405 resultados para Cyber-amoureux


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mestrado, Educação Pré-Escolar e Ensino do 1.º Ciclo do Ensino Básico, 9 de Março de 2016, Universidade dos Açores (Relatório de Estágio).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La tragi-comédie de Corneille, «Le Cid» (1636-7), est davantage une pièce d‘amour qui illustre bien la condition de la femme au XVIIème siècle. Le triangle amoureux constitué par l‘Infante, Chimène et Rodrigue est l‘un des fondements de la pièce. Cependant, comme les personnages sont insérés dans un système féodal basé sur une idéologie aristocratique, l‘amour ne se présente pas comme une jouissance paisible. De cette façon, il y a une lutte acharnée entre l‘amour, le devoir et l‘honneur, ce qui est frappant au niveau lexical. Les personnages les plus jeunes utilisent beaucoup de mots associés au thème de l‘amour et qui ont le radical amour-, tandis que les plus âgés emploient très souvent des mots qui appartiennent au champ lexical de l‘honneur et de la gloire. Selon D. Diègue, l‘honneur a plus de puissance que l‘amour, et il trouve que l‘homme qui s‘endort dans l‘amour oublie ses devoirs. Pour l‘Infante, Chimène et Rodrigue, l‘amour est lié à la souffrance. L‘Infante souffre, mais elle se conforme, parce qu‘étant donné qu‘elle est fille de roi, elle ne peut pas aimer Rodrigue qui appartient à un rang inférieur. Chimène est le revers de l‘Infante, c‘est une femme rebelle qui veut mouler sa destinée. Cependant, tout au long de la pièce, l‘héroïne est assujettie à une force mâle: si parfois l‘amour entre elle et Rodrigue ressemble à l‘amour courtois du Moyen âge quand il se met à la disposition de sa maîtresse et la place au-dessus de lui, la plupart du temps il met la passion en dessous de l‘honneur, parce que c‘est un homme et descend d‘une famille de guerriers vaillants. Selon le code chevaleresque dans lequel il est inséré la femme est inférieure à l‘homme. À la fin de la pièce, il y a une victoire de l‘amour sur l‘honneur et le devoir : Chimène abdique de son honneur en pardonnant et en prenant pour mari l‘assassin de son père. Le monde de l‘élément masculin triomphe et elle devient le prix de la victoire de Rodrigue. Mais si son statut de femme l‘empêche de sortir victorieuse, elle ne se conforme pas et dans sa dernière tirade elle met en question la justice et défie la société féodale.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The relation between the information/knowledge expression and the physical expression can be involved as one of items for an ambient intelligent computing [2],[3]. Moreover, because there are so many contexts around user/spaces during a user movement, all appplcation which are using AmI for users are based on the relation between user devices and environments. In these situations, it is possible that the AmI may output the wrong result from unreliable contexts by attackers. Recently, establishing a server have been utilizes, so finding secure contexts and make contexts of higher security level for save communication have been given importance. Attackers try to put their devices on the expected path of all users in order to obtain users informationillegally or they may try to broadcast their SPAMS to users. This paper is an extensionof [11] which studies the Security Grade Assignment Model (SGAM) to set Cyber-Society Organization (CSO).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aerodynamic drag is known to be one of the factors contributing more to increased aircraft fuel consumption. The primary source of skin friction drag during flight is the boundary layer separation. This is the layer of air moving smoothly in the immediate vicinity of the aircraft. In this paper we discuss a cyber-physical system approach able of performing an efficient suppression of the turbulent flow by using a dense sensing deployment to detect the low pressure region and a similarly dense deployment of actuators to manage the turbulent flow. With this concept, only the actuators in the vicinity of a separation layer are activated, minimizing power consumption and also the induced drag.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Managing the physical and compute infrastructure of a large data center is an embodiment of a Cyber-Physical System (CPS). The physical parameters of the data center (such as power, temperature, pressure, humidity) are tightly coupled with computations, even more so in upcoming data centers, where the location of workloads can vary substantially due, for example, to workloads being moved in a cloud infrastructure hosted in the data center. In this paper, we describe a data collection and distribution architecture that enables gathering physical parameters of a large data center at a very high temporal and spatial resolutionof the sensor measurements. We think this is an important characteristic to enable more accurate heat-flow models of the data center andwith them, _and opportunities to optimize energy consumption. Havinga high resolution picture of the data center conditions, also