首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Minimum energy problems involving linear systems with quadratic performance criteria are classical in optimal control theory. The case where controls are constrained is discussed in Athans and Falb (1966 Athans, M and Falb, PL. 1966. Optimal Control. An Introduction to the Theory and Its Applications, New York: McGraw-Hill Book Co.  [Google Scholar]) [Athans, M. and Falb, P.L. (1966), Optimal Control: An Introduction to the Theory and Its Applications, New York: McGraw-Hill Book Co.] who obtain a componentwise optimal control expression involving a saturation function expression. We show why the given expression is not generally optimal in the case where the dimension of the control is greater than one and provide a numerical counterexample.  相似文献   

2.
We present the asymtotically fastest known algorithms for some basic problems on univariate polynomial matrices: rank; nullspace; determinant; generic inverse reduced form (Giorgi et al. 2003, Storjohann 2003 Storjohann, A. 2003. “High-order lifting and integrality certification”. In J. Symb. Comp. Edited by: Giusti, M and Pardo, LM. Vol. 36, 613648. Nice, France, 3, , USA Special issue International Symposium on Symbolic and Algebraic Computation (ISSAC’2002). Guest editors: [Google Scholar], Jeannerod and Villard 2005 Jeannerod, C-P and Villard, G. 2005. Essentially optimal computation of the inverse of generic polynomial matrices. J. Comp., 21: 7286.  [Google Scholar], Storjohann and Villard 2005 Storjohann, A and Villard, G. July 2005. “Computing the rank and a small nullspace basis of a polynomial matrix”. In Proc. International Symposium on Symbolic and Algebraic Computation, 309316. Beijing, China: ACM Press.  [Google Scholar]). We show that they essentially can be reduced to two computer algebra techniques, minimal basis computations and matrix fraction expansion/reconstruction, and to polynomial matrix multiplication. Such reductions eventually imply that all these problems can be solved in about the same amount of time as polynomial matrix multiplication. The algorithms are deterministic, or randomized with certified output in a Las Vegas fashion.  相似文献   

3.
Driver distraction is acknowledged as one of the key contributors to driver accidents (Treat, J.R., et al., 1977 Treat, J. R. 1977. Tri-level study of the causes of traffic accidents (No. DOT-HS-034-535-77-TAC(1)), Bloomington, IN: Institute for Research in Public Safety – Indiana University.  [Google Scholar]. Tri-level study of the causes of traffic accidents (No. DOT-HS-034‐535‐77-TAC(1)). Bloomington, IN: Institute for Research in Public Safety – Indiana University; Knipling, R.R., et al., 1993 Knipling, R. R. 1993. Assessment of IVHS countermeasures for collision avoidance: Rear-end crashes (No. DOT HS 807 995), Washington, DC: National Highway Traffic Safety Administration.  [Google Scholar]. Assessment of IVHS countermeasures for collision avoidance: Rear-end crashes (No. DOT HS 807 995). Washington, DC: National Highway Traffic Safety Administration). As driving is mainly considered a visual task (Wierwille, W.W., 1993 Wierwille, W. W. 1993. “Visual and manual demands of in-car controls and displays”. In Automotive ergonomics, Edited by: Peakock, B. and Karwowski, W. 229320. London: Taylor and Francis.  [Google Scholar]. Visual and manual demands of in-car controls and displays. In: B. Peakock and W. Karwowski, eds. Automotive ergonomics. London: Taylor and Francis, 229–320) the use of auditory channels for interacting with intelligent vehicle systems has been suggested as a solution to possible visual overload. This article presents two studies which assess the potential impact of distraction caused by verbal interaction on the driving task. The first study used a low-cost, game-based, simulation and the second study used the same experimental design with a generic driving simulation, the Lane Change Task (Mattes, S., 2003. The lane change task as a tool for driver distraction evaluation. In: H. Strasser, H. Rascher, and H. Bubb, eds. Quality of work and products in enterprises of the future. Stuttgart: Ergonomia Verlag, 57–60). Twenty-four young adults, 12 males and 12 females, participated in the first study and 12 young adults, 6 males and 6 females, in the second study. Road departures, time/speed and subjective workload were the measures in the first study, while the second study used mean course-departure and subjective workload as dependent variables. The results indicated that game-based simulation can be a solution when realism is needed but resources are limited, and suggested that concurrent verbal interaction may impair lateral vehicle control.  相似文献   

