907 resultados para Pumping schemes
Resumo:
Fusion techniques have received considerable attention for achieving lower error rates with biometrics. A fused classifier architecture based on sequential integration of multi-instance and multi-sample fusion schemes allows controlled trade-off between false alarms and false rejects. Expressions for each type of error for the fused system have previously been derived for the case of statistically independent classifier decisions. It is shown in this paper that the performance of this architecture can be improved by modelling the correlation between classifier decisions. Correlation modelling also enables better tuning of fusion model parameters, ‘N’, the number of classifiers and ‘M’, the number of attempts/samples, and facilitates the determination of error bounds for false rejects and false accepts for each specific user. Error trade-off performance of the architecture is evaluated using HMM based speaker verification on utterances of individual digits. Results show that performance is improved for the case of favourable correlated decisions. The architecture investigated here is directly applicable to speaker verification from spoken digit strings such as credit card numbers in telephone or voice over internet protocol based applications. It is also applicable to other biometric modalities such as finger prints and handwriting samples.
Resumo:
Statistical dependence between classifier decisions is often shown to improve performance over statistically independent decisions. Though the solution for favourable dependence between two classifier decisions has been derived, the theoretical analysis for the general case of 'n' client and impostor decision fusion has not been presented before. This paper presents the expressions developed for favourable dependence of multi-instance and multi-sample fusion schemes that employ 'AND' and 'OR' rules. The expressions are experimentally evaluated by considering the proposed architecture for text-dependent speaker verification using HMM based digit dependent speaker models. The improvement in fusion performance is found to be higher when digit combinations with favourable client and impostor decisions are used for speaker verification. The total error rate of 20% for fusion of independent decisions is reduced to 2.1% for fusion of decisions that are favourable for both client and impostors. The expressions developed here are also applicable to other biometric modalities, such as finger prints and handwriting samples, for reliable identity verification.
Resumo:
A Cooperative Collision Warning System (CCWS) is an active safety techno- logy for road vehicles that can potentially reduce traffic accidents. It provides a driver with situational awareness and early warnings of any possible colli- sions through an on-board unit. CCWS is still under active research, and one of the important technical problems is safety message dissemination. Safety messages are disseminated in a high-speed mobile environment using wireless communication technology such as Dedicated Short Range Communication (DSRC). The wireless communication in CCWS has a limited bandwidth and can become unreliable when used inefficiently, particularly given the dynamic nature of road traffic conditions. Unreliable communication may significantly reduce the performance of CCWS in preventing collisions. There are two types of safety messages: Routine Safety Messages (RSMs) and Event Safety Messages (ESMs). An RSM contains the up-to-date state of a vehicle, and it must be disseminated repeatedly to its neighbouring vehicles. An ESM is a warning message that must be sent to all the endangered vehi- cles. Existing RSM and ESM dissemination schemes are inefficient, unscalable, and unable to give priority to vehicles in the most danger. Thus, this study investigates more efficient and scalable RSM and ESM dissemination schemes that can make use of the context information generated from a particular traffic scenario. Therefore, this study tackles three technical research prob- lems, vehicular traffic scenario modelling and context information generation, context-aware RSM dissemination, and context-aware ESM dissemination. The most relevant context information in CCWS is the information about possible collisions among vehicles given a current vehicular traffic situation. To generate the context information, this study investigates techniques to model interactions among multiple vehicles based on their up-to-date motion state obtained via RSM. To date, there is no existing model that can represent interactions among multiple vehicles in a speciffic region and at a particular time. The major outcome from the first problem is a new interaction graph model that can be used to easily identify the endangered vehicles and their danger severity. By identifying the endangered vehicles, RSM and ESM dis- semination can be optimised while improving safety at the same time. The new model enables the development of context-aware RSM and ESM dissemination schemes. To disseminate RSM efficiently, this study investigates a context-aware dis- semination scheme that can optimise the RSM dissemination rate to improve safety in various vehicle densities. The major outcome from the second problem is a context-aware RSM dissemination protocol. The context-aware protocol can adaptively adjust the dissemination rate based on an estimated channel load and danger severity of vehicle interactions given by the interaction graph model. Unlike existing RSM dissemination schemes, the proposed adaptive scheme can reduce channel congestion and improve safety by prioritising ve- hicles that are most likely to crash with other vehicles. The proposed RSM protocol has been implemented and evaluated by simulation. The simulation results have shown that the proposed RSM protocol outperforms existing pro- tocols in terms of efficiency, scalability and safety. To disseminate ESM efficiently, this study investigates a context-aware ESM dissemination scheme that can reduce unnecessary transmissions and deliver ESMs to endangered vehicles as fast as possible. The major outcome from the third problem is a context-aware ESM dissemination protocol that uses a multicast routing strategy. Existing ESM protocols use broadcast rout- ing, which is not efficient because ESMs may be sent to a large number of ve- hicles in the area. Using multicast routing improves efficiency because ESMs are sent only to the endangered vehicles. The endangered vehicles can be identified using the interaction graph model. The proposed ESM protocol has been implemented and evaluated by simulation. The simulation results have shown that the proposed ESM protocol can prevent potential accidents from occurring better than existing ESM protocols. The context model and the RSM and ESM dissemination protocols can be implemented in any CCWS development to improve the communication and safety performance of CCWS. In effect, the outcomes contribute to the realisation of CCWS that will ultimately improve road safety and save lives.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistringuishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the receipient in the private domain. "Non-trivial filtering" can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicaly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
