874 resultados para Cryptographic keys
Resumo:
A identificação dos padrões morfológicos da face é de extrema importância para a elaboração do diagnóstico ortodôntico e conseqüente plano de tratamento. Sendo assim, esta pesquisa teve como objetivo avaliar as relações entre as medidas lineares N-ENA, ENA-Pog e N-Pog, as medidas angulares N.OPI.ENA, ENA.OPI.Pog e N.OPI.Pog, e o índice VERT de acordo com a classificação proposta por RICKETTS. O material de estudo foi constituído de 700 telerradiografias, em norma lateral, de indivíduos brasileiros, leucodermas, de ambos os gêneros (318 do gênero masculino e 382 do gênero feminino), apresentando idade média de 16,66 anos. Das 700 telerradiografias foram constituídos quatro grupos de acordo com a oclusão. O primeiro grupo foi constituído de indivíduos com oclusão normal natural segundo ANDREWS, sendo observadas, clinicamente, quatro das seis chaves de oclusão. Os demais grupos se constituíram de indivíduos com más-oclusões de Classe I, II e III segundo ANGLE, sem relato de tratamento ortodôntico anterior. Após a análise estatística para a avaliação das medidas lineares N-ENA, ENA-Pog e N-Pog, e medidas angulares N.OPI.ENA, ENA.OPI.Pog e N.OPI.Pog, em relação ao índice VERT, evidenciou um aumento progressivo das medidas pesquisadas em relação aos seis padrões faciais determinados pelo índice VERT, mostrando um aumento destas medidas conforme se vai do padrão braquifacial severo para o padrão dolicofacial severo.
Resumo:
Este estudo teve como objetivo avaliar a concordância para determinação dos tipos faciais (braqui , meso e dolico) entre três análises cefalométricas: RICKETTS (Índice VERT), SIRIWAT; JARABAK (Quociente de JARABAK) e JANSON; WOODSIDE; METAXAS, e duas análises do perfil: LEGAN; BURSTONE e ANÁLISE SUBJETIVA. A amostra compôs-se de 60 indivíduos, sendo 24 do sexo masculino e 36 do sexo feminino. Todos brasileiros, leucodermas e portadores de oclusão normal natural, apresentando um mínimo de quatro das seis chaves de oclusão de ANDREWS. Como critério de exclusão, procedeu-se também à avaliação funcional e dinâmica da oclusão. A utilização da posição natural da cabeça (P.N.C.) e da vertical verdadeira (V.V.) no momento da obtenção das telerradiografias e fotografias laterais compuseram a metodologia do trabalho, como requisito indispensável para efeito de comparação. Após o tratamento estatístico (Kappa), os resultados apontaram, dentre as análises cefalométricas, para uma fraca concordância entre as análises de RICKETTS (Índice VERT) e SIRIWAT; JARABAK (Quociente de JARABAK). Entre as análises do perfil não houve concordância; e quando avaliamos as análises cefalométricas com as do perfil, verificamos que houve concordância entre as análises de JANSON; WOODSIDE; METAXAS e LEGAN; BURSTONE, e entre as análises de RICKETTS e SUBJETIVA DO PERFIL.
Resumo:
Este estudo teve como objetivo aplicar e avaliar a Análise Cefalométrica do Tecido Mole proposta por ARNETT et al. em jovens brasileiros, determinando seus valores médios e comparando com os dos autores. A amostra compôs-se de 60 indivíduos, sendo 24 do sexo masculino e 36 do sexo feminino. Todos brasileiros, leucodermas e portadores de oclusão normal natural, apresentando um mínimo de quatro das seis chaves de oclusão de ANDREWS. A utilização da posição natural da cabeça e da linha vertical verdadeira no momento da obtenção das telerradiografias compuseram a metodologia do trabalho. Avaliaram-se os fatores dentários e os esqueléticos, as espessuras do tecido mole, os comprimentos faciais, as projeções do tecido mole em relação à Linha Vertical Verdadeira e a harmonia intramandibular, a intermaxilar e a facial total. Os resultados demonstraram que os valores médios da amostra estudada apresentaram diferenças em relação aos valores normativos de ARNETT et al. na maioria das variáveis e quando comparados entre si, verificou-se que os americanos apresentaram altura facial maior, perfil facial mais reto e nariz mais proeminente que os brasileiros, tanto para o sexo masculino como para o feminino. O sexo masculino apresentou altura facial e espessura dos tecidos moles maior que o sexo feminino, porem, lábios superior e inferior menos protruídos em relação à Linha Vertical Verdadeira. A
Resumo:
O propósito neste estudo foi determinar a posição de repouso da língua em indivíduos com oclusão dentária normal e respiração nasal, por meio de telerradiografias em norma lateral realizadas após a ingestão de bário. A amostra foi composta por 66 radiografias de indivíduos brancos com oclusão dentária normal, sendo 26 do sexo masculino e 40 do sexo feminino, na faixa etária de 12 a 21 anos de idade, procedentes de escolas da região do Grande ABC Paulista. O critério utilizado para diagnóstico da oclusão normal foi As Seis Chaves para a Oclusão Normal preconizadas por Andrews (1972), devendo estar presentes no mínimo quatro das seis chaves, sendo obrigatória a presença da primeira chave de oclusão que é a da relação interarcos. As radiografias foram obtidas com o indivíduo em posição natural da cabeça após a ingestão de contraste de sulfato de bário para evidenciar o controle da língua. Posteriormente foi feito o desenho anatômico das estruturas pesquisadas, marcados os pontos cefalométricos, traçadas as linhas e os planos, e por último obtidas as seguintes medidas lineares: comprimento e altura da língua, distância do dorso da língua na sua porção média até o palato duro e a distância entre a ponta da língua e a incisal do incisivo inferior. Por meio dos resultados encontrados verificou-se que não existe um padrão único de posicionamento de repouso da língua dentro da cavidade oral, em pacientes respiradores nasais, variando muito sua distância até a incisal dos incisivos inferiores, bem como até o palato duro, havendo uniformidade apenas no fato da língua tocar o palato mole em todos os indivíduos da amostra. Não houve relação estatisticamente significante entre a posição de repouso da língua e os biotipos faciais e nem dimorfismo sexual.
Resumo:
Access to external sources of technical knowledge is one of the keys to staying innovative for small and medium-sized enterprises (SMEs). The literature suggests that SMEs with a weak internal R&D capacity do not make much use of institutional sources like research institutes and universities. In this paper I investigate how trade associations can induce member SMEs to use a research institute. The case of a public research institute and SMEs in the textile industry in Kyoto, Japan is examined. Evidence from the case suggests that trade associations facilitate the use of the institute by expressing a collective `voice' to the management of the institute. The effect is evident among active members in the use of services involving a large information gap as to their benefits. I also consider a shortcoming of the collective approach and suggest some measures to be taken on the part of research institutes.
Resumo:
This research describes the development of a groupware system which adds security services to a Computer Supported Cooperative Work system operating over the Internet. The security services use cryptographic techniques to provide a secure access control service and an information protection service. These security services are implemented as a protection layer for the groupware system. These layers are called External Security Layer (ESL) and Internal Security Layer (ISL) respectively. The security services are sufficiently flexible to allow the groupware system to operate in both synchronous and asynchronous modes. The groupware system developed - known as Secure Software Inspection Groupware (SecureSIG) - provides security for a distributed group performing software inspection. SecureSIG extends previous work on developing flexible software inspection groupware (FlexSIG) Sahibuddin, 1999). The SecureSIG model extends the FlexSIG model, and the prototype system was added to the FlexSIG prototype. The prototype was built by integrating existing software, communication and cryptography tools and technology. Java Cryptography Extension (JCE) and Internet technology were used to build the prototype. To test the suitability and transparency of the system, an evaluation was conducted. A questionnaire was used to assess user acceptability.
Resumo:
A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol involved a cipher negotiation stage, in which two communicating parties select privately a cipher from a public cipher space. The cipher negotiation process includes an on-line cipher evaluation stage, in which the cryptographic strength of the proposed cipher is estimated. The cryptographic strength of the ciphers is measured by confusion and diffusion. A method is proposed to describe quantitatively these two properties. For the calculation of confusion and diffusion a number of parameters are defined, such as the confusion and diffusion matrices and the marginal diffusion. These parameters involve computationally intensive calculations that are performed off-line, before any communication takes place. Once they are calculated, they are used to obtain estimation equations, which are used for on-line, fast evaluation of the confusion and diffusion of the negotiated cipher. A technique proposed in this thesis describes how to calculate the parameters and how to use the results for fast estimation of confusion and diffusion for any cipher instance within the defined cipher space.
