998 resultados para ONE ODD GENERATOR
Resumo:
Hope is a word that has re-emerged in light of Obama's stunning win in the United States election. In this time of economic gloom and the reality of bleak recession and unprecedented job losses the United States has embraced the hopeful message of Barack Obama. For many years 'hope' has been a word that has been lost, forgotten , and banished to the margins of romantic longing and wishful thinking. Hope is also a word that has been much discussed in relation to the iconic The Great Gatsby but usually in a negative fashion to demonstrate the unattainability of the American dream. Marcella Taylor called Gatsby "the unfinished American Epic" which focused on the "passing of the last utopian frontier" and suggested the significance of this passing on American society as a whole. In the last months, however, hope has made a return and one gets the feeling that Fitzgerald's words "but that's no matter-to-morrow we will run faster, stretch out our arms farther . . . And one fine morning' are once again being heard.
Resumo:
One of the classic forms of intermediate representation used for communication between compiler front-ends and back-ends are those based on abstract stack machines. It is possible to compile the stack machine instructions into machine code by means of an interpretive code generator, or to simulate the stack machine at runtime using an interpreter. This paper describes an approach intermediate between these two extremes. The front-end for a commercial Modula 2 compiler was ported to the "industry standard PC", and a partially compiling back-end written. The object code runs with the assistance of an interpreter, but may be linked with libraries which are fully compiled. The intent was to provide a programming environment on the PC which is identical to that of the same compilers on 32-bit UNIX machines. This objective has been met, and the compiler is available to educational institutions as free-ware. The design basis of the new compiler is described, and the performance critically evaluated.
Resumo:
Background: Diagnosis of epithelial ovarian cancer (EOC) in young women has major implications including those to their reproductive potential. We evaluated depression, anxiety and body image in patients with stage I EOC treated with fertility sparing surgery (FSS) or radical surgery (RS). We also investigated fertility outcomes after FSS.----- Methods: A retrospective study was undertaken in which 62 patients completed questionnaires related to anxiety, depression, body image and fertility outcomes. Additional information on adjuvant therapy after FSS and RS and demographic details were abstracted from medical records. Both bi and multivariate regression models were used to assess the relationship between demographic, clinical and pathological results and scores for anxiety, depression and body image.----- Results: Thirty-nine patients underwent RS and the rest, FSS. The percentage of patients reporting elevated anxiety and depression (subscores ≥ 11) were 27 % and 5% respectively. The median (inter quartile range) score for body image scale (BIS) was 6 (3-15). None of the demographic or clinical factors examined showed significant association with anxiety and BIS with the exception of ‘time since diagnosis’. For depression, post-menopausal status was the only independent predictor. Among those 23 patients treated by FSS, 14 patients tried to conceive (7 successful), resulting in 7 live births, one termination of pregnancy and one miscarriage.----- Conclusion: This study shows that psychological issues are common in women treated for stage I EOC. Reproduction after FSS is feasible and lead to the birth of healthy babies in about half of patients who wished to have another child. Further prospective studies with standardised instruments are required.
Resumo:
The molecules of the title compound, C16H16O2, display an intramolecular O—HO hydrogen bond between the hydroxyl donor and the ketone acceptor. Intermolecular C—Hπ interactions connect adjacent molecules into chains that propagate parallel to the ac diagonal. The chains are arranged in sheets, and molecules in adjacent sheets interact via intermolecular O—HO hydrogen bonds.
Resumo:
The word “queer” is a slippery one; its etymology is uncertain, and academic and popular usage attributes conflicting meanings to the word. By the mid-nineteenth century, “queer” was used as a pejorative term for a (male) homosexual. This negative connotation continues when it becomes a term for homophobic abuse. In recent years, “queer” has taken on additional uses: as an all encompassing term for culturally marginalised sexualities – gay, lesbian, trans, bi, and intersex (“GLBTI”) – and as a theoretical strategy which deconstructs binary oppositions that govern identity formation. Tracing its history, the Oxford English Dictionary notes that the earliest references to “queer” may have appeared in the sixteenth century. These early examples of queer carried negative connotations such as “vulgar,” “bad,” “worthless,” “strange,” or “odd” and such associations continued until the mid-twentieth century. The early nineteenth century, and perhaps earlier, employed “queer” as a verb, meaning to “to put out of order,” “to spoil”, “to interfere with”. The adjectival form also began to emerge during this time to refer to a person’s condition as being “not normal,” “out of sorts” or to cause a person “to feel queer” meaning “to disconcert, perturb, unsettle.” According to Eve Sedgwick (1993), “the word ‘queer’ itself means across – it comes from the Indo-European root – twerkw, which also yields the German quer (traverse), Latin torquere (to twist), English athwart . . . it is relational and strange.” Despite the gaps in the lineage and changes in usage, meaning and grammatical form, “queer” as a political and theoretical strategy has benefited from its diverse origins. It refuses to settle comfortably into a single classification, preferring instead to traverse several categories that would otherwise attempt to stabilise notions of chromosomal sex, gender and sexuality.
