraction techniques, ion exchange/high performance liquid chromatography and thermogravimetry/differential thermal analysis) used for scale characterisation are difficult, time consuming and expensive, and cannot be performed in a conventional analytical laboratory or by mill staff. The present study has examined the use of simple descriptor tests for the characterisation of Australian sugar mill evaporator scales. Scale samples were obtained from seven Australian sugar mill evaporators by mechanical means. The appearance, texture and colour of the scale were noted before the samples were characterised using x-ray fluorescence and x-ray powder diffraction to determine the compounds present. A number of commercial analytical test kits were used to determine the phosphate and calcium contents of scale samples. Dissolution experiments were carried out on the scale samples with selected cleaning agents to provide relevant information about the effect the cleaning agents have on different evaporator scales. Results have shown that by simply identifying the colour and the appearance of the scale, the elemental composition and knowing from which effect the scale originates, a prediction of the scale composition can be made. These descriptors and dissolution experiments on scale samples can be used to provide factory staff with an on-site rapid process to predict the most effective chemicals for chemical cleaning of the evaporators.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The role of exosomes in cancer development has become the focus of much research, due to the many emerging roles possessed by exosomes. These micro-vesicles that are ubiquitously released in to the extracellular milieu, have been found to regulate immune system function, particularly in tumorigenesis, as well as conditioning future metastatic sites for the attachment and growth of tumor tissue. Through an interaction with a range of host tissue, exosomes are able to generate a pro-tumor environment that is essential for carcinogenesis. Herein, we discuss the contents of exosomes and their contribution to tumorigenesis, as well as their role in chemotherapeutic resistance and the development of novel cancer treatments and the identification of cancer biomarkers.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

While identity construction continues to be a widely discussed and researched area in contemporary social sciences, the existing theories have overlooked the importance of understanding why and how identities as semiotic constructions emerge in individuals' consciousness in the flow of their everyday functioning. This article seeks to address this limitation in the theorizing by proposing an alternative conceptualization of identity, according to which identity construction is triggered by rupturing life-experience, which surfaces another perspective and makes the person aware of a possibility to be otherwise or of the reality of being different. Theoretical claims put forward in the paper are drawn from data gathered in a recent study, which explored lived-through experiences of young Estonians, who made study-visits to the United Kingdom. The discussed data will also highlight some interesting aspects in Estonians' self-definition as it is constructed in relation to Eastern-European identity in the context of contemporary Britain.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Barbadocladius n. gen. is erected and described in larval, pupal and adult stages for two species: B. andinus sp. nov. and B. limay sp. nov., from Andean streams. The larva is distinctive by virtue of the very large ventromental 'beard' and the anterior parapods with a 'sleeve' of hooklets in addition to apical pectinate claws. The pupa has hooklets on some tergal and sternal intersegmental membranes. The adult, reported only in teneral specimens has hairy eyes, no antennal apical strong seta, no acrostichals, bare and unmarked wings, cylindrical 4th tarsomere subequal in length to the 5th, pulvilli about half the claw length, and hypopygium with anal point, lacking a virga. Molecular phylogenetic analysis eliminates relationships directly to the Eukiefferiella complex (which also have pupal hooklets), or to the Cricotopus group (adults also with hairy eyes), suggesting instead a sister group relationship to a suite of predominantly austral genera of Orthocladiinae.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Confessions of a Non-Emigrant is innovative in combining two areas of investigation in creative writing and literature. I investigate both the idea of life writing as therapeutic for the author, and the (reflexive and enabling) blurred boundary between life writing and fiction. I set up a dynamic where the narrative of the story (fictionalised memoir) proposes the therapeutic advantage of utilising one’s life-story in fiction (increased sense of coherent identity and agency) and a perspective (through the device of multiple selves), on the constructedness and instability of identity. I mobilise and explore Pennebaker’s argument that making a narrative of one’s life enhances the writer’s sense of a connection with community and place (represented by Brisbane).

Relevância:

90.00% 90.00%

Publicador:

Resumo:

