859 resultados para related-key differential
Resumo:
The major purpose of Vehicular Ad Hoc Networks (VANETs) is to provide safety-related message access for motorists to react or make a life-critical decision for road safety enhancement. Accessing safety-related information through the use of VANET communications, therefore, must be protected, as motorists may make critical decisions in response to emergency situations in VANETs. If introducing security services into VANETs causes considerable transmission latency or processing delays, this would defeat the purpose of using VANETs to improve road safety. Current research in secure messaging for VANETs appears to focus on employing certificate-based Public Key Cryptosystem (PKC) to support security. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This paper proposes an efficient public key management system for VANETs: the Public Key Registry (PKR) system. Not only does this paper demonstrate that the proposed PKR system can maintain security, but it also asserts that it can improve overall performance and scalability at a lower cost, compared to the certificate-based PKC scheme. It is believed that the proposed PKR system will create a new dimension to the key management and verification services for VANETs.
Resumo:
Driving is a vigilance task, requiring sustained attention to maintain performance and avoid crashes. Hypovigilance (i.e., marked reduction in vigilance) while driving manifests as poor driving performance and is commonly attributed to fatigue (Dinges, 1995). However, poor driving performance has been found to be more frequent when driving in monotonous road environments, suggesting that monotony plays a role in generating hypovigilance (Thiffault & Bergeron, 2003b). Research to date has tended to conceptualise monotony as a uni-dimensional task characteristic, typically used over a prolonged period of time to facilitate other factors under investigation, most notably fatigue. However, more often than not, more than one exogenous factor relating to the task or operating environment is manipulated to vary or generate monotony (Mascord & Heath, 1992). Here we aimed to explore whether monotony is a multi-dimensional construct that is determined by characteristics of both the task proper and the task environment. The general assumption that monotony is a task characteristic used solely to elicit hypovigilance or poor performance related to fatigue appears to have led to there being little rigorous investigation into the exact nature of the relationship. While the two concepts are undoubtedly linked, the independent effect of monotony on hypovigilance remains largely ignored. Notwithstanding, there is evidence that monotony effects can emerge very early in vigilance tasks and are not necessarily accompanied by fatigue (see Meuter, Rakotonirainy, Johns, & Wagner, 2005). This phenomenon raises a largely untested, empirical question explored in two studies: Can hypovigilance emerge as a consequence of task and/or environmental monotony, independent of time on task and fatigue? In Study 1, using a short computerised vigilance task requiring responses to be withheld to infrequent targets, we explored the differential impacts of stimuli and task demand manipulations on the development of a monotonous context and the associated effects on vigilance performance (as indexed by respone errors and response times), independent of fatigue and time on task. The role of individual differences (sensation seeking, extroversion and cognitive failures) in moderating monotony effects was also considered. The results indicate that monotony affects sustained attention, with hypovigilance and associated performance worse in monotonous than in non-monotonous contexts. Critically, performance decrements emerged early in the task (within 4.3 minutes) and remained consistent over the course of the experiment (21.5 minutes), suggesting that monotony effects can operate independent of time on task and fatigue. A combination of low task demands and low stimulus variability form a monotonous context characterised by hypovigilance and poor task performance. Variations to task demand and stimulus variability were also found to independently affect performance, suggesting that monotony is a multi-dimensional construct relating to both task monotony (associated with the task itself) and environmental monotony (related to characteristics of the stimulus). Consequently, it can be concluded that monotony is multi-dimensional and is characterised by low variability in stimuli and/or task demands. The proposition that individual differences emerge under conditions of varying monotony with high sensation seekers and/or extroverts performing worse in monotonous contexts was only partially supported. Using a driving simulator, the findings of Study 1 were extended to a driving context to identify the behavioural and psychophysiological indices of monotony-related hypovigilance associated with variations to road design and road side scenery (Study 2). Supporting the proposition that monotony is a multi-dimensional construct, road design variability emerged as a key moderating characteristic of environmental monotony, resulting in poor driving performance indexed by decrements in steering wheel measures (mean lateral position). Sensation seeking also emerged as a moderating factor, where participants high in sensation seeking tendencies displayed worse driving behaviour in monotonous conditions. Importantly, impaired driving performance was observed within 8 minutes of commencing the driving task characterised by environmental monotony (low variability in road design) and was not accompanied by a decline in psychophysiological arousal. In addition, no subjective declines in alertness were reported. With fatigue effects associated with prolonged driving (van der Hulst, Meijman, & Rothengatter, 2001) and indexed by drowsiness, this pattern of results indicates that monotony can affect driver vigilance, independent of time on task and fatigue. Perceptual load theory (Lavie, 1995, 2005) and mindlessness theory (Robertson, Manly, Andrade, Baddley, & Yiend, 1997) provide useful theoretical frameworks for explaining and predicting monotony effects by positing that the low load (of task and/or stimuli) associated with a monotonous task results in spare attentional capacity which spills over involuntarily, resulting in the processing of task-irrelevant stimuli or task unrelated thoughts. That is, individuals – even when not fatigued - become easily distracted when performing a highly monotonous task, resulting in hypovigilance and impaired performance. The implications for road safety, including the likely effectiveness of fatigue countermeasures to mitigate monotony-related driver hypovigilance are discussed.
