931 resultados para Router ottico, Click, Reti ottiche, linux
Resumo:
Novel profluorescent nitroxides bearing a triazole linker between the coumarin fluorophore and an isoindoline nitroxide were prepared in good yields using the coppercatalyzed azide�alkyne 1,3-dipolar cycloaddition reaction (CuAAC). Nitroxides containing 7-hydroxy and 7-diethylamino substitution on their coumarin rings displayed significant fluorescence suppression, and upon reaction with methyl radicals, normal fluorescence emission was returned. The fluorescence emission for the 7-hydroxycoumarin nitroxide and its diamagnetic analogue was found to be strongly influenced by pH with maximal fluorescence emission achieved in basic solution. Solvent polarity was also shown to affect fluorescence emission. The significant difference in fluorescence output between the nitroxides and their corresponding diamagnetic analogues makes these compounds ideal tools for monitoring processes involving free-radical species.
Resumo:
This project focused on the first application of the copper catalyzed azide alkyne cycloaddition reaction for the generation of novel profluorescent systems. Through this approach four novel profluorescent nitroxides were prepared both rapidly and in good yield from coumarin and nitroxide CuAAC coupling partners. Specifically, 7-hydroxy, 7-diethylamino, 6-bromo and unsubstituted coumarin analogues bearing an azide group in the 3-position were prepared and conjugatively joined to an alkyne isoindoline nitroxide previously reported by our group. To explore the impact of the nitroxide moiety on the fluorescence of these systems, methoxyamine analogues of the corresponding nitroxide analogues were prepared. Spectrophotometric analysis of these methoxyamine analogues revealed that the aromatic systems possessed high quantum yields. However, the quantum yield efficiency was found to be dependent on the presence of electron donating substituents in the 7-position of the coumarin motif, which enhanced the charge-transfer character of the system. Furthermore, spectrophotometric analysis of nitroxide analogues demonstrated that the triazole effectively mediated fluorophore-nitroxide communication, as evidenced by the low quantum yield values of the nitroxide analogues. These results suggest that this technique can be used to conjugatively join any azide bearing fluorescent system with the key alkyne isoindoline coupling partner allowing for the rapid generation of diverse profluorescent systems.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.
Resumo:
To the editor...
Resumo:
Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.
Resumo:
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.
Resumo:
Herein we describe the design and synthesis of a series of solid-tethered [2]rotaxanes utilising crown ether-naphthalene diimide or crown ether- bipyridinium host guest interactions. TentaGel polystyrene resins were initially modified in a two-stage procedure to azide functionalised beads before the target supramolecular architectures were attached using a copper catalysed “click” procedure. The final assembly was examined using IR spectroscopy and gel-phase 1H High Resolution Magic Angle Spinning (HR MAS) NMR spectroscopy. The HR MAS technique enabled a direct comparison between the solid-tethered architectures and the synthesis and characterisation of analogous solution-based [2]rotaxanes to be made.
Resumo:
This paper traces the process of invention of adoption of WriteCite.com which is an internet based learning tool used by students to format citation lists. A number of theoretical issues relating to development and deployment of online learning tools are addressed in this paper. A significant finding in this paper is that adoption rate of new technologies amongst students, in this case for WriteCite.com, is not immediately global in nature despite the internet's ubiquity and the existence of internationally accepted bibliographic styles. Rather, and in contrast to neo theories of technology internationalisation, early-stage adoption tends to be geo-centric and concentrated in the US. In the case of WriteCite.com, which has not been sponsored by an academic institution, the findings reflect voluntary rates of globa adoption. From an applied perspective, the process of identifying globally contestable markets is relevant to developers of online learning tools.
Resumo:
A rapid and catalyst-free cycloaddition system for visible-light-induced click chemistry is reported. A readily accessible photoreactive 2H-azirine moiety was designed to absorb light at wavelengths above 400 nm. Irradiation with low-energy light sources thus enables efficient small-molecule synthesis with a diverse range of multiple-bond-containing compounds. Moreover, in order to demonstrate the efficiency of the current approach, quantitative ligation of the photoactivatable chromophore with functional polymeric substrates was performed and full conversion with irradiation times of only 1 min at ambient conditions was achieved. The current report thus presents a highly efficient method for applications involving selective cycloaddition to electron-deficient multiple-bond-containing materials.