Recently, some authors have considered a new diffusion model–space and time fractional Bloch-Torrey equation (ST-FBTE). Magin et al. (2008) have derived analytical solutions with fractional order dynamics in space (i.e., _ = 1, β an arbitrary real number, 1 < β ≤ 2) and time (i.e., 0 < α < 1, and β = 2), respectively. Yu et al. (2011) have derived an analytical solution and an effective implicit numerical method for solving ST-FBTEs, and also discussed the stability and convergence of the implicit numerical method. However, due to the computational overheads necessary to perform the simulations for nuclear magnetic resonance (NMR) in three dimensions, they present a study based on a two-dimensional example to confirm their theoretical analysis. Alternating direction implicit (ADI) schemes have been proposed for the numerical simulations of classic differential equations. The ADI schemes will reduce a multidimensional problem to a series of independent one-dimensional problems and are thus computationally efficient. In this paper, we consider the numerical solution of a ST-FBTE on a finite domain. The time and space derivatives in the ST-FBTE are replaced by the Caputo and the sequential Riesz fractional derivatives, respectively. A fractional alternating direction implicit scheme (FADIS) for the ST-FBTE in 3-D is proposed. Stability and convergence properties of the FADIS are discussed. Finally, some numerical results for ST-FBTE are given.
Resumo:
In this paper, we consider a space Riesz fractional advection-dispersion equation. The equation is obtained from the standard advection-diffusion equation by replacing the ¯rst-order and second-order space derivatives by the Riesz fractional derivatives of order β 1 Є (0; 1) and β2 Є(1; 2], respectively. Riesz fractional advection and dispersion terms are approximated by using two fractional centered difference schemes, respectively. A new weighted Riesz fractional ¯nite difference approximation scheme is proposed. When the weighting factor Ѳ = 1/2, a second- order accurate numerical approximation scheme for the Riesz fractional advection-dispersion equation is obtained. Stability, consistency and convergence of the numerical approximation scheme are discussed. A numerical example is given to show that the numerical results are in good agreement with our theoretical analysis.
Resumo:
There is a tax amendment bill which will be debated. The Government has promised to outline its plan for the reform of the taxation system sometime this year. The plans appear to go beyond the mere introduction of some sort of goods and services tax to reform of the whole taxation system including fiscal relations with the States. Not for profit organisations will find their taxation environment will change. Governments are reluctant to permit exemptions to a GST style arrangements. GST trade offs such as reduced income tax rates and abolishing indirect taxes are useless to nonprofit organisations, as many are already exempt from such imposts. Administrative changes to tax collections may also have an impact. If the government decides to make an individual PAYE taxpayer return optional in exchange for no or standard deductions, this may have an effect on fundraising. The FBT and salary packaging schemes that not for profit organisations use will be under intense scrutiny. A regionalisation of the ATO along the successful model of the ASC would see discrete areas such as not for profit exemptions being centralised in one regional office for the whole of Australia. For example the Tasmanian ASC Office has the responsibility for much work in respect of corporate charities and not for profit companies.
Resumo:
We investigate existing cloud storage schemes and identify limitations in each one based on the security services that they provide. We then propose a new cloud storage architecture that extends CloudProof of Popa et al. to provide availability assurance. This is accomplished by incorporating a proof of storage protocol. As a result, we obtain the first secure storage cloud computing scheme that furnishes all three properties of availability, fairness and freshness.
Resumo:
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. The FS property was also shown to be achievable in (Hierarchical) Identity-Based Encryption (HIBE) by Yao, Fazio, Dodis, and Lysyanskaya (ACM CCS 2004). Yet, for emerging encryption techniques, offering flexible access control to encrypted data, by means of functional relationships between ciphertexts and decryption keys, FS protection was not known to exist.\smallskip In this paper we introduce FS to the powerful setting of \emph{Hierarchical Predicate Encryption (HPE)}, proposed by Okamoto and Takashima (Asiacrypt 2009). Anticipated applications of FS-HPE schemes can be found in searchable encryption and in fully private communication. Considering the dependencies amongst the concepts, our FS-HPE scheme implies forward-secure flavors of Predicate Encryption and (Hierarchical) Attribute-Based Encryption.\smallskip Our FS-HPE scheme guarantees forward security for plaintexts and for attributes that are hidden in HPE ciphertexts. It further allows delegation of decrypting abilities at any point in time, independent of FS time evolution. It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. As the ``cross-product" approach taken in FS-HIBE is not directly applicable to the HPE setting, our construction resorts to techniques that are specific to existing HPE schemes and extends them with what can be seen as a reminiscent of binary tree encryption from FS-PKE.
