868 resultados para Medium access control protocol
Resumo:
Supervisory Control & Data Acquisition (SCADA) systems are used by many industries because of their ability to manage sensors and control external hardware. The problem with commercially available systems is that they are restricted to a local network of users that use proprietary software. There was no Internet development guide to give remote users out of the network, control and access to SCADA data and external hardware through simple user interfaces. To solve this problem a server/client paradigm was implemented to make SCADAs available via the Internet. Two methods were applied and studied: polling of a text file as a low-end technology solution and implementing a Transmission Control Protocol (TCP/IP) socket connection. Users were allowed to login to a website and control remotely a network of pumps and valves interfaced to a SCADA. This enabled them to sample the water quality of different reservoir wells. The results were based on real time performance, stability and ease of use of the remote interface and its programming. These indicated that the most feasible server to implement is the TCP/IP connection. For the user interface, Java applets and Active X controls provide the same real time access.
Resumo:
The growth and development of the aragonitic CaCO3 otoliths of teleost fish could be vulnerable to processes resulting from ocean acidification. The potential effects of an increase in atmospheric CO2 on the calcification of the otoliths were investigated by rearing Atlantic cod Gadus morhua L. larvae in 3 pCO2 concentrations-control (370 µatm), medium (1800 µatm) and high (4200 µatm)-from March to May 2010. Increased otolith growth was observed in 7 to 46 d post hatch (dph) cod larvae at elevated pCO2 concentrations. The sagittae and lapilli were usually largest in the high pCO2 treatment followed by the medium and control treatments. The greatest difference in mean otolith surface area (normalized to fish length) was for sagittae at 11 dph, with medium and high treatments being 46 and 43% larger than the control group, respectively. There was no significant pCO2 effect on the shape of the otoliths nor were there any trends in the fluctuating asymmetry, defined as the difference between the right and left sides, in relation to the increase in otolith growth from elevated pCO2.
Resumo:
Emerging cybersecurity vulnerabilities in supervisory control and data acquisition (SCADA) systems are becoming urgent engineering issues for modern substations. This paper proposes a novel intrusion detection system (IDS) tailored for cybersecurity of IEC 61850 based substations. The proposed IDS integrates physical knowledge, protocol specifications and logical behaviours to provide a comprehensive and effective solution that is able to mitigate various cyberattacks. The proposed approach comprises access control detection, protocol whitelisting, model-based detection, and multi-parameter based detection. This SCADA-specific IDS is implemented and validated using a comprehensive and realistic cyber-physical test-bed and data from a real 500kV smart substation.
Resumo:
MEDEIROS, Adelardo A. D.A survey of control architectures for autonomous mobile robots. J. Braz. Comp. Soc., Campinas, v. 4, n. 3, abr. 1998 .Disponível em:
Resumo:
MEDEIROS, Adelardo A. D.A survey of control architectures for autonomous mobile robots. J. Braz. Comp. Soc., Campinas, v. 4, n. 3, abr. 1998 .Disponível em:
Resumo:
The importance of networks, in their broad sense, is rapidly and massively growing in modern-day society thanks to unprecedented communication capabilities offered by technology. In this context, the radio spectrum will be a primary resource to be preserved and not wasted. Therefore, the need for intelligent and automatic systems for in-depth spectrum analysis and monitoring will pave the way for a new set of opportunities and potential challenges. This thesis proposes a novel framework for automatic spectrum patrolling and the extraction of wireless network analytics. It aims to enhance the physical layer security of next generation wireless networks through the extraction and the analysis of dedicated analytical features. The framework consists of a spectrum sensing phase, carried out by a patrol composed of numerous radio-frequency (RF) sensing devices, followed by the extraction of a set of wireless network analytics. The methodology developed is blind, allowing spectrum sensing and analytics extraction of a network whose key features (i.e., number of nodes, physical layer signals, medium access protocol (MAC) and routing protocols) are unknown. Because of the wireless medium, over-the-air signals captured by the sensors are mixed; therefore, blind source separation (BSS) and measurement association are used to estimate the number of sources and separate the traffic patterns. After the separation, we put together a set of methodologies for extracting useful features of the wireless network, i.e., its logical topology, the application-level traffic patterns generated by the nodes, and their position. The whole framework is validated on an ad-hoc wireless network accounting for MAC protocol, packet collisions, nodes mobility, the spatial density of sensors, and channel impairments, such as path-loss, shadowing, and noise. The numerical results obtained by extensive and exhaustive simulations show that the proposed framework is consistent and can achieve the required performance.
