685 resultados para broadcast encryption
Resumo:
This project is aimed at making comparison between current existing Internet- of-Things (IoT) platforms, SensibleThings (ST) and Global Sensors Networks (GSN). Project can be served as a further work of platforms’ investigation. Comparing and learning from each other aim to contribute to the improvement of future platforms development. Detailed comparison is mainly with the respect of platform feature, communication and data present-frequency performance under stress, and platform node scalability performance on one limited device. Study is conducted through developing applications on each platform, and making measuring performance under the same condition in household network environment. So far, all these respects have had results and been concluded. Qualitatively comparing, GSN performs better in the facets of node’s swift development and deployment, data management, node subscription and connection retry mechanism. Whereas, ST is superior in respects of network package encryption, platform reliability, session initializing latency, and degree of developing freedom. In quantitative comparison, nodes on GSN has better data push pressure resistence while ST nodes works with lower session latency. In terms of data present-frequency, ST node can reach higher updating frequency than GSN node. In the aspect of node sclability on one limited device, ST nodes take the advantage in averagely lower latency than GSN node when nodes number is less than 15 on limited device. But due to sharing mechanism of GSN, on one limited device, it's nodes shows more scalable if platform nodes have similar job.
Resumo:
De nos jours, les séries télévisées américaines représentent une part incontournable de la culture populaire, à tel point que plusieurs traductions audiovisuelles coexistent au sein de la francophonie. Outre le doublage qui permet leur diffusion à la télévision, elles peuvent être sous titrées jusqu’à trois fois soit, en ordre chronologique : par des fans sur Internet; au Québec, pour la vente sur DVD en Amérique du Nord; et en France, pour la vente sur DVD en Europe. Pourtant, bien que ces trois sous titrages répondent aux mêmes contraintes linguistiques (celles de la langue française) et techniques (diffusion au petit écran), ils diffèrent dans leur traitement des dialogues originaux. Nous établissons dans un premier temps les pratiques à l’œuvre auprès des professionnels et des amateurs. Par la suite, l’analyse des traductions ainsi que le recours à un corpus comparable de séries télévisées françaises et québécoises permettent d’établir les normes linguistiques (notamment eu égard à la variété) et culturelles appliquées par les différents traducteurs et, subsidiairement, de définir ce que cache l’appellation « Canadian French ». Cette thèse s’inscrit dans le cadre des études descriptives et sociologiques. Nous y décrivons la réalité professionnelle des traducteurs de l’audiovisuel et l’influence que les fansubbers exercent non seulement sur la pratique professionnelle, mais aussi sur de nouvelles méthodes de formation de la prochaine génération de traducteurs. Par ailleurs, en étudiant plusieurs traductions d’une même œuvre, nous démontrons que les variétés de français ne sauraient justifier, à elles seules, la multiplication de l’offre en sous titrage, vu le faible taux de différences purement linguistiques.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-06
Resumo:
Design for visors for the delegation from Jamaica to the London Olympic Games 2012. This design was commissioned by PUMA 2012 based on McLean's designs featured in the website House of Flora, which functions as a space of display, archive, folio, point of sale and dissemination. The McLean standard design for visors is a component of the avant garde, pret a porter millinery, accessory design collections, and stylistically customised for the Jamaican team. McLean's oeuvre is original in its integration of the experimental traditions of art school workshop culture with the professional demands of fashion manufacture and trade culture. Combining the innovation of the postmodern urban artisan with the exacting demands of industrial production, dissemination and distribution McLean's design work spans the disparate worlds of national art collections such as the Victoria and Albert Museum (A Hat Anthology Exhibition, and catalogue 2009), London Design Museum ( Fifty Hats that Changed the World 2009). Integrating design considerations of multiple and mass production with the stylistic considerations of the studio workshop McLean brings the wit of the avant garde urban artisan to the structures and systems of fashion industry. The designs reach to a global audience as product users, as well as to the