949 resultados para chosen-plaintextattack block cipher system
Resumo:
This thesis focuses on studying molecular structure and internal dynamics by using pulsed jet Fourier transform microwave (PJ-FTMW) spectroscopy combined with theoretical calculations. Several kinds of interesting chemical problems are investigated by analyzing the MW spectra of the corresponding molecular systems. First, the general aspects of rotational spectroscopy are summarized, and then the basic theory on molecular rotation and experimental method are described briefly. ab initio and density function theory (DFT) calculations that used in this thesis to assist the assignment of rotational spectrum are also included. From chapter 3 to chapter 8, several molecular systems concerning different kind of general chemical problems are presented. In chapter 3, the conformation and internal motions of dimethyl sulfate are reported. The internal rotations of the two methyl groups split each rotational transition into several components line, allowing for the determination of accurate values of the V3 barrier height to internal rotation and of the orientation of the methyl groups with respect to the principal axis system. In chapter 4 and 5, the results concerning two kinds of carboxylic acid bi-molecules, formed via two strong hydrogen bonds, are presented. This kind of adduct is interesting also because a double proton transfer can easily take place, connecting either two equivalent or two non-equivalent molecular conformations. Chapter 6 concerns a medium strong hydrogen bonded molecular complex of alcohol with ether. The dimer of ethanol-dimethylether was chosen as the model system for this purpose. Chapter 7 focuses on weak halogen…H hydrogen bond interaction. The nature of O-H…F and C-H…Cl interaction has been discussed through analyzing the rotational spectra of CH3CHClF/H2O. In chapter 8, two molecular complexes concerning the halogen bond interaction are presented.
Resumo:
Atmosphärische Aerosole beeinflussen den Strahlungshaushalt und damit das Klima der Erde. Dies geschieht sowohl direkt (Streuung und Absorption), als auch indirekt (Wolkenkondensationskeime). Das sekundäre organische Aerosol (SOA) bildet einen wichtigen Bestandteil des atmosphärischen Aerosols. Seine Bildung erfolgt durch Reaktionen von Kohlenwasserstoffen mit atmosphärischen Oxidationsmitteln (z.B. Ozon, OH-Radikalen). Eine Klasse dieser Kohlenwasserstoffe sind die Terpene. Sie werden in großen Mengen durch die Vegetation emittiert und gelten als wichtige Vorläufersubstanzen des biogenen SOAs. In den Reaktionen von Monoterpenen und Sesquiterpenen mit atmosphärischen Reaktionspartnern wird eine große Vielfalt an multifunktionellen Reaktionsprodukten gebildet, von denen bis heute nur ein Bruchteil identifiziert werden konnte. In der vorliegenden Arbeit soll im Speziellen die Bildung von organischen Peroxiden und oligomeren Verbindungen im biogenen SOA untersucht und Nachweise einzelner Moleküle erbracht werden.rnFür eine Identifizierung von organischen Peroxiden aus der Oxidation einzelner Monoterpene und Sesquiterpene mit Ozon wurden die Reaktionsprodukte direkt in eine bei Atmosphärendruck arbeitende chemische Ionisationsquelle überführt und massenspektrometrisch untersucht (online-APCI-MS). Hierdurch konnten organische Hydroperoxide in der Partikelphase nachgewiesen werden, welche sich durch eine signifikante Abspaltung von H2O2 im Tandem-Massenspektrum (MS/MS) auszeichneten. Des Weiteren sollte die Bildung von höhermolekularen Verbindungen („Dimere“) im SOA des α-Pinens untersucht werden. Hierfür wurden zunächst die Reaktionsprodukte des Cyclohexens, das als einfache Modellverbindung des α-Pinens dient, mittels online-APCI-MS und offline durch Flüssigkeitschromatographie und Elektrospray-Ionenfallenmassenspektrometrie (HPLC/ESI-MS) untersucht. Verschiedene Produkte der Cyclohexen-Ozonolyse konnten hierbei als Esterverbindungen identifiziert werden, wobei eigens synthetisierte Referenzsubstanzen für die Identifizierung verwendet wurden. In einem weiteren Experiment, indem gleichzeitig Cyclohexen und α-Pinen mit Ozon umgesetzt wurden, konnten ebenfalls eine Bildung von höhermolekularen Estern nachgewiesen werden. Es handelte sich hierbei um „Mischester“, deren Struktur aus Reaktionsprodukten der beiden VOC-Vorläufermoleküle aufgebaut war. Durch diese neuen Erkenntnisse, über die Bildung von Estern im SOA des Cyclohexens, wurden die Dimer-Bildung einer reinen α-Pinen/Ozon-Reaktion online und offline massenspektrometrisch untersucht. Hier stellten sich als Hauptprodukte die Verbindungen mit m/z 357 und m/z 367 ([M-H]--Ionen) heraus, welche zudem erstmals auf einem Filter einer Realprobe aus Hyytiälä, Finnland nachgewiesen werden konnten. Aufgrund ihrer Fragmentierung in MS/MS-Untersuchungen sowie den exakten Summenformeln aus FT-MS Messungen konnte für die Struktur der höhermolekularen Verbindung mit m/z 367 ebenfalls ein Ester und für m/z 357 ein Peroxyhemiacetal vorgeschlagen werden. Die vorgeschlagene Struktur der Verbindung m/z 367 konnte im Anschluss über eine Reaktion aus Hydroxypinonsäure mit