847 resultados para forward and backward secrecy


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Voltammetric studies of the reduction of oxygen in the room temperature ionic liquid [C(4)dmim][N(Tf)(2)] have revealed a significant positive shift in the back peak potential, relative to that expected for a simple electron transfer. This shift is thought to be due to the strong association of the electrogenerated superoxide anion with the solvent cation. In this work we quantitatively simulate the microdisc electrode voltammetry using a model based upon a one-electron reduction followed by a reversible chemical step, involving the formation of the [C(4)dmim](+)center dot center dot center dot O-2(center dot-) ion-pair, and in doing so we extract a set of parameters completely describing the system. We have simulated the voltammetry in the absence of a following chemical step and have shown that it is impossible to simultaneously fit both the forward and reverse peaks. To further support the parameters extracted from fitting the experimental voltammetry, we have used these parameters to independently simulate the double step chronoamperometric response and found excellent agreement. The parameters used to describe the association of the O-2(center dot-) with the [C(4)dmim](+) were k(f) = 1.4 x 10(3) s(-1) for the first-order rate constant and K-eq = 25 for the equilibrium constant.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The studies on PKMs have attracted a great attention to robotics community. By deploying a parallel kinematic structure, a parallel kinematic machine (PKM) is expected to possess the advantages of heavier working load, higher speed, and higher precision. Hundreds of new PKMs have been proposed. However, due to the considerable gaps between the desired and actual performances, the majorities of the developed PKMs were the prototypes in research laboratories and only a few of them have been practically applied for various applications; among the successful PKMs, the Exechon machine tool is recently developed. The Exechon adopts unique over-constrained structure, and it has been improved based on the success of the Tricept parallel kinematic machine. Note that the quantifiable theoretical studies have yet been conducted to validate its superior performances, and its kinematic model is not publically available. In this paper, the kinematic characteristics of this new machine tool is investigated, the concise models of forward and inverse kinematics have been developed. These models can be used to evaluate the performances of an existing Exechon machine tool and to optimize new structures of an Exechon machine to accomplish some specific tasks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper examines the stability of the benefit transfer function across 42 recreational forests in the British Isles. A working definition of reliable function transfer is Put forward, and a suitable statistical test is provided. A novel split sample method is used to test the sensitivity of the models' log-likelihood values to the removal of contingent valuation (CV) responses collected at individual forest sites, We find that a stable function improves Our measure of transfer reliability, but not by much. We conclude that, in empirical Studies on transferability, considerations of function stability are secondary to the availability and quality of site attribute data. Modellers' can study the advantages of transfer function stability vis-a-vis the value of additional information on recreation site attributes. (c) 2008 Elsevier GmbH. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A methodology has been developed which allows a non-specialist to rapidly design silicon wavelet transform cores for a variety of specifications. The cores include both forward and inverse orthonormal wavelet transforms. This methodology is based on efficient, modular and scaleable architectures utilising time-interleaved coefficients for the wavelet transform filters. The cores are parameterized in terms of wavelet type and data and coefficient word lengths. The designs have been captured in VHDL and are hence portable across a range of silicon foundries as well as FPGA and PLD implementations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The performance of 39 different LDA, GGA, meta-GGA, and hybrid density functionals has been evaluated, for calculating forward and reverse barrier heights of 10 gas-phase reactions involving hydrogen. The reactions are all relevant to astrochemistry. Special focus is put on the applicability of DFT for calculating the rates of corresponding surface hydrogenation reactions that are relevant to the chemistry of ice-coated interstellar grains. General trends in the performance of the density functionals for reactions involving H atoms, H-2, and OH are discussed. The OH+CO reaction is shown to be a very problematic case for DFT. The best overall performance is found for the hybrid density functionals, such as MPW1K, B97-1, B97-2, and B1B95. For several reactions, the HCTH GGA functionals and the VS98 and OLAP3 meta-GGA functionals also give results that are almost as good as those of the hybrid functionals.