54 resultados para Header
Resumo:
Extending IPv6 to IEEE 802.15.4-based Low power Wireless Personal Area Networks requires efficient header compression mechanisms to adapt to their limited bandwidth, memory and energy constraints. This paper presents an experimental evaluation of an improved header compression scheme which provides better compression of IPv6 multicast addresses and UDP port numbers compared to existing mechanisms. This scheme outperforms the existing compression mechanism in terms of data throughput of the network and energy consumption of nodes. It enhances throughput by up to 8% and reduces transmission energy of nodes by about 5%.
Resumo:
We present a design of a fast all-optical core-node processor that performs packet-forwarding in optical networks without header-modification. The design is based on bit-serial architecture using TOADs as logic-gates that perform modulo-arithmetic to forward packets.
Resumo:
Il fenomeno noto come Internet of Things costituisce oggi il motore principale dell'espansione della rete Internet globale, essendo artefice del collegamento di miliardi di nuovi dispositivi. A causa delle limitate capacità energetiche e di elaborazione di questi dispositivi è necessario riprogettare molti dei protocolli Internet standard. Un esempio lampante è costituito dalla definizione del Constrained Application Protocol (CoAP), protocollo di comunicazione client-server pensato per sostituire HTTP in reti IoT. Per consentire la compatibilità tra reti IoT e rete Internet sono state definite delle linee guida per la mappatura di messaggi CoAP in messaggi HTTP e viceversa, consentendo così l'implementazione di proxies in grado di connettere una rete IoT ad Internet. Tuttavia, questa mappatura è circoscritta ai soli campi e messaggi che permettono di implementare un'architettura REST, rendendo dunque impossibile l'uso di protocolli di livello applicazione basati su HTTP.La soluzione proposta consiste nella definizione di un protocollo di compressione adattiva dei messaggi HTTP, in modo che soluzioni valide fuori dagli scenari IoT, come ad esempio scambio di messaggi generici, possano essere implementate anche in reti IoT. I risultati ottenuti mostrano inoltre che nello scenario di riferimento la compressione adattiva di messaggi HTTP raggiunge prestazioni inferiori rispetto ad altri algoritmi di compressione di intestazioni (in particolare HPACK), ma più che valide perchè le uniche applicabili attualmente in scenari IoT.
Resumo:
This paper presents a novel algorithm to successfully achieve viable integrity and authenticity addition and verification of n-frame DICOM medical images using cryptographic mechanisms. The aim of this work is the enhancement of DICOM security measures, especially for multiframe images. Current approaches have limitations that should be properly addressed for improved security. The algorithm proposed in this work uses data encryption to provide integrity and authenticity, along with digital signature. Relevant header data and digital signature are used as inputs to cipher the image. Therefore, one can only retrieve the original data if and only if the images and the inputs are correct. The encryption process itself is a cascading scheme, where a frame is ciphered with data related to the previous frames, generating also additional data on image integrity and authenticity. Decryption is similar to encryption, featuring also the standard security verification of the image. The implementation was done in JAVA, and a performance evaluation was carried out comparing the speed of the algorithm with other existing approaches. The evaluation showed a good performance of the algorithm, which is an encouraging result to use it in a real environment.
Resumo:
O presente trabalho, refere-se ao projecto de estabilidade, em betão armado e pré-esforçado, da Escola Superior de Enfermagem Artur Ravara, situada na zona da EXPO em Lisboa. O edifício apresenta-se com uma implantação em “L”, tendo como dimensões máximas 38,50m x 54,80m e desenvolve-se em altura por quatro pisos, dos quais, dois são enterrados. A estrutura do edifício em causa, apresenta duas juntas de dilatação, por forma a tornar desprezáveis os efeitos devidos à retracção e diminuição de temperatura, dividindo o edifício em três blocos. As suas fundações são indirectas, constituídas por estacas moldadas no terreno e respectivos maciços de encabeçamento. As lajes são fungiformes aligeiradas de moldes perdidos, de modo a permitir vencer maiores vãos, que variam entre os 6,60m e os 10,00m, e permitindo também maior rapidez de execução e maior economia. As consolas de 3,50m de vão, em laje maciça, são suportadas por vigas pré-esforçadas de secção variável. Para o cálculo automático da estrutura e da obtenção dos respectivos desenhos das armaduras, foi utilizado o programa de cálculo automático, Tricalc 7.1. O conteúdo do projecto em questão, sendo de carácter académico, não corresponde à versão real, à qual não se teve acesso. O dimensionamento das fundações, devido à fraca resistência dos solos e o dimensionamento da estrutura, devido à geometria e dimensões do edifício, permitiram enfrentar desafios interessantes. Tais desafios, deram possibilidade de enriquecer bastante os conhecimentos sobre a engenharia de estruturas.
Resumo:
Critical Infrastructures became more vulnerable to attacks from adversaries as SCADA systems become connected to the Internet. The open standards for SCADA Communications make it very easy for attackers to gain in-depth knowledge about the working and operations of SCADA networks. A number of Intenrnet SCADA security issues were raised that have compromised the authenticity, confidentiality, integrity and non-repudiation of information transfer between SCADA Components. This paper presents an integration of the Cross Crypto Scheme Cipher to secure communications for SCADA components. The proposed scheme integrates both the best features of symmetric and asymmetric encryptiontechniques. It also utilizes the MD5 hashing algorithm to ensure the integrity of information being transmitted.