Pinsäure bestätigt werden. Die Identifizierung der Esterverbindung des α-Pinen-SOA erfolgte ebenfalls mit Hilfe von LC-MSn-Messungen.rnDie bisher diskutierten Ergebnisse, sowie die meisten in der Literatur beschriebenen Studien befassen sich jedoch mit einzelnen Vorläuferverbindungen, im Gegensatz zu den komplexen SOA-Proben aus den Emissionen der Vegetation. Im Rahmen einer Messkampagne am Forschungszentrum Jülich erfolgte eine massenspektrometrische Charakterisierung (online-APCI-MS) des SOAs aus direkten VOC-Emissionen von Pflanzen. Durch einen Vergleich der Produktverteilung dieser erhalten online-Massenspektren mit denen aus den Reaktionen einzelner VOCs, konnten Aussagen über die in den Reaktionen umgesetzten VOCs gemacht werden. Es konnte gezeigt werden, dass in stressbedingten Situationen die untersuchten Exemplare der Betula pendula (Birke) hauptsächlich Sesquiterpene, Picea abies (Fichte) eher Monoterpene und Eucalyptus (Eukalyptus) sowohl Sesquiterpene als auch Monoterpene emittieren. Um die atmosphärischen Prozesse, die zur Bildung der Produkte im SOA führen vollständig zu verstehen, müssen jedoch noch weitere Anstrengungen unternommen werden.rn
Resumo:
The ability to associate a predictive stimulus with a subsequent salient event (i.e., classical conditioning) and the ability to associate an expressed behavior with the consequences (i.e., operant conditioning) allow for a predictive understanding of a changing environment. Although they are operationally distinct, there has been considerable debate whether at some fundamental level classical and operant conditioning are mechanistically distinct or similar. Feeding behavior of Aplysia (i.e., biting) was chosen as the model system and was successfully conditioned with appetitive forms of both operant and classical conditioning. The neuronal circuitry responsible for feeding is well understood and is suitable for cellular analyses, thus providing for a mechanistic comparison between these two forms of associative learning. ^ Neuron B51 is part of the feeding circuitry of Aplysia and is critical for the expression of ingestive behaviors. B51 also is a locus of plasticity following both operant and classical conditioning. Both in vivo and in vitro operant conditioning increased the input resistance and the excitability of B51. No pairing-specific changes in the input resistance were observed following both in vivo and in vitro classical conditioning. However, classical conditioning decreased the excitability of B51. Thus, both operant and classical conditioning modified the threshold level for activation of neuron B51, but in opposite directions, revealing key differences in the cellular mechanisms underlying these two forms of associative learning. ^ Next, the cellular mechanisms underlying operant conditioning were investigated in more detail using a single-cell analogue. The single-cell analogue successfully recapitulated the previous in vivo and in vitro operant conditioning results by increasing the input resistance and the excitability of B51. Both PKA and PKC were necessary for operant conditioning. Dopamine appears to be the transmitter mediating the reinforcement signal in this form of conditioning. A D1 dopamine receptor antibody revealed that the D1receptor localizes to the axon hillock, which is also the region that gives the strongest response when iontophoresing dopamine. ^ The studies presented herein, thus, provide for a greater understanding of the mechanisms underlying both of these forms of associative learning and demonstrate that they likely operate through distinct cellular mechanisms. ^
Resumo:
Many commentators have criticised the strategy used to finance regional governments such as the Scottish Parliament – both the block grant system and the limited amount of fiscal autonomy devised in the Scotland Act of 2012. This lecture sets out to identify what level of autonomy or independence would best suit a regional economy in a currency union, and also the institutional changes needed to sustain those arrangements. Our argument is developed along three lines. First, we set out the advantages of a fiscal federalism framework and the institutions needed to support it, but which the Euro-zone currently lacks. The second is to elaborate a model of fiscal federalism where comprehensive powers of taxation and spending are devolved (an independent Scotland and the UK remain constituent members of the EU and European economy). Third, we evaluate the main arguments for the breakup of nations or economic unions with Scotland and the UK as leading examples. We note that greater autonomy may not result in increases in long run economic growth rate, but it does imply that enhancing the fiscal competence and responsibility of regional governments would result in productivity gains and hence higher levels of GDP per head. That means the population is permanently richer than before, even if ultimately their incomes continue to grow at the same rate. It turns out that these improvements can be achieved through devolved tax powers, but not through devolved spending powers or shared taxes.
