1000 resultados para Bi-modal authentication
Resumo:
The large Cerro de Pasco Cordilleran base metal deposit in central Peru is located on the eastern margin of a middle Miocene diatreme-dome complex and comprises two mineralization stages. The first stage consists of a large pyrite-quartz body replacing Lower Mesozoic Pucara carbonate rocks and, to a lesser extent, diatreme breccia. This body is composed of pyrite with pyrrhotite inclusions, quartz, and black and red chalcedony (containing hypogene hematite). At the contact with the pyrite-quartz body, the diatreme breccia is altered to pyrite-quartz-sericite-pyrite. This body was, in part, replaced by pipelike pyrrhotite bodies zoned outward to carbonate-replacement Zn-Pb ores hearing Fe-rich sphalerite (up to 24 mol % Fes). The second mineralization stage is partly superimposed on the first and consists of zoned east-west-trending Cu-Ag-(Au-Zn-Pb) enargite-pyrite veins hosted in the diatreme breccia in the western part of the deposit and well-zoned Zn-Pb-(Bi-Ag-Cu) carbonate-replacement orebodies; in both cases, sphalerite is Fe poor and the inner parts of the orebodies show typically advanced argillic alteration assemblages, including aluminum phosphate Sulfate (APS) minerals. The zoned enargite-pyrite veins display mineral zoning, from a core of enargite-pyrite +/- alunite with traces of Au, through an intermediate zone of tennantite, chalcopyrite, and Bi minerals to a poorly developed Outer zone hearing sphalerite-galena +/- kaolinite. The carbonate-hosted replacement ores are controlled along N 35 degrees E, N 90 degrees E, N 120 degrees E, and N 170 degrees E faults. They form well-zoned upward-flaring pipelike orebodies with a core of famatinite-pyrite and alunite, an intermediate zone with tetrahedrite-pyrite, chalcopyrite, matildite, cuprobismutite, emplectite, and other Bi minerals accompanied by APS minerals, kaolinite, and dickite, and an outer zone composed of Fe-poor sphalerite (in the range of 0.05-3.5 mol % Fes) and galena. The outermost zone consists of hematite, magnetite, and Fe-Mn-Zn-Ca-Mg carbonates. Most of the second-stage carbonate-replacement orebodies plunge between 25 degrees and 60 degrees to the west, suggesting that the hydrothermal fluids ascended from deeper levels and that no lateral feeding from the veins to the carbonate-replacement orebodies took place. In the Venencocha and Santa Rosa areas, located 2.5 km northwest of the Cerro de Pasco open pit and in the southern part of the deposit, respectively, advanced argillic altered dacitic domes and oxidized veins with advanced argillic alteration halos occur. The latter veins are possibly the oxidized equivalent of the second-stage enargite-pyrite veins located in the western part of the deposit. The alteration assemblage quartz-muscovite-pyrite associated with the pyrite-quartz body suggests that the first stage precipitated at slightly, acidic fin. The sulfide mineral assemblages define an evolutionary path close to the pyrite-pyrrhotite boundary and are characteristic of low-sulfidation states; they suggest that the oxidizing slightly acidic hydrothermal fluid was buffered by phyllite, shale, and carbonate host rock. However, the presence in the pyrite-quartz body of hematite within quartz suggests that, locally, the fluids were less buffered by the host rock. The mineral assemblages of the second mineralization stage are characteristic of high- to intermediate-sulfidation states. High-sulfidation states and oxidizing conditions were achieved and maintained in the cores of the second-stage orebodies, even in those replacing carbonate rocks. The observation that, in places, second-stage mineral assemblages are found in the inner and outer zones is explained in terms of the hydrothermal fluid advancing and waning. Microthermometric data from fluid inclusions in quartz indicate that the different ores of the first mineralization stage formed at similar temperatures and moderate salinities (200 degrees-275 degrees C and 0.2-6.8 wt % NaCl equiv in the pyrite-quartz body; 192 degrees-250 degrees C and 1.1-4.3 wt % NaCl equiv in the pyrrhotite bodies; and 183 degrees-212 degrees C and 3.2-4.0 wt % NaCl equiv in the Zn-Pb ores). These values are similar to those obtained