882 resultados para KEYS
Resumo:
Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.
Resumo:
So, when it came to deciding upon an area of research, how I used my own voice became the main focus in a broader investigation of voice within sonic environments. I wanted to explore, for my own practice, what effect the inclusion of the human voice may have within a composition. For the purposes of my research, sonic environment does not refer to specific types of environment (i.e., rural, urban etc.); rather, it refers to the use of field recordings of sounds from my own everyday life, for example house keys, the rain, a squeaky door.
Resumo:
The collections of the Oceanographic Institute of Vietnam include several species of hermit crabs of the genus Calcinus Dana. Three of keys were studied by Fize and Serene (1955): C. herbsti Man, C. gaimardi H. Milne Edwards and C. latens Randall . The seventy specimens belong to four species. The first one, C. minutus Buytendijk, was described by Indonesia in 1937; the second one, represented by a single small specimen is related to C. spicatus Forest. Finally, two other are Calcinus vachonis sp. November and Colcinus pulcher sp. nov.
Resumo:
Mestrado em Gestão e Empreendedorismo
Resumo:
Character states used in distinguishing taxa within the Thripidae subfamily Dendrothripinae are discussed, and a key presented to the 11 genera recognized worldwide. Comments on each of these genera are provided, together with keys to the species from Australia of Dendrothrips, Ensiferothrips and Pseudodendrothrips. From Australia are described, four new species of Dendrothrips, one of Pseudodendrothrips, and a remarkable new species of Ensiferothrips that has required a re-diagnosis of that genus. Another new species of Ensiferothrips is described from Sulawesi, thus greatly extending the known geographical range of this previously Australian genus. © 2016 Magnolia Press.
Resumo:
The communication in vehicular ad hoc networks (VANETs) is commonly divided in two scenarios, namely vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Aiming at establishing secure communication against eavesdroppers, recent works have proposed the exchange of secret keys based on the variation in received signal strength (RSS). However, the performance of such scheme depends on the channel variation rate, being more appropriate for scenarios where the channel varies rapidly, as is usually the case with V2V communication. In the communication V2I, the channel commonly undergoes slow fading. In this work we propose the use of multiple antennas in order to artificially generate a fast fading channel so that the extraction of secret keys out of the RSS becomes feasible in a V2I scenario. Numerical analysis shows that the proposed model can outperform, in terms of secret bit extraction rate, a frequency hopping-based method proposed in the literature.
Resumo:
The purpose of this dissertation is to produce a new Harmonie arrangement of Mozart’s Die Zauberflöte suitable for modern performance, bringing Joseph Heidenreich’s 1782 arrangement—one of the great treasures of the wind repertoire—to life for future performers and audiences. I took advantage of the capabilities of modern wind instruments and performance techniques, and employed other instruments normally found in the modern wind ensemble to create a work in the tradition of Heidenreich’s that restored as much of Mozart’s original thinking as possible. I expanded the Harmonie band to include flute and string bass. Other instruments provide special effects, a traditional role for wind instruments in the Classical opera orchestra. This arrangement is conceived to be performed with the original vocal soloists, making it a viable option for concert performance or for smaller staged productions. It is also intended to allow the wind players to be onstage with the singers, becoming part of the dramatic action while simultaneously serving as the “opera orchestra.” This allows creative staging possibilities, and offers the wind players an opportunity to explore new aspects of performing. My arrangement also restores Mozart’s music to its original keys and retains much of his original wind scoring. This arrangement expands the possibilities for collaboration between opera studios, voice departments or community opera companies and wind ensembles. A suite for winds without voices (currently in production) will allow conductors to program this major work from the Classical era without dedicating a concert program to the complete opera. Excerpted arias and duets from this arrangement provide vocalists the option of using chamber wind accompaniment on recitals. The door is now open to arrangements of other operas by composers such as Mozart, Rossini and Weber, adding new repertoire for chamber winds and bringing great music to life in a new way.
