874 resultados para Cryptographic keys


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Coral reefs are among the most productive ecosystems in the world. Yet, with their recent declines due to disease, climate change, and overfishing, restoration of these habitats is one of the main concerns for ecologists, resource managers, and government organizations. Coral reef restoration aims to promote key ecosystem processes to shift these habitats to their historical state of high coral cover, but few studies have focused on effective ways to promote resilience. In addition, little is known about the impact of restoration on the fish communities. The aim of this study is to understand how the community of herbivorous fishes is affected by the density of coral outplants inside a special protection area located in the Florida Keys National Marine Sanctuary. Grazing rates, number of visits and time spent foraging were compared using video footage of sites previously devoid of corals, and six months after coral restorations had occurred. Coral transplantations did not appear to attract herbivores nor increase grazing rates of fishes. Instead Sparisoma and Acanthurus fishes appear to respond to changes in the environment by modifying their grazing behavior. However, there was an observed increase in visits by Acanthurus species after transplantation for all the sites sampled within the reef. These fishes seemed to prefer low coral cover sites for grazing. This study highlights the importance of examining coral restorations impacts at the community level. Understanding how restoration influences herbivores and other guilds of reef fishes will allow individuals to not only determine if these habitats are returning to their “original” state, but provide more information on the ways these systems cope with changes in the environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The decline of the world's fisheries and the inability of traditional management frameworks to maintain them, has led managers to adopt alternative management frameworks. The use of dedicated access privileges have often been shown to have varying popularity among factions within the commercial fishing industry and managers. Here, we examine commercial fishers' preference for alternative management frameworks in the context of a unique multispecies fisheries of the Florida Keys. By surveying commercial fishers, we find that that the size of operation plays no role in affecting fisher perception regarding dedicated access privileges. Furthermore, fishers who are organized are less likely to support dedicated access privilege frameworks. Overall, we do not find enough support in the fishing industry for the implementation of dedicated access privileges in the Florida Keys. These findings can provide inputs in developing effective management plans in the region.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The coastal zone of the Florida Keys features the only living coral reef in the continental United States and as such represents a unique regional environmental resource. Anthropogenic pressures combined with climate disturbances such as hurricanes can affect the biogeochemistry of the region and threaten the health of this unique ecosystem. As such, water quality monitoring has historically been implemented in the Florida Keys, and six spatially distinct zones have been identified. In these studies however, dissolved organic matter (DOM) has only been studied as a quantitative parameter, and DOM composition can be a valuable biogeochemical parameter in assessing environmental change in coastal regions. Here we report the first data of its kind on the application of optical properties of DOM, in particular excitation emission matrix fluorescence with parallel factor analysis (EEM-PARAFAC), throughout these six Florida Keys regions in an attempt to assess spatial differences in DOM sources. Our data suggests that while DOM in the Florida Keys can be influenced by distant terrestrial environments such as the Everglades, spatial differences in DOM distribution were also controlled in part by local surface runoff/fringe mangroves, contributions from seasgrass communities, as well as the reefs and waters from the Florida Current. Application of principal component analysis (PCA) of the relative abundance of EEM-PARAFAC components allowed for a clear distinction between the sources of DOM (allochthonous vs. autochthonous), between different autochthonous sources and/or the diagenetic status of DOM, and further clarified contribution of terrestrial DOM in zones where levels of DOM were low in abundance. The combination between EEM-PARAFAC and PCA proved to be ideally suited to discern DOM composition and source differences in coastal zones with complex hydrology and multiple DOM sources.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The pine rocklands of South Florida are characterized by an herbaceous flora with many narrowly endemic taxa, a diverse shrub layer containing several palms and numerous tropical hardwoods, and an overstory of south Florida slash pine (Pinus elliottii var. densa). Fire has been considered as an important environmental factor for these ecosystems, since in the absence of fire these pine forests are replaced by dense hardwood communities, resulting in loss of the characteristic pineland herb flora. Hence, in the Florida Keys pine forests, prescribed fire has been used since the creation of the National Key Deer Refuge. However, such prescribed burns were conducted in the Refuge mainly for fuel reduction, without much consideration of ecological factors. The USGS and Florida International University conducted a research study for four years, from 1998 to 2001, the objective of which was to document the response of pine rockland vegetation to a range of fire management options and to provide Fish and Wildlife Service and other land managers with information useful in deciding when and where to burn to perpetuate these unique pine forests. This study is described in detail in Snyder et al. (2005).