21 resultados para Sistemas eletronicos de segurança
em Universidade Federal do Rio Grande do Norte(UFRN)
Resumo:
The semiconductor technologies evolutions leads devices to be developed with higher processing capability. Thus, those components have been used widely in more fields. Many industrial environment such as: oils, mines, automotives and hospitals are frequently using those devices on theirs process. Those industries activities are direct related to environment and health safe. So, it is quite important that those systems have extra safe features yield more reliability, safe and availability. The reference model eOSI that will be presented by this work is aimed to allow the development of systems under a new view perspective which can improve and make simpler the choice of strategies for fault tolerant. As a way to validate the model na architecture FPGA-based was developed.
Resumo:
This work provides great contribution to the documental study of the Work Safety courses offered by CEFETs in Brazil, under the perspective of safety management and occupational health, using as a referential the specification OHSAS 18001 (BSI, 1999), as well as directions provided by OIT (ILO, 2001). The theoretical research compares technical and managing competences of the projects of Work Safety courses at CEFETs with the international legislation mentioned above. For field research, questionnaires containing open and close questions were answered by teachers and students aiming at identifying the importance of technical and managing competences for the formation of Work Safety technicians, besides trying to identify which level of minimal formal knowledge should be required to perform managing activities in the area of Work Safety Management Systems and Occupational Health (SGSSO, in Portuguese). The results of the theoretical research point out differences between the projects of the Work Safety technical courses at CEFETs under the perspective of SGSSO. The field research shows that students and teachers opinions converge about most technical and managing competences. In relation to academic formation, the research suggests divergences to the criterion stated by the norm ISO 19011(ABNT, 2002)
Resumo:
The academic community and software industry have shown, in recent years, substantial interest in approaches and technologies related to the area of model-driven development (MDD). At the same time, continues the relentless pursuit of industry for technologies to raise productivity and quality in the development of software products. This work aims to explore those two statements, through an experiment carried by using MDD technology and evaluation of its use on solving an actual problem under the security context of enterprise systems. By building and using a tool, a visual DSL denominated CALV3, inspired by the software factory approach: a synergy between software product line, domainspecific languages and MDD, we evaluate the gains in abstraction and productivity through a systematic case study conducted in a development team. The results and lessons learned from the evaluation of this tool within industry are the main contributions of this work
Resumo:
There are authentication models which use passwords, keys, personal identifiers (cards, tags etc) to authenticate a particular user in the authentication/identification process. However, there are other systems that can use biometric data, such as signature, fingerprint, voice, etc., to authenticate an individual in a system. In another hand, the storage of biometric can bring some risks such as consistency and protection problems for these data. According to this problem, it is necessary to protect these biometric databases to ensure the integrity and reliability of the system. In this case, there are models for security/authentication biometric identification, for example, models and Fuzzy Vault and Fuzzy Commitment systems. Currently, these models are mostly used in the cases for protection of biometric data, but they have fragile elements in the protection process. Therefore, increasing the level of security of these methods through changes in the structure, or even by inserting new layers of protection is one of the goals of this thesis. In other words, this work proposes the simultaneous use of encryption (Encryption Algorithm Papilio) with protection models templates (Fuzzy Vault and Fuzzy Commitment) in identification systems based on biometric. The objective of this work is to improve two aspects in Biometric systems: safety and accuracy. Furthermore, it is necessary to maintain a reasonable level of efficiency of this data through the use of more elaborate classification structures, known as committees. Therefore, we intend to propose a model of a safer biometric identification systems for identification.
