456 research outputs found
Documentation of Skalní zámek passage in Býčí skála cave - northern part
Bakalářská práce se zabývá speleologickým mapováním části jeskynního systému Býčí skála - Skalní zámek. Podrobné měření půdorysné mapy je prováděno elektronickou metodou a to kombinací měřícího zařízení DistaX2 a softwarové aplikace TopoDroid ve vhodně zvoleném tabletu. Výsledná mapa je vytvořena v programu Therion. V průřezu bakalářské práce je pojednáno o obsluze aparatury a návodu jak naměřit a následně zpracovat data. Úvodní část je věnována lokalizaci a rozsahu práce. V následujících částech jsou popsány návody na využité měřické a softwarové zařízení. Závěrečná část se zabývá testováním závěsných souprav.My bachelor thesis deals with speological mapping parts of cave system Býčí skála - Skalní zámek. Detailed measurements of plan view map are carried out with electronic method –through combination of measuring equipment DistaX2 and software application TopoDroid per the appropriate tablet. The resulting map is formed in the program Therion. The course of my bachelor thesis involves handling of apparatus and the instruction how to measure then process the data. The introductory part is devoted to the localization and extent of the thesis. The instructions of used surveying and software device are described in the subsequent parts. The final section is related to comparisons of mining suspension compasses.
Cadre algébrique pour le renforcement de politique de sécurité sur des systèmes concurrents par réécriture automatique de programmes
La société moderne est de plus en plus dépendante de l'informatique dont le rôle est devenu tellement vital au point que tout dysfonctionnement peut engendrer des pertes considérables voire des conséquences irréversibles telles que la perte de vies humaines. Pour minimiser les dégâts, plusieurs techniques et outils ont été mis en place au cours des dernières années. Leur objectif est de faire en sorte que nos systèmes informatiques fonctionnent < < ~tout le temps~> > , et ce, tout en produisant les résultats escomptés. La duplication du matériel et les tests de logiciels sont parmi les techniques les plus utilisées. Cependant, sans méthodes formelles, rien n'est garanti et des problèmes peuvent surgir à tout moment. En contrepartie, l'utilisation de méthodes formelles n'est pas à la portée de tout le monde y compris les programmeurs chevronnés et la tâche reste subtile et complexe même pour les spécialistes. Quelques lignes de code nécessitent parfois des centaines de lignes de preuve difficiles à lire et à comprendre. Malgré tout, leur utilisation n'est plus un luxe, mais plutôt nécessaire afin d'éviter les dégâts engendrés par les mauvais fonctionnements de nos systèmes critiques. Le principal objectif de notre recherche est de développer un cadre formel et automatique pour le renforcement de politique de sécurité sur des systèmes concurrents. Plus précisément, l'idée consiste à ajouter dans un programme des tests à des endroits soigneusement calculés pour qu'une politique de sécurité soit respectée. La nouvelle version du programme préserve toutes les traces de la version originale respectant la politique de sécurité et bloque les traces qui ne peuvent plus respecter la politique de sécurité même si elles sont complétées par certains suffixes. Les principaux résultats ayant contribué à l'atteinte de cet objectif sont : 1. La définition d'une algèbre de processus [symbol] offrant un cadre purement algébrique pour le renforcement de politique de sécurité sur des systèmes concurrents. Plus précisément, nous avons défini un nouvel opérateur qui permet de renforcer, d'une manière intuitive, une politique de sécurité sur un système concurrent. 2. La définition d'une logique, dénotée par [symbol], inspirée des expressions régulières étendues. En effet, [symbol] est une logique linéaire qui exprime la classe de langage régulier, mais avec la possibilité d'exprimer des propriétés infinies. 3. La définition d'une algèbre [symbol] basée sur l'algèbre [symbol]. [symbol] définit un nouvel opérateur de renforcement qui tient compte de l'introduction de la logique. 4. Le développement d'une technique d'optimisation qui, pour une certaine classe de propriétés de sécurité, permet de réduire le nombre de tests insérés dans le programme renforcé.One of the important goals of the software development process is proving that the produced systems always meet their requirements. However, establishing this goal is not only subtle and complex, but also requires high qualified persons. In addition, this operation is mostly omitted due to its high cost and the system is tested while trying to reduce the risk of errors as much as possible. The cost is, nevertheless, paid when this operation is required in order to avoid catastrophic consequences and major errors. In these cases, tools like theorem prover and those used for automatic generation of software are helpful to significantly reduce the cost of proof. Our aim is that this tool proves to be powerful and simple enough to generate benefits even to small companies and individuals with scarce budgets and limited theoretical skills . Many promising formal frameworks for automatic enforcement of security policies in programs have been proposed during the last years. Their goal