Resumo:
In the primary studying, known leeches have included into free living and parasitic which the parasitic group, besides of direct impacts like: growth detraction, anemia, making wound in the connecting part with the skin, with making plat for secondary bacterial and molding infections in the toll place, is able to cause to transfer blood flagellate and virus to the fish too. Therefore, by accusing information related to fauna leeches of each area a risk factor from the viewpoint of the possibility of being or accusing transferred diseases by these leeches, one can predict and forehand about them. Freshwater leeches of Iran to present accurate recognition (morphological, molecular) have not been, and there are some limited reports from different parts of the country about them. One of the areas that its leeches have not been identified yet is Kurdistan, By having five latrines and big permanent rivers and 32000 springs and a lot of deep and semi-deep wells and this province is a convenient bed for growing aquatics in the country. Therefore, identifying risk factors for development of aquaculture on water resources is one important factor to access achieving development goals. For recognizing leeches of this province, some samples from 10 stands were token. Samples from under stones, sticking to the fish, turtles, plants and solid substances in the water were separated and after recording their physical characteristics, calming with 10% ethylic alcohol with 10% formalin become fixed and after painting with Carmen acetic acid by standard keys for 7 species of Helobdella stagnalis, Placobdella costata, Hemiclepsis marginata, Erpobdella octoculata, Hirudo medicinalis, Dina lineate lineata have been identified and described. Which Helobdella stagnalis has the highest distribution in the province and the minimum one is Hirudo medicinalis. However, that the data obtained in leeches in Kurdistan is a relatively complete collection in this research, recognizing fauna of these areas needs more studying. The Placobdella costata and Hemiclepsis marginata sticking to the fish were separated among identified species which showed that these are parasites for the fish. The sticking area of those leeches to the skin was accompanied with scales cast, damage to mucous membranes beneath the parasite and bleeding Was associated with Histopathology studying effect includes observing break and disconnection in the leech connecting place to the epithelial layer of epidermis in the skin, destroyed nucleus in skin Epithelial cells with observing necrosis in ulcerative place become of the leech and the sub acute inflammated penetration until acute necrosis with opening in Dermis layer is observable. Kidney of this fish have changes such as: proliferation, like proliferative kidney disease with increasing proliferative glomerular cells and increasing in membranous cells in Capillary corpuscle, observing necrotic cells in haematopoietic tissue of kidney along with increasing in infiltration of leukocyte's cells generally mono nucluars such as lymphocytes and less poly morpho nucluars such as neutrophiles that are symptoms of disorders causing anemia become of nourishing and sucking blood by the leech and creating a chronic kidney infection that originally root is in another place like the skin. Also Hemorrhagic anemia causes losing RBC's is because of using the host blood by the leech. (In this situation, one can see immature RBC red cells in Peripheral blood. To identify potential carriers of the leech to the viruses, after finding them in recorded stands and putting them in 75% ethanol for viruses cause IPN, VHS, IHN, they were tested by PCR that the conclusion of these experiments approved IPN virus in Hemiclepsis marginata and Hirudo medicinalis. This kind of leeches can act like a mechanical carrier and causing spreading the agent of this disease. It is worth mentioning that studying the pathogenicity of this virus for aquaculture sources, mentioned before needs more research. During the study of infected fish with leeches that was done after preparing bloody slides and staining them, no case blood parasites was observed. During a research about infecting fish experimentally to known leeches it become clear that 5 days after being in aquarium including leeches, samples of sticking Hirudo medicinalis leech to the golden carp with scales cast were observed. Including leeches to the fish started with molting the scales in the sticking area in the fish and fish become too uneasy and by rubbing themselves to the malls and things inside the aquarium, tried to separate them. Finally, after around 30 hours, leeches penetrate the skin, feeding from blood and tissue liquids and cause mortality the fish and then they become separated from them. If the corpse of these fish stayed in the aquarium, the Helobdella stagnalis and Erpobdella octoculata would start feeding them.