4.
ABSTRACT

Speed communication analysis (Wicklund & Vandekerckhove, 2000 Wicklund, R. A. and Vandekerckhove, M. M. P. 2000. “Delay of gratification in interaction rituals.”. In SIDE issues centre stage: Recent developments in studies of de-individuation in groups, Edited by: Postmes, T., Spears, R., Lea, M. and Reicher, S. 191202. Amsterdam, , Netherlands: Koninklijke Nederlandse Akademie van Wetenschappen Verhandelingen, Afd. Letterkunde, Nieuwe Reeks, deel 183..  [Google Scholar]) suggests that the interplay between communicative velocity and sensorial bandwidth is fundamental to predict psychological consequences in mediated communication. In line with this viewpoint, Bertacco and Deponte (2005) Bertacco, M. and Deponte, A. 2005. Email as a speed-facilitating device: A contribution to the reduced-cues perspective on communication.. Journal of Computer-Mediated Communication, 10(3) [Google Scholar] found that students using e-mail communication (speedy media) were more concise and less inclined to take the recipient's perspective than were students who communicated by postal letter (slow media). Drawing on speed communication analysis, two experiments were conducted to examine (a) the presence of social norms and (b) behavioral regulation in e-mail versus postal letter communication. In Experiment 1, students anticipated either an e-mail or a postal letter interaction with a fictitious confederate. Results supported the existence of social norms for speed communication because the simple anticipation of an e-mail interaction resulted in a shortfall in the recipient's perspective taking. In Experiment 2, students who were typing either an e-mail or a postal letter were unexpectedly interrupted. Findings were in line with an attentional model of mediated interactions based on the speed communication analysis: Students who wrote a postal letter were (a) more likely to remember the interruption and (b) less sensitive to external stimuli than were e-mail students. Research limits as well as scope for future research are discussed in the conclusions.  相似文献   

5.
In this article, a prototype Greek text to Greek Sign Language (GSL) conversion system is presented. The system is integrated into an educational platform that addresses the needs of teaching GSL grammar and was developed within the SYNENNOESE project (Efthimiou et al. 2004a Efthimiou, E. 2004a. “Developing an e-learning platform for the Greek sign language”. In Computer helping people with special needs, Lecture Notes in Computer Science Edited by: Miesenberger, K., Klaus, J. and Zagler, W. Vol. 3118, 11071113.  [Google Scholar]. Developing an e-learning platform for the Greek sign language. In: K. Miesenberger, J. Klaus, and W. Zagler, eds. Computer helping people with special needs, Lecture Notes in Computer Science, Springer-Verlag, vol. 3118, 1107–1113). The detailed implementation of the language-processing component of a Greek text to GSL conversion system is provided, focusing upon the inherent problems of knowledge elicitation of sign language (SL) grammar and its implementation within a parser framework. It is based on an SL dictionary (Efthimiou et al. 2004a Efthimiou, E. 2004a. “Developing an e-learning platform for the Greek sign language”. In Computer helping people with special needs, Lecture Notes in Computer Science Edited by: Miesenberger, K., Klaus, J. and Zagler, W. Vol. 3118, 11071113.  [Google Scholar]) database of coded GSL knowledge. The proposed system has been designed and implemented after considering most state-of-the-art SL machine translation or Conversion systems, such as Vsigns (Papadogiorgaki et al. 2004 Papadogiorgaki, M. VSigns – a virtual sign synthesis web tool. Proceedings of Sixth COST 276 Workshop on Information and Knowledge Management for Integrated Media Communication. May2004, Thessaloniki, Greece.  [Google Scholar]. VSigns – a virtual sign synthesis web tool. In: Proceedings of Sixth COST 276 Workshop on Information and Knowledge Management for Integrated Media Communication, May 2004, Thessaloniki, Greece), ZARDOZ (Veale et al. 1998 Veale, T., Conway, A. and Collins, B. 1998. The challenges of cross-modal translation: English to sign language translation in the ZARDOZ system. Machine Translation, 13: 81106. [Crossref] [Google Scholar]. The challenges of cross-modal translation: English to sign language translation in the ZARDOZ system. Machine Translation, 13, 81–106) and SignSynth (Angus 2001 Angus, G. S.B. 2001. “SignSynth: a sign language synthesis application using Web3D and Perl”. In Gesture and Sign Language in Human–Computer Interaction, London, , UK: International Gesture Workshop.  [Google Scholar]. SignSynth: a sign language synthesis application using Web3D and Perl. In: Gesture and Sign Lanauage in Human–Computer Interaction. London, UK: International Gesture Workshop), and taking into account their advantages and disadvantages. The overall architecture is innovative since other existing systems either do not consider the GSL or they cannot be effectively applied on sentences but just on single words. The system is demonstrable on any conventional PC.  相似文献   

6.
Indian Remote Sensing Satellite (IRS-P4) multi-frequency scanning microwave radiometer (MSMR) provides geophysical parameters like sea surface temperature (SST), sea surface wind speed (SSWS), integrated water vapour (IWV) and cloud liquid water (CLW). The retrieval procedure of these parameters given by Gohil et al. (2000 Gohil, B.S., Mathur, A.K. and Varma, A.K. Geophysical parameter retrieval over global oceans from IRS-P4 (MSMR). Preprints, Fifth Pacific Ocean Remote Sensing Conference. December5–82000, Goa. pp.207211. Goa, , India: National Institute of Oceanography.  [Google Scholar], Geophysical parameter retrieval over global oceans from IRS-P4 (MSMR). In Preprints, Fifth Pacific Ocean Remote Sensing Conference, 5–8 December 2000, Goa, India (Goa: National Institute of Oceanography), pp. 207–211) was summarized by Sharma et al. (2002 Sharma, R., Babu, K.N., Mathur, A.K. and Ali, M.M. 2002. Identification of large scale atmospheric and oceanic features from IRS-P4 multifrequency scanning microwave radiometer: preliminary results. Journal of Atmospheric and Oceanic Technology, 19: 11271134. [Crossref], [Web of Science ®] [Google Scholar], Identification of large scale atmospheric and oceanic features from IRS-P4 multifrequency scanning microwave radiometer: preliminary results. Journal of Atmospheric and Oceanic Technology, 19, pp. 1127–1134) and Jena (2007 Jena, B. 2007. Studies on the retrieval, validation and applications of geophysical parameters from IRS-P4 (MSMR) data, Orissa: PhD thesis, Berhampur University.  [Google Scholar], Studies on the retrieval, validation and applications of geophysical parameters from IRS-P4 (MSMR) data. PhD thesis, Berhampur University, Orissa). Demonstration of self-consistency of these parameters has primary scientific importance. This article deals with the validation of MSMR geophysical parameters such as SST and SSWS with in situ observations (buoy data) over the north Indian Ocean during 2000. Result shows that the MSMR-derived SST and SSWS can be utilized for several applications because of their reasonable accuracy and coverage even under cloudy condition.  相似文献   

7.
ABSTRACT

This article restates Shannon and Weaver's (1963 Shannon , C. E. and W. Weaver . 1963 . The mathematical theory of communication . Urbana , IL : University of Illinois Press (Originally Published 1949) . [Google Scholar]) diagrammatic representation of the communication process in order to relate the fundamental conceptions of information it embodies to naturally occurring communication in the open air.  相似文献   

