122 resultados para Notations


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Queensland government planning policies actively encourage increased dwelling density, sustainable infill development and transit oriented development to maximise land use and minimise urban sprawl. One of the detriments of such a policy is the potential for intensified residential development to create conflict between lawfully operating existing industrial uses and residences. In particular the government is concerned that intensified urban development will increase the risk of litigation from landowners and tenants detrimentally affected by the emission of aerosols, fumes, light, noise, odour, particles or smoke from existing industrial premises.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The field of Molecular Spectroscopy was surveyed in order to determine a set of conventions and symbols which are in common use in the spectroscopic literature. This document, which is Part I in a series, establishes the notations and conventions used for general spectroscopic notations and deals with quantum mechanics, quantum numbers (vibrational states, angular momentum and energy levels), spectroscopic transitions, and miscellaneous notations (e.g. spectroscopic terms). Further parts will follow, dealing inter alia with symmetry notation, permutation and permutation-inversion symmetry notation, vibration-rotation spectroscopy and electronic spectroscopy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The field of Molecular Spectroscopy was surveyed in order to determine a set of conventions and symbols which are in common use in the spectroscopic literature. This document, which is Part 2 in a series, establishes the notations and conventions used for the description of symmetry in rigid molecules, using the Schoenflies notation. It deals firstly with the symmetry operators of the molecular point groups (also drawing attention to the difference between symmetry operators and elements). The conventions and notations of the molecular point groups are then established, followed by those of the representations of these groups as used in molecular spectroscopy. Further parts will follow, dealing inter alia with permutation and permutation-inversion symmetry notation, vibration-rotation spectroscopy and electronic spectroscopy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The field of Molecular Spectroscopy was surveyed in order to determine a set of conventions and symbols which are in common use in the spectroscopic literature. This document, which is Part 3 in a series, deals with symmetry notation referring to groups that involve nuclear permutations and the inversion operation. Further parts will follow, dealing inter alia with vibration-rotation spectroscopy and electronic spectroscopy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bibliography: p. 229-240.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A configurable process model provides a consolidated view of a family of business processes. It promotes the reuse of proven practices by providing analysts with a generic modelling artifact from which to derive individual process models. Unfortunately, the scope of existing notations for configurable process modelling is restricted, thus hindering their applicability. Specifically, these notations focus on capturing tasks and control-flow dependencies, neglecting equally important ingredients of business processes such as data and resources. This research fills this gap by proposing a configurable process modelling notation incorporating features for capturing resources, data and physical objects involved in the performance of tasks. The proposal has been implemented in a toolset that assists analysts during the configuration phase and guarantees the correctness of the resulting process models. The approach has been validated by means of a case study from the film industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Integral attacks are well-known to be effective against byte-based block ciphers. In this document, we outline how to launch integral attacks against bit-based block ciphers. This new type of integral attack traces the propagation of the plaintext structure at bit-level by incorporating bit-pattern based notations. The new notation gives the attacker more details about the properties of a structure of cipher blocks. The main difference from ordinary integral attacks is that we look at the pattern the bits in a specific position in the cipher block has through the structure. The bit-pattern based integral attack is applied to Noekeon, Serpent and present reduced up to 5, 6 and 7 rounds, respectively. This includes the first attacks on Noekeon and present using integral cryptanalysis. All attacks manage to recover the full subkey of the final round.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A configurable process model provides a consolidated view of a family of business processes. It promotes the reuse of proven practices by providing analysts with a generic modelling artifact from which to derive individual process models. Unfortunately, the scope of existing notations for configurable process modelling is restricted, thus hindering their applicability. Specifically, these notations focus on capturing tasks and control-flow dependencies, neglecting equally important ingredients of business processes such as data and resources. This research fills this gap by proposing a configurable process modelling notation incorporating features for capturing resources, data and physical objects involved in the performance of tasks. The proposal has been implemented in a toolset that assists analysts during the configuration phase and guarantees the correctness of the resulting process models. The approach has been validated by means of a case study from the film industry.