30 resultados para Message Authentication Code
Resumo:
B2B document handling is moving from paper to electronic networks and electronic domain very rapidly. Moving, handling and transforming large electronic business documents requires a lot from the systems handling them. This paper explores new technologies such as SOA, event-driven systems and ESB and a scalable, event-driven enterprise service bus is created to demonstrate these new approaches to message handling. As an end result, we have a small but fully functional messaging system with several different components. This is the first larger Java-project done in-house, so on the side we developed our own set of best practices of Java development, setting up configurations, tools, code repositories and class naming and much more.
Resumo:
The behavior of the nuclear power plants must be known in all operational situations. Thermal hydraulics computer applications are used to simulate the behavior of the plants. The computer applications must be validated before they can be used reliably. The simulation results are compared against the experimental results. In this thesis a model of the PWR PACTEL steam generator was prepared with the TRAC/RELAP Advanced Computational Engine computer application. The simulation results can be compared against the results of the Advanced Process Simulator analysis software in future. Development of the model of the PWR PACTEL vertical steam generator is introduced in this thesis. Loss of feedwater transient simulation examples were carried out with the model.
Resumo:
Due to increasing waterborne transportation in the Gulf of Finland, the risk of a hazardous accident increases and therefore manifold preventive actions are needed. As a main legislative authority in the maritime community, The International Maritime Organization (IMO) has set down plenary laws and recommendations which are e.g., utilised in the safe operations in ships and pollution prevention. One of these compulsory requirements, the ISM Code, requires proactive attitude both from the top management and operational workers in the shipping companies. In this study, a crosssectional approach was taken to analyse whether the ISM Code has actively enhanced maritime safety in the Gulf of Finland. The analysis included; 1) performance of the ISM Code in Finnish shipping companies, 2) statistical measurements of maritime safety, 3) influence of corporate top management to the safety culture and 4) comparing safety management practices in shipping companies and port operations of Finnish maritime and port authorities. The main results found were that maritime safety culture has developed in the right direction after the launch of the ISM Code in the 1990´s. However, this study does not exclusively prove that the improvements are the consequence of the ISM Code. Accident prone ships can be recognized due to their behaviour and there is a lesson to learn from the safety culture of some high standard safety disciplines such as, air traffic. In addition, the reporting of accidents and nearmisses should be more widely used in shipping industry. In conclusion, there is still much to be improved in the maritime safety culture of the Finnish Shipping industry, e.g., a “no blame culture” needs to be adopted.
Resumo:
Då man rör sig i New York eller Jerusalem är det inte ovanligt att man stöter på judiska "missionärer" - ett fenomen som annars är ovanligt inom judendomen - och får ett traktat i sin hand som säger "Moshiach är här" eller "Welcome Moshiach". Det är den ultra-ortodoxa rörelsen Chabad-Lubavitch som har blivit känd för sitt utåtriktade missionsarbete och för att ha proklamerat sin ledare, Rabbi Schneerson som messias. Trots att han har varit död sedan 1994 och man från judiskt håll säger att en messias inte kan dö, lever förväntningarna på Rabbi Schneerson kvar inom rörelsen. Den akademiska forskningen har gjort gällande att denna messiastro, som tar sig ett så aktivt uttryck, är en produkt av den existentiella hopplöshet som lägrade sig över det judiska samfundet i och med Förintelsen, därför att väntan på messias omedelbara ankomst ingav livshopp. Dessutom har forskningen från ett religionssociologiskt perspektiv frågat hur en religiös rörelse överlever en så stor besvikelse som att ens ledare inte uppfyller de profetior som talats ut. Avhandlingen "We Want Moshiach NOW!" ifrågasätter den tidigare forskningen genom att påvisa de starka messianska förväntningar som fanns redan på 1700-talet vid rörelsens tillkomst. Avhandlingen tar upp vilka förväntningar som framkommer i det litterära verket "Tanja", författad av rörelsens grundare, och jämför dem med den moderna litteraturen. I "Tanja" ges även förklaringsmodeller till varför en person som man trodde var messias inte är det. Avhandlingens tes är att forskningen inte har beaktat utsagorna i "Tanja" tillräckligt mycket då man försökt förstå den samtida messiastron och de uttryck den tar.
Resumo:
Soitinnus: piano, rummut, ääninauha?
Resumo:
The present research focuses on the study of how to design message and select media in advertising to generate customer’s purchase intention towards senior mobile phone in China. The message design concentrates mainly on message framing and fear appeals study while the media selection method is only based on direct matching. For exploring the main research question, the study utilized qualitative methodology. The data collection consisted of a pre-interview questionnaire, interviews, and three sets of experiments. The experiments were designed to test the selected 18 participants’ responses toward different emotional appeals and message framings. The findings illustrate participants’ understanding of senior mobile phone and their media usage habits. Moreover, positive message framing and emotional appeals in advertising are more effective. Gender differences in responding to emotional appeals were explored as well.