is to ensure that a program respects a given security policy which generally specifies acceptable executions of the program and can be expressed in terms of access control problems, information flow, availability of resources, confidentiality, etc. The literature records various techniques for enforcing security policies belonging to mainly two principal classes: static approaches including typing theory, Proof Carrying Code, and dynamic approaches including reference monitors, Java stack inspection. Static analysis aims at enforcing properties before program execution. In dynamic analysis, however, the enforcement takes place at runtime by intercepting critical events during the program execution and halting the latter whenever an action is attempting to violate the property being enforced. Recently, several researchers have explored rewriting techniques in order to gather advantages of both static and dynamic methods. The idea consists in modifying a program statically, so that the produced version respects the requested requirements. The rewritten program is generated from the original one by adding, when necessary, some tests at some critical points to obtain the desired behaviors. This thesis aims to propose an algebraic and automatic approach that could generate from a given program, and a security policy, a new version of this program that respects the requested security policy. More precisely, we define an operator [symbol] that takes as input a process [symbol] and a security policy [symbol] and generates [symbol], a new process that respects the following conditions: [symbol] "satisfies" the security policy [symbol]. [symbol], behaviours of [symbol] are also behaviours of [symbol]. [symbol], all good behaviours of [symbol] are also behaviours [symbol]. The main results of our research are the following~: 1. The definition of a process algebra [symbol] offering an algebraic framework for the enforcement of security policies on concurrent systems. 2. The definition of a logic, denoted by [symbol], inspired from Kleene algebras and regular expressions. Basically, it allows to specify properties that can be checked on a trace-based model and properties related to infinite behavior (e.g. a server should not send the password of users). The choice of this logic is motivated by its syntax that is close to the one chosen for processes. In fact, this similarity is helpful to simplify the definition of our formal monitor. 3. The development of an optimization technique which, for a certain class of security properties, reduces the number of tests added in the target
Effects of insulin-like growth factor-1 on the mRNA expression of estradiol receptors, steroidogenic enzymes, and steroid production in bovine follicles
Insulin-like growth factor-1 (IGF-1) plays a crucial role in follicular growth and stimulates steroid hormone production in bovine follicles. Steroid hormones are synthesized through the actions of steroidogenic enzymes, specifically STAR, CYP11A1, HSD3B, and CYP19A1 in both theca cells (TCs) and granulosa cells (GCs), under the influence of gonadotropins. Particularly, estradiol 17 beta (E2) assumes a central role in follicular development and selection by activating estrogen receptors beta (ESR2) in GCs. We assessed ESR2 mRNA expression in GCs of developing follicles and investigated the impact of IGF-1 on the mRNA expression of ESR2, CYP19A1, FSHR, and LHCGR, STAR, CYP11A1, and HSD17B in cultured GCs and TCs, respectively. Additionally, we assessed the influence of IGF-1 on androstenedione (A4), progesterone (P4), and testosterone (T) production in TCs. Small-sized follicles (= 9 mm) (P < 0.05). IGF-1 increased the mRNA expression of ESR2, CYP19A1, and FSHR in GCs of follicles of both sizes, except for FSHR mRNA in medium-sized follicles (P < 0.05). IGF-1 significantly elevated mRNA expression of LHCGR, STAR, CYP11A1, and CYP17B in TCs of small-and medium-sized follicles (P < 0.05). Moreover, IGF-1 augmented the production of A4 and P4 but had no impact on T production in TCs of small-and medium-sized follicles. Taken together, our findings indicate that IGF-1 upregulates steroidogenic enzymes and steroid hormone production, underscoring the crucial role of IGF-1 in follicle development and selection
A Comprehensive Analysis of Mobility Management in MPLS-Based Wireless Access Networks
Alien marine species of Libya: first inventory and new records in El-Kouf National Park (Cyrenaica) and the neighbouring areas
The presence of marine alien species in El-Kouf National Park and the neighbouring areas was assessed using a compilation of available information and observations, a field survey conducted on October 2010 in the framework of the MedMPAnet project and results of further monitoring during June and September 2012. A total of 9 alien species were reported: the Rhodophyta Asparagopsis taxiformis (Delile) Trevisan de Saint-Léon, the Chlorophyta Caulerpa racemosa var. cylindracea (Sonder) Verlaque, Huisman & Boudouresque, the crab Percnon gibbesi (H. Milne-Edwards, 1853) and the fishes Fistularia commersonii Rüppell, 1838, Siganus luridus (Rüppell, 1829), Siganus rivulatus Forsskål, 1775, Pempheris vanicolensis Cuvier, 1831, Lagocephalus sceleratus (Gmelin, 1789) and Sphyraena flavicauda Rüppell, 1838. Several of them were until now unknown for the National Park. The list of alien marine species of Libya is updated and discussed. Until now 63 marine aliens species were recorded along the Libyan coasts. These include 3 Foraminifera, 3 Ochrophyta, 5 Rhodophyta, 5 Chlorophyta, 1 Magnoliophyta, 11 Arthropoda, 13 Mollusca, 1 Echinodermata and 21 Chordata. Among these Non Indigenous Species, 43 are known as established along the Libyan coast including 8 invasive, 11 casual, 6 questionable, 3 cryptogenic and 1 unknown. An in-depth study of the marine organisms would substantially increase the number of alien species occurring in Libya. Monitoring of marine assemblages of MPAs is a valuable opportunity to go further into the knowledge of native and introduced species