8.
This article examines knowledge creation in relation to improvements on the production line in the manufacturing department of Nissan Motor Company and aims to clarify embodied knowledge observed in the actions of organisational members who enable knowledge creation will be clarified. For that purpose, this study adopts an approach that adds a first, second, and third-person's viewpoint to the theory of knowledge creation (Nonaka & Takeuchi, 1995 Nonaka, I. and Takeuchi, H. 1995. The Knowledge-creating Company, New York: Oxford University Press.  [Google Scholar]). Embodied knowledge, observed in the actions of organisational members who enable knowledge creation, is the continued practice of ‘ethos’ (in Greek) founded in Nissan Production Way as an ethical basis. Ethos is knowledge (intangible) assets for knowledge creating companies. Substantiated analysis classifies ethos into three categories: the individual, team and organisation. This indicates the precise actions of the organisational members in each category during the knowledge creation process. This research will be successful in its role of showing the indispensability of ethos—the new concept of knowledge assets, which enables knowledge creation—for future knowledge-based management in the knowledge society.  相似文献   

9.
This article examines visitor interactions with and through a physical/digital installation designed for an open-air museum that displays historic buildings and ways of life from the past. The installation was designed following the “Assembly” design scheme proposed by Fraser et al. (2003 Fraser, M., Stanton, D., Hui Ng, K., Benford, S., O’Malley, C., Bowers, J., … Hindmarsh, J. (2003). Assembling history: Achieving coherent experiences with diverse technologies. Proceedings of ECSCW 2005, 179198. Norwell, MA: Kluwer. [Google Scholar]), and centered around five principles for the design of interactive experiences. We discuss how the Assembly framework was adapted and applied to our work on the installation called Reminisce, and we then present qualitative data gathered through the shadowing and naturalistic observations of small groups of visitors using Reminisce during their exploration of the museum. Through these data excerpts, we illustrate how interaction occurred among visitors and with the assembly. We reflect on the guiding principles of the adapted Assembly framework and on their usefulness for the design of place-specific interactional opportunities in heritage settings. Results from the empirical study show that the adapted Assembly principles provide HCI (human–computer interaction) researchers and designers with ways in which to flexibly support collocated interactions at heritage sites across artifacts and locations in ways that both complement and enrich the physical setting of the visit and its character.  相似文献   

10.
Leap et al. (2016 Leap, T., T. McDevitt, K. Novak, and N. Siermine. 2016. Further improvements to the Bauer-Millward attack on the Hill cipher. Cryptologia 40:116.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) reduced the time complexity of the Bauer-Millward (2007 Bauer, C., and K. Millward. 2007. Cracking matrix encryption row by row. Cryptologia 31(1):7683.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) ciphertext-only attack on the Hill cipher from 𝒪(Ln) to 𝒪(Ln?1), where L is the length of the alphabet, and n is the block size. This article presents an attack that reduces the complexity to 𝒪(Ln?1?s), 0?≤?s?≤?n???1. The practical limitation on the size of s is the memory available on the computer being used for the attack. Specifically, the computer must be able to hold Ls integer arrays of length N, where N is the number of blocks of ciphertext. The key idea is not to iterate over potential rows of the decryption matrix, but to iterate over randomly chosen characters in the plaintext. This attack also admits a straightforward parallel implementation on multiple processors to further decrease the run time of the attack.  相似文献   

11.
Baddeley's (1986) Baddeley, A. D. 1986. Working memory, New York: Oxford University Press.  [Google Scholar] working memory model suggests that imagery spatial information and verbal information can be concurrently held in different subsystems. This research proposed a method to present textual information with network relationships in a “graphics + voice” format, especially for small screens. It was hypothesized that this dual-modal presentation would result in superior comprehension performance and higher acceptance than pure textual display. An experiment was carried out to test this hypothesis with analytical problems from the Graduate Record Examination. Thirty individuals participated in this experiment. The results indicate that users' performance and acceptance were improved significantly by using the “graphic + voice” presentation. The article concludes with a discussion of the implications and limitations of the findings for future research in multimodal interface design.  相似文献   

