788 resultados para Incremental protocol in treadmill
Resumo:
The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.
Resumo:
We investigate Multiple-Input and Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems behavior in indoor populated environments that have line-of-site (LoS) between transmitter and receiver arrays. The in-house built MIMO-OFDM packet transmission demonstrator, equipped with four transmitters and four receivers, has been utilized to perform channel measurements at 5.2 GHz. Measurements have been performed using 0 to 3 pedestrians with different antenna arrays (2 £ 2, 3 £ 3 and 4 £ 4). The maximum average capacity for the 2x2 deterministic Fixed SNR scenario is 8.5 dB compared to the 4x4 deterministic scenario that has a maximum average capacity of 16.2 dB, thus an increment of 8 dB in average capacity has been measured when the array size increases from 2x2 to 4x4. In addition a regular variation has been observed for Random scenarios compared to the deterministic scenarios. An incremental trend in average channel capacity for both deterministic and random pedestrian movements has been observed with increasing number of pedestrian and antennas. In deterministic scenarios, the variations in average channel capacity are more noticeable than for the random scenarios due to a more prolonged and controlled body-shadowing effect. Moreover due to the frequent Los blocking and fixed transmission power a slight decrement have been observed in the spread between the maximum and minimum capacity with random fixed Tx power scenario.
Resumo:
Sewage and its microbiology, treatment and disposal are important to the topic of Antarctic wildlife health because disposal of untreated sewage effluent into the Antarctic marine environment is both allowed and commonplace. Human sewage contains enteric bacteria as normal flora, and has the potential to contain parasites, bacteria and viruses which may prove pathogenic to Antarctic wildlife. Treatment can reduce levels of micro-organisms in sewage effluent, but is not a requirement of the Environmental Protocol to the Antarctic Treaty (the Madrid Protocol). In contrast, the deliberate release of non-native organisms for any other reason is prohibited. Hence, disposal of sewage effluent to the marine environment is the only activity routinely undertaken in Antarctica knowing that it will likely result in the release of large numbers of potentially non-native species. When the Madrid Protocol was negotiated, the decision to allow release of untreated sewage effluent was considered the only pragmatic option, as a prohibition would have been costly, and may not have been achievable by many Antarctic operators. In addition, at that time the potential for transmission of pathogens to wildlife from sewage was not emphasised as a significant potential risk. Since then, the transmission of disease-causing agents between species is more widely recognised and it is now timely to consider the risks of continued discharge of sewage effluent in Antarctica and whether there are practical alternatives.
Resumo:
To assess the effects of information interventions which orient patients and their carers/family to a cancer care facility and the services available in the facility.
Resumo:
This document describes algorithms based on Elliptic Cryptography (ECC) for use within the Secure Shell (SSH) transport protocol. In particular, it specifies Elliptic Curve Diffie-Hellman (ECDH) key agreement, Elliptic Curve Menezes-Qu-Vanstone (ECMQV) key agreement, and Elliptic Curve Digital Signature Algorithm (ECDSA) for use in the SSH Transport Layer protocol.
Resumo:
In this short communication we wanted to find out what is the analgesic effect of single dose oral oxycodone, with or without the addition of paracetamol, for adults with postoperative pain? Oxycodone at doses of 5mg and above is an effective analgesia for patients with moderate to severe postoperative pain. The efficacy of oxycodone is increased with the addition of paracetamol. The use of oxycodone 10mg plus paracetamol 625mg can be considered for use in the pain relief protocol in post-operative settings. Clinicians should consider a range of factors before prescribing or administering oxycodone for acute post-operative pain, including but not limited to, individual patient clinical profile, adverse effects, cost and patient preference.
Resumo:
This chapter will introduce Australia’s Dennis family – a case of ‘incremental entrepreneurship’ in the business transition from the first to the second generation. Following the second generation’s formal involvement and ownership in the business, Dennis Family Corporation (DFC) undertook a major professionalization process to formalize the family business and ensure its continued success. The members of the second generation have successfully sustained the entrepreneurial spirit of their family business (albeit in a different style), adding value to the firm in an ‘incremental’ manner. Throughout the chapter there will be a strong emphasis on the family element of DFC and the roles that each family member has played. Bert Dennis, as the founder and incumbent leader of the firm, has witnessed major changes to the business he built from the ground up. His children, in particular his son Grant Dennis as the primary next generation issue champion, have seen the changes from another perspective – ensuring the business remains within the family into the second generation and beyond. The professionalization process was sparked by a commitment from the second generation to continue to ‘make a real go’ of the family business rather than simply liquidating and distributing the assets. The dedication of all the family members to this objective has ensured the success of this process, and ultimately, the longevity of the firm. Although DFC has become more ‘professional’, it has not lost its entrepreneurial character; rather, it has improved the ways in which entrepreneurialism is fostered and pursued in the company. In essence, this case outlines how the implementation of appropriate governance and management practices has allowed the Dennis family to overcome the challenges and maximize the opportunities associated with owning and operating a multigenerational family fi rm. From a theoretical perspective, this case uses the concepts of entrepreneurial orientation (EO) (Lumpkin and Dess 1996) and the resource- based view (RBV) (Habbershon and Williams 1999; Barney 1991; Wernerfelt 1984) to demonstrate how the fi rm has leveraged its familiness to foster an enduring spirit of entrepreneurship and to maintain a sustained competitive advantage.