Resumo:
Partial information leakage in deterministic public-key cryptosystems refers to a problem that arises when information about either the plaintext or the key is leaked in subtle ways. Quite a common case is where there are a small number of possible messages that may be sent. An attacker may be able to crack the scheme simply by enumerating all the possible ciphertexts. Two methods are proposed for facing the partial information leakage problem in RSA that incorporate a random element into the encrypted message to increase the number of possible ciphertexts. The resulting scheme is, effectively, an RSA-like cryptosystem which exhibits probabilistic encryption. The first method involves encrypting several similar messages with RSA and then using the Quadratic Residuosity Problem (QRP) to mark the intended one. In this way, an adversary who has correctly guessed two or more of the ciphertexts is still in doubt about which message is the intended one. The cryptographic strength of the combined system is equal to the computational difficulty of factorising a large integer; ideally, this should be feasible. The second scheme uses error-correcting codes for accommodating the random component. The plaintext is processed with an error-correcting code and deliberately corrupted before encryption. The introduced corruption lies within the error-correcting ability of the code, so as to enable the recovery of the original message. The random corruption offers a vast number of possible ciphertexts corresponding to a given plaintext; hence an attacker cannot deduce any useful information from it. The proposed systems are compared to other cryptosystems sharing similar characteristics, in terms of execution time and ciphertext size, so as to determine their practical utility. Finally, parameters which determine the characteristics of the proposed schemes are also examined.
Resumo:
C-reactive protein (CRP) is the prototypic acute phase serum protein in humans. CRP is currently one of the best markers of inflammatory disease and disease activity. One of the keys cells involved in inflammation within chronic inflammatory diseases is the monocyte. Monocytes are able to modulate inflammation through cytokine expression, cytosolic peroxide formation, adhesion molecule expression and subsequent adhesion/migration to sites of inflammation. CRP has been previously shown to bind directly to monocytes through Fc receptors. However this observation is not conclusive and requires further investigation. The effects of incubation of CRP with human primary and monocytic cell lines were examined using monocytic cytokine expression, adhesion molecule expression and adhesion to endothelial cells and intracellular peroxide formation, as end points. Monocytic intracellular signalling events were investigated after interaction of CRP with specific CRP receptors on monocytes. These initial signalling events were examined for their role in modulating monocytic adhesion molecule and cytokine expression. Monocyte recruitment and retention in the vasculature is also influenced by oxidative stress. Therefore the effect of 6 weeks of antioxidant intervention in vivo was examined on monocytic adhesion molecule expression, adhesion to endothelial cells ex vivo and on serum CRP concentrations, pre- and post- supplementation with the antioxidants vitamin C and vitaInin E. In summary, CRP is able to bind FcγRIIa. CRP binding FcγR initiates an intracellular signalling cascade that phosphorylates the non-receptor tyrosine kinase, Syk, associated with intracellular tyrosine activating motifs on the cytoplasmic tail of Fcγ receptors. CRP incubations increased phosphatidyl inositol turnover and Syk phosphorylation ultimately lead to Ca2+ mobilisation in monocytes. CRP mediated Syk phosphorylation in monocytes leads to an increase in CD 11b and IL-6 expression. CRP engagement with monocytes also leads to an increase in peroxide production, which can be inhibited in vitro using the antioxidants α-tocopherol and ascorbic acid. CRP mediated CD 11b expression is not redox regulated by CRP mediated changes in cytosolic peroxides. The FcyRIla polymorphism at codon 131 effects the phenotypic driven changes described in monocytes by CRP, where R/R allotypes have a greater increase in CD11b, in response to CRP, which may be involved in promoting the monocytic inflammatory response. CRP leads to an increase in the expression of pro-inflammatory cytokines, which alters the immune phenotype of circulating monocytes. Vitamin C supplementation reduced monocytic adhesion to endothelial cells, but had no effect on serum levels of CRP. Where long-term antioxidant intervention may provide benefit from the risk of developing vascular inflammatory disease, by reducing monocytic adhesion to the vasculature. In conclusion CRP appears to be much more than just a marker of ongoing inflammation or associated inflammatory disease and disease activity. This data suggests that at pathophysiological concentrations, CRP may be able to directly modulate inflammation through interacting with monocytes and thereby alter the inflammatory response associated with vascular inflammatory diseases.
