985 resultados para Time Dependant Multiple Random Cipher Code (TDMRC Code)


Relevância:

50.00% 50.00%

Publicador:

Resumo:

Stora och komplexa kodbaser med bristfällig kodfÃrstÃ¥else är ett problem som blir allt vanligare bland fÃretag idag. Bristfällig kodfÃrstÃ¥else resulterar i längre tidsÃ¥tgÃ¥ng vid underhÃ¥ll och modifiering av koden, vilket fÃr ett fÃretag leder till Ãkade kostnader. Clean Code anses enligt somliga vara lÃsningen pÃ¥ detta problem. Clean Code är en samling riktlinjer och principer fÃr hur man skriver kod som är enkel att fÃrstÃ¥ och underhÃ¥lla. Ett kunskapsglapp identifierades vad gäller empirisk data som undersÃker Clean Codes pÃ¥verkan pÃ¥ kodfÃrstÃ¥else. Studiens frÃ¥geställning var: Hur pÃ¥verkas fÃrstÃ¥elsen vid modifiering av kod som är refaktoriserad enligt Clean Code principerna fÃr namngivning och att skriva funktioner? FÃr att undersÃka hur Clean Code pÃ¥verkar kodfÃrstÃ¥elsen utfÃrdes ett fältexperiment tillsammans med fÃretaget CGM Lab Scandinavia i Borlänge, där data om tidsÃ¥tgÃ¥ng och upplevd fÃrstÃ¥else hos testdeltagare samlades in och analyserades. Studiens resultat visar ingen tydlig fÃrbättring eller fÃrsämring av kodfÃrstÃ¥elsen dÃ¥ endast den upplevda kodfÃrstÃ¥elsen verkar pÃ¥verkas. Alla testdeltagare fÃredrar Clean Code framfÃr Dirty Code även om tidsÃ¥tgÃ¥ngen inte pÃ¥verkas. Detta leder fram till slutsatsen att Clean Codes effekter kanske inte är omedelbara dÃ¥ utvecklare inte hunnit anpassa sig till Clean Code, och därfÃr inte kan utnyttja det till fullo. Studien ger en fingervisning om Clean Codes potential att fÃrbättra kodfÃrstÃ¥elsen.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

This paper describes a program for the automatic generation of code for Intel's 8051 microcontroller. The code is generated from a place-transition Petri net specification. Our goal is to minimize programming time. The code generated by our program has been observed to exactly match the net model. It has also been observed that no change is needed to be made to the generated code for its compilation to the target architecture. © 2011 IFAC.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Based on literature review, electronic systems design employ largely top-down methodology. The top-down methodology is vital for success in the synthesis and implementation of electronic systems. In this context, this paper presents a new computational tool, named BD2XML, to support electronic systems design. From a block diagram system of mixed-signal is generated object code in XML markup language. XML language is interesting because it has great flexibility and readability. The BD2XML was developed with object-oriented paradigm. It was used the AD7528 converter modeled in MATLAB / Simulink as a case study. The MATLAB / Simulink was chosen as a target due to its wide dissemination in academia and industry. From this case study it is possible to demonstrate the functionality of the BD2XML and make it a reflection on the design challenges. Therefore, an automatic tool for electronic systems design reduces the time and costs of the design.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Small-scale farmers in the Brazilian Amazon collectively hold tenure over more than 12 million ha of permanent forest reserves, as required by the Forest Code. The trade-off between forest conservation and other land uses entails opportunity costs for them and for the country, which have not been sufficiently studied. We assessed the potential income generated by multiple use forest management for farmers and compared it to the income potentially derived from six other agricultural land uses. Income from the forest was from (i) logging, carried out by a logging company in partnership with farmers' associations; and (ii) harvesting the seeds of Carapa guianensis (local name andiroba) for the production of oil. We then compared the income generated by multiple-use forest management with the income from different types of agrarian systems. According to our calculations in this study, the mean annual economic benefits from multiple forest use are the same as the least productive agrarian system, but only 25% of the annual income generated by the most productive system. Although the income generated by logging may be considered low when calculated on an annual basis and compared to incomes generated by agriculture, the one-time payment after logging is significant (US$5,800 to US$33,508) and could be used to implement more intensive and productive cropping systems such as planting black pepper. The income from forest management could also be used to establish permanent fields in deforested areas for highly productive annual crops using conservation agriculture techniques. These techniques are alternatives to the traditional land use based on periodic clearing of the forest. Nevertheless, the shift in current practices towards adoption of more sustainable conservation agriculture techniques will also require the technical and legal support of the State to help small farmers apply these alternatives, which aim to integrate forest management in sustainable agricultural production systems.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

