876 resultados para bigdata, data stream processing, dsp, apache storm, cyber security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Forward-looking ground penetrating radar shows promise for detection of improvised explosive devices in active war zones. Because of certain insurmountable physical limitations, post-processing algorithm development is the most popular research topic in this field. One such investigative avenue explores the worthiness of frequency analysis during data post-processing. Using the finite difference time domain numerical method, simulations are run to test both mine and clutter frequency response. Mines are found to respond strongest at low frequencies and cause periodic changes in ground penetrating radar frequency results. These results are called into question, however, when clutter, a phenomenon generally known to be random, is also found to cause periodic frequency effects. Possible causes, including simulation inaccuracy, are considered. Although the clutter models used are found to be inadequately random, specular reflections of differing periodicity are found to return from both the mine and the ground. The presence of these specular reflections offers a potential alternative method of determining a mine’s presence.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Digital signal processing (DSP) techniques for biological sequence analysis continue to grow in popularity due to the inherent digital nature of these sequences. DSP methods have demonstrated early success for detection of coding regions in a gene. Recently, these methods are being used to establish DNA gene similarity. We present the inter-coefficient difference (ICD) transformation, a novel extension of the discrete Fourier transformation, which can be applied to any DNA sequence. The ICD method is a mathematical, alignment-free DNA comparison method that generates a genetic signature for any DNA sequence that is used to generate relative measures of similarity among DNA sequences. We demonstrate our method on a set of insulin genes obtained from an evolutionarily wide range of species, and on a set of avian influenza viral sequences, which represents a set of highly similar sequences. We compare phylogenetic trees generated using our technique against trees generated using traditional alignment techniques for similarity and demonstrate that the ICD method produces a highly accurate tree without requiring an alignment prior to establishing sequence similarity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVE: Many patients use the Internet to obtain health-related information. It is assumed that health-related Internet information (HRII) will change the consultation practice of physicians. This article explores the strategies, benefits and difficulties from the patients' and physicians' perspective. METHODS: Semi-structured interviews were conducted independently with 32 patients and 20 physicians. Data collection, processing and analysis followed the core principles of Grounded Theory. RESULTS: Patients experienced difficulties in the interpretation of the personal relevance and the meaning of HRII. Therefore they relied on their physicians' interpretation and contextualisation of this information. Discussing patients' concerns and answering patients' questions were important elements of successful consultations with Internet-informed patients to achieve clarity, orientation and certainty. Discussing HRII with patients was appreciated by most of the physicians but misleading interpretations by patients and contrary views compared to physicians caused conflicts during consultations. CONCLUSION: HRII is a valuable source of knowledge for an increasing number of patients. Patients use the consultation to increase their understanding of health and illness. Determinants such as a patient-centred consultation and timely resources are decisive for a successful, empowering consultation with Internet-informed patients. PRACTICAL IMPLICATIONS: If HRII is routinely integrated in the anamnestic interview as a new source of knowledge, the Internet can be used as a link between physicians' expertise and patient knowledge. The critical appraisal of HRII during the consultation is becoming a new field of work for physicians.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents the capabilities of a Space-Based Space Surveillance (SBSS) demonstration mission for Space Surveillance and Tracking (SST) based on a micro- satellite platform. The results have been produced in the frame of ESA’s "As sessment Study for Space Based Space Surveillance Demonstration Mission (Phase A) " performed by the Airbus DS consortium. Space Surveillance and Tracking is part of Space Situational Awareness (SSA) and covers the detection, tracking and cataloguing of spa ce debris and satellites. Derived SST services comprise a catalogue of these man-made objects, collision warning, detection and characterisation of in-orbit fragmentations, sub-catalogue debris characterisation, etc. The assessment of SBSS in an SST system architecture has shown that both an operational SBSS and also already a well - designed space-based demonstrator can provide substantial performance in terms of surveillance and tracking of beyond - LEO objects. Especially the early deployment of a demonstrator, possible by using standard equipment, could