241 resultados para Seguranca : Computadores


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last decades changes have occurred in communication within and between enterprises, made easier by technologies suchas E-commerce, Internet, ERP systems and remote meetings and there was a rapid progress in network technology, which has changed the way business is done. A standardized way to offer services over the internet is using web services. Web services are a kind of remote procedure call and are generally used to integrate systems, independent of language, both client and server. It is common to use several web services run in sequence to perform a business process. To this type of process, gives the name of workflow. Thus, Web services are the primary components of workflows. A tool that provides a way of visualizing the behavior of a workflow can assist the administrator and is required. The present work presents the development of a tool that allows the administrator to classify visually services components and evaluate their importance in the final performance of a workflow. As proof of concept we used several virtual servers and computers where each computer has received a set of web services. A proxy was added between each call of workflows collecting relevant information and storing them in a database for later analysis. The analysis was based on Quality of Service parameters

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A análise estatística multivariada, extensão da análise univariada, consiste num conjunto de técnicas estatísticas, aplicadas quando há diversas variáveis relacionadas simultaneamente, sendo todas elas, em princípio, consideradas importantes no fenômeno em estudo. É de grande aplicação a conjuntos de dados das mais diversas áreas do conhecimento, principalmente da área biológica. Seu desenvolvimento teve um grande impulso na primeira metade do século passado. Entretanto, devido a complexidade dos cálculos matemáticos, principalmente envolvendo operações com matrizes de altas ordens, as aplicações somente se popularizaram nos dias atuais, com o desenvolvimento dos computadores e aplicativos computacionais. Técnicas estudadas: distâncias multivariadas, componentes principais, análise fatorial, correlações canônicas, análise de correspondência, teste t² de Hotelling, análise de variância multivariada (Manova), teste de normalidade multivariada, igualdade de matrizes de variâncias e covariâncias para populações multinormais

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Given the exponential growth in the spread of the virus world wide web (Internet) and its increasing complexity, it is necessary to adopt more complex systems for the extraction of malware finger-prints (malware fingerprints - malicious software; is the name given to extracting unique information leading to identification of the virus, equivalent to humans, the fingerprint). The architecture and protocol proposed here aim to achieve more efficient fingerprints, using techniques that make a single fingerprint enough to compromise an entire group of viruses. This efficiency is given by the use of a hybrid approach of extracting fingerprints, taking into account the analysis of the code and the behavior of the sample, so called viruses. The main targets of this proposed system are Polymorphics and Metamorphics Malwares, given the difficulty in creating fingerprints that identify an entire family from these viruses. This difficulty is created by the use of techniques that have as their main objective compromise analysis by experts. The parameters chosen for the behavioral analysis are: File System; Records Windows; RAM Dump and API calls. As for the analysis of the code, the objective is to create, in binary virus, divisions in blocks, where it is possible to extract hashes. This technique considers the instruction there and its neighborhood, characterized as being accurate. In short, with this information is intended to predict and draw a profile of action of the virus and then create a fingerprint based on the degree of kinship between them (threshold), whose goal is to increase the ability to detect viruses that do not make part of the same family

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work aims to investigate more deeply the concept of Newsgame in order to map essencial features for this new type of media product. Based on several examples, we will analyze the different ways in which a game can behave journalistically. We shall seek the author who coined the term “newsgame”, Gonzalo Frasca, and other international authors, based or not on the first, that attempt to point out limits for these electronic games that aspire Journalism. Some models are harsh, while others are more embracing, but all are intended to achieve a new paradigm in communication that releases itself from static representation stemmed from analog media and ventures into the potential of simulation brought from the digital platform. Examples of newsgames and its theories set forth herein also include Brazilian cases, which we will try to prove to be the most laymen on the subject

