213 resultados para Hiding-proofness
Resumo:
A set of tools of clinical psychological intervention for cancer patients had been composed for the first time in the form of a manual with three tapes and some pictures. The cancer patients during chemotherapy were treated by psychological intervention via the tools in group and individual therapy. QLQ-C30, POMS-SF and DWI-CI were first recommended and used as indicators for measuring the results of QoL, emotion and coping method in cancer patients in Chinese mainland. NK cell activity and IgG、IgM, IgA were used to measure the immune function. 120 cancer chemotherapy patients were randomly assigned to one of four conditions formed by a 2 (pre-chemotherapy and post-chemotherapy) *2 (experimental and control group) factorial design. The effect of psychological intervention on quality of life and immune function for cancer patients was investigated as well as the mediate role of coping method and personality and their factors. The efficiency of the tools was verified. The major conclusive results drawn out from the study were: 1. After treated by psychological intervention for three months, the status of quality of life and the symptoms of the patients during the chemotherapy was improved accompanying with the increase of immune parameters, especially the NK cell activity. The influential way of the factors, which effected on the effect of psychological intervention on the quality of life, immune parameters and coping methods, was synthetic. There was obvious mutual effects among the factors. 2. The patients of experimental group used more the active behavior, more the active cognition and less the avoidance coping method than those in control group. 3. The results of measurement showed that the personality of the caner patients was of obvious concealing and hiding. 4. Quality of Life Questionnaire-Core 30(QLQ-C30) was suitable for the cancer patients with great efficiency in Chinese mainland although the scale of SF needed to be revised in the light of Chinese culture.
Resumo:
The MOS transistor physical model as described in [3] is presented here as a network model. The goal is to obtain an accurate model, suitable for simulation, free from certain problems reported in the literature [13], and conceptually as simple as possible. To achieve this goal the original model had to be extended and modified. The paper presents the derivation of the network model from physical equations, including the corrections which are required for simulation and which compensate for simplifications introduced in the original physical model. Our intrinsic MOS model consists of three nonlinear voltage-controlled capacitors and a dependent current source. The charges of the capacitors and the current of the current source are functions of the voltages $V_{gs}$, $V_{bs}$, and $V_{ds}$. The complete model consists of the intrinsic model plus the parasitics. The apparent simplicity of the model is a result of hiding information in the characteristics of the nonlinear components. The resulted network model has been checked by simulation and analysis. It is shown that the network model is suitable for simulation: It is defined for any value of the voltages; the functions involved are continuous and satisfy Lipschitz conditions with no jumps at region boundaries; Derivatives have been computed symbolically and are available for use by the Newton-Raphson method. The model"s functions can be measured from the terminals. It is also shown that small channel effects can be included in the model. Higher frequency effects can be modeled by using a network consisting of several sections of the basic lumped model. Future plans include a detailed comparison of the network model with models such as SPICE level 3 and a comparison of the multi- section higher frequency model with experiments.
Resumo:
For a given TCP flow, exogenous losses are those occurring on links other than the flow's bottleneck link. Exogenous losses are typically viewed as introducing undesirable "noise" into TCP's feedback control loop, leading to inefficient network utilization and potentially severe global unfairness. This has prompted much research on mechanisms for hiding such losses from end-points. In this paper, we show through analysis and simulations that low levels of exogenous losses are surprisingly beneficial in that they improve stability and convergence, without sacrificing efficiency. Based on this, we argue that exogenous loss awareness should be taken into account in any AQM design that aims to achieve global fairness. To that end, we propose an exogenous-loss aware Queue Management (XQM) that actively accounts for and leverages exogenous losses. We use an equation based approach to derive the quiescent loss rate for a connection based on the connection's profile and its global fair share. In contrast to other queue management techniques, XQM ensures that a connection sees its quiescent loss rate, not only by complementing already existing exogenous losses, but also by actively hiding exogenous losses, if necessary, to achieve global fairness. We establish the advantages of exogenous-loss awareness using extensive simulations in which, we contrast the performance of XQM to that of a host of traditional exogenous-loss unaware AQM techniques.
