875 resultados para RSA public-key cryptography
Resumo:
Background: Glycogen-depleting exercise can lead to supercompensation of muscle glycogen stores, but the biochemical mechanisms of this phenomenon are still not completely understood. Methods: Using chronic low-frequency stimulation (CLFS) as an exercise model, the tibialis anterior muscle of rabbits was stimulated for either 1 or 24 hours, inducing a reduction in glycogen of 90% and 50% respectively. Glycogen recovery was subsequently monitored during 24 hours of rest. Results: In muscles stimulated for 1 hour, glycogen recovered basal levels during the rest period. However, in those stimulated for 24 hours, glycogen was supercompensated and its levels remained 50% higher than basal levels after 6 hours of rest, although the newly synthesized glycogen had fewer branches. This increase in glycogen correlated with an increase in hexokinase-2 expression and activity, a reduction in the glycogen phosphorylase activity ratio and an increase in the glycogen synthase activity ratio, due to dephosphorylation of site 3a, even in the presence of elevated glycogen stores. During supercompensation there was also an increase in 59-AMP-activated protein kinase phosphorylation, correlating with a stable reduction in ATP and total purine nucleotide levels. Conclusions: Glycogen supercompensation requires a coordinated chain of events at two levels in the context of decreased cell energy balance: First, an increase in the glucose phosphorylation capacity of the muscle and secondly, control of the enzymes directly involved in the synthesis and degradation of the glycogen molecule. However, supercompensated glycogen has fewer branches.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.
Resumo:
The Data Warehouse Replacement Project includes updated County Health Snapshot reports. The snapshots provide an overview of key health indicators for local communities. They contain county-level measures that are organized into eight categories. The categories are asthma, cancer, health behaviors and outcomes, heart disease and other chronic conditions, infectious disease, mortality and injury prevention, population statistics and reproductive outcomes. The updated county health snapshots include almost forty new chronic disease indicators in addition to all of the indicators in the existing snapshots.There will be two different reports available in the Data Warehouse replacement system. One of the reports is a multi-year county health snapshot. This report has a similar format to the previous county health snapshot report in the current Data Warehouse. It will display multiple years of data for a single county. The data will be for the most current year available and the two years prior. The state values for the current year will also be included.
Resumo:
The objective of phase one of this research was to assess the degree to which currently employed Iowa Department of Transportation (DOT) employees would be affected by a more aggressive policy to recruit and retain women and minority engineers. The DOT's "Future Agenda" was used as a baseline to focus on efforts to update and implement a recruitment plan that would target underrepresented classes. The primary question that emerged out of phase one was how could the Iowa DOT strengthen its ties with Iowa State University (ISU) to produce increased numbers of in-state applicants for engineering positions. This introduced the objective of phase two, which was to identify problem areas resulting in unacceptably high attrition rates for women, minorities, and to a lesser degree, Caucasian men in the College of Engineering at ISU, particularly Civil and Construction Engineering (CCE). Past research has focused on (1) projected shortages of qualified civil engineers, (2) the obstacles confronting women in a traditionally male-oriented profession, and (3) minorities who are often unprepared to succeed in the rigors of an engineering curriculum because of a lack of academic preparedness. The researchers in this study, in contrast, chose to emphasize institutional reasons why women, minorities, and some Caucasian men often feel a sense of isolation in the engineering program. It was found that one of the key obstacles to student retention is the lack of visibility of the civil engineering profession. The visibility problem led to the hypothesis that many engineering students do not have a clear conception of what the practice of civil engineering entails. It was found that this may be a better predictor of attrition than the stereotypical assumption that a majority of students leave their engineering programs because they are not academically able to compete. Recommendations are offered to strengthen the ties between ISU's Department of CCE and the Iowa DOT in order to counter the visibility issue. It was concluded that this is a vital step because over the next 5-15 years 40% of DOT engineers currently employed will be phasing into retirement. If the DOT expects to draw sufficient numbers of engineers from within the state of Iowa and if increasing numbers of them are to be women and minorities, a university connection will help to produce the qualified applicants to fulfill this need.
