716 resultados para Guest-host systems

em Queensland University of Technology - ePrints Archive


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The discovery of mesoporous molecular sieves, MCM-41, which possesses a regular hexagonal array of uniform pore openings, aroused a worldwide resurgence in this field. This is not only because it has brought about a series of novel mesoporous materials with various compositions which may find applications in catalysis, adsorption, and guest-host chemistry, but also it has opened a new avenue for creating zeotype materials. This paper presents a comprehensive overview of recent advances in the field of MCM-41. Beginning with the chemistry of surfactant/silicate solutions, progresses made in design and synthesis, characterization, and physicochemical property evaluation of MCM-41 are enumerated. Proposed formation mechanisms are presented, discussed, and identified. Potential applications are reviewed and projected. More than 100 references are cited.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Stimulated by the efficacy of copper (I) catalysed Huisgen-type 1,3-dipolar cycloaddition of terminal alkynes and organic azides to generate 1,4-disubstituted 1,2,3-triazole derivatives, the importance of ‘click’ chemistry in the synthesis of organic and biological molecular systems is ever increasing.[1] The mild reaction conditions have also led to this reaction gaining favour in the construction of interlocked molecular architectures.[2-4] In the majority of cases however, the triazole group simply serves as a covalent linkage with no function in the resulting organic molecular framework. More recently a renewed interest has been shown in the transition metal coordination chemistry of triazole ligands.[3, 5, 6] In addition novel aryl macrocyclic and acyclic triazole based oligomers have been shown to recognise halide anions via cooperative triazole C5-H….anion hydrogen bonds.[7] In light of this it is surprising the potential anion binding affinity of the positively charged triazolium motif has not, with one notable exception,[8] been investigated. With the objective of manipulating the unique topological cavities of mechanically bonded molecules for anion recognition purposes, we have developed general methods of using anions to template the formation of interpenetrated and interlocked structures.[9-13] Herein we report the first examples of exploiting the 1,2,3-triazolium group in the anion templated formation of pseudorotaxane and rotaxane assemblies. In an unprecedented discovery the bromide anion is shown to be a superior templating reagent to chloride in the synthesis of a novel triazolium axle containing [2]rotaxane. Furthermore the resulting rotaxane interlocked host system exhibits the rare selectivity preference for bromide over chloride...

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study has provided further understanding of the pathogenesis of EV71, one of the major etiological agents associated with significant mortality in Hand, Foot and Mouth disease. Elucidating the host-pathogen interaction and the mechanism that the virus uses to bypass host defence systems to establish infection will aid in the development of potential antiviral therapeutics against EV71.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Jericho kimberlite (173.1. ±. 1.3. Ma) is a small (~. 130. ×. 70. m), multi-vent system that preserves products from deep (>. 1. km?) portions of kimberlite vents. Pit mapping, drill core examination, petrographic study, image analysis of olivine crystals (grain size distributions and shape studies), and compositional and mineralogical studies, are used to reconstruct processes from near-surface magma ascent to kimberlite emplacement and alteration. The Jericho kimberlite formed by multiple eruptions through an Archean granodiorite batholith that was overlain by mid-Devonian limestones ~. 1. km in thickness. Kimberlite magma ascended through granodiorite basement by dyke propagation but ascended through limestone, at least in part, by locally brecciating the host rocks. After the first explosive breakthrough to surface, vent deepening and widening occurred by the erosive forces of the waxing phase of the eruption, by gravitationally induced failures as portions of the vent margins slid into the vent and, in the deeper portions of the vent (>. 1. km), by scaling, as thin slabs burst from the walls into the vent. At currently exposed levels, coherent kimberlite (CK) dykes (<. 40. cm thick) are found to the north and south of the vent complex and represent the earliest preserved in-situ products of Jericho magmatism. Timing of CK emplacement on the eastern side of the vent complex is unclear; some thick CK (15-20. m) may have been emplaced after the central vent was formed. Explosive eruptive products are preserved in four partially overlapping vents that are roughly aligned along strike with the coherent kimberlite dyke. The volcaniclastic kimberlite (VK) facies are massive and poorly sorted, with matrix- to clast-supported textures. The VK facies fragmented by dry, volatile-driven processes and were emplaced by eruption column collapse back into the volcanic vents. The first explosive products, poorly preserved because of partial destruction by later eruptions, are found in the central-east vent and were formed by eruption column collapse after the vent was largely cleared of country rock debris. The next active vent was either the north or south vent. Collapse of the eruption column, linked to a vent widening episode, resulted in coeval avalanching of pipe margin walls into the north vent, forming interstratified lenses of country rock-rich boulder breccias in finer-grained volcaniclastic kimberlite. South vent kimberlite has similar characteristics to kimberlite of the north vent and likely formed by similar processes. The final eruptive phase formed olivine-rich and moderately sorted deposits of the central vent. Better sorting is attributed to recycling of kimberlite debris by multiple eruptions through the unconsolidated volcaniclastic pile and associated collapse events. Post-emplacement alteration varies in intensity, but in all cases, has overprinted the primary groundmass and matrix, in CK and VK, respectively. Erosion has since removed all limestone cover.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cities are the most dramatic manifestations of human activities on the surface of the earth. These human-dominated organisms—i.e., cities—degrade natural habitats, simplify species composition, disrupt hydrological systems, and modify energy flow and nutrient cycling. Today, these consequential impacts of human activities, originated from population increase, rapid urbanization, high private motor vehicle dependency, deregulated industrialization and mass livestock production, are increasing exponentially and causing great deal of environmental, social, and economic challenges both at global and local scales. In such a situation, establishment of sustainable cities, through sustainable urban development practices, is seen as a potential panacea to combat these challenges responsibly, effectively, and efficiently. This paper offers a critical review of the key literature on the issues relating to planning, development and management of sustainable cities, introduces the contributions from the Special Issue, and speculates on the prospective research directions to place necessary mechanisms to secure a sustainable urban future for all.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries are also often of unknown provenance and quality and may contain accidental bugs or, in some cases, deliberately malicious code. Most sandboxing techniques which address these issues require recompilation of the libraries using custom tool chains, require significant modifications to the libraries, do not retain the benefits of single address-space programming, do not completely isolate guest code, or incur substantial performance overheads. In this paper we present LibVM, a sandboxing architecture for isolating libraries within a host application without requiring any modifications to the shared libraries themselves, while still retaining the benefits of a single address space and also introducing a system call inter-positioning layer that allows complete arbitration over a shared library’s functionality. We show how to utilize contemporary hardware virtualization support towards this end with reasonable performance overheads and, in the absence of such hardware support, our model can also be implemented using a software-based mechanism. We ensure that our implementation conforms as closely as possible to existing shared library manipulation functions, minimizing the amount of effort needed to apply such isolation to existing programs. Our experimental results show that it is easy to gain immediate benefits in scenarios where the goal is to guard the host application against unintentional programming errors when using shared libraries, as well as in more complex scenarios, where a shared library is suspected of being actively hostile. In both cases, no changes are required to the shared libraries themselves.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A planar polynomial differential system has a finite number of limit cycles. However, finding the upper bound of the number of limit cycles is an open problem for the general nonlinear dynamical systems. In this paper, we investigated a class of Liénard systems of the form x'=y, y'=f(x)+y g(x) with deg f=5 and deg g=4. We proved that the related elliptic integrals of the Liénard systems have at most three zeros including multiple zeros, which implies that the number of limit cycles bifurcated from the periodic orbits of the unperturbed system is less than or equal to 3.