Resumo:
The use of digital communication systems is increasing very rapidly. This is due to lower system implementation cost compared to analogue transmission and at the same time, the ease with which several types of data sources (data, digitised speech and video, etc.) can be mixed. The emergence of packet broadcast techniques as an efficient type of multiplexing, especially with the use of contention random multiple access protocols, has led to a wide-spread application of these distributed access protocols in local area networks (LANs) and a further extension of them to radio and mobile radio communication applications. In this research, a proposal for a modified version of the distributed access contention protocol which uses the packet broadcast switching technique has been achieved. The carrier sense multiple access with collision avoidance (CSMA/CA) is found to be the most appropriate protocol which has the ability to satisfy equally the operational requirements for local area networks as well as for radio and mobile radio applications. The suggested version of the protocol is designed in a way in which all desirable features of its precedents is maintained. However, all the shortcomings are eliminated and additional features have been added to strengthen its ability to work with radio and mobile radio channels. Operational performance evaluation of the protocol has been carried out for the two types of non-persistent and slotted non-persistent, through mathematical and simulation modelling of the protocol. The results obtained from the two modelling procedures validate the accuracy of both methods, which compares favourably with its precedent protocol CSMA/CD (with collision detection). A further extension of the protocol operation has been suggested to operate with multichannel systems. Two multichannel systems based on the CSMA/CA protocol for medium access are therefore proposed. These are; the dynamic multichannel system, which is based on two types of channel selection, the random choice (RC) and the idle choice (IC), and the sequential multichannel system. The latter has been proposed in order to supress the effect of the hidden terminal, which always represents a major problem with the usage of the contention random multiple access protocols with radio and mobile radio channels. Verification of their operation performance evaluation has been carried out using mathematical modelling for the dynamic system. However, simulation modelling has been chosen for the sequential system. Both systems are found to improve system operation and fault tolerance when compared to single channel operation.
Resumo:
The study of solutions is considered very important to chemist’s education because most of the chemical reactions occur in aqueous medium, being also required to understand other subject such as chemical changes, electrochemical and chemical balance. Nevertheless, it is noticed that many students indicate learning difficulties related to the content of solutions, how to pass among the macro-submicroscopic knowledge levels, and how to solve quantitative problems that demanding the establishment of a stoichiometric ratios. This thesis defended considers the use of contextualized teaching strategies about some subject associated to the study of solution, can foster student learning through reflection and understanding of their own difficulties, besides to provide motivation and active participation. The target group is formed by students of the undergraduate distance education with major in chemistry education of the Universidade Federal do Rio Grande do Norte (UFRN), and they were chosen because this education system is expanding and its learning difficulties publications number is reduced as well. Thus, the first methodological stage was to identify the student’s main learning difficulties associated to the study of solutions through literature sources. Next, using an adapted script of the Plano Nacional do Livro Didático para o Ensino Médio (PNLEM, Textbook National Plan for High School), the approach of the content of solutions printed in educational materials used by the target group was analyzed. Afterward, a teaching unit was planned in the last methodological stage and, finally, a new teaching unite was given with a sequence of contextualized activities such as video presentation, dialogued lecture, questionnaires application, exercises, and an experiment, where the target group’s main difficulties related to learning of solution were identified. The participants of the teaching unit activities had some learning difficulties in understand concepts of compound, ion, charge, entropy and solubility, as well as to identify the ion charge, interpret statements, decode tables, use the chemical language, perform mathematical calculations and use concentration units, similar results raised in the literature sources. In order to work on these difficulties, these students were encouraged to expose, question and test their ideas about the phenomenon under study, allowing learn from their mistakes and reflect on the organization strategy of scientific explanatory models they use. Therefore, activities and information about learning difficulties presented in this thesis need to be critical reflection object, because it can help both students in the process of acquiring knowledge about the content of solutions and professors in the planning of their lessons.