Resumo:
These poems mark the fault lines of myth, dream and memory, of a doubled identity emerging from the clash of war, desire and the cacophony of the city. 1974/Dead Sister , a narrative poem with a cast that includes Lewis Carroll’s Alice, Freud’s Dora, the Lady of Shalott, Ophelia, Esther, female cowboys and other deposed goddesses is ‘an autobiography’ of an imaginary dead twin. Alev Adil delineates the traces of a sense of displacement, but while the poems mark those frenetic uncertainties and erasures they celebrate the plenitude of new stories, epistemologies and possibilities born out of falling into fracture (the fracture of memory, gender, identity, culture) more than they mourn any loss. Venus Infers is haunted by the deities of ancient Greek myths and their contemporary manifestations. Eurydice is hiding out in Hackney, sometimes glimpsed on the Jubilee Line; Ariadne remembers her ancient palace as she prowls the endless corridors of a London hotel; Penelope still waits for peace in the ruins of Marash/Varosha. Cyprus often features in these poems, both as a landscape for myth and as a site for contemporary, and contested, memories. [From the Author]
Resumo:
This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better adaptation of watermark distortions to the host media. Two methods of deriving visual models for the watermarking system are adapted to the complex wavelet transforms and their performances are compared. To produce improved capacity a spread transform embedding algorithm is devised, this combines the robustness of spread spectrum methods with the high capacity of quantization based methods. Using established information theoretic methods, limits of watermark capacity are derived that demonstrate the superiority of complex wavelets over discretely sampled wavelets. Finally results for the algorithm against commonly used attacks demonstrate its robustness and the improved performance offered by complex wavelet transforms.
Resumo:
We investigate the Nash equilibria of game theoretic models of network formation based on explicit consent in link formation. These so-called “consent models” explicitly take account of link formation costs. We provide characterizations of Nash equilibria of such consent models under both one-sided and two-sided costs of link formation. We relate these equilibrium concepts to link-based stability concepts, in particular strong link deletion proofness.
Resumo:
Numerous studies have been conducted internationally on the subject of multigenerational trauma; however, little is currently known about its existence in the context of the Northern Ireland conflict. The present study explored the outcomes of and mechanisms through which the trauma of one generation impacts on subsequent generations in this context. Using an Interpretative Phenomenological Approach (IPA), this study examined the subjective experiences, beliefs and perceptions of four mothers from Northern Ireland, all of whom had endured trauma during their childhoods. Three main master themes emerged: 1. "Attempting to cope" addressed how the trauma was dealt with, and how these efforts can be the very mechanisms through which multigenerational trauma occurs. Examples include hiding the truth, seeing the truth as dangerous, and knowing and not knowing about the trauma; 2. "The trauma still goes on" highlighted the negative outcomes and consequences of the traumatic experiences within the family such as delayed impact, symptoms and anger; and 3. "Strength through adversity" included the more positive outcomes of their experiences, such as finding meaning through suffering and making efforts to stop the cycle. The results are discussed in terms of the existing theories on multigenerational trauma, and implications for practice are explored.
Resumo:
Despite its economic significance, competition law still remains fragmented, lacking an international framework allowing for dispute settlement. This, together with the growing importance of non-free-market economies in world trade require us to re-consider and re-evaluate the possibilities of bringing an antitrust suit against a foreign state. If the level playing field on the global marketplace is to be achieved, the possibility of hiding behind the bulwark of state sovereignty should be minimised. States should not be free to act in an anti-competitive way, but at present the legal framework seems ill-equipped to handle such challenges.
This paper deals with the defences available in litigation concerning transnational anti-competitive agreements involving or implicating foreign states. Four important legal doctrines are analysed: non-justiciability (political question doctrine), state immunity, act of state doctrine and foreign state compulsion. The paper addresses also the general problem of applicability of competition laws to a foreign state as such. This is a tale about repetitive unsuccessful efforts to sue OPEC and recent attempts in the US to deal with export cartels of Chinese state-owned enterprises
Resumo:
Aims and objectives: To draw out the similar complexities faced by staff around
truth-telling in a children’s and adult population and to interrogate the dilemmas faced by staff when informal carers act to block truth-telling.