Resumo:
Methacrylate-based hydrogels, such as homo- and copolymers of 2-hydroxyethyl methacrylate (HEMA), have demonstrated significant potential for use in biomedical applications. However, many of these hydrogels tend to resist cell attachment and growth at their surfaces, which can be detrimental for certain applications. In this article, glycidyl methacrylate (GMA) was copolymerized with HEMA to generate gels functionalized with epoxide groups. The epoxides were then functionalized by two sequential click reactions, namely, nucleophilic ring opening of epoxides with sodium azide and then coupling of small molecules and peptides via Huisgen's copper catalyzed 1,3-dipolar cycloaddition of azides with alkynes. Using this strategy it was possible to control the degree of functionalization by controlling the feed ratio of monomers during polymerization. In vitro cell culture of human retinal pigment epithelial cell line (ARPE-19) with the hydrogels showed improved cell adhesion, growth and proliferation for hydrogels that were functionalized with a peptide containing the RGD sequence. In addition, the cell attachment progressively decreased with increasing densities of the RGD containing peptide. In summary, a facile methodology has been presented that gives rise to hydrogels with controlled degrees of functionality, such that the cell response is directly related to the levels and nature of that functionality.
Resumo:
This work reports on the synthesis of a wide range of ferrocenyl-substituted amino acids and peptides in excellent yield. Conjugation is established via copper-catalyzed 1,3-dipolar cycloaddition. Two complementary strategies were employed for conjugation, one involving cycloaddition of amino acid derived azides with ethynyl ferrocene 1 and the other involves cycloaddition between amino acid derived alkynes with ferrocene-derived azides 2 and 3. Labeling of amino acids at multiple sites with ferrocene is discussed. A new route to 1,1'-unsymmetrically substituted ferrocene conjugates is reported. A novel ferrocenophane 19 is accessed via bimolecular condensation of amino acid derived bis-alkyne 9b with the azide 2. The electrochemical behavior of some selected ferrocene conjugates has been studied by cyclic voltammetry.
Resumo:
Different strategies for functionalization of the core region and periphery of core-shell type hyperbranched polymers (HBP) using the ``click'' reaction have been explored. For achieving periphera functionalization, an AB(2) + A-R-1 + A-R-2 type copolymerization approach was used, where A-R-1 is heptaethylene glycol monomethyl ether (HPEG-M) and A-R-2 is tetraethylene glycol monopropargyl ether (TEG-P). A very small mole fraction of the propargyl containing monomer, TEG-P, was used to ensure that the water-solubility of the hyperbranched polymer is minimally affected. Similarly, to incorporate propargyl groups in the core region, a new propargyl group bearing B-2-typ monomer was designed and utilized in an AB(2) + A(2) + B-2 + A-R-1 type copolymerization, such that the total mole fraction of B-2 + A(2) is small and their mole-ratio is 1: 1. Further, using a combination of both the above approaches, namely AB(2) + A(2) + B-2 + A-R-1 + A-R-2, hyperbranched structures that incorporate propargyl groups both at theperiphery and within the core were synthesized. Since the AB(2) monomer carries a hexamethylene spacer (C-6) and the periphery is PEGylated all the derivatized polymers form core-shell type structures in aqueous solutions. Attempts were made to ascertain and probe the location of the propargyl groups in these HBP's, by ``clicking'' azidomethylpyrene, onto them. However, the fluorescence spectra of aqueous solutions of the pyrene derivatized polymers were unable to discriminate between the various locations, possibly because the relatively hydrophobic pyrene units insert themselves into the core region to minimize exposure to water.
Resumo:
The TCP protocol is used by most Internet applications today, including the recent mobile wireless terminals that use TCP for their World-Wide Web, E-mail and other traffic. The recent wireless network technologies, such as GPRS, are known to cause delay spikes in packet transfer. This causes unnecessary TCP retransmission timeouts. This dissertation proposes a mechanism, Forward RTO-Recovery (F-RTO) for detecting the unnecessary TCP retransmission timeouts and thus allow TCP to take appropriate follow-up actions. We analyze a Linux F-RTO implementation in various network scenarios and investigate different alternatives to the basic algorithm. The second part of this dissertation is focused on quickly adapting the TCP's transmission rate when the underlying link characteristics change suddenly. This can happen, for example, due to vertical hand-offs between GPRS and WLAN wireless technologies. We investigate the Quick-Start algorithm that, in collaboration with the network routers, aims to quickly probe the available bandwidth on a network path, and allow TCP's congestion control algorithms to use that information. By extensive simulations we study the different router algorithms and parameters for Quick-Start, and discuss the challenges Quick-Start faces in the current Internet. We also study the performance of Quick-Start when applied to vertical hand-offs between different wireless link technologies.