988 resultados para Common litter
Resumo:
We consider the following problem: members in a dynamic group retrieve their encrypted data from an untrusted server based on keywords and without any loss of data confidentiality and member’s privacy. In this paper, we investigate common secure indices for conjunctive keyword-based retrieval over encrypted data, and construct an efficient scheme from Wang et al. dynamic accumulator, Nyberg combinatorial accumulator and Kiayias et al. public-key encryption system. The proposed scheme is trapdoorless and keyword-field free. The security is proved under the random oracle, decisional composite residuosity and extended strong RSA assumptions.
Resumo:
Recent findings from the clinic and the laboratory have transformed the way proteases and their inhibitors are perceived in the outermost layer of the skin, the epidermis. It now appears that an integrated proteolytic network operates within the epidermis, comprising more than 30 enzymes that carry out a growing list of essential functions. Equally, defective regulation or execution of protease-mediated processes is emerging as a key contributor to diverse human skin pathologies, and in recent years the number of diseases attributable to aberrant proteolytic activity has more than doubled. Here, we survey the different roles of proteases in epidermal homeostasis (from processing enzymes to signalling molecules) and explore the spectrum of rare and common human skin disorders where proteolytic pathways are dysregulated.
Resumo:
Most urban dwelling Australians take secure and safe water supplies for granted. That is, they have an adequate quantity of water at a quality that can be used by people without harm from human and animal wastes, salinity and hardness or pollutants from agriculture and manufacturing industries. Australia wide urban and peri-urban dwellers use safe water for all domestic as well as industrial purposes. However, this is not the situation remote regions in Australia where availability and poor quality water can be a development constraint. Nor is it the case in Sri Lanka where people in rural regions are struggling to obtain a secure supply of water, irrespective of it being safe because of the impact of faecal and other contaminants. The purposes of this paper are to overview: the population and environmental health challenges arising from the lack of safe water in rural and remote communities; response pathways to address water quality issues; and the status of and need for integrated catchment management (ICM) in selected remote regions of Australia and vulnerable and lagging rural regions in Sri Lanka. Conclusions are drawn that focus on the opportunity for inter-regional collaborations between Australia and Sri Lanka for the delivery of safe water through ICM.
Resumo:
ORIGO Stepping Stones is written and developed by a team of experts to provide teachers with a world-class elementary math program. Our expert team of authors and consultants are utilizing all available educational research to create a unique program that has never before been available to teachers. The full color Student Practice Book provides practice pages that support previous and current lessons.
Common origins of MDA-MB-435 cells from various sources with those shown to have melanoma properties
Resumo:
Recently, the tissue origin of MDA-MB-435 cell line has been the subject of considerable debate. In this study, we set out to determine whether MDA-MB-435-DTP cells shown to express melanoma-specific genes were identical to various other MDA-MB-435 cell stocks worldwide. CGH-microarray, genetic polymorphism genotyping, microsatellite fingerprint analysis and/or chromosomal number confirmed that the MDA-MB-435 cells maintained at the Lombardi Comprehensive Cancer Center (MDA-MB-435-LCC) are almost identical to the MDA-MB-435-DTP cells, and showed a very similar profile to those obtained from the same original source (MD Anderson Cancer Center) but maintained independently (MDA-MB-435-PMCC). Gene expression profile analy-sis confirmed common expression of genes among different MDA-MB-435-LCC cell stocks, and identified some unique gene products in MDA-MB-435-PMCC cells. RT-PCR analysis confirmed the expression of the melanoma marker tyrosinase across multiple MDA-MB-435 cell stocks. Collectively, our results show that the MDA-MB-435 cells used widely have identical origins to those that exhibit a melanoma-like gene expression signature, but exhibit a small degree of genotypic and phenotypic drift.
Resumo:
This article explains the new pre-court procedures and additional procedures designed to foster settlement of claims introduced by the Workcover Queensland Act 1996, and the implication of the new provisions for practitioners.
