978 resultados para copy protection


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Movie distribution on the Internet has become more common in recent years along with fast broadband internet connections. The problem so far has been that the greatest part of movie distribution on the Internet has been illegal. This is about to change because the major film distributors are finally starting to rent and sell movies more and more on the Internet due to their growing confidence in new copy protection methods. The importance of movie online distribution to the movie industry is still tiny but it is increasing rapidly as is investing in new business models and distribution methods in the USA and Europe. This thesis examines the basic concepts of online movie distribution, such as distribution techniques and copy protection, the main companies that rent and sell movies on the internet and their business models, the effects of movie piracy and non-commercial distribution channels. The intention was to provide the reader with an overview of different aspects of movie distribution on the Internet and its future. The conclusion was that movie distribution on the Internet will play a bigger financial part in the future although it was still too early to say just how significant that will be. We will probably see many corresponding distribution techniques, like peer-to-peer networks and streaming servers distributing and broadcasting movies to different end-user platforms like television, PC and portable media players. Internet distribution of movies will not revolutionize movie distribution in the next couple of years but it will make possible new efficient and inexpensive ways to distribute movies globally which will in turn increase the possibilities for revenue, especially for small independent movie producers and distributors.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ohjelmistojen tietoturva on noussut viime aikoina entistä tärkeämpään rooliin. Ohjelmistojen suunnittelu pitää alusta alkaen hoitaa siten, että tietoturva tulee huomioitua. Ohjelman helppokäyttöisyys ei saisi ajaa tietoturvan edelle, eikä myöskään ohjeiden lukematta jättäminen saa tarkoittaa tietoturvan menetystä. Tärkeä osa ohjelmistojen tietoturvaa on myös ohjelmiston laillinen käyttö. Se miten laiton käyttö estetään sen sijaan on erittäin vaikeaa toteuttaa nykyjärjestelmissä. Työn tarkoituksena oli tutkia Intellitel Communications Oy:n sanomayhdyskäytävää, Intellitel Messaging Gateway, tuotetietoturvan näkökulmasta, löytää sieltä mahdolliset virheet ja myös korjata ne.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Presently different audio watermarking methods are available; most of them inclined towards copyright protection and copy protection. This is the key motive for the notion to develop a speaker verification scheme that guar- antees non-repudiation services and the thesis is its outcome. The research presented in this thesis scrutinizes the field of audio water- marking and the outcome is a speaker verification scheme that is proficient in addressing issues allied to non-repudiation to a great extent. This work aimed in developing novel audio watermarking schemes utilizing the fun- damental ideas of Fast-Fourier Transform (FFT) or Fast Walsh-Hadamard Transform (FWHT). The Mel-Frequency Cepstral Coefficients (MFCC) the best parametric representation of the acoustic signals along with few other key acoustic characteristics is employed in crafting of new schemes. The au- dio watermark created is entirely dependent to the acoustic features, hence named as FeatureMark and is crucial in this work. In any watermarking scheme, the quality of the extracted watermark de- pends exclusively on the pre-processing action and in this work framing and windowing techniques are involved. The theme non-repudiation provides immense significance in the audio watermarking schemes proposed in this work. Modification of the signal spectrum is achieved in a variety of ways by selecting appropriate FFT/FWHT coefficients and the watermarking schemes were evaluated for imperceptibility, robustness and capacity char- acteristics. The proposed schemes are unequivocally effective in terms of maintaining the sound quality, retrieving the embedded FeatureMark and in terms of the capacity to hold the mark bits. Robust nature of these marking schemes is achieved with the help of syn- chronization codes such as Barker Code with FFT based FeatureMarking scheme and Walsh Code with FWHT based FeatureMarking scheme. An- other important feature associated with this scheme is the employment of an encryption scheme towards the preparation of its FeatureMark that scrambles the signal features that helps to keep the signal features unreve- laed. A comparative study with the existing watermarking schemes and the ex- periments to evaluate imperceptibility, robustness and capacity tests guar- antee that the proposed schemes can be baselined as efficient audio water- marking schemes. The four new digital audio watermarking algorithms in terms of their performance are remarkable thereby opening more opportu- nities for further research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Computer programs have been developed to enable the coordination of fuses and overcurrent relays for radial power systems under estimated fault current conditions. The grading curves for these protection devices can be produced on a graphics terminal and a hard copy can be obtained. Additional programs have also been developed which could be used to assess the validity of relay settings (obtained under the above conditions) when the transient effect is included. Modelling of a current transformer is included because transformer saturation may occur if the fault current is high, and hence the secondary current is distorted. Experiments were carried out to confirm that distorted currents will affect the relay operating time, and it is shown that if the relay current contains only a small percentage of harmonic distortion, the relay operating time is increased. System equations were arranged to enable the model to predict fault currents with a generator transformer incorporated in the system, and also to include the effect of circuit breaker opening, arcing resistance, and earthing resistance. A fictitious field winding was included to enable more accurate prediction of fault currents when the system is operating at both lagging and leading power factors prior to the occurrence of the fault.