874 resultados para Cryptographic keys


Relevância:

10.00% 10.00%

Publicador:

Resumo:

So, when it came to deciding upon an area of research, how I used my own voice became the main focus in a broader investigation of voice within sonic environments. I wanted to explore, for my own practice, what effect the inclusion of the human voice may have within a composition. For the purposes of my research, sonic environment does not refer to specific types of environment (i.e., rural, urban etc.); rather, it refers to the use of field recordings of sounds from my own everyday life, for example house keys, the rain, a squeaky door.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The collections of the Oceanographic Institute of Vietnam include several species of hermit crabs of the genus Calcinus Dana. Three of keys were studied by Fize and Serene (1955): C. herbsti Man, C. gaimardi H. Milne Edwards and C. latens Randall . The seventy specimens belong to four species. The first one, C. minutus Buytendijk, was described by Indonesia in 1937; the second one, represented by a single small specimen is related to C. spicatus Forest. Finally, two other are Calcinus vachonis sp. November and Colcinus pulcher sp. nov.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mestrado em Gestão e Empreendedorismo

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Character states used in distinguishing taxa within the Thripidae subfamily Dendrothripinae are discussed, and a key presented to the 11 genera recognized worldwide. Comments on each of these genera are provided, together with keys to the species from Australia of Dendrothrips, Ensiferothrips and Pseudodendrothrips. From Australia are described, four new species of Dendrothrips, one of Pseudodendrothrips, and a remarkable new species of Ensiferothrips that has required a re-diagnosis of that genus. Another new species of Ensiferothrips is described from Sulawesi, thus greatly extending the known geographical range of this previously Australian genus. © 2016 Magnolia Press.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The communication in vehicular ad hoc networks (VANETs) is commonly divided in two scenarios, namely vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Aiming at establishing secure communication against eavesdroppers, recent works have proposed the exchange of secret keys based on the variation in received signal strength (RSS). However, the performance of such scheme depends on the channel variation rate, being more appropriate for scenarios where the channel varies rapidly, as is usually the case with V2V communication. In the communication V2I, the channel commonly undergoes slow fading. In this work we propose the use of multiple antennas in order to artificially generate a fast fading channel so that the extraction of secret keys out of the RSS becomes feasible in a V2I scenario. Numerical analysis shows that the proposed model can outperform, in terms of secret bit extraction rate, a frequency hopping-based method proposed in the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this dissertation is to produce a new Harmonie arrangement of Mozart’s Die Zauberflöte suitable for modern performance, bringing Joseph Heidenreich’s 1782 arrangement—one of the great treasures of the wind repertoire—to life for future performers and audiences. I took advantage of the capabilities of modern wind instruments and performance techniques, and employed other instruments normally found in the modern wind ensemble to create a work in the tradition of Heidenreich’s that restored as much of Mozart’s original thinking as possible. I expanded the Harmonie band to include flute and string bass. Other instruments provide special effects, a traditional role for wind instruments in the Classical opera orchestra. This arrangement is conceived to be performed with the original vocal soloists, making it a viable option for concert performance or for smaller staged productions. It is also intended to allow the wind players to be onstage with the singers, becoming part of the dramatic action while simultaneously serving as the “opera orchestra.” This allows creative staging possibilities, and offers the wind players an opportunity to explore new aspects of performing. My arrangement also restores Mozart’s music to its original keys and retains much of his original wind scoring. This arrangement expands the possibilities for collaboration between opera studios, voice departments or community opera companies and wind ensembles. A suite for winds without voices (currently in production) will allow conductors to program this major work from the Classical era without dedicating a concert program to the complete opera. Excerpted arias and duets from this arrangement provide vocalists the option of using chamber wind accompaniment on recitals. The door is now open to arrangements of other operas by composers such as Mozart, Rossini and Weber, adding new repertoire for chamber winds and bringing great music to life in a new way.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the primary studying, known leeches have included into free living and parasitic which the parasitic group, besides of direct impacts like: growth detraction, anemia, making wound in the connecting part with the skin, with making plat for secondary bacterial and molding infections in the toll place, is able to cause to transfer blood flagellate and virus to the fish too. Therefore, by accusing information related to fauna leeches of each area a risk factor from the viewpoint of the possibility of being or accusing transferred diseases by these leeches, one can predict and forehand about them. Freshwater leeches of Iran to present accurate recognition (morphological, molecular) have not been, and there are some limited reports from different parts of the country about them. One of the areas that its leeches have not been identified yet is Kurdistan, By having five latrines and big permanent rivers and 32000 springs and a lot of deep and semi-deep wells and this province is a convenient bed for growing aquatics in the country. Therefore, identifying risk factors for development of aquaculture on water resources is one important factor to access achieving development goals. For recognizing leeches of this province, some samples from 10 stands were token. Samples from under stones, sticking to the fish, turtles, plants and solid substances in the water were separated and after recording their physical characteristics, calming with 10% ethylic alcohol with 10% formalin become fixed and after painting with Carmen acetic acid by standard keys for 7 species of Helobdella stagnalis, Placobdella costata, Hemiclepsis marginata, Erpobdella octoculata, Hirudo medicinalis, Dina lineate lineata have been identified and described. Which Helobdella stagnalis has the highest distribution in the province and the minimum one is Hirudo medicinalis. However, that the data obtained in leeches in Kurdistan is a relatively complete collection in this research, recognizing fauna of these areas needs more studying. The Placobdella costata and Hemiclepsis marginata sticking to the fish were separated among identified species which showed that these are parasites for the fish. The sticking area of those leeches to the skin was accompanied with scales cast, damage to mucous membranes beneath the parasite and bleeding Was associated with Histopathology studying effect includes observing break and disconnection in the leech connecting place to the epithelial layer of epidermis in the skin, destroyed nucleus in skin Epithelial cells with observing necrosis in ulcerative place become of the leech and the sub acute inflammated penetration until acute necrosis with opening in Dermis layer is observable. Kidney of this fish have changes such as: proliferation, like proliferative kidney disease with increasing proliferative glomerular cells and increasing in membranous cells in Capillary corpuscle, observing necrotic cells in haematopoietic tissue of kidney along with increasing in infiltration of leukocyte's cells generally mono nucluars such as lymphocytes and less poly morpho nucluars such as neutrophiles that are symptoms