for fluid inclusions in quartz and sphalerite from the second-stage ores (187 degrees-293 degrees C and 0.2-5.2 wt % NaCl equiv in the enargite-pyrite veins: 178 degrees-265 degrees C and 0.2-7.5 wt % NaCl equiv in quartz of carbonate-replacement orebodies; 168 degrees-999 degrees C and 3-11.8 wt % NaCl equiv in sphalerite of carbonate-replacement orebodies; and 245 degrees-261 degrees C and 3.2-7.7 wt % NaCl equiv in quartz from Venencocha). Oxygen and hydrogen isotope compositions oil kaolinite from carbonate-replacement orebodies (delta(18)O = 5.3-11.5%o, delta D = -82 to -114%o) and on alunite from the Venencocha and Santa Rosa areas (delta(18)O = 1.9-6.9%o, delta D = -56 to -73%o). Oxygen isotope compositions of quartz from the first and second stages have 6180 values from 9.1 to 1.7.8 per mil. Calculated fluids in equilibrium with kaolinite have delta(18)O values of 2.0 to 8.2 and delta D values of -69 to -97 per mil; values in equilibrium with alunite are -1.4 to -6.4 and -62 to -79 per mil. Sulfur isotope compositions of sulfides from both stages have a narrow range of delta(34)S values, between -3.7 and +4.2 per mil; values for sulfates from the second stage are between 4.2 and 31.2 per mil. These results define two mixing trends for the ore-forming fluids. The first trend reflects mixing between a moderately saline (similar to 10 wt % NaCl equiv) magmatic end member that had degassed (as indicated by the low delta D values) and meteoric water. The second mixing indicates condensation of magmatic vapor with HCl and SO(2) into meteoric water, which formed alunite. The hydrothermal system at Cerro de Pasco was emplaced at a shallow depth (similar to 500 m) in the epithermal and upper part of a porphyry environment. The similar temperatures and salinities obtained for the first stage and second stages, together with the stable isotope data, indicate that both stages are linked and represent successive stages of epithermal polymetallic mineralization in the upper part of a porphyry system.
Resumo:
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.
Resumo:
The goal of this work is to design and implement authentication and authorization section to PeerHood system. PeerHood system is developedin Lappeenranta University of Technology. It provides functions of discovering devices compatible with PeerHood and listing services offered by those devices; based on wireless technologies: Wi-Fi, Bluetooth and GPRS. The thesis describes implementation of the security approach intomobile Ad-Hoc environment and includes both authentication and authorization processes.
Resumo:
Objective: Existing VADs are single-ventricle pumps needing anticoagulation. We developed a bi ventricular external assist device that reproduces the physiological heart muscle movement completely avoiding anticoagulants. Methods: The device has a carbon fibre skeleton fitting a 30-40 kg patient's heart, to which a Nitinol based artificial muscle is connected. The artificial muscle wraps both ventricles. The strength of the Nitinol fibres is amplified by a pivot articulation in contact with the ventricle wall. The fibres are electrically driven and a dedicated control unit has been developed. We assessed hemodynamic performances of this device using a previously described dedicated bench test. Volume ejected and pressure gradient has been measured with afterload ranging from 25 to 50mmHg. Results: With anafterload of 50mmHg the system has an ejection fraction (EF) of 10% on the right side and 8% on the left side. The system is able to generate a systolic ejection of 5,5 ml on the right side and 4,4 ml on the left side. With anafterload of 25mmHg the results are reduced of about 20%. The activation frequency is 80/minute resulting in a total volume displacement of 440 ml/minute on the right side and 352 ml/minute on the left side. Conclusions: The artificial muscle follows Starling's law as the ejected volume increases when afterload increases. These preliminary studies confirmed the possibility of improving the EF of a failing heart using artificial muscle for external cardiac compression. This device could be helpful in weaning CPB and/or for short-term cardio-circulatory support in paediatric population with cardiac failure.
