60 resultados para Router ottico, Click, Reti ottiche, linux
em Queensland University of Technology - ePrints Archive
Resumo:
This paper reports findings from a study investigating the effect of integrating sponsored and nonsponsored search engine links into a single web listing. The premise underlying this research is that web searchers are chiefly interested in relevant results. Given the reported negative bias that web searchers have concerning sponsored links, separate listings may be a disservice to web searchers as it might not direct them to relevant websites. Some web meta-search engines integrate sponsored and nonsponsored links into a single listing. Using a web search engine log of over 7 million interactions from hundreds of thousands of users from a major web meta-search engine, we analysed the click-through patterns for both sponsored and nonsponsored links. We also classified web queries as informational, navigational and transactional based on the expected type of content and analysed the click-through patterns of each classification. The findings show that for more than 35% of queries, there are no clicks on any result. More than 80% of web queries are informational in nature and approximately 10% are transactional, and 10% navigational. Sponsored links account for approximately 15% of all clicks. Integrating sponsored and nonsponsored links does not appear to increase the clicks on sponsored listings. We discuss how these research results could enhance future sponsored search platforms.
Resumo:
Novel profluorescent nitroxides bearing a triazole linker between the coumarin fluorophore and an isoindoline nitroxide were prepared in good yields using the coppercatalyzed azide�alkyne 1,3-dipolar cycloaddition reaction (CuAAC). Nitroxides containing 7-hydroxy and 7-diethylamino substitution on their coumarin rings displayed significant fluorescence suppression, and upon reaction with methyl radicals, normal fluorescence emission was returned. The fluorescence emission for the 7-hydroxycoumarin nitroxide and its diamagnetic analogue was found to be strongly influenced by pH with maximal fluorescence emission achieved in basic solution. Solvent polarity was also shown to affect fluorescence emission. The significant difference in fluorescence output between the nitroxides and their corresponding diamagnetic analogues makes these compounds ideal tools for monitoring processes involving free-radical species.
Resumo:
This project focused on the first application of the copper catalyzed azide alkyne cycloaddition reaction for the generation of novel profluorescent systems. Through this approach four novel profluorescent nitroxides were prepared both rapidly and in good yield from coumarin and nitroxide CuAAC coupling partners. Specifically, 7-hydroxy, 7-diethylamino, 6-bromo and unsubstituted coumarin analogues bearing an azide group in the 3-position were prepared and conjugatively joined to an alkyne isoindoline nitroxide previously reported by our group. To explore the impact of the nitroxide moiety on the fluorescence of these systems, methoxyamine analogues of the corresponding nitroxide analogues were prepared. Spectrophotometric analysis of these methoxyamine analogues revealed that the aromatic systems possessed high quantum yields. However, the quantum yield efficiency was found to be dependent on the presence of electron donating substituents in the 7-position of the coumarin motif, which enhanced the charge-transfer character of the system. Furthermore, spectrophotometric analysis of nitroxide analogues demonstrated that the triazole effectively mediated fluorophore-nitroxide communication, as evidenced by the low quantum yield values of the nitroxide analogues. These results suggest that this technique can be used to conjugatively join any azide bearing fluorescent system with the key alkyne isoindoline coupling partner allowing for the rapid generation of diverse profluorescent systems.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.
Resumo:
To the editor...
Resumo:
Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.
Resumo:
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.
Resumo:
Herein we describe the design and synthesis of a series of solid-tethered [2]rotaxanes utilising crown ether-naphthalene diimide or crown ether- bipyridinium host guest interactions. TentaGel polystyrene resins were initially modified in a two-stage procedure to azide functionalised beads before the target supramolecular architectures were attached using a copper catalysed “click” procedure. The final assembly was examined using IR spectroscopy and gel-phase 1H High Resolution Magic Angle Spinning (HR MAS) NMR spectroscopy. The HR MAS technique enabled a direct comparison between the solid-tethered architectures and the synthesis and characterisation of analogous solution-based [2]rotaxanes to be made.
