1,463 research outputs found

    Multifactor Authentication for Enhanced Accesss Control Security for Websites

    Get PDF
    Nowadays, computer security becomes a major issue for users and developers. Security experts and developers are working together to bridge the security gaps by the realistic diagnosis of threats. They try to find the best ways to apply reasonable solutions in regard to cost, time, and usability. The issue of security has become one of the Common Era concerns. Users are divided into two groups, firstly, computer users, secondly, internet users (website users). Website's users do not like to buy expensive or sophisticated devices, and they just want to access their data in the safety way possible. This research sheds light upon enhancing the access control of websites by employing mobile phone and email features to serve this purpose. The system using the ordinary username and password for user login, and the PassCode. It is generated for every login request. This PassCode has a special scenario, firstly, using email to send the encrypted PassCode to the user, secondly decrypt the PassCode before use it to login by an application installed on the user's mobile phone. Moreover, there are other features added to the system expired of password and Bluetooth device address of the mobile phone. The latter is used as identification to the user, to reach a high level of confidentiality

    Symbolic Analysis of Large-Scale Networks

    Get PDF
    A new approach to the problem of symbolic circuit analysis of large-scale circuits is presented in this report. The methodology has been implemented in a computer program called SCAPP (Symbolic Circuit Analysis Program with Partitioning). The method solves the problem by utilizing a hierarchical network approach and the sequence of expressions concept rather than a topological approach and the single expression idea which have dominated symbolic analysis in the past. The method employs further modifications to the modified nodal analysis (MNA) technique by allowing ideal opamps in the matrix formulation process and introducing the reduced modified analysis matrix (RMNA). The analysis algorithm is most efficient when network partitioning is used. A node-tearing binary partitioning algorithm based on the concepts of loop index and tearing index is also presented. The partitioning technique is very suitable for the hierarchical network analysis approach

    A Study of a Semi-Direct Method for Computer Analysis of Large-Scale Circuits

    Get PDF
    In this thesis a study of a Semi-Direct method for the solution of large scale circuits is presented. The method combines features from the Newton- Raphson method and the Gauss-Seidel method. These two methods are both illustrated. The Semi-Direct method is presented both theoretically and empirically using three programs developed for this purpose. The Semi-Direct method and the Newton-Raphson method are compared. The comparison includes speed (number of iterations and execution time) and storage requirements. The Semi-Direct method definitely has storage advantages over the Newton-Raphson method at all circuit levels of 2 or more nodes. If some set conditions are met in the circuit, the Semi-Direct method will require less CPU time to reach the solution than the Newton-Raphson metho

    Individual descriptive record system

    Get PDF
    An electronic individual descriptive record system for storing the individual\u27s identification and descriptive data on a programmable electronic identification and data storage module carried with the individual so that the individual\u27s identification, the individual\u27s descriptive data and the individual itself become one. The system includes an implantable programmable electronic identification and data storage module carried by the individual, and a reading and recording device which communicates with the electronic identification and data storage module

    The Diagnostic of Cervical Carcinoma: From Theory to Practice

    Get PDF
    Human papillomaviruses (HPV) are naked particles composed of 72 subunits, each formed by 2 structural proteins designated L1 and L2 (L = late). HPV does not grow outside of squamous epithelium cells, in which it infects the suprabasal prickle cell layer. The viral double-stranded DNA (vDNA) has about 8 kilobase pairs (kbp) and also encodes several non-structural polypeptides, designated E1–E7 (E = early). At least 3 early oncoproteins (E5, E6, and E7) induce host cell proliferation, driving them into permanent division. During long-term latency, the circularized HPV DNA may get integrated into the host cell DNA molecule. The circular HPV DNA is then interrupted, usually within the E2 open reading frame (ORF), which then cannot exert its regulatory (feedback) effect on the early gene expression. The increased expression of E6/E7 proteins seriously affects the regulation of host cell division mainly via dysregulation of the functions of p53 and Rp proteins. HPV infects the female genital tract representing the main cause of cervical dysplasia and subsequent squamous cell carcinoma (SCa). The HPV isolates exist mainly in the form of amplified DNAs; based on the similarity and/or variations (dissimilarity) of their L1 capsid polypeptide sequence, 96 human genotypes were included into five genera of the Papillomaviridae family. The clinically most important genotypes that cause lesions at mucosal membranes and/or on the skin, belong mainly to the Alphapapillomavirus genus. The genotypes, associated with severe dysplastic changes and/or cervical cancer, were designated as high risk (HR-HPV). The prevalence of the integrated HPV DNA sequence over the episomal molecules appears in a proportion smears-graded LSIL (low-grade squamous intraepithelial lesion). Later on, carrier cells revealing the integrated HPV genome expression the oncoproteins (E6/E7) clearly prevail especially in HSIL (high-grade squamous intraepithelial lesion) smears and in the cervical cancer itself. What is crucial for the modern diagnostic of cervical dysplasia, is the p16/INK4A (inhibitor kinase) polypeptide, which itself represents a form of cell defense against the viral oncogenic proteins. The p16 antigen shows a continuous parabasal staining in the CIN I lesion. If dysplastic cells occupy at least one half (or two thirds) of squamous epithelium, the designation CIN II/HSIL is correct, and at the stage of CIN III/HSIL, dysplastic cells replace the entire squamous epithelium. Another frequently used immunohistochemical marker of intraepithelial cervical dysplasia so far is the Ki-67 antigen, which occurs in the nuclei of proliferating and/or repeatedly dividing (immortalized) cells. Women revealing p16-positive ASCUS (atypical smear cells of unknown significance) as well as those showing LSIL (low-grade cytological changes) should be examined for the presence of the HPV DNA. The detection of HPV DNA alone, that is, in the absence of cytological screening, has a relatively lower prediction value, though the HR HPV positive DNA test in the absence of morphological alterations may in part predict the possible progression into malignancy. Nevertheless, only the combined cytological as well as molecular follow-up (cervical smear examined for cytology as well as for HPV DNA) is regarded for the most reliable diagnostic approach