Resumo:
Vivim, cada cop més, en un món tecnològic, on la vida diària es comparteix a les xarxes socials quasi sense adonar-nos-en. En aquest context, es generen quantitats ingents d'informació que, un cop tractades, poden ésser útils en estudis ben diversos com són la detecció de terratrèmols o la detecció prematura d'una epidèmia. En relació a aquest últim, el virus de la grip és un greu problema de salut pública ja que es destinen part dels recursos sanitaris durant un període de temps considerable i disminueix la productivitat laboral dels afectats que la pateixen. Davant d'aquesta situació, es planteja la realització d'un sistema de Business Intelligence que analitzi les dades extretes dels tweets de la plataforma Twitter en relació a les hospitalitzacions produïdes a un hospital de Catalunya, per tal de tenir un anàlisi predictiu de l'aparició d'un brot d'aquestes característiques. El treball va més enllà al emprar una tecnologia no convencional per la implementació del sistema BI. S'escull la dupla Elasticsearch i Kibana per tal d'aconseguir un sistema robust, distribuït, escalable i, sobretot, totalment personalitzable. Després d'un estudi d'aquestes dos solucions, incloent els plugins de monitoratge i càrrega de dades, s'ha elaborat un data warehouse complet i un quadre de comandament introductori. Es deixa, per futures línies de treball, l'anàlisi profund de les dades i la conseqüent extracció d'uns resultats que ens ajudin a predir amb una major antelació l'aparició d'un nou brot del virus de la grip.
Resumo:
Realització d'un sistema de Business Intelligence que analitzi les dades extretes dels tweets de la plataforma Twitter en relació a les hospitalitzacions produïdes a un hospital de Catalunya, per tal de tenir una anàlisi predictiva de l'aparició d'un brot de grip. El treball va més enllà a l'emprar una tecnologia no convencional per la implementació del sistema BI. S'escull la dupla ElasticSearch i Kibana per tal d'aconseguir un sistema robust, distribuït, escalable i, sobretot, totalment personalitzable. Després d'un estudi d'aquestes dos solucions, incloent els plugins de monitoratge i càrrega de dades, s'ha elaborat un data warehouse complet i un quadre de comandament introductori.
Resumo:
PURPOSE: To determine whether a mono-, bi- or tri-exponential model best fits the intravoxel incoherent motion (IVIM) diffusion-weighted imaging (DWI) signal of normal livers. MATERIALS AND METHODS: The pilot and validation studies were conducted in 38 and 36 patients with normal livers, respectively. The DWI sequence was performed using single-shot echoplanar imaging with 11 (pilot study) and 16 (validation study) b values. In each study, data from all patients were used to model the IVIM signal of normal liver. Diffusion coefficients (Di ± standard deviations) and their fractions (fi ± standard deviations) were determined from each model. The models were compared using the extra sum-of-squares test and information criteria. RESULTS: The tri-exponential model provided a better fit than both the bi- and mono-exponential models. The tri-exponential IVIM model determined three diffusion compartments: a slow (D1 = 1.35 ± 0.03 × 10(-3) mm(2)/s; f1 = 72.7 ± 0.9 %), a fast (D2 = 26.50 ± 2.49 × 10(-3) mm(2)/s; f2 = 13.7 ± 0.6 %) and a very fast (D3 = 404.00 ± 43.7 × 10(-3) mm(2)/s; f3 = 13.5 ± 0.8 %) diffusion compartment [results from the validation study]. The very fast compartment contributed to the IVIM signal only for b values ≤15 s/mm(2) CONCLUSION: The tri-exponential model provided the best fit for IVIM signal decay in the liver over the 0-800 s/mm(2) range. In IVIM analysis of normal liver, a third very fast (pseudo)diffusion component might be relevant. KEY POINTS: ? For normal liver, tri-exponential IVIM model might be superior to bi-exponential ? A very fast compartment (D = 404.00 ± 43.7 × 10 (-3) mm (2) /s; f = 13.5 ± 0.8 %) is determined from the tri-exponential model ? The compartment contributes to the IVIM signal only for b ≤ 15 s/mm (2.)
