912 resultados para Missile Attacks
Resumo:
About 336-444 bp mitochondrial D-loop region and tRNA gene were sequenced for 40 individuals of the giant panda which were collected from Mabian, Meigu, Yuexi, Baoxing, Pingwu, Qingchuan, Nanping and Baishuijiang, respectively. 9 haplotypes were found in 21 founders. The results showed that the giant panda has low genetic variations, and that there is no notable genetic isolation among geographical populations. The ancestor of the living giant panda population perhaps appeared in the late Pleistocene, and unfortunately, might have suffered bottle-neck attacks. Afterwards, its genetic diversity seemed to recover to same extent.
Resumo:
The mud crab Scylla serrata is an important commercial species found in many brackish areas in the Philippines. During spawning and hatching, the berried females migrate to the sea. Seeds for pond stocking are obtained from the wild. Because of the unpredictability of seed supply, there is a need to propagate the species artificially. Thus, spawning, larval rearing, maturation, and rematuration of the species are being studied. The first attempts at hatching S. serrata were successful with rates varying between 75% and 90%. Two out of three trials on larval rearing yielded a few megalops. The first zoeal stages were fed diatoms, rotifers, Artemia salina, and bread yeast. Overfeeding programs were implemented during the critical premolting periods to prevent weakening of the larvae and lessen cannibalism. Larval weakening during the premolt makes them susceptible to attacks by fungi like Lagenidium and ciliates like Vorticella. S. serrata larvae survived salinity levels as low as 15 ppt until the 14th day of rearing. Other larvae were able to survive in salinities of 30-32 ppt for 8 to 13 days. Zoeal molting was hastened by lowering the salinity to 25-27 ppt. Artificial broodstocking of juveniles and adult crabs has been made possible using a simple refuge system made of three-compartmented hollow blocks. This system has been helpful in minimizing fighting among crabs. Remarkable growth rates have been observed with feeds like mussel meat and trash fish. Average growth increments of 11 mm carapace length and 20 . 35 g body weight have been observed every fortnight. A newly spent spawner could gain additional weight of 22 . 5 g in only 6 days. Feeding rates of juveniles and adult crabs have been established based on the average body weight from an experiment using mussel meat. Crabs feed more at night. In another experiment, eyestalk ablation was found to be effective in inducing growth and mating. Aside from hastening the molting process, copulation is induced even among the small crabs (average carapace length = 55 mm). Natural mating lasts about 26 hr. A copulation which lasted for seven days with a break in between was observed.
Resumo:
Fungal infection of P. monodon larvae is a problem in hatchery operations. The fungus, which attacks the nauplius to postlarval stages and causes up to 100% mortality, has been tentatively identified as belonging to the genus Lagenidium . This pathogenic organism has recently been isolated and cultured. A description is given of the fungus, and features of its biology and pathology are discussed.
Resumo:
In five groups of seasonally provisioned Tibetan macaques (Macaca thibetana) at Mt. Emei, males were sampled for wounds as an indicator of their competition for females during about 80 days in the 1987 mating season. Quantitative data on intergroup transfer were collected in a period between June 1986 and December 1987. The young adult (YA) males, the most active age-class in mating activity and intergroup transfer, received most of the wounds. Wounds tended to appear more in the front of body for YA and subadults (SA) than they did for middle-old aged (MO) males. This implies that some of the MO males were more active and aggressive in the fights. During the 1.5 year period, 5/6 of the YA and 5/17 of the MO males made intergroup shifts. Although YA males faced a high risk of receiving wounds at transfer, they usually rose in rank. On the other hand, the MO males transferred more smoothly but dropped in rank. The peripheral SA males, which rarely emigrated in the population, were an active component in determining the wounding rate, and the rate and direction of male migration. Three SA immigrants died of severe attacks made by resident males in 1988 and 1991. Adult sex ratios and their variations were considerably reduced with male nonrandom shifts and better conservation of the population.
Resumo:
A newly developed computer model, which solves the horizontal two-dimensional Boussinesq equations using a total variation diminishing Lax-Wendroff scheme, has been used to study the runup of solitary waves, with various heights, on idealized conical islands consisting of side slopes of different angles. This numerical model has first been validated against high-quality laboratory measurements of solitary wave runups on a uniform plane slope and on an isoliated conical island, with satisfactory agreement being achieved. An extensive parametric study concerning the effects of the wave height and island slope on the solitary wave runup has subsequently been carried out. Strong wave shoaling and diffraction effects have been observed for all the cases investigated. The relationship between the runup height and wave height has been obtained and compared with that for the case on uniform plane slopes. It has been found that the runup on a conical island is generally lower than that on a uniform plane slope, as a result of the two-dimensional effect. The correlation between the runup with the side slope of an island has also been identified, with higher runups on milder slopes. This comprehensive study on the soliton runup on islands is relevant to the protection of coastal and inland regions from extreme wave attacks. © the Coastal Education & Research Foundation 2012.
