324 resultados para Interfaccia, Javascript, jQuery, Ajax, JSP, Servlet


Relevância:

10.00% 10.00%

Publicador:

Resumo:

E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose a new blind steganalytic method to detect the presence of secret messages embedded in black and white images using the steganographic techniques. We start by extracting several sets of matrix, such as run length matrix, gap length matrix and pixel difference. We also apply characteristic function on these matrices to enhance their discriminative capabilities. Then we calculate the statistics which include mean, variance, kurtosis and skewness to form our feature sets. The presented empirical works demonstrate our proposed method can effectively detect three different types of steganography. This proves the universality of our proposed method as a blind steganalysis. In addition, the experimental results show our proposed method is capable of detecting small amount of the embedded message.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose a new steganalytic method to detect the message hidden in a black and white image using the steganographic technique developed by Liang, Wang and Zhang. Our detection method estimates the length of hidden message embedded in a binary image. Although the hidden message embedded is visually imperceptible, it changes some image statistic (such as inter-pixels correlation). Based on this observation, we first derive the 512 patterns histogram from the boundary pixels as the distinguishing statistic, then we compute the histogram difference to determine the changes of the 512 patterns histogram induced by the embedding operation. Finally we propose histogram quotient to estimate the length of the embedded message. Experimental results confirm that the proposed method can effectively and reliably detect the length of the embedded message.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cleaning of sugar mill evaporators is an expensive exercise. Identifying the scale components assists in determining which chemical cleaning agents would result in effective evaporator cleaning. The current methods (based on x-ray diffraction techniques, ion exchange/high performance liquid chromatography and thermogravimetry/differential thermal analysis) used for scale characterisation are difficult, time consuming and expensive, and cannot be performed in a conventional analytical laboratory or by mill staff. The present study has examined the use of simple descriptor tests for the characterisation of Australian sugar mill evaporator scales. Scale samples were obtained from seven Australian sugar mill evaporators by mechanical means. The appearance, texture and colour of the scale were noted before the samples were characterised using x-ray fluorescence and x-ray powder diffraction to determine the compounds present. A number of commercial analytical test kits were used to determine the phosphate and calcium contents of scale samples. Dissolution experiments were carried out on the scale samples with selected cleaning agents to provide relevant information about the effect the cleaning agents have on different evaporator scales. Results have shown that by simply identifying the colour and the appearance of the scale, the elemental composition and knowing from which effect the scale originates, a prediction of the scale composition can be made. These descriptors and dissolution experiments on scale samples can be used to provide factory staff with an on-site rapid process to predict the most effective chemicals for chemical cleaning of the evaporators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Developments in evaporator cleaning have accelerated in the past 10 years as a result of an extended period of research into scale formation and scale composition. Chemical cleaning still provides the most cost effective method of cleaning the evaporators. The paper describes a system that was designed to obtain on-line samples of evaporator scale negating the need to open up hot evaporator vessels for scale collection. This system was successfully implemented in a number of evaporators at a sugar mill. This paper also describes a recent experience in a sugar factory in which the cleaning procedure was slightly modified, resulting in effective removal of intractable scale.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The legal arrangements for the management of water resources are currently a complex matrix of rules of various kinds. These rules perform a diverse range of functions. Some are part of what may be described as the macro-legal system for the governance of water resources. This includes paralegal rules in the form of statements of value, objective, outcome or principles . Others are part of the micro-legal system for the governance of water resources. This includes traditional legal rules in the form of statements of standards in relation to individual conduct, behaviour or decision making. These legal arrangements may be international, regional, national or local. Accordingly some apply to nation states within the international community. Others apply to the regulatory agencies making decisions about water resources within nation states. Ultimately most of these legal arrangements apply to those who use and develop water resources for particular purposes and in particular locations. In accordance with this framework, rules explain how water resources should be used in particular circumstances and how decisions should be made to ensure the effective planning and regulation of water resources.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Property in an elusive concept. In many respects it has been regarded as a source of authority to use, develop and make decisions about whatever is the subject matter of this right of ownership. This is true whether the holder of this right of ownership is a private entity or a public entity. Increasingly a right of ownership of this kind has been recognised not only as a source of authority but also as a mechanism for restricting or limiting and perhaps even prohibiting existing or proposed activities that impact upon the environment. It is increasingly therefore an instrument of control as much as an instrument of authorisation. The protection and conservation of the environment are ultimately a matter of the public interest. This is not to suggest that the individual holders of rights of ownership are not interested in protecting the environment. It is open to them to do so in the exercise of a right of ownership as a source of authorisation. However a right of ownership – whether private or public – has become increasingly the instrument according to which the environment is protected and conserved. This article addresses these issues from a doctrinal as well as a practical perspective about how the environment is managed. It does so in five ways: ●considering briefly property as a concept ●reviewing property in its historical context ●analysing property as a human right ●examining property in natural resources ●reviewing judicial approaches to property in natural resources.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is an increasing need for biodegradable, environmentally friendly plastics to replace the petroleum-based non-degradable plastics which litter and pollute the environment. Starch-based plastic film composites are becoming a popular alternative because of their low cost, biodegradability, the abundance of starch, and ease with which starch-based films can be chemically modified. This paper reports on the results of using sugar cane bagasse nanofibres to improve the physicochemical properties of starch-based polymers. The addition of bagasse nanofibre (2.5, 5, 10 or 20 wt%) to (modified) potato starch (‘Soluble starch’) reduced the moisture uptake by up to 17 % at 58 % relative humidity (RH). The film’s tensile strength and Young’s Modulus increased by up to 100 % and 200 % with 10 wt% and 20 wt% nanofibre respectively at 58% RH. The tensile strain reduced by up to 70 % at 20 wt% fibre loading. These results indicate that addition of sugar cane bagasse nanofibres significantly improved the properties of starch-based plastic films

