936 resultados para group membership models


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a theoretical model for e-Government in Malaysia and addresses issues involved in its implementation. It presents three possible models including the Framework for Electronic Government (Grant & Chau, 2005), the Three Pillars Framework (Georgescu, 2007) and The Grid-Group Theory from cultural studies (Douglas, 1996) and integrates and adapts them to the specific needs of the Malaysian environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This audio magazine, written by Melissa Giles, features three Brisbane-based media organisations: Radio 4RPH, Queensland Pride and 98.9FM. [#1 - INTRODUCTION - read by Sara Cowling]----- [#2 - RADIO 4RPH: SHARING THE WORD - read by Ellen-Maree Elliot (and Sara Cowling)]----- [#3 - QUEENSLAND PRIDE: OUT IN THE STREET - read by Dominique Wiehahn (and Sara Cowling)]----- [#4 - 98.9FM: BREAKING THE MOULD - read by Paige Ross (and Sara Cowling)]----- [#5 - CONCLUSION - read by Sara Cowling]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anxiety disorders have been viewed as manifestations of broad underlying predisposing personality constructs such as neuroticism combined with more specific individual differences of unhelpful information processing styles. Given the high prevalence of anxiety and the significant impairment that it causes, there is an important need to continue to explore successful treatments for this disorder. Research indicates that there is still room for significantly improving attrition rates and treatment adherence. Traditionally Motivational Interviewing (MI) has been used to facilitate health behaviour change. Recently MI has been applied to psychotherapy and has been shown to improve the outcome of CBT. However, these studies have been limited to only considering pre- and post-treatment measures and neglected to consider when changes occur along the course of therapy. This leaves the unanswered question of what is the impact of pre-treatment MI on the treatment trajectory of therapy. This study provides preliminary research into answering this question by tracking changes on a weekly basis along the course of group CBT. Prior to group CBT, 40 individuals with a principal anxiety disorder diagnosis were randomly assigned to receive either 3 individual sessions of MI or placed on a waitlist control group. All participants then received the same dosage of 10 weekly 2 hour sessions of group CBT. Tracking treatment outcome trajectory over the course of CBT, the pre-treatment MI group, compared to the control group, experienced a greater improvement early on in the course of therapy in their symptom distress, interpersonal relationships and quality of life. This early advantage over the control group was then maintained throughout therapy. These results not only demonstrate the value of adding MI to CBT, but also highlight the immediacy of MI effects. Further research is needed to determine the robustness of these effects to inform clinical implications of how to best apply MI to improve treatment adherence to CBT for anxiety disorders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose Process modeling is a complex organizational task that requires many iterations and communication between the business analysts and the domain specialists. The challenge of process modeling is exacerbated, when the process of modeling has to be performed in a cross-organizational, distributed environment. In this paper we suggest a 3D environment for collaborative process modeling, using Virtual World technology. Design/methodology/approach We suggest a new collaborative process modeling approach based on Virtual World technology. We describe the design of an innovative prototype collaborative process modeling approach, implemented as a 3D BPMN modeling environment in Second Life. We use a case study to evaluate the suggested approach. Findings Based on our case study application, we show that our approach increases user empowerment and adds significantly to the collaboration and consensual development of process models even when the relevant stakeholders are geographically dispersed. Research limitations implications – We present design work and a case study. More research is needed to more thoroughly evaluate the presented approach in a variety of real-life process modeling settings. Practical implications Our research outcomes as design artifacts are directly available and applicable by business process management professionals and can be used by business, system and process analysts in real-world practice. Originality/value Our research is the first reported attempt to develop a process modeling approach on the basis of virtual world technology. We describe a novel and innovative 3D BPMN modeling environment in Second Life.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Raman microscopy of two mixite minerals BiCu6(AsO4)3(OH)6.3H2O from Jáchymov and from Smrkovec (both Czech Republic) has been used to study their molecular structure, which is interpreted and the presence of (AsO4)3-, (AsO3OH)2-, (PO4)3- and (PO3OH)2- units, molecular water and hydroxyl ions were inferred. O-H…O hydrogen bond lengths were calculated from the Raman and infrared spectra using Libowitzky’s empirical relation. Small differences in the Raman spectra between both samples were observed and attributed to compositional and hydrogen bonding network differences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We examine the impact of individual-specific information processing strategies (IPSs) on the inclusion/exclusion of attributes on the parameter estimates and behavioural outputs of models of discrete choice. Current practice assumes that individuals employ a homogenous IPS with regards to how they process attributes of stated choice (SC) experiments. We show how information collected exogenous of the SC experiment on whether respondents either ignored or considered each attribute may be used in the