842 resultados para Security verifications
Resumo:
O presente relatório versa sobre a análise e dimensionamento de estruturas de aço enformadas a frio. Devido a serem estruturas de elevada esbelteza, frequentemente denominadas “estruturas de aço leve”, apresentam fenómenos de instabilidade tanto a nível local como global, sendo da perspetiva regulamentar abrangidas pelo Eurocódigo 3, nomeadamente pelas Partes 1-1, 1-3 e 1-5. A Parte 1-3 do Eurocódigo 3 diz respeito às regras suplementares de elementos de aço enformados a frio, na qual estão presentes as regras de dimensionamento, bem como as verificações de segurança que deverão ser aplicadas. Nesta, é possível ainda “fazer a ponte” com a Parte 1-1 do Eurocódigo 3, respetiva às regras gerais de projeto de estruturas de aço e com a Parte 1-5 do Eurocódigo 3 relativa a elementos estruturais constituídos por placas. Inicialmente, será realizado um estado da arte, onde será efetuado um enquadramento histórico, apresentando o processo de fabrico destes elementos e o tipo de elementos estruturais originados, concluindo-se com as vantagens/desvantagens dos perfis em aço enformados a frio. Os conceitos teóricos de estabilidade estrutural, os tipos de instabilidade mais comuns nestes elementos, bem como os tipos de análise destes fenómenos farão a ponte com o capítulo que se segue. Relativamente ao dimensionamento destes elementos, será dado enfâse às metodologias preconizadas pelo Eurocódigo 3, Parte 1-3. Este capítulo incidirá, entre outos, nas propriedades das secções transversais, na determinação da resistência destas, onde se contabilizará os efeitos das instabilidades locais de placa e distorcionais, na instabilidade global dos perfis e nas ligações entre os mesmos. Será analisada, posteriormente, a abordagem apresentada pela ECCS relativamente ao dimensionamento de madres travadas por painéis de cobertura. Neste capítulo será apresentada a metodologia para o dimensionamento de vigas com restrição à torção e à translação, bem como a resistência da secção transversal da madre e do seu banzo livre à encurvadura. Finalmente, e ao encontro do que foi proposto pela empresa CCAD-Serviços de Engenharia, Lda, efetuar-se-á o dimensionamento de uma cobertura de um edifício de distribuição, cobertura esta constituída por asnas treliçadas e madres simples. Neste dimensionamento foram consideradas as ações segundo o Regulamento de Segurança e Ações Para Estruturas de Edifícios e Pontes e o Eurocódigo 1, Parte 1-1 que diz respeito às Ações Gerais em Estruturas e Parte 1-4 respeitante às Ações do vento.
Resumo:
Conventional dual-rail precharge logic suffers from difficult implementations of dual-rail structure for obtaining strict compensation between the counterpart rails. As a light-weight and high-speed dual-rail style, balanced cell-based dual-rail logic (BCDL) uses synchronised compound gates with global precharge signal to provide high resistance against differential power or electromagnetic analyses. BCDL can be realised from generic field programmable gate array (FPGA) design flows with constraints. However, routings still exist as concerns because of the deficient flexibility on routing control, which unfavourably results in bias between complementary nets in security-sensitive parts. In this article, based on a routing repair technique, novel verifications towards routing effect are presented. An 8 bit simplified advanced encryption processing (AES)-co-processor is executed that is constructed on block random access memory (RAM)-based BCDL in Xilinx Virtex-5 FPGAs. Since imbalanced routing are major defects in BCDL, the authors can rule out other influences and fairly quantify the security variants. A series of asymptotic correlation electromagnetic (EM) analyses are launched towards a group of circuits with consecutive routing schemes to be able to verify routing impact on side channel analyses. After repairing the non-identical routings, Mutual information analyses are executed to further validate the concrete security increase obtained from identical routing pairs in BCDL.
Resumo:
To describe the clinical history of a child with aggressive behavior and recurring death-theme speech, and report the experience of the team of authors, who proposed an alternative to medication through the establishment of a protection network and the inter-sector implementation of the circle of security concept. A 5-year-old child has a violent and aggressive behavior at the day-care. The child was diagnosed by the healthcare center with depressive disorder and behavioral disorder, and was medicated with sertraline and risperidone. Side effects were observed, and the medications were discontinued. Despite several actions, such as talks, teamwork, psychological and psychiatric follow-up, the child's behavior remained unchanged. A unique therapeutic project was developed by Universidade Estadual de Campinas' Medical School students in order to establish a connection between the entities responsible for the child's care (daycare center, healthcare center, and family). Thus, the team was able to develop a basic care protection network. The implementation of the inter-sector circle of security, as well as the communication and cooperation among the teams, produced very favorable results in this case. This initiative was shown to be a feasible and effective alternative to the use of medication for this child.
Resumo:
Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case
Resumo:
Australia is an increasingly important ally for the United States. It is willing to be part of challenging global missions, and its strong economy and growing self-confi dence suggest a more prominent role in both global and regional affairs. Moreover, its government has worked hard to strengthen the link between Canberra and Washington. Political and strategic affi nities between the two countries have been refl ected in--and complemented by--practiced military interoperability, as the two allies have sustained a pattern of security cooperation in relation to East Timor, Afghanistan and Iraq in the last 4 years. This growing collaboration between the two countries suggests that a reinvention of the traditional bilateral security relationship is taking place. At the core of this process lies an agreement about the need for engaging in more proactive strategic behavior in the changing global security environment, and a mutual acceptance of looming military and technological interdependence. But this new alliance relationship is already testing the boundaries of bipartisan support for security policy within Australia. Issues of strategic doctrine, defense planning, and procurement are becoming topics of fi erce policy debate. Such discussion is likely to be sharpened in the years ahead as Australia’s security relationship with the United States settles into a new framework.
Resumo:
Unauthorized accesses to digital contents are serious threats to international security and informatics. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption.