813 resultados para System security implementation
Resumo:
P systems or Membrane Computing are a type of a distributed, massively parallel and non deterministic system based on biological membranes. They are inspired in the way cells process chemical compounds, energy and information. These systems perform a computation through transition between two consecutive configurations. As it is well known in membrane computing, a configuration consists in a m-tuple of multisets present at any moment in the existing m regions of the system at that moment time. Transitions between two configurations are performed by using evolution rules which are in each region of the system in a non-deterministic maximally parallel manner. This work is part of an exhaustive investigation line. The final objective is to implement a HW system that evolves as it makes a transition P-system. To achieve this objective, it has been carried out a division of this generic system in several stages, each of them with concrete matters. In this paper the stage is developed by obtaining the part of the system that is in charge of the application of the active rules. To count the number of times that the active rules is applied exist different algorithms. Here, it is presents an algorithm with improved aspects: the number of necessary iterations to reach the final values is smaller than the case of applying step to step each rule. Hence, the whole process requires a minor number of steps and, therefore, the end of the process will be reached in a shorter length of time.
Resumo:
It is proposed an agent approach for creation of intelligent intrusion detection system. The system allows detecting known type of attacks and anomalies in user activity and computer system behavior. The system includes different types of intelligent agents. The most important one is user agent based on neural network model of user behavior. Proposed approach is verified by experiments in real Intranet of Institute of Physics and Technologies of National Technical University of Ukraine "Kiev Polytechnic Institute”.
Resumo:
The BR algorithm is a novel and efficient method to find all eigenvalues of upper Hessenberg matrices and has never been applied to eigenanalysis for power system small signal stability. This paper analyzes differences between the BR and the QR algorithms with performance comparison in terms of CPU time based on stopping criteria and storage requirement. The BR algorithm utilizes accelerating strategies to improve its performance when computing eigenvalues of narrowly banded, nearly tridiagonal upper Hessenberg matrices. These strategies significantly reduce the computation time at a reasonable level of precision. Compared with the QR algorithm, the BR algorithm requires fewer iteration steps and less storage space without depriving of appropriate precision in solving eigenvalue problems of large-scale power systems. Numerical examples demonstrate the efficiency of the BR algorithm in pursuing eigenanalysis tasks of 39-, 68-, 115-, 300-, and 600-bus systems. Experiment results suggest that the BR algorithm is a more efficient algorithm for large-scale power system small signal stability eigenanalysis.
Resumo:
Um dos temas mais debatidos na sociedade actual é a segurança. Os níveis de segurança e as ferramentas para os alcançar entram em contraponto com os métodos usados para os quebrar. Como no passado, a razão qualidade/serviço mantém-se hoje, e manter-se-á no futuro, assegurando maior segurança àqueles que melhor se protejam. Problemas simples da vida real como furtos ou uso de falsa identidade assumem no meio informático uma forma rápida e por vezes indetectável de crime organizado. Neste estudo são investigados métodos sociais e aplicações informáticas comuns para quebrar a segurança de um sistema informático genérico. Desta forma, e havendo um entendimento sobre o Modus Operandi das entidades mal-intencionadas, poderá comprovar-se a instabilidade e insegurança de um sistema informático, e, posteriormente, actuar sobre o mesmo de tal forma que fique colocado numa posição da segurança que, podendo não ser infalível, poderá estar muito melhorada. Um dos objectivos fulcrais deste trabalho é conseguir implementar e configurar um sistema completo através de um estudo de soluções de mercado, gratuitas ou comerciais, a nível da implementação de um sistema em rede com todos os serviços comuns instalados, i.e., um pacote “chave na mão” com serviços de máquinas, sistema operativo, aplicações, funcionamento em rede com serviços de correio electrónico, gestão empresarial, anti-vírus, firewall, entre outros. Será possível então evidenciar uma instância de um sistema funcional, seguro e com os serviços necessários a um sistema actual, sem recurso a terceiros, e sujeito a um conjunto de testes que contribuem para o reforço da segurança.
