936 resultados para Cryptographic Protocols, Provable Security, ID-Based Cryptography


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Gossip (or Epidemic) protocols have emerged as a communication and computation paradigm for large-scale networked systems. These protocols are based on randomised communication, which provides probabilistic guarantees on convergence speed and accuracy. They also provide robustness, scalability, computational and communication efficiency and high stability under disruption. This work presents a novel Gossip protocol named Symmetric Push-Sum Protocol for the computation of global aggregates (e.g., average) in decentralised and asynchronous systems. The proposed approach combines the simplicity of the push-based approach and the efficiency of the push-pull schemes. The push-pull schemes cannot be directly employed in asynchronous systems as they require synchronous paired communication operations to guarantee their accuracy. Although push schemes guarantee accuracy even with asynchronous communication, they suffer from a slower and unstable convergence. Symmetric Push- Sum Protocol does not require synchronous communication and achieves a convergence speed similar to the push-pull schemes, while keeping the accuracy stability of the push scheme. In the experimental analysis, we focus on computing the global average as an important class of node aggregation problems. The results have confirmed that the proposed method inherits the advantages of both other schemes and outperforms well-known state of the art protocols for decentralized Gossip-based aggregation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Successful innovation diffusion process may well take the form of knowledge transfer process. Therefore, the primary objectives of this paper include: first, to evaluate the interrelations between transfer of knowledge and diffusion of innovation; and second to develop a model to establish a connection between the two. This has been achieved using a four-step approach. The first step of the approach is to assess and discuss the theories relating to knowledge transfer (KT) and innovation diffusion (ID). The second step focuses on developing basic models for KT and ID, based on the key theories surrounding these areas. A considerable amount of literature has been written on the association between knowledge management and innovation, the respective fields of KT and ID. The next step, therefore, explores the relationship between innovation and knowledge management in order to identify the connections between the latter, i.e. KT and ID. Finally, step four proposes and develops an integrated model for KT and ID. As the developed model suggests the sub-processes of knowledge transfer can be connected to the innovation diffusion process in several instances as discussed and illustrated in the paper.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article presents an experimental scalable message driven IoT and its security architecture based on Decentralized Information Flow Control. The system uses a gateway that exports SoA (REST) interfaces to the internet simplifying external applications whereas uses DIFC and asynchronous messaging within the home environment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Neste artigo, discute-se os desafios da implementação da política de atendimento socioeducativo em torno dos entes federados, proposta pela Lei 12.594/ 2012– Sistema Nacional de Atendimento Socioeducativo – SINASE. Para isso, realizou-se análise comparativa das normativas de Minas Gerais e Rio Grande do Sul a partir do olhar sobre a regulamentação do exercício profissional do agente de segurança socioeducativa, tendo por base os instrumentos institucionais: as políticas estaduais e o regimento da função de segurança socioeducativa. Identificou-se a prevalência de aspectos de segurança aos de socioeducação, o que torna a efetiva implementação do novo paradigma ainda um desafio. Apontam-se mudanças institucionais como propostas de aperfeiçoamento da política nos entes estaduais.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A desoneração da folha é constituída pela eliminação da contribuição previdenciária patronal incidente sobre a folha de pagamento dos funcionários e pela adoção de uma nova contribuição previdenciária sobre a receita bruta das empresas. Um dos objetivos desta mudança, listados pelo Governo Federal do Brasil no programa Brasil Maior, é reduzir os custos de produção dos setores beneficiados através da diminuição da carga tributária, contribuindo, assim, para a geração de empregos e formalização de mão de obra. O objetivo deste trabalho, portanto, é estimar o impacto desta medida sobre a geração de empregos formais e também sobre o salário médio dos trabalhadores nos primeiros setores beneficiados, que foram, principalmente, Tecnologia da Informação (e Comunicação), Couro e Calçados, Vestuário e Têxtil, Hotéis e Call Center. Para isto, aplicou-se a metodologia econométrica difference-in-differences nos dados da Relação Anual de Informações Sociais (RAIS), disponibilizados pelo Ministério do Trabalho. Os resultados sugerem principalmente que a desoneração da folha de pagamentos parece ter gerado empregos apenas para o setor Tecnologia da Informação (e Comunicação), assim como aumento do salário médio dos empregados deste setor. Outro resultado interessante é que para o setor de Call Center o impacto em termos de emprego não foi significativo, mas a lei parece ter contribuído para um aumento do salário no setor.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point in any computing environment. Many methodologies were created to identify these events; however, with increasing of users and services on the Internet, many difficulties are found in trying to monitor a large network environment. This paper proposes a methodology for events detection in large-scale networks. The proposal approaches the anomaly detection using the NetFlow protocol, statistical methods and monitoring the environment in a best time for the application. © 2010 Springer-Verlag Berlin Heidelberg.