Resumo:
This paper traces the process of invention of adoption of WriteCite.com which is an internet based learning tool used by students to format citation lists. A number of theoretical issues relating to development and deployment of online learning tools are addressed in this paper. A significant finding in this paper is that adoption rate of new technologies amongst students, in this case for WriteCite.com, is not immediately global in nature despite the internet's ubiquity and the existence of internationally accepted bibliographic styles. Rather, and in contrast to neo theories of technology internationalisation, early-stage adoption tends to be geo-centric and concentrated in the US. In the case of WriteCite.com, which has not been sponsored by an academic institution, the findings reflect voluntary rates of globa adoption. From an applied perspective, the process of identifying globally contestable markets is relevant to developers of online learning tools.
Resumo:
A rapid and catalyst-free cycloaddition system for visible-light-induced click chemistry is reported. A readily accessible photoreactive 2H-azirine moiety was designed to absorb light at wavelengths above 400 nm. Irradiation with low-energy light sources thus enables efficient small-molecule synthesis with a diverse range of multiple-bond-containing compounds. Moreover, in order to demonstrate the efficiency of the current approach, quantitative ligation of the photoactivatable chromophore with functional polymeric substrates was performed and full conversion with irradiation times of only 1 min at ambient conditions was achieved. The current report thus presents a highly efficient method for applications involving selective cycloaddition to electron-deficient multiple-bond-containing materials.
Resumo:
Methacrylate-based hydrogels, such as homo- and copolymers of 2-hydroxyethyl methacrylate (HEMA), have demonstrated significant potential for use in biomedical applications. However, many of these hydrogels tend to resist cell attachment and growth at their surfaces, which can be detrimental for certain applications. In this article, glycidyl methacrylate (GMA) was copolymerized with HEMA to generate gels functionalized with epoxide groups. The epoxides were then functionalized by two sequential click reactions, namely, nucleophilic ring opening of epoxides with sodium azide and then coupling of small molecules and peptides via Huisgen's copper catalyzed 1,3-dipolar cycloaddition of azides with alkynes. Using this strategy it was possible to control the degree of functionalization by controlling the feed ratio of monomers during polymerization. In vitro cell culture of human retinal pigment epithelial cell line (ARPE-19) with the hydrogels showed improved cell adhesion, growth and proliferation for hydrogels that were functionalized with a peptide containing the RGD sequence. In addition, the cell attachment progressively decreased with increasing densities of the RGD containing peptide. In summary, a facile methodology has been presented that gives rise to hydrogels with controlled degrees of functionality, such that the cell response is directly related to the levels and nature of that functionality.
Resumo:
Abstract - Mobile devices in the near future will need to collaborate to fulfill their function. Collaboration will be done by communication. We use a real world example of robotic soccer to come up with the necessary structures required for robotic communication. A review of related work is done and it is found no examples come close to providing a RANET. The robotic ad hoc network (RANET) we suggest uses existing structures pulled from the areas of wireless networks, peer to peer and software life-cycle management. Gaps are found in the existing structures so we describe how to extend some structures to satisfy the design. The RANET design supports robot cooperation by exchanging messages, discovering needed skills that other robots on the network may possess and the transfer of these skills. The network is built on top of a Bluetooth wireless network and uses JXTA to communicate and transfer skills. OSGi bundles form the skills that can be transferred. To test the nal design a reference implementation is done. Deficiencies in some third party software is found, specifically JXTA and JamVM and GNU Classpath. Lastly we look at how to fix the deciencies by porting the JXTA C implementation to the target robotic platform and potentially eliminating the TCP/IP layer, using UDP instead of TCP or using an adaptive TCP/IP stack. We also propose a future areas of investigation; how to seed the configuration for the Personal area network (PAN) Bluetooth protocol extension so a Bluetooth TCP/IP link is more quickly formed and using the STP to allow multi-hop messaging and transfer of skills.
Resumo:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.