Resumo:
Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.
Resumo:
Purpose: To assess the effects of pre-cooling volume on neuromuscular function and performance in free-paced intermittent-sprint exercise in the heat. Methods: Ten male, teamsport athletes completed four randomized trials involving an 85-min free-paced intermittentsprint exercise protocol in 33°C±33% relative humidity. Pre-cooling sessions included whole body (WB), head+hand (HH), head (H) and no cooling (CONT), applied for 20-min pre-exercise and 5-min mid exercise. Maximal voluntary contractions (MVC) were assessed pre- and postintervention and mid- and post-exercise. Exercise performance was assessed with sprint times, % decline and distances covered during free-paced bouts. Measures of core(Tc) and skin (Tsk) temperatures, heart rate, perceptual exertion and thermal stress were monitored throughout. Venous and capillary blood was analyzed for metabolite, muscle damage and inflammatory markers. Results: WB pre-cooling facilitated the maintenance of sprint times during the exercise protocol with reduced % decline (P=0.04). Mean and total hard running distances increased with pre cooling 12% compared to CONT (P<0.05), specifically, WB was 6-7% greater than HH (P=0.02) and H (P=0.001) respectively. No change was evident in mean voluntary or evoked force pre- to post-exercise with WB and HH cooling (P>0.05). WB and HH cooling reduced Tc by 0.1-0.3°C compared to other conditions (P<0.05). WB Tsk was suppressed for the entire session(P=0.001). HR responses following WB cooling were reduced(P=0.05; d=1.07) compared to CONT conditions during exercise. Conclusion: A relationship between pre-cooling volume and exercise performance seems apparent, as larger surface area coverage augmented subsequent free-paced exercise capacity, in conjunction with greater suppression of physiological load. Maintenance of MVC with pre-cooling, despite increased work output suggests the role of centrally-mediated mechanisms in exercise pacing regulation and subsequent performance.
Resumo:
In this paper, we review the sequential slotted amplify-decode-and-forward (SADF) protocol with half-duplex single-antenna and evaluate its performance in terms of pairwise error probability (PEP). We obtain the PEP upper bound of the protocol and find out that the achievable diversity order of the protocol is two with arbitrary number of relay terminals. To achieve the maximum achievable diversity order, we propose a simple precoder that is easy to implement with any number of relay terminals and transmission slots. Simulation results show that the proposed precoder achieves the maximum achievable diversity order and has similar BER performance compared to some of the existing precoders.
Resumo:
We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.
Resumo:
This paper is part of a larger project described at http://www.law.uq.edu.au/australian-feminist-judgments-project as follows: This project draws its inspiration from two significant recent developments in law and feminist scholarship. The first has been the emergence in Canada and the UK of feminist judgment-writing projects, in which feminist academics, lawyers and activists have written alternative judgments in a series of legal cases, imagining the different decision that might have been made by a feminist judge hearing the case. The second has been the incremental shift in recent years in the number of women judges and Magistrates presiding in courts and tribunals throughout Australia. As part of this project, a group of scholars will write alternative feminist judgments. This paper is one of the alternative feminist judgements. The case used for this discussion is Lodge v Federal Commissioner of Tax [1972] HCA 49. In that case, a woman, earning income by way of commission in her occupation as a law costs clerk, which she carried out at her home, claimed to deduct from her assessable income child care fees that enabled her to devote time and attention to her work. The High Court held that no right to a deduction had arisen. It found that, although the purpose of the expenditure was for gaining assessable income, it did not take place in, or in the course of, preparing bills of cost. Further, the expenditure was of a ‘private or domestic’ nature. This seminal taxation decision, which prevents deductions for childcare, has broad financial ramifications for workers in the home and those with childcare responsibilities. It designates childcare duties as ‘private’, notwithstanding the need for these in order, particularly for women, to work in the public sphere.
Resumo:
Objective To determine the burden of hospitalised, radiologically confirmed pneumonia (World Health Organization protocol) in Northern Territory Indigenous children. Design, setting and participants Historical, observational study of all hospital admissions for any diagnosis of NT resident Indigenous children, aged between >= 29 days and < 5 years, 1 April 1997 to 31 March 2005. Intervention All chest radiographs taken during these admissions, regardless of diagnosis, were assessed for pneumonia in accordance with the WHO protocol. Main outcome measure The primary outcome was endpoint consolidation (dense fluffy consolidation [alveolar infiltrate] of a portion of a lobe or the entire lung) present on a chest radiograph within 3 days of hospitalisation. Results We analysed data on 24 115 hospitalised episodes of care for 9492 children and 13 683 chest radiographs. The average annual cumulative incidence of endpoint consolidation was 26.6 per 1000 population per year (95% Cl, 25.3-27.9); 57.5 per 1000 per year in infants aged 1-11 months, 38.3 per 1000 per year in those aged 12-23 months, and 13.3 per 1000 per year in those aged 24-59 months. In all age groups, rates of endpoint consolidation in children in the arid southern region of NT were about twice that of children in the tropical northern region. Conclusion The rates of severe pneumonia in hospitalised NT Indigenous children are among the highest reported in the world. Reducing this unacceptable burden of disease should be a national health priority.
Resumo:
This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.
Resumo:
Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.