3 resultados para Password
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)
Resumo:
O objetivo deste estudo foi avaliar, utilizando diferentes indicadores antropométricos, o estado nutricional dos idosos de Fortaleza. Este estudo é de base populacional, do tipo transversal, com coleta de dados primários. As variáveis antropométricas analisadas foram: índice de massa corporal (IMC), dobra cutânea tricipital (DCT) e circunferência muscular do braço (CMB). O estado nutricional foi definido a partir dos diagnósticos obtidos com a análise das variáveis antropométricas: eutrófico (idoso, no qual as três variáveis antropométricas (IMC, DCT e CMB), simultaneamente, indicassem o estado de eutrofia, segundo os padrões adotados) e não eutrófico (demais idosos). Foram selecionados 385 domicílios para comporem a amostra deste estudo, nos quais foram entrevistados 483 idosos (68% mulheres). Quanto ao IMC, 47,3% do total de idosos foram considerados eutróficos. As mulheres apresentaram maior proporção de valores de IMC excessivo (21,9%), quando comparadas aos homens (13,5%). Foi verificada associação estatisticamente significativa entre adequação de IMC e sexo. Os valores de DCT mostraram que 54,4% do total de idosos eram eutróficos. Não houve associação estatisticamente significativa entre a adequação da DCT e sexo. Quanto à CMB, os homens apresentaram maior prevalência de desnutrição (66,5%), quando comparados às mulheres (40,6%). Foi verificada associação estatisticamente significativa entre adequação da CMB e sexo. Ao verificar o estado nutricional por meio das variáveis antropométricas, observou-se que 83,9% dos homens foram considerados não eutróficos, assim como maior parte das mulheres (74,2%). Foi observada associação estatisticamente significativa entre estado nutricional e sexo. Os idosos de Fortaleza apresentam estado nutricional vulnerável, visto as prevalências de não eutróficos
Resumo:
A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
Resumo:
In this work, we identify the set of time-dependent pure states building the statistical mixture to which a system, initially in a pure state, is driven by the reservoir. This set of time-dependent pure states, composing what we term a pure basis, are those that diagonalize the reduced density operator of the system. Next, we show that the evolution of the pure-basis states reveals an interesting phenomenon as the system, after decoherence, evolves toward the equilibrium: the spontaneous recoherence of quantum states. Around our defined recoherence time, the statistical mixture associated with a special kind of initial states termed even-symmetric, spontaneously undergoes a recoherence process, by which the initial state of the system emerges from the mixture except for its reduced excitation drained into the reservoir. This phenomenon reveals that the reservoir only shuffle the original information carried out by the initial state of the system instead of erasing it. Moreover, as the spontaneously recohered state occurs only for asymptotic time, we also present a protocol to extract it from the mixture through specific projective measurements. The password to retrieve the original information stems is the knowledge of both the initial state itself and the associated pure basis. A definition of the decoherence time of an N-state superposition is also presented.