Resumo:
The primary goal of the Vehicular Ad Hoc Network (VANET) is to provide real-time safety-related messages to motorists to enhance road safety. Accessing and disseminating safety-related information through the use of wireless communications technology in VANETs should be secured, as motorists may make critical decisions in dealing with an emergency situation based on the received information. If security concerns are not addressed in developing VANET systems, an adversary can tamper with, or suppress, the unprotected message to mislead motorists to cause traffic accidents and hazards. Current research on secure messaging in VANETs focuses on employing the certificate-based Public Key Infrastructure (PKI) scheme to support message encryption and digital signing. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This thesis has proposed a novel public key verification and management approach for VANETs; namely, the Public Key Registry (PKR) regime. Compared to the VANET PKI scheme, this new approach can satisfy necessary security requirements with improved performance and scalability, and at a lower cost by reducing the security overheads of message transmission and eliminating digital certificate deployment and maintenance issues. The proposed PKR regime consists of the required infrastructure components, rules for public key management and verification, and a set of interactions and associated behaviours to meet these rule requirements. This is achieved through a system design as a logic process model with functional specifications. The PKR regime can be used as development guidelines for conforming implementations. An analysis and evaluation of the proposed PKR regime includes security features assessment, analysis of the security overhead of message transmission, transmission latency, processing latency, and scalability of the proposed PKR regime. Compared to certificate-based PKI approaches, the proposed PKR regime can maintain the necessary security requirements, significantly reduce the security overhead by approximately 70%, and improve the performance by 98%. Meanwhile, the result of the scalability evaluation shows that the latency of employing the proposed PKR regime stays much lower at approximately 15 milliseconds, whether operating in a huge or small environment. It is therefore believed that this research will create a new dimension to the provision of secure messaging services in VANETs.
Resumo:
Boundary spanning links organisations to one another in order to create mutually beneficial relationships; it is a concept developed and used in organisational theory but rarely used to understand organisational structures in higher education (Pruitt & Schwartz, 1999). Yet understanding boundary spanning activity has the capacity to help universities respond to demands for continuous quality improvement, and to increase capacity to react to environmental uncertainty. At a time of rapid change characterised by a fluctuating economic environment, globalisation, increased mobility, and ecological issues, boundary spanning could be viewed as a key element in assisting institutions in effectively understanding and responding to such change. The literature suggests that effective boundary spanning could help universities improve organisational performance, use of infrastructure and resources, intergroup relations, leadership styles, performance and levels of job satisfaction, technology transfer, knowledge creation, and feedback processes, amongst other things. Our research aims to put a face on boundary spanning (Miller, 2008) by contextualising it within organisational systems and structures in university departments responsible for work related programs i.e. Work Integrated Learning (WIL) and Co-operative Education (Co-op). In this paper these approaches are referred to collectively as work related programs. The authors formed a research team in Victoria, British Columbia in 2009 at a sponsored international research forum, Two Days in June. The purpose of the invitation-only forum was to investigate commonalities and differences across programs and to formulate an international research agenda for work related programs over the next five to ten years. Researchers from Queensland University of Technology, University of Cincinnati, Baden-Wuerttemberg Cooperative State University, University of Ottawa,and Dublin City University agreed that further research was needed into the impact stakeholders, organisational systems, structures, policies, and practices have on departments delivering work related programs. This paper illustrates how policy and practice across the five institutions can be better understood through the lens of boundary spanning. It is argued that boundary spanning is an area of theory and practice with great applicability to a better understanding of the activity of these departments. The paper concludes by proposing topics for future research to examine how boundary spanning can be used to better understand practice and change in work related programs.