estimation process, and how such information provides outputs that are IPS segment specific. We contend that accounting the inclusion/exclusion of attributes will result in behaviourally richer population parameter estimates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To quantify the lagged effects of mean temperature on deaths from cardiovascular diseases in Brisbane, Australia. Design Polynomial distributed lag models were used to assess the percentage increase in mortality up to 30 days associated with an increase (or decrease) of 1°C above (or below) the threshold temperature. Setting Brisbane, Australia. Patients 22 805 cardiovascular deaths registered between 1996 and 2004. Main outcome measures Deaths from cardiovascular diseases. Results The results show a longer lagged effect in cold days and a shorter lagged effect in hot days. For the hot effect, a statistically significant association was observed only for lag 0–1 days. The percentage increase in mortality was found to be 3.7% (95% CI 0.4% to 7.1%) for people aged ≥65 years and 3.5% (95% CI 0.4% to 6.7%) for all ages associated with an increase of 1°C above the threshold temperature of 24°C. For the cold effect, a significant effect of temperature was found for 10–15 lag days. The percentage estimates for older people and all ages were 3.1% (95% CI 0.7% to 5.7%) and 2.8% (95% CI 0.5% to 5.1%), respectively, with a decrease of 1°C below the threshold temperature of 24°C. Conclusions The lagged effects lasted longer for cold temperatures but were apparently shorter for hot temperatures. There was no substantial difference in the lag effect of temperature on mortality between all ages and those aged ≥65 years in Brisbane, Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research paper aims to develop a method to explore the travel behaviour differences between disadvantaged and non-disadvantaged populations. It also aims to develop a modelling approach or a framework to integrate disadvantage analysis into transportation planning models (TPMs). The methodology employed identifies significantly disadvantaged groups through a cluster analysis and the paper presents a disadvantage-integrated TPM. This model could be useful in determining areas with concentrated disadvantaged population and also developing and formulating relevant disadvantage sensitive policies. (a) For the covering entry of this conference, please see ITRD abstract no. E214666.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a regional commentary (hereafter ‘the commentary’) on the three Australian projects of the Teasdale-Corti Global Health Research Partnership Program. The three Australian projects are: Victorian Aboriginal Health Service Ltd (VAHS), Melbourne, Victoria—Forty Years of Comprehensive Primary Health Care; Central Australian Aboriginal Congress Inc. (Congress), Alice Springs, Northern Territory—Ingkintja, Male Health Program; and Urapuntja Health Service (UHS), Utopia, Northern Territory—Outstation Health Care. It highlights common themes and lessons in respect to the Revitalising Health for All project in the context of Aboriginal and Torres Strait Islander health in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background In order to provide insights into the complex biochemical processes inside a cell, modelling approaches must find a balance between achieving an adequate representation of the physical phenomena and keeping the associated computational cost within reasonable limits. This issue is particularly stressed when spatial inhomogeneities have a significant effect on system's behaviour. In such cases, a spatially-resolved stochastic method can better portray the biological reality, but the corresponding computer simulations can in turn be prohibitively expensive. Results We present a method that incorporates spatial information by means of tailored, probability distributed time-delays. These distributions can be directly obtained by single in silico or a suitable set of in vitro experiments and are subsequently fed into a delay stochastic simulation algorithm (DSSA), achieving a good compromise between computational costs and a much more accurate representation of spatial processes such as molecular diffusion and translocation between cell compartments. Additionally, we present a novel alternative approach based on delay differential equations (DDE) that can be used in scenarios of high molecular concentrations and low noise propagation. Conclusions Our proposed methodologies accurately capture and incorporate certain spatial processes into temporal stochastic and deterministic simulations, increasing their accuracy at low computational costs. This is of particular importance given that time spans of cellular processes are generally larger (possibly by several orders of magnitude) than those achievable by current spatially-resolved stochastic simulators. Hence, our methodology allows users to explore cellular scenarios under the effects of diffusion and stochasticity in time spans that were, until now, simply unfeasible. Our methodologies are supported by theoretical considerations on the different modelling regimes, i.e. spatial vs. delay-temporal, as indicated by the corresponding Master Equations and presented elsewhere.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Les activités et industries culturelles sont aujourd’hui englobées dans une nouvelle approche, celle d’industries créatives. Dans ce contexte, les interrogations sur les contributions de la culture au développement économique peuvent être repensées de manière élargie. La contribution examine les différentes réponses possibles à cette question, et quatre modèles sont ainsi distingués: l’approche du bien être; l’approche concurrentielle; l’approche de la croissance; l’approche de l’innovation. A chacun de ces modèles correspond une interprétation du lien entre activités créatives et économie. Ce sont ces interprétations dont la pertinence est appréciée à l’aide de données statistiques simples.