of disorders causing anemia become of nourishing and sucking blood by the leech and creating a chronic kidney infection that originally root is in another place like the skin. Also Hemorrhagic anemia causes losing RBC's is because of using the host blood by the leech. (In this situation, one can see immature RBC red cells in Peripheral blood. To identify potential carriers of the leech to the viruses, after finding them in recorded stands and putting them in 75% ethanol for viruses cause IPN, VHS, IHN, they were tested by PCR that the conclusion of these experiments approved IPN virus in Hemiclepsis marginata and Hirudo medicinalis. This kind of leeches can act like a mechanical carrier and causing spreading the agent of this disease. It is worth mentioning that studying the pathogenicity of this virus for aquaculture sources, mentioned before needs more research. During the study of infected fish with leeches that was done after preparing bloody slides and staining them, no case blood parasites was observed. During a research about infecting fish experimentally to known leeches it become clear that 5 days after being in aquarium including leeches, samples of sticking Hirudo medicinalis leech to the golden carp with scales cast were observed. Including leeches to the fish started with molting the scales in the sticking area in the fish and fish become too uneasy and by rubbing themselves to the malls and things inside the aquarium, tried to separate them. Finally, after around 30 hours, leeches penetrate the skin, feeding from blood and tissue liquids and cause mortality the fish and then they become separated from them. If the corpse of these fish stayed in the aquarium, the Helobdella stagnalis and Erpobdella octoculata would start feeding them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper provides a new reading of a classical economic relation: the short-run Phillips curve. Our point is that, when dealing with inflation and unemployment, policy-making can be understood as a multicriteria decisionmaking problem. Hence, we use so-called multiobjective programming in connection with a computable general equilibrium (CGE) model to determine the combinations of policy instruments that provide efficient combinations of inflation and unemployment. This approach results in an alternative version of the Phillips curve labelled as efficient Phillips curve. Our aim is to present an application of CGE models to a new area of research that can be especially useful when addressing policy exercises with real data. We apply our methodological proposal within a particular regional economy, Andalusia, in the south of Spain. This tool can give some keys for policy advice and policy implementation in the fight against unemployment and inflation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This document presents GEmSysC, an unified cryptographic API for embedded systems. Software layers implementing this API can be built over existing libraries, allowing embedded software to access cryptographic functions in a consistent way that does not depend on the underlying library. The API complies to good practices for API design and good practices for embedded software development and took its inspiration from other cryptographic libraries and standards. The main inspiration for creating GEmSysC was the CMSIS-RTOS standard, which defines an unified API for embedded software in an implementation-independent way, but targets operating systems instead of cryptographic functions. GEmSysC is made of a generic core and attachable modules, one for each cryptographic algorithm. This document contains the specification of the core of GEmSysC and three of its modules: AES, RSA and SHA-256. GEmSysC was built targeting embedded systems, but this does not restrict its use only in such systems – after all, embedded systems are just very limited computing devices. As a proof of concept, two implementations of GEmSysC were made. One of them was built over wolfSSL, which is an open source library for embedded systems. The other was built over OpenSSL, which is open source and a de facto standard. Unlike wolfSSL, OpenSSL does not specifically target embedded systems. The implementation built over wolfSSL was evaluated in a Cortex- M3 processor with no operating system while the implementation built over OpenSSL was evaluated on a personal computer with Windows 10 operating system. This document displays test results showing GEmSysC to be simpler than other libraries in some aspects. These results have shown that both implementations incur in little overhead in computation time compared to the cryptographic libraries themselves. The overhead of the implementation has been measured for each cryptographic algorithm and is between around 0% and 0.17% for the implementation over wolfSSL and between 0.03% and 1.40% for the one over OpenSSL. This document also presents the memory costs for each implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of the thesis is to examine the relationship between tourism and the local culture expressed in culinary experiences offered in the traditional, nostalgic-themed markets that have arisen as popular attractions in the 21 st century. Central to the thesis is an examination of how the traditional cultural values are articulated in the production, promotion and consumption of culinary experiences in order to understand the value of culture when embedded in the process of commodification, as well as to understand influential socio-cultural factors. The thesis investigates the potential of traditional markets to promote food as the main attraction in the market. Field studies were conducted from December 2012–March 2014 in eight traditional markets in the central region of Thailand. Based on the ethnographic approach in studying the narratives in the markets, a variety of methods were implemented in the process of data collection. Besides observational analysis of the venue, semi-structured interviews and the self-administered questionnaires were used to collect data from actors who engage in food experiences, including management team members, food traders and visitors. Data was also collected from interviews with officers working for Tourism Authority of Thailand (TAT).  Keys findings of the thesis reveal that the cultural expressions of food experience in each market is an outcome of both the interactions of worldviews expressed by actors involved in the traditional market and the socio-cultural condition of Thailand. The relationships between stakeholders’ attitudes towards food experiences and the commercial potentials and limitations of food were analysed. The analysis of the cultural value of culinary experiences demonstrates that the existing academic discussions of the authenticity of tourism are insightful in explaining the character of food experiences offered in this tourism scenario. Most importantly, authenticity in tourism experiences, being a desirable element in culinary experiences, is a reflection of the how the pre-modern aspect of Thai society is embraced in a contemporary context. In addition, the commodification of culinary culture generates multidimensional consequences on the value of traditional culture and local lives. Moreover, the performance of culinary experiences can be viewed from the perspective of how Thai society interacts with globalization. The thesis also points out that it is possible to compare the situation of the traditional markets with the marketing positioning of food in Thai tourism marketing policy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hydrographic and geosciences surveys, using acoustic devices, need to use accurate water sound velocity profiles. Because the acoustic path depends on the sound velocity profile (SVP), the use of the most accurate SVP is one of the keys to conducting effective surveys (with multibeams, for instance). To date, the existing software available does not answer to both the needs of efficiency and simplicity (sometimes not so easy to operate, sometimes not so accurate). DORIS provides a handy freeware to post-process SVP for the hydrographic communities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

