904 resultados para shifted keystream
Resumo:
Driver distraction has recently been defined by Regan as "the diversion of attention away from activities critical for safe driving toward a competing activity, which may result in insufficient or no attention to activities critical for safe driving (Regan, Hallett & Gordon, 2011, p.1780)". One source of distraction is in-vehicle devices, even though they might provide other benefits, e.g. navigation systems. Currently, eco-driving systems have been growing rapidly in popularity. These systems send messages to drivers so that driving performance can be improved in terms of fuel efficiency. However, there remain unanswered questions about whether eco-driving systems endanger drivers by distracting them. In this research, the CARRS-Q advanced driving simulator was used in order to provide safety for participants and meanwhile simulate real world driving. The distraction effects of tasks involving three different in-vehicle systems were investigated: changing a CD, entering a five digit number as a part of navigation task and responding to an eco-driving task. Driving in these scenarios was compared with driving in the absence of these distractions, and while drivers engaged in critical manoeuvres. In order to account for practice effects, the same scenarios were duplicated on a second day. The three in-vehicle systems were not the exact facsimiles of any particular existing system, but were designed to have similar characteristics to those of system available. In general, the results show that drivers’ mental workloads are significantly higher in navigation and CD changing scenarios in comparison to the two other scenarios, which implies that these two tasks impose more visual/manual and cognitive demands. However, eco-driving mental workload is still high enough to be called marginally significant (p ~ .05) across manoeuvres. Similarly, event detection tasks show that drivers miss significantly more events in the navigation and CD changing scenarios in comparison to both the baseline and eco-driving scenario across manoeuvres. Analysis of the practice effect shows that drivers’ baseline scenario and navigation scenario exhibit significantly less demand on the second day. However, the number of missed events across manoeuvres confirmed that drivers can detect significantly more events on the second day for all scenarios. Distraction was also examined separately for five groups of manoeuvres (straight, lane changing, overtaking, braking for intersections and braking for roundabouts), in two locations for each condition. Repeated measures mixed ANOVA results show that reading an eco-driving message can potentially impair driving performance. When comparing the three in–vehicle distractions tested, attending to an eco-driving message is similar in effect to the CD changing task. The navigation task degraded driver performance much more than these other sources of distraction. In lane changing manoeuvres, drivers’ missed response counts degraded when they engaged in reading eco-driving messages at the first location. However, drivers’ event detection abilities deteriorated less at the second lane changing location. In baseline manoeuvres (driving straight), participants’ mean minimum speed degraded more in the CD changing scenario. Drivers’ lateral position shifted more in both CD changing and navigation tasks in comparison with both eco-driving and baseline scenarios, so they were more visually distracting. Participants were better at event detection in baseline manoeuvres in comparison with other manoeuvres. When approaching an intersection, the navigation task caused more events to be missed by participants, whereas eco-driving messages seemed to make drivers less distracted. The eco-driving message scenario was significantly less distracting than the navigation system scenario (fewer missed responses) when participants commenced braking for roundabouts. To sum up, in spite of the finding that two other in-vehicle tasks are more distracting than the eco-driving task, the results indicate that even reading a simple message while driving could potentially lead to missing an important event, especially when executing critical manoeuvres. This suggests that in-vehicle eco-driving systems have the potential to contribute to increased crash risk through distraction. However, there is some evidence of a practice effect which suggests that future research should focus on performance with habitual rather than novel tasks. It is recommended that eco-driving messages be delivered to drivers off-line when possible.
Online environmental citizenship : blogs, green marketing and consumer sentiment in the 21st Century
Resumo:
Over the last three decades, the rise in consumer generated content has enabled more environmentally conscious points of view to effect mainstream opinion (Kalafatis, Pollard, East & Tsogas, 1999; Barber, Taylor & Strick, 2009). Consequently, more people are buying into environmentalist ideology and organizing themselves to influence social change. Focus has shifted from attracting public awareness to concern for green ideas, discourse, and environmental citizenship, the latter becoming the guideline by which debates on such topics are regulated (Follows & Jobber, 2000; Dobson, 2003).
Resumo:
Fractional mathematical models represent a new approach to modelling complex spatial problems in which there is heterogeneity at many spatial and temporal scales. In this paper, a two-dimensional fractional Fitzhugh-Nagumo-monodomain model with zero Dirichlet boundary conditions is considered. The model consists of a coupled space fractional diffusion equation (SFDE) and an ordinary differential equation. For the SFDE, we first consider the numerical solution of the Riesz fractional nonlinear reaction-diffusion model and compare it to the solution of a fractional in space nonlinear reaction-diffusion model. We present two novel numerical methods for the two-dimensional fractional Fitzhugh-Nagumo-monodomain model using the shifted Grunwald-Letnikov method and the matrix transform method, respectively. Finally, some numerical examples are given to exhibit the consistency of our computational solution methodologies. The numerical results demonstrate the effectiveness of the methods.