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Predator–prey interactions are fundamental in the evolution and structure of ecological communities. Our understanding, however, of the strategies used in pursuit and evasion remains limited. Here, we report on the hunting dynamics of the world's fastest land animal, the cheetah, Acinonyx jubatus. Using miniaturized data loggers, we recorded fine-scale movement, speed and acceleration of free-ranging cheetahs to measure how hunting dynamics relate to chasing different sized prey. Cheetahs attained hunting speeds of up to 18.94 m s-1 and accelerated up to 7.5 m s-2 with greatest angular velocities achieved during the terminal phase of the hunt. The interplay between forward and lateral acceleration during chases showed that the total forces involved in speed changes and turning were approximately constant over time but varied with prey type. Thus, rather than a simple maximum speed chase, cheetahs first accelerate to decrease the distance to their prey, before reducing speed 5–8 s from the end of the hunt, so as to facilitate rapid turns to match prey escape tactics, varying the precise strategy according to prey species. Predator and prey thus pit a fine balance of speed against manoeuvring capability in a race for survival.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Physical transceivers have hardware impairments that create distortions which degrade the performance of communication systems. The vast majority of technical contributions in the area of relaying neglect hardware impairments and, thus, assume ideal hardware. Such approximations make sense in low-rate systems, but can lead to very misleading results when analyzing future high-rate systems. This paper quantifies the impact of hardware impairments on dual-hop relaying, for both amplify-and-forward and decode-and-forward protocols. The outage probability (OP) in these practical scenarios is a function of the effective end-to-end signal-to-noise-and-distortion ratio (SNDR). This paper derives new closed-form expressions for the exact and asymptotic OPs, accounting for hardware impairments at the source, relay, and destination. A similar analysis for the ergodic capacity is also pursued, resulting in new upper bounds. We assume that both hops are subject to independent but non-identically distributed Nakagami-m fading. This paper validates that the performance loss is small at low rates, but otherwise can be very substantial. In particular, it is proved that for high signal-to-noise ratio (SNR), the end-to-end SNDR converges to a deterministic constant, coined the SNDR ceiling, which is inversely proportional to the level of impairments. This stands in contrast to the ideal hardware case in which the end-to-end SNDR grows without bound in the high-SNR regime. Finally, we provide fundamental design guidelines for selecting hardware that satisfies the requirements of a practical relaying system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The notion of educating the public through generic healthy eating messages has pervaded dietary health promotion efforts over the years and continues to do so through various media, despite little evidence for any enduring impact upon eating behaviour. There is growing evidence, however, that tailored interventions such as those that could be delivered online can be effective in bringing about healthy dietary behaviour change. The present paper brings together evidence from qualitative and quantitative studies that have considered the public perspective of genomics, nutrigenomics and personalised nutrition, including those conducted as part of the EU-funded Food4Me project. Such studies have consistently indicated that although the public hold positive views about nutrigenomics and personalised nutrition, they have reservations about the service providers' ability to ensure the secure handling of health data. Technological innovation has driven the concept of personalised nutrition forward and now a further technological leap is required to ensure the privacy of online service delivery systems and to protect data gathered in the process of designing personalised nutrition therapies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introdução: A compreensão do papel da intimidade no cuidar é uma questão essencial para o estabelecimento das competências relacionais no processo de cuidar o utente, visto que este se centra no desenvolvimento de relações interpessoais. Na formação dos estudantes de Enfermagem, visa-se o desenvolvimento de competências, assentes na compreensão da dimensão ética dos cuidados de forma a “promover o desenvolvimento ético, com respeito pela autonomia das pessoas, pressupõe prudência, reflexão crítica, consciência de cidadania e de responsabilidade” (Bettencourt, 2008: 61). Sendo assim, o modelo de formação em enfermagem deve assentar num processo reflexivo que proporcione aos estudantes a aquisição de posturas e