international connoisseurship of crafts and design specialists. The rigour of McLean's research and innovation is evident in the specificity of the stylistic references made through her selection of materials, processes, form, colour and symbolism. A range of cultural references cite the rich fusion of early twentieth century modernist culture in which the disparate worlds of popular, proletarian, culture fertilised the stylistic austerity of high modern formalism. McLean here considers the relationship between millinery and coiffure, following from the millinery piece featured in (Marcel bobbed hairpiece hat), and now brings the considerations of ethnic difference to bear on her design. Afro hair brings user group specificity to the milliner, and the visor design is a resolution of function and style for both protection and display. Connoting the sartorial conventions of workwear headgear, rather than the nineteenth century colonial 'cricketer's' cap, or the twentieth century US 'baseball' peaked cap, McLean's 'Jamaican Olympic Visor' brings distinctively postcolonial meaning to the cultural profile of the heterotopic media space. Designing for the popular culture of Olympic sports, televised and broadcast to global audiences, brings new forms of agency to the fashion designer, and McLan's design deploys a style that is widely recognisable from other popular culture's film and TV depictions of workwear to mark the distinctive tradition of supremacy that black athletes bring to the European traditions of cultural heritage. Supplanting the Arcadian 'laurels' with which winners are, traditionally, crowned, McLean's visor design innovation, suggests that it is not impossible to challenge and transform apparently timeless hierarchies of power and supremacy, so that ex-slaves may also become victors. McLean's fashion designs all work within this reach of fashion towards the carnivalesque inversion of social orderliness through play, display and sartorial activism.
Resumo:
‘Scratch’ investigates the use of physical space as a representation of narrative and dramatic structure. An audio-drama, it is a world-first in being location-sensitive without being tied to any particular place (preceding attempts by others have emphasised location-specific aspects of the genre). Developed in collaboration with and part-funded by BBC Radio Drama, it builds on research undertaken for ‘Dragons’ (output 4). It uses pre-recorded audio on GPS-enabled mobile devices allowing sounds to be virtually attached to locations in an outdoor space. As participants move, they encounter scenes forming a coherent drama which behave differently if the same place is visited more than once. This translocational approach opens novel artistic possibilities exploited through team expertise in narrative, sound design and advanced interaction. It is also significant in the economics of broadcast media as a more viable proposition than the many experimental locative experiences which have been site-specific: this was of great interest to the BBC. The public performance selected for BBC FreeThinking, 1-2 September 2008 in Liverpool as part of European Capital of Culture was reported in a co-authored 2009 conference presentation at ISEA, Belfast, 26-29 August 2009 and in a co-authored short chapter in Spierling and Szilas (eds.) Interactive Storytelling, Springer 2008. Boyd Davis directed the project and devised and undertook the evaluation with 40 trial listeners, reporting to BBC executives (http://researchonline.rca.ac.uk/1000/) for whom a second trial was also run in London in 2009. The evaluation used interview, video observation and a questionnaire combining an open question at the beginning with more specific questions later, avoiding channelling respondents' reactions immediately after the experience into issues which might not be uppermost in their minds, while also yielding data capable of rigorous analysis. The evaluation was to provide feedback to the makers of the drama and to guide policy at the BBC. [287] Participants were recruited principally through the publicity for FreeThinking 2008 – mainly via the festival website. The average age of participants was 40. The gender of participants was 20 males, 17 females and 3 null returns. The evaluation strategy was to combine an open question at the beginning with more specific questions later. In this way we avoided channeling respondents' initial opinions immediately after the experience into issues which might not be uppermost in their minds, while also yielding data capable of rigorous analysis. The purpose of the evaluation was to provide guidance for ourselves as the makers of the drama and to guide policy at the BBC on locative and other interactive media. The responses are analysed in the report.