boost initial operating capability and create a self-maintained object catalogue. Unlike classical technology demonstration missions, the primary goal is the demonstration and optimisation of the functional elements in a complex end-to-end chain (mission planning, observation strategies, data acquisition, processing and fusion, etc.) until the final products can be offered to the users. The presented SBSS system concept takes the ESA SST System Requirements (derived within the ESA SSA Preparatory Program) into account and aims at fulfilling some of the SST core requirements in a stand-alone manner. The evaluation of the concept has shown that an according solution can be implemented with low technological effort and risk. The paper presents details of the system concept, candidate micro - satellite platforms, the observation strategy and the results of performance simulations for GEO coverage and cataloguing accuracy

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents the capabilities of a Space-Based Space Surveillance (SBSS) demonstration mission for Space Surveillance and Tracking (SST) based on a micro-satellite platform. The results have been produced in the frame of ESA’s "Assessment Study for Space Based Space Surveillance Demonstration Mission" performed by the Airbus Defence and Space consortium. The assessment of SBSS in an SST system architecture has shown that both an operational SBSS and also already a well- designed space-based demonstrator can provide substantial performance in terms of surveillance and tracking of beyond-LEO objects. Especially the early deployment of a demonstrator, possible by using standard equipment, could boost initial operating capability and create a self-maintained object catalogue. Furthermore, unique statistical information about small-size LEO debris (mm size) can be collected in-situ. Unlike classical technology demonstration missions, the primary goal is the demonstration and optimisation of the functional elements in a complex end-to-end chain (mission planning, observation strategies, data acquisition, processing, etc.) until the final products can be offered to the users and with low technological effort and risk. The SBSS system concept takes the ESA SST System Requirements into account and aims at fulfilling SST core requirements in a stand-alone manner. Additionally, requirements for detection and characterisation of small-sizedLEO debris are considered. The paper presents details of the system concept, candidate micro-satellite platforms, the instrument design and the operational modes. Note that the detailed results of performance simulations for space debris coverage and cataloguing accuracy are presented in a separate paper “Capability of a Space-based Space Surveillance System to Detect and Track Objects in GEO, MEO and LEO Orbits” by J. Silha (AIUB) et al., IAC-14, A6, 1.1x25640.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The problem of recurring concepts in data stream classification is a special case of concept drift where concepts may reappear. Although several existing methods are able to learn in the presence of concept drift, few consider contextual information when tracking recurring concepts. Nevertheless, in many real-world scenarios context information is available and can be exploited to improve existing approaches in the detection or even anticipation of recurring concepts. In this work, we propose the extension of existing approaches to deal with the problem of recurring concepts by reusing previously learned decision models in situations where concepts reappear. The different underlying concepts are identified using an existing drift detection method, based on the error-rate of the learning process. A method to associate context information and learned decision models is proposed to improve the adaptation to recurring concepts. The method also addresses the challenge of retrieving the most appropriate concept for a particular context. Finally, to deal with situations of memory scarcity, an intelligent strategy to discard models is proposed. The experiments conducted so far, using synthetic and real datasets, show promising results and make it possible to analyze the trade-off between the accuracy gains and the learned models storage cost.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile activity recognition focuses on inferring the current activities of a mobile user by leveraging the sensory data that is available on today’s smart phones. The state of the art in mobile activity recognition uses traditional classification learning techniques. Thus, the learning process typically involves: i) collection of labelled sensory data that is transferred and collated in a centralised repository; ii) model building where the classification model is trained and tested using the collected data; iii) a model deployment stage where the learnt model is deployed on-board a mobile device for identifying activities based on new sensory data. In this paper, we demonstrate the Mobile Activity Recognition System (MARS) where for the first time the model is built and continuously updated on-board the mobile device itself using data stream mining. The advantages of the on-board approach are that it allows model personalisation and increased privacy as the data is not sent to any external site. Furthermore, when the user or its activity profile changes MARS enables promptly adaptation. MARS has been implemented on the Android platform to demonstrate that it can achieve accurate mobile activity recognition. Moreover, we can show in practise that MARS quickly adapts to user profile changes while at the same time being scalable and efficient in terms of consumption of the device resources.