34 resultados para Beardsley, Aubrey, 1872-1898.
Resumo:
In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.
Resumo:
The evolution of classic power grids to smart grids creates chances for most participants in the energy sector. Customers can save money by reducing energy consumption, energy providers can better predict energy demand and environment benefits since lower energy consumption implies lower energy production including a decrease of emissions from plants. But information and communication systems supporting smart grids can also be subject to classical or new network attacks. Attacks can result in serious damage such as harming privacy of customers, creating economical loss and even disturb the power supply/demand balance of large regions and countries. In this paper, we give an overview about the German smart measuring architecture, protocols and security. Afterwards, we present a simulation framework which enables researchers to analyze security aspects of smart measuring scenarios.
Resumo:
Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.
Resumo:
Static anaylsis represents an approach of checking source code or compiled code of applications before it gets executed. Chess and McGraw state that static anaylsis promises to identify common coding problems automatically. While manual code checking is also a form of static analysis, software tools are used in most cases in order to perform the checks. Chess and McGraw additionaly claim that good static checkers can help to spot and eradicate common security bugs.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
Google Android, Google's new product and its first attempt to enter the mobile market, might have an equal impact on mobile users like Apple's hyped product, the iPhone. In this Technical report we are going to present the Google Android platform, what Android is, describe why it might be considered as a worthy rival to Apple's iPhone. We will describe parts of its internals, take a look "under the hood" while explaining components of the underlying operating system. We will show how to develop applications for this platform, which difficulties a developer might have to face, and how developers can possibly use other programming languages to develop for Android than the propagated language Java.
Resumo:
A whole-genome scan was conducted to map quantitative trait loci (QTL) for BSE resistance or susceptibility. Cows from four half-sib families were included and 173 microsatellite markers were used to construct a 2835-cM (Kosambi) linkage map covering 29 autosomes and the pseudoautosomal region of the sex chromosome. Interval mapping by linear regression was applied and extended to a multiple-QTL analysis approach that used identified QTL on other chromosomes as cofactors to increase mapping power. In the multiple-QTL analysis, two genome-wide significant QTL (BTA17 and X/Y ps) and four genome-wide suggestive QTL (BTA1, 6, 13, and 19) were revealed. The QTL identified here using linkage analysis do not overlap with regions previously identified using TDT analysis. One factor that may explain the disparity between the results is that a more extensive data set was used in the present study. Furthermore, methodological differences between TDT and linkage analyses may affect the power of these approaches.
Resumo:
This practice-led research examines the generative function of loss in fiction that explores themes of grief and longing. This research considers how loss may be understood as a structuring mechanism through which characters evaluate time, resolve loss and affect future change. The creative work is a work of literary fiction titled A Distance Too Far Away. Aubrey, the story’s protagonist, is a woman in her twenties living in Brisbane in the early 1980s, carving out an independent life for herself away from her family. Through a flashback narrative sequence, told from the perspective of the twelve year narrator, Aubrey retraces a significant point of rupture in her life following a series of family tragedies. A Distance Too Far Away explores the tension between belonging and freedom, and considers how the past provides a malleable space for illuminating desire in order to traverse the gap between the world as it is and the world as we want it to be. The exegetical component of this research considers an alternative critical frame for interpreting the work of American author Anne Tyler, a writer who has had a significant influence on my own practice. Frequently criticised for creating sentimental and inert characters, many critics observe that nothing happens in Tyler’s circular plots. This research challenges these assertions, and through a contextual analysis of Tyler’s Ladder of Years (1995) investigates how Tyler engages with memory and nostalgia in order to move across time and resolve loss.
Resumo:
The invention relates to a method for monitoring user activity on a mobile device, comprising an input and an output unit, comprising the following steps preferably in the following order: detecting and / or logging user activity on said input unit, identifying a foreground running application, hashing of a user-interface-element management list of the foreground running application, and creating a screenshot comprising items displayed on said input unit. The invention also relates to a method for analyzing user activity at a server, comprising the following step: obtaining at least one of an information about detected and / or logged user activity, an information about a foreground running application, a hashed user-interface-element management list and a screenshot from a mobile device. Further, a computer program product is provided, comprising one or more computer readable media having computer executable instructions for performing the steps of at least one of the aforementioned methods.
Resumo:
Spokes-characters are ‘...animated beings or objects, created to promote a product, service or idea’ (Phillips 1996, p.155). They were first used in the late 1800s when they emerged as registered trademarks, but the use of spokes-characters for marketing communications has since grown, owing to their ability to remind consumers about a product, transfer positive associations to a brand, and give a corporate company a more ‘personal’ face (Callcott and Lee 1995). One example is the Michelin Man, who has served as spokes-character for Michelin tyres since 1898, after starting out in print advertising. Spokes-characters have become important brand representatives, no longer seen as simply entertaining cartoons featured in television and magazine advertisements. Corporations have now extended their use to interactive, social media platforms, where a consumer can be ‘friends’ with a spokes-character via Facebook, read their comments on the latest iPhone release through Twitter, and watch their family histories being documented on YouTube (see Figure 1). The interactions that consumers once had with two-dimensional spokes-characters have undergone significant transformation in the digital space. With spokes-character Facebook pages achieving significant numbers of ‘likes’ and interactions with consumers, one question concerns whether this strategy is creating characters that are more engaging than the brands they represent, and what impact this has on brand outcomes.