Resumo:
Cette thèse présente l’analyse des propos de trois générations de femmes réfugiées au Québec sur les manières dont ces femmes s’exposent, s’identifient et s’approprient le discours des médias pour ensuite en discuter entre elles. L’analyse permet de cerner certaines de leurs pratiques d’insertion et d’adaptation à un nouveau milieu de vie. L’immigration favorise de plus en plus l’éclosion des « cultures de la mixité », lesquelles représentent un enjeu incontournable en matière d’intégration. Quant aux médias, ils sont une source incontournable d’accès à l’information et à la culture. Le développement des techniques de transmission telles les réseaux câblés, le satellite de diffusion directe, Internet et le numérique permet au consommateur de médias, quel que soit son origine, de s’approprier de façon personnelle les produits culturels qui en retour déterminent la participation à la vie active dans la société hôte. Cette nouvelle intégration culturelle se transmet-elle aisément au sein des générations d’immigrantes? Cette thèse découle aussi d’un projet plus vaste sur les transmissions intergénérationnelles des savoirs, des pratiques et de l’entraide entre trois générations de femmes réfugiées au Québec (Vatz Laroussi, Guilbert & al. CRSH, 2009-2012). Étudier les transmissions de savoirs au sein des familles immigrantes, c’est reconnaitre avec les auteurs contemporains l’importance de la transmission et de la circulation des histoires personnelles s’inscrivant dans une histoire familiale et sociale de l’époque a méthodologie adoptée s’appuie sur les entretiens semi-directifs, le commentaire réflexif ainsi que l’analyse de contenu. La démarche méthodologique a été empruntée au projet principal. Les entretiens réalisés auprès des familles de réfugiés établis dans plusieurs régions du Québec (Sherbrooke, Joliette, Québec et Montréal) ont été réalisés par une équipe pluridisciplinaire, multiculturelle et féminine. L’originalité de cette recherche se trouve entre autres dans la collecte d’information qui s’est faite auprès de trios générationnels (grand-mère, mère et fille). Chaque membre du trio a été rencontré de façon individuelle et par la suite, le trio s’est formé pour une dernière entrevue de groupe. Ainsi, une analyse thématique des discours des répondants a été réalisée. Cette analyse a permis de mettre en perspective divers éléments proéminents relatifs à la relation entre les médias et chaque membre du trio générationnel. Il a été constaté que les médias sont appréhendés différemment par chaque membre du trio, que des médias comme la télévision et l’Internet sont les plus prisés par les jeunes et ils servent à la fois de fenêtre sur le pays d’accueil, d’ouverture sur le monde et d’expression de soi-même face aux frustrations vécues au Québec. En dernier lieu, une analyse de la question de la transmission intergénérationnelle au prisme des médias entre les trois générations de femme réfugiée a été faite. On constate que dans les trios, la transmission n’est pas unidirectionnelle. Elle va dans tous les sens. Sortant des sentiers battus elle devient un espace de création.
Resumo:
info:eu-repo/semantics/published
Resumo:
info:eu-repo/semantics/published
Resumo:
2016 is the outbreak year of the virtual reality industry. In the field of virtual reality, 3D surveying plays an important role. Nowadays, 3D surveying technology has received increasing attention. This project aims to establish and optimize a WebGL three-dimensional broadcast platform combined with streaming media technology. It takes streaming media server and panoramic video broadcast in browser as the application background. Simultaneously, it discusses about the architecture from streaming media server to panoramic media player and analyzing relevant theory problem. This paper focuses on the debugging of streaming media platform, the structure of WebGL player environment, different types of ball model analysis, and the 3D mapping technology. The main work contains the following points: Initially, relay on Easy Darwin open source streaming media server, built a streaming service platform. It can realize the transmission from RTSP stream to streaming media server, and forwards HLS slice video to clients; Then, wrote a WebGL panoramic video player based on Three.js lib with JQuery browser playback controls. Set up a HTML5 panoramic video player; Next, analyzed the latitude and longitude sphere model which from Three.js library according to WebGL rendering method. Pointed out the drawbacks of this model and the breakthrough point of improvement; After that, on the basis of Schneider transform principle, established the Schneider sphere projection model, and converted the output OBJ file to JS file for media player reading. Finally implemented real time panoramic video high precision playing without plugin; At last, I summarized the whole project. Put forward the direction of future optimization and extensible market.