Resumo:
This paper focuses on information sharing with key suppliers and seeks to explore the factors that might influence its extent and depth. We also investigate how information sharing affects a company’s performance with regards to resource usage, output, and flexibility. Drawing from transaction cost- and contingency theories, several factors, namely environmental uncertainty, demand uncertainty, dependency and, the product life cycle stage are proposed to explain the level of information shared with key suppliers. We develop a model where information sharing mediates the (contingent) factors and company performance. A mail survey was used to collect data from Finnish and Swedish companies. Partial Least Squares analysis was separately performed for each country (n=119, n=102). There was consistent evidence that environmental uncertainty, demand uncertainty and supplier/buyer dependency had explanatory power, whereas no significance was found for the product life cycle stage. The results also confirm previous studies by providing support for a positive relationship between information sharing and performance, where output performance was found to be the most strongly related
Resumo:
This paper focuses on information sharing with key suppliers and seeks to explore the factors that might influence its extent and depth. We also investigate how information sharing affects a company’s performance with regards to resource usage, output, and flexibility. Drawing from transaction cost- and contingency theories, several factors, namely environmental uncertainty, demand uncertainty, dependency and, the product life cycle stage are proposed to explain the level of information shared with key suppliers. We develop a model where information sharing mediates the (contingent) factors and company performance. A mail survey was used to collect data from Finnish and Swedish companies. Partial Least Squares analysis was separately performed for each country (n=119, n=102). There was consistent evidence that environmental uncertainty, demand uncertainty and supplier/buyer dependency had explanatory power, whereas no significance was found for the relationship between product life cycle stage and information sharing. The results also confirm previous studies by providing support for a positive relationship between information sharing and performance, where output performance was found to be the most strongly related.
Resumo:
Significant research has demonstrated direct and indirect associations between substance use and sexual behaviour. Substance use is related to sexual risk-taking and HIV seroconversion among some substance-using MSM. It remains unclear what factors mediate or underlie this relationship, and which substances are associated with greater harm. Substance-related expectancies are hypothesised as potential mechanisms. A conceptual model based on social-cognitive theory was tested, which explores the role of demographic factors, substance use, substance-related expectancies and novelty-seeking personality characteristics in predicting unprotected anal intercourse (UAI) while under the influence, across four commonly used substance types. Phase 1, a qualitative study (N = 20), explored how MSM perceive the effects of substance use on their thoughts, feelings and behaviours, including sexual behaviours. Information was attained through discussion and interviews, resulting in the establishment of key themes. Results indicated MSM experience a wide range of reinforcing aspects associated with substance use. General and specific effects were evident across substance types, and were associated with sexual behaviour and sexual risk-taking. Phase 2 consisted of developing a comprehensive profile of substance-related expectancies for MSM (SEP-MSM) regarding alcohol, cannabis, amyl nitrite and stimulants that possessed sound psychometric properties and was appropriate for use among this group. A cross-sectional questionnaire with 249 participants recruited through gay community networks was used to validate these measures, and involved online data collection, participants rating expectancy items and subsequent factor analysis. Results indicated expectancies can be reliably assessed, and predicted substance use patterns. Phase 3 examined demographic factors, substance use, substance-related expectancies, and novelty-seeking traits among another community sample of MSM (N = 277) throughout Australia, in predicting UAI while under the influence. Using a cross-sectional design, participants were recruited through gay community networks and completed online questionnaires. The SEP-MSM, and associated substance use, predicted UAI. This research extends social-cognitive theory regarding sexual behaviour, and advances understanding of the role of expectancies associated with substance use and sexual risk-taking. Future applications of the SEP-MSM in health promotion, prevention, clinical interventions and research are likely to contribute to reducing harm associated with substance-using MSM (e.g., HIV transmission).
Resumo:
Purpose – Interactive information retrieval (IR) involves many human cognitive shifts at different information behaviour levels. Cognitive science defines a cognitive shift or shift in cognitive focus as triggered by the brain's response and change due to some external force. This paper aims to provide an explication of the concept of “cognitive shift” and then report results from a study replicating Spink's study of cognitive shifts during interactive IR. This work aims to generate promising insights into aspects of cognitive shifts during interactive IR and a new IR evaluation measure – information problem shift. Design/methodology/approach – The study participants (n=9) conducted an online search on an in-depth personal medical information problem. Data analysed included the pre- and post-search questionnaires completed by each study participant. Implications for web services and further research are discussed. Findings – Key findings replicated the results in Spink's study, including: all study participants reported some level of cognitive shift in their information problem, information seeking and personal knowledge due to their search interaction; and different study participants reported different levels of cognitive shift. Some study participants reported major cognitive shifts in various user-based variables such as information problem or information-seeking stage. Unlike Spink's study, no participant experienced a negative shift in their information problem stage or level of information problem understanding. Originality/value – This study builds on the previous study by Spink using a different dataset. The paper provides valuable insights for further research into cognitive shifts during interactive IR.