Resumo:
TET2 is a tumor suppressor gene that has been implicated in the epigenetic regulation of gene expression. Inactivating TET2 mutations are common in MDS. These mutations may contribute to early clonal dominance and myeloid transformation, although the exact mechanisms remain to be elucidated. Common to the environment of MDS are elevations in cytokines, such as TNFα and IFN-γ. It was hypothesized that inflammatory cytokines TNF-α and IFN-γ may promote clonal expansion of TET2 mutant progenitors. Adult (10-14 weeks-old) Tet2 wild type (+/+) and Tet2 mutant (-/-) C57BL/6 mice strains were chosen as a model system. Lineage negative cells (Lin-), enriched for hematopoietic stem and progenitor cells, were isolated from Tet2 +/+ and -/- bone marrow and cultured in the absence or presence of varying concentrations of TNFα or IFN-γ in methylcellulose colony formation assays and long term cell culture assays, over a period of 12 and 30 days respectively, and their colony growth, cell count, immunophenotype and resistance to apoptosis were examined. Where indicated, serial re-plating was performed. Expression of apoptotic regulators was assessed by qRT-PCR. In the triplicate experiments, starting with equal densities of Tet2 +/+ and -/- Lin- cells, Tet2 -/- Lin- cells displayed increased resistance to cytokine-induced growth suppression and superior colony forming ability over +/+ in the serial re-plating assays under stress of increasing TNFα or IFN γ. Tet2 -/- progenitors also displayed a lower apoptotic index compared to +/+ under stress of increasing TNFα, suggesting increased resistance to TNFα induced apoptosis. Transcriptional data showed low expression of Tnfr1, Fas and caspase 8, as well as a high expression of Bcl-2 and Iap1 in Tet2 -/- compared to +/+ under stress of TNFα. Tet2-/- also showed increased basal expression of endogenous TNFα mRNA compared to +/+. In the human colony growth assay, the clonal growth of TET2 mutant CFU-GM progenitors was enhanced at low TNFα concentrations. Conclusion: Mutations that promote resistance to environmental stem cell stressors are a known mechanism of clonal selection in aplastic anaemia and JAK2-mutant MPN and our findings suggest that this mechanism may be critical to clonal selection and dominance in MDS.
Resumo:
This paper presents a novel matched rotation precoding (MRP) scheme to design a rate one space-frequency block code (SFBC) and a multirate SFBC for MIMO-OFDM systems with limited feedback. The proposed rate one MRP and multirate MRP can always achieve full transmit diversity and optimal system performance for arbitrary number of antennas, subcarrier intervals, and subcarrier groupings, with limited channel knowledge required by the transmit antennas. The optimization process of the rate one MRP is simple and easily visualized so that the optimal rotation angle can be derived explicitly, or even intuitively for some cases. The multirate MRP has a complex optimization process, but it has a better spectral efficiency and provides a relatively smooth balance between system performance and transmission rate. Simulations show that the proposed SFBC with MRP can overcome the diversity loss for specific propagation scenarios, always improve the system performance, and demonstrate flexible performance with large performance gain. Therefore the proposed SFBCs with MRP demonstrate flexibility and feasibility so that it is more suitable for a practical MIMO-OFDM system with dynamic parameters.
Resumo:
The concept of moving block signallings (MBS) has been adopted in a few mass transit railway systems. When a dense queue of trains begins to move from a complete stop, the trains can re-start in very close succession under MBS. The feeding substations nearby are likely to be overloaded and the service will inevitably be disturbed unless substations of higher power rating are used. By introducing starting time delays among the trains or limiting the trains’ acceleration rate to a certain extent, the peak energy demand can be contained. However, delay is introduced and quality of service is degraded. An expert system approach is presented to provide a supervisory tool for the operators. As the knowledge base is vital for the quality of decisions to be made, the study focuses on its formulation with a balance between delay and peak power demand.
