15 resultados para Hovi, Jon: Games, threats and treaties

em Universidad Politécnica de Madrid


Relevância:

100.00% 100.00%

Publicador:

Resumo:

First, this paper describes a future layered Air Traffic Management (ATM) system centred in the execution phase of flights. The layered ATM model is based on the work currently performed by SESAR [1] and takes into account the availability of accurate and updated flight information ?seen by all? across the European airspace. This shared information of each flight will be referred as Reference Business Trajectory (RBT). In the layered ATM system, exchanges of information will involve several actors (human or automatic), which will have varying time horizons, areas of responsibility and tasks. Second, the paper will identify the need to define the negotiation processes required to agree revisions to the RBT in the layered ATM system. Third, the final objective of the paper is to bring to the attention of researchers and engineers the communalities between multi-player games and Collaborative Decision Making processes (CDM) in a layered ATM system

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Critical infrastructures support everyday activities in modern societies, facilitating the exchange of services and quantities of various nature. Their functioning is the result of the integration of diverse technologies, systems and organizations into a complex network of interconnections. Benefits from networking are accompanied by new threats and risks. In particular, because of the increased interdependency, disturbances and failures may propagate and render unstable the whole infrastructure network. This paper presents a methodology of resilience analysis of networked systems of systems. Resilience generalizes the concept of stability of a system around a state of equilibrium, with respect to a disturbance and its ability of preventing, resisting and recovery. The methodology provides a tool for the analysis of off-equilibrium conditions that may occur in a single system and propagate through the network of dependencies. The analysis is conducted in two stages. The first stage of the analysis is qualitative. It identifies the resilience scenarios, i.e. the sequence of events, triggered by an initial disturbance, which include failures and the system response. The second stage is quantitative. The most critical scenarios can be simulated, for the desired parameter settings, in order to check if they are successfully handled, i.e recovered to nominal conditions, or they end into the network failure. The proposed methodology aims at providing an effective support to resilience-informed design.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mediterranean Dehesas are one of the European natural habitat types of Community interest (43/92/EEC Directive), associated to high diversity levels and producer of important goods and services. In this work, tree contribution and grazing influence over pasture alpha diversity in a Dehesa in Central Spain was studied. We analyzed Richness and Shannon-Wiener (SW) indexes on herbaceous layer under 16 holms oak trees (64 sampling units distributed in two directions and in two distances to the trunk) distributed in four different grazing management zones (depending on species and stocking rate). Floristic composition by species or morphospecies and species abundance were analyzed for each sample unit. Linear mixed models (LMM) and generalized linear mixed models (GLMMs) were used to study relationships between alpha diversity measures and independent factors. Edge crown influence showed the highest values of Richness and SW index. No significant differences were found between orientations under tree crown influence. Grazing management had a significant effect over Richness and SW measures, specially the grazing species (cattle or sheep). We preliminary quantify and analyze the interaction of tree stratum and grazing management over herbaceous diversity in a year of extreme climatic conditions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

