915 resultados para Shift-and


Relevância:

40.00% 40.00%

Publicador:

Resumo:

This presentation explains a dozen tools and paradigm shifts that teachers should apply in transformative ways to working with their students, how Web 2.0, tagging, and RSS are crucial to this process, and how teachers can develop their own personal learning networks to practice continuous lifelong learning and 'teacher autonomy' before applying these concepts to students.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This presentation explains a dozen tools and paradigm shifts that teachers should apply in transformative ways to working with their students, how Web 2.0, tagging, and RSS are crucial to this process, and how teachers can develop their own personal learning networks to practice continuous lifelong learning and 'teacher autonomy' before applying these concepts to students.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This presentation explains a dozen tools and paradigm shifts that teachers should apply in transformative ways to working with their students, how Web 2.0, tagging, and RSS are crucial to this process, and how teachers can develop their own personal learning networks to practice continuous lifelong learning and 'teacher autonomy' before applying these concepts to students.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Los algoritmos basados en registros de desplazamiento con realimentación (en inglés FSR) se han utilizado como generadores de flujos pseudoaleatorios en aplicaciones con recursos limitados como los sistemas de apertura sin llave. Se considera canal primario a aquel que se utiliza para realizar una transmisión de información. La aparición de los ataques de canal auxiliar (en inglés SCA), que explotan información filtrada inintencionadamente a través de canales laterales como el consumo, las emisiones electromagnéticas o el tiempo empleado, supone una grave amenaza para estas aplicaciones, dado que los dispositivos son accesibles por un atacante. El objetivo de esta tesis es proporcionar un conjunto de protecciones que se puedan aplicar de forma automática y que utilicen recursos ya disponibles, evitando un incremento sustancial en los costes y alargando la vida útil de aplicaciones que puedan estar desplegadas. Explotamos el paralelismo existente en algoritmos FSR, ya que sólo hay 1 bit de diferencia entre estados de rondas consecutivas. Realizamos aportaciones en tres niveles: a nivel de sistema, utilizando un coprocesador reconfigurable, a través del compilador y a nivel de bit, aprovechando los recursos disponibles en el procesador. Proponemos un marco de trabajo que nos permite evaluar implementaciones de un algoritmo incluyendo los efectos introducidos por el compilador considerando que el atacante es experto. En el campo de los ataques, hemos propuesto un nuevo ataque diferencial que se adapta mejor a las condiciones de las implementaciones software de FSR, en las que el consumo entre rondas es muy similar. SORU2 es un co-procesador vectorial reconfigurable propuesto para reducir el consumo energético en aplicaciones con paralelismo y basadas en el uso de bucles. Proponemos el uso de SORU2, además, para ejecutar algoritmos basados en FSR de forma segura. Al ser reconfigurable, no supone un sobrecoste en recursos, ya que no está dedicado en exclusiva al algoritmo de cifrado. Proponemos una configuración que ejecuta múltiples algoritmos de cifrado similares de forma simultánea, con distintas implementaciones y claves. A partir de una implementación sin protecciones, que demostramos que es completamente vulnerable ante SCA, obtenemos una implementación segura a los ataques que hemos realizado. A nivel de compilador, proponemos un mecanismo para evaluar los efectos de las secuencias de optimización del compilador sobre una implementación. El número de posibles secuencias de optimizaciones de compilador es extremadamente alto. El marco de trabajo propuesto incluye un algoritmo para la selección de las secuencias de optimización a considerar. Debido a que las optimizaciones del compilador transforman las implementaciones, se pueden generar automáticamente implementaciones diferentes combinamos para incrementar la seguridad ante SCA. Proponemos 2 mecanismos de aplicación de estas contramedidas, que aumentan la seguridad de la implementación original sin poder considerarse seguras. Finalmente hemos propuesto la ejecución paralela a nivel de bit del algoritmo en un procesador. Utilizamos la forma algebraica normal del algoritmo, que automáticamente se paraleliza. La implementación sobre el algoritmo evaluado mejora en rendimiento y evita que se filtre información por una ejecución dependiente de datos. Sin embargo, es más vulnerable ante ataques diferenciales que la implementación original. Proponemos una modificación del algoritmo para obtener una implementación segura, descartando parcialmente ejecuciones del algoritmo, de forma aleatoria. Esta implementación no introduce una sobrecarga en rendimiento comparada con las implementaciones originales. En definitiva, hemos propuesto varios mecanismos originales a distintos niveles para introducir aleatoridad en implementaciones de algoritmos FSR sin incrementar sustancialmente los recursos necesarios. ABSTRACT Feedback Shift Registers (FSR) have been traditionally used to implement pseudorandom sequence generators. These generators are used in Stream ciphers in systems with tight resource constraints, such as Remote Keyless Entry. When communicating electronic devices, the primary channel is the one used to transmit the information. Side-Channel Attack (SCA) use additional information leaking from the actual implementation, including power consumption, electromagnetic emissions or timing information. Side-Channel Attacks (SCA) are a serious threat to FSR-based applications, as an attacker usually has physical access to the devices. The main objective of this Ph.D. thesis is to provide a set of countermeasures that can be applied automatically using the available resources, avoiding a significant cost overhead and extending the useful life of deployed systems. If possible, we propose to take advantage of the inherent parallelism of FSR-based