970 resultados para Stratigraphic log
Resumo:
Client puzzles are cryptographic problems that are neither easy nor hard to solve. Most puzzles are based on either number theoretic or hash inversions problems. Hash-based puzzles are very efficient but so far have been shown secure only in the random oracle model; number theoretic puzzles, while secure in the standard model, tend to be inefficient. In this paper, we solve the problem of constucting cryptographic puzzles that are secure int he standard model and are very efficient. We present an efficient number theoretic puzzle that satisfies the puzzle security definition of Chen et al. (ASIACRYPT 2009). To prove the security of our puzzle, we introduce a new variant of the interval discrete logarithm assumption which may be of independent interest, and show this new problem to be hard under reasonable assumptions. Our experimental results show that, for 512-bit modulus, the solution verification time of our proposed puzzle can be up to 50x and 89x faster than the Karame-Capkum puzzle and the Rivest et al.'s time-lock puzzle respectively. In particular, the solution verification tiem of our puzzle is only 1.4x slower than that of Chen et al.'s efficient hash based puzzle.
Resumo:
The recent history of the Soufrière Hills Volcano, Montserrat, Lesser Antilles volcanic arc, is reconstructed using data obtained from recently drilled submarine cores.Tephra layers in these cores preserve a record of the volcanic history of Montserrat back to ~250 ka on the basis of micropaleontology and stable isotope stratigraphy. Stratigraphic relationships identified in the cores collected in 2002 and 2005 document the fate of both pyroclastic flows entering the ocean to the east of Montserrat and carbonate-rich turbidites sourced from the carbonate platformssurrounding the islands of the Lesser Antilles. Using oxygen isotope stratigraphy, micropalaeontological analysis and Carbon-14 dating, it can be shown that three significant volcanic events, including the on-going eruption, have occurred over the last 12 ka. Preceding this was a time of volcanic quiescence, with three carbonate-rich turbidite events being documented in many of the cores. Our data suggest that these events occurred during Marine Isotope Stage 2, following the Last Glacial Maximum (LGM) and onset of post-glacial sea level rise.
Resumo:
Abstract: This study explores the contradictions and ambivalences experienced by a working artist at a time when her age, her gender, and broader cultural shifts are all potential obstacles or liabilities to creative flourishing. It is the product of practice-led research into the creative process from the perspective of the female "late bloomer". In this phrase, I have in mind the mature-aged woman who is, in mid-life, suddenly seized with inspiration and fired with creative energy. At its heart is the question: If an Elizabeth Jolley were in our midst today, would we hear from her? The result is a full-length libretto and accompanying exegetical binoculars in the form of a Preface and an Afterword. The creative work, Things That Fall Over (TTFO) is conceived in two parts: a libretto and oratorio for performance. It begins as a play, but over three acts and into a coda, the work becomes something entirely other - an (anti-) musical. The work grew from a personal interest in the nexus between women, ageing and creative practice, via investigation into the oeuvre of two Australian artists, Elizabeth Jolley, author, first published at age 53, and Rosalie Gascoigne, sculptor, first exhibited at 58. A second strand of the research grew from a fascination for the stage musical, especially in its more alternative modes as in the hands of Stephen Sondheim, or in more provocative manifestations as witnessed in recent Tony Award winners Avenue Q and The Book of Mormon. Contextually, this research is conducted at a time when anecdotal evidence suggests that women’s work in the performing arts and in literature is being pushed to the margins after a late twentieth century Golden Age on page and stage. Using hybrid practice-led methodologies - bricolage, log-keeping - and working within queer and feminist paradigms, this study seeks to counter that push with a new work that is all-female, part-pantomime, part monstrous allegory. In illuminating the creative process of a mature-aged playwright it concludes that hybrid and interstitial forms still offer an inclusive and democratic space in which voices that may otherwise be muted will continue to be heard.
Resumo:
Effective risk management is crucial for any organisation. One of its key steps is risk identification, but few tools exist to support this process. Here we present a method for the automatic discovery of a particular type of process-related risk, the danger of deadline transgressions or overruns, based on the analysis of event logs. We define a set of time-related process risk indicators, i.e., patterns observable in event logs that highlight the likelihood of an overrun, and then show how instances of these patterns can be identified automatically using statistical principles. To demonstrate its feasibility, the approach has been implemented as a plug-in module to the process mining framework ProM and tested using an event log from a Dutch financial institution.
