53 resultados para Replay


Relevância:

10.00% 10.00%

Publicador:

Resumo:

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

'Quick Draw' is an installation integrating large-scale fabric works along with a lecture performance recorded as a digital video. 'Quick Draw' engages pictorial, literary and vernacular quotations in order to replay and reveal the complexities of gender politics, representation and language. In particular, it examines the relationship between abstraction, feminism and painting, following through an iconoclastic impulse that is at play in these histories. 'Quick Draw' was developed and presented as a solo exhibition for Seventh Gallery, Melbourne in 2015. 'Quick Draw II' was revised for the exhibition ‘Like A Burden’, held at Metro Arts Galleries, Brisbane in 2015.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

'A big idea transmitted pathetically' was an exhibition comprising a series of drawing works. These works employ a feminist engagement with the ‘big ideas’ of conceptual art, and enact a ‘redrawing’ of these texts to replay and reveal the complexities of gender politics, representation and language. These works were developed and presented for Bus Projects, Melbourne in 2012.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

'I build my dwelling' was an exhibition of works including ‘Muscle flex’, ‘Language is, Language is not’, ‘S.O.S’ and the ‘Studio Remix’, held at Metro Arts Galleries, Brisbane in 2012. This body of work pursues a feminist engagement with art history and philosophy, engaging with pictorial, literary and vernacular quotations in order to replay and reveal the complexities of gender politics, representation and language.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

CD-ROMs have proliferated as a distribution media for desktop machines for a large variety of multimedia applications (targeted for a single-user environment) like encyclopedias, magazines and games. With CD-ROM capacities up to 3 GB being available in the near future, they will form an integral part of Video on Demand (VoD) servers to store full-length movies and multimedia. In the first section of this paper we look at issues related to the single- user desktop environment. Since these multimedia applications are highly interactive in nature, we take a pragmatic approach, and have made a detailed study of the multimedia application behavior in terms of the I/O request patterns generated to the CD-ROM subsystem by tracing these patterns. We discuss prefetch buffer design and seek time characteristics in the context of the analysis of these traces. We also propose an adaptive main-memory hosted cache that receives caching hints from the application to reduce the latency when the user moves from one node of the hyper graph to another. In the second section we look at the use of CD-ROM in a VoD server and discuss the problem of scheduling multiple request streams and buffer management in this scenario. We adapt the C-SCAN (Circular SCAN) algorithm to suit the CD-ROM drive characteristics and prove that it is optimal in terms of buffer size management. We provide computationally inexpensive relations by which this algorithm can be implemented. We then propose an admission control algorithm which admits new request streams without disrupting the continuity of playback of the previous request streams. The algorithm also supports operations such as fast forward and replay. Finally, we discuss the problem of optimal placement of MPEG streams on CD-ROMs in the third section.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As rapid brain development occurs during the neonatal period, environmental manipulation during this period may have a significant impact on sleep and memory functions. Moreover, rapid eye movement (REM) sleep plays an important role in integrating new information with the previously stored emotional experience. Hence, the impact of early maternal separation and isolation stress (MS) during the stress hyporesponsive period (SHRP) on fear memory retention and sleep in rats were studied. The neonatal rats were subjected to maternal separation and isolation stress during postnatal days 5-7 (6 h daily/3 d). Polysomnographic recordings and differential fear conditioning was carried out in two different sets of rats aged 2 months. The neuronal replay during REM sleep was analyzed using different parameters. MS rats showed increased time in REM stage and total sleep period also increased. MS rats showed fear generalization with increased fear memory retention than normal control (NC). The detailed analysis of the local field potentials across different time periods of REM sleep showed increased theta oscillations in the hippocampus, amygdala and cortical circuits. Our findings suggest that stress during SHRP has sensitized the hippocampus amygdala cortical loops which could be due to increased release of corticosterone that generally occurs during REM sleep. These rats when subjected to fear conditioning exhibit increased fear memory and increased, fear generalization. The development of helplessness, anxiety and sleep changes in human patients, thus, could be related to the reduced thermal, tactile and social stimulation during SHRP on brain plasticity and fear memory functions. (C) 2014 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dynamic analysis techniques have been proposed to detect potential deadlocks. Analyzing and comprehending each potential deadlock to determine whether the deadlock is feasible in a real execution requires significant programmer effort. Moreover, empirical evidence shows that existing analyses are quite imprecise. This imprecision of the analyses further void the manual effort invested in reasoning about non-existent defects. In this paper, we address the problems of imprecision of existing analyses and the subsequent manual effort necessary to reason about deadlocks. We propose a novel approach for deadlock detection by designing a dynamic analysis that intelligently leverages execution traces. To reduce the manual effort, we replay the program by making the execution follow a schedule derived based on the observed trace. For a real deadlock, its feasibility is automatically verified if the replay causes the execution to deadlock. We have implemented our approach as part of WOLF and have analyzed many large (upto 160KLoC) Java programs. Our experimental results show that we are able to identify 74% of the reported defects as true (or false) positives automatically leaving very few defects for manual analysis. The overhead of our approach is negligible making it a compelling tool for practical adoption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