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The recent continuous development of Cooperative ITS has resulted in several initiatives which focus on different parts of the Cooperative environment landscape. The FOTsis project focuses on the infrastructure side of the Cooperative environment and will deploy and test 7 services designed to maximise the benefits of the integration of the road operator and infrastructure-based information providers into the ITS environment. This integration can take place in any of the stages of data collection, processing and actuations of the services, but also support and trigger external tasks such as operations of the emergency response entities, etc. This paper describes the current status of the project and focuses on the specification of the supporting architecture to the services tested: references, a brief outline of the requirements’ definition, and the FOTsis architecture proposal, with some conclusions about the architecture tests conducted. The outlook on the project’s next steps is given in the last section of the paper.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario, the attackers collude to give negative feedback on the victim in order to lower or destroy its reputation. This attack is known as bad mouthing attack. In another scenario, a number of entities agree to give positive feedback on an entity (often with adversarial intentions). This attack is known as ballot stuffing. Both attack types can significantly deteriorate the performances of the network. The existing solutions for coping with these attacks are mainly concentrated on prevention techniques. In this work, we propose a solution that detects and isolates the abovementioned attackers, impeding them in this way to further spread their malicious activity. The approach is based on detecting outliers using clustering, in this case self-organizing maps. An important advantage of this approach is that we have no restrictions on training data, and thus there is no need for any data pre-processing. Testing results demonstrate the capability of the approach in detecting both bad mouthing and ballot stuffing attack in various scenarios.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many data streaming applications produces massive amounts of data that must be processed in a distributed fashion due to the resource limitation of a single machine. We propose a distributed data stream clustering protocol. Theoretical analysis shows preliminary results about the quality of discovered clustering. In addition, we present results about the ability to reduce the time complexity respect to the centralized approach.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers. Availability of features like huge block memory (BRAM), Digital Signal Processing (DSP) cores, embedded CPU makes the design strategy of FPGAs quite different from ASICs. FPGA are also widely used in security-critical application where protection against known attacks is of prime importance. We focus ourselves on physical attacks which target physical implementations. To design countermeasures against such attacks, the strategy for FPGA designers should also be different from that in ASIC. The available features should be exploited to design compact and strong countermeasures. In this paper, we propose methods to exploit the BRAMs in FPGAs for designing compact countermeasures. BRAM can be used to optimize intrinsic countermeasures like masking and dual-rail logic, which otherwise have significant overhead (at least 2X). The optimizations are applied on a real AES-128 co-processor and tested for area overhead and resistance on Xilinx Virtex-5 chips. The presented masking countermeasure has an overhead of only 16% when applied on AES. Moreover Dual-rail Precharge Logic (DPL) countermeasure has been optimized to pack the whole sequential part in the BRAM, hence enhancing the security. Proper robustness evaluations are conducted to analyze the optimization for area and security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent advances in coherent optical receivers is reviewed. Digital-Signal-Processing (DSP) based phase and polarization management techniques make coherent detection robust and feasible. With coherent detection, the complex field of the received optical signal is fully recovered, allowing compensation of linear and nonlinear optical impairments including chromatic dispersion (CD) and polarization-mode dispersion (PMD) using digital filters. Coherent detection and advanced optical modulation formats have become a key ingredient to the design of modern dense wavelength-division multiplexed (DWDM) optical broadband networks. In this paper, firstly we present the different subsystems of a digital coherent optical receiver, and secondly, we will compare the performance of some multi-level and multi-dimensional modulation formats in some physical impairments and in high spectral-efficiency (SE) and high-capacity DWDM transmissions, simulating the DSP with Matlab and the optical network performance with OptiSystem software.