435 research outputs found

    A first step towards service-dominant logic as a new approach to overcome challenges in business intelligence

    Get PDF
    High expectations are set for Business Intelligence (BI), yet it fails to consistently deliver accordingly: there are numerous reports of BI challenges and failures. Existing approaches to address BI challenges are largely found to be ineffective, highlighting the need for a new approach. This paper examines how BI is perceived or understood and establishes that, firstly, BI is inherently grounded in Goods-Dominant (G-D) logic and secondly, that this can be linked to the challenges that are experienced within BI. A recommendation is made for a shift to Service-Dominant (S-D) logic as a new avenue of exploration to assist in overcoming BI’s prevailing challenges. Identifying the inherent G-D logic in BI provides the first step necessary in making this shift. Research findings are based on an interpretive case study of a South African Banking institution as well as a literature review.http://www.sajems.org/am201

    Interpretation of porosity and LWD resistivity from the Nankai accretionary wedge in light of clay physicochemical properties: Evidence for erosion and local overpressuring

    Get PDF
    International audienceIn this study, we used porosity to assess the compaction state of the Nankai accretionary wedge sediments and any implications for stress and pore pressure. However, hydrous minerals affect porosity measurements, and accounting for them is essential toward defining the interstitial porosity truly representative of the compaction state. The water content of sediments was measured in core samples and estimated from logging data using a resistivity model for shale. We used the cation exchange capacity to correct the porosity data for the amount of water bound to clay minerals and to correct the porosity estimates for the surface conductivity of hydrous minerals. The results indicate that several apparent porosity anomalies are significantly reduced by this correction, implying that they are in part artifacts from hydrous minerals. The correction also improves the fit of porosity estimated from logging-while-drilling (LWD) resistivity data to porosity measured on cores. Low overall porosities at the toe of the accretionary wedge and in the splay fault area are best explained by erosion, and we estimated the quantity of sediments eroded within the splay fault area by comparing porosity-effective stress relationships of the sediments to a reference curve. Additionally, a comparison of LWD data with core data (resistivity and P wave velocity) obtained at Site C0001 landward of the mega-splay fault area, suggested a contribution from the fracture porosity to in situ properties on the formation

    Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices

    Get PDF
    Connectivity becomes increasingly important also for small embedded systems such as typically found in industrial control installations. More and more use-cases require secure remote user access increasingly incorporating handheld based human machine interfaces, using wireless links such as Bluetooth. Correspondingly secure operator authentication becomes of utmost importance. Unfortunately, often passwords with all their well-known pitfalls remain the only practical mechanism. We present an assessment of the security requirements for the industrial setting, illustrating that offline attacks on passwords-based authentication protocols should be considered a significant threat. Correspondingly use of a Password Authenticated Key Exchange protocol becomes desirable. We review the signif-icant challenges faced for implementations on resource-constrained devices. We explore the design space and shown how we succeeded in tailoring a partic-ular variant of the Password Authenticated Connection Establishment (PACE) protocol, such that acceptable user interface responsiveness was reached even for the constrained setting of an ARM Cortex-M0+ based Bluetooth low-energy transceiver running from a power budget of 1.5 mW without notable energy buffers for covering power peak transients

    Catalytic living ring-opening metathesis polymerization

    Get PDF
    In living ring-opening metathesis polymerization (ROMP), a transition-metal–carbene complex polymerizes ring-strained olefins with very good control of the molecular weight of the resulting polymers. Because one molecule of the initiator is required for each polymer chain, however, this type of polymerization is expensive for widespread use. We have now designed a chain-transfer agent (CTA) capable of reducing the required amount of metal complex while still maintaining full control over the living polymerization process. This new method introduces a degenerative transfer process to ROMP. We demonstrate that substituted cyclohexene rings are good CTAs, and thereby preserve the ‘living’ character of the polymerization using catalytic quantities of the metal complex. The resulting polymers show characteristics of a living polymerization, namely narrow molecular-weight distribution, controlled molecular weights and block copolymer formation. This new technique provides access to well- defined polymers for industrial, biomedical and academic use at a fraction of the current costs and significantly reduced levels of residual ruthenium catalyst

    Bayesian inversion of synthetic AVO data to assess fluid and shale content in sand-shale media

    Get PDF
    Reservoir characterization of sand-shale sequences has always challenged geoscientists due to the presence of anisotropy in the form of shale lenses or shale layers. Water saturation and volume of shale are among the fundamental reservoir properties of interest for sand-shale intervals, and relate to the amount of fluid content and accumulating potentials of such media. This paper suggests an integrated workflow using synthetic data for the characterization of shaley-sand media based on anisotropic rock physics (T-matrix approximation) and seismic reflectivity modelling. A Bayesian inversion scheme for estimating reservoir parameters from amplitude vs. offset (AVO) data was used to obtain the information about uncertainties as well as their most likely values. The results from our workflow give reliable estimates of water saturation from AVO data at small uncertainties, provided background sand porosity values and isotropic overburden properties are known. For volume of shale, the proposed workflow provides reasonable estimates even when larger uncertainties are present in AVO data

    Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures

    Get PDF
    Implementation attacks like side-channel and fault attacks are a threat to deployed devices especially if an attacker has physical access. As a consequence, devices like smart cards and IoT devices usually provide countermeasures against implementation attacks, such as masking against side-channel attacks and detection-based countermeasures like temporal or spacial redundancy against fault attacks. In this paper, we show how to attack implementations protected with both masking and detection-based fault countermeasures by using statistical ineffective fault attacks using a single fault induction per execution. Our attacks are largely unaffected by the deployed protection order of masking and the level of redundancy of the detection-based countermeasure. These observations show that the combination of masking plus error detection alone may not provide sufficient protection against implementation attacks

    Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

    Get PDF
    In the context of fault attacks on nonce-based authenticated encryption, an attacker faces two restrictions. The first is the uniqueness of the nonce for each new encryption that prevents the attacker from collecting pairs of correct and faulty outputs to perform, e.g., differential fault attacks. The second restriction concerns the verification/decryption, which releases only verified plaintext. While many recent works either exploit misuse scenarios (e.g. nonce-reuse, release of unverified plaintext), we turn the fact that the decryption/verification gives us information on the effect of a fault (whether a fault changed a value or not) against it. In particular, we extend the idea of statistical ineffective fault attacks (SIFA) to target the initialization performed in nonce-based authenticated encryption schemes. By targeting the initialization performed during decryption/verification, most nonce-based authenticated encryption schemes provide the attacker with an oracle whether a fault was ineffective or not. This information is all the attacker needs to mount statistical ineffective fault attacks. To demonstrate the practical threat of the attack, we target software implementations of the authenticated encryption schemes Keyak and Ketje. The presented fault attacks can be carried out without the need of sophisticated equipment. In our practical evaluation the inputs corresponding to 24 ineffective fault inductions were required to reveal large parts of the secret key in both scenarios

    A study protocol for applying the co-creating knowledge translation framework to a population health study

    Get PDF
    BACKGROUND: Population health research can generate significant outcomes for communities, while Knowledge Translation (KT) aims to expressly maximize the outcomes of knowledge producing activity. Yet the two approaches are seldom explicitly combined as part of the research process. A population health study in Port Lincoln, South Australia offered the opportunity to develop and apply the co-KT Framework to the entire research process. This is a new framework to facilitate knowledge formation collaboratively between researchers and communities throughout a research to intervention implementation process. DESIGN: This study employs a five step framework (the co-KT Framework) that is formulated from engaged scholarship and action research principles. By following the steps a knowledge base will be cumulatively co-created with the study population that is useful to the research aims. Step 1 is the initiating of contact between the researcher and the study contexts, and the framing of the research issue, achieved through a systematic data collection tool. Step 2 refines the research issue and the knowledge base by building into it context specific details and conducting knowledge exchange events. Step 3 involves interpreting and analysing the knowledge base, and integrating evidence to inform intervention development. In Step 4 the intervention will be piloted and evaluated. Step 5 is the completion of the research process where outcomes for improvement will be instituted as regular practice with the facilitation of the community. In summary, the model uses an iterative knowledge construction mechanism that is complemented by external evidence to design interventions to address health priorities within the community. DISCUSSION: This is a systematic approach that operationalises the translational cycle using a framework for KT practice. It begins with the local context as its foundation for knowledge creation and ends with the development of contextually applicable interventions. It will be of interest to those involved in KT research, participatory action research, population health research and health care systems studies. The co-KT Framework is a method for embedding the principles of KT into all stages of a community-based research process, in which research questions are framed by emergent data from each previous stage.Kathryn Powell, Alison Kitson, Elizabeth Hoon, Jonathan Newbury, Anne Wilson and Justin Beilb

    Echocardiography findings in COVID-19 patients admitted to intensive care units: a multi-national observational study (the ECHO-COVID study)

    Get PDF
    Purpose: Severely ill patients affected by coronavirus disease 2019 (COVID-19) develop circulatory failure. We aimed to report patterns of left and right ventricular dysfunction in the first echocardiography following admission to intensive care unit (ICU). Methods: Retrospective, descriptive study that collected echocardiographic and clinical information from severely ill COVID-19 patients admitted to 14 ICUs in 8 countries. Patients admitted to ICU who received at least one echocardiography between 1st February 2020 and 30th June 2021 were included. Clinical and echocardiographic data were uploaded using a secured web-based electronic database (REDCap). Results: Six hundred and seventy-seven patients were included and the first echo was performed 2 [1, 4] days after ICU admission. The median age was 65 [56, 73] years, and 71% were male. Left ventricle (LV) and/or right ventricle (RV) systolic dysfunction were found in 234 (34.5%) patients. 149 (22%) patients had LV systolic dysfunction (with or without RV dysfunction) without LV dilatation and no elevation in filling pressure. 152 (22.5%) had RV systolic dysfunction. In 517 patients with information on both paradoxical septal motion and quantitative RV size, 90 (17.4%) had acute cor pulmonale (ACP). ACP was associated with mechanical ventilation (OR > 4), pulmonary embolism (OR > 5) and increased PaCO2. Exploratory analyses showed that patients with ACP and older age were more likely to die in hospital (including ICU). Conclusion: Almost one-third of this cohort of critically ill COVID-19 patients exhibited abnormal LV and/or RV systolic function in their first echocardiography assessment. While LV systolic dysfunction appears similar to septic cardiomyopathy, RV systolic dysfunction was related to pressure overload due to positive pressure ventilation, hypercapnia and pulmonary embolism. ACP and age seemed to be associated with mortality in this cohort
    • …
    corecore