enables minimizing local hotspots, perform more accurate predictive maintenance (pending failures in cooling and other infrastructure equipment can be more promptly detected) and more accurate billing. We detail this architecture and define the structure of the underlying messaging system that is used to collect and distribute the data. Finally, we show the results of a preliminary study of a typical data center radio environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless sensor networks (WSNs) have attracted growing interest in the last decade as an infrastructure to support a diversity of ubiquitous computing and cyber-physical systems. However, most research work has focused on protocols or on specific applications. As a result, there remains a clear lack of effective and usable WSN system architectures that address both functional and non-functional requirements in an integrated fashion. This poster outlines the EMMON system architecture for large-scale, dense, real-time embedded monitoring. It provides a hierarchical communication architecture together with integrated middleware and command and control software. It has been designed to maintain as much as flexibility as possible while meeting specific applications requirements. EMMON has been validated through extensive analytical, simulation and experimental evaluations, including through a 300+ nodes test-bed the largest single-site WSN test-bed in Europe.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless sensor networks (WSNs) have attracted growing interest in the last decade as an infrastructure to support a diversity of ubiquitous computing and cyber-physical systems. However, most research work has focused on protocols or on specific applications. As a result, there remains a clear lack of effective, feasible and usable system architectures that address both functional and non-functional requirements in an integrated fashion. In this paper, we outline the EMMON system architecture for large-scale, dense, real-time embedded monitoring. EMMON provides a hierarchical communication architecture together with integrated middleware and command and control software. It has been designed to use standard commercially-available technologies, while maintaining as much flexibility as possible to meet specific applications requirements. The EMMON architecture has been validated through extensive simulation and experimental evaluation, including a 300+ node test-bed, which is, to the best of our knowledge, the largest single-site WSN test-bed in Europe to date.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nowadays, data centers are large energy consumers and the trend for next years is expected to increase further, considering the growth in the order of cloud services. A large portion of this power consumption is due to the control of physical parameters of the data center (such as temperature and humidity). However, these physical parameters are tightly coupled with computations, and even more so in upcoming data centers, where the location of workloads can vary substantially due, for example, to workloads being moved in the cloud infrastructure hosted in the data center. Therefore, managing the physical and compute infrastructure of a large data center is an embodiment of a Cyber-Physical System (CPS). In this paper, we describe a data collection and distribution architecture that enables gathering physical parameters of a large data center at a very high temporal and spatial resolution of the sensor measurements. We think this is an important characteristic to enable more accurate heat-flow models of the data center and with them, find opportunities to optimize energy consumptions. Having a high-resolution picture of the data center conditions, also enables minimizing local hot-spots, perform more accurate predictive maintenance (failures in all infrastructure equipments can be more promptly detected) and more accurate billing. We detail this architecture and define the structure of the underlying messaging system that is used to collect and distribute the data. Finally, we show the results of a preliminary study of a typical data center radio environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IEEE International Conference on Cyber Physical Systems, Networks and Applications (CPSNA'15), Hong Kong, China.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Poster presented in The 28th GI/ITG International Conference on Architecture of Computing Systems (ARCS 2015). 24 to 26, Mar, 2015. Porto, Portugal.