22 resultados para changeability


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have secure channels between shareholders. In contrast, we show how to increase the threshold parameter of the standard CRT secret-sharing scheme without secure channels between the shareholders. Our method can thus be applied to existing CRT schemes even if they were set up without consideration to future threshold increases. Our method is a positive cryptographic application for lattice reduction algorithms, and we also use techniques from lattice theory (geometry of numbers) to prove statements about the correctness and information-theoretic security of our constructions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (Geometry of Numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The management of models over time in many domains requires different constraints to apply to some parts of the model as it evolves. Using EMF and its meta-language Ecore, the development of model management code and tools usually relies on the meta- model having some constraints, such as attribute and reference cardinalities and changeability, set in the least constrained way that any model user will require. Stronger versions of these constraints can then be enforced in code, or by attaching additional constraint expressions, and their evaluations engines, to the generated model code. We propose a mechanism that allows for variations to the constraining meta-attributes of metamodels, to allow enforcement of different constraints at different lifecycle stages of a model. We then discuss the implementation choices within EMF to support the validation of a state-specific metamodel on model graphs when changing states, as well as the enforcement of state-specific constraints when executing model change operations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Based on the three-dimensional elastic inclusion model proposed by Dobrovolskii, we developed a rheological inclusion model to study earthquake preparation processes. By using the Corresponding Principle in the theory of rheologic mechanics, we derived the analytic expressions of viscoelastic displacement U(r, t) , V(r, t) and W(r, t), normal strains epsilon(xx) (r, t), epsilon(yy) (r, t) and epsilon(zz) (r, t) and the bulk strain theta (r, t) at an arbitrary point (x, y, z) in three directions of X axis, Y axis and Z axis produced by a three-dimensional inclusion in the semi-infinite rheologic medium defined by the standard linear rheologic model. Subsequent to the spatial-temporal variation of bulk strain being computed on the ground produced by such a spherical rheologic inclusion, interesting results are obtained, suggesting that the bulk strain produced by a hard inclusion change with time according to three stages (alpha, beta, gamma) with different characteristics, similar to that of geodetic deformation observations, but different with the results of a soft inclusion. These theoretical results can be used to explain the characteristics of spatial-temporal evolution, patterns, quadrant-distribution of earthquake precursors, the changeability, spontaneity and complexity of short-term and imminent-term precursors. It offers a theoretical base to build physical models for earthquake precursors and to predict the earthquakes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Based on the three-dimensional elastic inclusion model proposed by Dobrovolskii, we developed a rheological inclusion model to study earthquake preparation processes. By using the Corresponding Principle in the theory of rheologic mechanics, we derived the analytic expressions of viscoelastic displacement U(r, t) , V(r, t) and W(r, t), normal strains epsilon(xx) (r, t), epsilon(yy) (r, t) and epsilon(zz) (r, t) and the bulk strain theta (r, t) at an arbitrary point (x, y, z) in three directions of X axis, Y axis and Z axis produced by a three-dimensional inclusion in the semi-infinite rheologic medium defined by the standard linear rheologic model. Subsequent to the spatial-temporal variation of bulk strain being computed on the ground produced by such a spherical rheologic inclusion, interesting results are obtained, suggesting that the bulk strain produced by a hard inclusion change with time according to three stages (alpha, beta, gamma) with different characteristics, similar to that of geodetic deformation observations, but different with the results of a soft inclusion. These theoretical results can be used to explain the characteristics of spatial-temporal evolution, patterns, quadrant-distribution of earthquake precursors, the changeability, spontaneity and complexity of short-term and imminent-term precursors. It offers a theoretical base to build physical models for earthquake precursors and to predict the earthquakes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A time-varying controllable fault-tolerant field associative memory model and the realization algorithms are proposed. On the one hand, this model simulates the time-dependent changeability character of the fault-tolerant field of human brain's associative memory. On the other hand, fault-tolerant fields of the memory samples of the model can be controlled, and we can design proper fault-tolerant fields for memory samples at different time according to the essentiality of memory samples. Moreover, the model has realized the nonlinear association of infinite value pattern from n dimension space to m dimension space. And the fault-tolerant fields of the memory samples are full of the whole real space R-n. The simulation shows that the model has the above characters and the speed of associative memory about the model is faster.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manually by network administrators. The development and management of these enforcement policies is a difficult and error prone task. This thesis describes the development and evaluation of an off-line firewall policy parser and validation tool. This provides the system administrator with a textual interface and the vendor specific low level languages they trust and are familiar with, but the support of an off-line compiler tool. The tool was created using the Microsoft C#.NET language, and the Microsoft Visual Studio Integrated Development Environment (IDE). This provided an object environment to create a flexible and extensible system, as well as simple Web and Windows prototyping facilities to create GUI front-end applications for testing and evaluation. A CLI was provided with the tool, for more experienced users, but it was also designed to be easily integrated into GUI based applications for non-expert users. The evaluation of the system was performed from a custom built GUI application, which can create test firewall rule sets containing synthetic rules, to supply a variety