939 resultados para format string attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We review the status of integrable models from the point of view of their dynamics and integrability conditions. A few integrable models are discussed in detail. We comment on the use it is made of them in string theory. We also discuss the SO(6) symmetric Hamiltonian with SO(6) boundary. This work is especially prepared for the 70th anniversaries of Andr, Swieca (in memoriam) and Roland Koberle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we investigate the influence of extractives, lignin and holocellulose contents on performance index (PI) of seven woods used or tested for violin bows. Woods with higher values of this index (PI = root MOE/rho, where MOE is modulus of elasticity and rho is density) have a higher bending stiffness at a given mass, which can be related to bow wood quality. Extractive content was negatively correlated with PI in Caesalpinia echinata, Hanclroanthus sp. and Astronium lecointei. In C. echinata holocellulose was positively correlated with PI. These results need to be further explored with more samples and by testing additional wood properties. Although the chemical constituents could provide an indication of quality, it is not possible to establish appropriate woods for bows solely by examining their chemical constituents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article investigates Villa-Lobos's String Quartet n degrees 02, an early work by this composer, written according cyclic sonata principles, as developed by Cesar Franck and systematized by Vincent d'Indy. Another important source are the string quartets composed by Franck (1889), Debussy (1893) and Ravel (1903), which possibly served as compositional models to Villa-Lobos. In this light, the themes of the Exposition in the first movement were analyzed and this procedure reveals some harmonic and rhythmic aspects throughout all the other movements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background-Patients with acute coronary syndromes and history of stroke or transient ischemic attack (TIA) have an increased rate of recurrent cardiac events and intracranial hemorrhages. Methods and Results-We evaluated treatment effects of ticagrelor versus clopidogrel in patients with acute coronary syndrome with and without a history of prior stroke or TIA in the PLATelet inhibition and patient Outcomes (PLATO) trial. Of the 18 624 randomized patients, 1152 (6.2%) had a history of stroke or TIA. Such patients had higher rates of myocardial infarction (11.5% versus 6.0%), death (10.5% versus 4.9%), stroke (3.4% versus 1.2%), and intracranial bleeding (0.8% versus 0.2%) than patients without prior stroke or TIA. Among patients with a history of stroke or TIA, the reduction of the primary composite outcome and total mortality at 1 year with ticagrelor versus clopidogrel was consistent with the overall trial results: 19.0% versus 20.8% (hazard ratio, 0.87; 95% confidence interval, 0.66-1.13; interaction P=0.84) and 7.9% versus 13.0% (hazard ratio, 0.62; 95% confidence interval, 0.42-0.91). The overall PLATO-defined bleeding rates were similar: 14.6% versus 14.9% (hazard ratio, 0.99; 95% confidence interval, 0.71-1.37), and intracranial bleeding occurred infrequently (4 versus 4 cases, respectively). Conclusions-Patients with acute coronary syndrome with a prior history of ischemic stroke or TIA had higher rates of clinical outcomes than patients without prior stroke or TIA. However, the efficacy and bleeding results of ticagrelor in these high-risk patients were consistent with the overall trial population, with a favorable clinical net benefit and associated impact on mortality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background In ROCKET AF, rivaroxaban was non-inferior to adjusted-dose warfarin in preventing stroke or systemic embolism among patients with atrial fibrillation (AF). We aimed to investigate whether the efficacy and safety of rivaroxaban compared with warfarin is consistent among the subgroups of patients with and without previous stroke or transient ischaemic attack (TIA). Methods In ROCKET AF, patients with AF who were at increased risk of stroke were randomly assigned (1:1) in a double-blind manner to rivaroxaban 20 mg daily or adjusted dose warfarin (international normalised ratio 2-0-3.0). Patients and investigators were masked to treatment allocation. Between Dec 18,2006, and June 17,2009,14 264 patients from 1178 centres in 45 countries were randomly assigned. The primary endpoint was the composite of stroke or non-CNS systemic embolism. In this substudy we assessed the interaction of the treatment effects of rivaroxaban and warfarin among patients with and without previous stroke or TIA. Efficacy analyses were by intention to treat and safety analyses were done in the on-treatment population. ROCKET AF is registered with ClinicalTrials.gov, number NCT00403767. Findings 7468 (52%) patients had a previous stroke (n=4907) or TIA (n=2561) and 6796 (48%) had no previous stroke or TIA. The number of events per 100 person-years for the primary endpoint in patients treated with rivaroxaban compared with warfarin was consistent among patients with previous stroke or TIA (2.79% rivaroxaban vs 2.96% warfarin; hazard ratio [HR] 0-94,95% CI 0.77-1.16) and those without (1.44% vs 1.88%; 0.77, 0.58-1-01; interaction p=0.23). The number of major and non-major clinically relevant bleeding events per 100 person-years in patients treated with rivaroxaban compared with warfarin was consistent among patients with previous stroke or TIA (13.31% rivaroxaban vs 13.87% warfarin; HR 0.96,95% CI 0.87-1-07) and those without (16.69% vs 15.19%; 1.10, 0.99-1.21; interaction p=0.08). Interpretation There was no evidence that the relative efficacy and safety of rivaroxaban compared with warfarin was different between patients who had a previous stroke or TIA and those who had no previous stroke or TIA. These results support the use of rivaroxaban as an alternative to warfarin for prevention of recurrent as well as initial stroke in patients with AF.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[ES] El objetivo de este trabajo es presentar una herramienta desarrollada para observar, codificar y analizar el ataque en el balonmano 2 vs 2, analizando la fiabilidad. La herramienta está constituida por un sistema mixto de formato de campo y sistemas de categorías. Se ha utilizado el programa informático Hoisan para observar los partidos con el fin de comprobar la fiabilidad del sistema.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis, we present our work about some generalisations of ideas, techniques and physical interpretations typical for integrable models to one of the most outstanding advances in theoretical physics of nowadays: the AdS/CFT correspondences. We have undertaken the problem of testing this conjectured duality under various points of view, but with a clear starting point - the integrability - and with a clear ambitious task in mind: to study the finite-size effects in the energy spectrum of certain string solutions on a side and in the anomalous dimensions of the gauge theory on the other. Of course, the final desire woul be the exact comparison between these two faces of the gauge/string duality. In few words, the original part of this work consists in application of well known integrability technologies, in large parte borrowed by the study of relativistic (1+1)-dimensional integrable quantum field theories, to the highly non-relativisic and much complicated case of the thoeries involved in the recent conjectures of AdS5/CFT4 and AdS4/CFT3 corrspondences. In details, exploiting the spin chain nature of the dilatation operator of N = 4 Super-Yang-Mills theory, we concentrated our attention on one of the most important sector, namely the SL(2) sector - which is also very intersting for the QCD understanding - by formulating a new type of nonlinear integral equation (NLIE) based on a previously guessed asymptotic Bethe Ansatz. The solutions of this Bethe Ansatz are characterised by the length L of the correspondent spin chain and by the number s of its excitations. A NLIE allows one, at least in principle, to make analytical and numerical calculations for arbitrary values of these parameters. The results have been rather exciting. In the important regime of high Lorentz spin, the NLIE clarifies how it reduces to a linear integral equations which governs the subleading order in s, o(s0). This also holds in the regime with L ! 1, L/ ln s finite (long operators case). This region of parameters has been particularly investigated in literature especially because of an intriguing limit into the O(6) sigma model defined on the string side. One of the most powerful methods to keep under control the finite-size spectrum of an integrable relativistic theory is the so called thermodynamic Bethe Ansatz (TBA). We proposed a highly non-trivial generalisation of this technique to the non-relativistic case of AdS5/CFT4 and made the first steps in order to determine its full spectrum - of energies for the AdS side, of anomalous dimensions for the CFT one - at any values of the coupling constant and of the size. At the leading order in the size parameter, the calculation of the finite-size corrections is much simpler and does not necessitate the TBA. It consists in deriving for a nonrelativistc