989 resultados para ink reduction software
Resumo:
language (such as C++ and Java). The model used allows to insert watermarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic watermarking schemes were presented and their security discussed.
Resumo:
This article elucidates and analyzes the fundamental underlying structure of the renormalization group (RG) approach as it applies to the solution of any differential equation involving multiple scales. The amplitude equation derived through the elimination of secular terms arising from a naive perturbation expansion of the solution to these equations by the RG approach is reduced to an algebraic equation which is expressed in terms of the Thiele semi-invariants or cumulants of the eliminant sequence { Zi } i=1 . Its use is illustrated through the solution of both linear and nonlinear perturbation problems and certain results from the literature are recovered as special cases. The fundamental structure that emerges from the application of the RG approach is not the amplitude equation but the aforementioned algebraic equation. © 2008 The American Physical Society.
Resumo:
Sub-oxide-to-metallic highly-crystalline nanowires with uniformly distributed nanopores in the 3 nm range have been synthesized by a unique combination of the plasma oxidation, re-deposition and electron-beam reduction. Electron beam exposure-controlled oxide → sub-oxide → metal transition is explained using a non-equilibrium model.
Resumo:
Using density functional theory, we have investigated the catalytic properties of bimetallic complex catalysts PtlAum(CO)n (l + m = 2, n = 1–3) in the reduction of SO2 by CO. Due to the strong coupling between the C-2p and metal 5d orbitals, pre-adsorption of CO molecules on the PtlAum is found to be very effective in not only reducing the activation energy, but also preventing poisoning by sulfur. As result of the coupling, the metal 5d band is broadened and down-shifted, and charge is transferred from the CO molecules to the PtlAum. As SO2 is adsorbed on the catalyst, partial charge moves to the anti-σ bonding orbitals between S and O in SO2, weakening the S–O bond strength. This effect is enhanced by pre-adsorbing up to three CO molecules, therefore the S–O bonds become vulnerable. Our results revealed the mechanism of the excellent catalytic properties of the bimetallic complex catalysts.
Resumo:
The catalytic activities, to the reduction of SO2 by CO, of clusters PtlAum (l + m = 2) with or without preadsorbing CO molecules are investigated using first-principles density functional theory. We find that the PtAu(CO)n (n = 1–3) clusters show more excellent catalytic properties than either pure metallic catalysts. Preadsorption of CO to the catalysts could effectively avoid platinum-based catalyst sulfur poisoning; as more CO molecules preadsorbed to the catalysts, the energy barriers for the carbonyl sulfide (COS) molecule’s desorption from the catalyst are remarkably decreased. We propose an ideal catalytic cycle to simultaneously get rid of SO2 and CO over the catalysts PtAu(CO)3.
Resumo:
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jump instructions or unconditional branch statements (UBS) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and/or integrity checks change and the target address is not computed correctly. Gupta and Pieprzyk's attack uses debugger capabilities such as register and address lookup and breakpoints to minimize the requirement to manually inspect the software. Using these resources, the FBF and calls to the same is identified, correct displacement values are generated and calls to FBF are replaced by the original UBS transferring control of the attack to the correct target instruction. In this paper, we propose a watermarking model that provides security against such debugging attacks. Two primary measures taken are shifting the stack pointer modification operation from the FBF to the individual UBSs, and coding the stack pointer modification in the same language as that of the rest of the code rather than assembly language to avoid conspicuous contents. The manual component complexity increases from O(1) in the previous scheme to O(n) in our proposed scheme.
Resumo:
Organisations are constantly seeking new ways to improve operational efficiencies. This research study investigates a novel way to identify potential efficiency gains in business operations by observing how they are carried out in the past and then exploring better ways of executing them by taking into account trade-offs between time, cost and resource utilisation. This paper demonstrates how they can be incorporated in the assessment of alternative process execution scenarios by making use of a cost environment. A genetic algorithm-based approach is proposed to explore and assess alternative process execution scenarios, where the objective function is represented by a comprehensive cost structure that captures different process dimensions. Experiments conducted with different variants of the genetic algorithm evaluate the approach's feasibility. The findings demonstrate that a genetic algorithm-based approach is able to make use of cost reduction as a way to identify improved execution scenarios in terms of reduced case durations and increased resource utilisation. The ultimate aim is to utilise cost-related insights gained from such improved scenarios to put forward recommendations for reducing process-related cost within organisations.
Resumo:
This study reports the synthesis, characterization and application of nano zero-valent iron (nZVI). The nZVI was produced by a reduction method and compared with commercial available ZVI powder for Pb2+ removal from aqueous phase. Comparing with commercial ZVI, the laboratory made nZVI powder has a much higher specific surface area. XRD patterns have revealed zero valent iron phases in two ZVI materials. Different morphologies have been observed using SEM and TEM techniques. EDX spectrums revealed even distribution of Pb on surface after reaction. The XPS analysis has confirmed that immobilized lead was present in its zero-valent and bivalent forms. ‘Core-shell’ structure of prepared ZVI was revealed based on combination of XRD and XPS characterizations. In addition, comparing with Fluka ZVI, this lab made nZVI has much higher reactivity towards Pb2+ and within just 15 mins 99.9% removal can be reached. This synthesized nano ZVI material has shown great potential for heavy metal immobilization from waste water.
