911 resultados para HIGHLY EFFICIENT ORGANOCATALYSTS
Resumo:
At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.
Resumo:
Disjoint top-view networked cameras are among the most commonly utilized networks in many applications. One of the open questions for these cameras' study is the computation of extrinsic parameters (positions and orientations), named extrinsic calibration or localization of cameras. Current approaches either rely on strict assumptions of the object motion for accurate results or fail to provide results of high accuracy without the requirement of the object motion. To address these shortcomings, we present a location-constrained maximum a posteriori (LMAP) approach by applying known locations in the surveillance area, some of which would be passed by the object opportunistically. The LMAP approach formulates the problem as a joint inference of the extrinsic parameters and object trajectory based on the cameras' observations and the known locations. In addition, a new task-oriented evaluation metric, named MABR (the Maximum value of All image points' Back-projected localization errors' L2 norms Relative to the area of field of view), is presented to assess the quality of the calibration results in an indoor object tracking context. Finally, results herein demonstrate the superior performance of the proposed method over the state-of-the-art algorithm based on the presented MABR and classical evaluation metric in simulations and real experiments.
Resumo:
Dispute resolution in strata schemes in Peninsular Malaysia should focus on more than just "settlement." The quality of the outcome, its sustainability and its relevance in supporting the basic principles of a good neighbourhood and self-governance in a strata scheme are also fundamental. Based on the comprehensive law movement, this thesis develops a theoretical framework for strata scheme disputes within the parameters of therapeutic jurisprudence, preventive law, alternative dispute resolution (ADR) and problem-solving courts. The therapeutic orientation of this model offers approaches that promote positive communication between disputing parties, preserve neighbour relations and optimise people's psychological and emotional well-being.
Resumo:
This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.
Resumo:
Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.
Resumo:
We consider the following problem: members in a dynamic group retrieve their encrypted data from an untrusted server based on keywords and without any loss of data confidentiality and member’s privacy. In this paper, we investigate common secure indices for conjunctive keyword-based retrieval over encrypted data, and construct an efficient scheme from Wang et al. dynamic accumulator, Nyberg combinatorial accumulator and Kiayias et al. public-key encryption system. The proposed scheme is trapdoorless and keyword-field free. The security is proved under the random oracle, decisional composite residuosity and extended strong RSA assumptions.
Resumo:
The placement of the mappers and reducers on the machines directly affects the performance and cost of the MapReduce computation in cloud computing. From the computational point of view, the mappers/reducers placement problem is a generalization of the classical bin packing problem, which is NP-complete. Thus, in this paper we propose a new heuristic algorithm for the mappers/reducers placement problem in cloud computing and evaluate it by comparing with other several heuristics on solution quality and computation time by solving a set of test problems with various characteristics. The computational results show that our heuristic algorithm is much more efficient than the other heuristics. Also, we verify the effectiveness of our heuristic algorithm by comparing the mapper/reducer placement for a benchmark problem generated by our heuristic algorithm with a conventional mapper/reducer placement. The comparison results show that the computation using our mapper/reducer placement is much cheaper while still satisfying the computation deadline.
Resumo:
We present efficient protocols for private set disjointness tests. We start from an intuition of our protocols that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the cardinality of the intersection. More specifically, it discloses its lower bound. By using the Lagrange interpolation we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. The protocol applies a verification test to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are first ones that have been designed without a generic secure function evaluation. More importantly, they are the most efficient protocols for private disjointness tests for the malicious adversary case.
Resumo:
Trigonopsis variabilis D-amino acid oxidase (TvDAO) is a well characterized enzyme used for cephalosporin C conversion on industrial scale. However, the demands on the enzyme with respect to activity, operational stability and costs also vary with the field of application. Processes that use the soluble enzyme suffer from fast inactivation of TvDAO while immobilized oxidase preparations raise issues related to expensive carriers and catalyst efficiency. Therefore, oxidase preparations that are more robust and active than those currently available would enable a much broader range of economically viable applications of this enzyme in fine chemical syntheses. A multi-step engineering approach was chosen here to develop a robust and highly active Pichia pastoris TvDAO whole-cell biocatalyst. As compared to the native T. variabilis host, a more than seven-fold enhancement of the intracellular level of oxidase activity was achieved in P. pastoris through expression optimization by codon redesign as well as efficient subcellular targeting of the enzyme to peroxisomes. Multi copy integration further doubled expression and the specific activity of the whole cell catalyst. From a multicopy production strain, about 1.3 x 103 U/g wet cell weight (wcw) were derived by standard induction conditions feeding pure methanol. A fed-batch cultivation protocol using a mixture of methanol and glycerol in the induction phase attenuated the apparent toxicity of the recombinant oxidase to yield final biomass concentrations in the bioreactor of >or= 200 g/L compared to only 117 g/L using the standard methanol feed. Permeabilization of P. pastoris using 10% isopropanol yielded a whole-cell enzyme preparation that showed 49% of the total available intracellular oxidase activity and was notably stabilized (by three times compared to a widely used TvDAO expressing Escherichia coli strain) under conditions of D-methionine conversion using vigorous aeration. Stepwise optimization using a multi-level engineering approach has delivered a new P. pastoris whole cell TvDAO biocatalyst showing substantially enhanced specific activity and stability under operational conditions as compared to previously reported preparations of the enzyme. The production of the oxidase through fed-batch bioreactor culture and subsequent cell permeabilization is high-yielding and efficient. Therefore this P. pastoris catalyst has been evaluated for industrial purposes.
