179 resultados para CCP


Relevância:

20.00% 20.00%

Publicador:

Resumo:

As causas de invalidade no CCP....

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El artículo forma parte de un monográfico dedicado a la formación del profesorado de geografía e historia. El resumen está tomado de la revista

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El art??culo forma parte de un monogr??fico dedicado a la Reforma de Bolonia y formaci??n del profesorado de secundaria.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Literally, the word compliance suggests conformity in fulfilling official requirements. The thesis presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCP). The thesis presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCP are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. In order to provide confidence in operation for the mistrusting sets of entities, CCP must provide compliance verification mechanisms. These mechanisms are employed either by all the entities or a set of authorised entities in the system to verify the compliance of the behaviour of various participating entities with the rules of the system. It is often stated that confidentiality, integrity and authentication are the primary interests of cryptology. It is evident from the literature that authentication mechanisms employ confidentiality and integrity services to achieve their goal. Therefore, the fundamental services that any cryptographic algorithm may provide are confidentiality and integrity only. Since controlling the behaviour of the entities is not a feasible cryptologic goal,the verification of the confidentiality of any data is a futile cryptologic exercise. For example, there exists no cryptologic mechanism that would prevent an entity from willingly or unwillingly exposing its private key corresponding to a certified public key. The confidentiality of the data can only be assumed. Therefore, any verification in cryptologic protocols must take the form of integrity verification mechanisms. Thus, compliance verification must take the form of integrity verification in cryptologic protocols. A definition of compliance that is conducive as a cryptologic goal is presented as a guarantee on the confidentiality and integrity services. The definitions are employed to provide a classification mechanism for various message formats in a cryptologic protocol. The classification assists in the characterisation of protocols, which assists in providing a focus for the goals of the research. The resulting concrete goal of the research is the study of those protocols that employ message formats to provide restricted confidentiality and universal integrity services to selected data. The thesis proposes an informal technique to understand, analyse and synthesise the integrity goals of a protocol system. The thesis contains a study of key recovery,electronic cash, peer-review, electronic auction, and electronic voting protocols. All these protocols contain message format that provide restricted confidentiality and universal integrity services to selected data. The study of key recovery systems aims to achieve robust key recovery relying only on the certification procedure and without the need for tamper-resistant system modules. The result of this study is a new technique for the design of key recovery systems called hybrid key escrow. The thesis identifies a class of compliant cryptologic protocols called secure selection protocols (SSP). The uniqueness of this class of protocols is the similarity in the goals of the member protocols, namely peer-review, electronic auction and electronic voting. The problem statement describing the goals of these protocols contain a tuple,(I, D), where I usually refers to an identity of a participant and D usually refers to the data selected by the participant. SSP are interested in providing confidentiality service to the tuple for hiding the relationship between I and D, and integrity service to the tuple after its formation to prevent the modification of the tuple. The thesis provides a schema to solve the instances of SSP by employing the electronic cash technology. The thesis makes a distinction between electronic cash technology and electronic payment technology. It will treat electronic cash technology to be a certification mechanism that allows the participants to obtain a certificate on their public key, without revealing the certificate or the public key to the certifier. The thesis abstracts the certificate and the public key as the data structure called anonymous token. It proposes design schemes for the peer-review, e-auction and e-voting protocols by employing the schema with the anonymous token abstraction. The thesis concludes by providing a variety of problem statements for future research that would further enrich the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The modal strain energy method, which depends on the vibration characteristics of the structure, has been reasonably successful in identifying and localising damage in the structure. However, existing strain energy methods require the first few modes to be measured to provide meaningful damage detection. Use of individual modes with existing strain energy methods may indicate false alarms or may not detect the damage at or near the nodal points. This paper proposes a new modal strain energy based damage index which can detect and localize the damage using any one of the modes measured and illustrates its application for beam structures. It becomes evident that the proposed strain energy based damage index also has potential for damage quantification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Some uncertainties such as the stochastic input/output power of a plug-in electric vehicle due to its stochastic charging and discharging schedule, that of a wind unit and that of a photovoltaic generation source, volatile fuel prices and future uncertain load growth, all together could lead to some risks in determining the optimal siting and sizing of distributed generators (DGs) in distributed systems. Given this background, under the chance constrained programming (CCP) framework, a new method is presented to handle these uncertainties in the optimal sitting and sizing problem of DGs. First, a mathematical model of CCP is developed with the minimization of DGs investment cost, operational cost and maintenance cost as well as the network loss cost as the objective, security limitations as constraints, the sitting and sizing of DGs as optimization variables. Then, a Monte Carolo simulation embedded genetic algorithm approach is developed to solve the developed CCP model. Finally, the IEEE 37-node test feeder is employed to verify the feasibility and effectiveness of the developed model and method. This work is supported by an Australian Commonwealth Scientific and Industrial Research Organisation (CSIRO) Project on Intelligent Grids Under the Energy Transformed Flagship, and Project from Jiangxi Power Company.