896 research outputs found
The Sobieski Stuarts and the Royal Ladyâs Magazine: Some Newly-Attributed Tales
Identifies and describes19 previously unrecorded periodical tales, some in multiple parts, contributed to the Royal Lady\u27s Magazine in 1831-34, by the prolific early Victorian Stuart pretenders John and Charles Sobieski Stuart, providing evidence for the attributions and the brothers\u27 pen-names, and quadrupling their known literary output
Spatial-temporal metrics to assess collective behavior in football: a systematic review and assessment of research quality and applicability.
Extensive research has been conducted to investigate collective behaviour of football players using spatial-temporal data. The purpose of this systematic review was to synthesise and evaluate the applicability of this research by reviewing information presented in previous studies and its capacity to clearly describe the analysis approaches and practical applications of findings. Eighty-five studies were included in the review with approaches assigned to 4 categories of metrics (1: spaces; 2: distances; 3) position; 4: numerical relations) and 2 analysis methods (predictability and synchronisation). The review identified that authors descriptions of metrics generally focussed on operationalised definitions and provided limited translation to game scenarios or coaching strategies. Similarly, a substantive percentage of studies (22%) did provide any practical applications, and where these were provided, they were generally broad and provided limited actionable information that could be used directly by practitioners to inform training. Where specific applications were provided these were consistent with a dynamic systems perspective of collective behaviour and focused on organismic, environmental and task constraints that could be manipulated. The findings of the present review highlight the innovative practices of the research base and identify several areas for development to increase understanding and uptake in practice
Scalable Multi-domain Trust Infrastructures for Segmented Networks
Within a trust infrastructure, a private key is often used to digitally sign
a transaction, which can be verified with an associated public key. Using PKI
(Public Key Infrastructure), a trusted entity can produce a digital signature,
verifying the authenticity of the public key. However, what happens when
external entities are not trusted to verify the public key or in cases where
there is no Internet connection within an isolated or autonomously acting
collection of devices? For this, a trusted entity can be elected to generate a
key pair and then split the private key amongst trusted devices. Each node can
then sign part of the transaction using their split of the shared secret. The
aggregated signature can then define agreement on a consensus within the
infrastructure. Unfortunately, this process has two significant problems. The
first is when no trusted node can act as a dealer of the shares. The second is
the difficulty of scaling the digital signature scheme. This paper outlines a
method of creating a leaderless approach to defining trust domains to overcome
weaknesses in the scaling of the elliptic curve digital signature algorithm.
Instead, it proposes the usage of the Edwards curve digital signature algorithm
for the definition of multiple trust zones. The paper shows that the
computational overhead of the distributed key generation phase increases with
the number of nodes in the trust domain but that the distributed signing has a
relatively constant computational overhead
From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It
I. Introduction
II. A Short History of Russian Hacking of U.S. Government Networks and Critical Infrastructure
III. Unpacking the Ukraine Grid Hacks and Their Aftermath
IV. Analyzing Policy Options to Help Promote the Resilience of U.S. Government Systems and Critical Infrastructure ... A. Contextualizing and Introducing Draft Version 1.1 of the NIST Cybersecurity Framework ... B. Operationalizing International Cybersecurity Norms on Critical Infrastructure ... C. Deterrence and a Path Forward ... 1. Publicize Benefits as Applied ⊠2. Publicize Exercise Results ... 3. Publicize Updates
V. Conclusio
Dynamic testing and analysis of the worldâs first metal 3D printed bridge
The MX3D Bridge is the worldâs first additively manufactured metal bridge. It is a 10.5âŻm-span footbridge, and its dynamic response is a key serviceability consideration. The bridge has a flowing, sculptural form and its response to footfall was initially studied using a 3D finite element (FE) model featuring the designed geometry and material properties obtained from coupon tests. The bridge was tested using experimental modal analysis (EMA) and operational modal analysis (OMA) during commissioning prior to installation. The results have shown that the measured vibration response of the bridge under footfall excitation is 200% greater than predictions based on the FE model and contemporary design guidance. The difference between predicted and measured behaviour is attributed to the complexity of the structure, underestimation of the modal mass in the FE model, and the time-variant modal behaviour of the structure under pedestrian footfall. Both OMA and EMA give a dominant natural frequency for the bridge of between 5.19âŻHz and 5.32âŻHz, higher than the FE model prediction of 4.31âŻHz, and average damping estimates across all modes of vibration below 15âŻHz of 0.61% and 0.74% respectively, higher than the 0.5% assumed within the design guidance, slightly reducing the peak response factor predicted for the bridge
DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity
Decentralised identifiers have become a standardised element of digital
identity architecture, with supra-national organisations such as the European
Union adopting them as a key component for a unified European digital identity
ledger. This paper delves into enhancing security and privacy features within
decentralised identifiers by integrating ring signatures as an alternative
verification method. This allows users to identify themselves through digital
signatures without revealing which public key they used. To this end, the study
proposed a novel decentralised identity method showcased in a decentralised
identifier-based architectural framework. Additionally, the investigation
assesses the repercussions of employing this new method in the verification
process, focusing specifically on privacy and security aspects. Although ring
signatures are an established asset of cryptographic protocols, this paper
seeks to leverage their capabilities in the evolving domain of digital
identities
Making Democracy Harder to Hack
With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies. Yet a consensus has been slow to emerge as to the desirability and feasibility of reclassifying electionsâin particular, voting machinesâas critical infrastructure, due in part to the long history of local and state control of voting procedures. This Article takes on the debateâfocusing on policy options beyond former Department of Homeland Security Secretary Jeh Johnsonâs decision to classify elections as critical infrastructure in January 2017âin the U.S., using the 2016 elections as a case study, but putting the issue in a global context, with in-depth case studies from South Africa, Estonia, Brazil, Germany, and India. Governance best practices are analyzed by reviewing these differing approaches to securing elections, including the extent to which trend lines are converging or diverging. This investigation will, in turn, help inform ongoing minilateral efforts at cybersecurity norm building in the critical infrastructure context, which are considered here for the first time in the literature through the lens of polycentric governance
Beyond the Power Law: Uncovering Stylized Facts in Interbank Networks
We use daily data on bilateral interbank exposures and monthly bank balance
sheets to study network characteristics of the Russian interbank market over
Aug 1998 - Oct 2004. Specifically, we examine the distributions of (un)directed
(un)weighted degree, nodal attributes (bank assets, capital and
capital-to-assets ratio) and edge weights (loan size and counterparty
exposure). We search for the theoretical distribution that fits the data best
and report the "best" fit parameters. We observe that all studied distributions
are heavy tailed. The fat tail typically contains 20% of the data and can be
mostly described well by a truncated power law. Also the power law, stretched
exponential and log-normal provide reasonably good fits to the tails of the
data. In most cases, however, separating the bulk and tail parts of the data is
hard, so we proceed to study the full range of the events. We find that the
stretched exponential and the log-normal distributions fit the full range of
the data best. These conclusions are robust to 1) whether we aggregate the data
over a week, month, quarter or year; 2) whether we look at the "growth" versus
"maturity" phases of interbank market development; and 3) with minor
exceptions, whether we look at the "normal" versus "crisis" operation periods.
In line with prior research, we find that the network topology changes greatly
as the interbank market moves from a "normal" to a "crisis" operation period.Comment: 17 pages, 9 figure
Increased diagnosis and treatment of hepatitis C in prison by universal offer of testing and use of telemedicine
With recent advances in antiâviral therapy there is an opportunity to eliminate HCV from the UK population. HCV is common in incarcerated individuals, with previous estimates suggesting ~7% of the UK prison population is antiâHCV antibody positive. Increasing diagnosis and treatment of HCV in prison is a priority in seeking to eliminate transmission in the general population. Thus the study aimed, to assess the impact implementation of: 1. A universal offer of blood borne virus testing (UOBBVT) using dry blood spot testing for prisoners at reception to increase diagnosis; 2. Telemedicine clinics (TC) within North East England (NEE) prisons to increase HCV treatment rates. UOBBVT was initially implemented at Her Majesty's Prison (HMP) Durham, commencing March 2016. From March 2016 to February 2017, 2,831 of 4,280 (66%) new receptions were offered BBV testing. Of these, 1,495 (53% of offered) accepted BBV testing, of whom 95 (6.4%) were HCV antibody positive, with 47 of those 95 (49.5%) HCV RNA positive, suggesting a prevalence of active infection in the tested population of 3.1% (95% CI 2.4% to 4.2%). Between August 2015 and October 2017, 80 individuals were seen in the TC and 57 (71%) commenced antiviral therapy. Of those with known outcome (n=29), 100% achieved sustained virological response. In the year prior to implementation, only 4 patients received HCV treatment. In conclusion, a universal offer of BBV testing to inmates presenting at HMP reception coupled with linkage into specialist care via TC can substantially increase rates of testing, diagnosis and treatment of HCV in this high prevalence population
- âŠ