90 resultados para Data compression (Computer science)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

L'objectiu és implementar un esquema criptogràfic que garanteixi les necessitats de seguretat d'un historial mèdic que pot ser gestionat a través d'una xarxa de comunicacions (per exemple tota una intranet d'un centre mèdic).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

L'objectiu es dissenyar i implementar un esquema criptogràfic que gestioni de forma segura els historials mèdics dels pacients a través d'una xarxa de comunicacions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El PFC té com objectiu dissenyar i implementar un esquema criptogràfic per a garantir un accéssegur a les dades proporcionant mecanismes per salvaguardar la confidencialitat, autenticitat i integritat de les dades i no repudi de les accions portades a terme pels usuaris.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Al llarg del present treball es construeix una aplicació de gestió d'historials metges per la qual cosa prèviament s'han estudiat els requisits de seguretat exigibles a la mateixa, com condicionants fonamentals per a la seva posada en funcionament.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En aquest projecte de final de carrera s'ha dissenyat, implementat i provat un sistema que utilitzant criptografia de clau pública, garanteix la correcta utilització de les dades en un procés de consulta i complimentació d'una història clínica informatitzada consultada a distància.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El projecte ha de generar un seguit d'aplicacions per a que els usuaris i elsmetges puguin accedir a través d'una xarxa de comunicacions als historials clínicsmantenint sempre els requisits de seguretat.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El correu electrònic ha esdevingut una eina molt important per a la societat i crítica per a molts negocis. Amb la proliferació dels proveïdors de correu gratuït a la web, hom pot accedir fàcilment al correu des de qualsevol lloc, fins i tot seguir accedint-hi amb les eines de sempre. Així, moltes empreses i particulars han deixat de tenir serveis de correu propis i han passat a utilitzar el que ofereixen d'altres proveïdors. Però què passa amb les còpies de seguretat del correu? Quins proveïdors ofereixen recuperar correus esborrats? En quines condicions? Durant quant de temps guarden les còpies de seguretat? Què passa si el proveïdor deixa d'oferir el servei? Amb backimap hom pot recuperar el control de les còpies de seguretat del correu i romandre una mica més tranquil.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Trabajo Final de Carrera en desarrollo .NET: Aplicación web ASP.NET MVC cliente de correo electrónico con cifrado PGP y servicio web WCF que brinda funcionalidades de cifrado PGP.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Phase encoded nano structures such as Quick Response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase encoded QR codes. The system is illuminated using polarized light and the QR code is encoded using a phase-only random mask. Using classification algorithms it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase encoded QR codes using polarimetric signatures.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present a polarimetric-based optical encoder for image encryption and verification. A system for generating random polarized vector keys based on a Mach-Zehnder configuration combined with translucent liquid crystal displays in each path of the interferometer is developed. Polarization information of the encrypted signal is retrieved by taking advantage of the information provided by the Stokes parameters. Moreover, photon-counting model is used in the encryption process which provides data sparseness and nonlinear transformation to enhance security. An authorized user with access to the polarization keys and the optical design variables can retrieve and validate the photon-counting plain-text. Optical experimental results demonstrate the feasibility of the encryption method.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The main objective of this paper aims at developing a methodology that takes into account the human factor extracted from the data base used by the recommender systems, and which allow to resolve the specific problems of prediction and recommendation. In this work, we propose to extract the user's human values scale from the data base of the users, to improve their suitability in open environments, such as the recommender systems. For this purpose, the methodology is applied with the data of the user after interacting with the system. The methodology is exemplified with a case study

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En aquest projecte es desenvolupa una aplicació FreeRTOS per a la mota LPC1769 connectada amb un mòdul WiFly que agafa un fitxer d'Internet, el comprimeix i el desa un altre cop a Internet tot afegint les estadístiques bàsiques de temps i percentatge de compressió.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The proposal to work on this final project came after several discussions held with Dr. Elzbieta Malinowski Gadja, who in 2008 published the book entitled Advanced Data Warehouse Design: From Conventional to Spatial and Temporal Applications (Data-Centric Systems and Applications). The project was carried out under the technical supervision of Dr. Malinowski and the direct beneficiary was the University of Costa Rica (UCR) where Dr. Malinowski is a professor at the Department of Computer Science and Informatics. The purpose of this project was twofold: First, to translate chapter III of said book with the intention of generating educational material for the use of the UCR and, second, to venture in the field of technical translation related to data warehouse. For the first component, the goal was to generate a final product that would eventually serve as an educational tool for the post-graduate courses of the UCR. For the second component, this project allowed me to acquire new skills and put into practice techniques that have helped me not only to perfom better in my current job as an Assistant Translator of the Inter-American BAnk (IDB), but also to use them in similar projects. The process was lenggthy and required torough research and constant communication with the author. The investigation focused on the search of terms and definitions to prepare the glossary, which was the basis to start the translation project. The translation process itself was carried out by phases, so that comments and corrections by the author could be taken into account in subsequent stages. Later, based on the glossary and the translated text, illustrations had been created in the Visio software were translated. In addition to the technical revision by the author, professor Carme Mangiron was in charge of revising the non-technical text. The result was a high-quality document that is currently used as reference and study material by the Department of Computer Science and Informatics of Costa Rica.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Proyecto final de grado consistente en la explotación de un data warehouse para el análisis de información sobre el tránsito rodado de vehículos.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes an audio watermarking scheme based on lossy compression. The main idea is taken from an image watermarking approach where the JPEG compression algorithm is used to determine where and how the mark should be placed. Similarly, in the audio scheme suggested in this paper, an MPEG 1 Layer 3 algorithm is chosen for compression to determine the position of the mark bits and, thus, the psychoacoustic masking of the MPEG 1 Layer 3compression is implicitly used. This methodology provides with a high robustness degree against compression attacks. The suggested scheme is also shown to succeed against most of the StirMark benchmark attacks for audio.