case a method, invented for the first time by L¨uscher to compute the finite-size effects on the mass spectrum of relativisic theories. So, we have formulated a new version of this approach to adapt it to the case of recently found classical string solutions on AdS4 × CP3, inside the new conjecture of an AdS4/CFT3 correspondence. Our results in part confirm the string and algebraic curve calculations, in part are completely new and then could be better understood by the rapidly evolving developments of this extremely exciting research field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Thermodynamic Bethe Ansatz analysis is carried out for the extended-CP^N class of integrable 2-dimensional Non-Linear Sigma Models related to the low energy limit of the AdS_4xCP^3 type IIA superstring theory. The principal aim of this program is to obtain further non-perturbative consistency check to the S-matrix proposed to describe the scattering processes between the fundamental excitations of the theory by analyzing the structure of the Renormalization Group flow. As a noteworthy byproduct we eventually obtain a novel class of TBA models which fits in the known classification but with several important differences. The TBA framework allows the evaluation of some exact quantities related to the conformal UV limit of the model: effective central charge, conformal dimension of the perturbing operator and field content of the underlying CFT. The knowledge of this physical quantities has led to the possibility of conjecturing a perturbed CFT realization of the integrable models in terms of coset Kac-Moody CFT. The set of numerical tools and programs developed ad hoc to solve the problem at hand is also discussed in some detail with references to the code.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In questa tesi ho voluto descrivere il Timing Attack al sistema crittografico RSA, il suo funzionamento, la teoria su cui si basa, i suoi punti di forza e i punti deboli. Questo particolare tipo di attacco informatico fu presentato per la prima volta da Paul C. Kocher nel 1996 all’“RSA Data Security and CRYPTO conferences”. Nel suo articolo “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems” l’autore svela una nuova possibile falla nel sistema RSA, che non dipende da debolezze del crittosistema puramente matematiche, ma da un aspetto su cui nessuno prima di allora si era mai soffermato: il tempo di esecuzione delle operazioni crittografiche. Il concetto è tanto semplice quanto geniale: ogni operazione in un computer ha una certa durata. Le variazioni dei tempi impiegati per svolgere le operazioni dal computer infatti, necessariamente dipendono dal tipo di algoritmo e quindi dalle chiavi private e dal particolare input che si è fornito. In questo modo, misurando le variazioni di tempo e usando solamente strumenti statistici, Kocher mostra che è possibile ottenere informazioni sull’implementazione del crittosistema e quindi forzare RSA e altri sistemi di sicurezza, senza neppure andare a toccare l’aspetto matematico dell’algoritmo. Di centrale importanza per questa teoria diventa quindi la statistica. Questo perché entrano in gioco molte variabili che possono influire sul tempo di calcolo nella fase di decifrazione: - La progettazione del sistema crittografico - Quanto impiega la CPU ad eseguire il processo - L’algoritmo utilizzato e il tipo di implementazione - La precisione delle misurazioni - Ecc. Per avere più possibilità di successo nell’attaccare il sistema occorre quindi fare prove ripetute utilizzando la stessa chiave e input differenti per effettuare analisi di correlazione statistica delle informazioni di temporizzazione, fino al punto di recuperare completamente la chiave privata. Ecco cosa asserisce Kocher: “Against a vulnerable system, the attack is computationally inexpensive and often requires only known ciphertext.”, cioè, contro sistemi vulnerabili, l’attacco è computazionalmente poco costoso e spesso richiede solo di conoscere testi cifrati e di ottenere i tempi necessari per la loro decifrazione.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La tesi di laurea presentata si inserisce nell’ampio contesto della Sicurezza Informatica, in particolare tratta il problema del testing dei sistemi di sicurezza concepiti per contrapporsi alle odierne minacce: gli attacchi mirati (Targeted Attacks) ed in generale le minacce avanzate persistenti (Advanced Persistent Threats). Il principale obiettivo del lavoro svolto è lo sviluppo e la discussione di una metodologia di test per sistemi di sicurezza focalizzati su questo genere di problemi. Le linee guida proposte hanno lo scopo di aiutare a colmare il divario tra quello che viene testato e quello che in realt`a deve essere affrontato realmente. Le attività svolte durante la preparazione della tesi sono state sia di tipo teorico, per quanto concerne lo sviluppo di una metodologia per affrontare al meglio il testing di sistemi di sicurezza a fronte di attacchi mirati, che ne di tipo sperimentale in quanto si sono utilizzati tali concetti per lo svolgimento di test su più strumenti di difesa in uno scenario d’interesse reale.