Resumo:
Diplomityössä on tutkittu toteutettavan kunnossapidon hallintajärjestelmän ekstranet- ja asiakasrajapintojen rakentamiseen tarvittavaa teknologiaa sekä sitä, millaisia ratkaisuja tietoturvallisuuden ja käytettävyyden varmistaminen vaatii. Tulosten perusteella esitetään vaihtoehtoisia ratkaisuja paikkariippumattomien etäyhteyksien toteuttamiseksi työntekijöille ja asiakaskumppaneille. Vaihtoehdoista valitaan lopuksi asetettuihin kriteereihin nähden paras suositeltavaksi ekstranet- ja asiakasrajapintojen toteutukseksi. Yritysten välisen asiakas- ja kumppanuusyhteistyön lisääntyessä syntyy yhä useammin tarve tarjota omien työntekijöiden lisäksimyös valituille kumppaneille rajattu pääsy yrityksen sisäisiin järjestelmiin. Tällaisten etäyhteyksien toteuttamiseksi tarvitaan rajapinta käyttäjien ja järjestelmien välille. Päätös rajapintatoteutuksesta riippuu siitä, miten eri vaihtoehdot täyttävät käytölle asetetut tietoturvallisuus- ja käytettävyystavoitteet.
Resumo:
Tämä diplomityö esittelee 1.6. - 4.11.2002 Mikkelin ammattikorkeakoulun YTI-tutkimuskeskuksen Informaatio- ja mediateknologian hankekokonaisuuden STRIMT-projektin puitteissa tekemäni MHP-kehitysjärjestelmähankinnan tuloksia. Digitaalitelevision MHP-sovelluskehitysjärjestelmän hankinnan tulosten lisäksi työ antaa yleiskuvan MHP-sovelluskehitystyökaluista, digitaalitelevisiostandardeista sekä digitaalitelevisioverkkojen yhteistoimintamalleista televerkkojen kanssa. Keräämieni tietojen, tekemäni tarvemäärittelyn ja suorittamani tuotevertailun perusteella valitsin tarpeisiimme sopivimmaksi järjestelmäksi Alticast Inc.-yrityksen Altifusion-tuotteen. Tuotteen valinnassa otin huomioon myös mahdolliset tulevaisuuden tarpeet aina täysimittaista lähetysjärjestelmää varten kehittämällä vaiheittaisen hankintasuunnitelman. Järjestelmää hankittaessa tärkeintä on huomioida heti alusta alkaen mahdolliset tulevat tarpeet ja varmistaa hankinnan hyödynnettävyys myös tulevaisuudessa. Järjestelmän hankinnan lisäksi vastasin sen käyttöönotosta ja järjestelmää hyödyntävän testisovelluksen laatimisesta.
Resumo:
Elektroninen kaupankäynti ja pankkipalvelut ovat herättäneet toiminnan jatkuvuuden kannalta erittäin kriittisen kysymyksen siitä, kuinka näitä palveluja pystytään suojaamaan järjestäytynyttä rikollisuutta ja erilaisia hyväksikäyttöjä vastaan.
Resumo:
With this document, we provide a compilation of in-depth discussions on some of the most current security issues in distributed systems. The six contributions have been collected and presented at the 1st Kassel Student Workshop on Security in Distributed Systems (KaSWoSDS’08). We are pleased to present a collection of papers not only shedding light on the theoretical aspects of their topics, but also being accompanied with elaborate practical examples. In Chapter 1, Stephan Opfer discusses Viruses, one of the oldest threats to system security. For years there has been an arms race between virus producers and anti-virus software providers, with no end in sight. Stefan Triller demonstrates how malicious code can be injected in a target process using a buffer overflow in Chapter 2. Websites usually store their data and user information in data bases. Like buffer overflows, the possibilities of performing SQL injection attacks targeting such data bases are left open by unwary programmers. Stephan Scheuermann gives us a deeper insight into the mechanisms behind such attacks in Chapter 3. Cross-site scripting (XSS) is a method to insert malicious code into websites viewed by other users. Michael Blumenstein explains this issue in Chapter 4. Code can be injected in other websites via XSS attacks in order to spy out data of internet users, spoofing subsumes all methods that directly involve taking on a false identity. In Chapter 5, Till Amma shows us different ways how this can be done and how it is prevented. Last but not least, cryptographic methods are used to encode confidential data in a way that even if it got in the wrong hands, the culprits cannot decode it. Over the centuries, many different ciphers have been developed, applied, and finally broken. Ilhan Glogic sketches this history in Chapter 6.
