971 resultados para security protocols
Resumo:
A system capable of deployment as a microwave security sensor which can automatically reject background clutter is presented. The principle of operation is based on analog homodyne detection using 1. Q single side-band down conversion of an AM backscattered modulating signal envelope. A demonstrator is presented which operates with a carrier frequency of 2 GHz and 500 KHz backscattered signal. When deployed in a multipath rich open plan office environment the S/N ratio obtained at the detection output was better than 20 dB at 20 in range with 20 dBm EIRP in a 2 MHz detection bandwidth despite the presence of time varying and static clutter. (C) 2009 Wiley Periodicals, Inc. Microwave Opt Technol Lett 51: 2492-2495, 2009; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/mop.24636
Resumo:
The previously reported preparation of 1,3-dimethylimidazolium salts by the reaction of 1,3-dialkylimidazolium-2-carboxylate zwitterions with protic acids has been reinvestigated in detail, leading to the identification of two competing reactions: isomerisation and decarboxylation. The ability to control both pathways allows this methodology to be used as an effective, green, waste-free approach to readily prepare a wide range of ionic liquids in high yields. Additionally, this reaction protocol opens new possibilities in the formation of other imidazolium salts, whose syntheses were previously either very expensive (due to ion exchange protocols involving metals like Ag) or difficult to achieve (due to multiple extractions and large quantities of hard to remove inorganic by-products).
Resumo:
The research examines the relationships between three common trust considerations (vendor, Internet and third parties) and attitudes towards online purchasing. The study incorporates privacy and security concerns as a moderating variable and finds that these relationships vary depending on the level of concerns a consumer has when purchasing online. The study suggests that "fears" surrounding the Internet as a place to do business still hinder the use of it for e-commerce purposes, but that the presence of a reputable agent might in some manner mitigate this risk. In the context of business to consumer relationships trust in the vendor is important for the consumer to accept any risk associated with a transaction. Theoretical implications for online customer behavior theory are also discussed. © 2009 Elsevier Inc.