Resumo:
The research aimed to understand the challenges for the implementation of the proposed integration between the Civil Police and the Military Police in Rio Grande do Norte to the proposals of the SUSP. This study aimed to explore the gap with regard to the deepening of the possible causes that may hinder the implementation of integrated working between the police in public security, through a specific analysis on the state of Rio Grande do Norte. Was based on a theoretical framework that includes policies: general concepts, the steps of a public policy, the implementation stage , public security : conceptual definitions, policies on security in Brazil, the structure of public security in Brazil and systems police, Military Police x Civil Police: Roles and conflicts , integrating public security: the challenges to be overcome, the Unified public Safety (SUSP) and the main difficulties in the integration of the police. Being classified as to the purposes as an exploratory research on how to approach ranks as qualitative. The research unit was the Center for Integrated Operations Public Safety (CIOSP) through three subjects who were the chief CIOSP, the representative of the military police acting with the CIOSP, and representative civil police also active with the CIOSP. These subjects were chosen because of the understanding that individuals occupying senior positions would have more ability to respond to questions that guide the research problem. Data were collected through a set of interviews, qualitative data analysis was performed based content analysis, based on the definition of categories of analysis, gated time cross. With the results, it was revealed that the main problems of integration between the state police are treatment protocols, lack of political will and lack of infrastructure. The relationship between the Military Police and Civil Police in Rio Grande do Norte has differing cultural aspect, but can be considered as good value, professionalism and integrated operations. The implementation of CIOSP-RN followed the characteristics of the top-down model, the main difficulties in implementing the proposals of the SUSP, lack of own resources, the lack of standardization in public safety and the lack of professional training of public safety. It was concluded that with respect to the challenges to the implementation of the proposed integration between the Civil Police and the Military Police in Rio Grande do Norte to the proposals of the SUSP, the actions follow the characteristics of the top-down model, with no autonomy of administrators public to say in decisions, which restricts the view of the public safety of the state
Resumo:
This work aimed to develop a suitable magnetic system for administration by the oral route. In addition to that, it was intended to review the current uses of magnetic systems and the safety related to magnetic field exposure. Methods: Coprecipitation and emulsification/crosslinking were carried out in order to synthesize magnetite particles and to coat them, respectively. Results: According to literature review, it was found that magnetic particles present several properties such as magnetophoresis in magnetic field gradient, production of a surrounding magnetic field, and heat generation in alternated magnetic field. When the human organism is exposed to magnetic fields, several interaction mechanisms come into play. However, biological tissues present low magnetic susceptibility. As a result, the effects are not so remarkable. Concerning the development of a magnetic system for oral route, uncoated magnetite particles did undergo significant dissolution at gastric pH. On the other hand, such process was inhibited in the xylan-coated particles. Conclusions: Due to their different properties, magnetic systems have been widely used in biosciences. However, the consequent increased human exposure to magnetic fields has been considered relatively safe. Concerning the experimental work, it was developed a polymer-coated magnetic system. It may be very promising for administration by the oral route for therapy and diagnostic applications as dissolution at gastric pH hardly took place
Resumo:
This study aimed to identify and describe the factors related to Patient Safety in a medication system according to the nurses analysis in a teaching hospital from the photographic analysis method. This was a cross-sectional, descriptive study with mixed approach in a teaching hospital in Rio Grande do Norte. The population consisted of 42 nurses from inpatient units, of which 34 composed the study sample. As eligibility criteria, we defined nurses from public service and nurses who agreed to participate. Ethical determinations were observed, the study was submitted to the Ethics and Research of the University Hospital Onofre Lopes, obtaining the assent with ethical assessment certificate (CAAE 0098.0.051.294-11). For data collection, we used the photographic method (Photographic Analysis Technique) by Patricia Marck (Canada). It was developed in two phases: at first, we randomly captured photos from the medication system, resulting in 282 images; then we selected/processed the photographs, which were reduced to 10 images in Microsoft Excel 2010; in the second phase, the nurses answered the questionnaire divided into socio-professional profile and Digital Photography Scoring Tool (questions a and b ). For analysis of the question a , we used the content analysis technique, and for b , we used the Statistical Package for the Social Sciences 20.0 (temporary license). The socio-professional profile revealed the predominance of females; age group 34-43 years; professionals with specialization; 10-18 years of length of service; and nurses working exclusively in the hospital and who know the Patient Safety. The photographic analysis in relation to Patient Safety resulted in specific categories for each stage of the medication system. Regarding disposal, we identified Proper verification ; Improper verification ; Correct identification ; Disposal in single doses ; and Improper Environment , with predominance of that last category. As for storage: Proper storage ; Improper storage ; Risk of exchange/disappearance ; and Poor hygiene , with special reference to improper storage. In preparation: Risk of exchanging medication/patient ; Inappropriate physical space ; and Inadequate 9 preparation of controlled drugs , highlighting the first category. In drug administration: Lack of Personal Protective Equipment ; Use of Personal Protective Equipment ; Improper administration technique ; Proper administration technique ; Correct drug identification ; Incorrect drug identification ; and Peripheral venous access without identification . From the safety assessment of 10 photographs, by adapting the scores (1-10) to the Likert Scale, we identified three Totally Unsafe (Level 1), three Unsafe (Level 2), three Partially Safe (Level 3), one Safe (Level 4), and no photograph considered Totally Safe. This study identified the prevalence of unsafety in the medication system in the nurses opinion. We were also able to understand that, although nurses identify safety aspects, the most prevalent categories characterize an unsafe assessment. Nursing needs to reflect on its practice, identifying gaps in the medication system in order to achieve a proper and safe care
Resumo:
The greater part of monitoring onshore Oil and Gas environment currently are based on wireless solutions. However, these solutions have a technological configuration that are out-of-date, mainly because analog radios and inefficient communication topologies are used. On the other hand, solutions based in digital radios can provide more efficient solutions related to energy consumption, security and fault tolerance. Thus, this paper evaluated if the Wireless Sensor Network, communication technology based on digital radios, are adequate to monitoring Oil and Gas onshore wells. Percent of packets transmitted with successful, energy consumption, communication delay and routing techniques applied to a mesh topology will be used as metrics to validate the proposal in the different routing techniques through network simulation tool NS-2
Resumo:
This work presents a suggestion of a security system of land automation having as objective main the creation of a system capable from easy method, supervise the installations of a building with the goal to preserver security personal and patrimonial necessities, aim at portability low cost and use easiness. Was designed an alarms central and access controller that has digital and analogical inputs for sensors and outputs for buzzer, telephonic dialing and electronic lock. The system is supervised by software that makes solicitations of information to the alarms central through the one computer's serial port (RS-232). The supervisory software was developed in platform LabVIEW with displays the received data on a graphical interface informing the sensors' current states distributed in the building and system events as alarns occurrences. This system also can be viewed through the Internet for people registered by the land security's system administrator
Resumo:
The industries are getting more and more rigorous, when security is in question, no matter is to avoid financial damages due to accidents and low productivity, or when it s related to the environment protection. It was thinking about great world accidents around the world involving aircrafts and industrial process (nuclear, petrochemical and so on) that we decided to invest in systems that could detect fault and diagnosis (FDD) them. The FDD systems can avoid eventual fault helping man on the maintenance and exchange of defective equipments. Nowadays, the issues that involve detection, isolation, diagnose and the controlling of tolerance fault are gathering strength in the academic and industrial environment. It is based on this fact, in this work, we discuss the importance of techniques that can assist in the development of systems for Fault Detection and Diagnosis (FDD) and propose a hybrid method for FDD in dynamic systems. We present a brief history to contextualize the techniques used in working environments. The detection of fault in the proposed system is based on state observers in conjunction with other statistical techniques. The principal idea is to use the observer himself, in addition to serving as an analytical redundancy, in allowing the creation of a residue. This residue is used in FDD. A signature database assists in the identification of system faults, which based on the signatures derived from trend analysis of the residue signal and its difference, performs the classification of the faults based purely on a decision tree. This FDD system is tested and validated in two plants: a simulated plant with coupled tanks and didactic plant with industrial instrumentation. All collected results of those tests will be discussed
Resumo:
A new method to perform TCP/IP fingerprinting is proposed. TCP/IP fingerprinting is the process of identify a remote machine through a TCP/IP based computer network. This method has many applications related to network security. Both intrusion and defence procedures may use this process to achieve their objectives. There are many known methods that perform this process in favorable conditions. However, nowadays there are many adversities that reduce the identification performance. This work aims the creation of a new OS fingerprinting tool that bypass these actual problems. The proposed method is based on the use of attractors reconstruction and neural networks to characterize and classify pseudo-random numbers generators
Resumo:
RFID (Radio Frequency Identification) identifies object by using the radio frequency which is a non-contact automatic identification technique. This technology has shown its powerful practical value and potential in the field of manufacturing, retailing, logistics and hospital automation. Unfortunately, the key problem that impacts the application of RFID system is the security of the information. Recently, researchers have demonstrated solutions to security threats in RFID technology. Among these solutions are several key management protocols. This master dissertations presents a performance evaluation of Neural Cryptography and Diffie-Hellman protocols in RFID systems. For this, we measure the processing time inherent in these protocols. The tests was developed on FPGA (Field-Programmable Gate Array) platform with Nios IIr embedded processor. The research methodology is based on the aggregation of knowledge to development of new RFID systems through a comparative analysis between these two protocols. The main contributions of this work are: performance evaluation of protocols (Diffie-Hellman encryption and Neural) on embedded platform and a survey on RFID security threats. According to the results the Diffie-Hellman key agreement protocol is more suitable for RFID systems
Resumo:
Previous works have studied the characteristics and peculiarities of P2P networks, especially security information aspects. Most works, in some way, deal with the sharing of resources and, in particular, the storage of files. This work complements previous studies and adds new definitions relating to this kind of systems. A system for safe storage of files (SAS-P2P) was specified and built, based on P2P technology, using the JXTA platform. This system uses standard X.509 and PKCS # 12 digital certificates, issued and managed by a public key infrastructure, which was also specified and developed based on P2P technology (PKIX-P2P). The information is stored in a special file with XML format which is especially prepared, facilitating handling and interoperability among applications. The intention of developing the SAS-P2P system was to offer a complementary service for Giga Natal network users, through which the participants in this network can collaboratively build a shared storage area, with important security features such as availability, confidentiality, authenticity and fault tolerance. Besides the specification, development of prototypes and testing of the SAS-P2P system, tests of the PKIX-P2P Manager module were also performed, in order to determine its fault tolerance and the effective calculation of the reputation of the certifying authorities participating in the system
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico
Resumo:
The traditional perimeter-based approach for computer network security (the castle and the moat model) hinders the progress of enterprise systems and promotes, both in administrators and users, the delusion that systems are protected. To deal with the new range of threats, a new data-safety oriented paradigm, called de-perimeterisation , began to be studied in the last decade. One of the requirements for the implementation of the de-perimeterised model of security is the definition of a safe and effective mechanism for federated identity. This work seeks to fill this gap by presenting the specification, modelling and implementation of a mechanism for federated identity, based on the combination of SAML and X.509 digital certificates stored in smart-cards, following the A3 standard of ICP-Brasil (Brazilian official certificate authority and PKI)