987 resultados para PERTURBAÇÕES RANK-ONE


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The crystal structures of the 1:1 proton-transfer compounds of 4,5-dichlorophthalic acid with the aliphatic Lewis bases diisopropylamine and hexamethylenetetramine, viz. diisopropylaminium 2-carboxy-4,5-dichlorobenzoate (1) and hexamethylenetetraminium 2-carboxy-4,5-dichlorobenzoate hemihydrate (2), have been determined. Crystals of both 1 and 2 are triclinic, space group P-1, with Z = 2 in cells with a = 7.0299(5), b = 9.4712(7), c = 12.790(1)Å, α = 99.476(6), β = 100.843(6), γ = 97.578(6)o (1) and a = 7.5624(8), b = 9.8918(8), c = 11.5881(16)Å, α = 65.660(6), β = 86.583(4), γ = 86.987(8)o (2). In each, one-dimensional hydrogen-bonded chain structures are found: in 1 formed through aminium N+-H...Ocarboxyl cation-anion interactions. In 2, the chains are formed through anion carboxyl O...H-Obridging water interactions with the cations peripherally bound. In both structures, the hydrogen phthalate anions are essentially planar with short intra-species carboxylic acid O-H...Ocarboxyl hydrogen bonds [O…O, 2.381(3) Å (1) and 2.381(8) Å (2)].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This approach to sustainable design explores the possibility of creating an architectural design process which can iteratively produce optimised and sustainable design solutions. Driven by an evolution process based on genetic algorithms, the system allows the designer to “design the building design generator” rather than to “designs the building”. The design concept is abstracted into a digital design schema, which allows transfer of the human creative vision into the rational language of a computer. The schema is then elaborated into the use of genetic algorithms to evolve innovative, performative and sustainable design solutions. The prioritisation of the project’s constraints and the subsequent design solutions synthesised during design generation are expected to resolve most of the major conflicts in the evaluation and optimisation phases. Mosques are used as the example building typology to ground the research activity. The spatial organisations of various mosque typologies are graphically represented by adjacency constraints between spaces. Each configuration is represented by a planar graph which is then translated into a non-orthogonal dual graph and fed into the genetic algorithm system with fixed constraints and expected performance criteria set to govern evolution. The resultant Hierarchical Evolutionary Algorithmic Design System is developed by linking the evaluation process with environmental assessment tools to rank the candidate designs. The proposed system generates the concept, the seed, and the schema, and has environmental performance as one of the main criteria in driving optimisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The care of the mechanically ventilated patient is at the core of a nurse's clinical practice in the Intensive Care Unit (ICU). Published work relating to the numerous nursing issues of the care of the mechanically ventilated patient in the ICU is growing significantly. Literature focuses on patient assessment and management strategies for patient stressors, pain and sedation. Yet this literature is fragmentary by nature. The purpose of this paper is to provide a single comprehensive examination of the evidence related to the care of the mechanically ventilated patient. In part one of this two-part paper, the evidence on nursing care of the mechanically ventilated patient is explored with specific focus on patient safety: particularly patient and equipment assessment. Part two of the paper examines the evidence related to the mechanically ventilated patient's comfort, the patient/family unit, patient position, hygiene, management of stressors, pain management and sedation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: This study examined the quality of life (QOL), measured by the Functional Assessment of Cancer Therapy (FACT) questionnaire, among urban (n=277) and non-urban (n=323) breast cancer survivors and women from the general population (n=1140) in Queensland, Australia. ---------- Methods: Population-based samples of breast cancer survivors aged <75 years who were 12 months post-diagnosis and similarly-aged women from the general population were recruited between 2002 and 2007. ---------- Results: Age-adjusted QOL among urban and non-urban breast cancer survivors was similar, although QOL related to breast cancer concerns was the weakest domain and was lower among non-urban survivors than their urban counterparts (36.8 versus 40.4, P<0.01). Irrespective of residence, breast cancer survivors, on average, reported comparable scores on most QOL scales as their general population peers, although physical well-being was significantly lower among non-urban survivors (versus the general population, P<0.01). Overall, around 20%-33% of survivors experienced lower QOL than peers without the disease. The odds of reporting QOL below normative levels were increased more than two-fold for those who experienced complications following surgery, reported upper-body problems, had higher perceived stress levels and/or a poor perception of handling stress (P<0.01 for all). ---------- Conclusions: Results can be used to identify subgroups of women at risk of low QOL and to inform components of tailored recovery interventions to optimize QOL for these women following cancer treatment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite different political structures and planning systems, striking physical similarities exist between the tourist destinations of the Gold Coasts of Queensland and Florida. Both have been fast developing sub-tropical coastal areas, subject to massive land booms, speculation, and entrepreneurs’ grand visions throughout their history. As a result, both have become tourist destinations of international renown. Drawing on historical sources, the present research seeks to investigate the extent to which these similarities result from taking American cities as a model for newer development in Australia; in this case from transferring planning and marketing ideas from one Gold Coast to another, with the development of the Florida Gold Coast setting precedent for the development of the Queensland Gold Coast.