992 resultados para Ponto de carga zero


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Masonry walls are usually laid with the individual masonry units along a course overlapping units in the course below. Commonly, the perpend joints in the course occur above the mid-points of the units below to form a ‘half-bond’ or above a third point to form a ‘third-bond’. The amount of this overlap has a profound influence on the strength of a wall supported on three or four sides, where lateral pressures from wind cause combined vertical and horizontal flexure. Where masonry units are laid with mortar joints, the torsional shear bond resistance between the mortar and overlapping units largely determines the horizontal flexural strength. If there is zero bond strength between units, then the horizontal flexural strength is derived from the frictional resistance to torsion on the overlapping bed-faces of the units. This thesis reports a theoretical and experimental investigation into the frictional properties of overlapping units when subjected to combinations of vertical and horizontal moments and vertical axial compression. These basic properties were used to develop a theory to predict the lateral strength of walls supported on two, three or four sides. A plastic theory of behaviour was confirmed by experiment. The theory was then used to determine maximum unbraced panel sizes for particular boundary conditions. Design charts were developed to determine temporary bracing requirements for panels during construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new homologous series of norbornylogous (NB) bridges has been synthesized in which the average curvature of the bridges is very small. The molecules are rigid and have two thiol moieties at each end to allow them to form self-assembled monolayers (SAMs) and to connect to two gold electrodes to form a molecular junction. The SAMs formed were characterized using electrochemistry to determine the surface coverage of molecules on gold surface and to provide an indication of the packing of the NB bridges while ellipsometry and X-ray photoelectron spectroscopy (XPS) were used to provide an indication of the SAM thickness and orientation. Single molecule conductance of NB bridges was measured as a function of the molecular length. The conductance was found to decrease exponentially with the length with a decay constant that is exactly correlated with photoelectron transfer and other studies at the multiple molecule level. The molecule−electrode contact resistance was determined and compared with that of related alkanedithiol molecular junctions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Desalination processes used worldwide produce a large amount of waste concentrate, the disposal of which can have significant environmental impacts. As such, there has been research carried out into the development of zero liquid discharge technologies which recognise that the waste concentrate streams contain valuable salts, minerals and water. These technologies include the proprietary SALPROC systems, as well as other integrated systems that use a variety of different technologies for the extraction of salts and minerals from waste concentrates. Research has also been conducted on using forward osmosis as a means of treating the waste concentrate in order to produce additional product water and thus reduce the volume of waste concentrate. This article provides a review of these technologies and evaluates the potential for achieving zero liquid discharge by combining these technologies with conventional desalination technologies into integrated processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent code to produce offspring copies which have the same functionality but with different signatures. Current techniques reported in literature lack the capability of detecting zero-day malware with the required accuracy and efficiency. In this paper, we have proposed and evaluated a novel method of employing several data mining techniques to detect and classify zero-day malware with high levels of accuracy and efficiency based on the frequency of Windows API calls. This paper describes the methodology employed for the collection of large data sets to train the classifiers, and analyses the performance results of the various data mining algorithms adopted for the study using a fully automated tool developed in this research to conduct the various experimental investigations and evaluation. Through the performance results of these algorithms from our experimental analysis, we are able to evaluate and discuss the advantages of one data mining algorithm over the other for accurately detecting zero-day malware successfully. The data mining framework employed in this research learns through analysing the behavior of existing malicious and benign codes in large datasets. We have employed robust classifiers, namely Naïve Bayes (NB) Algorithm, k−Nearest Neighbor (kNN) Algorithm, Sequential Minimal Optimization (SMO) Algorithm with 4 differents kernels (SMO - Normalized PolyKernel, SMO – PolyKernel, SMO – Puk, and SMO- Radial Basis Function (RBF)), Backpropagation Neural Networks Algorithm, and J48 decision tree and have evaluated their performance. Overall, the automated data mining system implemented for this study has achieved high true positive (TP) rate of more than 98.5%, and low false positive (FP) rate of less than 0.025, which has not been achieved in literature so far. This is much higher than the required commercial acceptance level indicating that our novel technique is a major leap forward in detecting zero-day malware. This paper also offers future directions for researchers in exploring different aspects of obfuscations that are affecting the IT world today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Google advertises the Android permission framework as one of the core security features present on its innovative and flexible mobile platform. The permissions are a means to control access to restricted AP/s and system resources. However, there are Android applications which do not request permissions at all.In this paper, we analyze the repercussions of installing an Android application that does not include any permission and the types of sensitive information that can be accessed by such an application. We found that even app/icaaons with no permissions are able to access sensitive information (such the device ID) and transmit it to third-parties.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposed a new linear zero dynamic controller (LZDC) for

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study elucidates the enhancement of aerobic granulation by zero-valent iron (ZVI). A reactor augmented with ZVI had a start-up time of aerobic granulation (43 days) that was notably less than that for a reactor without augmentation (64 days). The former reactor also had better removal efficiencies for chemical oxygen demand and ammonium. Moreover, the mature granules augmented with ZVI had better physical characteristics and produced more extracellular polymeric substances (especially of protein). Three-dimensional-excitation emission matrix fluorescence showed that ZVI enhanced organic material diversity. Additionally, ZVI enhanced the diversity of the microbial community. Fe(2+) dissolution from ZVI helped reduce the start-up time of aerobic granulation and increased the extracellular polymeric substance content. Conclusively, the use of ZVI effectively enhanced aerobic granulation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose a novel zero knowledge grouping proof protocol for RFID Systems. Over the years, several protocols have been proposed in this area but they are either found to be vulnerable to certain attacks or do not comply with the EPC Class 1 Gen 2 (C1G2) standard because they use hash functions or other complex encryption schemes. Also, the unique design requirements of grouping proofs have not been fully addressed by many. Our protocol addresses these important security and design gaps in grouping proofs. We present a novel approach based on pseudo random squares and quadratic residuosity to realize a zero knowledge system. Tag operations are limited to functions such as modulo (MOD), exclusive-or (XOR) and 128 bit Pseudo Random Number Generators (PRNG). These can be easily implemented on passive tags and hence achieves compliance with the EPC Global standard while meeting the security requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tese apresentada ao Programa de Pós-Graduação em Administração da Universidade Municipal de São Caetano do Sul para a obtenção do título de Doutor(a) em Administração