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Quantification of dermal exposure to pesticides in rural workers, used in risk assessment, can be performed with different techniques such as patches or whole body evaluation. However, the wide variety of methods can jeopardize the process by producing disparate results, depending on the principles in sample collection. A critical review was thus performed on the main techniques for quantifying dermal exposure, calling attention to this issue and the need to establish a single methodology for quantification of dermal exposure in rural workers. Such harmonization of different techniques should help achieve safer and healthier working conditions. Techniques that can provide reliable exposure data are an essential first step towards avoiding harm to workers' health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Severe accidents caused by the armed spider Phoneutria nigriventer cause neurotoxic manifestations in victims. In experiments with rats, P. nigriventer venom (PNV) temporarily disrupts the properties of the BBB by affecting both the transcellular and the paracellular route. However, it is unclear how cells and/or proteins participate in the transient opening of the BBB. The present study demonstrates that PNV is a substrate for the multidrug resistance protein-1 (MRP1) in cultured astrocyte and endothelial cells (HUVEC) and increases mrp1 and cx43 and down-regulates glut1 mRNA transcripts in cultured astrocytes. The inhibition of nNOS by 7-nitroindazole suggests that NO derived from nNOS mediates some of these effects by either accentuating or opposing the effects of PNV. In vivo, MRP1, GLUT1 and Cx43 protein expression is increased differentially in the hippocampus and cerebellum, indicating region-related modulation of effects. PNV contains a plethora of Ca(2+), K(+) and Na(+) channel-acting neurotoxins that interfere with glutamate handling. It is suggested that the findings of the present study are the result of a complex interaction of signaling pathways, one of which is the NO, which regulates BBB-associated proteins in response to PNV interference on ions physiology. The present study provides additional insight into PNV-induced BBB dysfunction and shows that a protective mechanism is activated against the venom. The data shows that PNV has qualities for potential use in drug permeability studies across the BBB.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To describe the clinical history of a child with aggressive behavior and recurring death-theme speech, and report the experience of the team of authors, who proposed an alternative to medication through the establishment of a protection network and the inter-sector implementation of the circle of security concept. A 5-year-old child has a violent and aggressive behavior at the day-care. The child was diagnosed by the healthcare center with depressive disorder and behavioral disorder, and was medicated with sertraline and risperidone. Side effects were observed, and the medications were discontinued. Despite several actions, such as talks, teamwork, psychological and psychiatric follow-up, the child's behavior remained unchanged. A unique therapeutic project was developed by Universidade Estadual de Campinas' Medical School students in order to establish a connection between the entities responsible for the child's care (daycare center, healthcare center, and family). Thus, the team was able to develop a basic care protection network. The implementation of the inter-sector circle of security, as well as the communication and cooperation among the teams, produced very favorable results in this case. This initiative was shown to be a feasible and effective alternative to the use of medication for this child.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Isatin, an indole alkaloid has been shown to have anti-microbial, anti-tumor and anti-inflammatory effects. Due to its findings, we evaluated whether this alkaloid would have any effect on TNBS-induced colitis. Animals (male Unib:WH rats, aged 8 weeks old) were induced colitis through a rectal administration of 2,4,6-trinitrobenzene sulphonic acid using a catheter inserted 8 cm into the rectum of the animals. The rats were divided into two major groups: non-colitic and colitic. The colitic group was sub-divided into 6 groups (10 animals per group): colitic non-treated, Isatin 3; 6; 12.5; 18.75 and 25 mg/kg. Our main results showed that the oral treatment with Isatin 6 and 25 mg/kg were capable of avoiding the increase in TNF-α, COX-2 and PGE₂ levels when compared to the colitic non-treated group. Interestingly, the same doses (6 and 25 mg/kg) were also capable of preventing the decrease in IL-10 levels comparing with the colitic non-treated group. The levels of MPO, (an indirect indicator of neutrophil presence), were also maintained lower than those of the colitic non-treated group. Isatin also prevented the decrease of SOD activity and increase of GSH-Px and GSH-Rd activity as well as the depletion of GSH levels. In conclusion, both pre-treatments (6 and 25 mg/kg) were capable of protecting the gut mucosa against the injury caused by TNBS, through the combination of antioxidant and anti-inflammatory properties, which, together, showed a protective activity of the indole alkaloid Isatin.