Resumo:
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is circuit obfuscation which seeks to modify the gate-level (or structural) description of a circuit without affecting its functionality in order to increase the complexity and cost of reverse engineering. Most of the existing circuit obfuscation methods are based on the insertion of additional logic (called “key gates”) or camouflaging existing gates in order to make it difficult for a malicious user to get the complete layout information without extensive computations to determine key-gate values. However, when the netlist or the circuit layout, although camouflaged, is available to the attacker, he/she can use advanced logic analysis and circuit simulation tools and Boolean SAT solvers to reveal the unknown gate-level information without exhaustively trying all the input vectors, thus bringing down the complexity of reverse engineering. To counter this problem, some ‘provably secure’ logic encryption algorithms that emphasize methodical selection of camouflaged gates have been proposed previously in literature [1,2,3]. The contribution of this paper is the creation and simulation of a new layout obfuscation method that uses don't care conditions. We also present proof-of-concept of a new functional or logic obfuscation technique that not only conceals, but modifies the circuit functionality in addition to the gate-level description, and can be implemented automatically during the design process. Our layout obfuscation technique utilizes don’t care conditions (namely, Observability and Satisfiability Don’t Cares) inherent in the circuit to camouflage selected gates and modify sub-circuit functionality while meeting the overall circuit specification. Here, camouflaging or obfuscating a gate means replacing the candidate gate by a 4X1 Multiplexer which can be configured to perform all possible 2-input/ 1-output functions as proposed by Bao et al. [4]. It is important to emphasize that our approach not only obfuscates but alters sub-circuit level functionality in an attempt to make IP piracy difficult. The choice of gates to obfuscate determines the effort required to reverse engineer or brute force the design. As such, we propose a method of camouflaged gate selection based on the intersection of output logic cones. By choosing these candidate gates methodically, the complexity of reverse engineering can be made exponential, thus making it computationally very expensive to determine the true circuit functionality. We propose several heuristic algorithms to maximize the RE complexity based on don’t care based obfuscation and methodical gate selection. Thus, the goal of protecting the design IP from malicious end-users is achieved. It also makes it significantly harder for rogue elements in the supply chain to use, copy or replicate the same design with a different logic. We analyze the reverse engineering complexity by applying our obfuscation algorithm on ISCAS-85 benchmarks. Our experimental results indicate that significant reverse engineering complexity can be achieved at minimal design overhead (average area overhead for the proposed layout obfuscation methods is 5.51% and average delay overhead is about 7.732%). We discuss the strengths and limitations of our approach and suggest directions that may lead to improved logic encryption algorithms in the future. References: [1] R. Chakraborty and S. Bhunia, “HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009. [2] J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” in 2008 Design, Automation and Test in Europe, 2008, pp. 1069–1074. [3] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security Analysis of Integrated Circuit Camouflaging,” ACM Conference on Computer Communications and Security, 2013. [4] Bao Liu, Wang, B., "Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks,"Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014 , vol., no., pp.1,6, 24-28 March 2014.