algorithms, as the state of a FSR differs from previous values only in 1-bit. We have contributed in three different levels: architecture (using a reconfigurable co-processor), using compiler optimizations, and at bit level, making the most of the resources available at the processor. We have developed a framework to evaluate implementations of an algorithm including the effects introduced by the compiler. We consider the presence of an expert attacker with great knowledge on the application and the device. Regarding SCA, we have presented a new differential SCA that performs better than traditional SCA on software FSR-based algorithms, where the leaked values are similar between rounds. SORU2 is a reconfigurable vector co-processor. It has been developed to reduce energy consumption in loop-based applications with parallelism. In addition, we propose its use for secure implementations of FSR-based algorithms. The cost overhead is discarded as the co-processor is not exclusively dedicated to the encryption algorithm. We present a co-processor configuration that executes multiple simultaneous encryptions, using different implementations and keys. From a basic implementation, which is proved to be vulnerable to SCA, we obtain an implementation where the SCA applied were unsuccessful. At compiler level, we use the framework to evaluate the effect of sequences of compiler optimization passes on a software implementation. There are many optimization passes available. The optimization sequences are combinations of the available passes. The amount of sequences is extremely high. The framework includes an algorithm for the selection of interesting sequences that require detailed evaluation. As existing compiler optimizations transform the software implementation, using different optimization sequences we can automatically generate different implementations. We propose to randomly switch between the generated implementations to increase the resistance against SCA.We propose two countermeasures. The results show that, although they increase the resistance against SCA, the resulting implementations are not secure. At bit level, we propose to exploit bit level parallelism of FSR-based implementations using pseudo bitslice implementation in a wireless node processor. The bitslice implementation is automatically obtained from the Algebraic Normal Form of the algorithm. The results show a performance improvement, avoiding timing information leakage, but increasing the vulnerability against differential SCA.We provide a secure version of the algorithm by randomly discarding part of the data obtained. The overhead in performance is negligible when compared to the original implementations. To summarize, we have proposed a set of original countermeasures at different levels that introduce randomness in FSR-based algorithms avoiding a heavy overhead on the resources required.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The boronium-carbonium continuum was extended to include hypercoordinated protonated methanes and their boron analogs. The 11B NMR chemical shifts of the hypercoordinated hydriodo boron compounds and the 13C NMR chemical shifts of the corresponding isoelectronic and isostructural carbocations were calculated by using the GIAO-MP2 method. The data show good linear correlation between 11B and 13C NMR chemical shifts, which indicates that the same factors that determine the chemical shifts of the boron nuclei also govern the chemical shifts of carbon nuclei of these hypercoordinated hydriodo compounds.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Fast transverse relaxation of 1H, 15N, and 13C by dipole-dipole coupling (DD) and chemical shift anisotropy (CSA) modulated by rotational molecular motions has a dominant impact on the size limit for biomacromolecular structures that can be studied by NMR spectroscopy in solution. Transverse relaxation-optimized spectroscopy (TROSY) is an approach for suppression of transverse relaxation in multidimensional NMR experiments, which is based on constructive use of interference between DD coupling and CSA. For example, a TROSY-type two-dimensional 1H,15N-correlation experiment with a uniformly 15N-labeled protein in a DNA complex of molecular mass 17 kDa at a 1H frequency of 750 MHz showed that 15N relaxation during 15N chemical shift evolution and 1HN relaxation during signal acquisition both are significantly reduced by mutual compensation of the DD and CSA interactions. The reduction of the linewidths when compared with a conventional two-dimensional 1H,15N-correlation experiment was 60% and 40%, respectively, and the residual linewidths were 5 Hz for 15N and 15 Hz for 1HN at 4°C. Because the ratio of the DD and CSA relaxation rates is nearly independent of the molecular size, a similar percentagewise reduction of the overall transverse relaxation rates is expected for larger proteins. For a 15N-labeled protein of 150 kDa at 750 MHz and 20°C one predicts residual linewidths of 10 Hz for 15N and 45 Hz for 1HN, and for the corresponding uniformly 15N,2H-labeled protein the residual linewidths are predicted to be smaller than 5 Hz and 15 Hz, respectively. The TROSY principle should benefit a variety of multidimensional solution NMR experiments, especially with future use of yet somewhat higher polarizing magnetic fields than are presently available, and thus largely eliminate one of the key factors that limit work with larger molecules.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The infected cell protein no. 0 (ICP0), the product of the alpha 0 gene, and an important herpes simplex virus 1 regulatory protein is encoded by three exons. We report that intron 1 forms a family of four stable nonpolyadenylylated cytoplasmic RNAs sharing a common 5' end but differing in 3' ends. The 5' and 3' ends correspond to the accepted splice donor and four splice acceptor sites within the mapped intron domain. The most distant splice acceptor site yields the mRNA encoding the 775-aa protein known as ICP0. The mRNAs resulting from the use of alternative splice acceptor sites were also present in the cytoplasm of infected cells and would be predicted to encode proteins of 152 (ICP0-B), 87 (ICP0-C), and 90 (ICP0-D) amino acids, respectively. Both the stability of the alpha 0 mRNA and the utilization of at least one splice acceptor site was regulated by ICP22 and or US1.5 protein inasmuch as cells infected with a mutant from which these genes had been deleted accumulated smaller amounts of alpha 0 mRNA than would be predicted from the amounts of accumulated intron RNAs. In addition, one splice acceptor site was at best underutilized. These results indicate that both the splicing pattern and longevity of alpha 0 mRNA are regulated. These and other recent examples indicate that herpes simplex virus 1 regulates its own gene expression and that of the infected cells through control of mRNA splicing and longevity.