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objectives: To evaluate the effects of surface treatment, surface hydration (SH) and application method (AM) on the tensile bond strength of the Silorane Adhesive System (SAS) to dentine. Methods: Ninety bovine teeth were used. For the control group (n = 10), each dentine surface was treated according to the manufacturer's instructions of the SAS. The remaining teeth were randomly distributed into two groups (n = 40), according to the type of dentine surface treatment (ST) - 37% phosphoric acid or Er:YAG Laser prior to the application of the SAS. Each group was further divided into 2 subgroups (n = 20), according to the SH status: dry (D) or wet (W). Each subgroup was further divided into 2 subgroups (n = 10), according to the application method [AM: Active (AC) mode or Passive (PA) mode]. A coat of resin composite (Filtek P90) was applied on the surface. Artificial ageing was performed with a thermo-mechanical cycling machine. The specimens were sectioned into 1 mm × 1 mm × 10 mm sticks and stressed to failure using a universal testing machine. The remaining teeth in each group were used for Scanning Electron Microscopy to examine the fractured area. Data were subjected to a three-way ANOVA, Tukey's test and Dunnet's test (α = 0.05). Results: The ANOVA showed significant differences for SH and AM, but not for ST. For SH, the results of Tukey's test were (in MPa): D-14.9(±3.8)a, W-17.1(±4.3)b; and for AM: PA-14. 9(±4.2)a, AC-17.1(±3.9) b. Conclusions: Acid etching, when combined with a moist dentine surface and the use of primer agitation, improves the bond strength of the SAS to dentine. Clinical Significance: According to the results of the present in vitro study, modification of the application protocols for the silorane-based adhesive system may improve its clinical performance. © 2012 Published by Elsevier Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This essay aims to contribute to discuss public policies of social protection and practice guidelines for psychosocial care. Targeting children and underage adolescents whose documents, even though permeated with egalitarian discourses and promoted actions aimed at the construction of autonomy, continue endorsing welfare guardianship and addressed to the people classified as at-risk through biopolitical, disciplinary and security technologies based on a minority logic. The essay problematizes the ways in which psychology has found legitimacy in practices that eventually looms confinement practices which aspire to move away from, as was evidenced by documents and practices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Gossip protocols have proved to be a viable solution to set-up and manage largescale P2P services or applications in a fully decentralised scenario. The gossip or epidemic communication scheme is heavily based on stochastic behaviors and it is the fundamental idea behind many large-scale P2P protocols. It provides many remarkable features, such as scalability, robustness to failures, emergent load balancing capabilities, fast spreading, and redundancy of information. In some sense, these services or protocols mimic natural system behaviors in order to achieve their goals. The key idea of this work is that the remarkable properties of gossip hold when all the participants follow the rules dictated by the actual protocols. If one or more malicious nodes join the network and start cheating according to some strategy, the result can be catastrophic. In order to study how serious the threat posed by malicious nodes can be and what can be done to prevent attackers from cheating, we focused on a general attack model aimed to defeat a key service in gossip overlay networks (the Peer Sampling Service [JGKvS04]). We also focused on the problem of protecting against forged information exchanged in gossip services. We propose a solution technique for each problem; both techniques are general enough to be applied to distinct service implementations. As gossip protocols, our solutions are based on stochastic behavior and are fully decentralized. In addition, each technique’s behaviour is abstracted by a general primitive function extending the basic gossip scheme; this approach allows the adoptions of our solutions with minimal changes in different scenarios. We provide an extensive experimental evaluation to support the effectiveness of our techniques. Basically, these techniques aim to be building blocks or P2P architecture guidelines in building more resilient and more secure P2P services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Magnetic Resonance Spectroscopy (MRS) is an advanced clinical and research application which guarantees a specific biochemical and metabolic characterization of tissues by the detection and quantification of key metabolites for diagnosis and disease staging. The "Associazione Italiana di Fisica Medica (AIFM)" has promoted the activity of the "Interconfronto di spettroscopia in RM" working group. The purpose of the study is to compare and analyze results obtained by perfoming MRS on scanners of different manufacturing in order to compile a robust protocol for spectroscopic examinations in clinical routines. This thesis takes part into this project by using the GE Signa HDxt 1.5 T at the Pavillion no. 11 of the S.Orsola-Malpighi hospital in Bologna. The spectral analyses have been performed with the jMRUI package, which includes a wide range of preprocessing and quantification algorithms for signal analysis in the time domain. After the quality assurance on the scanner with standard and innovative methods, both spectra with and without suppression of the water peak have been acquired on the GE test phantom. The comparison of the ratios of the metabolite amplitudes over Creatine computed by the workstation software, which works on the frequencies, and jMRUI shows good agreement, suggesting that quantifications in both domains may lead to consistent results. The characterization of an in-house phantom provided by the working group has achieved its goal of assessing the solution content and the metabolite concentrations with good accuracy. The goodness of the experimental procedure and data analysis has been demonstrated by the correct estimation of the T2 of water, the observed biexponential relaxation curve of Creatine and the correct TE value at which the modulation by J coupling causes the Lactate doublet to be inverted in the spectrum. The work of this thesis has demonstrated that it is possible to perform measurements and establish protocols for data analysis, based on the physical principles of NMR, which are able to provide robust values for the spectral parameters of clinical use.