Resumo:
While news stories are an important traditional medium to broadcast and consume news, microblogging has recently emerged as a place where people can dis- cuss, disseminate, collect or report information about news. However, the massive information in the microblogosphere makes it hard for readers to keep up with these real-time updates. This is especially a problem when it comes to breaking news, where people are more eager to know “what is happening”. Therefore, this dis- sertation is intended as an exploratory effort to investigate computational methods to augment human effort when monitoring the development of breaking news on a given topic from a microblog stream by extractively summarizing the updates in a timely manner. More specifically, given an interest in a topic, either entered as a query or presented as an initial news report, a microblog temporal summarization system is proposed to filter microblog posts from a stream with three primary concerns: topical relevance, novelty, and salience. Considering the relatively high arrival rate of microblog streams, a cascade framework consisting of three stages is proposed to progressively reduce quantity of posts. For each step in the cascade, this dissertation studies methods that improve over current baselines. In the relevance filtering stage, query and document expansion techniques are applied to mitigate sparsity and vocabulary mismatch issues. The use of word embedding as a basis for filtering is also explored, using unsupervised and supervised modeling to characterize lexical and semantic similarity. In the novelty filtering stage, several statistical ways of characterizing novelty are investigated and ensemble learning techniques are used to integrate results from these diverse techniques. These results are compared with a baseline clustering approach using both standard and delay-discounted measures. In the salience filtering stage, because of the real-time prediction requirement a method of learning verb phrase usage from past relevant news reports is used in conjunction with some standard measures for characterizing writing quality. Following a Cranfield-like evaluation paradigm, this dissertation includes a se- ries of experiments to evaluate the proposed methods for each step, and for the end- to-end system. New microblog novelty and salience judgments are created, building on existing relevance judgments from the TREC Microblog track. The results point to future research directions at the intersection of social media, computational jour- nalism, information retrieval, automatic summarization, and machine learning.
Resumo:
An algorithm based on a Bayesian network classifier was adapted to produce 10-day burned area (BA) maps from the Long Term Data Record Version 3 (LTDR) at a spatial resolution of 0.05° (~5 km) for the North American boreal region from 2001 to 2011. The modified algorithm used the Brightness Temperature channel from the Moderate Resolution Imaging Spectroradiometer (MODIS) band 31 T31 (11.03 μm) instead of the Advanced Very High Resolution Radiometer (AVHRR) band T3 (3.75 μm). The accuracy of the BA-LTDR, the Collection 5.1 MODIS Burned Area (MCD45A1), the MODIS Collection 5.1 Direct Broadcast Monthly Burned Area (MCD64A1) and the Burned Area GEOLAND-2 (BA GEOLAND-2) products was assessed using reference data from the Alaska Fire Service (AFS) and the Canadian Forest Service National Fire Database (CFSNFD). The linear regression analysis of the burned area percentages of the MCD64A1 product using 40 km × 40 km grids versus the reference data for the years from 2001 to 2011 showed an agreement of R2 = 0.84 and a slope = 0.76, while the BA-LTDR showed an agreement of R2 = 0.75 and a slope = 0.69. These results represent an improvement over the MCD45A1 product, which showed an agreement of R2 = 0.67 and a slope = 0.42. The MCD64A1, BA-LTDR and MCD45A1 products underestimated the total burned area in the study region, whereas the BA GEOLAND-2 product overestimated it by approximately five-fold, with an agreement of R2 = 0.05. Despite MCD64A1 showing the best overall results, the BA-LTDR product proved to be an alternative for mapping burned areas in the North American boreal forest region compared with the other global BA products, even those with higher spatial/spectral resolution
Resumo:
This quantitative study examines the impact of teacher practices on student achievement in classrooms where the English is Fun Interactive Radio Instruction (IRI) programs were being used. A contemporary IRI design using a dual-audience approach, the English is Fun IRI programs delivered daily English language instruction to students in grades 1 and 2 in Delhi and Rajasthan through 120 30-minute programs via broadcast radio (the first audience) while modeling pedagogical techniques and behaviors for their teachers (the second audience). Few studies have examined how the dual-audience approach influences student learning. Using existing data from 32 teachers and 696 students, this study utilizes a multivariate multilevel model to examine the role of the primary expectations for teachers (e.g., setting up the IRI classroom, following instructions from the radio characters and ensuring students are participating) and the role of secondary expectations for teachers (e.g., modeling pedagogies and facilitating learning beyond the instructions) in promoting students’ learning in English listening skills, knowledge of vocabulary and use of sentences. The study finds that teacher practice on both sets of expectations mattered, but that practice in the secondary expectations mattered more. As expected, students made the smallest gains in the most difficult linguistic task (sentence use). The extent to which teachers satisfied the primary and secondary expectations was associated with gains in all three skills – confirming the relationship between students’ English proficiency and teacher practice in a dual-audience program. When it came to gains in students’ scores in sentence use, a teacher whose focus was greater on primary expectations had a negative effect on student performance in both states. In all, teacher practice clearly mattered but not in the same way for all three skills. An optimal scenario for teacher practice is presented in which gains in all three skills are maximized. These findings have important implications for the way the classroom teacher is cast in IRI programs that utilize a dual-audience approach and in the way IRI programs are contracted insofar as the role of the teacher in instruction is minimized and access is limited to instructional support from the IRI lessons alone.
