930 resultados para Binary Coded Decimal
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
The topic of the present work is to study the relationship between the power of the learning algorithms on the one hand, and the expressive power of the logical language which is used to represent the problems to be learned on the other hand. The central question is whether enriching the language results in more learning power. In order to make the question relevant and nontrivial, it is required that both texts (sequences of data) and hypotheses (guesses) be translatable from the “rich” language into the “poor” one. The issue is considered for several logical languages suitable to describe structures whose domain is the set of natural numbers. It is shown that enriching the language does not give any advantage for those languages which define a monadic second-order language being decidable in the following sense: there is a fixed interpretation in the structure of natural numbers such that the set of sentences of this extended language true in that structure is decidable. But enriching the original language even by only one constant gives an advantage if this language contains a binary function symbol (which will be interpreted as addition). Furthermore, it is shown that behaviourally correct learning has exactly the same power as learning in the limit for those languages which define a monadic second-order language with the property given above, but has more power in case of languages containing a binary function symbol. Adding the natural requirement that the set of all structures to be learned is recursively enumerable, it is shown that it pays o6 to enrich the language of arithmetics for both finite learning and learning in the limit, but it does not pay off to enrich the language for behaviourally correct learning.
Resumo:
Agrobacterium is widely considered to be the only bacterial genus capable of transferring genes to plants. When suitably modified, Agrobacterium has become the most effective vector for gene transfer in plant biotechnology1. However, the complexity of the patent landscape2 has created both real and perceived obstacles to the effective use of this technology for agricultural improvements by many public and private organizations worldwide. Here we show that several species of bacteria outside the Agrobacterium genus can be modified to mediate gene transfer to a number of diverse plants. These plant-associated symbiotic bacteria were made competent for gene transfer by acquisition of both a disarmed Ti plasmid and a suitable binary vector. This alternative to Agrobacterium-mediated technology for crop improvement, in addition to affording a versatile ‘open source’ platform for plant biotechnology, may lead to new uses of natural bacteria– plant interactions to achieve plant transformation.
Resumo:
What can we learn from Chinese parks and Chinese people? We took a walk through Lu Xun Park, one of Shanghai’s most popular parks. Here hundreds of people participate in dozens of physical and mental exercises that are considered to be essential for good health and fitness. We found that the most successful spaces for social interaction and inclusiveness were not just coded for ‘doing’ a diverse range of activities but also for ‘showing’ those activities. This dual role of park spaces could be given greater design consideration in encouraging occupants of small households in Australia to make greater use of public parks in the future.
Resumo:
Background Most questionnaires used for physical activity (PA) surveillance have been developed for adults aged ≤65 years. Given the health benefits of PA for older adults and the aging of the population, it is important to include adults aged 65+ years in PA surveillance. However, few studies have examined how well older adults understand PA surveillance questionnaires. This study aimed to document older adults’ understanding of questions from the International PA Questionnaire (IPAQ), which is used worldwide for PA surveillance. Methods Participants were 41 community-dwelling adults aged 65-89 years. They each completed IPAQ in a face-to-face semi-structured interview, using the “think-aloud” method, in which they expressed their thoughts out loud as they answered IPAQ questions. Interviews were transcribed and coded according to a three-stage model: understanding the intent of the question; performing the primary task (conducting the mental operations required to formulate a response); and response formatting (mapping the response into pre-specified response options). Results Most difficulties occurred during the understanding and performing the primary task stages. Errors included recalling PA in an “average” week, not in the previous 7 days; including PA lasting ≤10 minutes/session; reporting the same PA twice or thrice; and including the total time of an activity for which only a part of that time was at the intensity specified in the question. Participants were unclear what activities fitted within a question’s scope and used a variety of strategies for determining the frequency and duration of their activities. Participants experienced more difficulties with the moderate-intensity PA and walking questions than with the vigorous-intensity PA questions. The sitting time question, particularly difficult for many participants, required the use of an answer strategy different from that used to answer questions about PA. Conclusions These findings indicate a need for caution in administering IPAQ to adults aged ≥65 years. Most errors resulted in over-reporting, although errors resulting in under-reporting were also noted. Given the nature of the errors made by participants, it is possible that similar errors occur when IPAQ is used in younger populations and that the errors identified could be minimized with small modifications to IPAQ.
