986 resultados para 338.642
Resumo:
We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST’s SHA3 competition. First we improve Aumasson and Phans’ integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16.5 rounds. Next we improve the designers’ meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Finally, we comment on possible methods to obtain free-start distinguishers and free-start collisions for Fugue-256.
Resumo:
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.
Resumo:
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.
Resumo:
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.
Resumo:
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.
Resumo:
This chapter discussed the various modes of operation of the Doubly Fed Induction Generator (DFIG) based wind farm system. The impact of a auxiliary damping controller on the different modes of operation for the DFIG based wind generation system is investigated. The co-ordinated tuning of the damping controller to enhance the damping of the oscillatory modes using Bacteria Foraging (BF) technique is presented. The results from eigenvalue analysis are presented to elucidate the effectiveness of the tuned damping controller in the DFIG system under Super/Sub-synchronous speed of operation. The robustness issue of the damping controller is also investigated.
Resumo:
This chapter focuses on the implementation of the TS (Tagaki-Sugino) fuzzy controller for the Doubly Fed Induction Generator (DFIG) based wind generator. The conventional PI control loops for mantaining desired active power and DC capacitor voltage is compared with the TS fuzzy controllers. DFIG system is represented by a third-order model where electromagnetic transients of the stator are neglected. The effectiveness of the TS-fuzzy controller on the rotor speed oscillations and the DC capacitor voltage variations of the DFIG damping controller on converter ratings is also investigated. The results from the time domain simulations are presented to elucidate the effectiveness of the TS-fuzzy controller over the conventional PI controller in the DFIG system. The proposed TS-fuzzy con-troller can improve the fault ride through capability of DFIG compared to the conventional PI controller.
Resumo:
In this paper we present an update on our novel visualization technologies based on cellular immune interaction from both large-scale spatial and temporal perspectives. We do so with a primary motive: to present a visually and behaviourally realistic environment to the community of experimental biologists and physicians such that their knowledge and expertise may be more readily integrated into the model creation and calibration process. Visualization aids understanding as we rely on visual perception to make crucial decisions. For example, with our initial model, we can visualize the dynamics of an idealized lymphatic compartment, with antigen presenting cells (APC) and cytotoxic T lymphocyte (CTL) cells. The visualization technology presented here offers the researcher the ability to start, pause, zoom-in, zoom-out and navigate in 3-dimensions through an idealised lymphatic compartment.
Resumo:
There is consensus among practitioners and academics that culture is a critical factor that is able to determine success or failure of BPM initiatives. Yet, culture is a topic that seems difficult to grasp and manage. This may be the reason for the overall lack of guidance on how to address this topic in practice. We have conducted in-depth research for more than three years to examine why and how culture is relevant to BPM. In this chapter, we introduce a framework that explains the role of culture in BPM. We also present the relevant cultural values that compose a BPM culture, and we introduce a tool to examine the supportiveness of organizational cultures for BPM. Our research results provide the basis for further empirical analyses on the topic and support practitioners in the management of culture as an important factor in BPM initiatives.
Resumo:
This paper discusses documentary heritage collection enrichment programs run with community participation. Two library programs at the State Library of Queensland (SLQ) are explored as examples. The programs are the Flood and Cyclone Mosaic and Pitch in! The challenges for the implementation of such programs in Indonesia are also discussed in the last section of the paper. This paper provides better understanding of documentary heritage collection enrichment strategies conducted by a public library in Queensland, Australia. It is expected that this paper will inspire public libraries in Indonesia to maximise their documentary collection enrichment strategies with community participation. This paper can also help the National Library of Indonesia (PNRI) in designing their documentary heritage collections enrichment strategies in its role as the Web portal provider of the national documentary heritage repository. Tulisan ini membahas program pengayaan koleksi warisan dokumenter yang dilaksanakan dengan partisipasi masyarakat. Dua program perpustakaan di the State Library of Queensland (SLQ) dieksplorasi sebagai contoh. Program-program yang dibahas adalah Flood and Cyclone Mosaic dan Pitch In! Tantangan yang harus dihadapi untuk penerapan program semacam di Indonesia juga dibahas di bagian akhir tulisan. Tulisan ini memberikan pemahaman mengenai strategi pengayaan koleksi warisan dokumenter yang dilakukan oleh sebuah perpustakaan umum di Queensland, Australia. Diharapkan tulisan ini dapat menjadi inspirasi bagi perpustakaan umum di Indonesia untuk dapat memaksimalkan strategi pengayaan koleksi dokumenter mereka dengan melibatkan partisipasi masyarakat. Tulisan ini juga dapat membantu Perpustakaan Nasional Republik Indonesia (PNRI) dalam merancang strategi pengayaan koleksi warisan dokumenter mereka dalam perannya sebagai penyedia portal Web repositori warisan dokumenter bangsa.
Resumo:
Industrial production and supply chains face increased demands for mass customization and tightening regulations on the traceability of goods, leading to higher requirements concerning flexibility, adaptability, and transparency of processes. Technologies for the ’Internet of Things' such as smart products and semantic representations pave the way for future factories and supply chains to fulfill these challenging market demands. In this chapter a backend-independent approach for information exchange in open-loop production processes based on Digital Product Memories DPMs is presented. By storing order-related data directly on the item, relevant lifecycle information is attached to the product itself. In this way, information handover between several stages of the value chain with focus on the manufacturing phase of a product has been realized. In order to report best practices regarding the application of DPM in the domain of industrial production, system prototype implementations focusing on the use case of producing and handling a smart drug case are illustrated.
