928 resultados para proof-of-concept
Resumo:
Due to the constantly increasing use of wireless networks in domestic, business and industrial environments, new challenges have emerged. The prototyping of new protocols in these environments is typically restricted to simulation environments, where there is the need of double implementation, one in the simulation environment where an initial proof of concept is performed and the other one in a real environment. Also, if real environments are used, it is not trivial to create a testbed for high density wireless networks given the need to use various real equipment as well as attenuators and power reducers to try to reduce the physical space required to create these laboratories. In this context, LVWNet (Linux Virtual Wireless Network) project was originally designed to create completely virtual testbeds for IEEE 802.11 networks on the Linux operating system. This paper aims to extend the current project LVWNet, adding to it the features like the ability to interact with real wireless hardware, provides a initial mobility ability using the positioning of the nodes in a space coordinates environment based on meters, with loss calculations due to attenuation in free space, enables some scalability increase by creating an own protocol that allows the communication between nodes without an intermediate host and dynamic registration of nodes, allowing new nodes to be inserted into in already in operation network
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)
Resumo:
Over the last decades changes have occurred in communication within and between enterprises, made easier by technologies suchas E-commerce, Internet, ERP systems and remote meetings and there was a rapid progress in network technology, which has changed the way business is done. A standardized way to offer services over the internet is using web services. Web services are a kind of remote procedure call and are generally used to integrate systems, independent of language, both client and server. It is common to use several web services run in sequence to perform a business process. To this type of process, gives the name of workflow. Thus, Web services are the primary components of workflows. A tool that provides a way of visualizing the behavior of a workflow can assist the administrator and is required. The present work presents the development of a tool that allows the administrator to classify visually services components and evaluate their importance in the final performance of a workflow. As proof of concept we used several virtual servers and computers where each computer has received a set of web services. A proxy was added between each call of workflows collecting relevant information and storing them in a database for later analysis. The analysis was based on Quality of Service parameters
Resumo:
Early detection assays play a key role in the successful treatment of most diseases. Redox capacitive biosensors were recently introduced as a potential electroanalytical assay platform for point-of-care applications but alternative surfaces (besides a mixed layer containing ferrocene and antibody receptive component) for recruiting important clinical biomarkers are still needed. Aiming to develop alternative receptive surfaces for this novel electrochemical biosensing platform, we synthesized a ferrocene redoxtagged peptide capable of self-assembly into metallic interfaces, a potentially useful biological surface functionalization for bedside diagnostic assays. As a proof of concept we used C-reactive protein (CRP), as a model biomarker, and compared the obtained results to those of previously reported capacitive assays. The redox-tagged peptide approach shows a limit of detection of 0.8 nmol L 1 (same as 94 ng mL 1 ) and a linear range (R2 ∼98%) with the logarithm of the concentration of the analyte comprising 0.5–10.0 nmol L 1 , within a clinical relevant range for CRP.
Silencing mitogen-activated protein kinase-activated protein kinase-2 arrests inflammatory bone loss
Resumo:
p38 mitogen-activated protein kinases (MAPKs) are critical for innate immune signaling and subsequent cytokine expression in periodontal inflammation and bone destruction. In fact, previous studies show that systemic p38 MAPK inhibitors block periodontal disease progression. However, development of p38 MAPK inhibitors with favorable toxicological profiles is difficult. Here, we report our findings regarding the contribution of the downstream p38 MAPK substrate, mitogen-activated protein kinase-activated protein kinase 2 (MK2 or MAPKAPK-2), in immune response modulation in an experimental model of pathogen-derived lipopolysaccharide (LPS)-induced periodontal bone loss. To determine whether small interfering RNA (siRNA) technology has intraoral applications, we initially validated MK2 siRNA specificity. Then, gingival tissue surrounding maxillary molars of rats was injected with MK2 siRNA or scrambled siRNA at the palatal regions of bone loss. Intraoral tissues treated with MK2 siRNA had significantly less MK2 mRNA expression compared with scrambled siRNA-treated tissues. MK2 siRNA delivery arrested LPS-induced inflammatory bone loss, decreased inflammatory infiltrate, and decreased osteoclastogenesis. This proof-of-concept study suggests a novel target using an intraoral RNA interference strategy to control periodontal inflammation.