In the present work we perform an econometric analysis of the Tribal art market. To this aim, we use a unique and original database that includes information on Tribal art market auctions worldwide from 1998 to 2011. In Literature, art prices are modelled through the hedonic regression model, a classic fixed-effect model. The main drawback of the hedonic approach is the large number of parameters, since, in general, art data include many categorical variables. In this work, we propose a multilevel model for the analysis of Tribal art prices that takes into account the influence of time on artwork prices. In fact, it is natural to assume that time exerts an influence over the price dynamics in various ways. Nevertheless, since the set of objects change at every auction date, we do not have repeated measurements of the same items over time. Hence, the dataset does not constitute a proper panel; rather, it has a two-level structure in that items, level-1 units, are grouped in time points, level-2 units. The main theoretical contribution is the extension of classical multilevel models to cope with the case described above. In particular, we introduce a model with time dependent random effects at the second level. We propose a novel specification of the model, derive the maximum likelihood estimators and implement them through the E-M algorithm. We test the finite sample properties of the estimators and the validity of the own-written R-code by means of a simulation study. Finally, we show that the new model improves considerably the fit of the Tribal art data with respect to both the hedonic regression model and the classic multilevel model.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

This thesis collects the outcomes of a Ph.D. course in Telecommunications engineering and it is focused on enabling techniques for Spread Spectrum (SS) navigation and communication satellite systems. It provides innovations for both interference management and code synchronization techniques. These two aspects are critical for modern navigation and communication systems and constitute the common denominator of the work. The thesis is organized in two parts: the former deals with interference management. We have proposed a novel technique for the enhancement of the sensitivity level of an advanced interference detection and localization system operating in the Global Navigation Satellite System (GNSS) bands, which allows the identification of interfering signals received with power even lower than the GNSS signals. Moreover, we have introduced an effective cancellation technique for signals transmitted by jammers, exploiting their repetitive characteristics, which strongly reduces the interference level at the receiver. The second part, deals with code synchronization. More in detail, we have designed the code synchronization circuit for a Telemetry, Tracking and Control system operating during the Launch and Early Orbit Phase; the proposed solution allows to cope with the very large frequency uncertainty and dynamics characterizing this scenario, and performs the estimation of the code epoch, of the carrier frequency and of the carrier frequency variation rate. Furthermore, considering a generic pair of circuits performing code acquisition, we have proposed a comprehensive framework for the design and the analysis of the optimal cooperation procedure, which minimizes the time required to accomplish synchronization. The study results particularly interesting since it enables the reduction of the code acquisition time without increasing the computational complexity. Finally, considering a network of collaborating navigation receivers, we have proposed an innovative cooperative code acquisition scheme, which allows exploit the shared code epoch information between neighbor nodes, according to the Peer-to-Peer paradigm.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

The promise of search-driven development is that developers will save time and resources by reusing external code in their local projects. To efficiently integrate this code, users must be able to trust it, thus trustability of code search results is just as important as their relevance. In this paper, we introduce a trustability metric to help users assess the quality of code search results and therefore ease the cost-benefit analysis they undertake trying to find suitable integration candidates. The proposed trustability metric incorporates both user votes and cross-project activity of developers to calculate a "karma" value for each developer. Through the karma value of all its developers a project is ranked on a trustability scale. We present JBENDER, a proof-of-concept code search engine which implements our trustability metric and we discuss preliminary results from an evaluation of the prototype.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Java Enterprise Applications (JEAs) are complex software systems written using multiple technologies. Moreover they are usually distributed systems and use a database to deal with persistence. A particular problem that appears in the design of these systems is the lack of a rich business model. In this paper we propose a technique to support the recovery of such rich business objects starting from anemic Data Transfer Objects (DTOs). Exposing the code duplications in the application's elements using the DTOs we suggest which business logic can be moved into the DTOs from the other classes.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Code profiling is an essential activity to increase software quality. It is commonly employed in a wide variety of tasks, such as supporting program comprehension, determining execution bottlenecks, and assessing code coverage by unit tests. Spy is an innovative framework to easily build profilers and visualize profiling information. The profiling information is obtained by inserting dedicated code before or after method execution. The gathered profiling information is structured in line with the application structure in terms of packages, classes, and methods. Spy has been instantiated on four occasions so far. We created profilers dedicated to test coverage, time execution, type feedback, and profiling evolution across version. We also integrated Spy in the Pharo IDE. Spy has been implemented in the Pharo Smalltalk programming language and is available under the MIT license.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