Resumo:
Transport processes within heterogeneous media may exhibit non-classical diffusion or dispersion; that is, not adequately described by the classical theory of Brownian motion and Fick's law. We consider a space fractional advection-dispersion equation based on a fractional Fick's law. The equation involves the Riemann-Liouville fractional derivative which arises from assuming that particles may make large jumps. Finite difference methods for solving this equation have been proposed by Meerschaert and Tadjeran. In the variable coefficient case, the product rule is first applied, and then the Riemann-Liouville fractional derivatives are discretised using standard and shifted Grunwald formulas, depending on the fractional order. In this work, we consider a finite volume method that deals directly with the equation in conservative form. Fractionally-shifted Grunwald formulas are used to discretise the fractional derivatives at control volume faces. We compare the two methods for several case studies from the literature, highlighting the convenience of the finite volume approach.
Resumo:
Meanings and descriptions of menopause have shifted focus over the past century and a half; more particularly the past sixty years has seen a shift from descriptions of hormone decline and its relation to ageing, femininity and symptoms of menopause since the 1960's to the possibility for preventive medicine afforded by menopause. Medicine is not a static field in its construction of menopause. It has changed, not least by its engagement (positively or negatively) with critique from both within (epidemiological) and without (feminist and social sciences). In this review we identify three recent changes: (1) Increasing concern with women's decision-making. (2) The emergence from within medicine of the rejection of the use of language which defines menopause as a condition of deficiency. (3) New insights from postmodern and poststructural analyses of menopause that examine the epistemological foundations of medical and feminist concepts of menopause and contest fixed descriptions of the experience of menopause. Key aspects of a ‘medical menopause’ nevertheless remain constant: menopause is a loss of hormones that results in predictable effects and risks and may be ameliorated by hormone replacement therapy. A question therefore emerges about how and to what effect medical practitioners have engaged with critiques of the medical menopause?
Resumo:
Objectives: To investigate the frequency characteristics of the ground reaction force (GRF) recorded throughout the eccentric Achilles tendon rehabilitation programme described by Alfredson. Design: Controlled laboratory study, longitudinal. Methods: Nine healthy adult males performed six sets (15 repetitions per set) of eccentric ankle exercise. Ground reaction force was recorded throughout the exercise protocol. For each exercise repetition the frequency power spectrum of the resultant ground reaction force was calculated and normalised to total power. The magnitude of peak relative power within the 8-12 Hz bandwidth and the frequency at which this peak occurred was determined. Results: The magnitude of peak relative power within the 8-12 Hz bandwidth increased with each successive exercise set and following the 4th set (60 repetitions) of exercise the frequency at which peak relative power occurred shifted from 9 to 10 Hz. Conclusions: The increase in magnitude and frequency of ground reaction force vibrations with an increasing number of exercise repetitions is likely connected to changes in muscle activation with fatigue and tendon conditioning. This research illustrates the potential for the number of exercise repetitions performed to influence the tendons' mechanical environment, with implications for tendon remodelling and the clinical efficacy of eccentric rehabilitation programmes for Achilles tendinopathy.
Resumo:
Introduction: Eccentric exercise (EE) is a commonly used treatment for Achilles tendinopathy. While vibrations in the 8–12 Hz frequency range generated during eccentric muscle actions have been put forward as a potential mechanism for the beneficial effect of EE, optimal loading parameters required to expedite recovery are currently unknown. Alfredson's original protocol employed 90 repetitions of eccentric loading, however abbreviated protocols consisting of fewer repetitions (typically 45) have been developed, albeit with less beneficial effect. Given that 8–12 Hz vibrations generated during isometric muscle actions have been previously shown to increase with fatigue, this research evaluated the effect of exercise repetition on motor output vibrations generated during EE by investigating the frequency characteristics of ground reaction force (GRF) recorded throughout the 90 repetitions of Alfredson's protocol. Methods: Nine healthy adult males performed six sets (15 repetitions per set) of eccentric ankle exercise. GRF was recorded at a frequency of 1000 Hz throughout the exercise protocol. The frequency power spectrum of the resultant GRF was calculated and normalized to total power. Relative spectral power was summed over 1 Hz widows within the frequency rage 7.5–11.5 Hz. The effect of each additional exercise set (15 repetitions) on the relative power within each widow was investigated using a general linear modelling approach. Results: The magnitude of peak relative power within the 7.5–11.5 Hz bandwidth increased across the six exercise sets from 0.03 in exercise set one to 0.12 in exercise set six (P < 0.05). Following the 4th set of exercise the frequency at which peak relative power occurred shifted from 9 to 10 Hz. Discussion: This study has demonstrated that successive repetitions of eccentric loading over six exercise sets results in an increase in the amplitude of motor output vibrations in the 7.5–11.5 Hz bandwidth, with an increase in the frequency of these vibrations occurring after the 4th set (60th repetition). These findings are consistent with findings from previous studies of muscle fatigue. Assuming that the magnitude and frequency of these vibrations represent important stimuli for tendon remodelling as hypothesized within the literature, the findings of this study question the role of abbreviated EE protocols and raise the question; can EE protocols for tendinopathy be optimized by performing eccentric loading to fatigue?
