864 resultados para COMMUNICATION-NETWORKS
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
Distributed systems are one of the most vital components of the economy. The most prominent example is probably the internet, a constituent element of our knowledge society. During the recent years, the number of novel network types has steadily increased. Amongst others, sensor networks, distributed systems composed of tiny computational devices with scarce resources, have emerged. The further development and heterogeneous connection of such systems imposes new requirements on the software development process. Mobile and wireless networks, for instance, have to organize themselves autonomously and must be able to react to changes in the environment and to failing nodes alike. Researching new approaches for the design of distributed algorithms may lead to methods with which these requirements can be met efficiently. In this thesis, one such method is developed, tested, and discussed in respect of its practical utility. Our new design approach for distributed algorithms is based on Genetic Programming, a member of the family of evolutionary algorithms. Evolutionary algorithms are metaheuristic optimization methods which copy principles from natural evolution. They use a population of solution candidates which they try to refine step by step in order to attain optimal values for predefined objective functions. The synthesis of an algorithm with our approach starts with an analysis step in which the wanted global behavior of the distributed system is specified. From this specification, objective functions are derived which steer a Genetic Programming process where the solution candidates are distributed programs. The objective functions rate how close these programs approximate the goal behavior in multiple randomized network simulations. The evolutionary process step by step selects the most promising solution candidates and modifies and combines them with mutation and crossover operators. This way, a description of the global behavior of a distributed system is translated automatically to programs which, if executed locally on the nodes of the system, exhibit this behavior. In our work, we test six different ways for representing distributed programs, comprising adaptations and extensions of well-known Genetic Programming methods (SGP, eSGP, and LGP), one bio-inspired approach (Fraglets), and two new program representations called Rule-based Genetic Programming (RBGP, eRBGP) designed by us. We breed programs in these representations for three well-known example problems in distributed systems: election algorithms, the distributed mutual exclusion at a critical section, and the distributed computation of the greatest common divisor of a set of numbers. Synthesizing distributed programs the evolutionary way does not necessarily lead to the envisaged results. In a detailed analysis, we discuss the problematic features which make this form of Genetic Programming particularly hard. The two Rule-based Genetic Programming approaches have been developed especially in order to mitigate these difficulties. In our experiments, at least one of them (eRBGP) turned out to be a very efficient approach and in most cases, was superior to the other representations.
Resumo:
La monografía presenta la auto-organización sociopolítica como la mejor manera de lograr patrones organizados en los sistemas sociales humanos, dada su naturaleza compleja y la imposibilidad de las tareas computacionales de los regímenes políticos clásico, debido a que operan con control jerárquico, el cual ha demostrado no ser óptimo en la producción de orden en los sistemas sociales humanos. En la monografía se extrapola la teoría de la auto-organización en los sistemas biológicos a las dinámicas sociopolíticas humanas, buscando maneras óptimas de organizarlas, y se afirma que redes complejas anárquicas son la estructura emergente de la auto-organización sociopolítica.
Resumo:
Este trabajo describe dos propuestas de gestión urbanística en la ciudad de Bogotá: Ciudad Salitre y Nuevo Usme, sus esquemas de gestión y la forma en como cada proyecto urbano concibe la producción de lo público, a partir de elementos urbanos como: el espacio público, elementos de conexión y conectividad y equipamientos.
Resumo:
Esta tesis está dividida en dos partes: en la primera parte se presentan y estudian los procesos telegráficos, los procesos de Poisson con compensador telegráfico y los procesos telegráficos con saltos. El estudio presentado en esta primera parte incluye el cálculo de las distribuciones de cada proceso, las medias y varianzas, así como las funciones generadoras de momentos entre otras propiedades. Utilizando estas propiedades en la segunda parte se estudian los modelos de valoración de opciones basados en procesos telegráficos con saltos. En esta parte se da una descripción de cómo calcular las medidas neutrales al riesgo, se encuentra la condición de no arbitraje en este tipo de modelos y por último se calcula el precio de las opciones Europeas de compra y venta.
Resumo:
A partir de febrero de 2014, la historia de la República Bolivariana se fracturó. El descontento popular, la protesta social y las marchas pacíficas son reprimidas como consecuencia de un abuso de poder por parte del gobierno del presidente Nicolás Maduro. Las redes de información y comunicación, en los términos de Margaret Keck y Kathryn Sikkink, han jugado un papel fundamental para poner en evidencia las violaciones sistemáticas a los DD.HH., siendo estos el factor principal que vulnera la estabilidad política de la democracia venezolana. En este sentido, el desconocimiento de las garantías fundamentales, el deterioro de la democracia constitucional y el papel multiplicador de los actores transnacionales, han logrado visibilizar ante la comunidad internacional un déficit en materia de DD.HH. y con ello la debilidad de Venezuela como gobierno democrático.
