908 resultados para Security-critical software
Resumo:
This paper presents the proposal for a reference model for developing software aimed at small companies. Despite the importance of that represent the small software companies in Latin America, the fact of not having its own standards, and able to meet their specific, has created serious difficulties in improving their process and also in quality certification. In this sense and as a contribution to better understanding of the subject they propose a reference model and as a means to validate the proposal, presents a report of its application in a small Brazilian company, committed to certification of the quality model MPS.BR.
Resumo:
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of the security against state-of-the-art cryptanalysis methods is also provided. In comparison to the algorithms submitted to the SHA-3 competition, Whirlwind takes recent developments in cryptanalysis into account by design. Even though software performance is not outstanding, it compares favourably with the 512-bit versions of SHA-3 candidates such as LANE or the original CubeHash proposal and is about on par with ECHO and MD6.
Resumo:
For the last decade, elliptic curve cryptography has gained increasing interest in industry and in the academic community. This is especially due to the high level of security it provides with relatively small keys and to its ability to create very efficient and multifunctional cryptographic schemes by means of bilinear pairings. Pairings require pairing-friendly elliptic curves and among the possible choices, Barreto-Naehrig (BN) curves arguably constitute one of the most versatile families. In this paper, we further expand the potential of the BN curve family. We describe BN curves that are not only computationally very simple to generate, but also specially suitable for efficient implementation on a very broad range of scenarios. We also present implementation results of the optimal ate pairing using such a curve defined over a 254-bit prime field. (C) 2001 Elsevier Inc. All rights reserved.
Resumo:
This work examines the extraction of mechanical properties from instrumented indentation P-h(s) curves via extensive three-dimensional finite element analyses for pyramidal tips in a wide range of solids under frictional and frictionless contact conditions. Since the topography of the imprint changes with the level of pile-up or sink-in, a relationship is identified between correction factor beta in the elastic equation for the unloading indentation stage and the amount of surface deformation effects. It is shown that the presumption of a constant beta significantly affects mechanical property extractions. Consequently, a new best-fit function is found for the correlation between penetration depth ratios h(e)/h(max), h(r)/h(max) and n, circumventing the need for the assumption of a constant value for beta, made in our prior investigation [Acta Mater. 53 (2005) pp. 3545-3561]. Simulations under frictional contact conditions provide sensible boundaries for the influence of friction on both h(e)/h(max) and h(r)/h(max). Friction is essentially found to induce an overestimation in the inferred n. Instrumented indentation experiments are also performed in three archetypal metallic materials exhibiting distinctly different contact responses. Mechanical property extractions are finally demonstrated in each of these materials.
Resumo:
This paper compares the critical impeller speed results for 6 L Denver and Wemco bench-scale flotation cells with findings from a study by Van der Westhuizen and Deglon [Van der Westhuizen, A.P., Deglon, D.A., 2007. Evaluation of solids suspension in a pilot-scale mechanical flotation cell: the critical impeller speed. Minerals Engineering 20,233-240; Van der Westhuizen, A.P., Deglon, D.A., 2008. Solids suspension in a pilot scale mechanical flotation cell: a critical impeller speed correlation. Minerals Engineering 21, 621-629] conducted in a 125 L Batequip flotation cell. Understanding solids suspension has become increasingly important due to dramatic increases in flotation cell sizes. The critical impeller speed is commonly used to indicate the effectiveness of solids suspension. The minerals used in this study were apatite, quartz and hematite. The critical impeller speed was found to be strongly dependent on particle size, solids density and air flow rate, with solids concentration having a lesser influence. Liquid viscosity was found to have a negligible effect. The general Zwietering-type critical impeller speed correlation developed by Van der Westhuizen and Deglon [Van der Westhuizen, A.P., Deglon, D.A., 2008. Solids suspension in a pilot scale mechanical flotation cell: a critical impeller speed correlation. Minerals Engineering 21, 621-629] was found to be applicable to all three flotation machines. The exponents for particle size, solids concentration and liquid viscosity were equivalent for all three cells. The exponent for solids density was found to be less significant than that obtained by the previous authors, and to be consistent with values reported in the general literature for stirred tanks. Finally, a new dimensionless critical impeller speed correlation is proposed where the particle size is divided by the impeller diameter. This modified equation generally predicts the experimental measurements well, with most predictions within 10% of the experimental. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may lead to irreparable damage, physically, morally, and socially to the patient, potentially shaking the credibility of the healthcare institution. Medical images play a crucial role in such context, given their importance in diagnosis, treatment, and research. Therefore, it is vital to take measures in order to prevent tampering and determine their provenance. This demands adoption of security mechanisms to assure information integrity and authenticity. There are a number of works done in this field, based on two major approaches: use of metadata and use of watermarking. However, there still are limitations for both approaches that must be properly addressed. This paper presents a new method using cryptographic means to improve trustworthiness of medical images, providing a stronger link between the image and the information on its integrity and authenticity, without compromising image quality to the end user. Use of Digital Imaging and Communications in Medicine structures is also an advantage for ease of development and deployment.