During the current preparatory phase of the European laser fusion project HiPER, an intensive effort has being placed to identify an armour material able to protect the internal walls of the chamber against the high thermal loads and high fluxes of x-rays and ions produced during the fusion explosions. This poster addresses the different threats and limitations of a poly-crystalline Tungsten armour. The analysis is carried out under the conditions of an experimental chamber hypothetically constructed to demonstrate laser fusion in a repetitive mode, subjected to a few thousand 48MJ shock ignition shots during its entire lifetime. If compared to the literature, an extrapolation of the thermomechanical and atomistic effects obtained from the simulations of the experimental chamber to the conditions of a Demo reactor (working 24/7 at hundreds of MW) or a future power plant (producing GW) suggests that “standard” tungsten will not be a suitable armour. Thus, new materials based on nano-structured W and C are being investigated as possible candidates. The research programme launched by the HiPER material team is introduced.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: There are 600,000 new malaria cases daily worldwide. The gold standard for estimating the parasite burden and the corresponding severity of the disease consists in manually counting the number of parasites in blood smears through a microscope, a process that can take more than 20 minutes of an expert microscopist’s time. Objective: This research tests the feasibility of a crowdsourced approach to malaria image analysis. In particular, we investigated whether anonymous volunteers with no prior experience would be able to count malaria parasites in digitized images of thick blood smears by playing a Web-based game. Methods: The experimental system consisted of a Web-based game where online volunteers were tasked with detecting parasites in digitized blood sample images coupled with a decision algorithm that combined the analyses from several players to produce an improved collective detection outcome. Data were collected through the MalariaSpot website. Random images of thick blood films containing Plasmodium falciparum at medium to low parasitemias, acquired by conventional optical microscopy, were presented to players. In the game, players had to find and tag as many parasites as possible in 1 minute. In the event that players found all the parasites present in the image, they were presented with a new image. In order to combine the choices of different players into a single crowd decision, we implemented an image processing pipeline and a quorum algorithm that judged a parasite tagged when a group of players agreed on its position. Results: Over 1 month, anonymous players from 95 countries played more than 12,000 games and generated a database of more than 270,000 clicks on the test images. Results revealed that combining 22 games from nonexpert players achieved a parasite counting accuracy higher than 99%. This performance could be obtained also by combining 13 games from players trained for 1 minute. Exhaustive computations measured the parasite counting accuracy for all players as a function of the number of games considered and the experience of the players. In addition, we propose a mathematical equation that accurately models the collective parasite counting performance. Conclusions: This research validates the online gaming approach for crowdsourced counting of malaria parasites in images of thick blood films. The findings support the conclusion that nonexperts are able to rapidly learn how to identify the typical features of malaria parasites in digitized thick blood samples and that combining the analyses of several users provides similar parasite counting accuracy rates as those of expert microscopists. This experiment illustrates the potential of the crowdsourced gaming approach for performing routine malaria parasite quantification, and more generally for solving biomedical image analysis problems, with future potential for telediagnosis related to global health challenges.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Esta Tesis analiza, en primer lugar, las posibilidades y condiciones de los puertos españoles de Algeciras, Valencia y Barcelona para acoger en el futuro una terminal totalmente automatizada (robotizada) de contenedores con una capacidad aproximada de 1,3-1,4 millones de contenedores/año o 2 millones de TEU/año. Entre las posibles amenazas y oportunidades que pueden afectar al actual tráfico de esos puertos, la Tesis se centra en el desvío del tráfico de contenedores de transbordo, la sustitución de los tráficos marinos por tráficos ferroviarios, la posibilidad de convertir al Mediterráneo español en la puerta de entrada de productos asiáticos, el cambio de la ruta Asia-Europa a través del Canal de Suez por la ruta Asia-Europa a través del Ártico, la