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The present study was designed to determine the magnitude of the relationship between amount, frequency, and length of shift work completed by female transportation employees and the number, degree, and extent of problems related to physical, menstrual and psychological health including depression. It was hypothesized that workers that are employed in areas such as transportation who are working shift work on a regular basis place themselves at higher risk for developing health or psychosocial related effects. These health related outcomes can have a profound impact on an employee’s job performance, daily functioning, and personal life. The present study sought to understand the potential relationship between working shift work and higher disturbances to the bodies’ natural functioning. The present study has the potential for explaining new ways to decrease the risk factors for those working shift work by contributing to the overall understanding of this multifaceted relationship. This study has many important findings and implications. This study has implications for explaining that the effects of disturbances to the circadian rhythm as a result of certain shift work schedules can result in ill-related health effects. Additionally, this study sought to challenge limitations to current research that has been conducted on the topic as the majority of studies have been performed on men. The overall purpose of the study was to gain a better understanding of the negative effects of shift work on females working within the transportation industry. This study sought to explain the health implications specifically for female workers as fewer studies have been conducted with gender as a main effect in the analysis. The present study suggests that due to the circadian rhythm controlling hormone secretion within the body, disturbances to its natural rhythm can have additional effects on female cycles such as menstruation. Overall, this study offers implications for further research on females working shift work and highlights the continued importance for further exploration into recent developments. These implications have the potential to further our current understanding of the relationship between shift work and ill-health effects, particularly the factors that women face.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background: An association between spontaneous abortions and shift work has been suggested, but present research results are conflicting. The aim of the study is to evaluate the relationship between spontaneous abortions among nurses, shift schedules, and nights worked. Methods: This is a longitudinal study where we identified 914 females from a cohort of nurses in Norway who had worked the same type of shift schedule 2008-2010; either permanent day shift, three-shift rotation or permanent night shift. Information on age, work and life-style factors, as well as spontaneous abortions during lifetime and the past three years (2008-2010) was obtained by annual questionnaires. Results: A higher prevalence of experienced spontaneous abortions before study start (2008) was found among nurses working permanent night shift compared to other nurses. In a linear regression analysis, a risk of 1.3 was found for experienced spontaneous abortions before study start among permanent night shift nurses, with day shift as reference, when adjusting for age, smoking, caffeine and job strain, but the finding was not statistical significant (95 per cent confidence interval 0.8-2.1). Permanent night shift workers had a risk of 1.5 experiencing spontaneous abortions in 2008-2010 compared to day shift nurses, although not statistical significant (95 per cent confidence interval 0.7-3.5). The number of night shifts the past three years was not associated with experiencing spontaneous abortions 2008-2010, but associated with a reduced risk of experiencing spontaneous abortions during lifetime. The results must be interpreted in the light of a possible selection bias; both selections into the occupation of nursing and into the different shift types of the more healthy persons may have occurred in this population. Conclusion: No significant increased risk of spontaneous abortion among permanent night shift nurses compared to day-time nurses was found in this study, and no association was found between spontaneous abortions and the number of worked night shifts.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The 2015 election to the Swiss Parliament marks a return to an already observed trend that was only interrupted in 2011: a shift to the right and an increase in polarization. The vote share of the nationalist-conservative Swiss People's Party (SVP) has now reached a historical height of 29.4% (+2.8). This note discusses why cantons matter in the Swiss national elections, and to what degree elections have become nationalized. Institutionally, the 26 cantons serve as electoral districts. This leads to a highly disproportional electoral system and has magnified the minor vote shifts to a slightly more pronounced shift in seats, with the right now holding a tiny majority of 101 of 200 seats in the first chamber. The two winners, the SVP and the Liberals, also had most campaign funds at their disposal. They were able to guide an extensive nationwide campaign in which they advocated their core issues instead of candidates. Other parties only advertised at the cantonal level.