Resumo:
Hydrogen stratification and atmosphere mixing is a very important phenomenon in nuclear reactor containments when severe accidents are studied and simulated. Hydrogen generation, distribution and accumulation in certain parts of containment may pose a great risk to pressure increase induced by hydrogen combustion, and thus, challenge the integrity of NPP containment. The accurate prediction of hydrogen distribution is important with respect to the safety design of a NPP. Modelling methods typically used for containment analyses include both lumped parameter and field codes. The lumped parameter method is universally used in the containment codes, because its versatility, flexibility and simplicity. The lumped parameter method allows fast, full-scale simulations, where different containment geometries with relevant engineering safety features can be modelled. Lumped parameter gas stratification and mixing modelling methods are presented and discussed in this master’s thesis. Experimental research is widely used in containment analyses. The HM-2 experiment related to hydrogen stratification and mixing conducted at the THAI facility in Germany is calculated with the APROS lump parameter containment package and the APROS 6-equation thermal hydraulic model. The main purpose was to study, whether the convection term included in the momentum conservation equation of the 6-equation modelling gives some remarkable advantages compared to the simplified lumped parameter approach. Finally, a simple containment test case (high steam release to a narrow steam generator room inside a large dry containment) was calculated with both APROS models. In this case, the aim was to determine the extreme containment conditions, where the effect of convection term was supposed to be possibly high. Calculation results showed that both the APROS containment and the 6-equation model could model the hydrogen stratification in the THAI test well, if the vertical nodalisation was dense enough. However, in more complicated cases, the numerical diffusion may distort the results. Calculation of light gas stratification could be probably improved by applying the second order discretisation scheme for the modelling of gas flows. If the gas flows are relatively high, the convection term of the momentum equation is necessary to model the pressure differences between the adjacent nodes reasonably.
Resumo:
Poster at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
The purpose of this study is to identify opportunities to match marketing communication message strategies with the target audience characteristics in the Chinese luxury market entry context. Therefore, consumer behaviour and psychographic marketing segmentation fields are being reviewed in a holistic view in order to identify the similarities and connection points. Through the analysis of the messages in advertisements placed in a certain luxury and fine living magazine, message creation strategies are being anticipated.
Resumo:
This thesis concentrates on the validation of a generic thermal hydraulic computer code TRACE under the challenges of the VVER-440 reactor type. The code capability to model the VVER-440 geometry and thermal hydraulic phenomena specific to this reactor design has been examined and demonstrated acceptable. The main challenge in VVER-440 thermal hydraulics appeared in the modelling of the horizontal steam generator. The major challenge here is not in the code physics or numerics but in the formulation of a representative nodalization structure. Another VVER-440 specialty, the hot leg loop seals, challenges the system codes functionally in general, but proved readily representable. Computer code models have to be validated against experiments to achieve confidence in code models. When new computer code is to be used for nuclear power plant safety analysis, it must first be validated against a large variety of different experiments. The validation process has to cover both the code itself and the code input. Uncertainties of different nature are identified in the different phases of the validation procedure and can even be quantified. This thesis presents a novel approach to the input model validation and uncertainty evaluation in the different stages of the computer code validation procedure. This thesis also demonstrates that in the safety analysis, there are inevitably significant uncertainties that are not statistically quantifiable; they need to be and can be addressed by other, less simplistic means, ultimately relying on the competence of the analysts and the capability of the community to support the experimental verification of analytical assumptions. This method completes essentially the commonly used uncertainty assessment methods, which are usually conducted using only statistical methods.
Resumo:
The use of exact coordinates of pebbles and fuel particles of pebble bed reactor modelling becoming possible in Monte Carlo reactor physics calculations is an important development step. This allows exact modelling of pebble bed reactors with realistic pebble beds without the placing of pebbles in regular lattices. In this study the multiplication coefficient of the HTR-10 pebble bed reactor is calculated with the Serpent reactor physics code and, using this multiplication coefficient, the amount of pebbles required for the critical load of the reactor. The multiplication coefficient is calculated using pebble beds produced with the discrete element method and three different material libraries in order to compare the results. The received results are lower than those from measured at the experimental reactor and somewhat lower than those gained with other codes in earlier studies.
Resumo:
The aim of this paper is to study the role of verbal, visual and brand elements while meas-uring effectiveness of marketing message. The thesis is written in the context of mobile gaming industry. The object of the study is marketing message. To achieve the aim, the main research question was formulated: How do the elements of marketing message, such as verbal, visual and brand, affect the consumer’s attitude toward the ad, emotional response and attention capture? The theory development chapter lays on three corner stones – analysis of previous litera-ture on marketing message and its elements, namely verbal, visual and brand; overview of literature on attitude formation and particularly attitude toward the ad. In addition, investiga-tion of key points of emotional response and attention capture literature finalizes the chap-ter. The empirical part consists of experiment, conducted with 27 participants. Experiment includes the self-report semantically anchored scale, measuring the attitude toward the ad, as well as autonomic measures – eye tracking (attention capture) and facial expressions (emotional response). The results of the experiment showed that the size of the brand element – the logo – has an effect on the attention capture and the overall attitude toward the ad. The bigger the logo, the more time people spend viewing it, and they realise the message is more educa-tional and factual. The measure related to the visual element – the visual complexity – in-creases the intensity of participant’s facial expression. While the measure of verbal ele-ment – the contrast between text and background colours – leads to a better attitude to-ward the ad. The higher the contrast between text and background, the more known the message appears to the viewer.
Resumo:
IoT consists of essentially thousands of tiny sensor nodes interconnected to the internet, each one of which executes the programmed functions under memory and power limita- tions. The sensor nodes are distributed mainly for gathering data in various situations. IoT envisions the future technologies such as e-health, smart city, auto-mobiles automa- tion, construction sites automation, and smart home. Secure communication of data under memory and energy constraints is major challenge in IoT. Authentication is the first and important phase of secure communication. This study presents a protocol to authenticate resource constraint devices in physical proximity by solely using the shared wireless communication interfaces. This model of authentication only relies on the abundance of ambient radio signals to authenticate in less than a second. To evaluate the designed protocol, SkyMotes are emulated in a network environment simulated by Contiki/COOJA. Results presented during this study proves that this approach is immune against passive and active attacks. An adversary located as near as two meters can be identified in less than a second with minimal expense of energy. Since, only radio device is used as required hardware for the authentication, this technique is scalable and interoperable to heterogeneous nature of IoT.