Background: Policy encourages normalisation of death, but carers may act to protect or prevent the patient from being told the truth. Little is known about the impact on staff.
Design: Secondary analysis of data using a supra-analysis design to identify commonality of experiences.
Methods: Secondary ‘supra-analysis’ was used to transcend the focus of two primary studies in the UK, which examined staff perspectives in a palliative children’s and a palliative adult setting, respectively. The analysis examined new theoretical questions relating to the commonality of issues independently derived in each primary study. Both primary studies used focus groups. Existing empirical data were analysed thematically and compared across the studies.
Results: Staff reported a hiding of the truth by carers and sustained use of activities aimed at prolonging life. Carers frequently ignored the advance of end of life, and divergence between staff and carer approaches to truth-telling challenged professionals. Not being truthful with patients had a deleterious effect on staff, causing anger and feelings of incompetence.
Conclusions: Both children’s and adult specialist palliative care staff found themselves caught in a dilemma, subject to policies that promoted openness in planning for death and informal carers who often prevented them from being truthful with patients about terminal prognosis. This dilemma had adverse psychological effects upon many staff.
Relevance to clinical practice: There remains a powerful death-denying culture in
many societies, and carers of dying patients may prevent staff from being truthful with their patients. The current situation is not ideal, and open discussion of this problem is the essential first step in finding a solution.
Resumo:
In this paper we continue our investigation into the development of computational-science software based on the identification and formal specification of Abstract Data Types (ADTs) and their implementation in Fortran 90. In particular, we consider the consequences of using pointers when implementing a formally specified ADT in Fortran 90. Our aim is to highlight the resulting conflict between the goal of information hiding, which is central to the ADT methodology, and the space efficiency of the implementation. We show that the issue of storage recovery cannot be avoided by the ADT user, and present a range of implementations of a simple ADT to illustrate various approaches towards satisfactory storage management. Finally, we propose a set of guidelines for implementing ADTs using pointers in Fortran 90. These guidelines offer a way gracefully to provide disposal operations in Fortran 90. Such an approach is desirable since Fortran 90 does not provide automatic garbage collection which is offered by many object-oriented languages including Eiffel, Java, Smalltalk, and Simula.
Resumo:
The Muslim Brotherhood is the most significant and enduring Sunni Islamist organization of the contemporary era. Its roots lie in the Middle East but it has grown into both a local and global movement, with its well-placed branches reacting effectively to take the opportunities for power and electoral competition offered by the Arab Spring.
Regarded by some as a force of moderation among Islamists, and by others as a façade hiding a terrorist fundamentalist threat, the potential influence of the Muslim Brotherhood on Middle Eastern politics remains ambiguous.The Muslim Brotherhood: The Arab Spring and its Future Face provides an essential insight into the organisation, with chapters devoted to specific cases where the Brotherhood has important impacts on society, the state and politics. Key themes associated with the Brotherhood, such as democracy, equality, pan-Islamism, radicalism, reform, the Palestine issue and gender, are assessed to reveal an evolutionary trend within the movement since its founding in Egypt in 1928 to its manifestation as the largest Sunni Islamist movement in the Middle East in the 21st century. The book addresses the possible future of the Muslim Brotherhood; whether it can surprise sceptics and effectively accommodate democracy and secular trends, and how its ascension to power through the ballot box might influence Western policy debates on their engagement with this manifestation of political Islam.
Drawing on a wide range of sources, this book presents a comprehensive study of a newly resurgent movement and is a valuable resource for students, scholars and policy makers focused on Middle Eastern Politics.