International audience

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure Multi-party Computation (MPC) enables a set of parties to collaboratively compute, using cryptographic protocols, a function over their private data in a way that the participants do not see each other's data, they only see the final output. Typical MPC examples include statistical computations over joint private data, private set intersection, and auctions. While these applications are examples of monolithic MPC, richer MPC applications move between "normal" (i.e., per-party local) and "secure" (i.e., joint, multi-party secure) modes repeatedly, resulting overall in mixed-mode computations. For example, we might use MPC to implement the role of the dealer in a game of mental poker -- the game will be divided into rounds of local decision-making (e.g. bidding) and joint interaction (e.g. dealing). Mixed-mode computations are also used to improve performance over monolithic secure computations. Starting with the Fairplay project, several MPC frameworks have been proposed in the last decade to help programmers write MPC applications in a high-level language, while the toolchain manages the low-level details. However, these frameworks are either not expressive enough to allow writing mixed-mode applications or lack formal specification, and reasoning capabilities, thereby diminishing the parties' trust in such tools, and the programs written using them. Furthermore, none of the frameworks provides a verified toolchain to run the MPC programs, leaving the potential of security holes that can compromise the privacy of parties' data. This dissertation presents language-based techniques to make MPC more practical and trustworthy. First, it presents the design and implementation of a new MPC Domain Specific Language, called Wysteria, for writing rich mixed-mode MPC applications. Wysteria provides several benefits over previous languages, including a conceptual single thread of control, generic support for more than two parties, high-level abstractions for secret shares, and a fully formalized type system and operational semantics. Using Wysteria, we have implemented several MPC applications, including, for the first time, a card dealing application. The dissertation next presents Wys*, an embedding of Wysteria in F*, a full-featured verification oriented programming language. Wys* improves on Wysteria along three lines: (a) It enables programmers to formally verify the correctness and security properties of their programs. As far as we know, Wys* is the first language to provide verification capabilities for MPC programs. (b) It provides a partially verified toolchain to run MPC programs, and finally (c) It enables the MPC programs to use, with no extra effort, standard language constructs from the host language F*, thereby making it more usable and scalable. Finally, the dissertation develops static analyses that help optimize monolithic MPC programs into mixed-mode MPC programs, while providing similar privacy guarantees as the monolithic versions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

