944 resultados para Mobile Security, Mobile App Security, App Stores, Android Security, iOS Security


Relevância:

40.00% 40.00%

Publicador:

Resumo:

The present work has aimed to determine the 16 US EPA priority PAH atmospheric particulate matter levels present in three sites around Salvador, Bahia: (i) Lapa bus station, strongly impacted by heavy-duty diesel vehicles; (ii) Aratu harbor, impacted by an intense movement of goods, and (iii) Bananeira village on Maré Island, a non vehicle-influenced site with activities such as handcraft work and fisheries. Results indicated that BbF (0.130-6.85 ng m-3) is the PAH with highest concentration in samples from Aratu harbor and Bananeira and CRY (0.075-6.85 ng m-3) presented higher concentrations at Lapa station. PAH sources from studied sites were mainly of anthropogenic origin such as gasoline-fueled light-duty vehicles and diesel-fueled heavy-duty vehicles, discharges in the port, diesel burning from ships, dust ressuspension, indoor soot from cooking, and coal and wood combustion for energy production.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper, nonlinear dynamic equations of a wheeled mobile robot are described in the state-space form where the parameters are part of the state (angular velocities of the wheels). This representation, known as quasi-linear parameter varying, is useful for control designs based on nonlinear H(infinity) approaches. Two nonlinear H(infinity) controllers that guarantee induced L(2)-norm, between input (disturbances) and output signals, bounded by an attenuation level gamma, are used to control a wheeled mobile robot. These controllers are solved via linear matrix inequalities and algebraic Riccati equation. Experimental results are presented, with a comparative study among these robust control strategies and the standard computed torque, plus proportional-derivative, controller.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Australia is an increasingly important ally for the United States. It is willing to be part of challenging global missions, and its strong economy and growing self-confi dence suggest a more prominent role in both global and regional affairs. Moreover, its government has worked hard to strengthen the link between Canberra and Washington. Political and strategic affi nities between the two countries have been refl ected in--and complemented by--practiced military interoperability, as the two allies have sustained a pattern of security cooperation in relation to East Timor, Afghanistan and Iraq in the last 4 years. This growing collaboration between the two countries suggests that a reinvention of the traditional bilateral security relationship is taking place. At the core of this process lies an agreement about the need for engaging in more proactive strategic behavior in the changing global security environment, and a mutual acceptance of looming military and technological interdependence. But this new alliance relationship is already testing the boundaries of bipartisan support for security policy within Australia. Issues of strategic doctrine, defense planning, and procurement are becoming topics of fi erce policy debate. Such discussion is likely to be sharpened in the years ahead as Australia’s security relationship with the United States settles into a new framework.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The three-dimensional solution structure of the 40 residue amyloid beta-peptide, A beta(1-40), has been determined using NMR spectroscopy at pH 5.1, in aqueous sodium dodecyl sulfate (SDS) micelles, In this environment, which simulates to some extent a water-membrane medium, the peptide is unstructured between residues 1 and 14 which are mainly polar and likely solvated by water. However, the rest of the protein adopts an alpha-helical conformation between residues 15 and 36 with a kink or hinge at 25-27. This largely hydrophobic region is likely solvated by SDS. Based on the derived structures, evidence is provided in support of a possible new location for the transmembrane domain of A beta within the amyloid precursor protein (APP). Studies between pH 4.2 and 7.9 reveal a pH-dependent helix-coil conformational switch. At the lower pH values, where the carboxylate residues are protonated, the helix is uncharged, intact, and lipid-soluble. As the pH increases above 6.0, part of the helical region (15-24) becomes less structured, particularly near residues E22 and D23 where deprotonation appears to facilitate unwinding of the helix. This pH-dependent unfolding to a random coil conformation precedes any tendency of this peptide to aggregate to a beta-sheet as the pH increases. The structural biology described herein for A beta(1-40) suggests that (i) the C-terminal two-thirds of the peptide is an alpha-helix in membrane-like environments, (ii) deprotonation of two acidic amino acids in the helix promotes a helix-coil conformational transition that precedes aggregation, (iii) a mobile hinge exists in the helical region of A beta(1-40) and this may be relevant to its membrane-inserting properties and conformational rearrangements, and (iv) the location of the transmembrane domain of amyloid precursor proteins may be different from that accepted in the Literature. These results may provide new insight to the structural properties of amyloid beta-peptides of relevance to Alzheimer's disease.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Many Archean cratons are surrounded by Proterozoic mobile belts that have experienced episodes of tectonic re-activation over their lifetimes. This suggests that mobile belt lithosphere may be associated with long lived, inherited weakness. It is proposed that the proximity of this weakness can increase the longevity of deep Archean lithosphere by buffering Archean cratons from mantle derived stresses. The physical plausibility of this idea is explored through numerical simulations of mantle convection that include continents and allow for material rheologies that model the combined brittle and ductile behavior of the lithosphere. Within the simulations, the longevity of deep cratonic lithosphere does increase if it is buffered by mobile belts that can fail at relatively low stress levels.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Unauthorized accesses to digital contents are serious threats to international security and informatics. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption.