224 research outputs found

    KARYOMORPHOLOGY OF THE PHILIPPINE ROCK GOBY, Glossogobius giuris (GOBIIDAE) FROM LAKE TAAL AND SOME RIVERS OF CAVITE, LUZON ISLAND

    Get PDF
    The karyomorphology of Glossogobius giuris (Gobiidae) obtained from Lake Taal and some rivers of Cavite in Luzon Island, Philippines was described. Metaphase chromosome analysis (colchicine-sodium citrate-Carnoy's fixation-Giemsa staining procedures) of the hematopoitetic cells in the anterior kidneys revealed that the diploid chromosome number was 2n=46 (46A). Fundamental Number (FN) is also 46, since all chromosomal morphology were acrocentrics without any distinguishable heteromorphic pair of chromosomes in the metaphase spreads from both dry and wet preparations. This study confirms previous reports on the chromosomal sets of G. giuris from India. Keywords : Philippines / Lake Taal / Genetics / Karyomorphology / Glossogobius giuri

    Propuesta de un sistema de costos estándar para mejorar la rentabilidad de la empresa Estructuras Industriales EGA S. A. - Lima 2016

    Get PDF
    Estructura Industriales EGA S.A, es una empresa del sector metalmecánico, muy competitivo en el mercado. La información de costos que se maneja está lejos de la realidad del negocio, tanto que carece de un adecuado control de los recursos utilizados en el proceso productivo. Por ello, se propone implementar un sistema de costos estándar cuyo fin es mejorar la determinación del costo de producción, lo cual el objetivo principal de esta tesis es demostrar que mediante la propuesta de un sistema de costeo estándar mejorará la rentabilidad de la empresa.Industrial Structure EGA S. A, is a company in the metalworking sector, very competitive in the market. The information of costs that is handled is far from the reality of the business, so much that it lacks an adequate control of the resources used in the productive process. Therefore, it is proposed to implement a standard cost system whose purpose is to improve the determination of the cost of production, which the main objective of this thesis is to demonstrate that by proposing a standard costing system will improve the profitability of the compan

    Karyomorphology of the Philippine Rock Goby, Glossogobius Giuris (Gobiidae) From Lake Taal and Some Rivers of Cavite, Luzon Island

    Full text link
    The karyomorphology of Glossogobius giuris (Gobiidae) obtained from Lake Taal and some rivers of Cavite in Luzon Island, Philippines was described. Metaphase chromosome analysis (colchicine-sodium citrate-Carnoy's fixation-Giemsa staining procedures) of the hematopoitetic cells in the anterior kidneys revealed that the diploid chromosome number was 2n=46 (46A). Fundamental Number (FN) is also 46, since all chromosomal morphology were acrocentrics without any distinguishable heteromorphic pair of chromosomes in the metaphase spreads from both dry and wet preparations. This study confirms previous reports on the chromosomal sets of G. giuris from India

    Adherence to Medications among Type 2 Diabetes Mellitus Patients in Three Districts of Al Dakhliyah Governorate, Oman : A cross-sectional pilot study

    Get PDF
    Objectives: This pilot study aimed to assess the medication adherence of type 2 diabetes mellitus (T2DM) patients in three wilayats(districts) of the Al Dakhliyah governorate, Oman, and to identify the probable reasons for medication non-adherence. Methods: A cross-sectional questionnaire-based pilot survey was conducted among T2DM Omani patients between February and June 2012 to assess their medication adherence and the relationship between their socio-demographic characteristics and adherence levels. Results: A total of 158 patients participated in the survey. The majority of the participants were unemployed or were housewives (66.5%). Forgetfulness was the most frequent reason for medication non-adherence (36.4%). Participants demonstrated an excellent level of adherence to their medicines (median total score = 3). No significant difference in median total adherence scores was observed based on the evaluated parameters. Conclusion: The medication adherence of T2DM patients in the area under study was good. A larger study in a wider population is warranted to obtain a more representative picture of this important factor which contributes to public health