Resumo:
This study models the joint production of desirable and undesirable output production (that is, CO2 emissions) of airlines. The Malmquist–Luenberger productivity index is employed to measure productivity growth when undesirable output production is incorporated into the production model. The results show that pollution abatement activities of airlines lowers productivity growth, which suggests that the traditional approach of measuring productivity growth, which ignores CO2 emissions, overstates ‘true’ productivity growth. The reliability of the results is also tested and verified using confidence intervals based on bootstrapping.
Resumo:
OBJECTIVES To estimate the disease burden attributable to being underweight as an indicator of undernutrition in children under 5 years of age and in pregnant women for the year 2000. DESIGN World Health Organization comparative risk assessment (CRA) methodology was followed. The 1999 National Food Consumption Survey prevalence of underweight classified in three low weight-for-age categories was compared with standard growth charts to estimate population-attributable fractions for mortality and morbidity outcomes, based on increased risk for each category and applied to revised burden of disease estimates for South Africa in 2000. Maternal underweight, leading to an increased risk of intra-uterine growth retardation and further risk of low birth weight (LBW), was also assessed using the approach adopted by the global assessment. Monte Carlo simulation-modeling techniques were used for the uncertainty analysis. SETTING South Africa. SUBJECTS Children under 5 years of age and pregnant women. OUTCOME MEASURES Mortality and disability-adjusted life years (DALYs) from protein- energy malnutrition and a fraction of those from diarrhoeal disease, pneumonia, malaria, other non- HIV/AIDS infectious and parasitic conditions in children aged 0 - 4 years, and LBW. RESULTS Among children under 5 years, 11.8% were underweight. In the same age group, 11,808 deaths (95% uncertainty interval 11,100 - 12,642) or 12.3% (95% uncertainty interval 11.5 - 13.1%) were attributable to being underweight. Protein-energy malnutrition contributed 44.7% and diarrhoeal disease 29.6% of the total attributable burden. Childhood and maternal underweight accounted for 2.7% (95% uncertainty interval 2.6 - 2.9%) of all DALYs in South Africa in 2000 and 10.8% (95% uncertainty interval 10.2 - 11.5%) of DALYs in children under 5. CONCLUSIONS The study shows that reduction of the occurrence of underweight would have a substantial impact on child mortality, and also highlights the need to monitor this important indicator of child health.
Resumo:
The structures of the isomorphous potassium and rubidium polymeric coordination complexes with 4-nitrobenzoic acid, poly[mu2-aqua-aqua-mu3-(4-nitrobenzoato)-potassium], [K(C7H4N2O2)(H2O)2]n, (I) and poly[mu3-aqua-aqua-mu5-(4-nitrobenzoato)-rubidium], [Rb(C7H4N2O2)(H2O)2]n, (II) have been determined. In (I) the very distorted KO6 coordination sphere about the K+ centres in the repeat unit comprise two bridging nitro O-atom donors, a single bridging carboxyl O-atom donor and two water molecules, one of which is bridging. In the the Rb complex (II), the same basic MO6 coordination is found in the repeat unit but is expanded to RbO9 through a slight increase in the accepted Rb-O bond length range and includes an additional Rb-O(carboxyl) bond, completing a bidentate O,O'-chelate interaction, and additional bridging Rb-Onitro) and Rb-O(water) bonds. The comparative K-O and Rb-O bond length ranges are 2.738(3)-3.002(3)Ang. (I) and 2.884(2)-3.182(2)Ang. (II). The structure of (II) is also isomorphous as well as isostructural with the known structure of the nine-coordinate caesium 4-nitrobenzoate analogue, [Cs(C7H4N2O~2~)(H~2~O)2]n, (III) in which the Cs---O range is 3.047(4)-3.338(4)Ang. In all three complexes, common basic polymeric extensions are found, including two different centrosymmetric bridging interactions through both water and nitro groups as well as extensions along c through the p-related carboxyl group, giving a two-dimensional structure in (I). In (II) and (III), three-dimensional structures are generated through additional bridges through the nitro and water O-atoms. In all structures, both water molecules are involved in similar intra-polymer O-H...O hydrogen-bonding interactions to both carboxyl as well as water O-atom acceptors. A comparison of the varied coordination behaviour of the full set of Li-Cs salts with 4-nitrobenzoic acid is also made.
Resumo:
We extended genetic linkage analysis - an analysis widely used in quantitative genetics - to 3D images to analyze single gene effects on brain fiber architecture. We collected 4 Tesla diffusion tensor images (DTI) and genotype data from 258 healthy adult twins and their non-twin siblings. After high-dimensional fluid registration, at each voxel we estimated the genetic linkage between the single nucleotide polymorphism (SNP), Val66Met (dbSNP number rs6265), of the BDNF gene (brain-derived neurotrophic factor) with fractional anisotropy (FA) derived from each subject's DTI scan, by fitting structural equation models (SEM) from quantitative genetics. We also examined how image filtering affects the effect sizes for genetic linkage by examining how the overall significance of voxelwise effects varied with respect to full width at half maximum (FWHM) of the Gaussian smoothing applied to the FA images. Raw FA maps with no smoothing yielded the greatest sensitivity to detect gene effects, when corrected for multiple comparisons using the false discovery rate (FDR) procedure. The BDNF polymorphism significantly contributed to the variation in FA in the posterior cingulate gyrus, where it accounted for around 90-95% of the total variance in FA. Our study generated the first maps to visualize the effect of the BDNF gene on brain fiber integrity, suggesting that common genetic variants may strongly determine white matter integrity.