886 resultados para Pearl Harbor (Hawaii), Attack on, 1941


Relevância:

100.00% 100.00%

Publicador:

Resumo:

中国计算机学会

Relevância:

100.00% 100.00%

Publicador:

Resumo:

该文重新评估了Zodiac算法抗Square攻击的能力。Zodiac算法存在8轮Square区分器,该文首先根据算法的结构特性,给出了Zodiac的4个等价结构,而后利用等价结构得到了两个新的9轮Square区分器。利用新的区分器,对不同轮数的Zodiac算法实施了Square攻击,对12轮,13轮,14轮,15轮和16轮Zodiac的攻击复杂度分别为237.3,262.9,296.1,2137.1和2189.5次加密运算,选择明文数分别为210.3,211,211.6,212.1和212.6。结果表明:完整16轮192bit密钥的Zodiac算法是不抗Square攻击的。

Relevância:

100.00% 100.00%

Publicador:

Resumo:

利用SHACAL-2的一个17轮差分非线性区分器,结合被猜测子密钥空间分割的方法和快速傅立叶变换,提出了一种攻击33轮SHACAL-2的新方法.该方法攻击33轮SHACAL-2需要244的选择明文、2496.6的33轮SHACAL-2加密和2502次算术运算,攻击成功概率为99%.与已有的结果相比较,新攻击有效地提高了单密钥下SHACAL-2的攻击轮数.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementation, a site can be made resistant to current Java security weaknesses as well as those yet to be discovered. In addition, we describe a new attack on certain sophisticated firewalls that is most effectively realized as a Java applet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An M/M/1 queue is subject to mass exodus at rate β and mass immigration at rate {αr; r≥ 1} when idle. A general resolvent approach is used to derive occupation probabilities and high-order moments. This powerful technique is not only considerably easier to apply than a standard direct attack on the forward p.g.f. equation, but it also implicitly yields necessary and sufficient conditions for recurrence, positive recurrence and transience.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article is a response to an article by Ray Mackay (1996) which constitutes an attack on stylistic analysis in general, and the writings of the above authors and Ron Carter in particular. Mackay's article (in Language and Communication) accuses stylistics of 'scientificness' and claims that its attempt to provide objective analyses of literary texts is futile.1 We suggest that Mackay has misrepresented what stylisticians have said about objectivity, and that his understanding of objectivity, science and the nature of text-interpretative argument is seriously flawed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A central element in the privatization of council housing has been the development of stock transfer policy. A variety of perspectives on this process have been explored including the impact on accountability relations; however, the tenants’ experience is almost completely absent from this literature. The paper develops a case study that draws on the experience of the tenants involved in a stock transfer. In the process stock transfers, and related accountability relations, are shown to be contested with tenant-led campaigns challenging this neoliberal inspired policy. The case study illustrates the power and financial resource asymmetries in transfer campaigns with a range of anti-democratic tactics employed by those pursuing the transfer. On the basis of a critique of neoliberalism, the stock transfer process is seen as an attack on the previous democratic control of council housing, which is replaced with ‘governance by experts and elites’ and private sector inspired corporate governance forms of accountability. Thus the paper seeks to answer two questions; how democratic is the transfer process and what are the long-term implications for democratic accountability in the social housing sector.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The bacterium Rhodococcus rhodochrous NCIMB 13064, isolated from an industrial site, could use a wide range of 1-haloalkanes as sole carbon source but apparently utilized several different mechanisms simultaneously for assimilation of substrate. Catabolism of 1-chlorobutane occurred mainly by attack at the C-1 atom by a hydrolytic dehalogenase with the formation of butanol which was metabolized via butyric acid. The detection of small amounts of gamma-butyrolactone in the medium suggested that some oxygenase attack at C-4 also occurred, leading to the formation of 4-chlorobutyric acid which subsequently lactonized chemically to gamma-butyrolactone. Although 1-chlorobutane-grown cells exhibited little dehalogenase activity on 1-chloroalkanes with chain lengths above C-10, the organism utilized such compounds as growth substrates with the release of chloride. Concomitantly, gamma-butyrolactone accumulated to 1 mM in the culture medium with 1-chlorohexadecane as substrate. Traces of 4-hydroxybutyric acid were also detected. It is suggested that attack on the long-chain chloroalkane is initiated by an oxygenase at the non-halogenated end of the molecule leading to the formation of an omega-chlorofatty acid. This is degraded by beta-oxidation to 4-chlorobutyric acid which is chemically lactonized to gamma-butyrolactone which is only slowly further catabolized via 4-hydroxybutyric acid and succinic acid. However, release of chloride into the medium during growth on long-chain chloroalkanes was insufficient to account for all the halogen present in the substrate. Analysis of the fatty acid composition of 1-chlorohexadecane-grown cells indicated that chlorofatty acids comprised 75% of the total fatty acid content with C-14:0, C-16:0, C-16:1, and C-18:1 acids predominating. Thus the incorporation of 16-chlorohexadecanoic acid, the product of oxygenase attack directly into cellular lipid represents a third route of chloroalkane assimilation. This pathway accounts at least in part for the incomplete mineralization of long-chain chloroalkane substrates. This is the first report of the coexistence of a dehalogenase and the ability to incorporate long-chain haloalkanes into the lipid fraction within a single organism and raises important questions regarding the biological treatment of haloalkane containing effluents.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The GHMP kinases are a structurally related family of small molecule kinases named after four of its members - galactokinase, homoserine kinase, mevalonate kinase and phosphomevalonate kinase. The group also includes the enzymes N-acetylgalactosamine kinase, arabinose kinase, mevalonate 5-diphosphate decarboxylase, archeal shikimate kinase and 4-(cytidine 5'-diphospho)-2-c-methyl-D-erythritol kinase. In addition the group includes two members not known to be catalytically active, the Caenorhabditis elegans sex-fate determining protein XOL-1 and the Saccharomyces cerevisiae transcriptional activator Gal3p. Two catalytic mechanisms have been proposed for GHMP kinases. The structure of mevalonate kinase suggests that an aspartate residue acts as an active site base, removing a proton from the substrate to facilitate attack on the ? phosphate of MgATP. In contrast, in homoserine kinase there is no potential catalytic base and it is proposed that catalysis is driven by transition state stabilisation. Potential chemotherapeutic interventions against GHMP kinases fall into three main categories: inhibition of galactokinase to assist suffers of galactosemia, inhibition of mevalonate kinase or mevalonate 5-diphosphate decarboxylase to reduce flux through the cholesterol biosynthesis pathway and inhibition of bacterial GHMP kinases for novel anti-microbial therapies. These are in the early stages of development, but the accumulation of structural and mechanistic data will assist future progress.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Microcystins (cyclic heptapeptides) are produced by a number of freshwater cyanobacteria and cause concern in potable water supplies due to their acute and chronic toxicity. The present study reports the structural characterization of the degradation products of the photocatalytic oxidation of microcystin-LR, so aiding the mechanistic understanding of this process. TiO2 photocatalysis is a promising technology for removal of these toxins from drinking water. However, before it can be adopted in any practical application it is necessary to have a sufficient knowledge of degradation byproducts and their potential toxicity. Liquid chromatography-mass spectrometry analysis demonstrated that the major destruction pathway of microcystin appears to be initiated via three mechanisms: UV irradiation, hydroxyl radical attack, and oxidation. UV irradiation caused geometrical isomerization of microcystin converting the (4E), (6E) of the Adda configuration to (4E), 6(Z) or 4(Z), 6(E). Hydroxyl radical attack on the conjugated diene structure of Adda moiety produced dihyroxylated products. Further oxidation cleaved the hydroxylated 4-5 and/or 6-7 bond of Adda to form aldehyde or ketone peptide residues, which then were oxidized into the corresponding carboxylic acids. Photocatalysis also hydrolyzed the peptide bond on the ring structure of microcystin to form linear structures although this appeared to be a minor pathway.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