Resumo:
This paper discusses some of the key concepts in the consideration of public art as a central element in urban regeneration processes, especially in reference to its role in the processes of citizen participation.
Resumo:
En els darrers anys, la criptografia amb corbes el.líptiques ha adquirit una importància creixent, fins a arribar a formar part en la actualitat de diferents estàndards industrials. Tot i que s'han dissenyat variants amb corbes el.líptiques de criptosistemes clàssics, com el RSA, el seu màxim interès rau en la seva aplicació en criptosistemes basats en el Problema del Logaritme Discret, com els de tipus ElGamal. En aquest cas, els criptosistemes el.líptics garanteixen la mateixa seguretat que els construïts sobre el grup multiplicatiu d'un cos finit primer, però amb longituds de clau molt menor. Mostrarem, doncs, les bones propietats d'aquests criptosistemes, així com els requeriments bàsics per a que una corba sigui criptogràficament útil, estretament relacionat amb la seva cardinalitat. Revisarem alguns mètodes que permetin descartar corbes no criptogràficament útils, així com altres que permetin obtenir corbes bones a partir d'una de donada. Finalment, descriurem algunes aplicacions, com són el seu ús en Targes Intel.ligents i sistemes RFID, per concloure amb alguns avenços recents en aquest camp.
Resumo:
Eighty percent of the global 17 million deaths due to cardiovascular disease (CVD) occur in low and middle income countries (LMICs). The burden of CVD and other noncommunicable diseases (NCDs) is expected to markedly increase because of the global aging of the population and increasing exposure to detrimental lifestyle-related risk in LMICs. Interventions to reduce four main risks related to modifiable behaviors (tobacco use, unhealthy diet, low physical activity and excess alcohol consumption) are key elements for effective primary prevention of the four main NCDs (CVD, cancer, diabetes and chronic pulmonary disease). These behaviors are best improved through structural interventions (e.g., clean air policy, taxes on cigarettes, new recipes for processed foods with reduced salt and fat, urban shaping to improve mobility, etc.). In addition, health systems in LMICs should be reoriented to deliver integrated cost-effective treatment to persons at high risk at the primary health care level. The full implementation of a small number of highly cost effective, affordable and scalable interventions ("best buys") is likely to be the necessary and sufficient ingredient for curbing NCDs in LMICs. NCDs are both a cause and a consequence of poverty. It is therefore important to frame NCD prevention and control within the broader context of social determinants and development agenda. The recent emphasis on NCDs at a number of health and economic forums (including the September 2011 High Level Meeting on NCDs at the United Nations) provides a new opportunity to move the NCD agenda forward in LMICs.
Resumo:
This paper discusses some of the key concepts in the consideration of public art as a central element in urban regeneration processes, especially in reference to its role in the processes of citizen participation.
Resumo:
We use an ordered logistic model to empirically examine the factors that explain varying degrees of private involvement in the U.S. water sector through public-private partnerships. Our estimates suggest that a variety of factors help explain greater private participation in this sector. We find that the risk to private participants regarding cost recovery is an important driver of private participation. The relative cost of labor is also a key factor in determining the degree of private involvement in the contract choice. When public wages are high relative to private wages, private participation is viewed as a source of cost savings. We thus find two main drivers of greater private involvement: one encouraging private participation by reducing risk, and another encouraging government to seek out private participation in lowering costs.
Resumo:
PURPOSE: Needs assessment is recognized to be a key element of mental health care. Patients tend to present heterogeneous profiles of needs. However, there is no consensus in previous research about how patients' needs are organized. This study investigates both general and specific dimensions of patients' needs for care. METHODS: Patients' needs were assessed with ELADEB, an 18-domain self-report scale. The use of a self-assessment scale represents a unique way of obtaining patients' perceptions. A patient-centered psychiatric practice facilitates empowerment as it is based on the patients' personal motivations, needs, and wants. Four seventy-one patients' profiles were analyzed through exploratory factor analysis. RESULTS: A four-factor bifactor model, including one general factor and three specific factors of needs, was most adequate. Specific factors were (a) "finances" and "administrative tasks"; (b) "transports," "public places," "self-care," "housework," and "food"; and (c) "family," "children," "intimate relationships," and "friendship." CONCLUSION: As revealed by the general factor, patients expressing urgent needs in some domains are also more susceptible to report urgent needs in several other domains. This general factor relates to high versus low utilizers of public mental healthcare. Patients also present specific needs in life domains, which are organized in three dimensions: management, functional disabilities, and familial and interpersonal relationships. These dimensions relate to the different types of existing social support described in the literature.