Resumo:
The fourth industrial revolution, also known as Industry 4.0, has rapidly gained traction in businesses across Europe and the world, becoming a central theme in small, medium, and large enterprises alike. This new paradigm shifts the focus from locally-based and barely automated firms to a globally interconnected industrial sector, stimulating economic growth and productivity, and supporting the upskilling and reskilling of employees. However, despite the maturity and scalability of information and cloud technologies, the support systems already present in the machine field are often outdated and lack the necessary security, access control, and advanced communication capabilities. This dissertation proposes architectures and technologies designed to bridge the gap between Operational and Information Technology, in a manner that is non-disruptive, efficient, and scalable. The proposal presents cloud-enabled data-gathering architectures that make use of the newest IT and networking technologies to achieve the desired quality of service and non-functional properties. By harnessing industrial and business data, processes can be optimized even before product sale, while the integrated environment enhances data exchange for post-sale support. The architectures have been tested and have shown encouraging performance results, providing a promising solution for companies looking to embrace Industry 4.0, enhance their operational capabilities, and prepare themselves for the upcoming fifth human-centric revolution.
Resumo:
Deficient wound healing in diabetic patients is very frequent, but the cellular and molecular causes are poorly defined. In this study, we evaluate the hypothesis that high glucose concentrations inhibit cell migration. Using CHO.K1 cells, NIH-3T3 fibroblasts, mouse embryonic fibroblasts and primary skin fibroblasts from control and diabetic rats cultured in 5 mM D-glucose (low glucose, LG), 25 mM D-glucose (high glucose, HG) or 25 mM L-glucose medium (osmotic control - OC), we analyzed the migration speed, protrusion stability, cell polarity, adhesion maturation and the activity of the small Rho GTPase Rac1. We also analyzed the effects of reactive oxygen species by incubating cells with the antioxidant N-Acetyl-Cysteine (NAC). We observed that HG conditions inhibited cell migration when compared to LG or OC. This inhibition resulted from impaired cell polarity, protrusion destabilization and inhibition of adhesion maturation. Conversely, Rac1 activity, which promotes protrusion and blocks adhesion maturation, was increased in HG conditions, thus providing a mechanistic basis for the HG phenotype. Most of the HG effects were partially or completely rescued by treatment with NAC. These findings demonstrate that HG impairs cell migration due to an increase in oxidative stress that causes polarity loss, deficient adhesion and protrusion. These alterations arise, in large part, from increased Rac1 activity and may contribute to the poor wound healing observed in diabetic patients.
Resumo:
Background: Fibroblasts are considered important cells in periodontitis. When challenged by different agents, they respond through the release of cytokines that participate in the inflammatory process. The aim of this study is to evaluate and compare the expression and production of macrophage inflammatory protein (MIP)-1 alpha, stromal-derived factor (SDF)-1, and interleukin (IL)-6 by human cultured periodontal ligament and gingival fibroblasts challenged with lipopolysaccharide (LPS) from Porphyromonas gingivalis. Methods: Fibroblasts were cultured from biopsies of gingival tissue and periodontal ligament of the same donors and used on the fourth passage. After confluence in 24-well plates, the culture medium alone (control) or with 0.1 to 10 mu g/ml of LPS from P. gingivalis was added to the wells, and after 1, 6, and 24 hours, the supernatant and the cells were collected and analyzed by enzyme-linked immunosorbent assay and real-time polymerase chain reaction, respectively. Results: MIP-1 alpha, SDF-1, and IL-6 protein production was significantly greater in gingival fibroblasts compared to periodontal ligament fibroblasts. IL-6 was upregulated in a time-dependent manner, mainly in gingival fibroblasts (P<0.05), which secreted more MIP-1 alpha in the lowest concentration of LPS used (0.1 mu g/ml). In contrast, a basal production of SDF-1 that was inhibited with the increase of LPS concentration was detected, especially after 24 hours (P<0.05). Conclusion: The distinct ability of the gingival and periodontal ligament fibroblasts to secrete MIP-1 alpha, SDF-1, and IL-6 emphasizes that these cells may differently contribute to the balance of cytokines in the LPS-challenged periodontium. J Periodontol 2010;81:310-317.