UNLABELLED: Cyclic-di-GMP is a near-ubiquitous bacterial second messenger that is important in localized signal transmission during the control of various processes, including virulence and switching between planktonic and biofilm-based lifestyles. Cyclic-di-GMP is synthesized by GGDEF diguanylate cyclases and hydrolyzed by EAL or HD-GYP phosphodiesterases, with each functional domain often appended to distinct sensory modules. HD-GYP domain proteins have resisted structural analysis, but here we present the first structural representative of this family (1.28 Å), obtained using the unusual Bd1817 HD-GYP protein from the predatory bacterium Bdellovibrio bacteriovorus. Bd1817 lacks the active-site tyrosine present in most HD-GYP family members yet remains an excellent model of their features, sharing 48% sequence similarity with the archetype RpfG. The protein structure is highly modular and thus provides a basis for delineating domain boundaries in other stimulus-dependent homologues. Conserved residues in the HD-GYP family cluster around a binuclear metal center, which is observed complexed to a molecule of phosphate, providing information on the mode of hydroxide ion attack on substrate. The fold and active site of the HD-GYP domain are different from those of EAL proteins, and restricted access to the active-site cleft is indicative of a different mode of activity regulation. The region encompassing the GYP motif has a novel conformation and is surface exposed and available for complexation with binding partners, including GGDEF proteins.