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Proper functioning of Insulated Rail Joints (IRJs) is essential for the safe operation of the railway signalling systems and broken rail identification circuitries. The Conventional IRJ (CIRJ) resembles structural butt joints consisting of two pieces of rails connected together through two joint bars on either side of their web and the assembly is held together through pre-tensioned bolts. As the IRJs should maintain electrical insulation between the two rails, a gap between the rail ends must be retained at all times and all metal contacting surfaces should be electrically isolated from each other using non-conductive material. At the gap, the rail ends lose longitudinal continuity and hence the vertical sections of the rail ends are often severely damaged, especially at the railhead, due to the passage of wheels compared to other continuously welded rail sections. Fundamentally, the reason for the severe damage can be related to the singularities of the wheel-rail contact pressure and the railhead stress. No new generation designs that have emerged in the market to date have focussed on this fundamental; they only have provided attention to either the higher strength materials or the thickness of the sections of various components of the IRJs. In this thesis a novel method of shape optimisation of the railhead is developed to eliminate the pressure and stress singularities through changes to the original sharp corner shaped railhead into an arc profile in the longitudinal direction. The optimal shape of the longitudinal railhead profile has been determined using three nongradient methods in search of accuracy and efficiency: (1) Grid Search Method; (2) Genetic Algorithm Method and (3) Hybrid Genetic Algorithm Method. All these methods have been coupled with a parametric finite element formulation for the evaluation of the objective function for each iteration or generation depending on the search algorithm employed. The optimal shape derived from these optimisation methods is termed as Stress Minimised Railhead (SMRH) in this thesis. This optimal SMRH design has exhibited significantly reduced stress concentration that remains well below the yield strength of the head hardened rail steels and has shifted the stress concentration location away from the critical zone of the railhead end. The reduction in the magnitude and the relocation of the stress concentration in the SMRH design has been validated through a full scale wheel – railhead interaction test rig; Railhead strains under the loaded wheels have been recorded using a non-contact digital image correlation method. Experimental study has confirmed the accuracy of the numerical predications. Although the SMRH shaped IRJs eliminate stress singularities, they can still fail due to joint bar or bolt hole cracking; therefore, another conceptual design, termed as Embedded IRJ (EIRJ) in this thesis, with no joint bars and pre-tensioned bolts has been developed using a multi-objective optimisation formulation based on the coupled genetic algorithm – parametric finite element method. To achieve the required structural stiffness for the safe passage of the loaded wheels, the rails were embedded into the concrete of the post tensioned sleepers; the optimal solutions for the design of the EIRJ is shown to simplify the design through the elimination of the complex interactions and failure modes of the various structural components of the CIRJ. The practical applicability of the optimal shapes SMRH and EIRJ is demonstrated through two illustrative examples, termed as improved designs (IMD1 & IMD2) in this thesis; IMD1 is a combination of the CIRJ and the SMRH designs, whilst IMD2 is a combination of the EIRJ and SMRH designs. These two improved designs have been simulated for two key operating (speed and wagon load) and design (wheel diameter) parameters that affect the wheel-rail contact; the effect of these parameters has been found to be negligible to the performance of the two improved designs and the improved designs are in turn found far superior to the current designs of the CIRJs in terms of stress singularities and deformation under the passage of the loaded wheels. Therefore, these improved designs are expected to provide longer service life in relation to the CIRJs.