Resumo:
Background China has one of the highest suicide rates in the world; however, the recent trends in suicide have not been adequately studied. This study aimed to examine the potential changes in the rates and characteristics in a Chinese population. Methods Data on suicide deaths in 1991–2010 were extracted from the Shandong Disease Surveillance Point (DSP) mortality dataset based on ICD-10 codes. The temporal trend in age-adjusted suicide rates for each subpopulation was tested using log-linear Poisson regression analysis. Results From 1991 to 2010, there was a marked decrease in the overall suicide rate in Shandong, with an average reduction of 8% per year. The decrease trend was stronger in rural than in urban areas and more evident in females than in males. Similar decreases were observed for all age groups. Pesticide ingestion and hanging remained the top two methods for suicide. Limitations There are likely quality concerns in the morality data, such as underreporting and misclassification, as well as low accuracy in determining the underlying causes of deaths. The representativeness of the DSP system may also be problematic due to the rapid changes in economy and demography. Conclusions Completed suicides in Shandong have sharply declined over the past 20 years. Higher rates in females versus males and in rural versus urban areas, which were previously considered to be distinguishing features of suicide in China, are becoming less pronounced.
Resumo:
Organisations are constantly seeking efficiency improvements for their business processes in terms of time and cost. Management accounting enables reporting of detailed cost of operations for decision making purpose, although significant effort is required to gather accurate operational data. Business process management is concerned with systematically documenting, managing, automating, and optimising processes. Process mining gives valuable insight into processes through analysis of events recorded by an IT system in the form of an event log with the focus on efficient utilisation of time and resources, although its primary focus is not on cost implications. In this paper, we propose a framework to support management accounting decisions on cost control by automatically incorporating cost data with historical data from event logs for monitoring, predicting and reporting process-related costs. We also illustrate how accurate, relevant and timely management accounting style cost reports can be produced on demand by extending open-source process mining framework ProM.
Resumo:
Young drivers aged 17-24 years are at a risk of death and injury from road crashes primarily due to their age and inexperience on the road. Our research aims to investigate if a gamified mobile tracking and intervention tool can help to address this issue. We aim to build a smartphone application to support the current process of logging driving hours using a physical logbook and pen in Queensland. This provides an easier way to log driving hours than recording them in a logbook. In an attempt to engage Learners and encourage them to undertake more diverse driving practice we will explore how game elements can be integrated into the experience to motivate Learners. Previous research in other domains has shown that framing tasks as game-like can help engage and motivate users, however the addition of game elements to this space provides some interesting design challenges. This paper presents an overview of the research and presents these challenges for further discussion.
Resumo:
PURPOSE: To examine the basis of previous findings of an association between indices of driving safety and visual motion sensitivity and to examine whether this association could be explained by low-level changes in visual function. METHODS: 36 visually normal participants (aged 19 – 80 years), completed a battery of standard vision tests including visual acuity, contrast sensitivity and automated visual fields. and two tests of motion perception including sensitivity for movement of a drifting Gabor stimulus, and sensitivity for displacement in a random-dot kinematogram (Dmin). Participants also completed a hazard perception test (HPT) which measured participants’ response times to hazards embedded in video recordings of real world driving which has been shown to be linked to crash risk. RESULTS: Dmin for the random-dot stimulus ranged from -0.88 to -0.12 log minutes of arc, and the minimum drift rate for the Gabor stimulus ranged from 0.01 to 0.35 cycles per second. Both measures of motion sensitivity significantly predicted response times on the HPT. In addition, while the relationship involving the HPT and motion sensitivity for the random-dot kinematogram was partially explained by the other visual function measures, the relationship with sensitivity for detection of the drifting Gabor stimulus remained significant even after controlling for these variables. CONCLUSION: These findings suggest that motion perception plays an important role in the visual perception of driving-relevant hazards independent of other areas of visual function and should be further explored as a predictive test of driving safety. Future research should explore the causes of reduced motion perception in order to develop better interventions to improve road safety.
