896 research outputs found

    The Sobieski Stuarts and the Royal Lady’s Magazine: Some Newly-Attributed Tales

    Get PDF
    Identifies and describes19 previously unrecorded periodical tales, some in multiple parts, contributed to the Royal Lady\u27s Magazine in 1831-34, by the prolific early Victorian Stuart pretenders John and Charles Sobieski Stuart, providing evidence for the attributions and the brothers\u27 pen-names, and quadrupling their known literary output

    Spatial-temporal metrics to assess collective behavior in football: a systematic review and assessment of research quality and applicability.

    Get PDF
    Extensive research has been conducted to investigate collective behaviour of football players using spatial-temporal data. The purpose of this systematic review was to synthesise and evaluate the applicability of this research by reviewing information presented in previous studies and its capacity to clearly describe the analysis approaches and practical applications of findings. Eighty-five studies were included in the review with approaches assigned to 4 categories of metrics (1: spaces; 2: distances; 3) position; 4: numerical relations) and 2 analysis methods (predictability and synchronisation). The review identified that authors descriptions of metrics generally focussed on operationalised definitions and provided limited translation to game scenarios or coaching strategies. Similarly, a substantive percentage of studies (22%) did provide any practical applications, and where these were provided, they were generally broad and provided limited actionable information that could be used directly by practitioners to inform training. Where specific applications were provided these were consistent with a dynamic systems perspective of collective behaviour and focused on organismic, environmental and task constraints that could be manipulated. The findings of the present review highlight the innovative practices of the research base and identify several areas for development to increase understanding and uptake in practice

    Scalable Multi-domain Trust Infrastructures for Segmented Networks

    Full text link
    Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the authenticity of the public key. However, what happens when external entities are not trusted to verify the public key or in cases where there is no Internet connection within an isolated or autonomously acting collection of devices? For this, a trusted entity can be elected to generate a key pair and then split the private key amongst trusted devices. Each node can then sign part of the transaction using their split of the shared secret. The aggregated signature can then define agreement on a consensus within the infrastructure. Unfortunately, this process has two significant problems. The first is when no trusted node can act as a dealer of the shares. The second is the difficulty of scaling the digital signature scheme. This paper outlines a method of creating a leaderless approach to defining trust domains to overcome weaknesses in the scaling of the elliptic curve digital signature algorithm. Instead, it proposes the usage of the Edwards curve digital signature algorithm for the definition of multiple trust zones. The paper shows that the computational overhead of the distributed key generation phase increases with the number of nodes in the trust domain but that the distributed signing has a relatively constant computational overhead

    From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It

    Get PDF
    I. Introduction II. A Short History of Russian Hacking of U.S. Government Networks and Critical Infrastructure III. Unpacking the Ukraine Grid Hacks and Their Aftermath IV. Analyzing Policy Options to Help Promote the Resilience of U.S. Government Systems and Critical Infrastructure ... A. Contextualizing and Introducing Draft Version 1.1 of the NIST Cybersecurity Framework ... B. Operationalizing International Cybersecurity Norms on Critical Infrastructure ... C. Deterrence and a Path Forward ... 1. Publicize Benefits as Applied 
 2. Publicize Exercise Results ... 3. Publicize Updates V. Conclusio

    Dynamic testing and analysis of the world’s first metal 3D printed bridge

    Get PDF
    The MX3D Bridge is the world’s first additively manufactured metal bridge. It is a 10.5 m-span footbridge, and its dynamic response is a key serviceability consideration. The bridge has a flowing, sculptural form and its response to footfall was initially studied using a 3D finite element (FE) model featuring the designed geometry and material properties obtained from coupon tests. The bridge was tested using experimental modal analysis (EMA) and operational modal analysis (OMA) during commissioning prior to installation. The results have shown that the measured vibration response of the bridge under footfall excitation is 200% greater than predictions based on the FE model and contemporary design guidance. The difference between predicted and measured behaviour is attributed to the complexity of the structure, underestimation of the modal mass in the FE model, and the time-variant modal behaviour of the structure under pedestrian footfall. Both OMA and EMA give a dominant natural frequency for the bridge of between 5.19 Hz and 5.32 Hz, higher than the FE model prediction of 4.31 Hz, and average damping estimates across all modes of vibration below 15 Hz of 0.61% and 0.74% respectively, higher than the 0.5% assumed within the design guidance, slightly reducing the peak response factor predicted for the bridge

    DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity

    Full text link
    Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper delves into enhancing security and privacy features within decentralised identifiers by integrating ring signatures as an alternative verification method. This allows users to identify themselves through digital signatures without revealing which public key they used. To this end, the study proposed a novel decentralised identity method showcased in a decentralised identifier-based architectural framework. Additionally, the investigation assesses the repercussions of employing this new method in the verification process, focusing specifically on privacy and security aspects. Although ring signatures are an established asset of cryptographic protocols, this paper seeks to leverage their capabilities in the evolving domain of digital identities

    Making Democracy Harder to Hack

    Get PDF
    With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies. Yet a consensus has been slow to emerge as to the desirability and feasibility of reclassifying elections—in particular, voting machines—as critical infrastructure, due in part to the long history of local and state control of voting procedures. This Article takes on the debate—focusing on policy options beyond former Department of Homeland Security Secretary Jeh Johnson’s decision to classify elections as critical infrastructure in January 2017—in the U.S., using the 2016 elections as a case study, but putting the issue in a global context, with in-depth case studies from South Africa, Estonia, Brazil, Germany, and India. Governance best practices are analyzed by reviewing these differing approaches to securing elections, including the extent to which trend lines are converging or diverging. This investigation will, in turn, help inform ongoing minilateral efforts at cybersecurity norm building in the critical infrastructure context, which are considered here for the first time in the literature through the lens of polycentric governance

    Beyond the Power Law: Uncovering Stylized Facts in Interbank Networks

    Full text link
    We use daily data on bilateral interbank exposures and monthly bank balance sheets to study network characteristics of the Russian interbank market over Aug 1998 - Oct 2004. Specifically, we examine the distributions of (un)directed (un)weighted degree, nodal attributes (bank assets, capital and capital-to-assets ratio) and edge weights (loan size and counterparty exposure). We search for the theoretical distribution that fits the data best and report the "best" fit parameters. We observe that all studied distributions are heavy tailed. The fat tail typically contains 20% of the data and can be mostly described well by a truncated power law. Also the power law, stretched exponential and log-normal provide reasonably good fits to the tails of the data. In most cases, however, separating the bulk and tail parts of the data is hard, so we proceed to study the full range of the events. We find that the stretched exponential and the log-normal distributions fit the full range of the data best. These conclusions are robust to 1) whether we aggregate the data over a week, month, quarter or year; 2) whether we look at the "growth" versus "maturity" phases of interbank market development; and 3) with minor exceptions, whether we look at the "normal" versus "crisis" operation periods. In line with prior research, we find that the network topology changes greatly as the interbank market moves from a "normal" to a "crisis" operation period.Comment: 17 pages, 9 figure

    Increased diagnosis and treatment of hepatitis C in prison by universal offer of testing and use of telemedicine

    Get PDF
    With recent advances in anti‐viral therapy there is an opportunity to eliminate HCV from the UK population. HCV is common in incarcerated individuals, with previous estimates suggesting ~7% of the UK prison population is anti‐HCV antibody positive. Increasing diagnosis and treatment of HCV in prison is a priority in seeking to eliminate transmission in the general population. Thus the study aimed, to assess the impact implementation of: 1. A universal offer of blood borne virus testing (UOBBVT) using dry blood spot testing for prisoners at reception to increase diagnosis; 2. Telemedicine clinics (TC) within North East England (NEE) prisons to increase HCV treatment rates. UOBBVT was initially implemented at Her Majesty's Prison (HMP) Durham, commencing March 2016. From March 2016 to February 2017, 2,831 of 4,280 (66%) new receptions were offered BBV testing. Of these, 1,495 (53% of offered) accepted BBV testing, of whom 95 (6.4%) were HCV antibody positive, with 47 of those 95 (49.5%) HCV RNA positive, suggesting a prevalence of active infection in the tested population of 3.1% (95% CI 2.4% to 4.2%). Between August 2015 and October 2017, 80 individuals were seen in the TC and 57 (71%) commenced antiviral therapy. Of those with known outcome (n=29), 100% achieved sustained virological response. In the year prior to implementation, only 4 patients received HCV treatment. In conclusion, a universal offer of BBV testing to inmates presenting at HMP reception coupled with linkage into specialist care via TC can substantially increase rates of testing, diagnosis and treatment of HCV in this high prevalence population
    • 

    corecore