Resumo:
This paper provides a new reading of a classical economic relation: the short-run Phillips curve. Our point is that, when dealing with inflation and unemployment, policy-making can be understood as a multicriteria decisionmaking problem. Hence, we use so-called multiobjective programming in connection with a computable general equilibrium (CGE) model to determine the combinations of policy instruments that provide efficient combinations of inflation and unemployment. This approach results in an alternative version of the Phillips curve labelled as efficient Phillips curve. Our aim is to present an application of CGE models to a new area of research that can be especially useful when addressing policy exercises with real data. We apply our methodological proposal within a particular regional economy, Andalusia, in the south of Spain. This tool can give some keys for policy advice and policy implementation in the fight against unemployment and inflation.
Resumo:
The purpose of the thesis is to examine the relationship between tourism and the local culture expressed in culinary experiences offered in the traditional, nostalgic-themed markets that have arisen as popular attractions in the 21 st century. Central to the thesis is an examination of how the traditional cultural values are articulated in the production, promotion and consumption of culinary experiences in order to understand the value of culture when embedded in the process of commodification, as well as to understand influential socio-cultural factors. The thesis investigates the potential of traditional markets to promote food as the main attraction in the market. Field studies were conducted from December 2012–March 2014 in eight traditional markets in the central region of Thailand. Based on the ethnographic approach in studying the narratives in the markets, a variety of methods were implemented in the process of data collection. Besides observational analysis of the venue, semi-structured interviews and the self-administered questionnaires were used to collect data from actors who engage in food experiences, including management team members, food traders and visitors. Data was also collected from interviews with officers working for Tourism Authority of Thailand (TAT). Keys findings of the thesis reveal that the cultural expressions of food experience in each market is an outcome of both the interactions of worldviews expressed by actors involved in the traditional market and the socio-cultural condition of Thailand. The relationships between stakeholders’ attitudes towards food experiences and the commercial potentials and limitations of food were analysed. The analysis of the cultural value of culinary experiences demonstrates that the existing academic discussions of the authenticity of tourism are insightful in explaining the character of food experiences offered in this tourism scenario. Most importantly, authenticity in tourism experiences, being a desirable element in culinary experiences, is a reflection of the how the pre-modern aspect of Thai society is embraced in a contemporary context. In addition, the commodification of culinary culture generates multidimensional consequences on the value of traditional culture and local lives. Moreover, the performance of culinary experiences can be viewed from the perspective of how Thai society interacts with globalization. The thesis also points out that it is possible to compare the situation of the traditional markets with the marketing positioning of food in Thai tourism marketing policy.
Resumo:
Hydrographic and geosciences surveys, using acoustic devices, need to use accurate water sound velocity profiles. Because the acoustic path depends on the sound velocity profile (SVP), the use of the most accurate SVP is one of the keys to conducting effective surveys (with multibeams, for instance). To date, the existing software available does not answer to both the needs of efficiency and simplicity (sometimes not so easy to operate, sometimes not so accurate). DORIS provides a handy freeware to post-process SVP for the hydrographic communities.