Resumo:
Los procesos de formación de profesionales de salud idóneos en el mundo, complementan su conocimiento entre dos componentes fundamentales, un componente teórico y el otro componente práctico. La formación que recibe en las aulas y la realización de las prácticas académicas a las cuales pueda acceder, le permite al estudiante trasformar el conocimiento académico adquirido en conocimiento cercano a la realidad y con fundamento profesional, razón por la cual las Instituciones Educativas tienen la responsabilidad de formar profesionales que sean capaces de desempeñarse en componentes sociales, administrativos y prácticos. Dentro de las ventajas que aporta la realización de las prácticas en la formación de los profesionales en salud se reconocen: la posibilidad de tener una visión de la responsabilidad del trabajo a la cual se van a ver enfrentados, desarrollar habilidades de interrelaciones sociales, incrementar su nivel de madurez, desarrollar e implementar estrategias de supervisión y así lograr el reconocimiento personal del nivel de confianza en su desempeño. Sin embargo también se puede convertir en un aspecto negativo si la práctica no se desarrolla de manera adecuada y si no logra tener una integración exitosa con el conocimiento teórico. Para el caso de la formación de talento humano en salud, el espacio utilizado para la realización de estas prácticas son las Instituciones Prestadoras de Servicios de Salud, deben ser lugares que les faciliten a los estudiantes encontrar una relación integral entre la formación teórica y su aplicación a la práctica profesional, de esta manera el estudiante podrá incrementar su preparación específica. Las prácticas académicas tienen interés en la formación de profesionales y representan un período donde el estudiante se convierte en sujeto entre la Institución Educativa y la Institución Prestadora. Es un espacio de inducción que le permite al estudiante realizar una evaluación de sí mismo y a la vez puede evaluar el entorno donde se va a desarrollar en su colectivo profesional. El objetivo de esta investigación es desarrollar una herramienta técnica que le permita a la Dirección facilitar la supervisión, el monitoreo y la evaluación de convenios de Docencia-Servicio en las Instituciones Prestadoras de Servicios de Salud, garantizando el respeto a los derechos de los usuarios, la calidad de los servicios prestados, la seguridad del paciente y la humanización de la atención, aspectos que no pueden ser afectados negativamente por el desarrollo de las prácticas académicas. Todas las actividades asistenciales que sean desarrolladas por estudiantes en la realización de su práctica profesional, deben ser realizadas bajo una estricta supervisión de docentes y de personal especializado responsable de la prestación del servicio, dando cumplimiento con el Sistema de Garantía de la Calidad del Sistema de Seguridad en Salud en Colombia.
Resumo:
El sistema de fangs activats és el tractament biològic més àmpliament utilitzat arreu del món per la depuració d'aigües residuals. El seu funcionament depèn de la correcta operació tant del reactor biològic com del decantador secundari. Quan la fase de sedimentació no es realitza correctament, la biomassa no decantada s'escapa amb l'efluent causant un impacte sobre el medi receptor. Els problemes de separació de sòlids, són actualment una de les principals causes d'ineficiència en l'operació dels sistemes de fangs activats arreu del món. Inclouen: bulking filamentós, bulking viscós, escumes biològiques, creixement dispers, flòcul pin-point i desnitrificació incontrolada. L'origen dels problemes de separació generalment es troba en un desequilibri entre les principals comunitats de microorganismes implicades en la sedimentació de la biomassa: els bacteris formadors de flòcul i els bacteris filamentosos. Degut a aquest origen microbiològic, la seva identificació i control no és una tasca fàcil pels caps de planta. Els Sistemes de Suport a la Presa de Decisions basats en el coneixement (KBDSS) són un grup d'eines informàtiques caracteritzades per la seva capacitat de representar coneixement heurístic i tractar grans quantitats de dades. L'objectiu de la present tesi és el desenvolupament i validació d'un KBDSS específicament dissenyat per donar suport als caps de planta en el control dels problemes de separació de sòlids d'orígen microbiològic en els sistemes de fangs activats. Per aconseguir aquest objectiu principal, el KBDSS ha de presentar les següents característiques: (1) la implementació del sistema ha de ser viable i realista per garantir el seu correcte funcionament; (2) el raonament del sistema ha de ser dinàmic i evolutiu per adaptar-se a les necessitats del domini al qual es vol aplicar i (3) el raonament del sistema ha de ser intel·ligent. En primer lloc, a fi de garantir la viabilitat del sistema, s'ha realitzat un estudi a petita escala (Catalunya) que ha permès determinar tant les variables més utilitzades per a la diagnosi i monitorització dels problemes i els mètodes de control més viables, com la detecció de les principals limitacions que el sistema hauria de resoldre. Els resultats d'anteriors aplicacions han demostrat que la principal limitació en el desenvolupament de KBDSSs és l'estructura de la base de coneixement (KB), on es representa tot el coneixement adquirit sobre el domini, juntament amb els processos de raonament a seguir. En el nostre cas, tenint en compte la dinàmica del domini, aquestes limitacions es podrien veure incrementades si aquest disseny no fos òptim. En aquest sentit, s'ha proposat el Domino Model com a eina per dissenyar conceptualment el sistema. Finalment, segons el darrer objectiu referent al seguiment d'un raonament intel·ligent, l'ús d'un Sistema Expert (basat en coneixement expert) i l'ús d'un Sistema de Raonament Basat en Casos (basat en l'experiència) han estat integrats com els principals sistemes intel·ligents encarregats de dur a terme el raonament del KBDSS. Als capítols 5 i 6 respectivament, es presenten el desenvolupament del Sistema Expert dinàmic (ES) i del Sistema de Raonament Basat en Casos temporal, anomenat Sistema de Raonament Basat en Episodis (EBRS). A continuació, al capítol 7, es presenten detalls de la implementació del sistema global (KBDSS) en l'entorn G2. Seguidament, al capítol 8, es mostren els resultats obtinguts durant els 11 mesos de validació del sistema, on aspectes com la precisió, capacitat i utilitat del sistema han estat validats tant experimentalment (prèviament a la implementació) com a partir de la seva implementació real a l'EDAR de Girona. Finalment, al capítol 9 s'enumeren les principals conclusions derivades de la present tesi.