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper discusses the research carried out towards the development of a hybrid-composite floor plate systems (HCFPS) using polyurethane (PU), glass-fibre reinforced cement (GRC) and thin perforated steel laminate. HCFPS is configured in such a way where positive inherent properties of individual component materials are combined to offset any weakness and achieve the optimum performance. Finite Element modeling of HCFPS with ABAQUS 6.9-1, comparative studies of HCFPS with the steel deck composite system and experimental investigations which will be carried out are briefly described in the paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Under seismic loads neither the response of the pile nor the response of ground are independent of each other, contrary what is normally assumed. In seismic design of buildings, dynamic response of a structure is determined by assuming a fixed base on sub-grade and neglecting the physical interaction between foundation and soil profile in which it is embedded. However, the seismic response of pile foundations in vibration sensitive soil profiles is significantly affected by the behaviour of supporting soil. This research uses validated Finite Element techniques to simulate the seismic behaviour of pile foundations embedded in multilayered vibration sensitive soils.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Australian Curriculum: English, v.5 (ACARA, 2013) now being implemented in Queensland asks teachers and curriculum designers to incorporate the cross curriculum priority (CCP)of Indigenous issues through Aboriginal and Torres Strait Islander histories and cultures. In the Australian Curriculum English, (AC:E) one way to address this CCP is by including texts by and about Aboriginal and Torres Strait Islander people. With the rise of promising and accomplished young, Indigenous filmmakers such as Ivan Sen, Rachael Perkins, Wayne Blair and Warwick Thornton, this guide focuses on the suitable films for schools implementing the Australian Curriculum in terms of cultural representations. This annotated guide suggests some films suitable for inclusion in classroom study and suggests some companion texts (novels, plays, television series and animations, documentaries, poetry and short stories) that may be studied alongside the films. Some of these are by Indigenous filmmakers and writers, and others features Aboriginal and Torres Strait Island representations in character and/or themes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numerous Abaqus [1] finite element analyses have been carried out using various plasticity models to investigate the effect of friction force on the rail head in relation to both the development of the accumulated plastic strain (PEEQ) and the changes in the depth of PEEQ distribution in the wheel-rail contact. The normal force distribution on the rail head was assumed to be Hertzian. The tangential force was implemented as a fraction of the normal force in the subroutine. Each analysis was carried out for a single pass and the effect of various friction coefficient values has been observed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a numerical study on the response of axially loaded slender square concrete filled steel tube (CFST) columns under low velocity lateral impact loading. A finite element analysis (FEA) model was developed using the explicit dynamic nonlinear finite element code LS -DYNA in which the strain rate effects of both steel and concrete, contact between steel tube and concrete and confinement effect provided by the steel tube for the concrete were considered. The model also benefited from a relatively recent feature of LS-DYNA for applying a pre-loading in the explicit solver. The developed numerical model was verified for its accuracy and adequacy by comparing the results with experimental results available in the literature. The verified model was then employed to conduct a parametric study to investigate the influence of axial load level, impact location, support conditions, and slenderness ratio on the response of the CFST columns. A good agreement between the numerical and experimental results was achieved. The model could reasonably predict the impact load-deflection history and deformed shape of the column at the end of the impact event. The results of the parametric study showed that whilst impact location, axial load level and slenderness ratio can have a significant effect on the peak impact force, residual lateral deflection and maximum lateral deflection, the influence of support fixity is minimal. With an increase of axial load to up to a certain level, the peak force increases; however, a further increase in the axial load causes a decrease in the peak force. Both residual lateral deflection and maximum lateral deflection increase as axial load level increases. Shifting the impact location towards the supports increases the peak force and reduces both residual and maximum lateral deflections. A rise in slenderness ratio decreases the peak force and increases the residual and maximum lateral deflections.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Railway Bridges deteriorate over time due to different critical factors including, flood, wind, earthquake, collision, and environment factors, such as corrosion, wear, termite attack, etc. In current practice, the contributions of the critical factors, towards the deterioration of railway bridges, which show their criticalities, are not appropriately taken into account. In this paper, a new method for quantifying the criticality of these factors will be introduced. The available knowledge as well as risk analyses conducted in different Australian standards and developed for bridge-design will be adopted. The analytic hierarchy process (AHP) is utilized for prioritising the factors. The method is used for synthetic rating of railway bridges developed by the authors of this paper. Enhancing the reliability of predicting the vulnerability of railway bridges to the critical factors, will be the significant achievement of this research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a comparative study on the response of a buried tunnel to surface blast using the arbitrary Lagrangian-Eulerian (ALE) and smooth particle hydrodynamics (SPH) techniques. Since explosive tests with real physical models are extremely risky and expensive, the results of a centrifuge test were used to validate the numerical techniques. The numerical study shows that the ALE predictions were faster and closer to the experimental results than those from the SPH simulations which over predicted the strains. The findings of this research demonstrate the superiority of the ALE modelling techniques for the present study. They also provide a comprehensive understanding of the preferred ALE modelling techniques which can be used to investigate the surface blast response of underground tunnels.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

EVE Online, released in 2003 by CCP Games, is a space-themed Massively Multiplayer Online Game (MMOG). This sandbox style MMOG has a reputation for being a difficult game with a punishing learning curve that is fairly impenetrable to new players. This has led to the widely held belief among the larger MMOG community that “EVE players are different”, as only a very particular type of player would be dedicated to learning how to play a game this challenging. Taking a critical approach to the claim that “EVE players are different”, this paper complicates the idea that only a certain type of player capable of playing the most hardcore of games will be attracted to this particular MMOG. Instead, we argue that EVE’s “exceptionalism” is actually the result of conscious design decisions on the part of CCP games, which in turn compel particular behaviours that are continually reinforced as the norm by the game’s relatively homogenous player community.