Alien marine species of Libya: first inventory and new records in El-Kouf National Park (Cyrenaica) and the neighbouring areas
The presence of marine alien species in El-Kouf National Park and the neighbouring areas was assessed using a compilation of available information and observations, a field survey conducted on October 2010 in the framework of the MedMPAnet project and results of further monitoring during June and September 2012. A total of 9 alien species were reported: the Rhodophyta Asparagopsis taxiformis (Delile) Trevisan de Saint-Léon, the Chlorophyta Caulerpa racemosa var. cylindracea (Sonder) Verlaque, Huisman & Boudouresque, the crab Percnon gibbesi (H. Milne-Edwards, 1853) and the fishes Fistularia commersonii Rüppell, 1838, Siganus luridus (Rüppell, 1829), Siganus rivulatus Forsskål, 1775, Pempheris vanicolensis Cuvier, 1831, Lagocephalus sceleratus (Gmelin, 1789) and Sphyraena flavicauda Rüppell, 1838. Several of them were until now unknown for the National Park. The list of alien marine species of Libya is updated and discussed. Until now 63 marine aliens species were recorded along the Libyan coasts. These include 3 Foraminifera, 3 Ochrophyta, 5 Rhodophyta, 5 Chlorophyta, 1 Magnoliophyta, 11 Arthropoda, 13 Mollusca, 1 Echinodermata and 21 Chordata. Among these Non Indigenous Species, 43 are known as established along the Libyan coast including 8 invasive, 11 casual, 6 questionable, 3 cryptogenic and 1 unknown. An in-depth study of the marine organisms would substantially increase the number of alien species occurring in Libya. Monitoring of marine assemblages of MPAs is a valuable opportunity to go further into the knowledge of native and introduced species
El impacto del contexto socioeconómico para lograr la certificación Leed Platinum en edificios de países desarrollados y en desarrollo
Estados Unidos (EE.UU.) e India son dos naciones democráticas muy pobladas que contribuyen en gran medida al cambio climático global y a las emisiones de gases de efecto invernadero. Para hacer frente a estos problemas, el programa LEED (Leadership in Energy and Environmental Design) es una de las herramientas más utilizadas por ambas naciones para reducir el impacto medioambiental negativo de los edificios. Esta investigación estudió las formas en que los edificios con certificación LEED ofrecen beneficios sociales a sus comunidades circundantes en diferentes contextos socioeconómicos. Para este estudio, se seleccionaron intencionadamente dos edificios con calificación LEED Platino en EE.UU. y en la India, y se identificaron las tecnologías y estrategias utilizadas para conseguir la calificación Platino. Estas tecnologías y estrategias se clasificaron en función de los beneficios sociales ofrecidos a la comunidad circundante, y se compararon los casos para evaluar si los beneficios variaban entre los dos contextos. En el caso del edificio situado en EE.UU., 26 de 70, y en el del edificio situado en la India, 18 de 57 tecnologías y estrategias debían ofrecer beneficios sociales a la comunidad circundante. Para estos casos, no se encontró ninguna diferencia significativa en la proporción de beneficios sociales potenciales esperados entre los proyectos de estudio de casos en el país desarrollado frente al país en desarrollo. Las investigaciones futuras deberán seguir explorando y cuantificando los beneficios sociales reales conseguidos por los edificios certificados.
5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities
5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G), unprecedented new vehicular use–cases can be supported on top of the same physical network. NS promises to enable the sharing of common network infrastructure and resources while ensuring strict traffic isolation and providing necessary network resources to each NS. However, enabling NS in vehicular networks brings new security challenges and requirements that automotive or 5G standards have not yet addressed. Attackers can exploit the weakest link in the slicing chain, connected and automated vehicles, to violate the slice isolation and degrade its performance. Furthermore, these attacks can be more powerful, especially if they are produced in cross-border areas of two countries, which require an optimal network transition from one operator to another. Therefore, this article aims to provide an overview of newly enabled 5G-V2X slicing use cases and their security issues while focusing on cross-border slicing attacks. It also presents the open security issues of 5G-V2X slicing and identifies some opportunities
- …