Resumo:
All debates in history—who started the Cold War, how successful were the Chartists in achieving their aims, to what extent was the recession of the American frontier culturally significant in American history— are debates between competing narrative interpretations. Moreover, because the historical imagination itself exists intertextually within our own social and political environment, the past is never discovered set aside from everyday life. History is designed and composed in the here and now.
Resumo:
This report describes recent updates to the custom-built data-acquisition hardware operated by the Center for Hypersonics. In 2006, an ISA-to-USB bridging card was developed as part of Luke Hillyard's final-year thesis. This card allows the hardware to be connected to any recent personal computers via a (USB or RS232) serial port and it provides a number of simple text-based commands for control of the hardware. A graphical user interface program was also updated to help the experimenter manage the data acquisition functions. Sampled data is stored in text files that have been compressed with the gzip for mat. To simplify the later archiving or transport of the data, all files specific to a shot are stored in a single directory. This includes a text file for the run description, the signal configuration file and the individual sampled-data files, one for each signal that was recorded.
Resumo:
We present an analysis of previously published measurements of the London penetration depth of layered organic superconductors. The predictions of the BCS theory of superconductivity are shown to disagree with the measured zero temperature, in plane, London penetration depth by up to two orders of magnitude. We find that fluctuations in the phase of the superconducting order parameter do not determine the superconducting critical temperature as the critical temperature predicted for a Kosterlitz–Thouless transition is more than an order of magnitude greater than is found experimentally for some materials. This places constraints on theories of superconductivity in these materials.
Resumo:
We investigate the effect of the coefficient of the critical nonlinearity for the Neumann problem on the existence of least energy solutions. As a by-product we establish a Sobolev inequality with interior norm.
Resumo:
We consider the semilinear Schrodinger equation -Deltau+V(x)u= K(x) \u \ (2*-2 u) + g(x; u), u is an element of W-1,W-2 (R-N), where N greater than or equal to4, V, K, g are periodic in x(j) for 1 less than or equal toj less than or equal toN, K>0, g is of subcritical growth and 0 is in a gap of the spectrum of -Delta +V. We show that under suitable hypotheses this equation has a solution u not equal 0. In particular, such a solution exists if K equivalent to 1 and g equivalent to 0.
Resumo:
We investigate the solvability of the Neumann problem (1.1) involving a critical Sobolev exponent. In the first part of this work it is assumed that the coeffcients Q and h are at least continuous. Moreover Q is positive on overline Omega and lambda > 0 is a parameter. We examine the common effect of the mean curvature and the shape of the graphs of the coeffcients Q and h on the existence of low energy solutions. In the second part of this work we consider the same problem with Q replaced by - Q. In this case the problem can be supercritical and the existence results depend on integrability conditions on Q and h.
Resumo:
The XSophe-Sophe-XeprView((R)) computer simulation software suite enables scientists to easily determine spin Hamiltonian parameters from isotropic, randomly oriented and single crystal continuous wave electron paramagnetic resonance (CW EPR) spectra from radicals and isolated paramagnetic metal ion centers or clusters found in metalloproteins, chemical systems and materials science. XSophe provides an X-windows graphical user interface to the Sophe programme and allows: creation of multiple input files, local and remote execution of Sophe, the display of sophelog (output from Sophe) and input parameters/files. Sophe is a sophisticated computer simulation software programme employing a number of innovative technologies including; the Sydney OPera HousE (SOPHE) partition and interpolation schemes, a field segmentation algorithm, the mosaic misorientation linewidth model, parallelization and spectral optimisation. In conjunction with the SOPHE partition scheme and the field segmentation algorithm, the SOPHE interpolation scheme and the mosaic misorientation linewidth model greatly increase the speed of simulations for most spin systems. Employing brute force matrix diagonalization in the simulation of an EPR spectrum from a high spin Cr(III) complex with the spin Hamiltonian parameters g(e) = 2.00, D = 0.10 cm(-1), E/D = 0.25, A(x) = 120.0, A(y) = 120.0, A(z) = 240.0 x 10(-4) cm(-1) requires a SOPHE grid size of N = 400 (to produce a good signal to noise ratio) and takes 229.47 s. In contrast the use of either the SOPHE interpolation scheme or the mosaic misorientation linewidth model requires a SOPHE grid size of only N = 18 and takes 44.08 and 0.79 s, respectively. Results from Sophe are transferred via the Common Object Request Broker Architecture (CORBA) to XSophe and subsequently to XeprView((R)) where the simulated CW EPR spectra (1D and 2D) can be compared to the experimental spectra. Energy level diagrams, transition roadmaps and transition surfaces aid the interpretation of complicated randomly oriented CW EPR spectra and can be viewed with a web browser and an OpenInventor scene graph viewer.
Resumo:
Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case