Resumo:
Background This research addresses the development of a digital stethoscope for use with a telehealth communications network to allow doctors to examine patients remotely (a digital telehealth stethoscope). A telehealth stethoscope would allow remote auscultation of patients who do not live near a major hospital. Travelling from remote areas to major hospitals is expensive for patients and a telehealth stethoscope could result in significant cost savings. Using a stethoscope requires great skill. To design a telehealth stethoscope that meets doctors’ expectations, the use of existing stethoscopes in clinical contexts must be examined. Method Observations were conducted of 30 anaesthetic preadmission consultations. The observations were video- taped. Interaction between doctor, patient and non-human elements in the consultation were “coded” to transform the video into data. The data were analysed to reveal essential aspects of the interactions. Results The analysis has shown that the doctor controls the interaction during auscultation. The conduct of auscultation draws heavily on the doctor’s tacit knowledge, allowing the doctor to treat the acoustic stethoscope as infrastructure – that is, the stethoscope sinks into the background and becomes completely transparent in use. Conclusion Two important, and related, implications for the design of a telehealth stethoscope have arisen from this research. First, as a telehealth stethoscope will be a shared device, doctors will not be able to make use of their existing expertise in using their own stethoscopes. Very simply, a telehealth stethoscope will sound different to a doctor’s own stethoscope. Second, the collaborative interaction required to use a telehealth stethoscope will have to be invented and refined. A telehealth stethoscope will need to be carefully designed to address these issues and result in successful use. This research challenges the concept of a telehealth stethoscope by raising questions about the ease and confidence with which doctors could use such a device.
Resumo:
This paper reports on the study of passenger experiences and how passengers interact with services, technology and processes at an airport. As part of our research, we have followed people through the airport from check-in to security and from security to boarding. Data was collected by approaching passengers in the departures concourse of the airport and asking for their consent to be videotaped. Data was collected and coded and the analysis focused on both discretionary and process related passenger activities. Our findings show the interdependence between activities and passenger experiences. Within all activities, passengers interact with processes, domain dependent technology, services, personnel and artifacts. These levels of interaction impact on passenger experiences and are interdependent. The emerging taxonomy of activities consists of (i) ownership related activities, (ii) group activities, (iii) individual activities (such as activities at the domain interfaces) and (iv) concurrent activities. This classification is contributing to the development of descriptive models of passenger experiences and how these activities affect the facilitation and design of future airports.
Resumo:
National estimates of the prevalence of child abuse-related injuries are obtained from a variety of sectors including welfare, justice, and health resulting in inconsistent estimates across sectors. The International Classification of Diseases (ICD) is used as the international standard for categorising health data and aggregating data for statistical purposes, though there has been limited validation of the quality, completeness or concordance of these data with other sectors. This research study examined the quality of documentation and coding of child abuse recorded in hospital records in Queensland and the concordance of these data with child welfare records. A retrospective medical record review was used to examine the clinical documentation of over 1000 hospitalised injured children from 20 hospitals in Queensland. A data linkage methodology was used to link these records with records in the child welfare database. Cases were sampled from three sub-groups according to the presence of target ICD codes: Definite abuse, Possible abuse, unintentional injury. Less than 2% of cases coded as being unintentional were recoded after review as being possible abuse, and only 5% of cases coded as possible abuse cases were reclassified as unintentional, though there was greater variation in the classification of cases as definite abuse compared to possible abuse. Concordance of health data with child welfare data varied across patient subgroups. This study will inform the development of strategies to improve the quality, consistency and concordance of information between health and welfare agencies to ensure adequate system responses to children at risk of abuse.