Resumo:
In forensic investigations, it is common for forensic investigators to obtain a photograph of evidence left at the scene of crimes to aid them catch the culprit(s). Although, fingerprints are the most popular evidence that can be used, scene of crime officers claim that more than 30% of the evidence recovered from crime scenes originate from palms. Usually, palmprints evidence left at crime scenes are partial since very rarely full palmprints are obtained. In particular, partial palmprints do not exhibit a structured shape and often do not contain a reference point that can be used for their alignment to achieve efficient matching. This makes conventional matching methods based on alignment and minutiae pairing, as used in fingerprint recognition, to fail in partial palmprint recognition problems. In this paper a new partial-to-full palmprint recognition based on invariant minutiae descriptors is proposed where the partial palmprint’s minutiae are extracted and considered as the distinctive and discriminating features for each palmprint image. This is achieved by assigning to each minutiae a feature descriptor formed using the values of all the orientation histograms of the minutiae at hand. This allows for the descriptors to be rotation invariant and as such do not require any image alignment at the matching stage. The results obtained show that the proposed technique yields a recognition rate of 99.2%. The solution does give a high confidence to the judicial jury in their deliberations and decision.
Resumo:
Most cryptographic devices should inevitably have a resistance against the threat of side channel attacks. For this, masking and hiding schemes have been proposed since 1999. The security validation of these countermeasures is an ongoing research topic, as a wider range of new and existing attack techniques are tested against these countermeasures. This paper examines the side channel security of the balanced encoding countermeasure, whose aim is to process the secret key-related data under a constant Hamming weight and/or Hamming distance leakage. Unlike previous works, we assume that the leakage model coefficients conform to a normal distribution, producing a model with closer fidelity to real-world implementations. We perform analysis on the balanced encoded PRINCE block cipher with simulated leakage model and also an implementation on an AVR board. We consider both standard correlation power analysis (CPA) and bit-wise CPA. We confirm the resistance of the countermeasure against standard CPA, however, we find with a bit-wise CPA that we can reveal the key with only a few thousands traces.
Resumo:
Os problemas de visibilidade têm diversas aplicações a situações reais. Entre os mais conhecidos, e exaustivamente estudados, estão os que envolvem os conceitos de vigilância e ocultação em estruturas geométricas (problemas de vigilância e ocultação). Neste trabalho são estudados problemas de visibilidade em estruturas geométricas conhecidas como polígonos, uma vez que estes podem representar, de forma apropriada, muitos dos objectos reais e são de fácil manipulação computacional. O objectivo dos problemas de vigilância é a determinação do número mínimo de posições para a colocação de dispositivos num dado polígono, de modo a que estes dispositivos consigam “ver” a totalidade do polígono. Por outro lado, o objectivo dos problemas de ocultação é a determinação do número máximo de posições num dado polígono, de modo a que quaisquer duas posições não se consigam “ver”. Infelizmente, a maior parte dos problemas de visibilidade em polígonos são NP-difíceis, o que dá origem a duas linhas de investigação: o desenvolvimento de algoritmos que estabelecem soluções aproximadas e a determinação de soluções exactas para classes especiais de polígonos. Atendendo a estas duas linhas de investigação, o trabalho é dividido em duas partes. Na primeira parte são propostos algoritmos aproximados, baseados essencialmente em metaheurísticas e metaheurísticas híbridas, para resolver alguns problemas de visibilidade, tanto em polígonos arbitrários como ortogonais. Os problemas estudados são os seguintes: “Maximum Hidden Vertex Set problem”, “Minimum Vertex Guard Set problem”, “Minimum Vertex Floodlight Set problem” e “Minimum Vertex k-Modem Set problem”. São também desenvolvidos métodos que permitem determinar a razão de aproximação dos algoritmos propostos. Para cada problema são implementados os algoritmos apresentados e é realizado um estudo estatístico para estabelecer qual o algoritmo que obtém as melhores soluções num tempo razoável. Este estudo permite concluir que as metaheurísticas híbridas são, em geral, as melhores estratégias para resolver os problemas de visibilidade estudados. Na segunda parte desta dissertação são abordados os problemas “Minimum Vertex Guard Set”, “Maximum Hidden Set” e “Maximum Hidden Vertex Set”, onde são identificadas e estudadas algumas classes de polígonos para as quais são determinadas soluções exactas e/ou limites combinatórios.