condutas que lhe permitam a aquisição de competências profissionais. Objetivo: Compreender quais as variáveis que são preditoras do desenvolvimento das dimensões das competências relacionais na preservação da intimidade do utente. Metodologia: Estudo descritivo – correlacional de abordagem quantitativa. A população acessível, foram os estudantes da licenciatura em enfermagem de uma Escola Superior de Enfermagem integrada numa Universidade (A) e de uma Escola Superior de Saúde integrada num Instituto Politécnico (B). A amostra foi constituída por todos os estudantes de enfermagem das referidas escolas a partir do ano em que iniciam o primeiro ensino clínico. Os instrumentos de recolha de dados foram um questionário de caracterização dos estudantes e do contexto clínico e um Inventário de Competências Relacionais de Ajuda (ICRA). Os dados foram analisados com recurso ao Software IBM® SPSS® Statistic (Statistical Package for Social Sciences) de onde se fez uma análise dedutiva. Resultados: As variáveis independentes que melhor predizem a variável dependente (Competências relacionais) são a Escola seguida do ano e do acompanhamento em ensino clínico. Após a utilização dos métodos de seleção de preditores (seleção de Forward, seleção Backward e seleção Stepwise) as nossas variáveis independentes preditoras são o ano, a escola e o tipo de acompanhamento em EC, as restantes foram excluídas (sexo, idade, estado civil e habilitações literárias). Conclusões: As variáveis preditoras evidenciam a sua importância no desenvolvimento das competências relacionais dos estudantes de enfermagem, interferindo nos seus comportamentos enquanto estudantes e futuros enfermeiros. São variáveis que de uma ou de outra forma vão influenciar como é que cada estudante se vai comportar perante as situações de cuidado, onde se salientam nomeadamente o sexo e o ano do curso, variáveis que são intrínsecas a cada estudante, enquanto a Escola e o tipo de acompanhamento em EC são extrínsecas aos estudantes. Estas últimas são, portanto, as que consideramos que poderão ser alteradas em cada escola para que os estudantes adquiram e desenvolvam este domínio das competências de forma mais harmoniosa com o cuidar em enfermagem. Referencia Bibliográficas Almeida, M.J.F. (2004), A intimidade da «pessoa doente» em contexto hospitalar: valores e fundamentos éticos, Dissertação de mestrado, Porto: Faculdade de Medicina da Universidade do Porto. Acedido em 14/08/2012, disponível em: http://hdl.handle.net/10216/9667 Bettencourt, M. (2008), «Tomada de posição sobre a segurança do cliente», Revista da Ordem dos Enfermeiros, Nº 29, maio, Lisboa: Ordem dos enfermeiros, pp. 57-62. Melo, R.C.; Parreira, P.M. (2009), «Predictors of the development of relational skills: Study with students of nursing», in The 1st International Nursing Research Conference of World Academy of Nursing Science, Japão: Kobe International Exhibition Hall, pp. 90. Acedido em 17/08/2012, disponível em: http://wans.umin.ne.jp/confe/wans_1st.pdf

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O presente trabalho tem como objectivo o estudo e projecto de receptores optimizados para sistemas de comunicações por fibra óptica de muito alto débito (10Gb/s e 40Gb/s), com a capacidade integrada de compensação adaptativa pós-detecção da distorção originada pela característica de dispersão cromática e de polarização do canal óptico. O capítulo 1 detalha o âmbito de aplicabilidade destes receptores em sistemas de comunicações ópticas com multiplexagem no comprimento de onda (WDM) actuais. O capítulo apresenta ainda os objectivos e principais contribuições desta tese. O capítulo 2 detalha o projecto de um amplificador pós-detecção adequado para sistemas de comunicação ópticos com taxa de transmissão de 10Gb/s. São discutidas as topologias mais adequadas para amplificadores pós detecção e apresentados os critérios que ditaram a escolha da topologia de transimpedância bem como as condições que permitem optimizar o seu desempenho em termos de largura de banda, ganho e ruído. Para além disso são abordados aspectos relacionados com a implementação física em tecnologia monolítica de microondas (MMIC), focando em particular o impacto destes no desempenho do circuito, como é o caso do efeito dos componentes extrínsecos ao circuito monolítico, em particular as ligações por fio condutor do monólito ao circuito externo. Este amplificador foi projectado e produzido em tecnologia pHEMT de Arsenieto de Gálio e implementado em tecnologia MMIC. O protótipo produzido foi caracterizado na fábrica, ainda na bolacha em que foi produzido (on-wafer) tendo sido obtidos dados de caracterização de 80 circuitos protótipo. Estes foram comparados com resultados de simulação e com desempenho do protótipo montado num veículo de teste. O capítulo 3 apresenta o projecto de dois compensadores eléctricos ajustáveis com a capacidade de mitigar os efeitos da dispersão cromática e da dispersão de polarização em sistemas ópticos com débito binário de 10Gb/s e 40Gb/s, com modulação em banda lateral dupla e banda lateral única. Duas topologias