12.
Abstract

After Section 404 of the Sarbanes-Oxley Act (SOX 404) was released, developing a computer auditing system became more important for management and auditors. In this study, the researchers aim to: (1) explore the crucial control items of the purchasing and expenditure cycle in meeting the conditions of SOX 404; (2) develop a computer auditing system based on the recognized control items and requirements of SOX 404; and (3) validate the applicability of the system by using an ISO/IEC 9126 model in meeting organizational needs (ISO, 2001 International Organization for Standardization (ISO) (2001). ISO/IEC 9126-1:2001. http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=22749 (Accessed: 15 January 2006).  [Google Scholar]). The Gowin's Vee research strategy developed by Novak &; Gowin (1984) Novak, J. D. and Gowin, D. B. 1984. Learning How to Learn, Cambridge: Cambridge University. [Crossref] [Google Scholar] was used in the study. In theory, researchers have identified eight operational procedures and 34 critical control items for the purchasing and expenditure cycle. The prototype computer auditing system of this study was then developed. On the experimental side, the researchers conducted two case studies based on the ISO/IEC 9126 software assessment criteria, the result of which showed that the system can provide company internal auditing personnel and their external auditors with a simple, continuous, timely, and analytical tool, which may promptly and effectively help in detecting problem control issues. We believe this study can contribute to the development of a sufficient and manageable computer auditing system, and provide prospective researchers and businesses with future directions in this subject area.  相似文献   

13.
《Ergonomics》2012,55(2):120-124
This exploratory case study describes the sharedness of knowledge within a basketball team (nine players) and how it changes during an official match. To determine how knowledge is mobilised in an actual game situation, the data were collected and processed following course-of-action theory (Theureau 2003 Theureau, J. 2003. “Course-of-action analysis and course-of-action centered design”. In Handbook of cognitive task design, Edited by: Hollnagel, E. 5581. Mahwah, NJ: Lawrence Erlbaum Associates. [Crossref] [Google Scholar]). The results were used to characterise the contents of the shared knowledge (i.e. regarding teammate characteristics, team functioning, opponent characteristics, opposing team functioning and game conditions) and to identify the characteristic types of change: (a) the reinforcement of a previous element of shared knowledge; (b) the invalidation of an element of shared knowledge; (c) fragmentation of an element of shared knowledge; (d) the creation of a new element of shared knowledge. The discussion deals with the diverse types of change in shared knowledge and the heterogeneous and dynamic nature of common ground within the team.

Statement of Relevance:The present case study focused on how the cognitions of individual members of a team coordinate to produce a team performance (e.g. surgical teams in hospitals, military teams) and how the shared knowledge changes during team activity. Traditional methods to increase knowledge sharedness can be enhanced by making use of ‘opportunities for coordination’ to optimise team adaptiveness.  相似文献   

14.
Brad Nicholson 《Ergonomics》2014,57(9):1353-1365
Situational awareness is recognised as an important factor in the performance of individuals and teams in dynamic decision-making (DDM) environments (Salmon et al. 2014 Salmon, P. M., N. A.Stanton, G. H.Walker, D.Jenkins, D.Ladva, L.Rafferty, and M.Young. 2014. “Measuring SA in Complex Systems: Comparison of Measurement Study.” International Journal of Industrial Ergonomics39: 490500.[Crossref], [Web of Science ®] [Google Scholar]). The present study was designed to investigate whether the scores on the WOMBAT? Situational Awareness and Stress Tolerance Test (Roscoe and North 1980 Roscoe, S. N., and R.North. 1980. “Prediction of Pilot Performance.” In Aviation Psychology, edited by S. N.Roscoe, 123127. Ames: The Iowa State University Press. [Google Scholar]) would predict the transfer of DDM performance from training under different levels of cognitive load to a novel situation. Participants practised a simulated firefighting task under either low or high conditions of cognitive load and then performed a (transfer) test in an alternative firefighting environment under an intermediate level of cognitive load. WOMBAT? test scores were a better predictor of DDM performance than scores on the Raven Matrices. Participants with high WOMBAT? scores performed better regardless of their training condition. Participants with recent gaming experience who practised under low cognitive load showed better practice phase performance but worse transfer performance than those who practised under high cognitive load.