Resumo:
Adopting a model of job enrichment we report on a longitudinal case investigating the perceived impact of an Enterprise Resource Planning (ERP) system on user job design characteristics. Our results indicated that in the context of an ERP geared towards centralisation and standardisation the extent to which users perceived an increase or decrease in job enrichment was associated with aspects such as formal authority and the nature of their work role. Experienced operational employees proficient in the original legacy system perceived ERP system protocols to constrain their actions, limit training and increase dependence on others in the workflow. Conversely, managerial users reported a number of benefits relating to report availability, improved organisational transparency and increased overall job enrichment. These results supported our argument concerning the relationship between ERPs with a standardisation intent and positive job enrichment outcomes for managerial users and negative job-related outcomes for operational users.
Resumo:
Among the Australian general public, there are increasing concerns about environmental issues. Accordingly, sustainability in the housing industry is also becoming a priority on the development agenda. However, putting the principles of ecological sustainability into practice within social and economic development requires intensive involvement of major stakeholders such as governments, developers, builders, consumers and a range of other professionals. Establishing a sustainable value entails asymmetric life-cycle returns, making it important for major stakeholders to appreciate the benefits of this new agenda not only for the individual businesses but also for other supply chain partners. This context warrants the study to promote collective benefits for key stakeholders by establishing a mutual-benefit framework for sustainable housing implementation. A research was carried out in the hope to establish a mutual-benefit framework by investigating challenges of achieving benefits (CABs) from sustainable housing development in a multi-stakeholder context. In the research work reported in this article, a comparative questionnaire study was first conducted among seven stakeholder groups in the Australian housing industry, to examine the importance and inter-relationships of CABs. In-depth interviews then furthered the survey findings with a focus on stakeholder diversity. The synthesized findings of the survey and interview study lead to the identification of 12 critical mutual-benefit factors and their mutual influence. Based on such a platform, a systematic framework is developed with the aid of Interpretive Structural Modelling (ISM), to identify the patterns of stakeholder benefit materialisation, suggest the priority of critical factors and provide related stakeholder-specific action guide for sustainable housing implementation.
Resumo:
In this Issues Paper, I raise some key points relevant for any government which is considering its child protection and family welfare policy. In particular, I will raise questions about whether a form of legislative reporting duty is required, and if so, what consequences this has for child protection. The context of child maltreatment - and each form of maltreatment: physical abuse, sexual abuse, psychological or emotional abuse, and neglect - is extremely complex, and the overarching question of how to deal with these phenomena involve challenging normative, economic and practical questions. There are no easy or perfect solutions. Nor, often, is there the amount and quality of evidence available on which public policy approaches should be devised. However, from the best evidence about the history of this context, from research conducted in this field, and from the best evidence available about the nature, incidence and effects of different subtypes of maltreatment, some observations can be made which may help to inform deliberations. I outline 10 key issues related to mandatory reporting legislation while being mindful of the New Zealand context. My view, based on both research evidence and a concern to protect and promote children’s interests, and society’s interests, is that reporting laws in some form are necessary and can contribute substantially to child protection and enhancing family and community health and wellbeing. However, they are only one necessary part of a sound child protection system, being a method of tertiary and secondary prevention, and primary prevention efforts must also be prioritised. Moreover, it is essential that if a legislative reporting duty is enacted, it must be designed carefully and implemented soundly, and it must be integrated within a properly resourced child protection and family welfare system.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Stimulation of the androgen receptor via bioavailable androgens, including testosterone and testosterone metabolites, is a key driver of prostate development and the early stages of prostate cancer. Androgens are hydrophobic and as such require carrier proteins, including sex hormone-binding globulin (SHBG), to enable efficient distribution from sites of biosynthesis to target tissues. The similarly hydrophobic corticosteroids also require a carrier protein whose affinity for steroid is modulated by proteolysis. However, proteolytic mechanisms regulating the SHBG/androgen complex have not been reported. Here, we show that the cancer-associated serine proteases, kallikrein-related peptidase (KLK)4 and KLK14, bind strongly to SHBG in glutathione S-transferase interaction analyses. Further, we demonstrate that active KLK4 and KLK14 cleave human SHBG at unique sites and in an androgen-dependent manner. KLK4 separated androgen-free SHBG into its two laminin G-like (LG) domains that were subsequently proteolytically stable even after prolonged digestion, whereas a catalytically equivalent amount of KLK14 reduced SHBG to small peptide fragments over the same period. Conversely, proteolysis of 5α-dihydrotestosterone (DHT)-bound SHBG was similar for both KLKs and left the steroid binding LG4 domain intact. Characterization of this proteolysis fragment by [(3)H]-labeled DHT binding assays revealed that it retained identical affinity for androgen compared with full-length SHBG (dissociation constant = 1.92 nM). Consistent with this, both full-length SHBG and SHBG-LG4 significantly increased DHT-mediated transcriptional activity of the androgen receptor compared with DHT delivered without carrier protein. Collectively, these data provide the first evidence that SHBG is a target for proteolysis and demonstrate that a stable fragment derived from proteolysis of steroid-bound SHBG retains binding function in vitro.
