978 resultados para Technical solutions
Resumo:
Transmitting sensitive data over non-secret channels has always required encryption technologies to ensure that the data arrives without exposure to eavesdroppers. The Internet has made it possible to transmit vast volumes of data more rapidly and cheaply and to a wider audience than ever before. At the same time, strong encryption makes it possible to send data securely, to digitally sign it, to prove it was sent or received, and to guarantee its integrity. The Internet and encryption make bulk transmission of data a commercially viable proposition. However, there are implementation challenges to solve before commercial bulk transmission becomes mainstream. Powerful have a performance cost, and may affect quality of service. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Performance degradation and potential for commercial loss discourage the bulk transmission of data over the Internet in any commercial application. This paper outlines technical solutions to these problems. We develop new technologies and combine existing ones in new and powerful ways to minimise commercial loss without compromising performance or inflating overheads.
Resumo:
Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.
Resumo:
As exigências da sociedade atual obrigam a mudanças tecnológicas cada vez mais rápidas e constantes para satisfazer as necessidades empresariais, especialmente no que concerne à transmissão de informações de forma cada vez mais rápidas, mas sempre mantendo um elevado padrão de qualidade de conteúdos, bem como níveis de segurança elevados para impedir que os mesmos sejam corrompidos. Desde o aparecimento da Internet que a informação circula de forma cada vez mais veloz, em maiores quantidades e alcança cada vez mais pessoas. No entanto, nem todas as pessoas têm acesso a conteúdos de qualidade, sendo nesse ponto que o desenvolvimento do presente trabalho terá importância na respectiva área. O portveb.com é um website que pretende colmatar uma carência de conteúdos de qualidade para especialistas web designers, programadores e optimizadores de motores de busca. A importância do trabalho desenvolvido deve-se à escassez de websites da referida temática, sendo uma oportunidade para explorar a utilização de soluções técnicas como o Bootstrap, HTML, CSS, Javacript, PHP, MYSQL e desenvolver um website cuja funcionalidade não esteja só restrita a computadores pessoais, mas também a plataformas móveis. O desenvolvimento do website portveb.com demonstrou que a utilização das soluções técnicas já referidas foram a melhor opção do que concerne à obtenção de resultados, por assentar em plataformas onde não foi necessário elaborar um design de raíz, sendo que a interacção com bases de dados como PHP e MySQL tornaram o website mais dinâmico. A realização deste trabalho possibilitou ainda a descoberta de potencialidades do website para soluções técnicas futuras que se destinam a aumentar a partilha de conhecimento entre os utilizadores de forma mais prática e eficiente.
Resumo:
This chapter explores the relationship between environmental conflicts and technical progress, trying to understand, in the case of large mines of the Iberian Pyrite Belt, in Alentejo, how emerging environmental problems conditioned the performance or led to the search for alternative technical solutions, taking as chronological limit for this observation the beginning of World War II. In the absence of the archives of the companies, the research was based on existing administrative documents in the state archives (mining engineers reports, the licensing of mining activities), on reports and documents published in specialized mining press, in particular, the Bulletin of the Ministry of Public Works, Trade and Industry, the Journal of Public Works, Trade and Industry (both in Portuguese), and finally in the local press. Despite that limitation, the information available shows that in global competition markets, the success of the British enterprise in Santo Domingo had the active search for new technical solutions for the creation and adaptation of existing knowledge to local problems in order to maximize the mineral resources available. The early development of the hydrometallurgical processes for the treatment of poor ores, named ‘natural cementation’, can be explained as the way these companies tried to solve problems of competitiveness, boosting economies of scale. Thus, they transferred the environmental costs previously limited to agriculture to more fragile social groups, the poor fishermen of Guadiana River and of Vila Real de Santo António. Therefore, the hydrometallurgy of pyrites was developed locally, pioneered in Santo Domingo that allowed the survival and expansion of the British company from the late 1870s, that is, at a time when most small mines shut since they were not able to compete globally. Through different consented and regulated processes (judicial), through conflict or parliamentary mediation, the State imposed exceptionally additional costs to companies, either for compensation, the imposing the application of remediation measures to reduce the environmental damage in some cases, thus contributing to derail some projects. These cases suggest that the interaction between local conflicts, corporate behavior and technological progress proves to be complex. This article aims to contribute to the debate on economic and social history between the environment and technological progress, arguing that the fixed costs and economic imponderable social risks were factors that encouraged the companies to search for new solutions and to introduce innovations since that would allow the expansion of their activity. In this process the companies sometimes faced environmental dilemmas and unforeseen costs with consequences on the economy of firms. The nature of the knowledge needed to address the environmental problems they created, however, is of a very different nature from that knowledge needed to face the environmental burdens that were inherent to the development of its activity.
