11 resultados para secure payments
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)
Resumo:
A macrodynamic model is proposed in which the real exchange rate and the elasticity of labour supply interact defining different trajectories of growth and income distribution in a developing economy. Growth depends on imports of capital goods which are paid with exports (there are no capital flows) and hence is constrained by equilibrium in current account. The role of the elasticity of labour supply is to prevent the real exchange rate from appreciating as the economy grows, thereby sustaining international competitiveness. The model allows for endogenous technological change and considers the impact of migration from the subsistence to the modern sector on the cumulative (Kaldor-Verdoorn) process of learning.
Resumo:
This paper contributes to the literature on balance-of-payments constrained growth by investigating how structural change identified with changes in the sectoral composition of exports and imports affects the external constraint We test both the original and a multisectoral version of Thirlwall`s law for a sample of Latin American and Asian countries The original Thirlwall s law is found to hold for all sample countries except South Korea, whereas the multisectoral analogue holds for all of them As the sectoral composition of exports and imports is found to matter for growth we analyze the evolution of each country`s weighted trade income elasticities
Resumo:
A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
Resumo:
O advento da terapia anti-retroviral de alta potência (HAART) alterou a história natural da aids, diminuindo sua mortalidade e a incidência de doenças oportunistas e aumentando a esperança de vida das pessoas vivendo com aids.Como uma doença crônica, outras questões passam a ser relevantes, entre elas a adesão ao tratamento, seus efeitos adversos e a qualidade de vida das pessoas nessa condição. A CIF constitui um instrumento adequado para identificar as características da funcionalidade, do ambiente e condições pessoais que interferem na qualidade de vida. Instrumentos para a sua aplicação, core sets, têm sido desenvolvidos para várias condições de saúde. Com o objetivo de propor um core set para aids, foram desenvolvidas duas etapas preliminares do modelo proposto para a construção desses instrumentos. A primeira etapa, de revisão sistemática buscou no MEDLINE artigos com descritores HAART e qualidade de vida, publicados em inglês, de 2000 a 2004. Foram selecionados 31 estudos que resultou em 87 conceitos dos quais 66 puderam ser identificados como categorias da CIF. Estas formaram as perguntas da entrevista aplicada em 42 voluntários, pacientes de um centro de referência para DST e Aids de São Paulo. Entre as condições mais freqüentemente associadas ao tratamento, estão às mudanças na imagem corporal, conseqüência da lipodistrofia, apontada em 84 por cento dos estudos e em 93 por cento das entrevistas. Alterações das funções digestivas, das relações íntimas, e das funções sexuais foram condições importantes identificadas no estudo. As duas etapas definiram 40 categorias da CIF como proposta preliminar de um core set para pacientes com aids
Resumo:
Objetivos: Avaliar a limitação de atividades e a participação social em indivíduos portadores de diabetes melito tipo 2. Métodos: Foram avaliados 79 pacientes, utilizando-se a escala SALSA (Screening of Activity Limitation and Safety Awareness - Triagem de Limitação de Atividade e Consciência de Risco), e a escala de Participação, que abrange oito das nove principais áreas da vida definidas na Classificação Internacional de Funcionalidade, Incapacidade e Saúde (CIF) da OMS. Resultados: A idade média dos participantes foi 61,6 ± 9,8 anos, sendo 55,7 por cento do sexo feminino, 68,4 por cento com companheiro(a), 32,9 por cento com renda até 3 salários mínimos e em 13,9 por cento o diabete influenciou na ocupação. O tempo médio de doença foi 10,3 ± 8,9 anos. Tratamento de 39,3 por cento dos participantes foi com insulina, 70,9 por cento com medicação oral, 51,9 por cento com dieta e 45,6 por cento com exercícios físicos. 48,1 por cento apresentavam alguma complicação da doença. A média de pontos SALSA foi 26,5 ± 11,6 e houve maior pontuação quando o tempo de doença foi superior a 10 anos. Com a evolução do diabetes, pode haver necessidade de insulinoterapia, aparecem as complicações, que podem interferir na ocupação. Estes fatores parecem contribuir para a limitação de atividade. A média de pontos na Escala de Participação foi 9,8±10,9, com maior pontuação quando os entrevistados consideraram sua saúde física alterada no último ano e faziam uso de insulina. Conclusões: A limitação de atividades no diabetes melito tipo 2 se associou ao tempo de doença, com possível contribuição de fatores que ocorrem com sua evolução. Auto-avaliação de saúde física alterada e insulinoterapia se associaram a restrição social
Resumo:
Objective: to examine how adolescent fathers experience recurring parenthood. Design: qualitative study with a social phenomenological focus. Participants: five fathers between 16 and 19 years of age, each with two children. Findings: the participants perceived themselves as mature, responsible, worried about the care and education of their children, and desiring a secure future life. These factors made them seek employment, their own home, marital stability, construction of a family and return to school. They experienced the ambivalence of desiring one reality and living another, given that, as adolescent parents, they regretted the loss of their freedom. Key conclusions: recurring parenthood in adolescence is a complex phenomenon, with many possible perceptions. The diverse experiences depend on the social context that is defined by the wishes, plans, possibilities and meanings of each distinct social class. Implications for practice: care delivery to these adolescents should consider not only theoretical and chronobiological aspects, but also the experiences of these young people and the psychosocial and cultural factors involved in their fatherhood. (c) 2008 Elsevier Ltd. All rights reserved.
