1000 resultados para domain swapping


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

First-order temporal logic is a concise and powerful notation, with many potential applications in both Computer Science and Artificial Intelligence. While the full logic is highly complex, recent work on monodic first-order temporal logics has identified important enumerable and even decidable fragments. In this paper, we develop a clausal resolution method for the monodic fragment of first-order temporal logic over expanding domains. We first define a normal form for monodic formulae and then introduce novel resolution calculi that can be applied to formulae in this normal form. We state correctness and completeness results for the method. We illustrate the method on a comprehensive example. The method is based on classical first-order resolution and can, thus, be efficiently implemented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the domain of aerospace aftermarkets, which often has long supply chains that feed into the maintenance of aircraft, contracts are used to establish agreements between aircraft operators and maintenance suppliers. However, violations at the bottom of the supply chain (part suppliers) can easily cascade to the top (aircraft operators), making it difficult to determine the source of the violation, and seek to address it. In this context, we have developed a global monitoring architecture that ensures the detection of norm violations and generates explanations for the origin of violations. In this paper, we describe the implementation and deployment of a global monitor in the aerospace domain of [8] and show how it generates explanations for violations within the maintenance supply chain. We show how these explanations can be used not only to detect violations at runtime, but also to uncover potential problems in contracts before their deployment, thus improving them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Casitas b-lineage lymphoma (c-Cbl) is a multiadaptor protein with E3-ubiquitin ligase activity residing within its RING finger domain. We have previously reported that c-Cbl–deficient mice exhibit elevated energy expenditure, reduced adiposity, and improved insulin action. In this study, we examined mice expressing c-Cbl protein with a loss-of-function mutation within the RING finger domain (c-CblA/– mice). Compared with control animals, c-CblA/– mice display a phenotype that includes reduced adiposity, despite greater food intake; reduced circulating insulin, leptin, and triglyceride levels; and improved glucose tolerance. c-CblA/– mice also display elevated oxygen consumption (13%) and are protected against high-fat diet–induced obesity and insulin resistance. Unlike c-CblA/– mice, mice expressing a mutant c-Cbl with the phosphatidylinositol (PI) 3-kinase binding domain ablated (c-CblF/F mice) exhibited an insulin sensitivity, body composition, and energy expenditure similar to that of wild-type animals. These results indicate that c-Cbl ubiquitin ligase activity, but not c-Cbl–dependent activation of PI 3-kinase, plays a key role in the regulation of whole-body energy metabolism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditionally system development starts with the specification of system requirements. The focus of such an approach is on the system under construction, which is considered as of primary importance to the development success. The major problem with such an approach, however, is the neglect of concerns held by the various system stakeholders, whose opinions, loyalties and fears may impact considerably the perception and the reception of the implemented system, its functions and its features. Typically, stakeholder concerns are not collected or identified, and are viewed as of little significance in the system development process. In this paper, however, we present the case for recognising the value of stakeholder concerns, and their use in aligning business needs with system requirements. We describe a method of gathering and analysing stakeholder concerns across an application domain, and then packaging the development experience in dealing with these concerns into patterns. Experience patterns can subsequently be used to guide systems analysts in selecting the most appropriate requirements for the target stakeholder community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Designing a successful web project requires understanding not only of its owner's business and technological needs, as well as having the substantial management and development experience, but it also depends on a thorough knowledge of the system's application domain and of other existing systems in the domain. In order to gather such domain knowledge, it is necessary to identify the nature of the proposed web services venture with regards to other similar services offered in the domain, the business setting of enterprises that initiate such ventures, the various types of customers involved, and how these factors translate into requirements. In this paper, we present an approach to studying the domain of web-enabled Human Resource and payroll services with the aim of attaining design knowledge that would ensure customer satisfaction and could eventually pave the way to the successful implementation of web-enabled services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design space exploration formalism has developed data structures and algorithms of sufficient complexity and scope