Resumo:
En este trabajo se hace una evaluación de la solución Big Data Hadoop como alternativa de almacenamiento y procesado de elevados volúmenes de datos en comparación con modelos relacionales tradicionales en un Enterprise Data Warehouse (EDW) corporativo, y de cómo ésta es capaz de integrarse con las herramientas de visualización típicas de las suites Business Intelligence.
Resumo:
This thesis is composed of three main parts. The first consists of a state of the art of the different notions that are significant to understand the elements surrounding art authentication in general, and of signatures in particular, and that the author deemed them necessary to fully grasp the microcosm that makes up this particular market. Individuals with a solid knowledge of the art and expertise area, and that are particularly interested in the present study are advised to advance directly to the fourth Chapter. The expertise of the signature, it's reliability, and the factors impacting the expert's conclusions are brought forward. The final aim of the state of the art is to offer a general list of recommendations based on an exhaustive review of the current literature and given in light of all of the exposed issues. These guidelines are specifically formulated for the expertise of signatures on paintings, but can also be applied to wider themes in the area of signature examination. The second part of this thesis covers the experimental stages of the research. It consists of the method developed to authenticate painted signatures on works of art. This method is articulated around several main objectives: defining measurable features on painted signatures and defining their relevance in order to establish the separation capacities between groups of authentic and simulated signatures. For the first time, numerical analyses of painted signatures have been obtained and are used to attribute their authorship to given artists. An in-depth discussion of the developed method constitutes the third and final part of this study. It evaluates the opportunities and constraints when applied by signature and handwriting experts in forensic science. A brief summary covering each chapter allows a rapid overview of the study and summarizes the aims and main themes of each chapter. These outlines presented below summarize the aims and main themes addressed in each chapter. Part I - Theory Chapter 1 exposes legal aspects surrounding the authentication of works of art by art experts. The definition of what is legally authentic, the quality and types of the experts that can express an opinion concerning the authorship of a specific painting, and standard deontological rules are addressed. The practices applied in Switzerland will be specifically dealt with. Chapter 2 presents an overview of the different scientific analyses that can be carried out on paintings (from the canvas to the top coat). Scientific examinations of works of art have become more common, as more and more museums equip themselves with laboratories, thus an understanding of their role in the art authentication process is vital. The added value that a signature expertise can have in comparison to other scientific techniques is also addressed. Chapter 3 provides a historical overview of the signature on paintings throughout the ages, in order to offer the reader an understanding of the origin of the signature on works of art and its evolution through time. An explanation is given on the transitions that the signature went through from the 15th century on and how it progressively took on its widely known modern form. Both this chapter and chapter 2 are presented to show the reader the rich sources of information that can be provided to describe a painting, and how the signature is one of these sources. Chapter 4 focuses on the different hypotheses the FHE must keep in mind when examining a painted signature, since a number of scenarios can be encountered when dealing with signatures on works of art. The different forms of signatures, as well as the variables that may have an influence on the painted signatures, are also presented. Finally, the current state of knowledge of the examination procedure of signatures in forensic science in general, and in particular for painted signatures, is exposed. The state of the art of the assessment of the authorship of signatures on paintings is established and discussed in light of the theoretical facets mentioned previously. Chapter 5 considers key elements that can have an impact on the FHE during his or her2 examinations. This includes a discussion on elements such as the skill, confidence and competence of an expert, as well as the potential bias effects he might encounter. A better understanding of elements surrounding handwriting examinations, to, in turn, better communicate results and conclusions to an audience, is also undertaken. Chapter 6 reviews the judicial acceptance of signature analysis in Courts and closes the state of the art section of this thesis. This chapter brings forward the current issues pertaining to the appreciation of this expertise by the non- forensic community, and will discuss the increasing number of claims of the unscientific nature of