Resumo:
We elucidate the detailed effects of gut microbial depletion on the bile acid sub-metabolome of multiple body compartments (liver, kidney, heart, and blood plasma) in rats. We use a targeted ultraperformance liquid chromatography with time of flight mass-spectrometry assay to characterize the differential primary and secondary bile acid profiles in each tissue and show a major increase in the proportion of taurine-conjugated bile acids in germ-free (GF) and antibiotic (streptomycin/penicillin)-treated rats.Although conjugated bile acids dominate the hepatic profile (97.0 ± 1.5%) of conventional animals, unconjugated bile acids comprise the largest proportion of the total measured bile acid profile in kidney (60.0±10.4%) andheart (53.0 ± 18.5%) tissues. In contrast, in the GF animal, taurine-conjugated bile acids (especially taurocholic acid and tauro-β-muricholic acid) dominated the bile acid profiles (liver: 96.0 ± 14.5%; kidney: 96 ± 1%; heart: 93 ± 1%; plasma: 93.0 ± 2.3%), with unconjugated and glycine-conjugated species representing a small proportion of the profile. Higher free taurine levels were found in GF livers compared with the conventional liver (5.1-fold; P < 0.001). Bile acid diversity was also lower in GF and antibiotic-treated tissues compared with conventional animals. Because bile acids perform important signaling functions, it is clear that these chemical communication networks are strongly influencedbymicrobial activitiesormodulation, as evidenced by farnesoid X receptor-regulated pathway transcripts. The presence of specific microbial bile acid co-metabolite patterns in peripheral tissues (including heart and kidney) implies a broader signaling role for these compounds and emphasizes the extent of symbiotic microbial influences in mammalian homeostasis.
Resumo:
In cooperative communication networks, owing to the nodes' arbitrary geographical locations and individual oscillators, the system is fundamentally asynchronous. This will damage some of the key properties of the space-time codes and can lead to substantial performance degradation. In this paper, we study the design of linear dispersion codes (LDCs) for such asynchronous cooperative communication networks. Firstly, the concept of conventional LDCs is extended to the delay-tolerant version and new design criteria are discussed. Then we propose a new design method to yield delay-tolerant LDCs that reach the optimal Jensen's upper bound on ergodic capacity as well as minimum average pairwise error probability. The proposed design employs stochastic gradient algorithm to approach a local optimum. Moreover, it is improved by using simulated annealing type optimization to increase the likelihood of the global optimum. The proposed method allows for flexible number of nodes, receive antennas, modulated symbols and flexible length of codewords. Simulation results confirm the performance of the newly-proposed delay-tolerant LDCs.
Resumo:
In cooperative communication networks, owing to the nodes' arbitrary geographical locations and individual oscillators, the system is fundamentally asynchronous. Such a timing mismatch may cause rank deficiency of the conventional space-time codes and, thus, performance degradation. One efficient way to overcome such an issue is the delay-tolerant space-time codes (DT-STCs). The existing DT-STCs are designed assuming that the transmitter has no knowledge about the channels. In this paper, we show how the performance of DT-STCs can be improved by utilizing some feedback information. A general framework for designing DT-STC with limited feedback is first proposed, allowing for flexible system parameters such as the number of transmit/receive antennas, modulated symbols, and the length of codewords. Then, a new design method is proposed by combining Lloyd's algorithm and the stochastic gradient-descent algorithm to obtain optimal codebook of STCs, particularly for systems with linear minimum-mean-square-error receiver. Finally, simulation results confirm the performance of the newly designed DT-STCs with limited feedback.
Resumo:
Pode-se observar na mídia a explosão dos assuntos ligados às novas redes de comunicação, as "Highway Information" ou ainda Infovias. Este assunto está em grande evidência no momento e a proposta deste trabalho é mostrar no que a Internet pode ser útil para as organizações, como elas podem utilizar-se deste novo ferramental para desenvolver novos produtos e novos nichos de mercados: - O que já existe hoje e já é possível explorar na rede, inclusive mostrando exemplos de empresas que estão utilizando esse novo conceito. - Um breve exercício de imaginação descrevendo oportunidades de negócios ainda não-exploradas. - O que se diz já ser possível, mas que ainda não está definido como praticável. Este trabalho visa a contribuir no debate sobre a compreensão do fenômeno Internet, de modo a tentar estabelecer as reais implicações de seu desenvolvimento tanto nas organizações quanto na sociedade. Em suma, o objetivo deste trabalho é determinar as reais possibilidades de uso da Internet, como é utilizada hoje e como pode vir a ser utilizada no futuro.