Resumo:
Pós-graduação em Televisão Digital: Informação e Conhecimento - FAAC
Resumo:
Pós-graduação em Química - IQ
Resumo:
Major depressive disorder (MDD) trials - investigating either non-pharmacological or pharmacological interventions - have shown mixed results. Many reasons explain this heterogeneity, but one that stands out is the trial design due to specific challenges in the field. We aimed therefore to review the methodology of non-invasive brain stimulation (NIBS) trials and provide a framework to improve clinical trial design. We performed a systematic review for randomized, controlled MDD trials whose intervention was transcranial magnetic stimulation (rTMS) or transcranial direct current stimulation (tDCS) in MEDLINE and other databases from April 2002 to April 2008. We created an unstructured checklist based on CONSORT guidelines to extract items such as power analysis, sham method, blinding assessment, allocation concealment, operational criteria used for MDD, definition of refractory depression and primary study hypotheses. Thirty-one studies were included. We found that the main methodological issues can be divided in to three groups: (1) issues related to phase II/small trials, (2) issues related to MDD trials and, (3) specific issues of NIBS studies. Taken together, they can threaten study validity and lead to inconclusive results. Feasible solutions include: estimating the sample size a priori; measuring the degree of refractoriness of the subjects; specifying the primary hypothesis and statistical tests; controlling predictor variables through stratification randomization methods or using strict eligibility criteria; adjusting the study design to the target population; using adaptive designs and exploring NIBS efficacy employing biological markers. In conclusion, our study summarizes the main methodological issues of NIBS trials and proposes a number of alternatives to manage them. Copyright (C) 2011 John Wiley & Sons, Ltd.
Resumo:
Evaluation of: Rodriguez D, Gonzalez-Aseguinolaza G, Rodriguez JR et al. Vaccine efficacy against malaria by the combination of porcine parvovirus-like particles and vaccinia virus vectors expressing CS of Plasmodium. PLoS ONE 7(4), e34445 (2012). Recently, a vaccine against malaria was successfully tested in a human Phase III trial. The efficacy of this vaccine formulation, based on the Plasmodium falciparum circumsporozoite protein, was approximately 50% and correlated with the presence of antibodies specific to the infective stages of the malaria parasites. Different strategies are being pursued to improve vaccine efficacy levels. One such strategy is the induction of specific cytotoxic T cells that can destroy the intracellular hepatocyte stages of the malaria parasite. In this study, a novel vaccination protocol was developed to elicit strong immune responses mediated by CD8(+) cytotoxic cells specific to the circumsporozoite protein. As proof-of-concept, the authors used the rodent malaria Plasmodium yoelii parasite. The vaccination strategy consisted of a heterologous prime-boost vaccination regimen involving porcine parvovirus-like particles for priming and the modified vaccinia virus Ankara for the booster immunization, both of which expressed the immunodominant CD8 epitope of the P. yoelii circumsporozoite protein. Results from this experimental model were extremely meaningful. This vaccination strategy led to a significant T-cell immune response mediated by CD8(+) multifunctional T effector and effector-memory cells. However, most importantly for the malaria vaccine development was the fact that following a sporozoite challenge, immunized mice eliminated more than 97% of the malaria parasites during the hepatocyte stages. These results confirm and extend a vast body of knowledge showing that a heterologous prime-boost vaccination strategy can elicit strong CD8(+) T-cell-mediated protective immunity and may increase the efficacy of malaria vaccines.