Resumo:
This thesis explores how the world-wide-web can be used to support English language teachers doing further studies at a distance. The future of education worldwide is moving towards a requirement that we, as teacher educators, use the latest web technology not as a gambit, but as a viable tool to improve learning. By examining the literature on knowledge, teacher education and web training, a model of teacher knowledge development, along with statements of advice for web developers based upon the model are developed. Next, the applicability and viability of both the model and statements of advice are examined by developing a teacher support site (bttp://www. philseflsupport. com) according to these principles. The data collected from one focus group of users from sixteen different countries, all studying on the same distance Masters programme, is then analysed in depth. The outcomes from the research are threefold: A functioning website that is averaging around 15, 000 hits a month provides a professional contribution. An expanded model of teacher knowledge development that is based upon five theoretical principles that reflect the ever-expanding cyclical nature of teacher learning provides an academic contribution. A series of six statements of advice for developers of teacher support sites. These statements are grounded in the theoretical principles behind the model of teacher knowledge development and incorporate nine keys to effective web facilitation. Taken together, they provide a forward-looking contribution to the praxis of web supported teacher education, and thus to the potential dissemination of the research presented here. The research has succeeded in reducing the proliferation of terminology in teacher knowledge into a succinct model of teacher knowledge development. The model may now be used to further our understanding of how teachers learn and develop as other research builds upon the individual study here. NB: Appendix 4 is only available only available for consultation at Aston University Library with prior arrangement.
Resumo:
Combinatorial libraries continue to play a key role in drug discovery. To increase structural diversity, several experimental methods have been developed. However, limited efforts have been performed so far to quantify the diversity of the broadly used diversity-oriented synthetic (DOS) libraries. Herein we report a comprehensive characterization of 15 bis-diazacyclic combinatorial libraries obtained through libraries from libraries, which is a DOS approach. Using MACCS keys, radial and different pharmacophoric fingerprints as well as six molecular properties, it was demonstrated the increased structural and property diversity of the libraries from libraries over the individual libraries. Comparison of the libraries to existing drugs, NCI Diversity and the Molecular Libraries Small Molecule Repository revealed the structural uniqueness of the combinatorial libraries (mean similarity < 0.5 for any fingerprint representation). In particular, bis-cyclic thiourea libraries were the most structurally dissimilar to drugs retaining drug-like character in property space. This study represents the first comprehensive quantification of the diversity of libraries from libraries providing a solid quantitative approach to compare and contrast the diversity of DOS libraries with existing drugs or any other compound collection.
Resumo:
In Statnote 9, we described a one-way analysis of variance (ANOVA) ‘random effects’ model in which the objective was to estimate the degree of variation of a particular measurement and to compare different sources of variation in space and time. The illustrative scenario involved the role of computer keyboards in a University communal computer laboratory as a possible source of microbial contamination of the hands. The study estimated the aerobic colony count of ten selected keyboards with samples taken from two keys per keyboard determined at 9am and 5pm. This type of design is often referred to as a ‘nested’ or ‘hierarchical’ design and the ANOVA estimated the degree of variation: (1) between keyboards, (2) between keys within a keyboard, and (3) between sample times within a key. An alternative to this design is a 'fixed effects' model in which the objective is not to measure sources of variation per se but to estimate differences between specific groups or treatments, which are regarded as 'fixed' or discrete effects. This statnote describes two scenarios utilizing this type of analysis: (1) measuring the degree of bacterial contamination on 2p coins collected from three types of business property, viz., a butcher’s shop, a sandwich shop, and a newsagent and (2) the effectiveness of drugs in the treatment of a fungal eye infection.
Resumo:
Professor Ilan Oshri of Loughborough University’s Centre for Global Sourcing and Services and Professor Julia Kotlarsky look at the challenges of partnering with vendors on innovation programmes. What are the keys to a successful relationship?
Resumo:
Long period fiber grating (LPFG) can be used as active gain controlling device in EDFA. However, LPFGs fabricated in the standard telecom fiber only have a typical temperature sensitivity of 3-10nm/100°C, which may not be sufficient for implementing tuneable filters capable of wide tuning range and high tuning efficiency. In this paper, we report a theoretical and experimental investigation of thermal properties of LPFGs fabricated in B/Ge co-doped optical fiber. We have found that the temperature sensitivity of the LPFGs in the B/Ge fiber is considerably increased compared with those produced in the standard fiber. The LPFGs written in the B/Ge fiber have achieved, on average, one order of magnitude higher sensitivity than that of the LPFGs produced in the standard telecom fiber. We have also identified that the thermal response of LPFG is strongly dependent on the order of the coupled resonant cladding mode. The maximum sensitivity of 1.75nm/°C achieved by the 10th cladding mode of the 240μm LPFG is nearly 24 times that of the minimum value (0.075nm/C) exhibited by the 30th mode of the 34μm LPFG. Such devices may lead to high-efficiency and low-cost thermal/electrical tunable loss filters or sensors with extremely high temperature resolution.
Resumo:
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedicated to Nikola Obreshkoff and Lubomir Tschakaloff , Sofia, July, 2006. The material in this paper was presented in part at INDOCRYPT 2002