Resumo:
High tumor kallikrein-related-peptidase 4 (KLK4) levels are associated with a poor outcome for women with serous epithelial ovarian cancer (EOC), for which peritoneal dissemination and chemoresistance are key events. To determine the role of KLK4 in these events, we examined KLK4-transfected SKOV-3 and endogenous KLK4 expressing OVCA432 cells in 3-dimensional (3D) suspension culture to mimic the ascites microenvironment. KLK4-SKOV-3 cells formed multicellular aggregates (MCAs) as seen in ascites, as did SKOV-3 cells treated with active KLK4. MCA formation was reduced by treatment with a KLK4 blocking antibody or the selective active site KLK4 sunflower trypsin inhibitor (SFTI-FCQR). KLK4-MCAs formed larger cancer cell foci in mesothelial cell monolayers than those formed by vector and native SKOV-3 cells, suggesting KLK4-MCAs are highly invasive in the peritoneal microenvironment. A high level of KLK4 is expressed by ascitic EOC cells compared to matched primary tumor cells, further supporting its role in the ascitic microenvironment. Interestingly, KLK4 transfected SKOV-3 cells expressed high levels of the KLK4 substrate, urokinase plasminogen activator (uPA), particularly in 3D-suspension, and high levels of both KLK4 and uPA were observed in patient cells taken from ascites. Importantly, the KLK4-MCAs were paclitaxel resistant which was reversed by SFTI-FCQR and to a lesser degree by the general serine protease inhibitor, Aprotinin, suggesting that in addition to uPA, other as yet unidentified substrates of KLK4 must be involved. Nonetheless, these data suggest that KLK4 inhibition, in conjunction with paclitaxel, may improve the outcome for women with serous epithelial ovarian cancer and high KLK4 levels in their tumors.
Resumo:
This report presents a snapshot from work which was funded by the Queensland Injury Prevention Council in 2010-11 titled “Feasibility of Using Health Data Sources to Inform Product Safety Surveillance in Queensland children”. The project provided an evaluation of the current available evidence-base for identification and surveillance of product-related injuries in children in Queensland and Australia. A comprehensive 300 page report was produced (available at: http://eprints.qut.edu.au/46518/) and a series of recommendations were made which proposed: improvements in the product safety data system, increased utilisation of health data for proactive and reactive surveillance, enhanced collaboration between the health sector and the product safety sector, and improved ability of health data to meet the needs of product safety surveillance. At the conclusion of the project, a Consumer Product Injury Research Advisory group (CPIRAG) was established as a working party to the Queensland Injury Prevention Council (QIPC), to prioritise and advance these recommendations and to work collaboratively with key stakeholders to promote the role of injury data to support product safety policy decisions at the Queensland and national level. This group continues to meet monthly and is comprised of the organisations represented on the second page of this report. One of the key priorities of the CPIRAG group for 2012 was to produce a snapshot report to highlight problem areas for potential action arising out of the larger report. Subsequent funding to write this snapshot report was provided by the Institute for Health and Biomedical Innovation, Injury Prevention and Rehabilitation Domain at QUT in 2012. This work was undertaken by Dr Kirsten McKenzie and researchers from QUT's Centre for Accident Research and Road Safety - Queensland. This snapshot report provides an evidence base for potential further action on a range of children’s products that are significantly represented in injury data. Further information regarding injury hazards, safety advice and regulatory responses are available on the Office of Fair Trading (OFT) Queensland website and the Product Safety Australia websites. Links to these resources are provided for each product reviewed.