posibilidad de circunvalar África para evitar el Canal de Suez y la próxima apertura de nuevo Canal de Panamá ampliado. La Tesis describe el Estado del Arte de la tecnología para las terminales de contenedores automatizadas que pudiera ser aplicada en nuestro país y desarrolla una terminal automatizada con la capacidad ya mencionada de 2 millones de TEU/año. El tema del ferrocarril en las terminales de contenedores, como futura lanzadera para la proyección de la influencia de los puertos, está desarrollado como una parte esencial de una terminal de contenedores. Se investiga, también, la automatización total o parcial en la transferencia de mercancía buque-ferrocarril La Tesis también desarrolla una metodología para desglosar los costes e ingresos de una terminal automatizada. A través de esos costes e ingresos se va desarrollando, mediante la utilización de hojas Excel relacionadas, el método para mostrar la estructuración de los hitos económicos fundamentales hasta llegar al VAN, TIR y Periodo de Retorno de la Inversión como elementos clave para la calificación de la terminal como proyecto de inversión. La Tesis realiza la misma metodología para la terminal convencional de contenedores más habitual en el Mediterráneo español: la terminal que utiliza sistemas de grúas sobre ruedas (RTG) en el patio de contenedores. Por último, la Tesis establece la comparativa entre los dos tipos de terminales analizadas: la convencional y la automatizada, basándose en el coste de la mano de obra portuaria como elemento clave para dicha comparativa. Se establece la frontera que determina en qué niveles de coste del personal portuario la terminal automatizada es mejor proyecto de inversión que la terminal convencional con RTG. Mediante la creación de la metodología descrita, la Tesis permite: - La comparativa entre diferentes tipos de terminales - La posibilidad de analizar un modelo de terminal variando sus parámetros fundamentales: costes de los estibadores, nuevas tecnologías de manipulación, diferentes rendimientos, variación de los ingresos, etc. - Descubrir el modelo más rentable de una futura terminal mediante la comparación de las diferentes tecnologías que se puedan emplear para la construcción de dicha terminal ABSTRACT This Thesis examines, first, the possibilities and conditions of the Spanish ports of Algeciras, Valencia and Barcelona to host in the future a fully automated container terminal (robotized) with a capacity of approximately 1.3-1.4 million containers/year or 2 million TEU/year. Among the potential threats and opportunities that may affect the current traffic of these ports, the thesis focuses on the diversion of container transhipment traffic, the replacing of marine traffic by rail traffic, the possibility of converting the Spanish Mediterranean in the door input of Asian products, the changing of the Asia-Europe route through the Suez Canal by the Asia-Europe route through the Arctic, the possibility of circumnavigating Africa to avoid the Suez Canal and the upcoming opening of the new expanded Canal of Panama. The Thesis describes the state-of-the-art technology for automated container terminals that could be applied in our country and develops an automated terminal with the listed capacity of 2 million TEUs / year. The use of the railway system in container terminals to be used as future shuttle to the projection of the influence of the ports is developed as an essential part of a container terminal. We also investigate the total or partial automation in transferring goods from ship to rail. The Thesis also develops a methodology to break down the costs and revenues of an automated terminal. Through these costs and revenues is developed, using linked Excel sheets, the method to show the formation of structured key economic milestones until the NPV, IRR and Period of Return of Investment as key to determining the terminal as an investment project. The Thesis takes the same methodology for the conventional container terminal more common in the Spanish Mediterranean: the terminal using rubber tyred cranes (RTG) in the container yard. Finally, the Thesis provides a comparison between the two types of analyzed terminals: conventional and automated, based on the cost of stevedores labor as a key point for that comparison. It establishes the boundary that determines what levels of stevedore costs make automated terminal to be better investment project than a conventional terminal using RTG. By creating the above methodology, the Thesis allows: - The comparison between different types of terminals - The possibility of analyzing a model of terminal varying its key parameters: stevedores costs, new technologies of container handling, different loading/unloading rates, changes in incomes and so on - Unveil the most profitable model for a future terminal by comparing the different technologies that can be employed for the construction of that terminal

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En los modelos promovidos por las normativas internacionales de análisis de riesgos en los sistemas de información, los activos están interrelacionados entre sí, de modo que un ataque sobre uno de ellos se puede transmitir a lo largo de toda la red, llegando a alcanzar a los activos más valiosos para la organización. Es necesario entonces asignar el valor de todos los activos, así como las relaciones de dependencia directas e indirectas entre estos, o la probabilidad de materialización de una amenaza y la degradación que ésta puede provocar sobre los activos. Sin embargo, los expertos encargados de asignar tales valores, a menudo aportan información vaga e incierta, de modo que las técnicas difusas pueden ser muy útiles en este ámbito. Pero estas técnicas no están libres de ciertas dificultades, como la necesidad de uso de una aritmética adecuada al modelo o el establecimiento de medidas de similitud apropiadas. En este documento proponemos un tratamiento difuso para los modelos de análisis de riesgos promovidos por las metodologías internacionales, mediante el establecimiento de tales elementos.Abstract— Assets are interrelated in risk analysis methodologies for information systems promoted by international standards. This means that an attack on one asset can be propagated through the network and threaten an organization’s most valuable assets. It is necessary to valuate all assets, the direct and indirect asset dependencies, as well as the probability of threats and the resulting asset degradation. However, the experts in charge to assign such values often provide only vague and uncertain information. Fuzzy logic can be very helpful in such situation, but it is not free of some difficulties, such as the need of a proper arithmetic to the model under consideration or the establishment of appropriate similarity measures. Throughout this paper we propose a fuzzy treatment for risk analysis models promoted by international methodologies through the establishment of such elements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Assets are interrelated in risk analysis methodologies for information systems promoted by international standards. This means that an attack on one asset can be propagated through the network and threaten an organization's most valuable assets. It is necessary to valuate all assets, the direct and indirect asset dependencies, as well as the probability of threats and the resulting asset degradation. These methodologies do not, however, consider uncertain valuations and use precise values on different scales, usually percentages. Linguistic terms are used by the experts to represent assets values, dependencies and frequency and asset degradation associated with possible threats. Computations are based on the trapezoidal fuzzy numbers associated with these linguistic terms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We propose a fuzzy approach to deal with risk analysis for information systems. We extend MAGERIT methodology that valuates the asset dependencies to a fuzzy framework adding fuzzy linguistic terms to valuate the different elements (terminal asset values, asset dependencies as well as the probability of threats and the resulting asset degradation) in risk analysis. Computations are based on the trapezoidal fuzzy numbers associated with these linguistic terms and, finally, the results of these operations are translated into a linguistic term by means of a similarity function.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An effective Distributed Denial of Service (DDoS) defense mechanism must guarantee legitimate users access to an Internet service masking the effects of possible attacks. That is, it must be able to detect threats and discard malicious packets in a online fashion. Given that emerging data streaming technology can enable such mitigation in an effective manner, in this paper we present STONE, a stream-based DDoS defense framework, which integrates anomaly-based DDoS detection and mitigation with scalable data streaming technology. With STONE, the traffic of potential targets is analyzed via continuous data streaming queries maintaining information used for both attack detection and mitigation. STONE provides minimal degradation of legitimate users traffic during DDoS attacks and it also faces effectively flash crowds. Our preliminary evaluation based on an implemented prototype and conducted with real legitimate and malicious traffic traces shows that STONE is able to provide fast detection and precise mitigation of DDoS attacks leveraging scalable data streaming technology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Los servicios telemáticos han transformando la mayoría de nuestras actividades cotidianas y ofrecen oportunidades sin precedentes con características como, por ejemplo, el acceso ubicuo, la disponibilidad permanente, la independencia del dispositivo utilizado, la multimodalidad o la gratuidad, entre otros. No obstante, los beneficios que destacan en cuanto se reflexiona sobre estos servicios, tienen como contrapartida una serie de riesgos y amenazas no tan obvios, ya que éstos se nutren de y tratan con datos personales, lo cual suscita dudas respecto a la privacidad de las personas. Actualmente, las personas que asumen el rol de usuarios de servicios telemáticos generan constantemente datos digitales en distintos proveedores. Estos datos reflejan parte de su intimidad, de sus características particulares, preferencias, intereses, relaciones sociales, hábitos de consumo, etc. y lo que es más controvertido, toda esta información se encuentra bajo la custodia de distintos proveedores que pueden utilizarla más allá de las necesidades y el control del usuario. Los datos personales y, en particular, el conocimiento sobre los usuarios que se puede extraer a partir de éstos (modelos de usuario) se han convertido en un nuevo activo económico para los proveedores de servicios. De este modo, estos recursos se pueden utilizar para ofrecer servicios centrados en el usuario basados, por ejemplo, en la recomendación de contenidos, la personalización de productos o la predicción de su comportamiento, lo cual permite a los proveedores conectar con los usuarios, mantenerlos, involucrarlos y en definitiva, fidelizarlos para garantizar el éxito de un modelo de negocio. Sin embargo, dichos recursos también pueden utilizarse para establecer otros modelos de negocio que van más allá de su procesamiento y aplicación individual por parte de un proveedor y que se basan en su comercialización y compartición con otras entidades. Bajo esta perspectiva, los usuarios sufren una falta de control sobre los datos que les refieren, ya que esto depende de la voluntad y las condiciones impuestas por los proveedores de servicios, lo cual implica que habitualmente deban enfrentarse ante la disyuntiva de ceder sus datos personales o no acceder a los servicios telemáticos ofrecidos. Desde el sector público se trata de tomar medidas que protejan a los usuarios con iniciativas y legislaciones que velen por su privacidad y que aumenten el control sobre sus datos personales, a la vez que debe favorecer el desarrollo económico propiciado por estos proveedores de servicios. En este contexto, esta tesis doctoral propone una arquitectura y modelo de referencia para un ecosistema de intercambio de datos personales centrado en el usuario que promueve la creación, compartición y utilización de datos personales y modelos de usuario entre distintos proveedores, al mismo tiempo que ofrece a los usuarios las herramientas necesarias para ejercer su control en cuanto a la cesión y uso de sus recursos personales y obtener, en su caso, distintos incentivos o contraprestaciones económicas. Las contribuciones