Resumo:
We consider the following problem: users in a dynamic group store their encrypted documents on an untrusted server, and wish to retrieve documents containing some keywords without any loss of data confidentiality. In this paper, we investigate common secure indices which can make multi-users in a dynamic group to obtain securely the encrypted documents shared among the group members without re-encrypting them. We give a formal definition of common secure index for conjunctive keyword-based retrieval over encrypted data (CSI-CKR), define the security requirement for CSI-CKR, and construct a CSI-CKR based on dynamic accumulators, Paillier’s cryptosystem and blind signatures. The security of proposed scheme is proved under strong RSA and co-DDH assumptions.
Resumo:
This paper presents the design of a dual Z-source inverter that can be used with either a single dc source or two isolated dc sources. Unlike traditional inverters, the integration of a properly designed Z-source network and semiconductor switches to the proposed dual inverter allows buck-boost power conversion to be performed over a wide modulation range with three-level output waveforms generated. The connection of an additional transformer to the inverter ac output also allows all generic wye- or delta-connected loads with three-wire or four-wire configuration to be supplied by the inverter. Modulation-wise, the dual inverter can be controlled using a carefully designed carrier-based pulse-width modulation (PWM) scheme that always will ensure balanced voltage boosting of the Z-source network, while simultaneously achieving reduced common-mode switching. Because of the omission of dead-time delays in the dual inverter PWM scheme, its switched common-mode voltage can be completely eliminated, unlike in traditional inverters where narrow common-mode spikes are still generated. Under semiconductor failure conditions, the presented PWM schemes can easily be modified to allow the inverter to operate without interruption and for cases where two isolated sources are used, zero common-mode voltage can still be ensured. These theoretical findings together with the inverter practicality have been confirmed both in simulations using PSIM with Matlab/Simulink coupler and experimentally using a laboratory implemented inverter prototype.
Resumo:
This paper presents the design of a dual Z-source inverter that can be used with either a single dc source or two isolated dc sources. Unlike traditional inverters, the integration of a properly designed Z-source network and semiconductor switches to the proposed dual inverter allows buck-boost power conversion to be performed over a wide modulation range, with three-level output waveforms generated. The connection of an additional transformer to the inverter ac output also allows all generic wye-or delta-connected loads with three-wire or four-wire configuration to be supplied by the inverter. Modulationwise, the dual inverter can be controlled using a carefully designed carrier-based pulsewidth-modulation (PWM) scheme that will always ensure balanced voltage boosting of the Z-source network while simultaneously achieving reduced common-mode switching. Because of the omission of dead-time delays in the dual-inverter PWM scheme, its switched common-mode voltage can be completely eliminated, unlike in traditional inverters, where narrow common-mode spikes are still generated. Under semiconductor failure conditions, the presented PWM schemes can easily be modified to allow the inverter to operate without interruption, and for cases where two isolated sources are used, zero common-mode voltage can still be ensured. These theoretical findings, together with the inverter practicality, have been confirmed in simulations both using PSIM with Matlab/Simulink coupler and experimentally using a laboratory-implemented inverter prototype.
Resumo:
The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.
Resumo:
Steady state entanglement in ensembles of harmonic oscillators with a common squeezed reservoir is studied. Under certain conditions the ensemble features genuine multipartite entanglement in the steady state. Several analytic results regarding the bipartite and multipartite entanglement properties of the system are derived. We also discuss a possible experimental implementation which may exhibit steady state genuine multipartite entanglement.
Resumo:
Common method variance (CMV) has received little attention within the field of road safety research despite a heavy reliance on self-report data. Two surveys were completed by 214 motorists over a two-month period, allowing associations between social desirability and key road safety variables and relationships between scales across the two survey waves to be examined. Social desirability was found to have a strong negative correlation with the Driver Behaviour Questionnaire (DBQ) sub-scales as well as age, but not with crashes and offences. Drivers who scored higher on the social desirability scale were also less likely to report aberrant driving behaviours as measured by the DBQ. Controlling for social desirability did not substantially alter the predictive relationship between the DBQ and the crash and offences variables. The strength of the correlations within and between the two waves were also compared with the results strongly suggesting that effects associated with CMV were present. Identification of CMV would be enhanced by the replication of this study with a larger sample size and comparing self-report data with official sources.