Resumo:
The primary motivation for the vehicle replacement schemes that were implemented in many countries was to encourage the purchase of new cars. The basic assumption of these schemes was that these acquisitions would benefit both the economy and the environment as older and less fuel-efficient cars were scrapped and replaced with more fuel-efficient models. In this article, we present a new environmental impact assessment method for assessing the effectiveness of scrappage schemes for reducing CO2 emissions taking into account the rebound effect, driving behavior for older versus new cars and entire lifecycle emissions for during the manufacturing processes of new cars. The assessment of the Japanese scrappage scheme shows that CO2 emissions would only decrease if users of the scheme retained their new gasoline passenger vehicles for at least 4.7 years. When vehicle replacements were restricted to hybrid cars, the reduction in CO2 achieved by the scheme would be 6-8.5 times higher than the emissions resulting from a scheme involving standard, gasoline passenger vehicles. Cost-benefit analysis, based on the emission reduction potential, showed that the scheme was very costly. Sensitivity analysis showed that the Japanese government failed to determine the optimum, or target, car age for scrapping old cars in the scheme. Specifically, scrapping cars aged 13 years and over did not maximize the environmental benefits of the scheme. Consequently, modifying this policy to include a reduction in new car subsidies, focused funding for fuel-efficient cars, and modifying the target car age, would increase environmental benefits. © 2013 Elsevier Ltd.
Resumo:
Japan's fishery harvest peaked in the late 1980s. To limit the race for fish, each fisherman could be provided with specific catch limits in the form of individual transferable quotas (ITQs). The market for ITQs would also help remove the most inefficient fishers. In this article we estimate the potential cost reduction associated with catch limits, and find that about 300 billion yen or about 3 billion dollars could be saved through the allocation and trading of individual-specific catch shares.
Resumo:
The international shipping sector is a major contributor to global greenhouse gas (GHG) emissions. The International Maritime Organisation (IMO) has adopted some technical and operational measures to reduce GHG emissions from international shipping. However, these measures may not be enough to reduce the amount of GHG emissions from international shipping to an acceptable level. Therefore, the IMO Member States are currently considering a number of proposals for the introduction of market-based measures (MBMs). During the negotiation process, some leading developing countries raised questions about the probable confl ict of the proposed MBMs with the rules of the World Trade Organisation (WTO). This article comprehensively examines this issue and argues that none of the MBM proposals currently under consideration by the IMO has any confl ict with the WTO rules.
Resumo:
With increased consolidation and a few large vendors dominating the market, how can software vendors distinguish themselves in order to maintain profitability and gain market share? Increasingly customers are becoming more proactive in selecting a vendor and a product, drawing upon various publications, market surveys, mailing lists, and, of course, other users. In particular, though, a company's Web site is the obvious place to begin information gathering. In sum, it may seem that the days of the uninformed customer prepared to be "sold to" are potentially all but gone.
Resumo:
The adoption of packaged software is becoming increasingly common in a variety of organizations and much of the packaged software literature presents this as a straightforward, linear process based on rationalistic evaluation. This paper applies the framework of power relations developed by Markus and Bjørn-‐Anderson (1987) to a longitudinal study concerning the adoption of a customer relationship management package in a small organization. This is used to highlight both overt and covert power issues within the selection and procurement of the product and illustrate the interplay of power between senior management, IT managers, IT vendors and consultants, and end-‐users. The paper contributes to the growing body of literature on packaged software and also to our understanding of how power is deeply embedded within the surrounding processes.
Resumo:
Purpose – This paper seeks to analyse the process of packaged software selection in a small organization, focussing particularly on the role of IT consultants as intermediaries in the process. Design/methodology/approach – This is based upon a longitudinal, qualitative field study concerning the adoption of a customer relationship management package in an SME management consultancy. Findings – The authors illustrate how the process of “salesmanship”, an activity directed by the vendor/consultant and focussed on the interests of senior management, marginalises user needs and ultimately secures the procurement of the software package. Research limitations/implications – Despite the best intentions the authors lose something of the rich detail of the lived experience of technology in presenting the case study as a linear narrative. Specifically, the authors have been unable to do justice to the complexity of the multifarious ways in which individual perceptions of the project were influenced and shaped by the opinions of others. Practical implications – Practitioners, particularly those from within SMEs, should be made aware of the ways in which external parties may have a vested interest in steering projects in a particular direction, which may not necessarily align with their own interests. Originality/value – This study highlights in detail the role of consultants and vendors in software selection processes, an area which has received minimal attention to date. Prior work in this area emphasises the necessary conditions for, and positive outcomes of, appointing external parties in an SME context, with only limited attention being paid to the potential problems such engagements may bring.