833 resultados para Terrorist attacks
Resumo:
The mud crab Scylla serrata is an important commercial species found in many brackish areas in the Philippines. During spawning and hatching, the berried females migrate to the sea. Seeds for pond stocking are obtained from the wild. Because of the unpredictability of seed supply, there is a need to propagate the species artificially. Thus, spawning, larval rearing, maturation, and rematuration of the species are being studied. The first attempts at hatching S. serrata were successful with rates varying between 75% and 90%. Two out of three trials on larval rearing yielded a few megalops. The first zoeal stages were fed diatoms, rotifers, Artemia salina, and bread yeast. Overfeeding programs were implemented during the critical premolting periods to prevent weakening of the larvae and lessen cannibalism. Larval weakening during the premolt makes them susceptible to attacks by fungi like Lagenidium and ciliates like Vorticella. S. serrata larvae survived salinity levels as low as 15 ppt until the 14th day of rearing. Other larvae were able to survive in salinities of 30-32 ppt for 8 to 13 days. Zoeal molting was hastened by lowering the salinity to 25-27 ppt. Artificial broodstocking of juveniles and adult crabs has been made possible using a simple refuge system made of three-compartmented hollow blocks. This system has been helpful in minimizing fighting among crabs. Remarkable growth rates have been observed with feeds like mussel meat and trash fish. Average growth increments of 11 mm carapace length and 20 . 35 g body weight have been observed every fortnight. A newly spent spawner could gain additional weight of 22 . 5 g in only 6 days. Feeding rates of juveniles and adult crabs have been established based on the average body weight from an experiment using mussel meat. Crabs feed more at night. In another experiment, eyestalk ablation was found to be effective in inducing growth and mating. Aside from hastening the molting process, copulation is induced even among the small crabs (average carapace length = 55 mm). Natural mating lasts about 26 hr. A copulation which lasted for seven days with a break in between was observed.
Resumo:
Fungal infection of P. monodon larvae is a problem in hatchery operations. The fungus, which attacks the nauplius to postlarval stages and causes up to 100% mortality, has been tentatively identified as belonging to the genus Lagenidium . This pathogenic organism has recently been isolated and cultured. A description is given of the fungus, and features of its biology and pathology are discussed.
Resumo:
In five groups of seasonally provisioned Tibetan macaques (Macaca thibetana) at Mt. Emei, males were sampled for wounds as an indicator of their competition for females during about 80 days in the 1987 mating season. Quantitative data on intergroup transfer were collected in a period between June 1986 and December 1987. The young adult (YA) males, the most active age-class in mating activity and intergroup transfer, received most of the wounds. Wounds tended to appear more in the front of body for YA and subadults (SA) than they did for middle-old aged (MO) males. This implies that some of the MO males were more active and aggressive in the fights. During the 1.5 year period, 5/6 of the YA and 5/17 of the MO males made intergroup shifts. Although YA males faced a high risk of receiving wounds at transfer, they usually rose in rank. On the other hand, the MO males transferred more smoothly but dropped in rank. The peripheral SA males, which rarely emigrated in the population, were an active component in determining the wounding rate, and the rate and direction of male migration. Three SA immigrants died of severe attacks made by resident males in 1988 and 1991. Adult sex ratios and their variations were considerably reduced with male nonrandom shifts and better conservation of the population.
Resumo:
A newly developed computer model, which solves the horizontal two-dimensional Boussinesq equations using a total variation diminishing Lax-Wendroff scheme, has been used to study the runup of solitary waves, with various heights, on idealized conical islands consisting of side slopes of different angles. This numerical model has first been validated against high-quality laboratory measurements of solitary wave runups on a uniform plane slope and on an isoliated conical island, with satisfactory agreement being achieved. An extensive parametric study concerning the effects of the wave height and island slope on the solitary wave runup has subsequently been carried out. Strong wave shoaling and diffraction effects have been observed for all the cases investigated. The relationship between the runup height and wave height has been obtained and compared with that for the case on uniform plane slopes. It has been found that the runup on a conical island is generally lower than that on a uniform plane slope, as a result of the two-dimensional effect. The correlation between the runup with the side slope of an island has also been identified, with higher runups on milder slopes. This comprehensive study on the soliton runup on islands is relevant to the protection of coastal and inland regions from extreme wave attacks. © the Coastal Education & Research Foundation 2012.
Resumo:
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e; (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Resumo:
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.
Resumo:
作为加密标准,DES(data encryption standard)算法虽然已被AES(advanced encryption standard)算法所取代,但其仍有着不可忽视的重要作用.在一些领域,尤其是金融领域,DES和Triple DES仍被广泛使用着.而近年来又提出了一些新的密码分析方法,其中,Rectangle攻击和Boomerang攻击已被证明是非常强大而有效的.因此,有必要重新评估DES算法抵抗这些新分析方法的能力.研究了DES算法针对Rectangle攻击和Boomerang攻击的安全性.利用DES各轮最优差分路径及其概率,分别得到了对12轮DES的Rectangle攻击和对11轮DES的Boomerang攻击.攻击结果分别为:利用Rectangle攻击可以攻击到12轮DES,数据复杂度为2~(62)。个选择明文,时间复杂度为2~(42)次12轮加密;利用Boomerang攻击可以攻击到11轮DES,数据复杂度为2~(58)个适应性选择明密文,时间复杂度为2~(38)次11轮加密.由于使用的都是DES各轮的最优差分路径,所以可以相信,该结果是Rectangle攻击和Boomerang攻击对DES所能达到的最好结果.