Resumo:
Imagine being told that your wage was going to be cut in half. Well, that’s what’s soon going to happen to those who make money from Bitcoin mining, the process of earning the online currency Bitcoin. The current expected date for this change is 11 July 2016. Many see this as the day when Bitcoin prices will rocket and when Bitcoin owners could make a great deal of money. Others see it as the start of a Bitcoin crash. At present no one quite knows which way it will go. Bitcoin was created in 2009 by someone known as Satoshi Nakamoto, borrowing from a whole lot of research methods. It is a cryptocurrency, meaning it uses digital encryption techniques to create bitcoins and secure financial transactions. It doesn’t need a central government or organisation to regulate it, nor a broker to manage payments. Conventional currencies usually have a central bank that creates money and controls its supply. Bitcoin is instead created when individuals “mine” for it by using their computers to perform complex calculations through special software. The algorithm behind Bitcoin is designed to limit the number of bitcoins that can ever be created. All Bitcoin transactions are recorded on a public database known as a blockchain. Every time someone mines for Bitcoin, it is recorded with a new block that is transmitted to every Bitcoin app across the network, like a bank updating its online records.
Resumo:
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being encrypted. The prevalence of encrypted protocols as the underpinning of such critical services as e-commerce, remote login, and anonymity networks and the increasing feasibility of attacks on these services represent a considerable risk to communications security. Existing mechanisms for preventing traffic analysis focus on re-routing and padding. These prevention techniques have considerable resource and overhead requirements. Furthermore, padding is easily detectable and, in some cases, can introduce its own vulnerabilities. To address these shortcomings, we propose embedding real traffic in synthetically generated encrypted cover traffic. Novel to our approach is our use of realistic network protocol behavior models to generate cover traffic. The observable traffic we generate also has the benefit of being indistinguishable from other real encrypted traffic further thwarting an adversary's ability to target attacks. In this dissertation, we introduce the design of a proxy system called TrafficMimic that implements realistic cover traffic tunneling and can be used alone or integrated with the Tor anonymity system. We describe the cover traffic generation process including the subtleties of implementing a secure traffic generator. We show that TrafficMimic cover traffic can fool a complex protocol classification attack with 91% of the accuracy of real traffic. TrafficMimic cover traffic is also not detected by a binary classification attack specifically designed to detect TrafficMimic. We evaluate the performance of tunneling with independent cover traffic models and find that they are comparable, and, in some cases, more efficient than generic constant-rate defenses. We then use simulation and analytic modeling to understand the performance of cover traffic tunneling more deeply. We find that we can take measurements from real or simulated traffic with no tunneling and use them to estimate parameters for an accurate analytic model of the performance impact of cover traffic tunneling. Once validated, we use this model to better understand how delay, bandwidth, tunnel slowdown, and stability affect cover traffic tunneling. Finally, we take the insights from our simulation study and develop several biasing techniques that we can use to match the cover traffic to the real traffic while simultaneously bounding external information leakage. We study these bias methods using simulation and evaluate their security using a Bayesian inference attack. We find that we can safely improve performance with biasing while preventing both traffic analysis and defense detection attacks. We then apply these biasing methods to the real TrafficMimic implementation and evaluate it on the Internet. We find that biasing can provide 3-5x improvement in bandwidth for bulk transfers and 2.5-9.5x speedup for Web browsing over tunneling without biasing.