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is well known that trichomes protect plant organs, and several studies have investigated their role in the adaptation of plants to harsh environments. Recent studies have shown that the production of hydrophilic substances by glandular trichomes and the deposition of this secretion on young organs may facilitate water retention, thus preventing desiccation and favouring organ growth until the plant develops other protective mechanisms. Lychnophora diamantinana is a species endemic to the Brazilian 'campos rupestres' (rocky fields), a region characterized by intense solar radiation and water deficits. This study sought to investigate trichomes and the origin of the substances observed on the stem apices of L. diamantinana. Samples of stem apices, young and expanded leaves were studied using standard techniques, including light microscopy and scanning and transmission electron microscopy. Histochemical tests were used to identify the major groups of metabolites present in the trichomes and the hyaline material deposited on the apices. Non-glandular trichomes and glandular trichomes were observed. The material deposited on the stem apices was hyaline, highly hydrophilic and viscous. This hyaline material primarily consists of carbohydrates that result from the partial degradation of the cell wall of uniseriate trichomes. This degradation occurs at the same time that glandular trichomes secrete terpenoids, phenolic compounds and proteins. These results suggest that the non-glandular trichomes on the leaves of L. diamantinana help protect the young organ, particularly against desiccation, by deposition of highly hydrated substances on the apices. Furthermore, the secretion of glandular trichomes probably repels herbivore and pathogen attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Silver nanoparticles have attracted considerable attention due to their beneficial properties. But toxicity issues associated with them are also rising. The reports in the past suggested health hazards of silver nanoparticles at the cellular, molecular, or whole organismal level in eukaryotes. Whereas, there is also need to examine the exposure effects of silver nanoparticle to the microbes, which are beneficial to humans as well as environment. The available literature suggests the harmful effects of physically and chemically synthesised silver nanoparticles. The toxicity of biogenically synthesized nanoparticles has been less studied than physically and chemically synthesised nanoparticles. Hence, there is a greater need to study the toxic effects of biologically synthesised silver nanoparticles in general and mycosynthesized nanoparticles in particular. In the present study, attempts have been made to assess the risk associated with the exposure of mycosynthesized silver nanoparticles on a beneficial soil microbe Pseudomonas putida. KT2440. The study demonstrates mycosynthesis of silver nanoparticles and their characterisation by UV-vis spectrophotometry, FTIR, X-ray diffraction, nanosight LM20 - a particle size distribution analyzer and TEM. Silver nanoparticles obtained herein were found to exert the hazardous effect at the concentration of 0.4μg/ml, which warrants further detailed investigations concerning toxicity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Metastasizing pleomorphic adenoma (MPA) is a rare tumour, and its mechanism of metastasis still is unknown. To date, there has been no study on MPA genomics. We analysed primary and secondary MPAs with array comparative genomic hybridization to identify somatic copy number alterations and affected genes. Tumour DNA samples from primary (parotid salivary gland) and secondary (scalp skin) MPAs were subjected to array comparative genomic hybridization investigation, and the data were analysed with NEXUS COPY NUMBER DISCOVERY. The primary MPA showed copy number losses affecting 3p22.2p14.3 and 19p13.3p123, and a complex pattern of four different deletions at chromosome 6. The 3p deletion encompassed several genes: CTNNB1, SETD2, BAP1, and PBRM1, among others. The secondary MPA showed a genomic profile similar to that of the primary MPA, with acquisition of additional copy number changes affecting 9p24.3p13.1 (loss), 19q11q13.43 (gain), and 22q11.1q13.33 (gain). Our findings indicated a clonal origin of the secondary MPA, as both tumours shared a common profile of genomic copy number alterations. Furthermore, we were able to detect in the primary tumour a specific pattern of copy number alterations that could explain the metastasizing characteristic, whereas the secondary MPA showed a more unbalanced genome.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sunlight exposure causes several types of injury to humans, especially on the skin; among the most common harmful effects due to ultraviolet (UV) exposure are erythema, pigmentation and lesions in DNA, which may lead to cancer. These long-term effects are minimized with the use of sunscreens, a class of cosmetic products that contains UV filters as the main component in the formulation; such molecules can absorb, reflect or diffuse UV rays, and can be used alone or as a combination to broaden the protection on different wavelengths. Currently, worldwide regulatory agencies define which ingredients and what quantities must be used in each country, and enforce companies to conduct tests that confirm the Sun Protection Factor (SPF) and the UVA (Ultraviolet A) factor. Standard SPF determination tests are currently conducted in vivo, using human subjects. In an industrial mindset, apart from economic and ethical reasons, the introduction of an in vitro method emerges as an interesting alternative by reducing risks associated to UV exposure on tests, as well as providing assertive analytical results. The present work aims to describe a novel methodology for SPF determination directly from sunscreen formulations using the previously described cosmetomics platform and mass spectrometry as the analytical methods of choice.