Resumo:
研究AES-256抵抗相关密钥-不可能差分密码分析的能力.首先给出相关密钥的差分,该差分可以扩展到8轮(甚至更多轮)子密钥差分;然后构造出一个5.5轮的相关密钥不可能差分特征.最后,给出一个对7轮AES-256的攻击和4个对8轮AES-256的攻击.
Resumo:
文中研究由密文的完整性检查而导致的数据保密性问题,提出一个新的安全概念——加密方案在密文验证攻击下的不可区分性(IND-CVA:indistinguishability ofencryption scheme under ciphertext verification attacks)来刻画加密方案在这种情况下的保密安全性。IND-CVA允许敌手访问加密oracle和密文验证oracle。与IND-CPA和IND-CCA相比,IND-CVA比IND-CPA稍微强些,但要比IND-CCA弱得多。IND-CVA能使多数常用的加密方案(如:OTP,CBC,及CTR)得以满足。并且,这个IND-CVA可以恰当地刻画安全信道的保密安全性。将认证方案和加密方案结合起来是保证通信安全的一种常用方法。然而,在IND-CVA模型下,当利用认证方案来加强保密安全性的时候,却有可能反而破坏了原有的保密安全性。IND-CVA揭示了完整性对保密性的影响,准确刻画了安全信道的保密性要求,为协议设计提供了有益的参考。
Resumo:
Compared with other existing methods, the feature point-based image watermarking schemes can resist to global geometric attacks and local geometric attacks, especially cropping and random bending attacks (RBAs), by binding watermark synchronization with salient image characteristics. However, the watermark detection rate remains low in the current feature point-based watermarking schemes. The main reason is that both of feature point extraction and watermark embedding are more or less related to the pixel position, which is seriously distorted by the interpolation error and the shift problem during geometric attacks. In view of these facts, this paper proposes a geometrically robust image watermarking scheme based on local histogram. Our scheme mainly consists of three components: (1) feature points extraction and local circular regions (LCRs) construction are conducted by using Harris-Laplace detector; (2) a mechanism of grapy theoretical clustering-based feature selection is used to choose a set of non-overlapped LCRs, then geometrically invariant LCRs are completely formed through dominant orientation normalization; and (3) the histogram and mean statistically independent of the pixel position are calculated over the selected LCRs and utilized to embed watermarks. Experimental results demonstrate that the proposed scheme can provide sufficient robustness against geometric attacks as well as common image processing operations. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness against rotation, scaling, and translation, but few are resistant to cropping, nonisotropic scaling, random bending attacks (RBAs), and affine transformations. Seo and Yoo present a geometrically invariant image watermarking based on affine covariant regions (ACRs) that provide a certain degree of robustness. To further enhance the robustness, we propose a new image watermarking scheme on the basis of Seo's work, which is insensitive to geometric distortions as well as common image processing operations. Our scheme is mainly composed of three components: 1) feature selection procedure based on graph theoretical clustering algorithm is applied to obtain a set of stable and nonoverlapped ACRs; 2) for each chosen ACR, local normalization, and orientation alignment are performed to generate a geometrically invariant region, which can obviously improve the robustness of the proposed watermarking scheme; and 3) in order to prevent the degradation in image quality caused by the normalization and inverse normalization, indirect inverse normalization is adopted to achieve a good compromise between the imperceptibility and robustness. Experiments are carried out on an image set of 100 images collected from Internet, and the preliminary results demonstrate that the developed method improves the performance over some representative image watermarking approaches in terms of robustness.
Resumo:
Hot dip Zn-Al alloy coating performs better than hot dip galvanized coating and 55% Al-Zn-Si coating as well with regard to general seawater corrosion protection. A characterization of the corrosion products on Zn-Al alloy coating immersed in dynamic aerated seawater has been performed mainly based on transmission electron microscopy (TEM) for morphological analysis and X-ray diffraction (XRD) technique for crystalline phase identification. The XRD and TEM analyses showed that the corrosion products mainly were typical nanometer Zn4CO3(OH)(6).H2O, Zn-5(OH)(8)Cl-2 and Zn6Al2CO3(OH)(16). 4H(2)O microcrystals. This probably is connected to the co-precipitation of Zn2+ and Al3+ ions caused by adsorption. Zn-Al alloy coating being suffered seawater attacks, AI(OH)(3) gel was first produced on the coating surface. Zn and Al hydroxides would co-precipitate and form double-hydroxide when the concentration of adsorbed Zn2+ ions by the newly produced gel exceeded the critical degree of supersaturation of the interphase nucleation. However, because the growth of the crystals was too low to keep in step with the nucleation, a layer of nano-crystalline corrosion products were produced on the surface of the coating finally. (C) 2001 Elsevier Science Ltd. All rights reserved.
Resumo:
Expert systems are too slow. This work attacks that problem by speeding up a useful system component that remembers facts and tracks down simple consequences. The redesigned component can assimilate new facts more quickly because it uses a compact, grammar-based internal representation to deal with whole classes of equivalent expressions at once. It can support faster hypothetical reasoning because it remembers the consequences of several assumption sets at once. The new design is targeted for situations in which many of the stored facts are equalities. The deductive machinery considered here supplements stored premises with simple new conclusions. The stored premises include permanently asserted facts and temporarily adopted assumptions. The new conclusions are derived by substituting equals for equals and using the properties of the logical connectives AND, Or, and NOT. The deductive system provides supporting premises for its derived conclusions. Reasoning that involves quantifiers is beyond the scope of its limited and automatic operation. The expert system of which the reasoning system is a component is expected to be responsible for overall control of reasoning.