to support conceptual layout, massing, and enclosure configurations. However, design remains a human enterprise. To support the user in designing with the formalism, we have developed an interaction model that addresses the interleaving of user actions with the formal operations of design space exploration. The central feature of our interaction model is the modeling of control based on mixed-initiative. Initiative is sometimes taken by the designer and sometimes by the formalism in working on a shared design task. The model comprises three layers, domain, task, and dialogue. In this paper we describe the formulation of the domain layer of our mixed-initiative interaction model for design space exploration. We present the view of the domain as understood in the formalism in terms of the three abstract concepts of state, move, and structure. In order to support mixed initiative, it is necessary to develop a shared view of the domain. The domain layer addresses this problem by mapping the designer's view onto the symbol substrate. First, we present the designer's view of the domain in terms of problems, solutions, choices, and history. Second, we show how this view is interleaved with the symbol-substrate through four domain layer constructs, problem state, solution state, choice, and exploration history. The domain layer presents a suitable foundation for integrating the role of the designer with a description formalism. It enables the designer to maintain exploration freedom in terms of formulating and reformulating problems, generating solutions, making choices, and navigating the history of exploration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In industrial polymer and synthetic rubber production facilities, workers are exposed to 1,3-butadiene. This compound is converted in vivo to 1,2,3,4-diepoxybutane (DEB) and has been linked to increased incidences of cancer in these individuals. Carcinogenesis has been attributed to formation of DEB induced DNA interstrand cross-links. Previous studies have demonstrated that DEB cross-links deoxyguanosine residues within 5'-GNC sequences in synthetic DNA, in restriction fragments, and in defined sequence nucleosomes. The current study utilized the polymerase chain reaction (PCR) to examine DEB damage frequencies within nuclear genes, found within "open" regions of chromatin, as compared to regions of unexpressed sequence that reside in tightly packed, "closed" chromatin, to more closely model DEB reactivity in vivo. These initial studies have been performed in chicken liver homogenates. Preliminarily, we have found a dose-dependent DEB lesion-forming response within "open" chromatin. DEB appears to have little-to-no effect upon regions of "closed" chromatin.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diepoxybutane (DEB), a known industrial carcinogen, reacts with DNA primarily at the N7 position of deoxyguanosine residues and creates interstrand cross-links at the sequence 5'-GNC. Since N7-N7 cross-links cause DNA to fragment upon heating, quantative polymerase chain reaction (QPCR) is being used in this experiment to measure the amount of DEB damage (lesion frequency) with three different targets-mitochondrial (unpackaged), open chromatin region, and closed chromatin region. Initial measurements of DEB damage within these three targets were not consistent because the template DNA was not the limiting reagent in the PCR. Follow-up PCR trials using a limiting amount of DNA are still in progress although initial experimentation looks promising. Sequencing of these three targets to confirm the primer targets has only been successfully performed for the closed chromatin target and does not match the sequence from NIH used to design that primer pair. Further sequencing trials need to be conducted on all three targets to assure that a mitochondrial, open chromatin, and closed chromatin region are actually being amplified in this experimental series.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To identify genes involved in the central regulation of energy balance, we compared hypothalamic mRNA from lean and obese Psammomys obesus, a polygenic model of obesity, using differential display PCR. One mRNA transcript was observed to be elevated in obese, and obese diabetic, P. obesus compared with lean animals and was subsequently found to be increased 4-fold in the hypothalamus of lethal yellow agouti (Ay/a) mice, a murine model of obesity and diabetes. Intracerebroventricular infusion of antisense oligonucleotide targeted to this transcript selectively suppressed its hypothalamic mRNA levels and resulted in loss of body weight in both P. obesus and Sprague Dawley rats. Reductions in body weight were mediated by profoundly reduced food intake without a concomitant reduction in metabolic rate. Yeast two-hybrid screening, and confirmation in mammalian cells by bioluminescence resonance energy transfer analysis, demonstrated that the protein it encodes interacts with endophilins, mediators of synaptic vesicle recycling and receptor endocytosis in the brain. We therefore named this transcript Src homology 3-domain growth factor receptor-bound 2-like (endophilin) interacting protein 1 (SGIP1). SGIP1 encodes a large proline-rich protein that is expressed predominantly in the brain and is highly conserved between species. Together these data suggest that SGIP1 is an important and novel member of the group of neuronal molecules required for the regulation of energy homeostasis.