The central nervous system (CNS) is an immunologically privileged site to which access of circulating immune cells is tightly controlled by the endothelial blood-brain barrier (BBB; see Glossary) localized in CNS microvessels, and the epithelial blood-cerebrospinal fluid barrier (BCSFB) within the choroid plexus. As a result of the specialized structure of the CNS barriers, immune cell entry into the CNS parenchyma involves two differently regulated steps: migration of immune cells across the BBB or BCSFB into the cerebrospinal fluid (CSF)-drained spaces of the CNS, followed by progression across the glia limitans into the CNS parenchyma. With a focus on multiple sclerosis (MS) and its animal models, this review summarizes the distinct molecular mechanisms required for immune cell migration across the different CNS barriers.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Digital technologies have profoundly changed not only the ways we create, distribute, access, use and re-use information but also many of the governance structures we had in place. Overall, "older" institutions at all governance levels have grappled and often failed to master the multi-faceted and multi-directional issues of the Internet. Regulatory entrepreneurs have yet to discover and fully mobilize the potential of digital technologies as an influential factor impacting upon the regulability of the environment and as a potential regulatory tool in themselves. At the same time, we have seen a deterioration of some public spaces and lower prioritization of public objectives, when strong private commercial interests are at play, such as most tellingly in the field of copyright. Less tangibly, private ordering has taken hold and captured through contracts spaces, previously regulated by public law. Code embedded in technology often replaces law. Non-state action has in general proliferated and put serious pressure upon conventional state-centered, command-and-control models. Under the conditions of this "messy" governance, the provision of key public goods, such as freedom of information, has been made difficult or is indeed jeopardized.The grand question is how can we navigate this complex multi-actor, multi-issue space and secure the attainment of fundamental public interest objectives. This is also the question that Ian Brown and Chris Marsden seek to answer with their book, Regulating Code, as recently published under the "Information Revolution and Global Politics" series of MIT Press. This book review critically assesses the bold effort by Brown and Marsden.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

The combitiatorial approach restriction endonuclease protection selection and amplification REPSA was successfully used to determine ideal DNA interactions sites of covalent ligands. Unlike most other combinatorial methods, REPSA is based on inhibition of enzymatic cleavage by specific ligand-DNA complexes, which enables identification of binding sites of various ligands. However, the inherent nature of this technique posses a problem during selection of binding sites of covalent ligands. By modifying the technique according to the nature of the ligand, we demonstrate the flexibility of REPSA in identifying the preferred binding sites for monocovalent ligands, topoisomerase I and tallimustine, and the bicovalent ligand topoisomerase II. From among the preferred binding sites, we identified the consensus binding sequence of camptothecin induced topoisomerase I cleavage as â˜aGWT/Gcâ, and tallimustine consensus sequences as â˜GTTCTAâ and â˜TTTTTTCâ. We have shown for the first time that preferential binding of tallimustine occurs at sequences not previously reported. Furthermore, our data indicate that tallimustine is a novel DNA minor groove, guanine-specific alkylating agent. ^ Additionally, we have demonstrated in vivo that sequence-specific covalent DNA-binding small molecules have the ability to regulate transcription by inhibiting RNA polymerase II. Tallimustine, binding to its preferred sequences located in the 5â² untranslated region were an effective impediment for transcribing polymerase II. The ability of covalent binding small molecules to target predetermined DNA sequences located downstream of the promoter suggests a general approach for regulation of gene expression. ^