996 resultados para Difference schemes


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anomalous dynamics in complex systems have gained much interest in recent years. In this paper, a two-dimensional anomalous subdiffusion equation (2D-ASDE) is considered. Two numerical methods for solving the 2D-ASDE are presented. Their stability, convergence and solvability are discussed. A new multivariate extrapolation is introduced to improve the accuracy. Finally, numerical examples are given to demonstrate the effectiveness of the schemes and confirm the theoretical analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we consider the variable-order nonlinear fractional diffusion equation View the MathML source where xRα(x,t) is a generalized Riesz fractional derivative of variable order View the MathML source and the nonlinear reaction term f(u,x,t) satisfies the Lipschitz condition |f(u1,x,t)-f(u2,x,t)|less-than-or-equals, slantL|u1-u2|. A new explicit finite-difference approximation is introduced. The convergence and stability of this approximation are proved. Finally, some numerical examples are provided to show that this method is computationally efficient. The proposed method and techniques are applicable to other variable-order nonlinear fractional differential equations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Australia seven schemes (apart from the Superannuation Complaints Tribunal) provide alternative dispute resolution services for complaints brought by consumers against financial services industry members. Recently the Supreme Court of New South Wales held that the decisions of one scheme were amenable to judicial review at the suit of a financial services provider member and the Supreme Court of Victoria has since taken a similar approach. This article examines the juristic basis for such a challenge and contends that judicial review is not available, either at common law or under statutory provisions. This is particularly the case since Financial Industry Complaints Service Ltd v Deakin Financial Services Pty Ltd (2006) 157 FCR 229; 60 ACSR 372 decided that the jurisdiction of a scheme is derived from a contract made with its members. The article goes on to contend that the schemes are required to give procedural fairness and that equitable remedies are available if that duty is breached.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes new droop control methods for load sharing in a rural area with distributed generation. Highly resistive lines, typical of rural low voltage networks, always create a big challenge for conventional droop control. To overcome the conflict between higher feedback gain for better power sharing and system stability in angle droop, two control methods have been proposed. The first method considers no communication among the distributed generators (DGs) and regulates the converter output voltage and angle ensuring proper sharing of load in a system having strong coupling between real and reactive power due to high line resistance. The second method, based on a smattering of communication, modifies the reference output volt-age angle of the DGs depending on the active and reactive power flow in the lines connected to point of common coupling (PCC). It is shown that with the second proposed control method, an economical and minimum communication system can achieve significant improvement in load sharing. The difference in error margin between proposed control schemes and a more costly high bandwidth communication system is small and the later may not be justified considering the increase in cost. The proposed control shows stable operation of the system for a range of operating conditions while ensuring satisfactory load sharing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article has been edited from a transcript of the keynote address to the combined ALEA/MTE National Conference, Hobart, Tasmania, August 2001. In this talk Allan reflects on some of the difficulties facing makers of literacy policy in 'New Times'. His reflections are informed by some important research that is having an impact· on literacy teaching in Australia and he raises various issues, ranging from what he sees as a 'dumbing down' of curriculum, to addressing the needs of'at risk' students, to issues of lifelong education in a rapidly changing world.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A television series is tagged with the label "cult" by the media, advertisers, and network executives when it is considered edgy or offbeat, when it appeals to nostalgia, or when it is considered emblematic of a particular subculture. By these criteria, almost any series could be described as cult. Yet certain programs exert an uncanny power over their fans, encouraging them to immerse themselves within a fictional world.In Cult Television leading scholars examine such shows as The X-Files; The Avengers; Doctor Who, Babylon Five; Star Trek; Xena, Warrior Princess; and Buffy the Vampire Slayer to determine the defining characteristics of cult television and map the contours of this phenomenon within the larger scope of popular culture.Contributors: Karen Backstein; David A. Black, Seton Hall U; Mary Hammond, Open U; Nathan Hunt, U of Nottingham; Mark Jancovich; Petra Kuppers, Bryant College; Philippe Le Guern, U of Angers, France; Alan McKee; Toby Miller, New York U; Jeffrey Sconce, Northwestern U; Eva ViethSara Gwenllian-Jones is a lecturer in television and digital media at Cardiff University and co-editor of Intensities: The Journal of Cult Media.Roberta E. Pearson is a reader in media and cultural studies at Cardiff University. She is the author of the forthcoming book Small Screen, Big Universe: Star Trek and Television.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Difference and Dispersion is the fourth in a series of annual research papers produced by doctoral students from The Graduate School of Education, The University of Queensland, following their presentation at the School’s annual Postgraduate Research Conference in Education. The work featured herein celebrates the diversity of cultural and disciplinary backgrounds of education researchers who come from as far afield as Germany, Hong Kong, China, Nigeria, Russia, Singapore, Thailand and of course different parts of Australia. In keeping with a postmodern epistemology, ‘difference’ and ‘dispersion’ are key themes in apprehending the multiplicity of their research topics, methodologies, methods and speaking/writing positions. From widely differing contexts and situations, these writers address the consequences, implications and possibilities for education at the beginning of the third millennium. Their interest ranges from location-specific issues in schools and classrooms, change in learning contexts and processes, educational discourses and relations of power in diverse geographical settings, and the differing articulations of the local and the global in situated policy contexts. Conceived and developed in a spirit of ongoing dialogue with and insight to alternative views and visions of education and society, this edited collection exemplifies the quality in diversity and the high levels of scholarship and supervision at one of Australia’s finest Graduate Schools of Education.