Resumo:
RESUMO: A presente investigação incide no estudo da influência das dimensões do controlo do acesso à Internet, propostas por Hackman e Oldham (1975), e das facetas da satisfação com o trabalho, propostas por Spector (1985) num contexto organizacional. Os dados foram obtidos através da aplicação de três escalas avaliativas: o "Job Diagnostic Survey" (JDS), o "Job Satisfaction Survey" (JSS), e uma escala criada para avaliar as dimensões do controlo do acesso à Internet. O estudo incidiu numa amostra de conveniência, constituída por 135 colaboradores pertencentes a três organizações. Os resultados obtidos demonstraram que apenas três dimensões revelaram relações de antecedência com as dimensões da satisfação com o trabalho: no bloqueio a páginas e aplicações foram identificadas relações de antecedência com a da satisfação com os benefícios adicionais e com a promoção. Quanto à voz nas políticas da organização foram identificadas relações com a satisfação com os colegas, e com a natureza do trabalho. E na legislação foram identificadas relações com a satisfação com as recompensas contingenciais, com as condições operantes e com a comunicação. Os resultados levaram à não confirmação do modelo em análise, por não estar em linha com o quadro teórico estabelecido. Foram discutidas algumas das implicações dos resultados obtidos. ABSTRACT: The current research focus in the study of influence between the Internet Access control dimensions, proposed in this study, and the global Job satisfaction, proposed by Hackman e Oldham (1975) and the job satisfaction facets proposed by Spector (1985) in a organizationsl context. The data eas obtained through the application of three scales: num contexto organizacional. "Job Diagnostic Survey" (JDS), the "Job Satisfaction Survey" (JSS),and a scale that was created to evaluate the internet Access control. The study focused on a convenience sample, constituted by 135 participants from three organizations. The results show that only three dimensions revealed to have an antecedent relationship with the job satisfaction dimensions: in the websites and applications blocking, it was identified as having an antecedent relationship with the satisfaction with fringe benefits and promotion. Voice in the organizational policies was verified as an antecedent to the dimensions of the satisfaction with the coworkers and with the nature of work. And finally, the legislation was confirmed as an antecedent in the relationship with the dimensions satisfaction with contingent rewards, operating conditions and communication. The results led to the non confirmation of the studied theoretical model. Some of these results implications were discussed.
Resumo:
Mestrado em Engenharia Electrotécnica e de Computadores
Resumo:
Grande parte dos triples-stores são open source e desenvolvidos em Java, disponibilizando interfaces standards e privadas de acesso. A grande maioria destes sistemas não dispõe de mecanismos de controlo de acessos nativos, o que dificulta ou impossibilita a sua adopção em ambientes em que a segurança dos factos é importante (e.g. ambiente empresarial). Complementarmente observa-se que o modelo de controlo de acesso a triplos e em particular a triplos descritos por ontologias não está standardizado nem sequer estabilizado, havendo diversos modelos de descrição e algoritmos de avaliação de permissões de acesso. O trabalho desenvolvido nesta tese/dissertação propõe um modelo e interface de controlo de acesso que permite e facilite a sua adopção por diferentes triple-stores já existentes e a integração dos triples-stores com outros sistemas já existentes na organização. Complementarmente, a plataforma de controlo de acesso não impõe qualquer modelo ou algoritmo de avaliação de permissões, mas pelo contrário permite a adopção de modelos e algoritmos distintos em função das necessidades ou desejos. Finalmente demonstra-se a aplicabilidade e validade do modelo e interface propostos, através da sua implementação e adopção ao triple-store SwiftOWLIM já existente, que não dispõe de mecanismo de controlo de acessos nativo.