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stereo vision is a method of depth perception, in which depth information is inferred from two (or more) images of a scene, taken from different perspectives. Practical applications for stereo vision include aerial photogrammetry, autonomous vehicle guidance, robotics and industrial automation. The initial motivation behind this work was to produce a stereo vision sensor for mining automation applications. For such applications, the input stereo images would consist of close range scenes of rocks. A fundamental problem faced by matching algorithms is the matching or correspondence problem. This problem involves locating corresponding points or features in two images. For this application, speed, reliability, and the ability to produce a dense depth map are of foremost importance. This work implemented a number of areabased matching algorithms to assess their suitability for this application. Area-based techniques were investigated because of their potential to yield dense depth maps, their amenability to fast hardware implementation, and their suitability to textured scenes such as rocks. In addition, two non-parametric transforms, the rank and census, were also compared. Both the rank and the census transforms were found to result in improved reliability of matching in the presence of radiometric distortion - significant since radiometric distortion is a problem which commonly arises in practice. In addition, they have low computational complexity, making them amenable to fast hardware implementation. Therefore, it was decided that matching algorithms using these transforms would be the subject of the remainder of the thesis. An analytic expression for the process of matching using the rank transform was derived from first principles. This work resulted in a number of important contributions. Firstly, the derivation process resulted in one constraint which must be satisfied for a correct match. This was termed the rank constraint. The theoretical derivation of this constraint is in contrast to the existing matching constraints which have little theoretical basis. Experimental work with actual and contrived stereo pairs has shown that the new constraint is capable of resolving ambiguous matches, thereby improving match reliability. Secondly, a novel matching algorithm incorporating the rank constraint has been proposed. This algorithm was tested using a number of stereo pairs. In all cases, the modified algorithm consistently resulted in an increased proportion of correct matches. Finally, the rank constraint was used to devise a new method for identifying regions of an image where the rank transform, and hence matching, are more susceptible to noise. The rank constraint was also incorporated into a new hybrid matching algorithm, where it was combined a number of other ideas. These included the use of an image pyramid for match prediction, and a method of edge localisation to improve match accuracy in the vicinity of edges. Experimental results obtained from the new algorithm showed that the algorithm is able to remove a large proportion of invalid matches, and improve match accuracy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Prospective clinical case series of 100 patients receiving thoracoscopic anterior scoliosis correction surgery. The objective was to evaluate the relationship between clinical outcomes of thoracoscopic anterior scoliosis surgery and deformity correction using the Scoliosis Research Society (SRS) outcomes instrument questionnaire. The surgical treatment of scoliosis is quantitatively assessed in the clinic using radiographic measures of deformity correction, as well as the rib hump, but it is important to understand the extent to which these quantitative measures correlate with self-reported improvements in patients’ quality of life following surgery. A series of 100 consecutive adolescent idiopathic scoliosis patients received a single anterior rod via a thoracoscopic approach at the Mater Children’s Hospital, Brisbane, Australia. Patients completed SRS outcomes questionnaires pre-operatively and at 24 months post-operatively. There were 94 females and 6 males with a mean age of 16.1 years. The mean Cobb angle improved from 52º pre-operatively to 25º post-operatively (52%) and the mean rib hump improved from 16º to 8º (51%). The mean total SRS score for the cohort was 99.4/120. None of the deformity related parameters in the multiple regression were significant. However, patients with the lowest post-operative major Cobb angles reported significantly higher SRS scores than those with the highest post-operative Cobb angles, but there was no difference on the basis of rib hump correction. There were no significant differences between patients