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Campylobacter jejuni followed by Campylobacter coli contribute substantially to the economic and public health burden attributed to food-borne infections in Australia. Genotypic characterisation of isolates has provided new insights into the epidemiology and pathogenesis of C. jejuni and C. coli. However, currently available methods are not conducive to large scale epidemiological investigations that are necessary to elucidate the global epidemiology of these common food-borne pathogens. This research aims to develop high resolution C. jejuni and C. coli genotyping schemes that are convenient for high throughput applications. Real-time PCR and High Resolution Melt (HRM) analysis are fundamental to the genotyping schemes developed in this study and enable rapid, cost effective, interrogation of a range of different polymorphic sites within the Campylobacter genome. While the sources and routes of transmission of campylobacters are unclear, handling and consumption of poultry meat is frequently associated with human campylobacteriosis in Australia. Therefore, chicken derived C. jejuni and C. coli isolates were used to develop and verify the methods described in this study. The first aim of this study describes the application of MLST-SNP (Multi Locus Sequence Typing Single Nucleotide Polymorphisms) + binary typing to 87 chicken C. jejuni isolates using real-time PCR analysis. These typing schemes were developed previously by our research group using isolates from campylobacteriosis patients. This present study showed that SNP + binary typing alone or in combination are effective at detecting epidemiological linkage between chicken derived Campylobacter isolates and enable data comparisons with other MLST based investigations. SNP + binary types obtained from chicken isolates in this study were compared with a previously SNP + binary and MLST typed set of human isolates. Common genotypes between the two collections of isolates were identified and ST-524 represented a clone that could be worth monitoring in the chicken meat industry. In contrast, ST-48, mainly associated with bovine hosts, was abundant in the human isolates. This genotype was, however, absent in the chicken isolates, indicating the role of non-poultry sources in causing human Campylobacter infections. This demonstrates the potential application of SNP + binary typing for epidemiological investigations and source tracing. While MLST SNPs and binary genes comprise the more stable backbone of the Campylobacter genome and are indicative of long term epidemiological linkage of the isolates, the development of a High Resolution Melt (HRM) based curve analysis method to interrogate the hypervariable Campylobacter flagellin encoding gene (flaA) is described in Aim 2 of this study. The flaA gene product appears to be an important pathogenicity determinant of campylobacters and is therefore a popular target for genotyping, especially for short term epidemiological studies such as outbreak investigations. HRM curve analysis based flaA interrogation is a single-step closed-tube method that provides portable data that can be easily shared and accessed. Critical to the development of flaA HRM was the use of flaA specific primers that did not amplify the flaB gene. HRM curve analysis flaA interrogation was successful at discriminating the 47 sequence variants identified within the 87 C. jejuni and 15 C. coli isolates and correlated to the epidemiological background of the isolates. In the combinatorial format, the resolving power of flaA was additive to that of SNP + binary typing and CRISPR (Clustered regularly spaced short Palindromic repeats) HRM and fits the PHRANA (Progressive hierarchical resolving assays using nucleic acids) approach for genotyping. The use of statistical methods to analyse the HRM data enhanced sophistication of the method. Therefore, flaA HRM is a rapid and cost effective alternative to gel- or sequence-based flaA typing schemes. Aim 3 of this study describes the development of a novel bioinformatics driven method to interrogate Campylobacter MLST gene fragments using HRM, and is called ‘SNP Nucleated Minim MLST’ or ‘Minim typing’. The method involves HRM interrogation of MLST fragments that encompass highly informative “Nucleating SNPS” to ensure high resolution. Selection of fragments potentially suited to HRM analysis was conducted in silico using i) “Minimum SNPs” and ii) the new ’HRMtype’ software packages. Species specific sets of six “Nucleating SNPs” and six HRM fragments were identified for both C. jejuni and C. coli to ensure high typeability and resolution relevant to the MLST database. ‘Minim typing’ was tested empirically by typing 15 C. jejuni and five C. coli isolates. The association of clonal complexes (CC) to each isolate by ‘Minim typing’ and SNP + binary typing were used to compare the two MLST interrogation schemes. The CCs linked with each C. jejuni isolate were consistent for both methods. Thus, ‘Minim typing’ is an efficient and cost effective method to interrogate MLST genes. However, it is not expected to be independent, or meet the resolution of, sequence based MLST gene interrogation. ‘Minim typing’ in combination with flaA HRM is envisaged to comprise a highly resolving combinatorial typing scheme developed around the HRM platform and is amenable to automation and multiplexing. The genotyping techniques described in this thesis involve the combinatorial interrogation of differentially evolving genetic markers on the unified real-time PCR and HRM platform. They provide high resolution and are simple, cost effective and ideally suited to rapid and high throughput genotyping for these common food-borne pathogens.