To identify current ED models of care and their impact on care quality, care effectiveness, and cost. A systematic search of key health databases (Medline, CINAHL, Cochrane, EMbase) was conducted to identify literature on ED models of care. Additionally, a focused review of the contents of 11 international and national emergency medicine, nursing and health economic journals (published between 2010 and 2013) was undertaken with snowball identification of references of the most recent and relevant papers. Articles published between 1998 and 2013 in the English language were included for initial review by three of the authors. Studies in underdeveloped countries and not addressing the objectives of the present study were excluded. Relevant details were extracted from the retrieved literature, and analysed for relevance and impact. The literature was synthesised around the study's main themes. Models described within the literature mainly focused on addressing issues at the input, throughput or output stages of ED care delivery. Models often varied to account for site specific characteristics (e.g. onsite inpatient units) or to suit staffing profiles (e.g. extended scope physiotherapist), ED geographical location (e.g. metropolitan or rural site), and patient demographic profile (e.g. paediatrics, older persons, ethnicity). Only a few studies conducted cost-effectiveness analysis of service models. Although various models of delivering emergency healthcare exist, further research is required in order to make accurate and reliable assessments of their safety, clinical effectiveness and cost-effectiveness.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This chapter is based on a qualitative case study that researched the perceptions of nine male and female pre-service English teachers’ in regards to their preparedness to mentor positive digital conduct in Social network sites (SNS). These sites enable individuals to perform public representations of identity, consumed by virtual audiences, with various degrees of perceived privacy. The chapter frames what we call “identity curation” through three theoretical lenses; of performativity, customisation and critical literacy. This chapter discusses one of the themes that emerged from the research, which is the way in which “normalised” and naturalised representations of femineity on SNS were judged more harshly than masculine representations.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The phase relations have been investigated experimentally at 200 and 500 MPa as a function of water activity for one of the least evolved (Indian Batt Rhyolite) and of a more evolved rhyolite composition (Cougar Point Tuff XV) from the 12·8-8·1 Ma Bruneau-Jarbidge eruptive center of the Yellowstone hotspot. Particular priority was given to accurate determination of the water content of the quenched glasses using infrared spectroscopic techniques. Comparison of the composition of natural and experimentally synthesized phases confirms that high temperatures (>900°C) and extremely low melt water contents (<1·5 wt % H₂O) are required to reproduce the natural mineral assemblages. In melts containing 0·5-1·5 wt % H₂O, the liquidus phase is clinopyroxene (excluding Fe-Ti oxides, which are strongly dependent on fO₂), and the liquidus temperature of the more evolved Cougar Point Tuff sample (BJR; 940-1000°C) is at least 30°C lower than that of the Indian Batt Rhyolite lava sample (IBR2; 970-1030°C). For the composition BJR, the comparison of the compositions of the natural and experimental glasses indicates a pre-eruptive temperature of at least 900°C. The composition of clinopyroxene and pigeonite pairs can be reproduced only for water contents below 1·5 wt % H₂O at 900°C, or lower water contents if the temperature is higher. For the composition IBR2, a minimum temperature of 920°C is necessary to reproduce the main phases at 200 and 500 MPa. At 200 MPa, the pre-eruptive water content of the melt is constrained in the range 0·7-1·3 wt % at 950°C and 0·3-1·0 wt % at 1000°C. At 500 MPa, the pre-eruptive temperatures are slightly higher (by 30-50°C) for the same ranges of water concentration. The experimental results are used to explore possible proxies to constrain the depth of magma storage. The crystallization sequence of tectosilicates is strongly dependent on pressure between 200 and 500 MPa. In addition, the normative Qtz-Ab-Or contents of glasses quenched from melts coexisting with quartz, sanidine and plagioclase depend on pressure and melt water content, assuming that the normative Qtz and Ab/Or content of such melts is mainly dependent on pressure and water activity, respectively. The combination of results from the phase equilibria and from the composition of glasses indicates that the depth of magma storage for the IBR2 and BJR compositions may be in the range 300-400 MPa (13 km) and 200-300 MPa (10 km), respectively.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Identity crime is argued to be one of the most significant crime problems of today. This paper examines identity crime, through the attitudes and practices of a group of seniors in Queensland, Australia. It examines their own actions towards the protection of their personal data in response to a fraudulent email request. Applying the concept of a prudential citizen (as one who is responsible for self-regulating their behaviour to maintain the integrity of one’s identity) it will be argued that seniors often expose identity information through their actions. However, this is demonstrated to be the result of flawed assumptions and misguided beliefs over the perceived risk and likelihood of identity crime, rather than a deliberate act. This paper concludes that to protect seniors from identity crime, greater awareness of appropriate risk-management strategies towards disclosure of their personal details is required to reduce their inadvertent exposure to identity crime.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

An unresolved goal in face perception is to identify brain areas involved in face processing and simultaneously understand the timing of their involvement. Currently, high spatial resolution imaging techniques identify the fusiform gyrus as subserving processing of invariant face features relating to identity. High temporal resolution imaging techniques localize an early latency evoked component—the N/M170—as having a major generator in the fusiform region; however, this evoked component is not believed to be associated with the processing of identity. To resolve this, we used novel magnetoencephalographic beamformer analyses to localize cortical regions in humans spatially with trial-by-trial activity that differentiated faces and objects and to interrogate their functional sensitivity by analyzing the effects of stimulus repetition. This demonstrated a temporal sequence of processing that provides category-level and then item-level invariance. The right fusiform gyrus showed adaptation to faces (not objects) at ∼150 ms after stimulus onset regardless of face identity; however, at the later latency of ∼200–300 ms, this area showed greater adaptation to repeated identity faces than to novel identities. This is consistent with an involvement of the fusiform region in both early and midlatency face-processing operations, with only the latter showing sensitivity to invariant face features relating to identity.