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The work of this thesis is on the implementation of a variable stiffness joint antagonistically actuated by a couple of twisted-string actuator (TSA). This type of joint is possible to be applied in the field of robotics, like UB Hand IV (the anthropomorphic robotic hand developed by University of Bologna). The purposes of the activities are to build the joint dynamic model and simultaneously control the position and stiffness. Three different control approaches (Feedback linearization, PID, PID+Feedforward) are proposed and validated in simulation. To improve the properties of joint stiffness, a joint with elastic element is taken into account and discussed. To the end, the experimental setup that has been developed for the experimental validation of the proposed control approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Due to multiple immune evasion mechanisms of cancer cells, novel therapy approaches are required to overcome the limitations of existing immunotherapies. Bispecific antibodies are potent anti-cancer drugs, which redirect effector T cells for specific tumor cell lysis, thus enabling the patient’s immune system to fight cancer cells. The antibody format used in this proof of concept study–bispecific ideal monoclonal antibodies termed BiMAB–is a tailor-made recombinant protein, which consists of two fused scFv antibodies recognizing different antigens. Both are arranged in tandem on a single peptide chain and the individual variable binding domains are separated by special non-immunogenic linkers. The format is comprised of a scFv targeting CLDN18.2–a gastric cancer tumor associated antigen (TAA) –while the second specificity binds the CD3 epsilon (CD3ε) subunit of the T cell receptor (TCR) on T cells. For the first time, we compared in our IMAB362-based BiMAB setting, four different anti-CD3-scFvs, respectively derived from the mAbs TR66, CLB-T3, as well as the humanized and the murine variant of UCHT1. In addition, we investigated the impact of an N- versus a C-terminal location of the IMAB362-derived scFv and the anti-CD3-scFvs. Thus, nine CLDN18.2 specific BiMAB proteins were generated, of which all showed a remarkably high cytotoxicity towards CLDN18.2-positive tumor cells. Because of its promising effectiveness, 1BiMAB emerged as the BiMAB prototype. The selectivity of 1BiMAB for its TAA and CD3ε, with affinities in the nanomolar range, has been confirmed by in vitro assays. Its dual binding depends on the design of an N-terminally positioned IMAB362 scFv and the consecutive C-terminally positioned TR66 scFv. 1BiMAB provoked a concentration and target cell dependent T cell activation, proliferation, and upregulation of the cytolytic protein Granzyme B, as well as the consequent elimination of target cells. Our results demonstrate that 1BiMAB is able to activate T cells independent of elements that are usually involved in the T cell recognition program, like antigen presentation, MHC restriction, and co-stimulatory effector molecules. In the first in vivo studies using a subcutaneous xenogeneic tumor mouse model in immune incompetent NSG mice, we could prove a significant therapeutic effect of 1BiMAB with partial or complete tumor elimination. The initial in vitro RIBOMAB experiments correspondingly showed encouraging results. The electroporation of 1BiMAB IVT-RNA into target or effector cells was feasible, while the functionality of translated 1BiMAB was proven by induced T cell activation and target cell lysis. Accordingly, we could show that the in vitro RIBOMAB approach was applicable for all nine BiMABs, which proves the RIBOMAB concept. Thus, the CLDN18.2-BiMAB strategy offers great potential for the treatment of cancer. In the future, administered either as protein or as IVT-RNA, the BiMAB format will contribute towards finding solutions to raise and sustain tumor-specific cellular responses elicited by engaged and activated endogenous T cells. This will potentially enable us to overcome immune evasion mechanisms of tumor cells, consequently supporting current solid gastric cancer therapies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The first chapter of this work has the aim to provide a brief overview of the history of our