Resumo:
The technology of partial virtualization is a revolutionary approach to the world of virtualization. It lies directly in-between full system virtual machines (like QEMU or XEN) and application-related virtual machines (like the JVM or the CLR). The ViewOS project is the flagship of such technique, developed by the Virtual Square laboratory, created to provide an abstract view of the underlying system resources on a per-process basis and work against the principle of the Global View Assumption. Virtual Square provides several different methods to achieve partial virtualization within the ViewOS system, both at user and kernel levels. Each of these approaches have their own advantages and shortcomings. This paper provides an analysis of the different virtualization methods and problems related to both the generic and partial virtualization worlds. This paper is the result of an in-depth study and research for a new technology to be employed to provide partial virtualization based on ELF dynamic binaries. It starts with a mild analysis of currently available virtualization alternatives and then goes on describing the ViewOS system, highlighting its current shortcomings. The vloader project is then proposed as a possible solution to some of these inconveniences with a working proof of concept and examples to outline the potential of such new virtualization technique. By injecting specific code and libraries in the middle of the binary loading mechanism provided by the ELF standard, the vloader project can promote a streamlined and simplified approach to trace system calls. With the advantages outlined in the following paper, this method presents better performance and portability compared to the currently available ViewOS implementations. Furthermore, some of itsdisadvantages are also discussed, along with their possible solutions.
Resumo:
The main aim of my PhD project was the design and the synthesis of new pyrrolidine organocatalysts. New effective ferrocenyl pyrrolidine catalysts, active in benchmark organocatalytic reactions, has been developed. The ferrocenyl moiety, in combination with simple ethyl chains, is capable of fixing the enamine conformation addressing the approach trajectory of the nucleophile in the reaction. The results obtained represent an interesting proof-of-concept, showing for the first time the remarkable effectiveness of the ferrocenyl moiety in providing enantioselectivity through conformational selection. This approach could be viably employed in the rational design of ligands for metal or organocatalysts. Other hindered secondary amines has been prepared from alkylation of acyclic chiral nitroderivatives with alcohols in a highly diastereoselective fashion, giving access to functionalized, useful organocatalytic chiral pyrrolidines. A family of new pyrrolidines bearing sterogenic centers and functional groups can be readily accessible by this methodology. The second purpose of the project was to study in deep the reactivity of stabilized carbocations in new metal-free and organocatalytic reactions. By taking advantage of the results from the kinetic studies described by Mayr, a simple and effective procedure for the direct formylation of aryltetrafluoroborate salts, has been development. The coupling of a range of aryl- and heteroaryl- trifluoroborate salts with 1,3-benzodithiolylium tetrafluoroborate, has been attempted in moderate to good yields. Finally, a simple and general methodology for the enamine-mediated enantioselective α-alkylation of α-substituted aldehydes with 1,3-benzodithiolylium tetrafluoroborate has been reported. The introduction of the benzodithiole moiety permit the installation of different functional groups due to its chameleonic behaviour.
Resumo:
Le macchine impiegate nei processi di produzione industriale sono soggette a usura e destinate a esibire malfunzionamenti qualora non venga attuata un'attenta opera di manutenzione preventiva. In questa tesi è proposta una proof of concept relativa alla manutenzione predittiva la quale, analizzando i segnali trasmessi dai sensori installati sulla macchina, mira a segnalare in tempo utile i guasti futuri, onde consentire l'attività manutentiva prima che si verifichi il guasto.
Resumo:
We propose a novel methodology to generate realistic network flow traces to enable systematic evaluation of network monitoring systems in various traffic conditions. Our technique uses a graph-based approach to model the communication structure observed in real-world traces and to extract traffic templates. By combining extracted and user-defined traffic templates, realistic network flow traces that comprise normal traffic and customized conditions are generated in a scalable manner. A proof-of-concept implementation demonstrates the utility and simplicity of our method to produce a variety of evaluation scenarios. We show that the extraction of templates from real-world traffic leads to a manageable number of templates that still enable accurate re-creation of the original communication properties on the network flow level.
Resumo:
The promise of search-driven development is that developers will save time and resources by reusing external code in their local projects. To efficiently integrate this code, users must be able to trust it, thus trustability of code search results is just as important as their relevance. In this paper, we introduce a trustability metric to help users assess the quality of code search results and therefore ease the cost-benefit analysis they undertake trying to find suitable integration candidates. The proposed trustability metric incorporates both user votes and cross-project activity of developers to calculate a "karma" value for each developer. Through the karma value of all its developers a project is ranked on a trustability scale. We present JBENDER, a proof-of-concept code search engine which implements our trustability metric and we discuss preliminary results from an evaluation of the prototype.