Resumo:
En la presente investigación se proponen soluciones prácticas y técnicas, para las deficiencias que tiene el sistema constructivo Bahareque de Galluchaqui, mediante el análisis de distintas viviendas con el afán de reincorporar este sistema constructivo, que en la actualidad se encuentra relegada. El Bahareque de Galluchaqui necesita evolucionar incorporando nuevos sistemas y materiales, que le permitan cumplir con las necesidades básicas de habitabilidad y confort, por ello se han planteado propuestas de mejoramiento tanto en su aspecto físico y mecánico. La metodología empleada fue la revisión bibliográfica, análisis de campo y de laboratorio, con el afán de poder identificar cada una de las deficiencias que presentar esta técnica constructiva, y de esta forma proponer los correctivos necesarios. El sistema constructivo tema de estudio, presenta grandes beneficios bioclimáticos y aportes para las construcciones contemporáneas, de madera y tierra; porque propone una cimentación totalmente aislada del suelo, sistemas de refuerzos diagonales que dan mayor estabilidad a la vivienda, maderas labradas que dan un mejor acabado a la vivienda; mientras que en la parte bioclimática se incorporan elementos que ayudan al acondicionamiento ambiental de la vivienda Con los aportes realizados en este trabajo investigativo, esta técnica puede revitalizarse y constituirse como una alternativa de construcción ecológica, más amigable con el ambiente.
Resumo:
Federal Highway Administration, Washington, D.C.
Resumo:
This paper studies receiver autonomous integrity monitoring (RAIM) algorithms and performance benefits of RTK solutions with multiple-constellations. The proposed method is generally known as Multi-constellation RAIM -McRAIM. The McRAIM algorithms take advantage of the ambiguity invariant character to assist fast identification of multiple satellite faults in the context of multiple constellations, and then detect faulty satellites in the follow-up ambiguity search and position estimation processes. The concept of Virtual Galileo Constellation (VGC) is used to generate useful data sets of dual-constellations for performance analysis. Experimental results from a 24-h data set demonstrate that with GPS&VGC constellations, McRAIM can significantly enhance the detection and exclusion probabilities of two simultaneous faulty satellites in RTK solutions.
Resumo:
At QUT research data refers to information that is generated or collected to be used as primary sources in the production of original research results, and which would be required to validate or replicate research findings (Callan, De Vine, & Baker, 2010). Making publicly funded research data discoverable by the broader research community and the public is a key aim of the Australian National Data Service (ANDS). Queensland University of Technology (QUT) has been innovating in this space by undertaking mutually dependant technical and content (metadata) focused projects funded by ANDS. Research Data Librarians identified and described datasets generated from Category 1 funded research at QUT, by interviewing researchers, collecting metadata and fashioning metadata records for upload to the Australian Research Data commons (ARDC) and exposure through the Research Data Australia interface. In parallel to this project, a Research Data Management Service and Metadata hub project were being undertaken by QUT High Performance Computing & Research Support specialists. These projects will collectively store and aggregate QUT’s metadata and research data from multiple repositories and administration systems and contribute metadata directly by OAI-PMH compliant feed to RDA. The pioneering nature of the work has resulted in a collaborative project dynamic where good data management practices and the discoverability and sharing of research data were the shared drivers for all activity. Each project’s development and progress was dependent on feedback from the other. The metadata structure evolved in tandem with the development of the repository and the development of the repository interface responded to meet the needs of the data interview process. The project environment was one of bottom-up collaborative approaches to process and system development which matched top-down strategic alliances crossing organisational boundaries in order to provide the deliverables required by ANDS. This paper showcases the work undertaken at QUT, focusing on the Seeding the Commons project as a case study, and illustrates how the data management projects are interconnected. It describes the processes and systems being established to make QUT research data more visible and the nature of the collaborations between organisational areas required to achieve this. The paper concludes with the Seeding the Commons project outcomes and the contribution this project made to getting more research data ‘out there’.
Resumo:
Fractional order dynamics in physics, particularly when applied to diffusion, leads to an extension of the concept of Brown-ian motion through a generalization of the Gaussian probability function to what is termed anomalous diffusion. As MRI is applied with increasing temporal and spatial resolution, the spin dynamics are being examined more closely; such examinations extend our knowledge of biological materials through a detailed analysis of relaxation time distribution and water diffusion heterogeneity. Here the dynamic models become more complex as they attempt to correlate new data with a multiplicity of tissue compartments where processes are often anisotropic. Anomalous diffusion in the human brain using fractional order calculus has been investigated. Recently, a new diffusion model was proposed by solving the Bloch-Torrey equation using fractional order calculus with respect to time and space (see R.L. Magin et al., J. Magnetic Resonance, 190 (2008) 255-270). However effective numerical methods and supporting error analyses for the fractional Bloch-Torrey equation are still limited. In this paper, the space and time fractional Bloch-Torrey equation (ST-FBTE) is considered. The time and space derivatives in the ST-FBTE are replaced by the Caputo and the sequential Riesz fractional derivatives, respectively. Firstly, we derive an analytical solution for the ST-FBTE with initial and boundary conditions on a finite domain. Secondly, we propose an implicit numerical method (INM) for the ST-FBTE, and the stability and convergence of the INM are investigated. We prove that the implicit numerical method for the ST-FBTE is unconditionally stable and convergent. Finally, we present some numerical results that support our theoretical analysis.