During the VITAL cruise in the Bay of Biscay in summer 2002, two devices for measuring the length of swimming fish were tested: 1) a mechanical crown that emitted a pair of parallel laser beams and that was mounted on the main camera and 2) an underwater auto-focus video camera. The precision and accuracy of these devices were compared and the various sources of measurement errors were estimated by repeatedly measuring fixed and mobile objects and live fish. It was found that fish mobility is the main source of error for these devices because they require that the objects to be measured are perpendicular to the field of vision. The best performance was obtained with the laser method where a video-replay of laser spots (projected on fish bodies) carrying real-time size information was used. The auto-focus system performed poorly because of a delay in obtaining focus and because of some technical problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Esta dissertação analisa cinco instituições intergovernamentais na cooperação nuclear e científica entre Argentina e o Brasil, que em diferentes etapas evolutivas procuram o aprofundamento do diálogo entre os dois países geradores do processo de integração da América do Sul. Tais organizações encontram-se permeadas por condições econômicas, políticas e de avanço científico, de ordem interno e externo, que definimos nos termos da CEPAL, como típicas da periferia. As instituições estudadas abrangem as décadas de 1991-2011 e analisamos como na procura por uma melhor inserção internacional, elas respondem às potências do centro: por uma parte seguindo as regras impostas e por outra na busca de algum grau de independência. A pesquisa apresenta uma clara preocupação pelo desenvolvimento, que foi entendido pelas lideranças argentinas e brasileiras no âmbito da cooperação e que oferece a possibilidade de formar blocos institucionais que forneçam à região uma maior ação no sistema internacional.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A full understanding of failure mechanism, critical hydrological condition, and process of mobilization and deposition of a landslide is essential for optimal design of stabilization measure and forecasting of landslide hazard. This requires a quantitative study of hydrological response of a slope to rainfall through field monitoring, laboratory test and numerical modelling. At 13:40 on September 18, 2002, a fill slope failed following a period of prolonged rain in Shenzhen, resulting in 5 fatalities and 31 injuries. The failed mass with a volume about 2.5×104m3 traveled about 140m on level ground. Field monitoring, laboratory test, theoretical analysis and numerical modelling were carried out to undestand the hydrological response and failure mechanism of this fill slope. This thesis mainly focuses on the following aspects: (1) The hydrological responses and failure processes of slopes under rainfall infiltration were reviewed. Firstly, the factors influencing on the hydrological responses of slopes were analysed. Secondly, the change of stress state of slope soil and modelling methods of slope failure under rainfall infiltration were reviewed. (2) The characteristics of the Yangbaodi landslide and associated rainfall triggering the failure were presented. The failure was characterized by shallow flowslide, due to an increase of ground water table caused by rainfall infiltration. (3) A fully automated instrumentation was carried out to monitor rainfall, and saturated – unsaturated hydrological response of the fill slope, using a raingauge, piezometers, tensiometers and moisture probes. A conceptual hydrogeological model was presented based on field monitoring and borehole data. Analysis of monitoring data showed that the high pore water pressure in fill slope was caused by upward flow of semiconfined groundwater in the moderately decomposed granite. (4) Laboratory and in-situ testing was performed to study the physical and mechanical properties of fills. Isotropically consolidated undrained compression tests and anisotropically consolidated constant shear stress tests were carried out to understand the failure mechanism of the fill slope. It is indicated that loosely compacted soil is of strain-softening behaviour under undrained conditions, accompanied with a rapid increase in excess pore water pressure. In anisotropically consolidated constant shear stress tests, a very small axial strain was required to induce the failure and the excess pore water pressure increased quickly at failure. This indicated that static liquefaction caused by rise in groundwater table due to rainfall infiltration occurred. (5) The