IMPORTANCE: It is becoming apparent that many bacteria use the signaling molecule cyclic-di-GMP to regulate a variety of processes, most notably, transitions between motility and sessility. Importantly, this regulation is central to several traits implicated in chronic disease (adhesion, biofilm formation, and virulence gene expression). The mechanisms of cyclic-di-GMP synthesis via GGDEF enzymes and hydrolysis via EAL enzymes have been suggested by the analysis of several crystal structures, but no information has been available to date for the unrelated HD-GYP class of hydrolases. Here we present the multidomain structure of an unusual member of the HD-GYP family from the predatory bacterium Bdellovibrio bacteriovorus and detail the features that distinguish it from the wider structural family of general HD fold hydrolases. The structure reveals how a binuclear iron center is formed from several conserved residues and provides a basis for understanding HD-GYP family sequence requirements for c-di-GMP hydrolysis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We describe a pre-processing correlation attack on an FPGA implementation of AES, protected with a random clocking countermeasure that exhibits complex variations in both the location and amplitude of the power consumption patterns of the AES rounds. It is demonstrated that the merged round patterns can be pre-processed to identify and extract the individual round amplitudes, enabling a successful power analysis attack. We show that the requirement of the random clocking countermeasure to provide a varying execution time between processing rounds can be exploited to select a sub-set of data where sufficient current decay has occurred, further improving the attack. In comparison with the countermeasure's estimated security of 3 million traces from an integration attack, we show that through application of our proposed techniques that the countermeasure can now be broken with as few as 13k traces.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a recent article (Astuti & Bloch, 2015), cognitive anthropologists Rita Astuti and Maurice Bloch claim that the Malagasy are ambivalent as to whether considerations of intentionality are relevant to moral judgments concerning incest and its presumed catastrophic consequences: when making moral judgments about those who commit incest, the Malagasy take into account whether the incest is intentional or not, but, when making moral judgments relating to incest’s catastrophic consequences, they do not take intentionality into account. Astuti & Bloch explain the irrelevance of intentionality in terms of incest entailing such a fundamental attack on the transcendental social order that the Malagasy become dumbfounded and leave aside considerations of intentionality. Finally, they claim that a similar dumbfound reaction is what is involved in the moral dumbfounding concerning incest that social psychologist Jonathan Haidt has found in the US. In this article, we argue that (i) Astuti & Bloch are unclear about many aspects of their claims (in particular, about the moral judgments at stake), (ii) they do not provide sufficient evidence that considerations of intentionality are deemed irrelevant to moral judgments relating to incest’s presumed catastrophic consequences (and hence for the claim that the Malagasy are ambivalent), (iii) their hypothesis that conceiving of incest as an attack on the transcendental social renders considerations of intentionality irrelevant lacks coherence, and (iv) the extension of their explanatory account to the moral dumfounding of American students in Haidt’s well-known scenario of intentional incest is unwarranted.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2015

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This marketing plan project is a culmination of extensive strategies with the use of experiential marketing to address issues confronting the Kenyan tourism industry in order to have a sustainable tourism sector. Following the terrorist attack carried out by Islamist militants’ belonging to al-Shabaab terrorist organization on Nairobi’s Westgate shopping mall in September 2013, tourist forecast has gone down sharply with an average of 20% fall in tourists’ arrivals which is likely to have an impact on the tourism sector in Kenya. Even before the deadly attack on Westgate, the most lethal attack by Islamist terrorists in 15 years in Kenya, the government through the Kenya tourist board had announced that in 2013 tourist arrivals were down by 12%, at 495,978, according to an October 2013 report by Bloomberg. Tourism revenues were also down by 7.4%, over FY12/13 (July-June) to reach KES96.24bn, according to a September 2013 report on the local Capital FM website. Beyond 2013, much will depend on how quickly the Kenya tourist board can regain control of the situation. The Kenyan government believes that the Westgate mall attack was a 'one-off' incident, with a low probability of a similar event happening again over the short term period. Germany, United States, United Kingdom, Australia, Italy, France and Canada continue to be the key source market however; the Kenya tourist board can make continued growth stronger from new emerging markets in order to increase new arrivals into the country. The marketing plan outlines the objectives to be implemented and provides the implementation strategy, activity plans, monitoring and evaluation plans, financial requirements projections and proposes a new structure of experiential marketing. A number of regional forces are identified that will impact tourism into the country including global, social and economic forces, emerging trends in visitor motivations and behavior, emerging forces in experiential marketing. A major component of the strategy identifies target markets for Kenya to commensurate with the level of resources that will be available for marketing and promotion, in keeping with the forces and trends identified and the nature of the Kenya tourism environment. The agreed upon target market segments are: generic/mass travel, experiential travel, creative travel, adventure seeking travel, senior/extended/long stay travel, and business related travel. The strategy phases the development of the target markets over the years of the marketing strategies in order to yield the best opportunity for results. A core activity in developing a marketing strategy is determining the nature of experiences Kenya offers in tourism. The strategy’s experience development process will continue to develop within the context of the products identified which will be promoted regionally: culture/heritage, nature, community-based. Each county in the country has a significant number of attractions and experiences and the challenge of the country is to bring these together in a creative and innovative way in order to encourage tourists to visit more than one county in Kenya.