933 resultados para server-side
Resumo:
The XML-based specification for Scalable Vector Graphics (SVG), sponsored by the World Wide Web consortium, allows for compact and descriptive vector graphics for the Web. SVG s domain of discourse is that of graphic primitives whose optional attributes express line thickness, fill patterns, text size and so on. These primitives have very different properties from those of traditional document components (e.g. sections, paragraphs etc.) that XML is normally called upon to express. This paper describes a set of three tools for creating SVG, either from first principles or via the conversion of existing formats. The ab initio generation of SVG is effected from a server-side CGI script, using a PERL library of drawing functions; later sections highlight the problems of converting Adobe PostScript and Macromedia s Shockwave format (SWF) into SVG.
Resumo:
Bioactive small molecules, such as drugs or metabolites, bind to proteins or other macro-molecular targets to modulate their activity, which in turn results in the observed phenotypic effects. For this reason, mapping the targets of bioactive small molecules is a key step toward unraveling the molecular mechanisms underlying their bioactivity and predicting potential side effects or cross-reactivity. Recently, large datasets of protein-small molecule interactions have become available, providing a unique source of information for the development of knowledge-based approaches to computationally identify new targets for uncharacterized molecules or secondary targets for known molecules. Here, we introduce SwissTargetPrediction, a web server to accurately predict the targets of bioactive molecules based on a combination of 2D and 3D similarity measures with known ligands. Predictions can be carried out in five different organisms, and mapping predictions by homology within and between different species is enabled for close paralogs and orthologs. SwissTargetPrediction is accessible free of charge and without login requirement at http://www.swisstargetprediction.ch.
Resumo:
Shortening development times of mobile phones are also accelerating the development times of mobile phone software. New features and software components should be partially implemented and tested before the actual hardware is ready. This brings challenges to software development and testing environments, especially on the user interface side. New features should be able to be tested in an environment, which has a look and feel like a real phone. Simulation environments are used to model real mobile phones. This makes possible to execute software in a mobile phone that does not yet exist. The purpose of this thesis is to integrate Socket Server software component to Series 40 simulation environments on Linux and Windows platforms. Socket Server provides TCP/IP connectivity for applications. All other software and hardware components below Socket Server do not exist in simulation environments. The scope of this work is to clarify how that can be done without connectivity problems, including design, implementation and testing phases.
Resumo:
Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.
Resumo:
The aim of this thesis is to merge two of the emerging paradigms about web programming: RESTful Web Development and Service-Oriented Programming. REST is the main architectural paradigm about web applications, they are characterised by procedural structure which avoid the use of handshaking mechanisms. Even though REST has a standard structure to access the resources of the web applications, the backend side is usually not very modular if not complicated. Service-Oriented Programming, instead, has as one of the fundamental principles, the modularisation of the components. Service-Oriented Applications are characterised by separate modules that allow to simplify the devel- opment of the web applications. There are very few example of integration between these two technologies: it seems therefore reasonable to merge them. In this thesis the methodologies studied to reach this results are explored through an application that helps to handle documents and notes among several users, called MergeFly. The MergeFly practical case, once that all the specifics had been set, will be utilised in order to develop and handle HTTP requests through SOAP. In this document will be first defined the 1) characteristics of the application, 2) SOAP technology, partially introduced the 3) Jolie Language, 4) REST and finally a 5) Jolie-REST implementation will be offered through the MergeFly case. It is indeed implemented a token mechanism for authentication: it has been first discarded sessions and cookies algorithm of authentication in so far not into the pure RESTness theory, even if often used). In the final part the functionality and effectiveness of the results will be evaluated, judging the Jolie-REST duo.
Resumo:
Background: Treatment of multinodular goiters (MNGs) is highly controversial. Radioiodine (RAI) therapy is a nonsurgical alternative for the elderly who decline surgery. Recently, recombinant human thyrotropin (rhTSH) has been used to augment RAI uptake and distribution. In this study, we determined the outcome of 30 mCi RAI preceded by rhTSH (0.1 mg) in euthyroid (EU) and hyperthyroid (subclinical/clinical) patients with large MNGs. Methods: This was a prospective cohort study. Forty-two patients (age, 43-80 years) with MNGs were treated with 30 mCi RAI after stimulation with 0.1 mg of rhTSH. Patients were divided into three groups, according to thyroid function: EU (n = 18), subclinically hyperthyroid (SC-H, n = 18), and clinically hyperthyroid (C-H, n = 6). All patients underwent a 90-day low-iodine diet before treatment, and those with clinical hyperthyroidism received methimazole 10 mg daily for 30 days. Serum TSH, free thyroxine (FT4), total triiodothyronine (TT3), and thyroglobulin were measured at baseline and at 24, 48, 72, 168 hours, and 1, 3, 6, 9, 12, 18, 24, and 36 months after therapy. Thyroid volume was assessed by computed tomography at baseline and every 6 months. Results: Patients had high iodine urinary excretion (308 +/- 108 mu g I/L) at baseline. TSH levels at baseline were within the normal range (1.5 +/- 0.7 mu U/mL) in the EU group and suppressed (< 0.3 mu U/mL) in the SC-H and C-H groups. After rhTSH, serum TSH peaked at 24 hours reaching 12.4 +/- 5.85 mu U/mL. After RAI administration, patients in both hyperthyroid groups had a higher increase in FT4 and TT3 compared with those in the EU group (p < 0.001). Thyroglobulin levels increased equally in all three groups until day 7. Thyroid volume decreased significantly in all patients. Side effects were more common in the SC-H and C-H groups (31.4% and 60.4%, respectively) compared with EU patients (17.8%). Permanent hypothyroidism was more prevalent in the EU group (50%) compared with the SC-H (11%) and C-H (16.6%) groups. Conclusions: Patients with MNG may have subclinical and clinical nonautoimmune iodine-induced hyperthyroidism. Despite a low-iodine diet and therapy with methimazole, hyperthyroid patients have a significantly higher increase in FT4 and TT3 levels after RAI ablation. This can lead to important side effects related mostly to the cardiac system. We strongly advise that patients with SC-H and C-H be adequately treated with methimazole and low-iodine diet aiming to normalize their hyperthyroid condition before rhTSH-stimulated treatment with RAI.