Resumo:
A secure communication system based on the error-feedback synchronization of the electronic model of the particle-in-a-box system is proposed. This circuit allows a robust and simple electronic emulation of the mechanical behavior of the collisions of a particle inside a box, exhibiting rich chaotic behavior. The required nonlinearity to emulate the box walls is implemented in a simple way when compared with other analog electronic chaotic circuits. A master/slave synchronization of two circuits exhibiting a rich chaotic behavior demonstrates the potentiality of this system to secure communication. In this system, binary data stream information modulates the bifurcation parameter of the particle-in-a-box electronic circuit in the transmitter. In the receiver circuit, this parameter is estimated using Pecora-Carroll synchronization and error-feedback synchronization. The performance of the demodulation process is verified through the eye pattern technique applied on the recovered bit stream. During the demodulation process, the error-feedback synchronization presented better performance compared with the Pecora-Carroll synchronization. The application of the particle-in-a-box electronic circuit in a secure communication system is demonstrated.
Resumo:
We describe a one-time signature scheme based on the hardness of the syndrome decoding problem, and prove it secure in the random oracle model. Our proposal can be instantiated on general linear error correcting codes, rather than restricted families like alternant codes for which a decoding trapdoor is known to exist. (C) 2010 Elsevier Inc. All rights reserved,
Resumo:
In this paper, a novel adaptive strategy to obtain technically justified fault-ride-through requirements for wind turbines (WTs) is proposed. The main objective is to promote an effective integration of wind turbines into power systems with still low penetration levels of wind power based on technical and economical considerations. The level of requirement imposed by the strategy is increased stepwise over time, depending on system characteristics and on wind power penetration level. The idea behind is to introduce stringent requirements only when they are technically needed for a reliable and secure power system operation. Voltage stability support and fault-ride-through requirements are considered in the strategy. Simulations are based on the Chilean transmission network, a midsize isolated power system with still low penetration levels of wind power. Simulations include fixed speed induction generators and doubly fed induction generators. The effects on power system stability of the wind power injections, integrated into the network by adopting the adaptive strategy, are compared with the effects that have the same installed capacity of wind power but only considering WTs able to fulfill stringent requirements (fault-ride-through capability and support voltage stability). Based on simulations and international experience, technically justified requirements for the Chilean case are proposed.
Resumo:
Approval of the Clean Development Mechanism, provided for in the Kyoto Protocol, enables countries with afforested land to trade in carbon emissions reduction certificates related to carbon dioxide equivalent quantities (CO(2-e)) stored within a certain forest area. Potential CO(2-e) above base line sequestration was determined for two forest sites on commercial eucalyptus plantations in northern Brazil (Bahia). Compensation values for silvicultural regimes involving rotation lengths greater than economically optimal were computed using the Faustmann formula. Mean values obtained were US$8.16 (MgCO(2-e))(-1) and US $7.19 (MgCO(2-e))(-1) for average and high site indexes, respectively. Results show that carbon supply is more cost-efficient in highly productive sites. Annuities of US$18.8 Mg C(-1) and US$35.1 Mg C(-1) and yearly payments of US$4.4 m(-3) and US$8.2 m(-3) due for each marginal cubic meter produced were computed for high and average sites, respectively. The estimated value of the tonne of carbon defines minimum values to be paid to forest owners, in order to induce a change in silvicultural management regimes. A reduction of carbon supply could be expected as a result of an increase in wood prices, although it would not respond in a regular manner. For both sites, price elasticity of supply was found to be inelastic and increased as rotation length moved further away from economically optimal: 0.24 and 0.27 for age 11 years in average- and high-productivity sites, respectively. This would be due to biomass production potential as a limiting factor; beyond a certain threshold value. an increase in price does not sustain a proportional change in carbon storage supply. The environmental service valuation model proposed might be adequate for assessing potential supply in plantation forestry, from a private landowner perspective, with an economic opportunity cost. The model is not applicable to low commercial value forest plantations. (C) 2009 Elsevier B.V. All rights reserved.
Resumo:
Objective To evaluate the survival rate of dental implants placed in the cleft area Design Retrospective study Setting Hospital for Rehabilitation of Craniofacial Anomalies, Brazil Institutional Tertiary Healthcare Center Patients 120 patients who received dental implants in the grafted cleft area in the years 1999 to 2005 Interventions Clinical data were evaluated from the records of 120 patients according to the following criteria placement grafted, cleft area, and age at surgery, age at placement of dental implants, site and dimension of implants, interval between placement of implants and the last clinical follow-up, and interval between placement and removal or indication for removal of implants Main Outcome Measures Percentage of survival rate of implants Results Mean age at placement of the bone graft was 17 6 years and 21 years at placement of implants A total of 123 cleft areas received secondary bone graft and bone graft to install implants (regraft) The mean survival rate was 34 months since placement of the implant to the last clinical follow-up and 26 months since placement of the prosthesis Seven dental implants were removed The survival rate since placement to the last clinical follow-up was 94 3% Conclusion Rehabilitation of the cleft area with dental implants is a viable and secure alternative, with good prognosis