Resumo:
1. Like the Commonwealth Tax regime, state taxation legislation has now ballooned in size from the good old days when life and tax were relatively simple issues. 2. This case study of Queensland state taxation will examine the following taxes affecting churches and charities in this state: (a) Stamp Duty (b) Land Tax; and (c) Local Authority Rates 3. Each type of tax will be considered in turn. A brief legislative history of the statutory instruments governing these taxes will be given with a closer examination of the present schemes. Relevant judicial pronouncements will be considered and some open discussion of real life examples. 4. It is submitted that the regular donors to our worthy charities and the dedicated weekly churchgoers would have absolutely no idea: (a) that indirectly the value of their donations and weekly offerings are increasingly being eroded by the imposts of Government not only in terms of the amounts of those imposts but the enormous administrative burden of coping with the legislation; (b) of the complexity of the taxation legislation affecting their churches and charities; or (c) that their churches and charities are even paying taxes.
Resumo:
There are a variety of reasons and motivations for people to subscribe to community-supported agriculture (CSA) schemes, many of which include social, ethical, environmental, and economical benefits. The global rise of food allergies and food related health issues in recent years has led to a growing number of initiatives particularly in developing countries to raise more awareness of the current situation amongst individuals, organisations, and government bodies, and to plan for its implications for the existing food and health systems. Based on a mixed method research conducted in Australia, this paper argues that personal health matters are one of the key motivators for consumers to seek out alternative food systems, particularly CSA initiatives. In addition, it presents the willingness for consumers to seek out information about the food they consume and proposes that technology plays a key role in being used as a conduit to share and investigate information relating to alternative food systems. Further research is required to determine the variety of benefits and opportunities alternative food systems can provide consumers with food related health issues.
Resumo:
Many people take pleasure in visiting waterfalls and much has been written on the subject. Numerous accounts of Niagara Falls were published after Hennepin's late seventeenth-centure descriptions, particularly from the early nineteenth century, but is was only later that other waterfalls became the subject of books. George Holley's Niagara and Other Famous Cataracts of the World, published in 1883, and John Gibson's Great Waterfalls, Cataracts and Geysers, published in 1887, are early examples of global accounts of major falls. Most books about waterfalls are guides to the falls of a particular country, state or region. Apart from a few slim illustrated volumes, few books have been puslished on the world's waterfalls since Edward Rashleigh's Among the Waterfalls (1935). Most of these are slim pictorial volumes, some aimed at the children's market. Geologist Richard Maxwell Pearl published a series of waterfall articles in his journal Earth Science between 1973 and 1975, apparently with the intention of turning them into a book, but this never materialized. My book, the culmination of more than a decade of waterfalls research, is comprehensive in its approach, but is not intended to describe as many of the world's waterfalls as possible. This is far from my aim, and readers may be disappointed at my omission of falls they feel deserved mention. What I have attempted to do is celebrate the delights of these beautiful wonders of nature by considering them from many points of view, emphasizing the roles that they play in the human experience. To be as representative as possible, I draw on examples of waterfalls from all over the world, some famous, many not. North and South America, Europe, Africa, Asia and Oceania and, with recent global warming, the Earth's polar regions, all feature in the discussion. Even though there are already enough books and articles about Niagara Falls to fill a large library, it has been impossible to avoid making frequent reference to this great cataract, which has been so important in the history of travel and tourism, power generation, urban development and art. Amoung the issues that I consider is the human impact on waterfalls, particularly the effects of hydropower schemes and tourism development. Also considered are artificial waterfalls, which have long been features of the designed landscape. Their contemporay role is poignantly exemplified in the design of the National September 11 Memorial, in which the footprints of the Twin Towers are traced by walls of waterfalls. A geographer and urban and regional planner by training, I have ventured into many other fields of knowledge that are outside my areas of expertise. I apologize for any errors that I may have made in my book and invite correction.
Resumo:
A basic element in advertising strategy is the choice of an appeal. Many researchers have studied communication message form and specifically forms of literalism and symbolism, or some variation. The motives for such study are grounded in increasing the effectiveness of commercial communication messages, especially advertising messages. Advertising research studies typically use forms of literalism (e.g. informativeness) or symbolism (e.g. metaphoric, tropes, schemes figures of speech, and rhetorical figures) as independent variables and compare these against one or more of the traditional advertising effectiveness measures as dependent variable(s). The main challenge in assessing the effectiveness of literalism or symbolism in message content is the discreet identification of the construct. However, no standard, empirically-tested measure was located in the literature.