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper considers the design of active control for car suspension systems using a particular form of energy-based control called Interconnection-and-Damping-Assignment Passivity-Based Control (IDA-PBC). This approach allows one to shape the kinetic and potential energy as well as modify the power flow among different components of the system by changing the interconnection and dissipative structure in a meaningful way. Different controller parameterisations are considered to design a class of controllers for active suspension systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose a framework for joint allocation and constrained control design of flight controllers for Unmanned Aircraft Systems (UAS). The actuator configuration is used to map actuator constraint set into the space of the aircraft generalised forces. By constraining the demanded generalised forces, we ensure that the allocation problem is always feasible; and therefore, it can be solved without constraints. This leads to an allocation problem that does not require on-line numerical optimisation. Furthermore, since the controller handles the constraints, and there is no need to implement heuristics to inform the controller about actuator saturation. The latter is fundamental for avoiding Pilot Induced Oscillations (PIO) in remotely operated UAS due to the rate limit on the aircraft control surfaces.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a novel control strategy for trajectory tracking of marine vehicles manoeuvring at low speed. The model of the marine vehicle is formulated as a Port-Hamiltonian system, and the tracking controller is designed using energy shaping and damping assignment. The controller guarantees global asymptotic stability and includes integral action for output variables with relative degree greater than one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We identify relation completion (RC) as one recurring problem that is central to the success of novel big data applications such as Entity Reconstruction and Data Enrichment. Given a semantic relation, RC attempts at linking entity pairs between two entity lists under the relation. To accomplish the RC goals, we propose to formulate search queries for each query entity α based on some auxiliary information, so that to detect its target entity β from the set of retrieved documents. For instance, a pattern-based method (PaRE) uses extracted patterns as the auxiliary information in formulating search queries. However, high-quality patterns may decrease the probability of finding suitable target entities. As an alternative, we propose CoRE method that uses context terms learned surrounding the expression of a relation as the auxiliary information in formulating queries. The experimental results based on several real-world web data collections demonstrate that CoRE reaches a much higher accuracy than PaRE for the purpose of RC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the modeling and position-sensorless vector control of a dual-airgap axial flux permanent magnet (AFPM) machine optimized for use in flywheel energy storage system (FESS) applications. The proposed AFPM machine has two sets of three-phase stator windings but requires only a single power converter to control both the electromagnetic torque and the axial levitation force. The proper controllability of the latter is crucial as it can be utilized to minimize the vertical bearing stress to improve the efficiency of the FESS. The method for controlling both the speed and axial displacement of the machine is discussed. An inherent speed sensorless observer is also proposed for speed estimation. The proposed observer eliminates the rotary encoder, which in turn reduces the overall weight and cost of the system while improving its reliability. The effectiveness of the proposed control scheme has been verified by simulations and experiments on a prototype machine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ability of cloud computing to provide almost unlimited storage, backup and recovery, and quick deployment contributes to its widespread attention and implementation. Cloud computing has also become an attractive choice for mobile users as well. Due to limited features of mobile devices such as power scarcity and inability to cater computationintensive tasks, selected computation needs to be outsourced to the resourceful cloud servers. However, there are many challenges which need to be addressed in computation offloading for mobile cloud computing such as communication cost, connectivity maintenance and incurred latency. This paper presents taxonomy of the computation offloading approaches which aim to address the challenges. The taxonomy provides guidelines to identify research scopes in computation offloading for mobile cloud computing. We also outline directions and anticipated trends for future research.