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predators exert strong direct and indirect effects on ecological communities by intimidating their prey. Non-consumptive effects (NCEs) of predators are important features of many ecosystems and have changed the way we understand predator-prey interactions, but are not well understood in some systems. For my dissertation research I combined a variety of approaches to examine the effect of predation risk on herbivore foraging and reproductive behaviors in a coral reef ecosystem. In the first part of my dissertation, I investigated how diet and territoriality of herbivorous fish varied across multiple reefs with different levels of predator biomass in the Florida Keys National Marine Sanctuary. I show that both predator and damselfish abundance impacted diet diversity within populations for two herbivores in different ways. Additionally, reef protection and the associated recovery of large predators appeared to shape the trade-off reef herbivores made between territory size and quality. In the second part of my dissertation, I investigated context-dependent causal linkages between predation risk, herbivore foraging behavior and resource consumption in multiple field experiments. I found that reef complexity, predator hunting mode, light availability and prey hunger influenced prey perception of threat and their willingness to feed. This research argues for more emphasis on the role of predation risk in affecting individual herbivore foraging behavior in order to understand the implications of human-mediated predator removal and recovery in coral reef ecosystems.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Southeast Florida’s continual urban expansion will potentially increase anthropogenic pollution in adjacent coastal marine systems. Furthermore, increased nutrient loads could have detrimental effects on the already threatened Florida Reef Tract. The present study uses a stable isotopic approach to determine the sources and the impact of nutrients on the Florida Reef Tract. δ13C and δ15N analysis of macroalgae, sponges, and sediment were analyzed in order to determine nutrient inputs in this region. While δ13C data did not display any significant trends spatially, δ15N values of the majority of biota exhibited a strong East to West gradient with more enriched values close to shore. Relative enrichment in δ15N values were measured for sediments sampled along the Florida Reef Tract in comparison to a pristine Marquesas Keys sediment core. The δ15N data also implies that shoreline anthropogenic nutrients have more nutrient loading implications on reefs than major point sources.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are authentication models which use passwords, keys, personal identifiers (cards, tags etc) to authenticate a particular user in the authentication/identification process. However, there are other systems that can use biometric data, such as signature, fingerprint, voice, etc., to authenticate an individual in a system. In another hand, the storage of biometric can bring some risks such as consistency and protection problems for these data. According to this problem, it is necessary to protect these biometric databases to ensure the integrity and reliability of the system. In this case, there are models for security/authentication biometric identification, for example, models and Fuzzy Vault and Fuzzy Commitment systems. Currently, these models are mostly used in the cases for protection of biometric data, but they have fragile elements in the protection process. Therefore, increasing the level of security of these methods through changes in the structure, or even by inserting new layers of protection is one of the goals of this thesis. In other words, this work proposes the simultaneous use of encryption (Encryption Algorithm Papilio) with protection models templates (Fuzzy Vault and Fuzzy Commitment) in identification systems based on biometric. The objective of this work is to improve two aspects in Biometric systems: safety and accuracy. Furthermore, it is necessary to maintain a reasonable level of efficiency of this data through the use of more elaborate classification structures, known as committees. Therefore, we intend to propose a model of a safer biometric identification systems for identification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increase in the efficiency of photo-voltaic systems has been the object of various studies the past few years. One possible way to increase the power extracted by a photovoltaic panel is the solar tracking, performing its movement in order to follow the sun’s path. One way to activate the tracking system is using an electric induction motor, which should have sufficient torque and low speed, ensuring tracking accuracy. With the use of voltage source inverters and logic devices that generate the appropriate switching is possible to obtain the torque and speed required for the system to operate. This paper proposes the implementation of a angular position sensor and a driver to be applied in solar tracker built at a Power Electronics and Renewable Energies Laboratory, located in UFRN. The speed variation of the motor is performed via a voltage source inverter whose PWM command to actuate their keys will be implemented in an FPGA (Field Programmable Gate Array) device and a TM4C microcontroller. A platform test with an AC induction machine of 1.5 CV was assembled for the comparative testing. The angular position sensor of the panel is implemented in a ATMega328 microcontroller coupled to an accelerometer, commanded by an Arduino prototyping board. The solar position is also calculated by the microcontroller from the geographic coordinates of the site where it was placed, and the local time and date obtained from an RTC (Real-Time Clock) device. A prototype of a solar tracker polar axis moved by a DC motor was assembled to certify the operation of the sensor and to check the tracking efficiency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptography is the main form to obtain security in any network. Even in networks with great energy consumption restrictions, processing and memory limitations, as the Wireless Sensors Networks (WSN), this is no different. Aiming to improve the cryptography performance, security and the lifetime of these networks, we propose a new cryptographic algorithm developed through the Genetic Programming (GP) techniques. For the development of the cryptographic algorithm’s fitness criteria, established by the genetic GP, nine new cryptographic algorithms were tested: AES, Blowfish, DES, RC6, Skipjack, Twofish, T-DES, XTEA and XXTEA. Starting from these tests, fitness functions was build taking into account the execution time, occupied memory space, maximum deviation, irregular deviation and correlation coefficient. After obtaining the genetic GP, the CRYSEED and CRYSEED2 was created, algorithms for the 8-bits devices, optimized for WSNs, i.e., with low complexity, few memory consumption and good security for sensing and instrumentation applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptography is the main form to obtain