9 resultados para Protection of Privacy
em Universidade do Minho
Resumo:
Organic-inorganic hybrid (OIH) sol-gel coatings based on ureasilicates (U(X)) have promising properties for use as eco-friendly coatings on hot dip galvanized steel (HDGS) and may be considered potential substitutes for pre-treatment systems containing Cr(VI). These OIH coatings reduce corrosion activity during the initial stages of contact of the HDGS samples with highly alkaline environments (cementitious media) and allow the mitigation of harmful effects of an initial excessive reaction between cement pastes and the zinc layer. However, the behavior of HDGS coated with U(X) in the presence of chloride ions has never been reported. In this paper, the performance of HDGS coated with five different U(X) coatings was assessed by electrochemical measurements in chloride-contaminated simulated concrete pore solution (SCPS). U(X) sol-gel coatings were produced and deposited on HDGS by a dip coating method. The coatings performance was evaluated by electrochemical impedance spectroscopy, potentiodynamic polarization curves measurements, macrocell current density and polarization resistance in contact with chloride-contaminated SCPS. The SEM/EDS analyses of the coatings before and after the tests were also performed. The results showed that the HDGS samples coated with the OIH coatings exhibited enhanced corrosion resistance to chloride ions when compared to uncoated galvanized steel.
Resumo:
Artigo completo publicado na revista "Journal of The Electrochemical Society" 160:10 (2013) 467-479 e disponível no RepositóriUM em: http://hdl.handle.net/1822/33855
Resumo:
Artigo completo publicado na revista "Journal of The Electrochemical Society" 161:6 (2014) C349-C362 e disponível no RepositóriUM em: http://hdl.handle.net/1822/33784
Resumo:
Artigo completo publicado na revista "Journal of The Electrochemical Society" 161:6 (2014) C349-C362 e disponível no RepositóriUM em: http://hdl.handle.net/1822/33784. Errata disponível no RepositóriUM em: http://hdl.handle.net/1822/40064. (Publisher’s note: An erratum that addressed the errors in Figure 9 was originally published on Dec. 10, 2014, however the graphs in that erratum were not correct.)
Resumo:
Doctoral Thesis in Juridical Sciences (Specialty in Public Legal Sciences)
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.
Resumo:
We study the problem of privacy-preserving proofs on authenticated data, where a party receives data from a trusted source and is requested to prove computations over the data to third parties in a correct and private way, i.e., the third party learns no information on the data but is still assured that the claimed proof is valid. Our work particularly focuses on the challenging requirement that the third party should be able to verify the validity with respect to the specific data authenticated by the source — even without having access to that source. This problem is motivated by various scenarios emerging from several application areas such as wearable computing, smart metering, or general business-to-business interactions. Furthermore, these applications also demand any meaningful solution to satisfy additional properties related to usability and scalability. In this paper, we formalize the above three-party model, discuss concrete application scenarios, and then we design, build, and evaluate ADSNARK, a nearly practical system for proving arbitrary computations over authenticated data in a privacy-preserving manner. ADSNARK improves significantly over state-of-the-art solutions for this model. For instance, compared to corresponding solutions based on Pinocchio (Oakland’13), ADSNARK achieves up to 25× improvement in proof-computation time and a 20× reduction in prover storage space.
Resumo:
The selection of spawning habitat of a population of Octopus vulgaris that is subject to a small-scale exploitation was studied in the Cíes Islands within the National Park of the Atlantic Islands of Galicia (NW Spain). The technique used was visual censuses by scuba diving. We conducted 93 visual censuses from April 2012 to April 2014. The total swept area was 123.69 ha. Habitat features (season, depth, zone, bottom temperature, swept area, bottom substrate type, and creels fishing impact) were evaluated as predictors of the presence/absence of spawning dens using GAM models. O. vulgaris has a noteworthy preference for spawning in areas with hard bottom substrate and moderate depth (approximately 20 m). The higher density of spawning dens (1.08ha−1) was found in a surveyed area of 50.14ha located in the northeastern part of the northern Cíes Island. We propose to protect the area comprised from Punta Escodelo to Punta Ferreiro between 5 and 30 m depth. This area has a surface of 158 ha equivalent to 5.98% of the total marine area of the Cíes islands. The strengths and weaknesses of a management strategy based on the protection of the species’ spawning habitat are discussed.
Resumo:
The blood brain barrier (BBB) and the blood cerebrospinal fluid barrier (BCSFB) form the barriers of the brain. These barriers are essential not only for the protection of the brain, but also in regulating the exchange of cells and molecules in and out of the brain. The choroid plexus (CP) epithelial cells and the arachnoid membrane form the BCSFB. The CP is structurally divided into two independent compartments: one formed by a unique and continuous line of epithelial cells that rest upon a basal lamina; and, a second consisting of a central core formed by connective and highly vascularized tissue populated by diverse cell types (fibroblasts, macrophages and dendritic cells). Here, we review how the CP transcriptome and secretome vary depending on the nature and duration of the stimuli to which the CP is exposed. Specifically, when the peripheral stimulation is acute the CP response is rapid, strong and transient, whereas if the stimulation is sustained in time the CP response persists but it is weaker. Furthermore, not all of the epithelium responds at the same time to peripheral stimulation, suggesting the existence of a synchrony system between individual CP epithelial cells.