924 resultados para floral authentication
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
In questa tesi si andrà a presentare la realizzazione di un sistema che permette di autenticare la sim di un cellulare, quindi di verificare che un determinato numero di telefono sia realmente nelle mani dell'utente, attraverso servizi di messaggistica online come WhatsApp o Telegram. Il bisogno di questo progetto nasce dal fatto che molte delle attuali applicazioni presenti sul mercato utilizzano sms per autenticare la reale appartenenza di un numero telefonico ad un determinato utente, ma questo comporta un notevole dispendio di soldi, dato che per inviare un gran numero di sms, bisogna sottoscrivere un abbonamento a servizi Gateway Sms che permettono di inviare sms ad un determinato numero dopo aver ricevuto i relativi dati dal mittente.
Resumo:
Background The Arabidopsis FILAMENTOUS FLOWER (FIL) gene encodes a YABBY (YAB) family putative transcription factor that has been implicated in specifying abaxial cell identities and thus regulating organ polarity of lateral organs. In contrast to double mutants of fil and other YAB genes, fil single mutants display mainly floral and inflorescence morphological defects that do not reflect merely a loss of abaxial identity. Recently, FIL and other YABs have been shown to regulate meristem organization in a non-cell-autonomous manner. In a screen for new mutations affecting floral organ morphology and development, we have identified a novel allele of FIL, fil-9 and characterized its floral and meristem phenotypes. Results The fil-9 mutation results in highly variable disruptions in floral organ numbers and size, partial homeotic transformations, and in defective inflorescence organization. Examination of meristems indicates that both fil-9 inflorescence and floral meristems are enlarged as a result of an increase in cell number, and deformed. Furthermore, primordia emergence from these meristems is disrupted such that several primordia arise simultaneously instead of sequentially. Many of the organs produced by the inflorescence meristems are filamentous, yet they are not considered by the plant as flowers. The severity of both floral organs and meristem phenotypes is increased acropetally and in higher growth temperature. Conclusions Detailed analysis following the development of fil-9 inflorescence and flowers throughout flower development enabled the drawing of a causal link between multiple traits of fil-9 phenotypes. The study reinforces the suggested role of FIL in meristem organization. The loss of spatial and temporal organization of fil-9 inflorescence and floral meristems presumably leads to disrupted cell allocation to developing floral organs and to a blurring of organ whorl boundaries. This disruption is reflected in morphological and organ identity aberrations of fil-9 floral organs and in the production of filamentous organs that are not perceived as flowers. Here, we show the role of FIL in reproductive meristem development and emphasize the potential of using fil mutants to study mersitem organization and the related effects on flower morphogenesis.
Resumo:
A new fragile logo watermarking scheme is proposed for public authentication and integrity verification of images. The security of the proposed block-wise scheme relies on a public encryption algorithm and a hash function. The encoding and decoding methods can provide public detection capabilities even in the absence of the image indices and the original logos. Furthermore, the detector automatically authenticates input images and extracts possible multiple logos and image indices, which can be used not only to localise tampered regions, but also to identify the original source of images used to generate counterfeit images. Results are reported to illustrate the effectiveness of the proposed method.
Resumo:
We used a colour-space model of avian vision to assess whether a distinctive bird pollination syndrome exists for floral colour among Australian angiosperms. We also used a novel phylogenetically based method to assess whether such a syndrome represents a significant degree of convergent evolution. About half of the 80 species in our sample that attract nectarivorous birds had floral colours in a small, isolated region of colour space characterized by an emphasis on long-wavelength reflection. The distinctiveness of this 'red arm' region was much greater when colours were modelled for violet-sensitive (VS) avian vision than for the ultraviolet-sensitive visual system. Honeyeaters (Meliphagidae) are the dominant avian nectarivores in Australia and have VS vision. Ancestral state reconstructions suggest that 31 lineages evolved into the red arm region, whereas simulations indicate that an average of five or six lineages and a maximum of 22 are likely to have entered in the absence of selection. Thus, significant evolutionary convergence on a distinctive floral colour syndrome for bird pollination has occurred in Australia, although only a subset of bird-pollinated taxa belongs to this syndrome. The visual system of honeyeaters has been the apparent driver of this convergence.
Resumo:
Over the past several years, a number of design approaches in wireless mesh networks have been introduced to support the deployment of wireless mesh networks (WMNs). We introduce a novel wireless mesh architecture that supports authentication and authorisation functionalities, giving the possibility of a seamless WMN integration into the home's organization authentication and authorisation infrastructure. First, we introduce a novel authentication and authorisation mechanism for wireless mesh nodes. The mechanism is designed upon an existing federated access control approach, i.e. the AAI infrastructure that is using just the credentials at the user's home organization in a federation. Second, we demonstrate how authentication and authorisation for end users is implemented by using an existing web-based captive portal approach. Finally, we observe the difference between the two and explain in detail the process flow of authorized access to network resources in wireless mesh networks. The goal of our wireless mesh architecture is to enable easy broadband network access to researchers at remote locations, giving them additional advantage of a secure access to their measurements, irrespective of their location. It also provides an important basis for the real-life deployment of wireless mesh networks for the support of environmental research.