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tendo em vista as inúmeras possibilidades de utilização dos recursos tecnológicos, como computadores, internet e jogos eletrônicos, em todos os contextos da vida humana, o campo de educação não pode ficar alheio às vantagens desses recuros. Entretanto, esta inserção de jogos eletrônicos como estratégias no contexto da educação, seja no âmbito formal, quanto no informal ainda precisa vencer algumas barreiras. Torna-se importante que os educadores busquem aliar esses dispositivos e jogos ao ensino, com o intuito de atender às demandas e expectativas crescentes sobre o uso cada vez mais constante desses recursos em todos os âmbitos da sociedade. Assim, este estudo teve por objetivo analisar o uso do jogo eletrônico não-didático e de entretenimento Zoo Tycoon® 2 para o ensino de Ciências e Biologia, observando-se a autenticidade dos conteúdos de Ciências e Biologia presentes no mesmo e, também, a forma como esse conteúdo é apresentado aos usuários. Para tanto, foi realizado um levantamento bibliográfico acerca do significado do ensino formal, não-formal e informal e a inserção do jogo Zoo Tycoon® 2 no contexto da aprendizagem, no que tange ao ensino de Ciências e Biologia. Os dados obtidos foram analisados com base na técnica de análise de conteúdo temático e classificados em três categorias, de acordo com o modo que aparecem no jogo, tal como interagem com o jogador. As categorias de classificação foram referentes aos conteúdos Meramente Ilustrativos (MI), Simplesmente Informativos (SI) e Educativos (E), estando cada uma relacionada, gradativamente, com o maior conteúdo de informações e a maior interação do jogador para com as informações, representando um acesso mais fácil e direto ao conteúdo. Os resultados apontam que este jogo transmite, efetivamente, conteúdos educativos, e também funciona como uma ferramenta despertadora e embasadora, isto é, ele estimula a busca por conhecimento e dá base...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a quantum search algorithm implementation with small modifications. The algorithm idea is to be hybrid, capable to run on classical systems and quantum systems. We present the concepts of quantum search and introduced a pseudo-framework able to generate code for classical computers (C++) and quantum computers (QCL). The algorithms were submitted to simulations, which resulted in a comparative study of the operation of Grover’s algorithm on both systems, carrying out searches in a mass of data in XML format files. As a result, we see very similar numbers between classical and quantum systems, this creates an expectation that the search in real quantum computers is much more efficient.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the area of Phonetics, current studies are mainly geared toward acoustic analysis of the speech. The technology of personal computers and available software made these analyses easier to be carried out. The following work used the software called PRAAT. Besides showing how it helps the researcher, the aim of this work is to bring new data for future consultation in this field, allowing comparisons and discussions about this subject. At FONAC, a place where a Project of Departmental Traineeship is run, coordinated by Prof. Dr. Luiz Carlos Cagliari and aimed at training on Acoustic Phonetics for undergraduates and graduates, there is a good quality recording, in which a speaker of the paulista dialect reads an excerpt of Michael Ende and Annegert Fuchshuber’s book named ‘The Dream-eater’ twice. The data obtained through it were analyzed directly or by statistic procedures. Tables and charts, created from these data, helped to visualize the similarities and differences between the vowels allowing an easier comprehension of the articulatory phenomenon. With the formants, specifically, prototypical values for the vowels of Portuguese and the dialect in study were obtained

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The phenomenon of the World Wide Web, the Internet, has revolutionized the way we live in a contemporary relevance. The relationships among people have changed since the media also changed: the cyberspace has been established as an important vehicle of communication in which different languages, cultures and peoples coexist. Within the virtual space there are several fica possibilities for communication, interaction, fun, knowledge etc. Everything happens extremely quickly. An interesting example of that are blogs that, to survive virtuality, require constant updating. It has become interesting to notice the factor of personal expressiveness taking a new shape in the context of network, before being seen in elements such as diaries, poetry, artistic production or debate. The chances and, thus, the need to find people to interact and to share interests has taken a gigantic proportion, and, in this way, sources of audiovisual and reading activities are always in vogue, being shared every second. Blogging can be about different subjects, but what is perceived on all blogs is the strong trace of written text is always presented. Twitter has established itself as a microblogging network for the expression of dynamism, information sharing and interaction. Thus, it was interesting to approach the manner language is expressed in these microblogs thinking about the way that literary discourse is constructed when is seen, on quotations, in the context of this social network: Twitter. Being able to attest the great increase on the occurrences of quotes from different literary genres, it was useful to pay attention to this fact. In Brazil, Twitter has thousands of users, fans and readers, that rewrite and quote authors. The number of quotations is so abundant that it has popularized several Brazilian writers, such as: Clarice Lispector and Caio Fernando Abreu; authors that are frequetenly quoted. So, we made usage of semiotic studies of the French line. In...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The search for more reliable security systems and information management of these systems is leading to a growing progress in new technologies investments that allow the implementation of equipment with a high level of reliability, but also have an agile and practical operation. This led people to turn increasingly looking for home automation systems, enterprise and industry for the automation and integration of their systems. The identification by radio frequency is very widespread today for ensuring both agility in handling records data, the reliability of their identification systems, which are increasingly advanced and less susceptible to fraud. Attached to this technology, the use of the database is always very important for the storage of information collected, the area where the MySQL platform is widely used. Using the open source Arduino platform for programming and manipulation of RFID module and LabVIEW software for the union of all these technologies and to develop a user-friendly interface, you can create a highly reliable access control and agility places a high turnover of people. This project aims to prove the advantages of using all these technologies working together, thus improving a flawed system effectively safety, cheaper and quicker

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pós-graduação em Engenharia Mecânica - FEIS

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this work is presenting the development and the results of a research, which focus of interest has been the making of softwares that could help the process of teaching and learning of the hindu-arabic numerals system, on children in the alphabetical stage. Since the most important presupposes to this work are the development of the number concept according to Jean Piaget (1986-1980) and the reality of the classroom, then three different moments have been fixed: the creation of a beginning scheme of computer activities; the aplication of these activities on children in the alphabetical stage; and, finally, an analysis of the limits and possibilities of these activities while an environment cause of actions that would benefit the process of teaching and learning of the mentioned content. Finally, based on the anlysis of the results obtained, the next step was fixing a more consistant set of computer activities, which makes up a proposal to the use of computer in the process of teaching and learning of the first hindu-arabic numbers

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pós-graduação em Engenharia Elétrica - FEIS