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Allogeneic hematopoietic SCT (HSCT) has been proposed as a treatment for patients with mitochondrial neurogastrointestinal encephalomyopathy (MNGIE). HSCT has been performed in nine patients using different protocols with varying success. Based on this preliminary experience, participants of the first consensus conference propose a common approach to allogeneic HSCT in MNGIE. Standardization of the transplant protocol and the clinical and biochemical assessments will allow evaluation of the safety and efficacy of HSCT as well as optimization of therapy for patients with MNGIE.Bone Marrow Transplantation advance online publication, 3 May 2010; doi:10.1038/bmt.2010.100.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tajikistan is judged to be highly vulnerable to risk, including food insecurity risks and climate change risks. By some vulnerability measures it is the most vulnerable among all 28 countries in the World Bank’s Europe and Central Asia Region – ECA (World Bank 2009). The rural population, with its relatively high incidence of poverty, is particularly vulnerable. The Pilot Program for Climate Resilience (PPCR) in Tajikistan (2011) provided an opportunity to conduct a farm-level survey with the objective of assessing various dimensions of rural population’s vulnerability to risk and their perception of constraints to farming operations and livelihoods. The survey should be accordingly referred to as the 2011 PPCR survey. The rural population in Tajikistan is highly agrarian, with about 50% of family income deriving from agriculture (see Figure 4.1; also LSMS 2007 – own calculations). Tajikistan’s agriculture basically consists of two groups of producers: small household plots – the successors of Soviet “private agriculture” – and dehkan (or “peasant”) farms – new family farming structures that began to be created under relevant legislation passed after 1992 (Lerman and Sedik, 2008). The household plots manage 20% of arable land and produce 65% of gross agricultural output (GAO). Dehkan farms manage 65% of arable land and produce close to 30% of GAO. The remaining 15% of arable land is held in agricultural enterprises – the rapidly shrinking sector of corporate farms that succeeded the Soviet kolkhozes and sovkhozes and today produces less than 10% of GAO (TajStat 2011) The survey conducted in May 2011 focused on dehkan farms, as budgetary constraints precluded the inclusion of household plots. A total of 142 dehkan farms were surveyed in face-to-face interviews. They were sampled from 17 districts across all four regions – Sughd, Khatlon, RRP, and GBAO. The districts were selected so as to represent different agro-climatic zones, different vulnerability zones (based on the World Bank (2011) vulnerability assessment), and different food-insecurity zones (based on WFP/IPC assessments). Within each district, 3-4 jamoats were chosen at random and 2-3 farms were selected in each jamoat from lists provided by jamoat administration so as to maximize the variability by farm characteristics. The sample design by region/district is presented in Table A, which also shows the agro-climatic zone and the food security phase for each district. The sample districts are superimposed on a map of food security phases based on IPC April 2011.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The formerly proposed concept for magnetization transfer imaging (MTI) using balanced steady-state free precession (SSFP) image acquisitions is in this work extended to nonbalanced protocols. This allows SSFP-based MTI of targets with high susceptibility variation (such as the musculoskeletal system), or at ultra-high magnetic fields (where balanced SSFP suffers from considerable off-resonance related image degradations). In the first part, SSFP-based MTI in human brain is analyzed based on magnetization transfer ratio (MTR) histograms. High correlations are observed among all different SSFP MTI protocols and thereby ensure proper conceptual extension to nonbalanced SSFP. The second part demonstrates SSFP-based MTI allowing fast acquisition of high resolution volumetric MTR data from human brain and cartilage at low (1.5T) to ultra-high (7.0T) magnetic fields.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Participatory Sensing combines the ubiquity of mobile phones with sensing capabilities of Wireless Sensor Networks. It targets pervasive collection of information, e.g., temperature, traffic conditions, or health-related data. As users produce measurements from their mobile devices, voluntary participation becomes essential. However, a number of privacy concerns -- due to the personal information conveyed by data reports -- hinder large-scale deployment of participatory sensing applications. Prior work on privacy protection, for participatory sensing, has often relayed on unrealistic assumptions and with no provably-secure guarantees. The goal of this project is to introduce PEPSI: a Privacy-Enhanced Participatory Sensing Infrastructure. We explore realistic architectural assumptions and a minimal set of (formal) privacy requirements, aiming at protecting privacy of both data producers and consumers. We design a solution that attains privacy guarantees with provable security at very low additional computational cost and almost no extra communication overhead.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In order to satisfy the safety-critical requirements, the train control system (TCS) often employs a layered safety communication protocol to provide reliable services. However, both description and verification of the safety protocols may be formidable due to the system complexity. In this paper, interface automata (IA) are used to describe the safety service interface behaviors of safety communication protocol. A formal verification method is proposed to describe the safety communication protocols using IA and translate IA model into PROMELA model so that the protocols can be verified by the model checker SPIN. A case study of using this method to describe and verify a safety communication protocol is included. The verification results illustrate that the proposed method is effective to describe the safety protocols and verify deadlocks, livelocks and several mandatory consistency properties. A prototype of safety protocols is also developed based on the presented formally verifying method.