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The world is increasingly in a global community. The rapid technological development of communication and information technologies allows the transmission of knowledge in real-time. In this context, it is imperative that the most developed countries are able to develop their own strategies to stimulate the industrial sector to keep up-to-date and being competitive in a dynamic and volatile global market so as to maintain its competitive capacities and by consequence, permits the maintenance of a pacific social state to meet the human and social needs of the nation. The path traced of competitiveness through technological differentiation in industrialization allows a wider and innovative field of research. Already we are facing a new phase of organization and industrial technology that begins to change the way we relate with the industry, society and the human interaction in the world of work in current standards. This Thesis, develop an analysis of Industrie 4.0 Framework, Challenges and Perspectives. Also, an analysis of German reality in facing to approach the future challenge in this theme, the competition expected to win in future global markets, points of domestic concerns felt in its industrial fabric household face this challenge and proposes recommendations for a more effective implementation of its own strategy. The methods of research consisted of a comprehensive review and strategically analysis of existing global literature on the topic, either directly or indirectly, in parallel with the analysis of questionnaires and data analysis performed by entities representing the industry at national and world global placement. The results found by this multilevel analysis, allowed concluding that this is a theme that is only in the beginning for construction the platform to engage the future Internet of Things in the industrial environment Industrie 4.0. This dissertation allows stimulate the need of achievements of more strategically and operational approach within the society itself as a whole to clarify the existing weaknesses in this area, so that the National Strategy can be implemented with effective approaches and planned actions for a direct training plan in a more efficiently path in education for the theme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Muito se tem falado sobre revolução tecnológica e do aparecimento constante de novas aplicações Web, com novas funcionalidades que visam facilitar o trabalho dos utilizadores. Mas será que estas aplicações garantem que os dados transmitidos são tratados e enviados por canais seguros (protocolos)? Que garantias é que o utilizador tem que mesmo que a aplicação utilize um canal, que prevê a privacidade e integridade de dados, esta não apresente alguma vulnerabilidade pondo em causa a informação sensível do utilizador? Software que não foi devidamente testado, aliado à falta de sensibilização por parte dos responsáveis pelo desenvolvimento de software para questões de segurança, levam ao aumento de vulnerabilidades e assim exponenciam o número de potenciais vítimas. Isto aliado ao efeito de desinibição que o sentimento de invisibilidade pode provocar, conduz ao facilitismo e consequentemente ao aumento do número de vítimas alvos de ataques informáticos. O utilizador, por vezes, não sabe muito bem do que se deve proteger, pois a confiança que depõem no software não pressupõem que os seus dados estejam em risco. Neste contexto foram recolhidos dados históricos relativos a vulnerabilidades nos protocolos SSL/TLS, para perceber o impacto que as mesmas apresentam e avaliar o grau de risco. Para além disso, foram avaliados um número significativo de domínios portugueses para perceber se os mesmos têm uma vulnerabilidade específica do protocolo SSL/TLS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação para obtenção do Grau de Mestre em Engenharia Informática

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A revolução tecnológica que se verificou a partir da década de 1980 e o fenómeno da globalização geraram alterações profundas nas sociedades contemporâneas. Desde então, praticamente todos os aspetos do seu quotidiano passaram a depender dos sistemas computorizados, que numa primeira fase estavam ligados em pequenas redes e começaram depois a ficar interligados através da Internet. Esta evolução para a Era da Informação mudou drasticamente o modo como se lida com os riscos. A virtualização do mundo real fez com que surgissem novas ameaças à segurança com origem no domínio cibernético, bem como por seu intermédio. Entretanto, o mundo Pós-Guerra Fria também alterou profundamente o sistema internacional e também viu surgir um conjunto de novos atores, estatais e não estatais, que vieram provocar instabilidade ao sistema, fosse por vontade própria ou como consequência dos acontecimentos. Atualmente, as ameaças à segurança são múltiplas e de natureza variada, sendo o ciberespaço um domínio utilizado pelos vários atores no sentido de desestabilizar a ordem instalada, como por exemplo através do ativismo político, mas também como meio para infringir danos. As capacidades cibernéticas passaram também a ser consideradas como mais uma opção para atuar em conflitos, principalmente pelas grandes potências. Neste contexto, o presente trabalho tem como objetivo analisar a abordagem em Portugal a esta nova realidade, em que a maioria, se não todas, das suas infraestruturas críticas dependem do bom funcionamento das ligações em rede, e em que estas são utilizadas por mais de metade da população portuguesa de forma regular.