969 resultados para pre-image attack
Resumo:
Back Row: Byram C. Trueblood, Abram H. Felker, Gordon Berry
Front Row: Leigh C. Bloomfield, Clarence E. Smoot
Resumo:
Back Row: .Ross H. Kidston, Byram Trueblood, Gordon Berry, Dan H. Eaton
Front Row: Leigh C. Bloomfield, Abram H. Felker, Clement E. Smoot
Resumo:
Back Row: Leigh C. Bloomfield, Ross H. Kidston, Clarence E. Smoot
Front Row: Water Becker, Byram Trueblood
Resumo:
Standing L-R:Harold N. Buckley, Page M. Brereton
Seated: John G. Chase, DAvid W. Barrow, Lewis A. Estes
Resumo:
Using photographic images from South East Queensland mid-twentieth-century architecture, this essay investigates the translation and regeneration of modern themes into a local idiom that resonates with poetic qualities of pre-existent forms of inhabitation. It contributes to the discussion of the photograph's role in communicating meaning in architecture through its potential to "reveal" the idiomatic.
Resumo:
We investigate the gas-particle dynamics of a device designed for biological pre-clinical experiments. The device uses transonic/supersonic gas flow to accelerate microparticles such that they penetrate the outer skin layers. By using a shock tube coupled to a correctly expanded nozzle, a quasi-one-dimensional, quasi-steady flow (QSF) is produced to uniformly accelerate the microparticles. The system utilises a microparticle cassette (a diaphragm sealed container) that incorporates a jet mixing mechanism to stir the particles prior to diaphragm rupture. Pressure measurements reveal that a QSF exit period - suitable for uniformly accelerating microparticles - exists between 155 and 220 mus after diaphragm rupture. Immediately preceding the QSF period, a starting process secondary shock was shown to form with its (x,t) trajectory comparing well to theoretical estimates. To characterise the microparticle, flow particle image velocimetry experiments were conducted at the nozzle exit, using particle payloads with varying diameter (2.7-48 mu m), density (600-16,800 kg/m(3)) and mass (0.25-10 mg). The resultant microparticle velocities were temporally uniform. The experiments also show that the starting process does not significantly influence the microparticle nozzle exit velocities. The velocity distribution across the nozzle exit was also uniform for the majority of microparticle types tested. For payload masses typically used in pre-clinical drug and vaccine applications (
Resumo:
The blood types determination is essential to perform safe blood transfusions. In emergency situations isadministrated the “universal donor” blood type. However, sometimes, this blood type can cause incom-patibilities in the transfusion receptor. A mechatronic prototype was developed to solve this problem.The prototype was built to meet specific goals, incorporating all the necessary components. The obtainedsolution is close to the final system that will be produced later, at industrial scale, as a medical device.The prototype is a portable and low cost device, and can be used in remote locations. A computer appli-cation, previously developed is used to operate with the developed mechatronic prototype, and obtainautomatically test results. It allows image acquisition, processing and analysis, based on Computer Visionalgorithms, Machine Learning algorithms and deterministic algorithms. The Machine Learning algorithmsenable the classification of occurrence, or alack of agglutination in the mixture (blood/reagents), and amore reliable and a safer methodology as test data are stored in a database. The work developed allowsthe administration of a compatible blood type in emergency situations, avoiding the discontinuity of the“universal donor” blood type stocks, and reducing the occurrence of human errors in the transfusion practice.
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
Resumo:
* The work is partially supported by the grant of National Academy of Science of Ukraine for the support of scientific researches by young scientists No 24-7/05, " Розробка Desktop Grid-системи і оптимізація її продуктивності ”.