Resumo:
Background and aims: The assessment of intra-epidermal nerve fiber density (IENFD) in skin biopsies and corneal nerve fiber density (CNFD) using corneal confocal microscopy (CCM) provides promising techniques to detect small nerve fiber damage in patients with peripheral neuropathy. To help define the clinical utility of each of these techniques in patients with diabetic neuropathy we have assessed sensitivity and specificity of IENFD and CNFD in predicting the following: 1) diabetic polyneuropathy (DPN); 2) risk of foot ulceration (RFU); 3) initial small fiber neuropathy (iSFN); 4) severe small fiber neuropathy (sSFN)...
Resumo:
Human infection with a novel low pathogenicity influenza A(H7N9) virus in eastern China has recently raised global public health concerns (1). The geographic sources of infection have yet to be fully clarified, and confirmed human cases from 1 province have not been linked to those from other provinces. While some studies have identified epidemiologic characteristics of subtype H7N9 cases and clinical differences between these cases and cases of highly pathogenic influenza A(H5N1), another avian influenza affecting parts of China (2–4), the spatial epidemiology of human infection with influenza subtypes H7N9 and H5N1 in China has yet to be elucidated. To test the hypothesis of co-distribution of high-risk clusters of both types of infection, we used all available data on human cases in mainland China and investigated the geospatial epidemiologic features...
Resumo:
This paper presents the results of an experimental program for evaluating sensors and sensing technologies in an underground mining applications. The objective of the experiments is to infer what combinations of sensors will provide reliable navigation systems for autonomous vehicles operating in a harsh underground environment. Results from a wide range of sensors are presented and analysed. Conclusions as to a best combination of sensors are drawn.
Resumo:
PURPOSE To determine the prevalence of refractive errors in Shiraz schoolchildren by age and gender. METHODS For this cross-sectional study, random cluster sampling was carried out from students of the 2008-2009 academic year. After the initial interview, ophthalmic examinations including tests of visual acuity, non-cycloplegic and cycloplegic refraction and binocular vision were performed. Myopia was defined as a spherical equivalent < or =-0.50 dioptre (D), hyperopia as > or =+2.0 D, and astigmatism as a cylinder refraction > or =0.75 D. All values for school grade and gender were directly standardized based on the total student population in the 2008-2009 school year. RESULTS A total of 2130 students were sampled, of which 1872 participated in the study (response rate = 87.88%). The prevalence of uncorrected, best-corrected, presenting and spectacle corrected visual acuity of 6/12 or worse in the better eye was 6.46%, 0%, 1.49% and 0.9%, respectively. The prevalence rates of myopia, hyperopia and astigmatism were 4.35% (95% confidence interval [CI]: 2.89-5.82%), 5.04% (95% CI: 3.50-6.58%), and 11.27% (95% CI: 9.81-12.74%), respectively. Anisometropia was detected in 2.58% of schoolchildren. The prevalence of hyperopia significantly decreased with age (P = 0.021). CONCLUSIONS Compared with other reported rates, the prevalence of myopia in the schoolchildren of Shiraz is similar to that in most places excluding East Asian countries, and that of hyperopia is in the mid range.
Resumo:
Purpose: To determine the prevalence and risk factors of refractive errors among schoolchildren in Shiraz, Iran. Methods: In a cross-sectional study, using random cluster sampling, 3065 Shiraz schoolchildren were selected in this study. The participants totaled 2683; 1872 elementary and middle school and 811 high school students. For the primary and middle schoolchildren, cycloplegic refraction and for the high school students, non-cycloplegic autorefraction was measured. Myopia, defined as spherical equivalent (SE) refraction -0.50 diopter (D) or worse, hyperopia as SE +2.00D and +0.50D or more for cycloplegic and noncycloplegic refractions respectively, and astigmatism as cylinder -0.75D or worse. Results: The prevalence of refractive errors in elementary and middle school students was: myopia 4.35 % (95% confidence interval (CI), 2.89 -5.81), hyperopia 5.04 % (95%CI, 3.49 -6.58) and astigmatism 11.79 % (95%CI, 10.21 -13.38). For high school students, these rates were 22.4 % (95%CI, 18.44 -26.36), 10.52 % (95%CI, 6.75 -14.29) and 20.99% (95%CI, 16.55 -25.44), respectively.The prevalence of myopia increased with age in primary and middle school students (OR=1.15, 95% CI, 0.98 to1.33, p=0.073). Conclusions: The result of this study indicated a relatively low prevalence of refractive errors among schoolchildren in Shiraz according to the protocol by "Refractive Error Study in Children" (RESC) in other investigations.