    Four Neighbourhood Cellular Automata as Better Cryptographic Primitives

    Get PDF
    Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as suitable cryptographic primitive. Rule 30, a 3-neighbourhood CA rule, was proposed as an ideal candidate for cryptographic primitive by Wolfram. However, rule 30 was shown to be weak against Meier-Staffelbach attack. The cryptographic properties like diffusion and randomness increase with increase in neighbourhood radius and thus opens the avenue of exploring the cryptographic properties of 4-neighbourhood CA. This work explores whether four-neighbourhood CA can be a better cryptographic primitive. We construct a class of cryptographically suitable 4-neighbourhood nonlinear CA rules that resembles rule 30. One 4-neighbourhood nonlinear CA from this selected class is shown to be resistant against Meier-Staffelbach attack on rule 30, justifying the applicability of 4-neighbourhood CA as better cryptographic primitives

    Phase-shift Fault Analysis of Grain-128

    Get PDF
    Phase-shift fault attack is a type of fault attack used for cryptanalysis of stream ciphers. It involves clocking a cipher’s feedback shift registers out of phase, in order to generate faulted keystream. Grain-128 cipher is a 128-bit modification of the Grain cipher which is one of the finalists in the eSTREAM project. In this work, we propose a phase-shift fault attack against Grain-128 loaded with key-IV pairs that result in an all-zero LFSR after initialisation. We frame equations in terms of the input and output bits of the cipher and solve them using a SAT solver. By correctly guessing 40 innerstate bits, we are able to recover the entire 128-bit key with just 2 phase-shift faults for keystreams of length 200 bits

    Análisis semiótico respecto a la persuasión en las vallas publicitarias de la zona urbana de la ciudad de San Miguel

    Get PDF
    En esta investigación se realizó un análisis semiótico respecto a la persuasión en las vallas publicitarias de la zona urbana de la ciudad de San Miguel Partiendo de la aplicación de las funciones de la semiótica de la imagen visual e identificamos como el individuo es persuadido por ellas, se estudió los aportes de los grandes pensadores de la semiótica como: Ferdinand de Saussure, Charles Sanders Pierce, Roland Barthes, Algirdas Julien Greimas, y Humberto Eco quienes la definieron según su propio punto de vista. En este trabajo se aplicó una metodología de investigación de carácter cualitativa la cual se basa en la toma de muestras pequeñas, esto es la observación de grupos de población reducidos, donde completamos los resultados propuestos. Se cumplió el desarrollo de la investigación acorde a los objetivos formulados y representados en este trabajo, también logramos establecer un vínculo armonioso con la población a quienes se les paso una encuesta con preguntas abiertas con respecto a la semiótica visual en las vallas publicitarias ubicadas en la zona urbana de la cuidad de San Miguel, con la colaboración de entidades de las empresas dedicadas a la publicidad se pudo realizar mejor la información que permitió guiar este proceso de investigación. Cumplimos los protocolos estipulados sobre el análisis semiótico en las vallas publicitarias, entre los cuales estaría la significación de las formas y colores dentro de un enunciado publicitario y que el análisis de datos sea satisfactorio, que llene todas las expectativas para que funcionara de base para la investigación de la semiótica de la imagen visual. Y como último aspecto conocimos de qué manera el individuo es persuadido al observar las vallas publicitaria

    Outsourced CP-ABE with Whitebox Accountability in IoT Systems

    Get PDF
    Cryptography based on identity and attributes enhances the chance of secure communication on a large scale. Several attribute-based encryption schemes achieve different objectives when used in various protocols. Most of these are suitable for large systems like cloud services. There are a few protocols which focus on reducing the computational overhead for lower end devices like Internet of Things sensors and actuators. It is desirable to have a mix of features in protocols for IoT security architecture. We first propose a scheme to ensure accountability in CPABE scheme FAME. The protocol is proven CPA-secure with full security in random oracle model. We also prove its accountability. We also propose a hybrid protocol that enforces user accountability and outsourced decryption in IoT systems and achieve full security in replayable chosen ciphertext attack (RCCA) under random oracle model
    corecore