security in any network. Even in networks with great energy consumption restrictions, processing and memory limitations, as the Wireless Sensors Networks (WSN), this is no different. Aiming to improve the cryptography performance, security and the lifetime of these networks, we propose a new cryptographic algorithm developed through the Genetic Programming (GP) techniques. For the development of the cryptographic algorithm’s fitness criteria, established by the genetic GP, nine new cryptographic algorithms were tested: AES, Blowfish, DES, RC6, Skipjack, Twofish, T-DES, XTEA and XXTEA. Starting from these tests, fitness functions was build taking into account the execution time, occupied memory space, maximum deviation, irregular deviation and correlation coefficient. After obtaining the genetic GP, the CRYSEED and CRYSEED2 was created, algorithms for the 8-bits devices, optimized for WSNs, i.e., with low complexity, few memory consumption and good security for sensing and instrumentation applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Combinatorial designs are used for designing key predistribution schemes that are applied to wireless sensor networks in communications. This helps in building a secure channel. Private-key cryptography helps to determine a common key between a pair of nodes in sensor networks. Wireless sensor networks using key predistribution schemes have many useful applications in military and civil operations. When designs are efficiently implemented on sensor networks, blocks with unique keys will be the result. One such implementation is a transversal design which follows the principle of simple key establishment. Analysis of designs and modeling the key schemes are the subjects of this project.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Collaborative sharing of information is becoming much more needed technique to achieve complex goals in today's fast-paced tech-dominant world. Personal Health Record (PHR) system has become a popular research area for sharing patients informa- tion very quickly among health professionals. PHR systems store and process sensitive information, which should have proper security mechanisms to protect patients' private data. Thus, access control mechanisms of the PHR should be well-defined. Secondly, PHRs should be stored in encrypted form. Cryptographic schemes offering a more suitable solution for enforcing access policies based on user attributes are needed for this purpose. Attribute-based encryption can resolve these problems, we propose a patient-centric framework that protects PHRs against untrusted service providers and malicious users. In this framework, we have used Ciphertext Policy Attribute Based Encryption scheme as an efficient cryptographic technique, enhancing security and privacy of the system, as well as enabling access revocation. Patients can encrypt their PHRs and store them on untrusted storage servers. They also maintain full control over access to their PHR data by assigning attribute-based access control to selected data users, and revoking unauthorized users instantly. In order to evaluate our system, we implemented CP-ABE library and web services as part of our framework. We also developed an android application based on the framework that allows users to register into the system, encrypt their PHR data and upload to the server, and at the same time authorized users can download PHR data and decrypt it. Finally, we present experimental results and performance analysis. It shows that the deployment of the proposed system would be practical and can be applied into practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Human ability to impact Planet Earth appears to know no bounds. Adherence to polices of managed resource extraction combined with unbridled consumption, have fostered a disposable culture contributing to mass production of garbage. Eco-taxation may provide the economic tools required to reduce the amount of waste generated. Keys to eco-tax success are vision, education, and flexibility. Success must be measured in societal gains, not simply in monetary terms. Public opinion is initially opposed to consumer charges. Education and viable personal options are crucial to overcome resistance. With one coffee shop dispensing over 800,000 disposable cups annually, an eco-tax is an attractive option to simultaneously raise revenue to waste management programs and reduce one sector of waste production.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of access technologies for communication, based on scanning methods, enables new communication opportunities for individuals with severe motor dysfunction. One of the most commom examples of this type of technology is the single switch scanning. Single switch scanning keyboards are often used as augmentative and alternative communication devices for inidividuals with severe mobility restrictions and with compromised speech and writing. They consist of a matrix of keys and simulate the operation of a physical keyboard to write messages. One of the limitations of these systems is their low performance. Low communication rates and considerable errors ocurrence are some of the few problems that users of these devices suffers during daily use. The development and evaluation of new strategies in augmentative and alternative communication are essential to improve the communication opportunities of user who make use of such technology. Thus, this work explores different strategies to increase communication rate and reduce user’s mistakes. Computational and practical analysis were performed for the evaluation of proposed strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this introduction to the collection, we explain its focus on non-Western small states. While the terms ‘non-Western’ and ‘small states’ are problematic – we discuss these problems here – the smallness and non-Westerness of the states studied by the contributing authors set them apart in a way that has attracted little academic attention so far. They allow them to operate with fewer normative and practical constraints than their bigger, Western counterparts; offer them a wide range of (often historically forged) political ties; and force them to draw on a diversity of approaches and strategic thinking, and a creativity, that they are too rarely credited for. Non-Western small states, rather than being mere survivors constrained to the world’s periphery, are better understood as activist states intent on existing. The collection offers a range of analytical keys to make sense of these states and their role in the international scene.