685 resultados para broadcast encryption


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este artigo visa a realizar um debate teórico por meio das análises de Michel Foucault e de Robert Castel, entre outros, a respeito dos mecanismos de segurança e das estratégias de governamentalidade neoliberal, na sociedade contemporânea. Os cursos Em defesa da sociedade, Segurança, território e população e Nascimento da Biopolítica, de Foucault, inauguraram uma discussão relevante a respeito dos racismos de Estado e de sociedade, de seus paradoxos, nas democracias, e de seus efeitos a partir da emergência do neoliberalismo norte-americano e alemão, após a II Guerra Mundial, que foram difundidos em outros países, sobretudo na década de noventa do século XX, com especificidades em cada país, mas com pontos de conexão que nos permitem traçar um diagrama da sociedade de segurança e de como ela opera por táticas de governo das condutas, também denominadas governamentalidades, por Foucault.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Bessie Harper Radio Talk records consist of a draft of a radio talk on "Family Finance" that was broadcast over WIS, Columbia, South Carolina on Monday, January 25th, 1932. Bessie Harper served as chairman of the American Home Department of the South Carolina Federation of Women's Club (SCFWC). The aim of the talk is to educate families how to budget their finances and to plan their expenses which was particularly important when this talk was given in 1932 during the Great Depression. This talk offers a glimpse into families' attempts to cope with the new economic reality of life during the Great Depression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, a cross-layer solution for packet size optimization in wireless sensor networks (WSN) is introduced such that the effects of multi-hop routing, the broadcast nature of the physical wireless channel, and the effects of error control techniques are captured. A key result of this paper is that contrary to the conventional wireless networks, in wireless sensor networks, longer packets reduce the collision probability. Consequently, an optimization solution is formalized by using three different objective functions, i.e., packet throughput, energy consumption, and resource utilization. Furthermore, the effects of end-to-end latency and reliability constraints are investigated that may be required by a particular application. As a result, a generic, cross-layer optimization framework is developed to determine the optimal packet size in WSN. This framework is further extended to determine the optimal packet size in underwater and underground sensor networks. From this framework, the optimal packet sizes under various network parameters are determined.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

During autumn 2003, several thousand European starlings (Sturnus vulgaris) began roosting on exposed I-beams in a newly constructed, decorative glass canopy that covered the passenger pick-up area at the terminal building for Cleveland Hopkins International Airport, Ohio. The use of lethal control or conventional dispersal techniques, such as pyrotechnics and fire hoses, were not feasible in the airport terminal area. The design and aesthetics of the structure precluded the use of netting and other exclusion materials. In January 2004, an attempt was made to disperse the birds using recorded predator and distress calls broadcast from speakers installed in the structure. This technique failed to disperse the birds. In February 2004, we developed a technique using compressed air to physically and audibly harass the birds. We used a trailer-mounted commercial air compressor producing 185 cubic feet per minute of air at 100 pounds per square inch pressure and a 20-foot long, 1-inch diameter PVC pipe attached to the outlet hose. One person slowly (< 5 mph) drove a pick-up truck through the airport terminal at dusk while the second person sat on a bench in the truck bed and directed the compressed air from the pipe into the canopy to harass starlings attempting to enter the roost site. After 5 consecutive nights of compressed-air harassment, virtually no starlings attempted to roost in the canopy. Once familiar with the physical effects of the compressed air, the birds dispersed at the sound of the air. Only occasional harassment at dusk was needed through the remainder of the winter to keep the canopy free of starlings. Similar harassment with the compressor was conducted successfully in autumn 2004 with the addition of a modified leaf blower, wooden clappers, and laser. In conclusion, we found compressed air to be a safe, unobtrusive, and effective method for dispersing starlings from an urban roost site. This technique would likely be applicable for other urban-roosting species such as crows, house sparrows, and blackbirds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many extractors are used to quantify available P in soils, but few studies have assessed the availability of P in soils of the wet tropics amended with high rates of biosolids. In this study, ion exchange resin, Mehlich-1 solution, and Fe-impregnated strips were used to quantify available P in samples from an Oxisol amended with surface-applied biosolids in a long-term field experiment. The soil's maximum capacity for P adsorption was also estimated. Experimental design consisted of randomized blocks, with four treatments and three replicates. Samples of biosolids were collected every year during the experiment, from 1999 to 2002. In 1999, two applications were made before growing maize (Zea mays L.) in austral summer and winter. Treatments were: Control (no biosolids added); B (biosolids added at rates based on their total N content); B2 (biosolids added at twice the rate of B), and B4 (biosolids added at four times the rate of B). Soil samples were collected at 0- to 0.1-, 0.1- to 0.2-, and 0.2- to 0.4-m depths. Biosolids were broadcast applied and incorporated into the soil to a depth of 0.2 m using a rotary hoe. The Oxisol had a high P-adsorption capacity (around 2450 mg kg(-1)) because of its high contents of clay and Fe and Al oxides. All the extractors were effective at assessing P availability and were positively correlated among themselves. Available P soil contents correlated positively with P content in maize leaves and grains, and the resin method yielded the highest correlation with P contents in leaves and grains.