    The Classical Limit of Quantum Mechanics and the Fejer Sum of the Fourier Series Expansion of a Classical Quantity

    Get PDF
    In quantum mechanics, the expectation value of a quantity on a quantum state, provided that the state itself gives in the classical limit a motion of a particle in a definite path, in classical limit goes over to Fourier series form of the classical quantity. In contrast to this widely accepted point of view, a rigorous calculation shows that the expectation value on such a state in classical limit exactly gives the Fej\'{e}r's arithmetic mean of the partial sums of the Fourier series

    Making Free Trade Fair

    Get PDF
    Philosophers have done very little work on what makes trade fair. Perhaps the most extensive discussion is Malgorzata Kurjanska and Mathias Risse’s article, “Fairness in Trade II: export subsidies and the fair trade movement.”2 In their article, Kurjanska and Risse consider the case for trade subsidies and the Fair Trade movement. They suggest that it is not permissible for developed countries to give their producers subsidies because doing so does not strike an appropriate balance between meeting the needs of the global poor and protecting domestic workers (Kurjanska and Risse, 2008: 34). Kurjanska and Risse also argue that the case for Fair Trade hinges, primarily, on whether or not it is part of the best development strategy for poor countries. They do not think Fair Trade is part of the best development strategy and, so, they believe purchasing Fair Trade certified goods is only acceptable because doing so does not constitute a large share of the market in traded goods. This chapter argues that the case against subsidies and Fair Trade Kurjanska and Risse present is much weaker than they make out. To the contrary, it argues that giving some subsidies and purchasing some Fair Trade certified goods may even be necessary to make trade fair. Section 11.2 starts by saying a few words about the normative framework Kurjanska and Risse adopt

    Degradation of Layered Oxide Cathode in a Sodium Battery: A Detailed Investigation by X-Ray Tomography at the Nanoscale

    Get PDF
    The degradation mechanism in a sodium cell of a layered Na0.48Al0.03Co0.18Ni0.18Mn0.47O2 (NCAM) cathode with P3/P2 structure is investigated by revealing the changes in microstructure and composition upon cycling. The work aims to rationalize the gradual performance decay and the alteration of the electrochemical response in terms of polarization, voltage signature, and capacity loss. Spatial reconstructions of the electrode by X-ray computed tomography at the nanoscale supported by quantitative and qualitative analyses show fractures and deformations in the cycled layered metal-oxide particles, as well as inorganic side compounds deposited on the material. These irreversible morphological modifications reflect structural heterogeneities across the cathode particles due to formation of various domains with different Na+ intercalation degrees. Besides, X-ray photoelectron spectroscopy data suggest that the latter inorganic species in the cycled electrode are mainly composed of NaF, Na2O, and NaCO3 formed by parasitic electrolyte decomposition. The precipitation of these insulating compounds at the electrode/electrolyte interphase and the related structural stresses induced in the material lead to a decrease in cathode particle size and partial loss of electrochemical activity. The retention of the NCAM phase after cycling suggests that electrolyte upgrade may improve the performance of the cathode to achieve practical application for sustainable energy storage
    • …
    corecore