signature authentication. The necessity to aim for more scientific, comprehensive and transparent authentication methods will be discussed. The theoretical part of this thesis is concluded by a series of general recommendations for forensic handwriting examiners in forensic science, specifically for the expertise of signatures on paintings. These recommendations stem from the exhaustive review of the literature and the issues exposed from this review and can also be applied to the traditional examination of signatures (on paper). Part II - Experimental part Chapter 7 describes and defines the sampling, extraction and analysis phases of the research. The sampling stage of artists' signatures and their respective simulations are presented, followed by the steps that were undertaken to extract and determine sets of characteristics, specific to each artist, that describe their signatures. The method is based on a study of five artists and a group of individuals acting as forgers for the sake of this study. Finally, the analysis procedure of these characteristics to assess of the strength of evidence, and based on a Bayesian reasoning process, is presented. Chapter 8 outlines the results concerning both the artist and simulation corpuses after their optical observation, followed by the results of the analysis phase of the research. The feature selection process and the likelihood ratio evaluation are the main themes that are addressed. The discrimination power between both corpuses is illustrated through multivariate analysis. Part III - Discussion Chapter 9 discusses the materials, the methods, and the obtained results of the research. The opportunities, but also constraints and limits, of the developed method are exposed. Future works that can be carried out subsequent to the results of the study are also presented. Chapter 10, the last chapter of this thesis, proposes a strategy to incorporate the model developed in the last chapters into the traditional signature expertise procedures. Thus, the strength of this expertise is discussed in conjunction with the traditional conclusions reached by forensic handwriting examiners in forensic science. Finally, this chapter summarizes and advocates a list of formal recommendations for good practices for handwriting examiners. In conclusion, the research highlights the interdisciplinary aspect of signature examination of signatures on paintings. The current state of knowledge of the judicial quality of art experts, along with the scientific and historical analysis of paintings and signatures, are overviewed to give the reader a feel of the different factors that have an impact on this particular subject. The temperamental acceptance of forensic signature analysis in court, also presented in the state of the art, explicitly demonstrates the necessity of a better recognition of signature expertise by courts of law. This general acceptance, however, can only be achieved by producing high quality results through a well-defined examination process. This research offers an original approach to attribute a painted signature to a certain artist: for the first time, a probabilistic model used to measure the discriminative potential between authentic and simulated painted signatures is studied. The opportunities and limits that lie within this method of scientifically establishing the authorship of signatures on works of art are thus presented. In addition, the second key contribution of this work proposes a procedure to combine the developed method into that used traditionally signature experts in forensic science. Such an implementation into the holistic traditional signature examination casework is a large step providing the forensic, judicial and art communities with a solid-based reasoning framework for the examination of signatures on paintings. The framework and preliminary results associated with this research have been published (Montani, 2009a) and presented at international forensic science conferences (Montani, 2009b; Montani, 2012).
Resumo:
Lyhyen kantaman radiotekniikoiden hyödyntäminen mahdollistaa uudenlaisten paikallisten palveluiden käytön ja vanhojen palveluiden kehittämisen. Kulunvalvonta on päivittäisenä palveluna valittu työn esimerkkisovellukseksi. Useita tunnistus- ja valtuutustapoja tutkitaan, ja julkisen avaimen infrastruktuuri on esitellään tarkemmin. Langattomat tekniikat Bluetooth, Zigbee, RFID ja IrDA esitellän yleisellä tasolla langattomat tekniikat –luvussa. Bluetooth-tekniikan rakennetta, mukaan lukien sen tietoturva-arkkitehtuuria, tutkitaan tarkemmin. Bluetooth-tekniikkaa käytetään työssä suunnitellun langattoman kulunvalvontajärjestelmän tietojen siirtoon. Kannettava päätelaite toimii käyttäjän henkilökohtaisena luotettuna laitteena, jota voi käyttää avaimena. Käyttäjän tunnistaminen ja valtuuttaminen perustuu julkisen avaimen infrastruktuuriin. Ylläpidon allekirjoittamat varmenteet sisältävät käyttäjän julkisen avaimen lisäksi tietoa hänestä ja hänen oikeuksistaan. Käyttäjän tunnistaminen kulunvalvontapisteissä tehdään julkisen ja salaisen avaimen käyttöön perustuvalla haaste-vastaus-menetelmällä. Lyhyesti, järjestelmässä käytetään Bluetooth-päätelaitteita langattomina avaimina.