990 resultados para Efficient elliptic curve arithmetic
Resumo:
Australia’s current pattern of residential development is resulting in urban sprawl and highlights the necessity for development to be more sustainable to avoid unnecessary demand on natural resources and to prevent environmental degradation and to safeguard the environment for future generations. This report summarises the results from a series of cases studies that examined the link between sub-divisional layout and dwelling energy efficiency, the possibility for a lot-rating tool and the potential for on site electricity generation.
Resumo:
Worldwide, the current pattern of urban development is unsustainable and metropolitan planning and development strategies deliver poor environmental outcomes in relation to energy production. As a result, an increasing number of governments and private sector development companies are initiating projects that aim to deliver enhanced environmental outcomes rather than a ‘business as usual’ approach. This paper will summarise the findings from a study that explored the link between building orientation and energy efficiencies in sub-tropical and tropical climates. The study used a new thermal modelling software tool developed by CSIRO that responds more accurately to residential heating and cooling energy performance in those climate zones. This software tool responds to industry criticisms regarding cold climate modelling systems that do not make sufficient allowance for natural ventilation. The study examined a range of low, medium and high-density dwelling types and investigated the impact of orientation, insulation, ventilation and shading devices on energy efficiencies. This paper will examine the findings from the medium and high-density case study developments as these are relevant to residential developments in many South East Asian countries, such as Singapore, Hong Kong and Malaysia. Finally, the paper will explore the potential benefits that medium and high-density residential developments have in the development of ‘solar cities’ and ‘solar suburbs’.
Resumo:
This report summarises the findings from the Sustainable Subdivisions: Energy-Efficient Design project. As new energy-efficiency regulations are developed, there will be a significant demand for information on available assessment tools for rating energy-efficient dwellings, and subdivisional issues such as orientation and solar access will become increasingly important. There will also be increased pressure for products that deliver energy efficiency, such as solar technology, glazing systems, insulation and low-energy building products and materials. The objectives of the Sustainable Subdivisions: Energy-Efficient Design project were to:
Resumo:
This paper presents an Active Gate Signaling scheme to reduce voltage/current spikes across insulated gate power switches in hard switching power electronic circuits. Voltage and/or current spikes may cause EMI noise. In addition, they increase voltage/current stress on the switch. Traditionally, a higher gate resistance is chosen to reduce voltage/current spikes. Since the switching loss will increase remarkably, an active gate voltage control scheme is developed to improve efficiency of hard switching circuits while the undesirable voltage and/or current spikes are minimized.
Resumo:
Oberon-2 is an object-oriented language with a class structure based on type extension. The runtime structure of Oberon-2 is described and the low-level mechanism for dynamic type checking explained. It is shown that the superior type-safety of the language, when used for programming styles based on heterogeneous, pointer-linked data structures, has an entirely negligible cost in runtime performance.
Resumo:
Classical negotiation models are weak in supporting real-world business negotiations because these models often assume that the preference information of each negotiator is made public. Although parametric learning methods have been proposed for acquiring the preference information of negotiation opponents, these methods suffer from the strong assumptions about the specific utility function and negotiation mechanism employed by the opponents. Consequently, it is difficult to apply these learning methods to the heterogeneous negotiation agents participating in e‑marketplaces. This paper illustrates the design, development, and evaluation of a nonparametric negotiation knowledge discovery method which is underpinned by the well-known Bayesian learning paradigm. According to our empirical testing, the novel knowledge discovery method can speed up the negotiation processes while maintaining negotiation effectiveness. To the best of our knowledge, this is the first nonparametric negotiation knowledge discovery method developed and evaluated in the context of multi-issue bargaining over e‑marketplaces.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
This paper proposes a novel Hybrid Clustering approach for XML documents (HCX) that first determines the structural similarity in the form of frequent subtrees and then uses these frequent subtrees to represent the constrained content of the XML documents in order to determine the content similarity. The empirical analysis reveals that the proposed method is scalable and accurate.