hydraulic conductivity of the highly and moderately decomposed granite was estimated using monitering data of pore water pressure. A saturated – unsaturated flow was modeled to study the hydrological response of the fill slope using rainfall records. It was observed that the lagged failure was due to the geological conditions and the discrepancy of hydraulic conductivity of slope soils. The hydraulic conductivity of moderately decomposed granite is relatively higher than the other materials, resulting in a semiconfied groundwater flow in the moderately decomposed granite, and subsequent upward flow into the upper fill layer. When the ground water table in the fill layer was increased to the critical state, the fill slope failed. (6) Numerical exercises were conducted to replay the failure process of the fill slope, based on field monitoring, laboratory and in-situ testing. It was found that the fill slope was mobilized by a rapid transfer of the concentrated shear stress. The movement of failure mass was characterized by viscosity fluid with a gradual increase in velocity. The failure process, including mobilization and subsequent movement and deposition, was studied using numerical methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Much work on the performance of Web proxy caching has focused on high-level metrics such as hit rate and byte hit rate, but has ignored all the information related to the cachability of Web objects. Uncachable objects include those fetched by dynamic requests, objects with uncachable HTTP status code, objects with the uncachable HTTP header, objects with an HTTP 1.0 cookie, and objects without a last-modified header. Although some researchers filter the Web traces before they use them for analysis or simulation,many do not have a comprehensive understanding of the cachability of Web objects. In this paper we evaluate all the reasons that a Web object might be uncachable. We use traces from NLANR. Since these traces do not contain HTTP header information, we replay them using request generator to get the response header information. We find that between 15% and 40% of Web objects in our traces can not be cached by a Web proxy server. We use a LRU simulator to show the performance gap when the cachability is either considered or not. We show the characteristics of the cachable data set and find that all its characteristics are fairly similar to that of total data set. Finally, we present some additional results for the cachable and total data set: (1) The main reasons for uncachability are: dynamic requests, responses without last-modified header, responses with HTTP "302 Moved Temporarily" status code, and responses with a HTTP/1.0 cookie. (2) The cachability of Web objects can not be ignored in simulation because uncachable objects comprise a huge percentage of the total trace. Simulations without cachability consideration will be misleading.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes the use of the Euler equations for the generation and testing of tabular aerodynamic models for flight dynamics analysis. Maneuvers for the AGARD Standard Dynamics Model sharp leading-edge wind-tunnel geometry are considered as a test case. Wind-tunnel data is first used to validate the prediction of static and dynamic coefficients at both low and high angles, featuring complex vortical flow, with good agreement obtained at low to moderate angles of attack. Then the generation of aerodynamic tables is described based on a data fusion approach. Time-optimal maneuvers are generated based on these tables, including level flight trim, pull-ups at constant and varying incidence, and level and 90 degrees turns. The maneuver definition includes the aircraft states and also the control deflections to achieve the motion. The main point of the paper is then to assess the validity of the aerodynamic tables which were used to define the maneuvers. This is done by replaying them, including the control surface motions, through the time accurate computational fluid dynamics code. The resulting forces and moments are compared with the tabular values to assess the presence of inadequately modeled dynamic or unsteady effects. The agreement between the tables and the replay is demonstrated for slow maneuvers. Increasing rate maneuvers show discrepancies which are ascribed to vortical flow hysteresis at the higher rate motions. The framework is suitable for application to more complex viscous flow models, and is powerful for the assessment of the validity of aerodynamics models of the type currently used for studies of flight dynamics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.