21 resultados para NVD


Relevância:

20.00% 20.00%

Publicador:

Resumo:

基于中国的现状,NVD作为红光高清技术更具有切实可行性,介绍了NVD的由来、技术路线及发展计划。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For an n(t) transmit, nr receive antenna (n(t) x n(r)) MIMO system with quasi- static Rayleigh fading, it was shown by Elia et al. that space-time block code-schemes (STBC-schemes) which have the non-vanishing determinant (NVD) property and are based on minimal-delay STBCs (STBC block length equals n(t)) with a symbol rate of n(t) complex symbols per channel use (rate-n(t) STBC) are diversity-multiplexing gain tradeoff (DMT)-optimal for arbitrary values of n(r). Further, explicit linear STBC-schemes (LSTBC-schemes) with the NVD property were also constructed. However, for asymmetric MIMO systems (where n(r) < n(t)), with the exception of the Alamouti code-scheme for the 2 x 1 system and rate-1, diagonal STBC-schemes with NVD for an nt x 1 system, no known minimal-delay, rate-n(r) LSTBC-scheme has been shown to be DMT-optimal. In this paper, we first obtain an enhanced sufficient criterion for an STBC-scheme to be DMT optimal and using this result, we show that for certain asymmetric MIMO systems, many well-known LSTBC-schemes which have low ML-decoding complexity are DMT-optimal, a fact that was unknown hitherto.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For any n(t) transmit, n(r) receive antenna (n(t) x n(r)) multiple-input multiple-output (MIMO) system in a quasi-static Rayleigh fading environment, it was shown by Elia et al. that linear space-time block code schemes (LSTBC schemes) that have the nonvanishing determinant (NVD) property are diversity-multiplexing gain tradeoff (DMT)-optimal for arbitrary values of n(r) if they have a code rate of n(t) complex dimensions per channel use. However, for asymmetric MIMO systems (where n(r) < n(t)), with the exception of a few LSTBC schemes, it is unknown whether general LSTBC schemes with NVD and a code rate of n(r) complex dimensions per channel use are DMT optimal. In this paper, an enhanced sufficient criterion for any STBC scheme to be DMT optimal is obtained, and using this criterion, it is established that any LSTBC scheme with NVD and a code rate of min {n(t), n(r)} complex dimensions per channel use is DMT optimal. This result settles the DMT optimality of several well-known, low-ML-decoding-complexity LSTBC schemes for certain asymmetric MIMO systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, a new method is proposed to obtain full-diversity, rate-2 (rate of two complex symbols per channel use) space-time block codes (STBCs) that are full-rate for multiple input double output (MIDO) systems. Using this method, rate-2 STBCs for 4 x 2, 6 x 2, 8 x 2, and 12 x 2 systems are constructed and these STBCs are fast ML-decodable, have large coding gains, and STBC-schemes consisting of these STBCs have a non-vanishing determinant (NVD) so that they are DMT-optimal for their respective MIDO systems. It is also shown that the Srinath-Rajan code for the 4 x 2 system, which has the lowest ML-decoding complexity among known rate-2 STBCs for the 4x2 MIDO system with a large coding gain for 4-/16-QAM, has the same algebraic structure as the STBC constructed in this paper for the 4 x 2 system. This also settles in positive a previous conjecture that the STBC-scheme that is based on the Srinath-Rajan code has the NVD property and hence is DMT-optimal for the 4 x 2 system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thiazolyl heterocyclic azo dye and its metal (Ni2+, Co2+)-azo complexes were synthesized. Their structures were confirmed by elemental analysis, UV-VIS absorption spectra, FT-IR, H-1 NMR and MALDI-MS. The thermal properties of metal complexes were studied by DSC-TGA. The optical constants (complex refractive index N=n + ik) and thickness of the complex thin films on polished single-crystal silicon substrates were investigated on a scanning ellipsometer. Results indicate that thiazolyl metal-azo complexes possess good optical and thermal properties. They would be a promising recording medium candidate for NVD with the Super-resolution near field structure (Super-RENS) technology. (c) 2007 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