Resumo:
Garment information tracking is required for clean room garment management. In this paper, we present a camera-based robust system with implementation of Optical Character Reconition (OCR) techniques to fulfill garment label recognition. In the system, a camera is used for image capturing; an adaptive thresholding algorithm is employed to generate binary images; Connected Component Labelling (CCL) is then adopted for object detection in the binary image as a part of finding the ROI (Region of Interest); Artificial Neural Networks (ANNs) with the BP (Back Propagation) learning algorithm are used for digit recognition; and finally the system is verified by a system database. The system has been tested. The results show that it is capable of coping with variance of lighting, digit twisting, background complexity, and font orientations. The system performance with association to the digit recognition rate has met the design requirement. It has achieved real-time and error-free garment information tracking during the testing.
Resumo:
To ensure minimum loss of system security and revenue it is essential that faults on underground cable systems be located and repaired rapidly. Currently in the UK, the impulse current method is used to prelocate faults, prior to using acoustic methods to pinpoint the fault location. The impulse current method is heavily dependent on the engineer's knowledge and experience in recognising/interpreting the transient waveforms produced by the fault. The development of a prototype real-time expert system aid for the prelocation of cable faults is described. Results from the prototype demonstrate the feasibility and benefits of the expert system as an aid for the diagnosis and location of faults on underground cable systems.
Resumo:
The modernization of the world made the speed, accuracy and reliability of all existing processes become increasingly necessary. For this evolution to occur every day, the evolution of the equipment was strategic, but not as much as needed. It is necessary for such equipment to ensure its function and, in case of failure, an early diagnosis to prevent loss. Therefore the evolution of maintainability and reliability in equipment is also paramount. Thus, the growth of forms of maintenance was driven by this scenario, forming maintenance philosophies. Among many, there is the RCM, which have its focus on the identification, parameters development and performance preview. One of those methodologies from this idea is the FMEA, process that has been studied and implemented this work, aiming the anticipation of failure modes and guidance for the use of a heat exchanger and a pump. This implementation has the aid of another process of RCM, the PHA, which was also shown and implemented, these results being used to start the FMEA process. The results show the activities with the highest chance of failure, presenting also the measures to be taken to avoid or minimize them. It is shown, in this paper, concern with the valves because they maintain control and system security, and its flaws related to accidents with possible danger to people and the whole system, emphasizing the priority of action
Resumo:
The modernization of the world made the speed, accuracy and reliability of all existing processes become increasingly necessary. For this evolution to occur every day, the evolution of the equipment was strategic, but not as much as needed. It is necessary for such equipment to ensure its function and, in case of failure, an early diagnosis to prevent loss. Therefore the evolution of maintainability and reliability in equipment is also paramount. Thus, the growth of forms of maintenance was driven by this scenario, forming maintenance philosophies. Among many, there is the RCM, which have its focus on the identification, parameters development and performance preview. One of those methodologies from this idea is the FMEA, process that has been studied and implemented this work, aiming the anticipation of failure modes and guidance for the use of a heat exchanger and a pump. This implementation has the aid of another process of RCM, the PHA, which was also shown and implemented, these results being used to start the FMEA process. The results show the activities with the highest chance of failure, presenting also the measures to be taken to avoid or minimize them. It is shown, in this paper, concern with the valves because they maintain control and system security, and its flaws related to accidents with possible danger to people and the whole system, emphasizing the priority of action
Resumo:
Mode of access: Internet.