possíveis para este tipo de compensadores (a topologia Feed-Forward Equalizer e a topologia Decision Feedback Equaliser) são apresentadas e comparadas. A topologia Feed-Forward Equaliser que serviu de base para a implementação dos compensadores apresentados é analisada com mais detalhe sendo propostas alterações que permitem a sua implementação prática. O capítulo apresenta em detalhe a forma como estes compensadores foram implementados como circuitos distribuídos em tecnologia MMIC sendo propostas duas formas de implementar as células de ganho variável: com recurso à configuração cascode ou com recurso à configuração célula de Gilbert. São ainda apresentados resultados de simulação e experimentais (dos protótipos produzidos) que permitem tirar algumas conclusões sobre o desempenho das células de ganho com as duas configurações distintas. Por fim, o capítulo inclui ainda resultados de desempenho dos compensadores testados como compensadores de um sinal eléctrico afectado de distorção. No capítulo 4 é feita uma análise do impacto da modulação em banda lateral dupla (BLD) em comparação com a modulação em banda lateral única (BLU) num sistema óptico afectado de dispersão cromática e de polarização. Mostra-se que com modulação em BLU, como não há batimento entre portadoras das duas bandas laterais em consequência do processo quadrático de detecção e há preservação da informação da distorção cromática do canal (na fase do sinal), o uso deste tipo de modulação em sistemas de comunicação óptica permite maior tolerância à dispersão cromática e os compensadores eléctricos são muito mais eficientes. O capítulo apresenta ainda resultados de teste dos compensadores desenvolvidos em cenários experimentais de laboratório representativos de sistemas ópticos a 10Gb/s e 40Gb/s. Os resultados permitem comparar o desempenho destes cenários sem e com compensação eléctrica optimizada, para os casos de modulação em BLU e em BLD, e considerando ainda os efeitos da dispersão na velocidade de grupo e do atraso de grupo diferencial. Mostra-se que a modulação BLU em conjunto com compensação adaptativa eléctrica permite um desempenho muito superior á modulação em BLD largamente utilizada nos sistemas de comunicações actuais. Por fim o capítulo 5 sintetiza e apresenta as principais conclusões deste trabalho.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes a particle swarm optimization (PSO) approach to support electricity producers for multiperiod optimal contract allocation. The producer risk preference is stated by a utility function (U) expressing the tradeoff between the expectation and variance of the return. Variance estimation and expected return are based on a forecasted scenario interval determined by a price range forecasting model developed by the authors. A certain confidence level is associated to each forecasted scenario interval. The proposed model makes use of contracts with physical (spot and forward) and financial (options) settlement. PSO performance was evaluated by comparing it with a genetic algorithm-based approach. This model can be used by producers in deregulated electricity markets but can easily be adapted to load serving entities and retailers. Moreover, it can easily be adapted to the use of other type of contracts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação de Mestrado apresentada ao Instituto de Contabilidade e Administração do Porto para a obtenção do grau de Mestre em Contabilidade e Finanças, sob orientação do Doutor José Campos Amorim

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fatty acid degradation in most organisms occurs primarily via the beta-oxidation cycle. In mammals, beta-oxidation occurs in both mitochondria and peroxisomes, whereas plants and most fungi harbor the beta-oxidation cycle only in the peroxisomes. Although several of the enzymes participating in this pathway in both organelles are similar, some distinct physiological roles have been uncovered. Recent advances in the structural elucidation of numerous mammalian and yeast enzymes involved in beta-oxidation have shed light on the basis of the substrate specificity for several of them. Of particular interest is the structural organization and function of the type 1 and 2 multifunctional enzyme (MFE-1 and MFE-2), two enzymes evolutionarily distant yet catalyzing the same overall enzymatic reactions but via opposite stereochemistry. New data on the physiological roles of the various enzymes participating in beta-oxidation have been gathered through the analysis of knockout mutants in plants, yeast and animals, as well as by the use of polyhydroxyalkanoate synthesis from beta-oxidation intermediates as a tool to study carbon flux through the pathway. In plants, both forward and reverse genetics performed on the model plant Arabidopsis thaliana have revealed novel roles for beta-oxidation in the germination process that is independent of the generation of carbohydrates for growth, as well as in embryo and flower development, and the generation of the phytohormone indole-3-acetic acid and the signal molecule jasmonic acid.