of experimental conditions, as well as record various performance metrics. The validation tool was created, based around a pragmatic outlook, with regard to the needs of the network administrator. The modularity of the design was important, due to the fast changing nature of the network device languages being processed. An object oriented approach was taken, for maximum changeability and extensibility, and a flexible tool was developed, due to the possible needs of different types users. System administrators desire, low level, CLI-based tools that they can trust, and use easily from scripting languages. Inexperienced users may prefer a more abstract, high level, GUI or Wizard that has an easier to learn process. Built around these ideas, the tool was implemented, and proved to be a usable, and complimentary addition to the many network policy-based systems currently available. The tool has a flexible design and contains comprehensive functionality. As opposed to some of the other tools which perform across multiple vendor languages, but do not implement a deep range of options for any of the languages. It compliments existing systems, such as policy compliance tools, and abstract policy analysis systems. Its validation algorithms were evaluated for both completeness, and performance. The tool was found to correctly process large firewall policies in just a few seconds. A framework for a policy-based management system, with which the tool would integrate, is also proposed. This is based around a vendor independent XML-based repository of device configurations, which could be used to bring together existing policy management and analysis systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In order to present and understand the nature of modern terrorism it is important to realize its key properties as well the mechanisms that shape terrorism. Selected properties and mechanisms shaping modern terrorism which can be exemplified by the following: evolutionary nature of terrorism, asymmetry of terrorism, interferentiality of terrorism, multitude of components of terrorism, diffusion of terrorism, duality of terrorism, positive dimension of terrorism, terrorist as the system, diversity of terrorist activity goals, changeability of terrorist threat, the broad and narrow dimension of terrorism, counter-anti-terrorism, the confrontational and cooperational character of relations, calculation and operational strategy, disintegrational nature of terrorism, multidisciplinarity of terrorism, horizontal and vertical dimension of terrorism and a the few other traits or mechanisms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Metal-organic frameworks (MOFs) obtained much attention because of their unusual structures and properties as well as their potential applications. This dissertation research was focused on (1) the effects of synthesis conditions on the structures of MOFs, (2) the thermal stability of MOFs, (3) pressure-induced amorphization, and (4) the effect of high-valent ions on the structure of a MOF. This research demonstrated that the crystal structure of MOF-5 could be controlled by drying solvents. If the vacuum solvent is dimethylformamide (DMF), the crystal structure of MOF-5 is tetragonal. In contrast, if the DMF is displaced by CH2Cl2 before the vacuum, the obtained MOF-5 occupies a cubic structure. Furthermore, it was found that the tetragonal MOF-5 exhibited a mediate surface area (300-1000 m2/g). The surface area of tetragonal MOF-5 is also dependent on Zn(NO3)2/H2BDC (H2BDC: terephthalic acid) molar ratios used for its synthesis. The optimum ratio is 1.38, at which synthesized tetragonal MOF-5 exhibits the highest crystallinity and surface area (1297 m2/g). The thermal stability and decomposition of MOF-5 were systematically investigated. The thermal decomposition of cubic and tetragonal MOF-5s resulted in the same products: CO2, benzene, amorphous carbon, and crystal ZnO. The thermal decomposition is due to breaking carboxylic bridges between benzene rings and Zn4O clusters. Identifying structural relationships between crystalline and noncrystalline states is of fundamental interest in materials research. Currently, amorphization of solid materials at ambient temperature requires an ultra-high pressure (several GPa). However, this research demonstrated that MOF-5 and IRMOF-8 can be irreversibly amorphized at ambient temperature by employing a low compressing pressure of 3.5 MPa, which is 100 times lower than that required for amorphization of other solids. Furthermore, the pressure-induced amorphization (PIA) of MOFs is strongly dependent on the changeability of bond angles. If the geometric structure of a MOF can allow bond angles to be changed without breaking bonds, it can easily be amorphized by compression. This can explain why MOF-5 and IRMOF-8 can easily be amorphized via compression than Cu-BTC. It is generally recognized that zeolitic imidazolate frameworks (ZIFs) occupy much higher stability than other types of MOFs. The representative of ZIFs is Zn(2-methylimidazole)2 (ZIF-8) exhibiting high-decomposition temperature and high chemical resistance to various solvents. However, so far, it is still unknown whether the high stability of ZIF-8 can be challenged by ions, which is important for its modification by doping ions. In this research, we performed aqueous salt solution treatment on ZIF-8, and the results showed that anions (Cl¯ and NO3¯) in a solution exhibited no effect on the crystal structure of ZIF-8. However, the effect of cations (in a solution) on structure of ZIF-8 strongly depends on the cation valences. The univalent metal cations showed no effect on the structure of ZIF-8, whereas the bivalent or higher-valent metal cations caused the collapse of ZIF-8 crystal structure. Therefore, structure stability of ZIF-8 is considered when it is subjected to the application, in which high-valent metal cations are involved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aufgrund stetig wechselnder Leistungsanforderungen volatiler Märkte ist die Flexibilisierung des in-nerbetrieblichen Materialflusses eine Notwendigkeit. Klassische Fördermittel, wie zentral gesteuerte Stetig-fördertechniksysteme, stoßen dabei an ihre Grenzen. Auch die planerische Auslegung von starren Material-flusssystemen ist damit vor eine nicht lösbare Aufgabe gestellt. Zellulare Intralogistiksysteme sind die heutigen Antworten auf diese Anforderungen. Die Zellularen Transportfahrzeuge „Multishuttle Move“ sollen Stetigfördersysteme und manuelle Transporte dort ablösen, wo ein hohes Maß an Flexibilität und Wandelbarkeit gefragt ist, die Planungssicherheit nicht gewährleistet ist oder aufgrund mangelnder Flexibilität nicht automatisiert werden kann. In diesem Beitrag werden diese Systeme vorgestellt und deren Eigenschaften aufgezeigt.