L’imagerie musicale involontaire (IMIN) est un phénomène mental extrêmement commun. Il peut être défini en tant que type d’imagerie mentale musicale qui devient consciente sans effort ou intentionnalité et qui n’est pas pathologique. La forme la plus connue d’IMIN est le « ver d’oreille », qui se présente généralement comme un court extrait musical tournant en boucle en tête et dont on se débarrasse difficilement. L’objectif principal de la présente thèse est d’investiguer les mécanismes cognitifs sous-tendant le phénomène puisque, malgré l’intérêt répandu dans les médias populaires, son étude expérimentale est récente et un modèle intégré n’a pas encore été proposé. Dans la première étude, l’induction expérimentale a été tentée et les caractéristiques des images mentales d’épisodes d’IMIN ont été investiguées. Dans le laboratoire, des chansons accrocheuses (versus des proverbes) ont été présentées répétitivement aux participants qui devaient ensuite les chanter le plus fidèlement possible. Ils ont par après quitté le laboratoire, une enregistreuse numérique en mains, avec la consigne d’enregistrer une reproduction vocale la plus fidèle possible de ce qu’ils avaient en tête lors de tous leurs épisodes d’IMIN sur une période de quatre jours, ainsi que de décrire leur timbre. L’expérience a été répétée deux semaines plus tard. Douze des dix-huit participants du groupe expérimental ont rapporté des pièces induites comme épisodes d’IMIN, ce qui confirme l’efficacité de la procédure d’induction. La tonalité et le tempo des productions ont ensuite été analysés et comparés à ceux des pièces originales. Similairement pour les épisodes d’IMIN induits et les autres, les tempi produits et, dans une moindre mesure pour les non-musiciens, les tonalités étaient proches des originaux. Le timbre décrit était généralement une version simplifiée de l’original (un instrument et/ou une voix). Trois études se sont ensuite intéressées au lien entre le potentiel d’IMIN et la mémorabilité. Dans une étude préliminaire, 150 chansons du palmarès francophone radiophonique ont été évaluées en ligne par 164 participants, sur leur niveau de familiarité, d’appréciation et de potentiel d’IMIN. Les pièces ont ensuite été divisées en groupes de stimuli à faible et à fort potentiel d’IMIN, qui ont été utilisés dans une tâche typique de rappel libre/reconnaissance, premièrement avec des francophones (pour qui les pièces étaient familières) et ensuite avec des non-francophones (pour qui les pièces étaient non-familières). Globalement, les pièces à fort potentiel d’IMIN étaient mieux rappelées et reconnues que les pièces à faible potentiel. Une dernière étude a investigué l’impact de la variabilité inter-stimulus du timbre sur les résultats précédents, en demandant à une chanteuse d’enregistrer les lignes vocales des pièces et en répétant l’expérience avec ces nouveaux stimuli. La différence précédemment observée entre les stimuli à fort et à faible potentiel d’IMIN dans la tâche de reconnaissance a ainsi disparu, ce qui suggère que le timbre est une caractéristique importante pour le potentiel d’IMIN. En guise de conclusion, nous suggérons que les phénomènes mentaux et les mécanismes cognitifs jouant un rôle dans les autres types de souvenirs involontaires peuvent aussi s’appliquer à l’IMIN. Dépendamment du contexte, la récupération mnésique des pièces peut résulter de la répétition en mémoire à court terme, de l’amorçage à court et long terme ou de l’indiçage provenant de stimuli dans l’environnement ou les pensées. Une des plus importantes différences observables entre l’IMIN et les autres souvenirs involontaires est la répétition. Nous proposons que la nature même de la musique, qui est définie par la répétition à un niveau micro- et macro-structurel en est responsable.