Practitioner Summary: The relationship between task experience, situational awareness ability, cognitive load and the transfer of dynamic decision-making (DDM) performance was investigated. Results showed that the WOMBAT? test predicted transfer of DDM performance regardless of task cognitive load. The effects of cognitive load on performance varied according to previous task-relevant experience.  相似文献   

15.
Abstract

Business process redesign is one of the most powerful ways to boost business performance and to improve customer satisfaction (Limam Mansar & Reijers, 2005 Limam Mansar, S. and Reijers, H. 2005. Best Practices in Business Process Redesign: Validation of a Redesign Framework. Computers in Industry, 56: 457471.  [Google Scholar]). A possible approach to business process redesign is using redesign best practices. A previous study identified a set of 29 different redesign best practices (Reijers, 2003 Reijers, H. 2003. Design and Control of Workflow Processes: Business Process Management for the Service Industry, Berlin: Springer Verlag. [Crossref] [Google Scholar]). However, little is known about the exact impact of these redesign best practices on workflow performance. This study proposes an approach that can be used to quantify the impact of a business process redesign project on all dimensions of workflow performance. The approach consists of a large set of performance measures and a simulation toolkit. It supports the quantification of the impact of the implementation of redesign best practices, in order to determine what best practice or combination of best practices leads to the most favorable effect in a specific business process. The approach is developed based on a quantification project for the parallel best practice and is validated with two other quantification projects, namely for the knockout and triage best practices.  相似文献   

16.
《Ergonomics》2012,55(11):1643-1655
The ability to generalise vigilance research to operational environments has been questioned, largely due to differences between laboratory research and real-world settings. The taxonomy of vigilance tasks proposed by Parasuraman and Davies (1977 Parasuraman, R. and Davies, D. R. 1977. “A taxonomic analysis of vigilance performance”. In Vigilance: Theory, operational performance, and physiological correlates, Edited by: Mackie, R. R. 559574. New York: Plenum. [Crossref] [Google Scholar]) represents an attempt to classify vigilance tasks so that tasks with similar information-processing demands can be compared and the ability to generalise results enhanced. Although the taxonomy originally included complexity, the term specifically referred to multiple sources of information. Complexity has been overlooked in much of the traditional vigilance literature, although it is included in more recent studies of jobs such as air traffic control. In this paper, the taxonomy is evaluated in relation to two vigilance intensive jobs – closed circuit television surveillance operators and air traffic controllers. In its present form, the existing taxonomy of experimental settings has limited applicability to these operational settings. Therefore, recommendations for expanding the taxonomy to include more aspects of complexity are made. It is argued that the revised taxonomy be used in conjunction with situation awareness, which makes provision for the cognitive processes involved in these jobs.  相似文献   

17.
ABSTRACT

This paper proposes an information assurance (IA) metric that can be used to measure the security posture of an enterprise system in the “monitoring” step (Step 6) of the risk management framework (RMF), as required in the new certification and accreditation (C&A) process described in NIST SP 800-37, Rev. 1, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. This metric was developed by adopting the Object Measurement (OM® 1 1. OM® - Registered trademark owned by Donaldson and Siegel, SAIC, (1997) Donaldson, S. E. and Siegel, S. G. 1997. Cultivating successful software development, 1st, Upper Saddle River, NJ: Prentice Hall.  [Google Scholar]. ) approach, created to evaluate system development life cycle (SDLC) processes, for use as an IA metric. This metric supports organizational management's decision-making processes by enabling an organization to determine how well a system is complying with its monitoring plan. The values obtained through use of this metric can be abstracted to roll up values from multiple systems, creating an aggregate measure usable by organizational management to assess the security posture of all, or a subset, of their accredited systems undergoing monitoring.  相似文献   

