885 resultados para implicit authentication


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents numerical simulations of incompressible fluid flows in the presence of a magnetic field at low magnetic Reynolds number. The equations governing the flow are the Navier-Stokes equations of fluid motion coupled with Maxwell's equations of electromagnetics. The study of fluid flows under the influence of a magnetic field and with no free electric charges or electric fields is known as magnetohydrodynamics. The magnetohydrodynamics approximation is considered for the formulation of the non-dimensional problem and for the characterization of similarity parameters. A finite-difference technique is used to discretize the equations. In particular, an extension of the generalized Peaceman and Rachford alternating-direction implicit (ADI) scheme for simulating two-dimensional fluid flows is presented. The discretized conservation equations are solved in stream function-vorticity formulation. We compare the ADI and generalized ADI schemes, and show that the latter is more efficient in simulating low Reynolds number and magnetic Reynolds number problems. Numerical results demonstrating the applicability of this technique are also presented. The simulation of incompressible magneto hydrodynamic fluid flows is illustrated by numerical solution for two-dimensional cases. (c) 2007 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A boundary element method (BEM) formulation to predict the behavior of solids exhibiting displacement (strong) discontinuity is presented. In this formulation, the effects of the displacement jump of a discontinuity interface embedded in an internal cell are reproduced by an equivalent strain field over the cell. To compute the stresses, this equivalent strain field is assumed as the inelastic part of the total strain. As a consequence, the non-linear BEM integral equations that result from the proposed approach are similar to those of the implicit BEM based on initial strains. Since discontinuity interfaces can be introduced inside the cell independently on the cell boundaries, the proposed BEM formulation, combined with a tracking scheme to trace the discontinuity path during the analysis, allows for arbitrary discontinuity propagation using a fixed mesh. A simple technique to track the crack path is outlined. This technique is based on the construction of a polygonal line formed by segments inside the cells, in which the assumed failure criterion is reached. Two experimental concrete fracture tests were analyzed to assess the performance of the proposed formulation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our objective in this paper is to prove an Implicit Function Theorem for general topological spaces. As a consequence, we show that, under certain conditions, the set of the invertible elements of a topological monoid X is an open topological group in X and we use the classical topological group theory to conclude that this set is a Lie group.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient mechanisms that assures user authentication in this sort of environment, in the system login as well as throughout his session, has been pointed out as a serious deficiency. Some studies have been led about possible biometric applications for web authentication. However, password based authentication still prevails. With the popularization of biometric enabled devices and resultant fall of prices for the collection of biometric traits, biometrics is reconsidered as a secure remote authentication form for web applications. In this work, the face recognition accuracy, captured on-line by a webcam in Internet environment, is investigated, simulating the natural interaction of a person in the context of a distance course environment. Partial results show that this technique can be successfully applied to confirm the presence of users throughout the course attendance in an educational distance course. An efficient client/server architecture is also proposed. © 2009 Springer Berlin Heidelberg.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on conventional cryptographic systems, as the passwords can be easily copied or stolen. The usage of a biometric approach for releasing the keys is an alternative to the password-based mechanisms. But just like passwords, we need mechanisms to keep the biometrical signal safe. One approach for such mechanism is to use biometrical key cryptography. The cryptographic systems based on the use of biometric characteristics as keys are called biometrical cryptographic systems. This article presents the implementation of Fuzzy Vault, a biometrical cryptographic system written in Java, along with its performance evaluation. Fuzzy Vault was tested on a real application using smartcards.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a method for analyzing electromagnetic transients using real transformation matrices in three-phase systems considering the presence of ground wires. So, for the Z and Y matrices that represent the transmission line, the characteristics of ground wires are not implied in the values related to the phases. A first approach uses a real transformation matrix for the entire frequency range considered in this case. This transformation matrix is an approximation to the exact transformation matrix. For those elements related to the phases of the considered system, the transformation matrix is composed of the elements of Clarke's matrix. In part related to the ground wires, the elements of the transformation matrix must establish a relationship with the elements of the phases considering the establishment of a single homopolar reference in the mode domain. In the case of three-phase lines with the presence of two ground wires, it is unable to get the full diagonalization of the matrices Z and Y in the mode domain. This leads to the second proposal for the composition of real transformation matrix: obtain such transformation matrix from the multiplication of two real and constant matrices. In this case, the inclusion of a second matrix had the objective to minimize errors from the first proposal for the composition of the transformation matrix mentioned. © 2012 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Includes bibliography

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this study was to investigate the effects of explicit and implicit knowledge about visual surrounding manipulation on postural responses. Twenty participants divided into two groups, implicit and explicit, remained in upright stance inside a moving room. In the fourth trial participants in the explicit group were informed about the movement of the room while participants in the implicit group performed the trial with the room moving at a larger amplitude and higher velocity. Results showed that postural responses to visual manipulation decreased after participants were told that the room was moving as well as after increasing amplitude and velocity of the room, indicating decreased coupling (down-weighting) of the visual influences. Moreover, this decrease was even greater for the implicit group compared to the explicit group. The results demonstrated that conscious knowledge about environmental state changes the coupling to visual information, suggesting a cognitive component related to sensory re-weighting. Re-weighting processes were also triggered without awareness of subjects and were even more pronounced compared to the first case. Adaptive re-weighting was shown when knowledge about environmental state was gathered explicitly and implicitly, but through different adaptive processes. (C) 2014 Elsevier Ireland Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this note we show that the roots of a polynomial are C∞ depend of the coefficients. The main tool to show this is the Implicit Function Theorem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study implicit ODEs, cubic in derivative, with infinitesimal symmetry at singular points. Cartan showed that even at regular points the existence of nontrivial symmetry imposes restrictions on the ODE. Namely, this algebra has the maximal possible dimension 3 iff the web of solutions is flat. For cubic ODEs with flat 3-web of solutions we establish sufficient conditions for the existence of nontrivial symmetries at singular points and show that under natural assumptions such a symmetry is semi-simple, i.e. is a scaling is some coordinates. We use this symmetry to find first integrals of the ODE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the paper, the set-valued covering mappings are studied. The statements on solvability, solution estimates, and well-posedness of inclusions with conditionally covering mappings are proved. The results obtained are applied to the investigation of differential inclusions unsolved for the unknown function. The statements on solvability, solution estimates, and well-posedness of these inclusions are derived.