Resumo:
Pair correlations between large transverse momentum neutral pion triggers (p(T) = 4-7 GeV/c) and charged hadron partners (p(T) = 3-7 GeV/c) in central (0%-20%) and midcentral (20%-60%) Au + Au collisions at root s(NN) = 200 GeV are presented as a function of trigger orientation with respect to the reaction plane. The particles are at larger momentum than where jet shape modifications have been observed, and the correlations are sensitive to the energy loss of partons traveling through hot densematter. An out-of-plane trigger particle produces only 26 +/- 20% of the away-side pairs that are observed opposite of an in-plane trigger particle for midcentral (20%-60%) collisions. In contrast, near-side jet fragments are consistent with no suppression or dependence on trigger orientation with respect to the reaction plane. These observations are qualitatively consistent with a picture of little near-side parton energy loss either due to surface bias or fluctuations and increased away-side parton energy loss due to a long path through the medium. The away-side suppression as a function of reaction-plane angle is shown to be sensitive to both the energy loss mechanism and the space-time evolution of heavy-ion collisions.
Resumo:
A numerical renormalization-group study of the conductance through a quantum wire containing noninteracting electrons side-coupled to a quantum dot is reported. The temperature and the dot-energy dependence of the conductance are examined in the light of a recently derived linear mapping between the temperature-dependent conductance and the universal function describing the conductance for the symmetric Anderson model of a quantum wire with an embedded quantum dot. Two conduction paths, one traversing the wire, the other a bypass through the quantum dot, are identified. A gate potential applied to the quantum wire is shown to control the current through the bypass. When the potential favors transport through the wire, the conductance in the Kondo regime rises from nearly zero at low temperatures to nearly ballistic at high temperatures. When it favors the dot, the pattern is reversed: the conductance decays from nearly ballistic to nearly zero. When comparable currents flow through the two channels, the conductance is nearly temperature independent in the Kondo regime, and Fano antiresonances in the fixed-temperature plots of the conductance as a function of the dot-energy signal interference between them. Throughout the Kondo regime and, at low temperatures, even in the mixed-valence regime, the numerical data are in excellent agreement with the universal mapping.
Resumo:
Activation of the cephalosporin side-chain precursor to the corresponding CoA-thioester is an essential step for its incorporation into the P-lactam backbone. To identify an acyl-CoA ligase involved in activation of adipate, we searched in the genome database of Penicillium chrysogenum for putative structural genes encoding acyl-CoA ligases. Chemostat-based transcriptome analysis was used to identify the one presenting the highest expression level when cells were grown in the presence of adipate. Deletion of the gene renamed aclA, led to a 32% decreased specific rate of adipate consumption and a threefold reduction of adipoyl-6-aminopenicillanic acid levels, but did not affect penicillin V production. After overexpression in Escherichia coli, the purified protein was shown to have a broad substrate range including adipate. Finally, protein-fusion with cyan-fluorescent protein showed co-localization with microbody-borne acyl-transferase. Identification and functional characterization of aclA may aid in developing future metabolic engineering strategies for improving the production of different cephalosporins. (C) 2009 Elsevier Inc. All rights reserved.
Resumo:
Stepped out lower section of wall houses seating, shelving and water features to outdoor room and living areas.
Resumo:
This pilot project at Cotton Tree, Maroochydore, on two adjacent, linear parcels of land has one of the properties privately owned while the other is owned by the public housing authority. Both owners commissioned Lindsay and Kerry Clare to design housing for their separate needs which enabled the two projects to be governed by a single planning and design strategy. This entailed the realignment of the dividing boundary to form two approximately square blocks which made possible the retention of an important stand of mature paperbark trees and gave each block a more useful street frontage. The scheme provides seven two-bedroom units and one single-bedroom unit as the private component, with six single-bedroom units, three two-bedroom units and two three-bedroom units forming the public housing. The dwellings are deployed as an interlaced mat of freestanding blocks, car courts, courtyard gardens, patios and decks. The key distinction between the public and private parts of the scheme is the pooling of the car parking spaces in the public housing to create a shared courtyard. The housing climbs to three storeys on its southern edge and falls to a single storey on the north-western corner. This enables all units and the principal private outdoor spaces to have a northern orientation. The interiors of both the public and private units are skilfully arranged to take full advantage of views, light and breeze.
Resumo:
As seen from adjacent block.
Resumo:
Most regional programs focus on the supply side of regions, emphasizing the attraction conditions offered, such as infrastructure, labor skills, tax incentives, etc. This study analyzes one aspect of the demand side, that is, how investment decisions of private firms are made by asking the question: ""Do corporations decide the same way on investments in different parts of the territory?"" The paper analyzes the investments of 373 large Brazilian firms during 1996-2004. Based on the investment decisions of these firms, the role of sales, cash-flow, external financing, and working capital is investigated through regression analysis. The regional influence is captured by explanatory variables representing regional and firm characteristics, and by interaction dummies between the region and the main investment determinants. The results indicate significant differences across regions in the importance of investment determinants. This information is important for regional development policy, because different mechanisms should be used in different regions to foster private investments.