18.
This article presents nearly 10 year's worth of System Usability Scale (SUS) data collected on numerous products in all phases of the development lifecycle. The SUS, developed by Brooke (1996) Brooke, J. 1996. “SUS: A “quick and dirty” usability scale”. In Usability evaluation in industry, Edited by: Jordan, P. W., Thomas, B. A. Weerdmeester and McClelland, I. L. 189194. London: Taylor & Francis.  [Google Scholar], reflected a strong need in the usability community for a tool that could quickly and easily collect a user's subjective rating of a product's usability. The data in this study indicate that the SUS fulfills that need. Results from the analysis of this large number of SUS scores show that the SUS is a highly robust and versatile tool for usability professionals. The article presents these results and discusses their implications, describes nontraditional uses of the SUS, explains a proposed modification to the SUS to provide an adjective rating that correlates with a given score, and provides details of what constitutes an acceptable SUS score.  相似文献   

19.
The Primordial Dance: Diametric and Concentric Spaces in the Unconscious World (Downes 2012) highlights specific unconscious spatial structures projected into beliefs as prior frames actively organizing such beliefs. As purportedly dynamic a priori structures, prior to intuition, diametric and concentric spaces of relation in relation are developed from Heidegger's (1927 Heidegger, M. Being and Time, translated by J. MacQuarrie and E. Robinson. Oxford: Basil Blackwell (1927), 1962. [Google Scholar]) phenomenological concerns with a background level of being and from aspects of Lévi-Strauss’ structuralist anthropology, conceptually prior to cognitive schemata. These dynamically interacting concentric and diametric spatial systems are explored, here, in reconstructing key concepts in Gilligan's (1982 Gilligan, C. In a Different Voice. Cambridge, MA: Harvard University Press, 1982. [Google Scholar]) moral reasoning for neglected spatial aspects of Freud's psychoanalysis and Eastern thought.  相似文献   

20.
Abstract

GOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and digital signature. Mendel et al. (2008 Mendel, F., N. Pramstaller, C. Rechberger, M. Kontak, and J. Szmidt. 2008. Cryptanalysis of the GOST hash function, Advances in Cryptology – CRYPTO 2008, vol. 5157, 162–178. [Google Scholar]) and Courtois and Mourouzis (2011 Courtois, N., and T. Mourouzis. 2011. Black-box collision attacks on the compression function of the GOST hash function. SECRYPT. Proceedings of the International Conference on Security and Cryptography, 325332, IEEE. [Google Scholar]) found attacks on the compression function of the GOST-R structure that were basically weaknesses of the GOST-R block cipher (GOST 28147–89, 1989 GOST 28147-89. 1989. Systems of the information treatment, cryptographic security, algorithms of the cryptographic transformation (in Russian). [Google Scholar]). Hence in 2012, it was updated to GOST-R 34.11-2012, which replaced the older one for all its applications from January 2013. GOST-R 34.11-2012 is based on a modified Merkle-Damgård construction. Here we present a modified version of GOST-R 34.11-2012 (Modified GOST-R (MGR) hash). The design of the MGR hash is based on wide-pipe construction, which is also a modified Merkle-Damgård construction. MGR is much more secure as well as three times faster than GOST-R 34.11-2012. Advanced Encryption Standard (AES)-like block ciphers have been used in designing the compression function of MGR because AES is one of the most efficient and secure block ciphers and has been evaluated for more than 14?years. A detailed statistical analysis with a few other attacks on MGR is incorporated into this paper.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号