19 resultados para Internet security

em Universidade do Minho


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Relatório de estágio de mestrado em Ensino de Informática

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a new approach of pre-defined profiles, based in different voltage and current values, to control the charging and discharging processes of batteries in order to assess their performance. This new approach was implemented in a prototype that was specially developed for such purpose. This prototype is a smart power electronics platform that allows to perform batteries analysis and to control the charging and discharging processes through a web application using pre-defined profiles. This platform was developed aiming to test different batteries technologies. Considering the relevance of the energy storage area based in batteries, especially for the batteries applied to electric mobility systems, this platform allows to perform controlled tests to the batteries, in order to analyze the batteries performance under different scenarios of operation. Besides the results obtained with the batteries, this work also intends to produce results that can contribute to an involvement in the strengthening of the Internet-of-Things.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Relatório de estágio de mestrado em Ensino de Português no 3º Ciclo do Ensino Básico e no Ensino Secundário e de Espanhol nos Ensinos Básico e Secundário

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security risk management is by definition, a subjective and complex exercise and it takes time to perform properly. Human resources are fundamental assets for any organization, and as any other asset, they have inherent vulnerabilities that need to be handled, i.e. managed and assessed. However, the nature that characterize the human behavior and the organizational environment where they develop their work turn these task extremely difficult, hard to accomplish and prone to errors. Assuming security as a cost, organizations are usually focused on the efficiency of the security mechanisms implemented that enable them to protect against external attacks, disregarding the insider risks, which are much more difficult to assess. All these demands an interdisciplinary approach in order to combine technical solutions with psychology approaches in order to understand the organizational staff and detect any changes in their behaviors and characteristics. This paper intends to discuss some methodological challenges to evaluate the insider threats and its impacts, and integrate them in a security risk framework, that was defined according to the security standard ISO/IEC_JTC1, to support the security risk management process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Childhood protection is a subject with high value for the society, but, the Child Abuse cases are difficult to identify. The process from suspicious to accusation is very difficult to achieve. It must configure very strong evidences. Typically, Health Care services deal with these cases from the beginning where there are evidences based on the diagnosis, but they aren’t enough to promote the accusation. Besides that, this subject it’s highly sensitive because there are legal aspects to deal with such as: the patient privacy, paternity issues, medical confidentiality, among others. We propose a Child Abuses critical knowledge monitor system model that addresses this problem. This decision support system is implemented with a multiple scientific domains: to capture of tokens from clinical documents from multiple sources; a topic model approach to identify the topics of the documents; knowledge management through the use of ontologies to support the critical knowledge sensibility concepts and relations such as: symptoms, behaviors, among other evidences in order to match with the topics inferred from the clinical documents and then alert and log when clinical evidences are present. Based on these alerts clinical personnel could analyze the situation and take the appropriate procedures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Internet of Things (IoT) is a concept that can foster the emergence of innovative applications. In order to minimize parents’s concerns about their children’s safety, this paper presents the design of a smart Internet of Things system for identifying dangerous situations. The system will be based on real time collection and analysis of physiological signals monitored by non-invasive and non-intrusive sensors, Frequency IDentification (RFID) tags and a Global Positioning System (GPS) to determine when a child is in danger. The assumption of a state of danger is made taking into account the validation of a certain number of biometric reactions to some specific situations and according to a self-learning algorithm developed for this architecture. The results of the analysis of data collected and the location of the child will be able in real time to child’s care holders in a web application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

(Excerto) O entusiasmo pela comunicação digital percorre transversalmente a obra How Internet Radio Can Change the World: An Activist’s Handbook, de Eric Lee. Esta postura tão apologista das possibilidades comunicativas oferecidas pela Internet reforça provavelmente um conjunto alargado de entendimentos sobre a conquista do quotidiano pelo digital. Em 1967, McLuhan e Fiore já se referiam aos circuitos eletrónicos como ‘extensões do sistema nervoso central’. Numa leitura mais contemporânea, José Bragança de Miranda refere: “vivemos, nos nossos dias, no meio de conexões, de links, do on‑line, estamos votados à participação, à ‘interactividade’, etc. Algo de novo está a emergir” (2001, p. 265). Maria Teresa Cruz (2001) define a convergência tecnológica das relações sociais como a ‘mobilização erótica da técnica’. Esta obra aqui recenseada pretende, assim, desafiar a utilização da rádio digital para “melhorar a comunicação e solidificar as organizações” (p. 1), em torno de três grupos de reflexão.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[Extrat] The advent of thc internet raised questions about the role of radio in a fast-changing media environment. Many voices forecast its end but in the summer of 2008 the Swedish Radio and TV Authority published a study named 'The Future of Radio', which clearly opposed the pessimism of recent analysis. While the study anticipates the exhaustion of the FM model, it clearly broadens perspectives for DAB and internet radio, highlighting digitalization as the key element for the future relevance of radio. The Portuguese researcher and radio professional João Paulo Meneses states that 'the future of radio relies upon the internet', calling the broad service offerings of the net the pathway for the survival of radio from the threats to its two essential aspects: rnobility and accumulation (Meneses 2008). Accumulation is radio's capability to be used in a non­exclusive manner, which means that a listener can use the radio while performing other activities, like cooking, sewing, reading, writing or jogging.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

O aparecimento da ideia de sociedade em rede está profundamente ligado aos processos de digitalização da comunicação e ao desenvolvimento da internet. No entanto, o conceito de rede, definido por Manuel Castells (1999, p. 566), como “um conjunto de nós interconectados”, autoriza uma leitura mais recuada no tempo daquilo que pode ser entendido como o prenuncio de uma sociedade de fluxo e de ligações. Com efeito, registando já uma história praticamente centenária, a rádio está muito mais vinculada à criação de redes e de comunidades virtuais do que a sua origem analógica, baseada em tecnologia pouco sofisticada, poderia fazer crer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[Excerto] Num livro recente, sob o título As notícias – um manual do utilizador, o filósofo britânico, Alain de Botton, diz-nos que vivemos, no presente, num estado de permanente aborrecimento e confusão. “Todos nos damos conta, com frequência, de estar perante uma notícia de enorme importância que não nos desperta qualquer interesse”, diz o autor, para acrescentar que essa postura tem origem numa formatação narrativa, cada vez mais disseminada, que nos mergulha por breves instantes numa história complexa e que de seguida nos faz avançar para outra experiência semelhante.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dissertação de mestrado integrado em Engenharia Eletrónica Industrial e Computadores

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tese de Doutoramento em Ciências da Educação (Especialidade em Tecnologia Educativa)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dissertação de mestrado em Crime, Diferença e Desigualdade

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Relatório de estágio de mestrado em Ensino de Informática