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ALRED construction is a lightweight strategy for constructing message authentication algorithms from an underlying iterated block cipher. Even though this construction's original analyses show that it is secure against some attacks, the absence of formal security proofs in a strong security model still brings uncertainty on its robustness. In this paper, aiming to give a better understanding of the security level provided by different authentication algorithms based on this design strategy, we formally analyze two ALRED variants-the MARVIN message authentication code and the LETTERSOUP authenticated-encryption scheme,-bounding their security as a function of the attacker's resources and of the underlying cipher's characteristics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This manuscript reports the first example of up-conversion properties involving Yb3+ and Tb3+ ions in five isostructural Lanthanide-Organic Frameworks (LnOFs), herein designated as UCMarker-1 to UCMarker-5, respectively, and their application as optical probes for the identification of gunshot residues (GSRs) and the ammunition encryption procedure. The excitation of the Yb3+2 F-7/2 <-> F-2(5/2) transition (980 nm) at room temperature leads to visible up-conversion (UC) emission of Tb3+ D-5(4) -> F-7(J). The GSR and lead-free primer residues are easily identified upon UV radiation (lambda = 254 nm). These results prove that the exploration of LnOFs to identify GSR is attractive for the identification of ammunition origins or caliber recognition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we discuss the problem of how to discriminate moments of interest on videos or live broadcast shows. The primary contribution is a system which allows users to personalize their programs with previously created media stickers-pieces of content that may be temporarily attached to the original video. We present the system's architecture and implementation, which offer users operators to transparently annotate videos while watching them. We offered a soccer fan the opportunity to add stickers to the video while watching a live match: the user reported both enjoying and being comfortable using the stickers during the match-relevant results even though the experience was not fully representative.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: DENV-1 is one of the four viral serotypes that causes Dengue, the most common mosquito-borne viral disease of humans. The prevalence of these viruses has grown in recent decades and is now present in more than 100 countries. Limited studies document the spread of DENV-1 over the world despite its importance for human health. METHODOLOGY/PRINCIPAL FINDINGS: We used representative DENV-1 envelope gene sequences to unravel the dynamics of viral diffusion under a Bayesian phylogeographic approach. Data included strains from 45 distinct geographic locations isolated from 1944 to 2009. The estimated mean rate of nucleotide substitution was 6.56 × 10⁻⁴ substitutions/site/year. The larger genotypes (I, IV and V) had a distinctive phylogenetic structure and since 1990 they experienced effective population size oscillations. Thailand and Indonesia represented the main sources of strains for neighboring countries. Besides, Asia broadcast lineages into the Americas and the Pacific region that diverged in isolation. Also, a transmission network analysis revealed the pivotal role of Indochina in the global diffusion of DENV-1 and of the Caribbean in the diffusion over the Americas. CONCLUSIONS/SIGNIFICANCE: The study summarizes the spatiotemporal DENV-1 worldwide spread that may help disease control.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent progress in microelectronic and wireless communications have enabled the development of low cost, low power, multifunctional sensors, which has allowed the birth of new type of networks named wireless sensor networks (WSNs). The main features of such networks are: the nodes can be positioned randomly over a given field with a high density; each node operates both like sensor (for collection of environmental data) as well as transceiver (for transmission of information to the data retrieval); the nodes have limited energy resources. The use of wireless communications and the small size of nodes, make this type of networks suitable for a large number of applications. For example, sensor nodes can be used to monitor a high risk region, as near a volcano; in a hospital they could be used to monitor physical conditions of patients. For each of these possible application scenarios, it is necessary to guarantee a trade-off between energy consumptions and communication reliability. The thesis investigates the use of WSNs in two possible scenarios and for each of them suggests a solution that permits to solve relating problems considering the trade-off introduced. The first scenario considers a network with a high number of nodes deployed in a given geographical area without detailed planning that have to transmit data toward a coordinator node, named sink, that we assume to be located onboard an unmanned aerial vehicle (UAV). This is a practical example of reachback communication, characterized by the high density of nodes that have to transmit data reliably and efficiently towards a far receiver. It is considered that each node transmits a common shared message directly to the receiver onboard the UAV whenever it receives a broadcast message (triggered for example by the vehicle). We assume that the communication channels between the local nodes and the receiver are subject to fading and noise. The receiver onboard the UAV must be able to fuse the weak and noisy signals in a coherent way to receive the data reliably. It is proposed a cooperative diversity concept as an effective solution to the reachback problem. In particular, it is considered a spread spectrum (SS) transmission scheme in conjunction with a fusion center that can exploit cooperative diversity, without requiring stringent synchronization between nodes. The idea consists of simultaneous transmission of the common message among the nodes and a Rake reception at the fusion center. The proposed solution is mainly motivated by two goals: the necessity to have simple nodes (to this aim we move the computational complexity to the receiver onboard the UAV), and the