Resumo:
The objective of the dissertation is to examine organizational responses of public actors to customer requirements which drive the transformation of value networks and promote public-private partnership in the electricity distribution industry and elderly care sectors. The research bridges the concept of offering to value networks where capabilities can be acquired for novel product concepts. The research contributes to recent literature, re-examining theories on interactions of customer requirements and supply management. A critical realist case study approach is applied to this abductive the research which directs to describe causalities in the analyzed phenomena. The presented evidence is based on three sources, which are in-depth interviews, archival analysis and the Delphi method. Service provision requires awareness on technology and functionalities of offering. Moreover, service provision includes interactions of multiple partners, which suggests the importance of the co-operative orientation of actors. According to the findings,portfolio management has a key role when intelligent solutions are implemented in public service provision because its concepts involve a variety of resources from multiple suppliers. However, emergent networks are not functional if they lack leaders who have access to the customer interface, have power to steer networks and a capability to build offerings. Public procurement policies were recognized to focus on a narrow scope in which price is a key factor in decisions. In the future, the public sector has to implement technology strategies and portfolio management, which mean longterm platform development and commitment to partnerships. On the other hand, the service providers should also be more aware of offerings into which their products will be integrated in the future. This requires making the customer’s voice in product development and co-operation in order to increase the interconnectivity of products.
Resumo:
Unsuccessful mergers are unfortunately the rule rather than the exception. Therefore it is necessary to gain an enhanced understanding of mergers and post-merger integrations (PMI) as well as learning more about how mergers and PMIs of information systems (IS) and people can be facilitated. Studies on PMI of IS are scarce and public sector mergers are even less studied. There is nothing however to indicate that public sector mergers are any more successful than those in the private sector. This thesis covers five studies carried out between 2008 and 2011 in two organizations in higher education that merged in January 2010. The most recent study was carried out two years after the new university was established. The longitudinal case-study focused on the administrators and their opinions of the IS, the work situation and the merger in general. These issues were investigated before, during and after the merger. Both surveys and interviews were used to collect data, to which were added documents that both describe and guide the merger process; in this way we aimed at a triangulation of findings. Administrators were chosen as the focus of the study since public organizations are highly dependent on this staff category, forming the backbone of the organization and whose performance is a key success factor for the organization. Reliable and effective IS are also critical for maintaining a functional and effective organization, and this makes administrators highly dependent on their organizations’ IS for the ability to carry out their duties as intended. The case-study has confirmed the administrators’ dependency on IS that work well. A merger is likely to lead to changes in the IS and the routines associated with the administrators’ work. Hence it was especially interesting to study how the administrators viewed the merger and its consequences for IS and the work situation. The overall research objective is to find key issues for successful mergers and PMIs. The first explorative study in 2008 showed that the administrators were confident of their skills and knowledge of IS and had no fear of having to learn new IS due to the merger. Most administrators had an academic background and were not anxious about whether IS training would be given or not. Before the merger the administrators were positive and enthusiastic towards the merger and also to the changes that they expected. The studies carried out before the merger showed that these administrators were very satisfied with the information provided about the merger. This information was disseminated through various channels and even negative information and postponed decisions were quickly distributed. The study conflicts with the theories that have found that resistance to change is inevitable in a merger. Shortly after the merger the (third) study showed disappointment with the fact that fewer changes than expected had been implemented even if the changes that actually were carried out sometimes led to a more problematic work situation. This was seen to be more prominent for routine changes than IS changes. Still the administrators showed a clear willingness to change and to share their knowledge with new colleagues. This knowledge sharing (also tacit) worked well in the merger and the PMI. The majority reported that the most common way to learn to use new ISs and to apply new routines was by asking help from colleagues. They also needed to take responsibility for their own training and development. Five months after the merger (the fourth