Resumo:
Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores
Resumo:
This article is devoted to the research of channel efficiency for IP-traffic transmission over Digital Power Line Carrier channels. The application of serial WAN connections and header compression as methods to increase channel efficiency is considered. According to the results of the research an effective solution for network traffic transmission in DPLC networks was proposed.
Resumo:
Gross-to-Net is a payroll calculator modeled after the actual payroll calculation program used for state employees’ pay warrants. This calculator can be used to project changes in deduction amounts and net pay when there are changes in pay amounts, hours worked, mandatory and voluntary deductions, including all pre-tax deductions such as retirement, insurances, deferred compensation or flexible spending plans. Federal and state tax withholding, retirement rates, OASDI and Medicare (FICA), and insurance deductions are calculated using current rates on HRIS Production. The Gross-to-Net Calculator is accessed through the employee’s timesheet. For instructions on accessing the timesheet, please refer to the HRIS Time Reporting System Manual. When viewing the timesheet, enter “GN” in the header action field to go to the calculator.
Resumo:
In soccer, dead-ball moves are those in which the ball is returned to play from a stationary position following an interruption of play. The aim of this study was to analyse the effectiveness of one such dead-ball move, namely corner kicks, and to identify the key variables that determine the success of a shot or header following a corner, thereby enabling a model of successful corner kicks to be proposed. We recorded 554 corner kicks performed during the 2010 World Cup in South Africa and carried out a univariate, bivariate and multivariate analysis of the data. The results indicated that corners were of limited effectiveness in terms of the success of subsequent shots or headers. The analysis also revealed a series of variables that were significantly related to one another, and this enabled us to propose an explanatory model. Although this model had limited explanatory power, it nonetheless helps to understand the execution of corner kicks in practical terms.
Resumo:
Työssä selvitettiin perälaatikon muuttujien kuten huuliraon, huulisuihkun osumakohdan rintapöydälle, ohivirtauksen ja sivuvirtausten määrän sekä suihkusuhteen vaikutus formaatio-, neliömassa- ja kuituorientaatioprofiileihin. Analysoitiin huulisuureiden muutosten vaikutus rainanmuodostuksessa. Formaatiotasoa seurattiin koneella olevan vianilmaisinjärjestelmän mittauksen avulla ja kuituorientaatiota paperin poikkiratanäytteistä tehdyistä laboratoriomittauksista. Vianilmaisinjärjestelmän formaatiomittaus todettiin toimivaksi tarvittavan versiopäivityksen jälkeen. Selvitettiin huulisuureiden säädettävyyden ikkuna ja mahdolliset kehityskohteet. Kehitettäessä optimiprofiilien ajomallia raskaammille neliömassoille havaitsimme investointitarpeet kuten jäykempi huulilista perälaatikolle, määrämittaukset sivuvirtauksille ja tarvittavat parannukset kosteusprofiilin säätöön.
Resumo:
The goal of this thesis was to make a dimensioning tool to determine the plastic capacity of the boiler supporting header. The capacity of the header is traditionally determined by using FE-method during the project phase. By using the dimensioning tool the goal is to ensure the capacity already in the proposal phase. The study began by analyzing the headers of the ongoing projects by using FE-method. For the analytical solution a plain header was analyzed without the effects of branches or lug. The calibration of parameters in the analytical solution was made using these results. In the analytical solution the plastic capacity of the plastic hinges in the header was defined. The stresses caused by the internal pressure as well as the normal and shear forces caused by the external loading reduced the plastic moment. The final capacity was determined by using the principle of virtual work. The weakening effect of the branches was taken into account by using pressure areas. Also the capacity of the punching shear was defined. The results from the FE-analyses and the analytical solution correlate with each other. The results from the analytical solution are conservative but give correct enough results when considering the accuracy of the used method.
Resumo:
Scrap of paper that has been burned almost completely. Only the header of the document is intact. It is an estimate of work done by Messrs. Brown and McDonell, contractors on sections 1, 2 and 3 ending at St. Catharines for the months of April and May 1855.
Resumo:
Dans le but d’optimiser la représentation en mémoire des enregistrements Scheme dans le compilateur Gambit, nous avons introduit dans celui-ci un système d’annotations de type et des vecteurs contenant une représentation abrégée des enregistrements. Ces derniers omettent la référence vers le descripteur de type et l’entête habituellement présents sur chaque enregistrement et utilisent plutôt un arbre de typage couvrant toute la mémoire pour retrouver le vecteur contenant une référence. L’implémentation de ces nouvelles fonctionnalités se fait par le biais de changements au runtime de Gambit. Nous introduisons de nouvelles primitives au langage et modifions l’architecture existante pour gérer correctement les nouveaux types de données. On doit modifier le garbage collector pour prendre en compte des enregistrements contenants des valeurs hétérogènes à alignements irréguliers, et l’existence de références contenues dans d’autres objets. La gestion de l’arbre de typage doit aussi être faite automatiquement. Nous conduisons ensuite une série de tests de performance visant à déterminer si des gains sont possibles avec ces nouvelles primitives. On constate une amélioration majeure de performance au niveau de l’allocation et du comportement du gc pour les enregistrements typés de grande taille et des vecteurs d’enregistrements typés ou non. De légers surcoûts sont toutefois encourus lors des accès aux champs et, dans le cas des vecteurs d’enregistrements, au descripteur de type.