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Desde seu lançamento, em 2002, a Norma IEC 61850 vem evoluindo para se tornar o padrão adotado nos Sistemas de Automação de Subestações. Dentre seus vários aspectos, destacam- se os serviços de tempo real, que permitem a implementação de funções de automação e de proteção dentro da subestação através da troca de mensagens específicas entre Dispositivos Eletrônicos Inteligentes através de um barramento digital de rede de dados. O objetivo central deste trabalho é explorar algumas das questões que envolvem a implementação de uma classe de serviços de tempo real: a transmissão de valores amostrados através de Serviços SMV, definidos pela Norma IEC 61850-9. Primeiramente, apresenta-se um breve resumo das principais características da Norma IEC 61850 que possibilitam o atendimento dos três requisitos por ela estabelecidos como base: a interoperabilidade entre dispositivos de diferentes fabricantes, a versatilidade na configuração e reconfiguração do Sistema de Automação da Subestação, e a possibilidade de implementação de novas tecnologias. Em seguida, explora-se com maior profundidade todos os aspectos relevantes à implementação dos Serviços SMV. Devido à complexidade deste assunto, o autor propõe abordá-lo sob a ótica de cinco tópicos interdependentes: variações da Norma IEC 61850-9, confiabilidade do barramento de processo, sincronismo de tempo, análise da qualidade da medição e segurança cibernética. Com base nos resultados apresentados neste estudo, propõem-se duas plataformas, um protótipo de Transformador de Potencial Óptico e um protótipo de Relé de Proteção Diferencial para transformadores de potência, com o objetivo de explorar alguns dos aspectos pertinentes à implementação de um barramento de processo de acordo com a Norma IEC 61850-9. Também foram realizados testes de geração e transmissão de mensagens contendo valores de amostras de tensão/corrente do sistema elétrico (denominadas de SV Messages) com a finalidade de implementá-las de fato e avaliar as ferramentas de mercado disponíveis. Por fim foi proposto um modelo para a simulação do sistema de potência em conjunto com a rede de comunicação utilizando o programa Matlab/Simulink. O autor espera que este trabalho contribua para esclarecer os vários conceitos envolvidos na implementação do barramento de processo definido pela Norma IEC 61850-9, auxiliando na pesquisa e no desenvolvimento de novas ferramentas e dispositivos, e no aprimoramento da Norma IEC 61850.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

É importante que as redes elétricas tenham altos índices de confiabilidade, de forma a se manter a agilidade e a manutenção ideais para um melhor funcionamento. Por outro lado, o crescimento inesperado da carga, falhas em equipamentos e uma parametrização inadequada das funções de proteção tornam a análise de eventos de proteção mais complexas e demoradas. Além disso, a quantidade de informações que pode ser obtida de relés digitais modernos tem crescido constantemente. Para que seja possível uma rápida tomada de decisão e manutenção, esse projeto de pesquisa teve como objetivo a implementação de um sistema completo de diagnóstico que é ativado automaticamente quando um evento de proteção ocorrer. As informações a serem analisadas são obtidas de uma base de dados e de relés de proteção, via protocolo de comunicação IEC 61850 e arquivos de oscilografia. O trabalho aborda o sistema Smart Grid completo incluindo: a aquisição de dados nos relés, detalhando o sistema de comunicação desenvolvido através de um software com um cliente IEC61850 e um servidor OPC e um software com um cliente OPC, que é ativado por eventos configurados para dispará-lo (por exemplo, atuação da proteção); o sistema de pré-tratamento de dados, onde os dados provenientes dos relés e equipamentos de proteção são filtrados, pré-processados e formatados; e o sistema de diagnóstico. Um banco de dados central mantém atualizados os dados de todas essas etapas. O sistema de diagnóstico utiliza algoritmos convencionais e técnicas de inteligência artificial, em particular, um sistema especialista. O sistema especialista foi desenvolvido para lidar com diferentes conjuntos de dados de entrada e com uma possível falta de dados, sempre garantindo a entrega de diagnósticos. Foram realizados testes e simulações para curtos-circuitos (trifásico, dupla-fase, dupla-fase-terra e fase-terra) em alimentadores, transformadores e barras de uma subestação. Esses testes incluíram diferentes estados do sistema de proteção (funcionamento correto e impróprio). O sistema se mostrou totalmente eficaz tanto no caso de disponibilidade completa quanto parcial de informações, sempre fornecendo um diagnóstico do curto-circuito e analisando o funcionamento das funções de proteção da subestação. Dessa forma, possibilita-se uma manutenção muito mais eficiente pelas concessionárias de energia, principalmente no que diz respeito à prevenção de defeitos em equipamentos, rápida resposta a problemas, e necessidade de reparametrização das funções de proteção. O sistema foi instalado com sucesso em uma subestação de distribuição da Companhia Paulista de Força e Luz.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Vol. 3 edited by Diane Werneke.