study) the administrators had become worried about the changes in communication strategy that had been implemented in the new university. This was perceived as being more anonymous. Furthermore, it was harder to get to know what was happening and to contact the new decision makers. The administrators found that decisions, and the authority to make decisions, had been moved to a higher administrative level than they were accustomed to. A directive management style is recommended in mergers in order to achieve a quick transition without distracting from the core business. A merger process may be tiresome and require considerable effort from the participants. In addition, not everyone can make their voice heard during a merger and consensus is not possible in every question. It is important to find out what is best for the new organization instead of simply claiming that the tried and tested methods of doing things should be implemented. A major problem turned out to be the lack of management continuity during the merger process. Especially problematic was the situation in the IS-department with many substitute managers during the whole merger process (even after the merger was carried out). This meant that no one was in charge of IS-issues and the PMI of IS. Moreover, the top managers were appointed very late in the process; in some cases after the merger was carried out. This led to missed opportunities for building trust and management credibility was heavily affected. The administrators felt neglected and that their competences and knowledge no longer counted. This, together with a reduced and altered information flow, led to rumours and distrust. Before the merger the administrators were convinced that their achievements contributed value to their organizations and that they worked effectively. After the merger they were less sure of their value contribution and effectiveness even if these factors were not totally discounted. The fifth study in November 2011 found that the administrators were still satisfied with their IS as they had been throughout the whole study. Furthermore, they believed that the IS department had done a good job despite challenging circumstances. Both the former organizations lacked IS strategies, which badly affected the IS strategizing during the merger and the PMI. IS strategies deal with issues like system ownership; namely who should pay and who is responsible for maintenance and system development, for organizing system training for new IS, and for effectively run IS even during changing circumstances (e.g. more users). A proactive approach is recommended for IS strategizing to work. This is particularly true during a merger and PMI for handling issues about what ISs should be adopted and implemented in the new organization, issues of integration and reengineering of IS-related processes. In the new university an ITstrategy had still not been decided 26 months after the new university was established. The study shows the importance of the decisive management of IS in a merger requiring that IS issues are addressed in the merger process and that IS decisions are made early. Moreover, the new management needs to be appointed early in order to work actively with the IS-strategizing. It is also necessary to build trust and to plan and make decisions about integration of IS and people.
Resumo:
Social media has become a part of many people’s everyday lives. In the library field the adoption of social media has been widespread and discussions of the development of “Library 2.0” began at an early stage. The aim with this thesis is to study the interface between public libraries, social media, and users, focusing on information activities. The main research question is: How is the interface between public libraries and social media perceived and acted upon by its main stakeholders (library professionals and users)? The background of Library 2.0 is strongly associated with the development of the Web and social media, as well as with the public libraries and their user-centered and information technological development. The theoretical framework builds on the research within the area of Library and Information Science concerning information behavior, information practice, and information activities. Earlier research on social media and public libraries is also highlighted in this thesis. The methods survey and content analysis were applied to map the interface between social media and public libraries. A questionnaire was handed out to the users and another questionnaire was sent out to the library professionals. The results were statistically analyzed. In the content analysis public library Facebook pages were studied. All the empirical investigations were conducted in the area of Finland Proper. An integrated analysis of the results deepens the understanding of the key elements of the social media and public library context. These elements are interactivity, information activities, perceptions, and stakeholders. In this context seven information activities were distinguished: reading, seeking, creating, communicating, informing, mediating, and contributing. This thesis contributes to develop the research concerning information activities and draws a realistic picture of the challenges and opportunities in the social media and public library context. It also contributes with knowledge on library professionals and library users, and the existing differences in their perceptions of the interface between libraries and social media.