Universe, in the context of string theory and considering inflation as its possible application to cosmological problems. We then discuss type IIB string compactifications, introducing the study of the inflaton, a scalar field candidated to describe the inflation theory. The Large Volume Scenario (LVS) is studied in the second chapter paying particular attention to the stabilisation of the Kähler moduli which are four-dimensional gravitationally coupled scalar fields which parameterise the size of the extra dimensions. Moduli stabilisation is the process through which these particles acquire a mass and can become promising inflaton candidates. The third chapter is devoted to the study of Fibre Inflation which is an interesting inflationary model derived within the context of LVS compactifications. The fourth chapter tries to extend the zone of slow-roll of the scalar potential by taking larger values of the field φ. Everything is done with the purpose of studying in detail deviations of the cosmological observables, which can better reproduce current experimental data. Finally, we present a slight modification of Fibre Inflation based on a different compactification manifold. This new model produces larger tensor modes with a spectral index in good agreement with the date released in February 2015 by the Planck satellite.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis, we shall work in the framework of type IIB Calabi-Yau flux compactifications and present a detailed review of moduli stabilisation studying in particular the phenomenological implications of the LARGE-volume scenario (LVS). All the physical relevant quantities such as moduli masses and soft-terms, are computed and compared to the phenomenological constraints that today guide the research. The structure of this thesis is the following. The first chapter introduces the reader to the fundamental concepts that are essentially supersymmetry-breaking, supergravity and string moduli, which represent the basic framework of our discussion. In the second chapter we focus our attention on the subject of moduli stabilisation. Starting from the structure of the supergravity scalar potential, we point out the main features of moduli dynamics, we analyse the KKLT and LARGE-volume scenario and we compute moduli masses and couplings to photons which play an important role in the early-universe evolution since they are strictly related to the decay rate of moduli particles. The third chapter is then dedicated to the calculation of soft-terms, which arise dynamically from gravitational interactions when moduli acquire a non-zero vacuum expectation value (VeV). In the last chapter, finally, we summarize and discuss our results, underling their phenomenological aspects. Moreover, in the last section we analyse the implications of the outcomes for standard cosmology, with particular interest in the cosmological moduli problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The cybernetics revolution of the last years improved a lot our lives, having an immediate access to services and a huge amount of information over the Internet. Nowadays the user is increasingly asked to insert his sensitive information on the Internet, leaving its traces everywhere. But there are some categories of people that cannot risk to reveal their identities on the Internet. Even if born to protect U.S. intelligence communications online, nowadays Tor is the most famous low-latency network, that guarantees both anonymity and privacy of its users. The aim of this thesis project is to well understand how the Tor protocol works, not only studying its theory, but also implementing those concepts in practice, having a particular attention for security topics. In order to run a Tor private network, that emulates the real one, a virtual testing environment has been configured. This behavior allows to conduct experiments without putting at risk anonymity and privacy of real users. We used a Tor patch, that stores TLS and circuit keys, to be given as inputs to a Tor dissector for Wireshark, in order to obtain decrypted and decoded traffic. Observing clear traffic allowed us to well check the protocol outline and to have a proof of the format of each cell. Besides, these tools allowed to identify a traffic pattern, used to conduct a traffic correlation attack to passively deanonymize hidden service clients. The attacker, controlling two nodes of the Tor network, is able to link a request for a given hidden server to the client who did it, deanonymizing him. The robustness of the traffic pattern and the statistics, such as the true positive rate, and the false positive rate, of the attack are object of a potential future work.