with either rod fractures or screw-related complications compared to those without complications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The problem of delays in the construction industry is a global phenomenon and the construction industry in Brunei Darussalam is no exception. The goal of all parties involved in construction projects – owners, contractors, engineers and consultants in either the public or private sector is to successfully complete the project on schedule, within planned budget, with the highest quality and in the safest manner. Construction projects are frequently influenced by either success factors that help project parties reach their goal as planned, or delay factors that stifle or postpone project completion. The purpose of this research is to identify success and delay factors which can help project parties reach their intended goals with greater efficiency. This research extracted seven of the most important success factors according to the literature and seven of the most important delay factors identified by project parties, and then examined correlations between them to determine which were the most influential in preventing project delays. This research uses a comprehensive literature review to design and conduct a survey to investigate success and delay factors and then obtain a consensus of expert opinion using the Delphi methodology to rank the most needed critical success factors for Brunei construction projects. A specific survey was distributed to owners, contractors and engineers to examine the most critical delay factors. A general survey was distributed to examine the correlation between the identified delay factors and the seven most important critical success factors selected. A consensus of expert opinion using the Delphi methodology was used to rank the most needed critical success factors for Brunei building construction. Data was collected and evaluated by statistical methods to identify the most significant causes of delay and to measure the strength and direction of the relationship between critical success factors and delay factors in order to examine project parties’ evaluation of projects’ critical success and delay factors, and to evaluate the influence of critical success factors on critical delay factors. A relative importance index has been used to determine the relative importance of the various causes of delays. A one and two-way analysis of variance (ANOVA) has been used to examine how the group or groups evaluated the influence of the critical success factors in avoiding or preventing each of the delay factors, and which success factors were perceived as most influential in avoiding or preventing critical delay factors. Finally the Delphi method, using consensus from an expert panel, was employed to identify the seven most critical success factors used to avoid the delay factors, and thereby improve project performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For quite some time, debate has raged about what the human race can and should do with its knowledge of genetics. We are now nearly 60 years removed from the work of Watson and Crick who determined the structure of deoxyribonucleic acid (DNA), yet our opinions as how best to employ scientific knowledge of the human genome, remain as diverse and polarised as ever. Human judgment is often shaped and coloured by popular media and culture, so it should come as no surprise that box office movies such as Gattaca (1997) continue to play a role in informing public opinion on genetics. In order to perform well at the box office, movies such as Gattaca take great liberty in sensationalising (and even distorting) the implications that may result from genetic screening and testing. If the public’s opinion on human genetics is strongly derived from the box office and popular media, then it is no wonder that the discourse on human genetics is couched in the polar parlances of future utopias or future dystopias. When legislating in an area like genetic discrimination in the workforce, we must be mindful of not overplaying the causal link between genetic predisposition towards a disability and an employee’s ability to perform the inherent requirements of their job. Genetic information is ultimately about people, it is not about genes. Genetic discrimination is ultimately about actions, it is not about the intrinsic value of genetic information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bullying in all its forms including cyberbullying is a continuing problem in schools. Given the severe consequences it can have on students (socially, psychologically and physically) it is not surprising that a number of intervention programs have been developed, with most advocating a whole school approach. The current study compared students’ self-reports on bullying between schools with and without a Philosophy for Children (P4C) approach. A sample of 35 students in the P4C school and a matched sample of 35 students in other schools between the ages of 10 and 13 completed the Student Bullying Survey. Results indicated that while there were significant differences in incidences of face-to-face bullying, there were similar results from both cohorts in relation to cyberbullying. Both groups of students felt that teachers were more likely to prevent face-to-face bullying than cyberbullying. Findings indicate that teachers and guidance counsellors need to be as overt in teaching strategies about cyberbullying as they are in teaching strategies about reducing face-to-face bullying.