932 resultados para Domain exchanges
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
First-order temporal logic is a concise and powerful notation, with many potential applications in both Computer Science and Artificial Intelligence. While the full logic is highly complex, recent work on monodic first-order temporal logics has identified important enumerable and even decidable fragments. In this paper, we develop a clausal resolution method for the monodic fragment of first-order temporal logic over expanding domains. We first define a normal form for monodic formulae and then introduce novel resolution calculi that can be applied to formulae in this normal form. We state correctness and completeness results for the method. We illustrate the method on a comprehensive example. The method is based on classical first-order resolution and can, thus, be efficiently implemented.
Resumo:
In the domain of aerospace aftermarkets, which often has long supply chains that feed into the maintenance of aircraft, contracts are used to establish agreements between aircraft operators and maintenance suppliers. However, violations at the bottom of the supply chain (part suppliers) can easily cascade to the top (aircraft operators), making it difficult to determine the source of the violation, and seek to address it. In this context, we have developed a global monitoring architecture that ensures the detection of norm violations and generates explanations for the origin of violations. In this paper, we describe the implementation and deployment of a global monitor in the aerospace domain of [8] and show how it generates explanations for violations within the maintenance supply chain. We show how these explanations can be used not only to detect violations at runtime, but also to uncover potential problems in contracts before their deployment, thus improving them.
Resumo:
In industrial polymer and synthetic rubber production facilities, workers are exposed to 1,3-butadiene. This compound is converted in vivo to 1,2,3,4-diepoxybutane (DEB) and has been linked to increased incidences of cancer in these individuals. Carcinogenesis has been attributed to formation of DEB induced DNA interstrand cross-links. Previous studies have demonstrated that DEB cross-links deoxyguanosine residues within 5'-GNC sequences in synthetic DNA, in restriction fragments, and in defined sequence nucleosomes. The current study utilized the polymerase chain reaction (PCR) to examine DEB damage frequencies within nuclear genes, found within "open" regions of chromatin, as compared to regions of unexpressed sequence that reside in tightly packed, "closed" chromatin, to more closely model DEB reactivity in vivo. These initial studies have been performed in chicken liver homogenates. Preliminarily, we have found a dose-dependent DEB lesion-forming response within "open" chromatin. DEB appears to have little-to-no effect upon regions of "closed" chromatin.
Resumo:
Diepoxybutane (DEB), a known industrial carcinogen, reacts with DNA primarily at the N7 position of deoxyguanosine residues and creates interstrand cross-links at the sequence 5'-GNC. Since N7-N7 cross-links cause DNA to fragment upon heating, quantative polymerase chain reaction (QPCR) is being used in this experiment to measure the amount of DEB damage (lesion frequency) with three different targets-mitochondrial (unpackaged), open chromatin region, and closed chromatin region. Initial measurements of DEB damage within these three targets were not consistent because the template DNA was not the limiting reagent in the PCR. Follow-up PCR trials using a limiting amount of DNA are still in progress although initial experimentation looks promising. Sequencing of these three targets to confirm the primer targets has only been successfully performed for the closed chromatin target and does not match the sequence from NIH used to design that primer pair. Further sequencing trials need to be conducted on all three targets to assure that a mitochondrial, open chromatin, and closed chromatin region are actually being amplified in this experimental series.
Resumo:
Web service-based application is an architectural style, where a collection of Web services communicate to each other to execute processes. With the popularity increase of Web service-based applications and since messages exchanged inside of this applications can be complex, we need tools to simplify the understanding of interrelationship among Web services. This work present a description of a graphical representation of Web service-based applications and the mechanisms inserted among Web service requesters and providers to catch information to represent an application. The major contribution of this paper is to discus and use HTTP and SOAP information to show a graphical representation similar to a UML sequence diagram of Web service-based applications.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
In this work, a boundary element formulation to analyse plates reinforced by rectangular beams, with columns defined in the domain is proposed. The model is based on Kirchhoff hypothesis and the beams are not required to be displayed over the plate surface, therefore eccentricity effects are taken into account. The presented boundary element method formulation is derived by applying the reciprocity theorem to zoned plates, where beams are treated as thin sub-regions with larger rigidities. The integral representations derived for this complex structural element consider the bending and stretching effects of both structural elements working together. The standard equilibrium and compatibility conditions along interface are naturally imposed, being the bending tractions eliminated along interfaces. The in-plane tractions and the bending and in-plane displacements are approximated along the beam width, reducing the number of degrees of freedom. The columns are introduced into the formulation by considering domain points where tractions can be prescribed. Some examples are then shown to illustrate the accuracy of the formulation, comparing the obtained results with other numerical solutions.
Resumo:
This research aimed to analyze the dynamics established between the activity of the teacher in Distance Education (DE) and professional gender of teaching, in terms of impact of DE in teacher s usual professional activity. Previous studies showed that one of the central discussions concerning DE refers to the role that the teacher is called to perform. The present research, based on theoretical and methodological assumptions issued from Clinic of Activity, analyzed the impact referred above. This central aim was operationally executed along three main stages: 1) survey study for description of socio-professional profile of teachers working in DE in two universities from Natal (RN-Brazil), 2) clinical analysis of professional activity of teachers working in DE, taking into account four simultaneous levels of psychological constitution and development of human activity: personal, interpersonal, transpersonal and impersonal; 3) analytical focus on transpersonal context in order to understand the influence of pedagogical practice in DE on professional gender of teaching. Documental research, audio recorded voice data and a multiple choice Likert scale questionnaire concerning socio-professional information were used as procedural tools. The qualitative-clinical procedural tool of instruction to the double , firstly proposed by Clinic of Activity research group, was used in order to obtain oral productions concerning professional activity. Data issued from stage 1 (n=70, 28 men and 41 women) was submitted to descriptive and inferential statistical analyzes. 65.7% of the sample worked in a public institution, 30% in a private institution, and 4.3% in public and private institutions. 31.4% of the sample of participants was formed by teachers having a master degree, 28.6% were doctors and 26.3% had degrees of specialists. 54.3% of participants acted as remote tutor, and 44.3% were regents teachers. After descriptive multidimensional cluster analysis, two groups emerged (remote tutors and regents teachers), the most important variables in terms of contributions to this distinction being: professional function, level of graduate formation, level of income, activities and forms of entry in DE. Clinical analysis of data produced by two participant-teachers of each group, issued from instruction to the double technique, was performed. This analysis indicated the existence of different models of distance education. A general concern referring to the need of both taking into account information technology and pedagogical attitudes was detected. On the other hand, participant-teachers considered that participation in DE activities could bring relevant contributions to general professional gender of teaching. . Finally, teachers warned against certain formats of organization of teachers professional activity, as found in the domain of DE, since these activities could promote the intensification and individualization of teachers` work activity, and even the worsening of relations, rather than exchanges and shares through collective bargaining. This process could compromise the renew of the professional gender, by losing its historical roots and diminishing activity possibilities of teachers in their labor context