Resumo:
The aim of this dissertation is to study the relation between information technology (IT) and organizational management models by defining the manner in which IT can contribute to their transformation. This study is based on a theoretical reference framework which describes the evolution of the extent and functionality of the use of information technology as a tool for business management, with especial emphasis on the development of the capacity of data and Internet communication networks to establish connections among people, companies and communities. The theoretical reference framework also presents different approaches on how to enhance alignment between information technology and organizational management models, taking into account formal aspects related to the detailing of organizational and technical requisites and social implications concerning the introduction of innovations in previously established cultural environments. The study also contains an empirical section based on a case study on the State of Rio de Janeiro Traffic Department (DETRAN-RJ) in which some of the concepts and methods of approach described in the theoretical reference framework were employed. Keywords: Logistic Services Chain, E-Government, Management Model, Organizational Network, Information Technology
Resumo:
Após endereçar questões relativas à integração de suas funções internas, a empresa está se voltando para a criação de um ambiente externo interconectado com seus parceiros de negócio. Torna-se imperativo o aperfeiçoamento do relacionamento com estes parceiros, por meio de processos automatizados, que gerenciam as Cadeias de Suprimento e Distribuição formadas. A Tecnologia de Informação, ao permitir a conexão de processos e a interoperação de sistemas, passa a ser um instrumento essencial nesta transformação. Especificamente, o ambiente digital de negócio construído sobre a Infovia, formada principalmente pela Internet e seus serviços, como a WWW, confere avanços consideráveis ao relacionamento dentro da organização, entre organizações e entre estas e seus clientes. A esta transformação do negócio, baseada na Tecnologia de Informação, conectado às redes de comunicação, chama-se Comércio Eletrônico. Com base no conhecimento consolidado pelo referencial teórico disponível e nos resultados obtidos com o estudo de caso conduzido, o autor identifica e categoriza as influências do Comércio Eletrônico nos processos de compra da Cadeia de Suprimentos na indústria química, estruturando estas influências em relação aos modelos de negócios digitais conhecidos.
Resumo:
As questões ligadas a gestão de riscos associados a segurança da informação já é uma realidade no cenário empresarial brasileiro. O crescimento das operações de negócios em direção aos sistemas de informação baseados em tecnologia fez com que os números de ameaças e de vulnerabilidades sobre as redes de computadores e comunicações aumentassem. Vários são os desafios de estruturação e implementação de uma área de segurança da informação dentro das empresas. Este trabalho analisa as diversas formas de construção de uma infra-estrutura de gestão de risco em segurança de informação, não só no âmbito tecnológico, mas também, no operacional e no mercadológico, de forma a estabelecer uma relação transparente às demais áreas internas da organização, aos clientes e a todo o mercado. A segurança da informação, vista freqüentemente como um assunto ligado a tecnologia, passa a ser entendida cada vez mais como um processo de negócio, e conseqüentemente, uma grande vantagem competitiva para o mundo empresarial.
Resumo:
T'his dissertation proposes alternative models to allow the interconnectioin of the data communication networks of COSERN Companhia Energética do Rio Grande do Norte. These networks comprise the oorporative data network, based on TCP/IP architecture, and the automation system linking remote electric energy distribution substations to the main Operatin Centre, based on digital radio links and using the IEC 60870-5-101 protoco1s. The envisaged interconnection aims to provide automation data originated from substations with a contingent route to the Operation Center, in moments of failure or maintenance of the digital radio links. Among the presented models, the one chosen for development consists of a computational prototype based on a standard personal computer, working under LINUX operational system and running na application, developesd in C language, wich functions as a Gateway between the protocols of the TCP/IP stack and the IEC 60870-5-101 suite. So, it is described this model analysis, implementation and tests of functionality and performance. During the test phase it was basically verified the delay introduced by the TCP/IP network when transporting automation data, in order to guarantee that it was cionsistent with the time periods present on the automation network. Besides , additional modules are suggested to the prototype, in order to handle other issues such as security and prioriz\ation of the automation system data, whenever they are travesing the TCP/IP network. Finally, a study hás been done aiming to integrate, in more complete way, the two considered networks. It uses IP platform as a solution of convergence to the communication subsystem of na unified network, as the most recente market tendencies for supervisory and other automation systems indicate
Resumo:
The author suggests a long-distance teaching on toxinology using the following media: conventional printed book, scientific electronic journal, video library and the Internet. These new media are discussed as new alternatives for long-distance learning without the teacher.