Resumo:
The crystal structures of the 1:1 proton-transfer compounds of 4,5-dichlorophthalic acid with the aliphatic Lewis bases diisopropylamine and hexamethylenetetramine, viz. diisopropylaminium 2-carboxy-4,5-dichlorobenzoate (1) and hexamethylenetetraminium 2-carboxy-4,5-dichlorobenzoate hemihydrate (2), have been determined. Crystals of both 1 and 2 are triclinic, space group P-1, with Z = 2 in cells with a = 7.0299(5), b = 9.4712(7), c = 12.790(1)Å, α = 99.476(6), β = 100.843(6), γ = 97.578(6)o (1) and a = 7.5624(8), b = 9.8918(8), c = 11.5881(16)Å, α = 65.660(6), β = 86.583(4), γ = 86.987(8)o (2). In each, one-dimensional hydrogen-bonded chain structures are found: in 1 formed through aminium N+-H...Ocarboxyl cation-anion interactions. In 2, the chains are formed through anion carboxyl O...H-Obridging water interactions with the cations peripherally bound. In both structures, the hydrogen phthalate anions are essentially planar with short intra-species carboxylic acid O-H...Ocarboxyl hydrogen bonds [O…O, 2.381(3) Å (1) and 2.381(8) Å (2)].
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.
Resumo:
This approach to sustainable design explores the possibility of creating an architectural design process which can iteratively produce optimised and sustainable design solutions. Driven by an evolution process based on genetic algorithms, the system allows the designer to “design the building design generator” rather than to “designs the building”. The design concept is abstracted into a digital design schema, which allows transfer of the human creative vision into the rational language of a computer. The schema is then elaborated into the use of genetic algorithms to evolve innovative, performative and sustainable design solutions. The prioritisation of the project’s constraints and the subsequent design solutions synthesised during design generation are expected to resolve most of the major conflicts in the evaluation and optimisation phases. Mosques are used as the example building typology to ground the research activity. The spatial organisations of various mosque typologies are graphically represented by adjacency constraints between spaces. Each configuration is represented by a planar graph which is then translated into a non-orthogonal dual graph and fed into the genetic algorithm system with fixed constraints and expected performance criteria set to govern evolution. The resultant Hierarchical Evolutionary Algorithmic Design System is developed by linking the evaluation process with environmental assessment tools to rank the candidate designs. The proposed system generates the concept, the seed, and the schema, and has environmental performance as one of the main criteria in driving optimisation.
Resumo:
The care of the mechanically ventilated patient is at the core of a nurse's clinical practice in the Intensive Care Unit (ICU). Published work relating to the numerous nursing issues of the care of the mechanically ventilated patient in the ICU is growing significantly. Literature focuses on patient assessment and management strategies for patient stressors, pain and sedation. Yet this literature is fragmentary by nature. The purpose of this paper is to provide a single comprehensive examination of the evidence related to the care of the mechanically ventilated patient. In part one of this two-part paper, the evidence on nursing care of the mechanically ventilated patient is explored with specific focus on patient safety: particularly patient and equipment assessment. Part two of the paper examines the evidence related to the mechanically ventilated patient's comfort, the patient/family unit, patient position, hygiene, management of stressors, pain management and sedation.
Resumo:
Background: This study examined the quality of life (QOL), measured by the Functional Assessment of Cancer Therapy (FACT) questionnaire, among urban (n=277) and non-urban (n=323) breast cancer survivors and women from the general population (n=1140) in Queensland, Australia. ---------- Methods: Population-based samples of breast cancer survivors aged <75 years who were 12 months post-diagnosis and similarly-aged women from the general population were recruited between 2002 and 2007. ---------- Results: Age-adjusted QOL among urban and non-urban breast cancer survivors was similar, although QOL related to breast cancer concerns was the weakest domain and was lower among non-urban survivors than their urban counterparts (36.8 versus 40.4, P<0.01). Irrespective of residence, breast cancer survivors, on average, reported comparable scores on most QOL scales as their general population peers, although physical well-being was significantly lower among non-urban survivors (versus the general population, P<0.01). Overall, around 20%-33% of survivors experienced lower QOL than peers without the disease. The odds of reporting QOL below normative levels were increased more than two-fold for those who experienced complications following surgery, reported upper-body problems, had higher perceived stress levels and/or a poor perception of handling stress (P<0.01 for all). ---------- Conclusions: Results can be used to identify subgroups of women at risk of low QOL and to inform components of tailored recovery interventions to optimize QOL for these women following cancer treatment.
Resumo:
Despite different political structures and planning systems, striking physical similarities exist between the tourist destinations of the Gold Coasts of Queensland and Florida. Both have been fast developing sub-tropical coastal areas, subject to massive land booms, speculation, and entrepreneurs’ grand visions throughout their history. As a result, both have become tourist destinations of international renown. Drawing on historical sources, the present research seeks to investigate the extent to which these similarities result from taking American cities as a model for newer development in Australia; in this case from transferring planning and marketing ideas from one Gold Coast to another, with the development of the Florida Gold Coast setting precedent for the development of the Queensland Gold Coast.
Resumo:
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.
Resumo:
Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for authentication mechanisms. They consist of a Linear Feedback Shift Register (LFSR) and a nonlinear Boolean function to mask the linearity of the LFSR output. Properties of the output of a nonlinear filter are not well studied. Anderson noted that the m-tuple output of a nonlinear filter with consecutive taps to the filter function is unevenly distributed. Current designs use taps which are not consecutive. We examine m-tuple outputs from nonlinear filter generators constructed using various LFSRs and Boolean functions for both consecutive and uneven (full positive difference sets where possible) tap positions. The investigation reveals that in both cases, the m-tuple output is not uniform. However, consecutive tap positions result in a more biased distribution than uneven tap positions, with some m-tuples not occurring at all. These biased distributions indicate a potential flaw that could be exploited for cryptanalysis.