3 resultados para Best available techniques
em Coffee Science - Universidade Federal de Lavras
Resumo:
In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of us. Browsers can be breached in different ways. Because of the over privileged access, extensions are responsible for many security issues. Browser vendors try to keep safe extensions in their official extension galleries. However, their security control measures are not always effective and adequate. The distribution of unsafe extensions through different social engineering techniques is also a very common practice. Therefore, before installation, users should thoroughly analyze the security of browser extensions. Extensions are not only available for desktop browsers, but many mobile browsers, for example, Firefox for Android and UC browser for Android, are also furnished with extension features. Mobile devices have various resource constraints in terms of computational capabilities, power, network bandwidth, etc. Hence, conventional extension security analysis techniques cannot be efficiently used by end users to examine mobile browser extension security issues. To overcome the inadequacies of the existing approaches, we propose CLOUBEX, a CLOUd-based security analysis framework for both desktop and mobile Browser EXtensions. This framework uses a client-server architecture model. In this framework, compute-intensive security analysis tasks are generally executed in a high-speed computing server hosted in a cloud environment. CLOUBEX is also enriched with a number of essential features, such as client-side analysis, requirements-driven analysis, high performance, and dynamic decision making. At present, the Firefox extension ecosystem is most susceptible to different security attacks. Hence, the framework is implemented for the security analysis of the Firefox desktop and Firefox for Android mobile browser extensions. A static taint analysis is used to identify malicious information flows in the Firefox extensions. In CLOUBEX, there are three analysis modes. A dynamic decision making algorithm assists us to select the best option based on some important parameters, such as the processing speed of a client device and network connection speed. Using the best analysis mode, performance and power consumption are improved significantly. In the future, this framework can be leveraged for the security analysis of other desktop and mobile browser extensions, too.
Resumo:
The control of radioactive backgrounds will be key in the search for neutrinoless double beta decay at the SNO+ experiment. Several aspects of the SNO+ back- grounds have been studied. The SNO+ tellurium purification process may require ultra low background ethanol as a reagent. A low background assay technique for ethanol was developed and used to identify a source of ethanol with measured 238U and 232Th concentrations below 2.8 10^-13 g/g and 10^-14 g/g respectively. It was also determined that at least 99:997% of the ethanol can be removed from the purified tellurium using forced air ow in order to reduce 14C contamination. In addition, a quality-control technique using an oxygen sensor was studied to monitor 222Rn contamination due to air leaking into the SNO+ scintillator during transport. The expected sensitivity of the technique is 0.1mBq/L or better depending on the oxygen sensor used. Finally, the dependence of SNO+ neutrinoless double beta decay sensitivity on internal background levels was studied using Monte Carlo simulation. The half-life limit to neutrinoless double beta decay of 130Te after 3 years of operation was found to be 4.8 1025 years under default conditions.
Resumo:
When ligaments within the wrist are damaged, the resulting loss in range of motion and grip strength can lead to reduced earning potential and restricted ability to perform important activities of daily living. Left untreated, ligament injuries ultimately lead to arthritis and chronic pain. Surgical repair can mitigate these issues but current procedures are often non-anatomic and unable to completely restore the wrist’s complex network of ligaments. An inability to quantitatively assess wrist function clinically, both before and after surgery, limits the ability to assess the response to clinical intervention. Previous work has shown that bones within the wrist move in a similar pattern across people, but these patterns remain challenging to predict and model. In an effort to quantify and further develop the understanding of normal carpal mechanics, we performed two studies using 3D in vivo carpal bone motion analysis techniques. For the first study, we measured wrist laxity and performed CT scans of the wrist to evaluate 3D carpal bone positions. We found that through mid-range radial-ulnar deviation range of motion the scaphoid and lunate primarily flexed and extended; however, there was a significant relationship between wrist laxity and row-column behaviour. We also found that there was a significant relationship between scaphoid flexion and active radial deviation range of motion. For the second study, an analysis was performed on a publicly available database. We evaluated scapholunate relative motion over a full range of wrist positions, and found that there was a significant amount of variation in the location and orientation of the rotation axis between the two bones. Together the findings from the two studies illustrate the complexity and subject specificity of normal carpal mechanics, and should provide insights that can guide the development of anatomical wrist ligament repair surgeries that restore normal function.