Resumo:
A high peak power demand at substations will result under Moving Block Signalling (MBS) when a dense queue of trains begins to start from a complete stop at the same time in an electrified railway system. This may cause the power supply interruption and in turn affect the train service substantially. In a recent study, measures of Starting Time Delay (STD) and Acceleration Rate Limit (ARL) are the possible approaches to reduce the peak power demand on the supply system under MBS. Nevertheless, there is no well-defined relationship between the two measures and peak power demand reduction (PDR). In order to attain a lower peak demand at substations on different traffic conditions and system requirements, an expert system is one of the possible approaches to procure the appropriate use of peak demand reduction measures. The main objective of this paper is to study the effect of the train re-starting strategies on the power demand at substations and the time delay suffered by the trains with the aid of computer simulation. An expert system is a useful tool to select various adoptions of STD and ARL under different operational conditions and system requirements.
Resumo:
Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
In arriving at the ideal filter transfer function for an active noise control system in a duct, the effect of the auxiliary sources (generally loudspeakers) on the waves generated by the primary source has invariably been neglected in the existing literature, implying a rigid wall or infinite impedance. The present paper presents a fairly general analysis of a linear one-dimensional noise control system by means of block diagrams and transfer functions. It takes into account the passive as well as active role of a terminal primary source, wall-mounted auxiliary source, open duct radiation impedance, and the effects of mean flow and damping. It is proved that the pressure generated by a source against a load impedance can be looked upon as a sum of two pressure waves, one generated by the source against an anechoic termination and the other by reflecting the rearward wave (incident on the source) off the passive source impedance. Application of this concept is illustrated for both the types of sources. A concise closed-form expression for the ideal filter transfer function is thus derived and discussed. Finally, the dynamics of an adaptive noise control system is discussed briefly, relating its standing-wave variables and transfer functions with those of the progressive-wave model presented here.
Resumo:
Stone surfaces are sensitive to their environment. This means that they will often respond to exposure conditions by manifesting a change in surface characteristics. Such changes can be more than simply aesthetic, creating surface/subsurface heterogeneity in stone at the block scale, promoting stress gradients to be set up as surface response to, for example, temperature fluctuations, can diverge from subsurface response. This paper reports preliminary experiments investigating the potential of biofilms and iron precipitation as surface-modifiers on stone, exploring the idea of block-scale surface-to-depth heterogeneity, and investigating how physical alteration in the surface and near-surface zone can have implications for subsurface response and potentially for long-term decay patterns. Salt weathering simulations on fresh and surface-modified stone suggest that even subtle surface modification can have significant implications for moisture uptake and retention, salt concentration and distribution from surface to depth, over the period of the experimental run. The accumulation of salt may increase the retention of moisture, by modifying vapour pressure differentials and the rate of evaporation.
Temperature fluctuation experiments suggest that the presence of a biofilm can have an impact on energy transfer processes that occur at the stone surface (for example, buffering against temperature fluctuation), affecting surface-to-depth stress gradients. Ultimately, fresh and surface-modified blocks mask different kinds of system, which respond to inputs differently because of different storage mechanisms, encouraging divergent behaviour between fresh and surface modified stone over time.
Resumo:
Maintaining a high level of data security with a low impact on system performance is more challenging in wireless multimedia applications. Protocols that are used for wireless local area network (WLAN) security are known to significantly degrade performance. In this paper, we propose an enhanced security system for a WLAN. Our new design aims to decrease the processing delay and increase both the speed and throughput of the system, thereby making it more efficient for multimedia applications. Our design is based on the idea of offloading computationally intensive encryption and authentication services to the end systems’ CPUs. The security operations are performed by the hosts’ central processor (which is usually a powerful processor) before delivering the data to a wireless card (which usually has a low-performance processor). By adopting this design, we show that both the delay and the jitter are significantly reduced. At the access point, we improve the performance of network processing hardware for real-time cryptographic processing by using a specialized processor implemented with field-programmable gate array technology. Furthermore, we use enhanced techniques to implement the Counter (CTR) Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) and the CTR protocol. Our experiments show that it requires timing in the range of 20–40 μs to perform data encryption and authentication on different end-host CPUs (e.g., Intel Core i5, i7, and AMD 6-Core) as compared with 10–50 ms when performed using the wireless card. Furthermore, when compared with the standard WiFi protected access II (WPA2), results show that our proposed security system improved the speed to up to 3.7 times.