Resumo:
Determining the response time of message transactions is one of the major concerns in the design of any distributed computer-controlled system. Such response time is mainly dependent on the medium access delay, the message length and the transmission delay. While the medium access delay in fieldbus networks has been thoroughly studied in the last few years, the transmission delay has been almost ignored as it is considered that it can be neglected when compared to the length of the message itself. Nevertheless, this assumption is no longer valid when considering the case of hybrid wired/wireless fieldbus networks, where the transmission delay through a series of different mediums can be several orders of magnitude longer than the length of the message itself. In this paper, we show how to compute the duration of message transactions in hybrid wired/wireless fieldbus networks. This duration is mainly dependent on the duration of the request and response frames and on the number and type of physical mediums that the frames must cross between initiator and responder. A case study of a hybrid wired/wireless fieldbus network is also presented, where it becomes clear the interest of the proposed approach
Resumo:
O crescimento dos sistemas de informação e a sua utilização massiva criou uma nova realidade no acesso a experiências remotas que se encontram geograficamente distribuídas. Nestes últimos tempos, a temática dos laboratórios remotos apareceu nos mais diversos campos como o do ensino ou o de sistemas industriais de controlo e monitorização. Como o acesso aos laboratórios é efectuado através de um meio permissivo como é o caso da Internet, a informação pode estar à mercê de qualquer atacante. Assim, é necessário garantir a segurança do acesso, de forma a criar condições para que não se verifique a adulteração dos valores obtidos, bem como a existência de acessos não permitidos. Os mecanismos de segurança adoptados devem ter em consideração a necessidade de autenticação e autorização, sendo estes pontos críticos no que respeita à segurança, pois estes laboratórios podem estar a controlar equipamentos sensíveis e dispendiosos, podendo até eventualmente comprometer em certos casos o controlo e a monotorização de sistemas industriais. Este trabalho teve como objectivo a análise da segurança em redes, tendo sido realizado um estudo sobre os vários conceitos e mecanismos de segurança necessários para garantir a segurança nas comunicações entre laboratórios remotos. Dele resultam as três soluções apresentadas de comunicação segura para laboratórios remotos distribuídos geograficamente, recorrendo às tecnologias IPSec, OpenVPN e PPTP. De forma a minimizar custos, toda a implementação foi assente em software de código aberto e na utilização de um computador de baixo custo. No que respeita à criação das VPNs, estas foram configuradas de modo a permitir obter os resultados pretendidos na criação de uma ligação segura para laboratórios remotos. O pfSense mostrou-se a escolha acertada visto que suporta nativamente quaisquer das tecnologias que foram estudadas e implementadas, sem necessidade de usar recursos físicos muito caros, permitindo o uso de tecnologias de código aberto sem comprometer a segurança no funcionamento das soluções que suportam a segurança nas comunicações dos laboratórios remotos.
Resumo:
O mercado de smartphones tem vindo a crescer massivamente nos últimos anos, bem como a diversi cação das suas funcionalidades no dia-a-dia de cada pessoa. O mercado aberto de aplicações para estes equipamentos também tem sofrido uma forte evolução o que permite uma maior qualidade e competitividade pela apresentação de produtos. O conceito de casas inteligentes está cada vez mais presente e é algo que as pessoas se estão a acomodar de forma gradual. Para acompanhar tal feito, é necessário desenvolver as capacidades dos equipamentos que estas pessoas mais usam para que estes possam dar resposta a estas necessidades. Para o caso atual irão ser estudadas as fechaduras inteligentes. Os sistemas comercializados atualmente, são tipicamente sistemas proprietários e apresentam algumas limitações ou faltas (ex: ao nível da segurança, incapacidade de abranger um largo número de dispositivos móveis ou mesmo ao nível do preço). Neste contexto, e com base na caracterização das soluções de controlo de acesso atuais, foi estudada a viabilidade de, usando uma abordagem assente em tecnologias não proprietárias (i.e., abertas), desenvolver soluções de controlo de acesso com características comparáveis com os sistemas proprietários actuais e, eventualmente, ultrapassando os limites e falhas identi cados. Dadas estas premissas o sistema de controlo de acesso móvel pensado envolve um computador BeagleBone Black e a tecnologia sem os Bluetooth. Este sistema permite a fácil integração do computador com qualquer smartphone atual e é dotado de fortes características de segurança e privacidade. O sistema foi concebido inicialmente para ser implementado em fechaduras de portas mas com possibilidade de expansão para outros equipamentos. Além disso, o sistema permitirá também o acesso a terceiros após a devida autorização do dono.