Resumo:
There is an increasing interest in the use of information technology as a participatory planning tool, particularly the use of geographical information technologies to support collaborative activities such as community mapping. However, despite their promise, the introduction of such technologies does not necessarily promote better participation nor improve collaboration. In part this can be attributed to a tendency for planners to focus on the technical considerations associated with these technologies at the expense of broader participation considerations. In this paper we draw on the experiences of a community mapping project with disadvantaged communities in suburban Australia to highlight the importance of selecting tools and techniques which support and enhance participatory planning. This community mapping project, designed to identify and document community-generated transport issues and solutions, had originally intended to use cadastral maps extracted from the government’s digital cadastral database as the foundation for its community mapping approach. It was quickly discovered that the local residents found the cadastral maps confusing as the maps lacked sufficient detail to orient them to their suburb (the study area). In response to these concerns and consistent with the project’s participatory framework, a conceptual base map based on resident’s views of landmarks of local importance was developed to support the community mapping process. Based on this community mapping experience we outline four key lessons learned regarding the process of community mapping and the place of geographical information technologies within this process.
A framework for understanding and generating integrated solutions for residential peak energy demand
Resumo:
Supplying peak energy demand in a cost effective, reliable manner is a critical focus for utilities internationally. Successfully addressing peak energy concerns requires understanding of all the factors that affect electricity demand especially at peak times. This paper is based on past attempts of proposing models designed to aid our understanding of the influences on residential peak energy demand in a systematic and comprehensive way. Our model has been developed through a group model building process as a systems framework of the problem situation to model the complexity within and between systems and indicate how changes in one element might flow on to others. It is comprised of themes (social, technical and change management options) networked together in a way that captures their influence and association with each other and also their influence, association and impact on appliance usage and residential peak energy demand. The real value of the model is in creating awareness, understanding and insight into the complexity of residential peak energy demand and in working with this complexity to identify and integrate the social, technical and change management option themes and their impact on appliance usage and residential energy demand at peak times.
Resumo:
The technical feasibility of utilization of fly ash as a low-cost adsorbent for the removal of metals from water has been studied. For two types of fly ashes, the retention capacities of copper, lead, and zinc metal ions have been studied. Contact time, initial concentration, and pH have been varied and their effect on retention mechanism has been studied. The dominant mechanisms responsible for retention are found to be precipitation due to the presence of calcium hydroxide, and adsorption due to the presence of silica and alumina oxide surfaces in the fly ash. First-order kinetic plots have revealed that the rate constant increases with increase in the initial concentration and pH. Langmuir adsorption isotherms have been plotted to study the maximum adsorption capacities for metal ions considered under different conditions. X-ray diffraction studies revealed the formation of new peaks corresponding to respective metal ions precipitates under alkaline conditions.
Resumo:
Based on the authors' previous work, in this paper the systematical analyses on the motion and the inner solutions of a geostrophic vortex have been presented by means of thematched asymptotic expansion method with multiple time scales (S/gh001/2 and α S/gh001/2) and space scales. It has been shown that the leading inner solutions to the core structure in two-time scales analyses are identified with the results in normal one-time scale analyses. The time averages of the first-order solutions on short time variable τ are the same as the first-order solutions obtained in one normal time scale analyses. The geostrophic vortex induces an oscillatory motion in addition to moving with the background flow. The period, amplitude andthe deviation from the mean trajectory depend on the core structure and the initial conditions. The velocity of the motion of vortex center varies periodically and the time average of the velocity on short time variable τ is equal to the value of the local mean velocity.
Resumo:
In this paper, we present an asymptotic method for the analysis of a class of strongly nonlinear oscillators, derive second-order approximate solutions to them expressed in terms of their amplitudes and phases, and obtain the equations governing the amplitudes and phases, by which the amplitudes of the corresponding limit cycles and their behaviour can be determined. As an example, we investigate the modified van der Pol oscillator and give the second-order approximate analytical solution of its limit cycle. The comparison with the numerical solutions shows that the two results agree well with each other.