Resumo:
Purpose: There are some limited reports, based on questionnaire data, which suggest that outdoor activity decreases the risk of myopia in children and may offset the myopia risk associated with prolonged near work. The aim of this study was to explore the relationship between near work, indoor illumination, daily sunlight and ultraviolet (UV) exposure in emmetropic and myopic University students, given that University students perform significant amounts of near work and as a group have a high prevalence of myopia. Methods: Participants were 35 students, aged 17 to 25 years who were classified as being emmetropic (n=13), or having stable (n=12) or progressing myopia (n=10). During waking hours on three separate days participants wore a light sensor data logger (HOBO) and a polysulphone UV dosimeter; these devices measured daily illuminance and accumulative UV exposure respectively; participants also completed a daily activity log. Results: No significant between group differences were observed for average daily illuminance (p=0.732), number of hours per day spent in sunlight (p=0.266), outdoor shade (p=0.726), bright indoor/dim outdoor light (p=0.574) or dim room illumination (p=0.484). Daily UV exposure was significantly different across the groups (p=0.003); with stable myopes experiencing the greatest UV exposure (versus emmetropes p=0.002; versus progressing myopes p=0.004). Conclusions: The current literature suggests there is a link between myopia protection and spending time outdoors in children. Our data provides some evidence of this relationship in young adults and highlights the need for larger studies to further investigate this relationship longitudinally.
Resumo:
Purpose. Contrast adaptation may induce an error signal for emmetropization. This research aims to determine whether reading causes contrast adaptation in children and, if so, to determine whether myopes exhibit greater contrast adaptation than emmetropes. Methods. Baseline contrast sensitivity was determined in 34 emmetropic and 34 spectacle-corrected myopic children for 0.5, 1.2, 2.7, 4.4, and 6.2 cycles per degree (cpd) horizontal sine-wave gratings. Effects of near tasks on contrast sensitivity were determined during periods spent looking at a 6.2 cpd horizontal grating and during periods spent reading lines of English text, with 1.2 cpd row frequency and 6 cpd stroke frequency. Results. Both emmetropic and myopic groups (mean ± SD; age, 10.3 ± 1.4 years) showed reduced contrast sensitivity during both near tasks, with greatest overall adaptation at 6.2 cpd. Adaptation induced by viewing the grating (0.15 ± 0.17 log unit [40%]; range, 0.07-0.27 log unit) was significantly greater than adaptation induced by reading text (0.11 ± 0.18 log unit [29%], 0.08-0.16 log unit) (F(1,594) = 10.7; P = 0.001). Myopic children showed significantly greater adaptation across the tasks (0.15 ± 0.18 log unit [42%]) than emmetropic children (0.10 ± 0.16 log unit [26%]) (F(1,66) = 7.30; P = 0.009), with the greatest difference occurring at 4.4 cpd (mean, 0.11 log unit [30%]). Conclusions. Grating and reading tasks induced contrast adaptation; viewing horizontal gratings induced greater adaptation than reading, and myopes exhibited greater adaptation than emmetropes. Contrast adaptation effects may underlie findings of prolonged near work being associated with myopia. However, our research does not show whether this is consequential or causal.
Resumo:
Process mining encompasses the research area which is concerned with knowledge discovery from information system event logs. Within the process mining research area, two prominent tasks can be discerned. First of all, process discovery deals with the automatic construction of a process model out of an event log. Secondly, conformance checking focuses on the assessment of the quality of a discovered or designed process model in respect to the actual behavior as captured in event logs. Hereto, multiple techniques and metrics have been developed and described in the literature. However, the process mining domain still lacks a comprehensive framework for assessing the goodness of a process model from a quantitative perspective. In this study, we describe the architecture of an extensible framework within ProM, allowing for the consistent, comparative and repeatable calculation of conformance metrics. For the development and assessment of both process discovery as well as conformance techniques, such a framework is considered greatly valuable.