Resumo:
International audience
Resumo:
L’imagerie musicale involontaire (IMIN) est un phénomène mental extrêmement commun. Il peut être défini en tant que type d’imagerie mentale musicale qui devient consciente sans effort ou intentionnalité et qui n’est pas pathologique. La forme la plus connue d’IMIN est le « ver d’oreille », qui se présente généralement comme un court extrait musical tournant en boucle en tête et dont on se débarrasse difficilement. L’objectif principal de la présente thèse est d’investiguer les mécanismes cognitifs sous-tendant le phénomène puisque, malgré l’intérêt répandu dans les médias populaires, son étude expérimentale est récente et un modèle intégré n’a pas encore été proposé. Dans la première étude, l’induction expérimentale a été tentée et les caractéristiques des images mentales d’épisodes d’IMIN ont été investiguées. Dans le laboratoire, des chansons accrocheuses (versus des proverbes) ont été présentées répétitivement aux participants qui devaient ensuite les chanter le plus fidèlement possible. Ils ont par après quitté le laboratoire, une enregistreuse numérique en mains, avec la consigne d’enregistrer une reproduction vocale la plus fidèle possible de ce qu’ils avaient en tête lors de tous leurs épisodes d’IMIN sur une période de quatre jours, ainsi que de décrire leur timbre. L’expérience a été répétée deux semaines plus tard. Douze des dix-huit participants du groupe expérimental ont rapporté des pièces induites comme épisodes d’IMIN, ce qui confirme l’efficacité de la procédure d’induction. La tonalité et le tempo des productions ont ensuite été analysés et comparés à ceux des pièces originales. Similairement pour les épisodes d’IMIN induits et les autres, les tempi produits et, dans une moindre mesure pour les non-musiciens, les tonalités étaient proches des originaux. Le timbre décrit était généralement une version simplifiée de l’original (un instrument et/ou une voix). Trois études se sont ensuite intéressées au lien entre le potentiel d’IMIN et la mémorabilité. Dans une étude préliminaire, 150 chansons du palmarès francophone radiophonique ont été évaluées en ligne par 164 participants, sur leur niveau de familiarité, d’appréciation et de potentiel d’IMIN. Les pièces ont ensuite été divisées en groupes de stimuli à faible et à fort potentiel d’IMIN, qui ont été utilisés dans une tâche typique de rappel libre/reconnaissance, premièrement avec des francophones (pour qui les pièces étaient familières) et ensuite avec des non-francophones (pour qui les pièces étaient non-familières). Globalement, les pièces à fort potentiel d’IMIN étaient mieux rappelées et reconnues que les pièces à faible potentiel. Une dernière étude a investigué l’impact de la variabilité inter-stimulus du timbre sur les résultats précédents, en demandant à une chanteuse d’enregistrer les lignes vocales des pièces et en répétant l’expérience avec ces nouveaux stimuli. La différence précédemment observée entre les stimuli à fort et à faible potentiel d’IMIN dans la tâche de reconnaissance a ainsi disparu, ce qui suggère que le timbre est une caractéristique importante pour le potentiel d’IMIN. En guise de conclusion, nous suggérons que les phénomènes mentaux et les mécanismes cognitifs jouant un rôle dans les autres types de souvenirs involontaires peuvent aussi s’appliquer à l’IMIN. Dépendamment du contexte, la récupération mnésique des pièces peut résulter de la répétition en mémoire à court terme, de l’amorçage à court et long terme ou de l’indiçage provenant de stimuli dans l’environnement ou les pensées. Une des plus importantes différences observables entre l’IMIN et les autres souvenirs involontaires est la répétition. Nous proposons que la nature même de la musique, qui est définie par la répétition à un niveau micro- et macro-structurel en est responsable.
Resumo:
333 p.
Resumo:
The big data era has dramatically transformed our lives; however, security incidents such as data breaches can put sensitive data (e.g. photos, identities, genomes) at risk. To protect users' data privacy, there is a growing interest in building secure cloud computing systems, which keep sensitive data inputs hidden, even from computation providers. Conceptually, secure cloud computing systems leverage cryptographic techniques (e.g., secure multiparty computation) and trusted hardware (e.g. secure processors) to instantiate a “secure” abstract machine consisting of a CPU and encrypted memory, so that an adversary cannot learn information through either the computation within the CPU or the data in the memory. Unfortunately, evidence has shown that side channels (e.g. memory accesses, timing, and termination) in such a “secure” abstract machine may potentially leak highly sensitive information, including cryptographic keys that form the root of trust for the secure systems. This thesis broadly expands the investigation of a research direction called trace oblivious computation, where programming language techniques are employed to prevent side channel information leakage. We demonstrate the feasibility of trace oblivious computation, by formalizing and building several systems, including GhostRider, which is a hardware-software co-design to provide a hardware-based trace oblivious computing solution, SCVM, which is an automatic RAM-model secure computation system, and ObliVM, which is a programming framework to facilitate programmers to develop applications. All of these systems enjoy formal security guarantees while demonstrating a better performance than prior systems, by one to several orders of magnitude.