importance to guarantee high levels of energy efficiency of the network, thus increasing the network lifetime. The proposed scheme is analyzed in order to better understand the effectiveness of the approach presented. The performance metrics considered are both the theoretical limit on the maximum amount of data that can be collected by the receiver, as well as the error probability with a given modulation scheme. Since we deal with a WSN, both of these performance are evaluated taking into consideration the energy efficiency of the network. The second scenario considers the use of a chain network for the detection of fires by using nodes that have a double function of sensors and routers. The first one is relative to the monitoring of a temperature parameter that allows to take a local binary decision of target (fire) absent/present. The second one considers that each node receives a decision made by the previous node of the chain, compares this with that deriving by the observation of the phenomenon, and transmits the final result to the next node. The chain ends at the sink node that transmits the received decision to the user. In this network the goals are to limit throughput in each sensor-to-sensor link and minimize probability of error at the last stage of the chain. This is a typical scenario of distributed detection. To obtain good performance it is necessary to define some fusion rules for each node to summarize local observations and decisions of the previous nodes, to get a final decision that it is transmitted to the next node. WSNs have been studied also under a practical point of view, describing both the main characteristics of IEEE802:15:4 standard and two commercial WSN platforms. By using a commercial WSN platform it is realized an agricultural application that has been tested in a six months on-field experimentation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The application of Concurrency Theory to Systems Biology is in its earliest stage of progress. The metaphor of cells as computing systems by Regev and Shapiro opened the employment of concurrent languages for the modelling of biological systems. Their peculiar characteristics led to the design of many bio-inspired formalisms which achieve higher faithfulness and specificity. In this thesis we present pi@, an extremely simple and conservative extension of the pi-calculus representing a keystone in this respect, thanks to its expressiveness capabilities. The pi@ calculus is obtained by the addition of polyadic synchronisation and priority to the pi-calculus, in order to achieve compartment semantics and atomicity of complex operations respectively. In its direct application to biological modelling, the stochastic variant of the calculus, Spi@, is shown able to model consistently several phenomena such as formation of molecular complexes, hierarchical subdivision of the system into compartments, inter-compartment reactions, dynamic reorganisation of compartment structure consistent with volume variation. The pivotal role of pi@ is evidenced by its capability of encoding in a compositional way several bio-inspired formalisms, so that it represents the optimal core of a framework for the analysis and implementation of bio-inspired languages. In this respect, the encodings of BioAmbients, Brane Calculi and a variant of P Systems in pi@ are formalised. The conciseness of their translation in pi@ allows their indirect comparison by means of their encodings. Furthermore it provides a ready-to-run implementation of minimal effort whose correctness is granted by the correctness of the respective encoding functions. Further important results of general validity are stated on the expressive power of priority. Several impossibility results are described, which clearly state the superior expressiveness of prioritised languages and the problems arising in the attempt of providing their parallel implementation. To this aim, a new setting in distributed computing (the last man standing problem) is singled out and exploited to prove the impossibility of providing a purely parallel implementation of priority by means of point-to-point or broadcast communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La crittografia ha sempre rivestito un ruolo primario nella storia del genere umano, dagli albori ai giorni nostri, e il periodo in cui viviamo non fa certo eccezione. Al giorno d'oggi, molti dei gesti che vengono compiuti anche solo come abitudine (operazioni bancarie, apertura automatica dell'auto, accedere a Facebook, ecc.), celano al loro interno la costante presenza di sofisticati sistemi crittografici. Proprio a causa di questo fatto, è importante che gli algoritmi utilizzati siano in qualche modo certificati come ragionevolmente sicuri e che la ricerca in questo campo proceda costantemente, sia dal punto di vista dei possibili nuovi exploit per forzare gli algoritmi usati, sia introducendo nuovi e sempre più complessi sistemi di sicurezza. In questa tesi viene proposto una possibile implementazione di un particolare tipo di attacco crittoanalitico, introdotto nel 2000 da due ricercatori dell'Università "La Sapienza" di Roma, e conosciuto come "Crittoanalisi Logica". L'algoritmo su cui è incentrato il lavoro è il Data Encryption Standard (DES), ostico standard crittografico caduto in disuso nel 1999 a causa delle dimensioni ridotte della chiave, seppur tuttora sia algebricamente inviolato. Il testo è strutturato nel seguente modo: il primo capitolo è dedicato ad una breve descrizione di DES e della sua storia, introducendo i concetti fondamentali con cui si avrà a che fare per l'intera dissertazione Nel secondo capitolo viene introdotta la Crittoanalisi Logica e viene fornita una definizione della stessa, accennando ai concetti matematici necessari alla comprensione dei capitoli seguenti. Nel capitolo 3 viene presentato il primo dei due software sviluppati per rendere possibile l'attuazione di questo attacco crittoanalitico, una libreria per la rappresentazione e la manipolazione di formule logiche scritta in Java. Il quarto ed ultimo capitolo descrive il programma che, utilizzando la libreria descritta nel capitolo 3, elabora in maniera automatica un insieme di proposizioni logiche semanticamente equivalenti a DES, la cui verifica di soddisfacibilità, effettuata tramite appositi tools (SAT solvers) equivale ad effettuare un attacco di tipo known-plaintext su tale algoritmo.