Resumo:
Emergency departments (EDs) are often the first point of contact with an abused child. Despite legal mandate, the reporting of definite or suspected abusive injury to child safety authorities by ED clinicians varies due to a number of factors including training, access to child safety professionals, departmental culture and a fear of ‘getting it wrong’. This study examined the quality of documentation and coding of child abuse captured by ED based injury surveillance data and ED medical records in the state of Queensland and the concordance of these data with child welfare records. A retrospective medical record review was used to examine the clinical documentation of almost 1000 injured children included in the Queensland Injury Surveillance Unit database (QISU) from 10 hospitals in urban and rural centres. Independent experts re-coded the records based on their review of the notes. A data linkage methodology was then used to link these records with records in the state government’s child welfare database. Cases were sampled from three sub-groups according to the surveillance intent codes: Maltreatment by parent, Undetermined and Unintentional injury. Only 0.1% of cases coded as unintentional injury were recoded to maltreatment by parent, while 1.2% of cases coded as maltreatment by parent were reclassified as unintentional and 5% of cases where the intent was undetermined by the triage nurse were recoded as maltreatment by parent. Quality of documentation varied across type of hospital (tertiary referral centre, children’s, urban, regional and remote). Concordance of health data with child welfare data varied across patient subgroups. Outcomes from this research will guide initiatives to improve the quality of intentional child injury surveillance systems.
Resumo:
Little is known about cancer survivors’ experiences with and preferences for exercise programmes offered during rehabilitation (immediately after cancer treatment). This study documented colorectal cancer survivors’ experiences in an exercise rehabilitation programme and their preferences for programme content and delivery. At the completion of 12-weeks of supervised exercise, 10 participants took part in one-on-one semi-structured interviews. Data from these interviews were coded, and themes were identified using qualitative software. Key findings were that most participants experienced improvements in treatment symptoms, including reduced fatigue and increased energy and confidence to do activities of daily living. They also reported that interactions with the exercise trainer and a flexible programme delivery were important aspects of the intervention. Most participants reported that they preferred having a choice of exercise, starting to exercise within a month after completing treatment, having supervision and maintaining a one-on-one format. Frustrations included scheduling conflicts and a lack of a transition out of the programme. The findings indicate that colorectal cancers experience benefits from exercise offered immediately after treatment and prefer individual attention from exercise staff. They further indicate directions for the implementation of future exercise programmes with this population.
Resumo:
Fault tree analysis (FTA) is presented to model the reliability of a railway traction power system in this paper. First, the construction of fault tree is introduced to integrate components in traction power systems into a fault tree; then the binary decision diagram (BDD) method is used to evaluate fault trees qualitatively and quantitatively. The components contributing to the reliability of overall system are identified with their relative importance through sensitivity analysis. Finally, an AC traction power system is evaluated by the proposed methods.
Resumo:
User needs and wants dictate the way in which products are designed, produced, used and disposed of. Western society in particular has become very consumer driven and the waste resulting from such activity has the potential to be disastrous. The creation of emotional attachment with possessions is one way of approaching sustainable consumer-product relationships. The aim of this research was to gain a deeper understanding of the interaction and emotional attachment that consumers have and develop with their products. It outlines literature relating to consumer emotion and experience in relation to products, and how pleasurable product user relationships can be prolonged. It is evident from the literature that the roles of materials in the emotional attachment consumers have with products needed to be further explored. A study was conducted to determine consumers. concepts of six materials currently used in product design. This involved participants being given a Concept Prompt Probe with textual prompts to assist in discussion about the materials in question. The discussions between the 15 participant groups of two people, one male and one female, were then transcribed and coded ready for analysis. The study findings demonstrate consumers. concepts of the six materials. The findings show both physical and emotional consumer concepts of the materials. It is, however, the interaction of these concepts that is the most significant finding of this research. Each material concept is not only judged emotionally by consumers in its own right but in relation to other concepts as well. The interaction of the consumers. concepts of materials can considerably effect the emotional judgement made about the material and the appropriateness of its application. This research makes a significant contribution to knowledge regarding the effect materials have on the consumers by identifying how materials can prompt emotional judgements and thereby alter the product user experience.