Resumo:
In the last years, the trade-o between exibility and sup- port has become a leading issue in work ow technology. In this paper we show how an imperative modeling approach used to de ne stable and well-understood processes can be complemented by a modeling ap- proach that enables automatic process adaptation and exploits planning techniques to deal with environmental changes and exceptions that may occur during process execution. To this end, we designed and imple- mented a Custom Service that allows the Yawl execution environment to delegate the execution of subprocesses and activities to the SmartPM execution environment, which is able to automatically adapt a process to deal with emerging changes and exceptions. We demonstrate the fea- sibility and validity of the approach by showing the design and execution of an emergency management process de ned for train derailments.
Resumo:
Nowadays, process management systems (PMSs) are widely used in many business scenarios, e.g. by government agencies, by insurance companies, and by banks. Despite this widespread usage, the typical application of such systems is predominantly in the context of static scenarios, instead of pervasive and highly dynamic scenarios. Nevertheless, pervasive and highly dynamic scenarios could also benefit from the use of PMSs.
Resumo:
Analysis of behavioural consistency is an important aspect of software engineering. In process and service management, consistency verification of behavioural models has manifold applications. For instance, a business process model used as system specification and a corresponding workflow model used as implementation have to be consistent. Another example would be the analysis to what degree a process log of executed business operations is consistent with the corresponding normative process model. Typically, existing notions of behaviour equivalence, such as bisimulation and trace equivalence, are applied as consistency notions. Still, these notions are exponential in computation and yield a Boolean result. In many cases, however, a quantification of behavioural deviation is needed along with concepts to isolate the source of deviation. In this article, we propose causal behavioural profiles as the basis for a consistency notion. These profiles capture essential behavioural information, such as order, exclusiveness, and causality between pairs of activities of a process model. Consistency based on these profiles is weaker than trace equivalence, but can be computed efficiently for a broad class of models. In this article, we introduce techniques for the computation of causal behavioural profiles using structural decomposition techniques for sound free-choice workflow systems if unstructured net fragments are acyclic or can be traced back to S- or T-nets. We also elaborate on the findings of applying our technique to three industry model collections.
Resumo:
Identification of behavioural contradictions is an important aspect of software engineering, in particular for checking the consistency between a business process model used as system specification and a corresponding workflow model used as implementation. In this paper, we propose causal behavioural profiles as the basis for a consistency notion, which capture essential behavioural information, such as order, exclusiveness, and causality between pairs of activities. Existing notions of behavioural equivalence, such as bisimulation and trace equivalence, might also be applied as consistency notions. Still, they are exponential in computation. Our novel concept of causal behavioural profiles provides a weaker behavioural consistency notion that can be computed efficiently using structural decomposition techniques for sound free-choice workflow systems if unstructured net fragments are acyclic or can be traced back to S- or T-nets.
Resumo:
Aims To evaluate if a revamped business management course for 4th year undergraduate pharmacy students had achieved the course aims of not only improving pharmacy students’ perceived understanding of pharmacy business management topics but also increasing their confidence in their business management knowledge and skills. Background Student feedback from previous years had indicated that the cohort had struggled to translate theoretical business management concepts learned in the classroom into practice in the workplace. To address this problem the course has been changed to a ‘flipped classroom’ format with face-to-face time focusing on case-based scenarios and interactive classroom discussion with some role plays. Method Both course assessment throughout the semester and a student survey informed the evaluation process. Results After completing the course, students felt they had increased their knowledge of business management concepts but many indicated that they lacked the confidence to undertake basic management functions. Conclusions Further course restructuring is required with a greater focus on skills development.
Resumo:
Anthocyanin concentration is an important determinant of the colour of many fruits. In apple (Malus x domestica), centuries of breeding have produced numerous varieties in which levels of anthocyanin pigment vary widely and change in response to environmental and developmental stimuli. The apple fruit cortex is usually colourless, although germplasm does exist where the cortex is highly pigmented due to the accumulation of either anthocyanins or carotenoids. From studies in a diverse array of plant species, it is apparent that anthocyanin biosynthesis is controlled at the level of transcription. Here we report the transcript levels of the anthocyanin biosynthetic genes in a red-fleshed apple compared with a white-fleshed cultivar. We also describe an apple MYB transcription factor, MdMYB10, that is similar in sequence to known anthocyanin regulators in other species. We further show that this transcription factor can induce anthocyanin accumulation in both heterologous and homologous systems, generating pigmented patches in transient assays in tobacco leaves and highly pigmented apple plants following stable transformation with constitutively expressed MdMYB10. Efficient induction of anthocyanin biosynthesis in transient assays by MdMYB10 was dependent on the co-expression of two distinct bHLH proteins from apple, MdbHLH3 and MdbHLH33. The strong correlation between the expression of MdMYB10 and apple anthocyanin levels during fruit development suggests that this transcription factor is responsible for controlling anthocyanin biosynthesis in apple fruit; in the red-fleshed cultivar and in the skin of other varieties, there is an induction of MdMYB10 expression concurrent with colour formation during development. Characterization of MdMYB10 has implications for the development of new varieties through classical breeding or a biotechnological approach.