Resumo:
Assessing and prioritising cost-effective strategies to mitigate the impacts of traffic incidents and accidents on non-recurrent congestion on major roads represents a significant challenge for road network managers. This research examines the influence of numerous factors associated with incidents of various types on their duration. It presents a comprehensive traffic incident data mining and analysis by developing an incident duration model based on twelve months of incident data obtained from the Australian freeway network. Parametric accelerated failure time (AFT) survival models of incident duration were developed, including log-logistic, lognormal, and Weibul-considering both fixed and random parameters, as well as a Weibull model with gamma heterogeneity. The Weibull AFT models with random parameters were appropriate for modelling incident duration arising from crashes and hazards. A Weibull model with gamma heterogeneity was most suitable for modelling incident duration of stationary vehicles. Significant variables affecting incident duration include characteristics of the incidents (severity, type, towing requirements, etc.), and location, time of day, and traffic characteristics of the incident. Moreover, the findings reveal no significant effects of infrastructure and weather on incident duration. A significant and unique contribution of this paper is that the durations of each type of incident are uniquely different and respond to different factors. The results of this study are useful for traffic incident management agencies to implement strategies to reduce incident duration, leading to reduced congestion, secondary incidents, and the associated human and economic losses.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Purpose: IpRGCs mediate non-image forming functions including photoentrainment and the pupil light reflex (PLR). Temporal summation increases visual sensitivity and decreases temporal resolution for image forming vision, but the summation properties of nonimage forming vision are unknown. We investigated the temporal summation of inner (ipRGC) and outer (rod/cone) retinal inputs to the PLR. Method: The consensual PLR of the left eye was measured in six participants with normal vision using a Maxwellian view infrared pupillometer. Temporal summation was investigated using a double-pulse protocol (100 ms stimulus pairs; 0–1024 ms inter-stimulus interval, ISI) presented to the dilated fellow right eye (Tropicamide 1%). Stimulus lights (blue λmax = 460 nm; red λmax = 638 nm) biased activity to inneror outer retinal inputs to non-image forming vision. Temporal summation was measured suprathreshold (15.2 log photons.cm−2.s−1 at the cornea) and subthreshold (11.4 log photons.cm−2.s−1 at the cornea). Results: RM-ANOVAs showed the suprathreshold and subthreshold 6 second post illumination pupil response (PIPR: expressed as percentage baseline diameter) did not significantly vary for red or blue stimuli (p > .05). The PIPR for a subthreshold red 16 ms double-pulse control condition did not significantly differ with ISI (p > .05). The maximum constriction amplitude for red and blue 100 ms double- pulse stimuli did not significantly vary with ISI (p > .05). Conclusion: The non-significant changes in suprathreshold PIPR and subthreshold maximum pupil constriction indicate that inner retinal ipRGC inputs and outer retinal photoreceptor inputs to the PLR do not show temporal summation. The results suggest a fundamental difference between the temporal summation characteristics of image forming and non-image forming vision.
Resumo:
Objective In Parkinson's disease (PD), commonly reported risk factors for malnutrition in other populations commonly occur. Few studies have explored which of these factors are of particular importance in malnutrition in PD. The aim was to identify the determinants of nutritional status in people with Parkinson's disease (PWP). Methods Community-dwelling PWP (>18 years) were recruited (n = 125; 73M/52F; Mdn 70 years). Self-report assessments included Beck's Depression Inventory (BDI), Spielberger Trait Anxiety Inventory (STAI), Scales for Outcomes in Parkinson's disease – Autonomic (SCOPA-AUT), Modified Constipation Assessment Scale (MCAS) and Freezing of Gait Questionnaire (FOG-Q). Information about age, PD duration, medications, co-morbid conditions and living situation was obtained. Addenbrooke's Cognitive Examination (ACE-R), Unified Parkinson's Disease Rating Scale (UPDRS) II and UPDRS III were performed. Nutritional status was assessed using the Subjective Global Assessment (SGA) as part of the scored Patient-Generated Subjective Global Assessment (PG-SGA). Results Nineteen (15%) were malnourished (SGA-B). Median PG-SGA score was 3. More of the malnourished were elderly (84% vs. 71%) and had more severe disease (H&Y: 21% vs. 5%). UPDRS II and UPDRS III scores and levodopa equivalent daily dose (LEDD)/body weight(mg/kg) were significantly higher in the malnourished (Mdn 18 vs. 15; 20 vs. 15; 10.1 vs. 7.6 respectively). Regression analyses revealed older age at diagnosis, higher LEDD/body weight (mg/kg), greater UPDRS III score, lower STAI score and higher BDI score as significant predictors of malnutrition (SGA-B). Living alone and higher BDI and UPDRS III scores were significant predictors of a higher log-adjusted PG-SGA score. Conclusions In this sample of PWP, the rate of malnutrition was higher than that previously reported in the general community. Nutrition screening should occur regularly in those with more severe disease and depression. Community support should be provided to PWP living alone. Dopaminergic medication should be reviewed with body weight changes.