Resumo:
In this work, we investigate and compare the Maxwell–Stefan and Nernst–Planck equations for modeling multicomponent charge transport in liquid electrolytes. Specifically, we consider charge transport in the Li+/I−/I3−/ACN ternary electrolyte originally found in dye-sensitized solar cells. We employ molecular dynamics simulations to obtain the Maxwell–Stefan diffusivities for this electrolyte. These simulated diffusion coefficients are used in a multicomponent charge transport model based on the Maxwell– Stefan equations, and this is compared to a Nernst–Planck based model which employs binary diffusion coefficients sourced from the literature. We show that significant differences between the electrolyte concentrations at electrode interfaces, as predicted by the Maxwell–Stefan and Nernst–Planck models, can occur. We find that these differences are driven by a pressure term that appears in the Maxwell–Stefan equations. We also investigate what effects the Maxwell–Stefan diffusivities have on the simulated charge transport. By incorporating binary diffusivities found in the literature into the Maxwell–Stefan framework, we show that the simulated transient concentration profiles depend on the diffusivities; however, the simulated equilibrium profiles remain unaffected.
Resumo:
A total of 214 rainwater samples from 82 tanks were collected in urban Southeast Queensland (SEQ) in Australia and analysed for the zoonotic bacterial and protozoan pathogen using real-time binary PCR and quantitative PCR (qPCR). Quantitative Microbial Risk Assessment (QMRA) analysis was used to quantify the risk of infection associated with the exposure to potential pathogens from potable and non-potable uses of roof-harvested rainwater. Of the 214 samples tested, 10.7%, 9.8%, and 5.6%, and 0.4% samples were positive for Salmonella invA, Giardia lamblia β-giardin , Legionella pneumophila mip, and Campylobacter jejuni mapA genes. Cryptosporidium parvum could not be detected. The estimated numbers of viable Salmonella spp., G. lamblia β-giradin, and L. pneumophila genes ranged from 1.6 × 101 to 9.5 × 101 cells, 1.4 × 10-1 to 9.0 × 10-1 cysts, and 1.5 × 101 to 4.3 × 101 per 1000 ml of water, respectively. Six risk scenarios were considered from exposure to Salmonella spp., G. lamblia and L. pneumophila. For Salmonella spp., and G. lamblia, these scenarios were: (1) liquid ingestion due to drinking of rainwater on a daily basis (2) accidental liquid ingestion due to garden hosing twice a week (3) aerosol ingestion due to showering on a daily basis, and (4) aerosol ingestion due to hosing twice a week. For L. pneumophila, these scenarios were: (5) aerosol inhalation due to showering on a daily basis, and (6) aerosol inhalation due to hosing twice a week. The risk of infection from Salmonella spp., G. lamblia, and L. pneumophila associated with the use of rainwater for showering and garden hosing was calculated to be well below the threshold value of one extra infection per 10,000 persons per year in urban SEQ. However, the risk of infection from ingesting Salmonella spp. and G. lamblia via drinking exceeds this threshold value, and indicates that if undisinfected rainwater were ingested by drinking, then the gastrointestinal diseases of Salmonellosis and Giardiasis is expected to range from 5.0 × 100 to 2.8 × 101 (Salmonellosis) and 1.0 × 101 to 6.4 × 101 (Giardiasis) cases per 10,000 persons per year, respectively. Since this health risk seems higher than that expected from the reported incidences of gastroenteritis, the assumptions used to estimate these infection risks are critically examined. Nonetheless, it would seem prudent to disinfect rainwater for potable use.
Resumo:
The use of appropriate features to characterize an output class or object is critical for all classification problems. This paper evaluates the capability of several spectral and texture features for object-based vegetation classification at the species level using airborne high resolution multispectral imagery. Image-objects as the basic classification unit were generated through image segmentation. Statistical moments extracted from original spectral bands and vegetation index image are used as feature descriptors for image objects (i.e. tree crowns). Several state-of-art texture descriptors such as Gray-Level Co-Occurrence Matrix (GLCM), Local Binary Patterns (LBP) and its extensions are also extracted for comparison purpose. Support Vector Machine (SVM) is employed for classification in the object-feature space. The experimental results showed that incorporating spectral vegetation indices can improve the classification accuracy and obtained better results than in original spectral bands, and using moments of Ratio Vegetation Index obtained the highest average classification accuracy in our experiment. The experiments also indicate that the spectral moment features also outperform or can at least compare with the state-of-art texture descriptors in terms of classification accuracy.