originales de la tesis son la especificación y diseño de una arquitectura que se apoya en un proceso de modelado distribuido que se ha definido en el marco de esta investigación. Éste se basa en el aprovechamiento de recursos que distintas entidades (fuentes de datos) ofrecen para generar modelos de usuario enriquecidos que cubren las necesidades específicas de terceras entidades, considerando la participación del usuario y el control sobre sus recursos personales (datos y modelos de usuario). Lo anterior ha requerido identificar y caracterizar las fuentes de datos con potencial de abastecer al ecosistema, determinar distintos patrones para la generación de modelos de usuario a partir de datos personales distribuidos y heterogéneos y establecer una infraestructura para la gestión de identidad y privacidad que permita a los usuarios expresar sus preferencias e intereses respecto al uso y compartición de sus recursos personales. Además, se ha definido un modelo de negocio de referencia que sustenta las investigaciones realizadas y que ha sido particularizado en dos ámbitos de aplicación principales, en concreto, el sector de publicidad en redes sociales y el sector financiero para la implantación de nuevos servicios. Finalmente, cabe destacar que las contribuciones de esta tesis han sido validadas en el contexto de distintos proyectos de investigación industrial aplicada y también en el marco de proyectos fin de carrera que la autora ha tutelado o en los que ha colaborado. Los resultados obtenidos han originado distintos méritos de investigación como dos patentes en explotación, la publicación de un artículo en una revista con índice de impacto y diversos artículos en congresos internacionales de relevancia. Algunos de éstos han sido galardonados con premios de distintas instituciones, así como en las conferencias donde han sido presentados. ABSTRACT Information society services have changed most of our daily activities, offering unprecedented opportunities with certain characteristics, such as: ubiquitous access, permanent availability, device independence, multimodality and free-of-charge services, among others. However, all the positive aspects that emerge when thinking about these services have as counterpart not-so-obvious threats and risks, because they feed from and use personal data, thus creating concerns about peoples’ privacy. Nowadays, people that play the role of user of services are constantly generating digital data in different service providers. These data reflect part of their intimacy, particular characteristics, preferences, interests, relationships, consumer behavior, etc. Controversy arises because this personal information is stored and kept by the mentioned providers that can use it beyond the user needs and control. Personal data and, in particular, the knowledge about the user that can be obtained from them (user models) have turned into a new economic asset for the service providers. In this way, these data and models can be used to offer user centric services based, for example, in content recommendation, tailored-products or user behavior, all of which allows connecting with the users, keeping them more engaged and involved with the provider, finally reaching customer loyalty in order to guarantee the success of a business model. However, these resources can be used to establish a different kind of business model; one that does not only processes and individually applies personal data, but also shares and trades these data with other entities. From that perspective, the users lack control over their referred data, because it depends from the conditions imposed by the service providers. The consequence is that the users often face the following dilemma: either giving up their personal data or not using the offered services. The Public Sector takes actions in order to protect the users approving, for example, laws and legal initiatives that reinforce privacy and increase control over personal data, while at the same time the authorities are also key players in the economy development that derives from the information society services. In this context, this PhD Dissertation proposes an architecture and reference model to achieve a user-centric personal data ecosystem that promotes the creation, sharing and use of personal data and user models among different providers, while offering users the tools to control who can access which data and why and if applicable, to obtain different incentives. The original contributions obtained are the specification and design of an architecture that supports a distributed user modelling process defined by this research. This process is based on leveraging scattered resources of heterogeneous entities (data sources) to generate on-demand enriched user models that fulfill individual business needs of third entities, considering the involvement of users and the control over their personal resources (data and user models). This has required identifying and characterizing data sources with potential for supplying resources, defining different generation patterns to produce user models from scattered and heterogeneous data, and establishing identity and privacy management infrastructures that allow users to set their privacy preferences regarding the use and sharing of their resources. Moreover, it has also been proposed a reference business model that supports the aforementioned architecture and this has been studied for two application fields: social networks advertising and new financial services. Finally, it has to be emphasized that the contributions obtained in this dissertation have been validated in the context of several national research projects and master thesis that the author has directed or has collaborated with. Furthermore, these contributions have produced different scientific results such as two patents and different publications in relevant international conferences and one magazine. Some of them have been awarded with different prizes.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Para Brasil, actualmente una de las 10 economías más grandes del mundo, los Juegos Olímpicos y Paralímpicos de 2016 representan una oportunidad única. El artículo contrasta Río de Janeiro 2016 con México 1968, los primeros juegos en América Latina, y provee una mirada de cómo los juegos deberían proveer regeneración urbana así como un mejoramiento de la imagen de la ciudad, una imagen constantemente dañada, para una audiencia internacional.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Institute for Prospective Technological Studies Mission: - to provide customer-driven support to the EU policymaking process - by developing science based responses to policy challenges - having both socio-economic and scientific /technological dimension.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The security event correlation scalability has become a major concern for security analysts and IT administrators when considering complex IT infrastructures that need to handle gargantuan amounts of events or wide correlation window spans. The current correlation capabilities of Security Information and Event Management (SIEM), based on a single node in centralized servers, have proved to be insufficient to process large event streams. This paper introduces a step forward in the current state of the art to address the aforementioned problems. The proposed model takes into account the two main aspects of this ?eld: distributed correlation and query parallelization. We present a case study of a multiple-step attack on the Olympic Games IT infrastructure to illustrate the applicability of our approach.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Comparación de las variables cinemáticas y de frecuencia cardiaca en dos posesiones en fútbol