合成了2-(2-氨基-6-乙氧基苯并噻唑基偶氮)-5-(N,N-二乙基氨基)三氟甲基磺酰苯胺偶氮染料(EBTDATFS)及其与乙酸镍、乙酸钴、乙酸铜、乙酸锌等金属盐鏊合的金属鏊合物。通过红外光谱、紫外-可见吸收光谱和MALDI质谱等对染料及其金属鏊合物进行了结构表征;使用旋涂方法在K9玻璃和抛光的单晶硅基片上制备薄膜;研究了镍金属鏊合物的热学性能;使用椭偏仪研究了Ni和Zn鏊合物的光学常数。结果表明:4种金属鏊合物薄膜最大吸收光谱为621-629nm,且长波边吸收峰陡峭;TGA-DSC测试结果表明镍金属鏊

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pós-graduação em Agronomia (Energia na Agricultura) - FCA

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: To describe and evaluate psychosocial factors in nonorganic voice disorders (NVDs). Nonorganic voice disorders are presumed to be the result of increased muscular tension that is caused to varying extents by vocal misuse and emotional stress. It is therefore necessary to include both of these in the diagnosis and treatment of patients with voice disorders. DESIGN: Clinical survey. SETTING: Academic tertiary referral center. PATIENTS: To evaluate psychosocial factors in NVDs, a sample of 74 patients with NVDs was examined psychologically using the Giessen Test and Picture Frustration Test. The results were compared with a control group of 19 patients with an organic dysphonia (vocal cord paralysis). MAIN OUTCOME MEASURES: Six scales of the Giessen Test (social response, dominance, control, underlying mood, permeability, and social potency), 3 reaction types of the Picture Frustration Test (obstacle dominance, ego defense, and need persistence), and 3 aggression categories of the Picture Frustration Test (extrapunitivity, intropunitivity, and impunitivity). RESULTS: The most striking significant difference between the 2 groups was that in conflict situations, patients with NVDs sought a quick solution or expected other people to provide one, which prevented them from understanding the underlying causes of the conflict. CONCLUSIONS: Only if the psychosocial aspects are taken into account can patients with NVD be offered a therapy that treats the causes of the voice disorder. It must be decided individually whether and when a voice training approach or a more psychological-psychotherapeutical approach is preferable.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Children with nonorganic voice disorders (NVDs) are treated mainly using direct voice therapy techniques such as the accent method or glottal attack changes and indirect methods such as vocal hygiene and voice education. However, both approaches tackle only the symptoms and not etiological factors in the family dynamics and therefore often enjoy little success. The aim of the "Bernese Brief Dynamic Intervention" (BBDI) for children with NVD was to extend the effectiveness of pediatric voice therapies with a psychosomatic concept combining short-term play therapy with the child and family dynamic counseling of the parents. This study compares the therapeutic changes in three groups where different procedures were used, before intervention and 1 year afterward: counseling of parents (one to two consultations; n = 24), Brief Dynamic Intervention on the lines of the BBDI (three to five play therapy sessions with the child plus two to four sessions with the parents; n = 20), and traditional voice therapy (n = 22). A Voice Questionnaire for Parents developed by us with 59 questions to be answered on a four-point Likert scale was used to measure the change. According to the parents' assessment, a significant improvement in voice quality was achieved in all three methods. Counseling of parents (A) appears to have led parents to give their child more latitude, for example, they stopped nagging the child or demanding that he/she should behave strictly by the rules. After BBDI (B), the mothers were more responsive to their children's wishes and the children were more relaxed and their speech became livelier. At home, they called out to them less often at a distance, which probably improved parent-child dialog. Traditional voice therapy (C) seems to have had a positive effect on the children's social competence. BBDI seems to have the deepest, widest, and therefore probably the most enduring therapeutic effect on children with NVD.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Federal Highway Administration, Structures and Applied Mechanics Division, Washington, D.C.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Federal Highway Administration, Structures and Applied Mechanics Division, Washington, D.C.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Federal Highway Administration, Structures and Applied Mechanics Division, Washington, D.C.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Federal Highway Administration, Structures and Applied Mechanics Division, Washington, D.C.