Resumo:
Since the discovery of Carbon Nanotubes (CNTs) by Iijima in 1991[1, 2], there has been an explosion of research into the physical and chemical properties of this novel material. CNT based biosensors can play an important role in amperometric, immunosensor and nucleic-acid sensing devices, e.g. for detection of life threatening biological agents in time of war or in terrorist attacks, saving life and money for the NHS. CNTs offer unique advantages in several areas, like high surfacevolume ratio, high electrical conductivity, chemical stability and strong mechanical strength, and CNT based sensors generally have higher sensitivities and lower detection limit than conventional ones. In this review, recent advances in biosensors utilising carbon nanotubes and carbon nanotube fibres will be discussed. The synthesis methods, nanostructure approaches and current developments in biosensors using CNTs will be introduced in the first part. In the second part, the synthesis methods and up-to-date progress in CNT fibre biosensors will be reviewed. Finally, we briefly outline some exciting applications for CNT and CNT fibres which are being targeted. By harnessing the continual advancements in micro and nano- technology, the functionality and capability of CNT-based biosensors will be enhanced, thus expanding and enriching the possible applications that can be delivered by these devices. © 2012 Bentham Science Publishers. All rights reserved.
Resumo:
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e; (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Resumo:
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.
Resumo:
作为加密标准,DES(data encryption standard)算法虽然已被AES(advanced encryption standard)算法所取代,但其仍有着不可忽视的重要作用.在一些领域,尤其是金融领域,DES和Triple DES仍被广泛使用着.而近年来又提出了一些新的密码分析方法,其中,Rectangle攻击和Boomerang攻击已被证明是非常强大而有效的.因此,有必要重新评估DES算法抵抗这些新分析方法的能力.研究了DES算法针对Rectangle攻击和Boomerang攻击的安全性.利用DES各轮最优差分路径及其概率,分别得到了对12轮DES的Rectangle攻击和对11轮DES的Boomerang攻击.攻击结果分别为:利用Rectangle攻击可以攻击到12轮DES,数据复杂度为2~(62)。个选择明文,时间复杂度为2~(42)次12轮加密;利用Boomerang攻击可以攻击到11轮DES,数据复杂度为2~(58)个适应性选择明密文,时间复杂度为2~(38)次11轮加密.由于使用的都是DES各轮的最优差分路径,所以可以相信,该结果是Rectangle攻击和Boomerang攻击对DES所能达到的最好结果.
Resumo:
研究AES-256抵抗相关密钥-不可能差分密码分析的能力.首先给出相关密钥的差分,该差分可以扩展到8轮(甚至更多轮)子密钥差分;然后构造出一个5.5轮的相关密钥不可能差分特征.最后,给出一个对7轮AES-256的攻击和4个对8轮AES-256的攻击.
Resumo:
文中研究由密文的完整性检查而导致的数据保密性问题,提出一个新的安全概念——加密方案在密文验证攻击下的不可区分性(IND-CVA:indistinguishability ofencryption scheme under ciphertext verification attacks)来刻画加密方案在这种情况下的保密安全性。IND-CVA允许敌手访问加密oracle和密文验证oracle。与IND-CPA和IND-CCA相比,IND-CVA比IND-CPA稍微强些,但要比IND-CCA弱得多。IND-CVA能使多数常用的加密方案(如:OTP,CBC,及CTR)得以满足。并且,这个IND-CVA可以恰当地刻画安全信道的保密安全性。将认证方案和加密方案结合起来是保证通信安全的一种常用方法。然而,在IND-CVA模型下,当利用认证方案来加强保密安全性的时候,却有可能反而破坏了原有的保密安全性。IND-CVA揭示了完整性对保密性的影响,准确刻画了安全信道的保密性要求,为协议设计提供了有益的参考。
Resumo:
Compared with other existing methods, the feature point-based image watermarking schemes can resist to global geometric attacks and local geometric attacks, especially cropping and random bending attacks (RBAs), by binding watermark synchronization with salient image characteristics. However, the watermark detection rate remains low in the current feature point-based watermarking schemes. The main reason is that both of feature point extraction and watermark embedding are more or less related to the pixel position, which is seriously distorted by the interpolation error and the shift problem during geometric attacks. In view of these facts, this paper proposes a geometrically robust image watermarking scheme based on local histogram. Our scheme mainly consists of three components: (1) feature points extraction and local circular regions (LCRs) construction are conducted by using Harris-Laplace detector; (2) a mechanism of grapy theoretical clustering-based feature selection is used to choose a set of non-overlapped LCRs, then geometrically invariant LCRs are completely formed through dominant orientation normalization; and (3) the histogram and mean statistically independent of the pixel position are calculated over the selected LCRs and utilized to embed watermarks. Experimental results demonstrate that the proposed scheme can provide sufficient robustness against geometric attacks as well as common image processing operations. (C) 2010 Elsevier B.V. All rights reserved.