Resumo:
FTIR spectra are reported of CO, CO2, H2 and H2O on silica-supported potassium, copper and potassium-copper catalysts. Adsorption of CO on a potassium/silica catalyst resulted in the formation of complexed CO moieties. Whereas exposure of CO2 to the same catalyst produced bands ascribed to CO2 -, bidentate carbonate and complexed CO species. Fully oxidised copper/silica surfaces gave bands due to CO on CuO and isolated Cu2+ cations on silica. Addition of potassium to this catalyst removed a peak attributed to CO adsorption on isolated Cu2+ cations and red-shifted the maximum ascribed to CO adsorbed on CuO. For a reduced copper/silica catalyst bands due to adsorbed CO on both high and low index planes were red-shifted by 10 cm-1 in the presence of potassium, although the strength of the Cu - CO bond did not appear to be increased concomitantly. An explanation in terms of an electrostatic effect between potassium and adsorbed CO is forwarded. A small maximum at ca. 1510 cm-1 for the reduced catalyst increased substantially upon exposing CO to a reoxidised promoted catalyst. Correspondingly, CO2 adsorption allowed the identification of two distinct carboxylate species, one of which was located at an interfacial site between copper and potassium oxide. Carboxylate species reacted with hydrogen at 295 K, on a reduced copper surface, to produce predominantly unidentate formate on potassium. In contrast no interaction was detected on a reoxidised copper catalyst at 295 K until a fraction of the copper surface was in a reduced state. Furthermore the interaction of polar water molecules with carboxylate species resulted in a perturbation of this structure which gave lower C----O stretching frequencies.
Resumo:
Although popular media narratives about the role of social media in driving the events of the 2011 “Arab Spring” are likely to overstate the impact of Facebook and Twitter on these uprisings, it is nonetheless true that protests and unrest in countries from Tunisia to Syria generated a substantial amount of social media activity. On Twitter alone, several millions of tweets containing the hashtags #libya or #egypt were generated during 2011, both by directly affected citizens of these countries and by onlookers from further afield. What remains unclear, though, is the extent to which there was any direct interaction between these two groups (especially considering potential language barriers between them). Building on hashtag data sets gathered between January and November 2011, this article compares patterns of Twitter usage during the popular revolution in Egypt and the civil war in Libya. Using custom-made tools for processing “big data,” we examine the volume of tweets sent by English-, Arabic-, and mixed-language Twitter users over time and examine the networks of interaction (variously through @replying, retweeting, or both) between these groups as they developed and shifted over the course of these uprisings. Examining @reply and retweet traffic, we identify general patterns of information flow between the English- and Arabic-speaking sides of the Twittersphere and highlight the roles played by users bridging both language spheres.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
An alternative approach to digital PWM generation using an adder rather than a counter is presented. This offers several advantages. The resolution and gain of the pulse width modulator remain constant regardless of the module clock frequency and PWM output frequency. The PWM resolution also becomes fixed at the register width. Even at high PWM frequencies, the resolution remains high when averaged over a number of PWM cycles. An inherent dithering of the PWM waveform introduced over successive cycles blurs the switching spectra without distorting the modulating waveform. The technique also lends itself to easily generating several phase shifted PWM waveforms suitable for multilevel converter modulation.
Resumo:
Immune reactions play important roles in determining the in vivo fate of bone substitute materials, either in new bone formation or inflammatory fibrous tissue encapsulation. The paradigm for the development of bone substitute materials has been shifted from inert to immunomodulatory materials, emphasizing the importance of immune cells in the material evaluation. Macrophages, the major effector cells in the immune reaction to implants, are indispensable for osteogenesis and their heterogeneity and plasticity render macrophages a primer target for immune system modulation. However, there are very few reports about the effects of macrophages on biomaterial-regulated osteogenesis. In this study, we used b-tricalcium phosphate (b-TCP) as a model biomaterial to investigate the role of macrophages on the material stimulated osteogenesis. The macrophage phenotype switched to M2 extreme in response to b-TCP extracts, which was related to the activation of calcium-sensing receptor (CaSR) pathway. Bone morphogenetic protein 2 (BMP2) was also significantly upregulated by the b-TCP stimulation, indicating that macrophage may participate in the b-TCP stimulated osteogenesis. Interestingly, when macrophageconditioned b-TCP extracts were applied to bone marrow mesenchymal stem cells (BMSCs), the osteogenic differentiation of BMSCs was significantly enhanced, indicating the important role of macrophages in biomaterial-induced osteogenesis. These findings provided valuable insights into the mechanism of material-stimulated osteogenesis, and a strategy to optimize the evaluation system for the in vitro osteogenesis capacity of bone substitute materials.
Resumo:
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.