733 resultados para Drone attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The objective of this work was to evaluate the natural attack by Acromyrmex crassispinus in initial Pinus taeda plantations without control measures against ants, as well as the effect of defoliation in seedlings of P. taeda. Evaluations of the attack of leaf-cutting ants on P. taeda plantations were done monthly in the first six months, then 9 and 12 months after planting. The percentages of plants that were naturally attacked by ants were registered. The effect of defoliation was evaluated by artificial defoliation, simulating the natural patterns of attack by A. crassispinus on P. taeda seedlings. The natural attack of A. crassispinus was greater during the first months after planting, being more intense in the first 30 days. Artificial defoliation indicated that there were no significant losses in diameter and height in plants with less than 75% defoliation. However, there were significant losses in diameter and height in plants with 100% defoliation, independently of the cut of the apical meristem, and also plant death. The control of leaf-cutting ants in P. taeda plantings, in which A. crassispinus is the most frequent leaf-cutting ant, should be intense only at the beginning of planting, since the most severe attacks occur during this time.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many audio watermarking schemes divide the audio signal into several blocks such that part of the watermark is embedded into each of them. One of the key issues in these block-oriented watermarking schemes is to preserve the synchronisation, i.e. to recover the exact position of each block in the mark recovery process. In this paper, a novel time domain synchronisation technique is presented together with a new blind watermarking scheme which works in the Discrete Fourier Transform (DFT or FFT) domain. The combined scheme provides excellent imperceptibility results whilst achieving robustness against typical attacks. Furthermore, the execution of the scheme is fast enough to be used in real-time applications. The excellent transparency of the embedding algorithm makes it particularly useful for professional applications, such as the embedding of monitoring information in broadcast signals. The scheme is also compared with some recent results of the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cognitive radio is a wireless technology aimed at improvingthe efficiency use of the radio-electric spectrum, thus facilitating a reductionin the load on the free frequency bands. Cognitive radio networkscan scan the spectrum and adapt their parameters to operate in the unoccupiedbands. To avoid interfering with licensed users operating on a givenchannel, the networks need to be highly sensitive, which is achieved byusing cooperative sensing methods. Current cooperative sensing methodsare not robust enough against occasional or continuous attacks. This articleoutlines a Group Fusion method that takes into account the behavior ofusers over the short and long term. On fusing the data, the method is basedon giving more weight to user groups that are more unanimous in their decisions.Simulations have been performed in a dynamic environment withinterferences. Results prove that when attackers are present (both reiterativeor sporadic), the proposed Group Fusion method has superior sensingcapability than other methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes an audio watermarking scheme based on lossy compression. The main idea is taken from an image watermarking approach where the JPEG compression algorithm is used to determine where and how the mark should be placed. Similarly, in the audio scheme suggested in this paper, an MPEG 1 Layer 3 algorithm is chosen for compression to determine the position of the mark bits and, thus, the psychoacoustic masking of the MPEG 1 Layer 3compression is implicitly used. This methodology provides with a high robustness degree against compression attacks. The suggested scheme is also shown to succeed against most of the StirMark benchmark attacks for audio.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La radio cognitiva es una tecnología inalámbrica propuesta para usar eficientemente los recursos del espectro radioeléctrico permitiendo así reducir la carga existente en las bandas de frecuencia de uso libre.Las redes de radio cognitiva son capaces de escanear el espectro y adaptar sus parámetros para operar en las bandas no ocupadas. Para evitar interferir con usuarios con licencia que operan en un determinado canal, la sensibilidad de las redes tiene que ser muy alta. Ello se consigue con métodos de detección cooperativos. Los métodos de detección cooperativa actuales tienen una carencia de robustez ya sea frente a ataques puntuales o continuos.En este artículo presentamos un método de fusión por grupos que tiene presente el comportamiento de los usuarios a corto y largo plazo. Al realizar la fusión de los datos, el método se basa en dar mayor peso a los grupos de usuarios con mayor unanimidad en sus decisiones.Los resultados de las simulaciones prueban que en presencia de atacantes el método de fusión por grupos propuesto consigue una detección superior a otros métodos, cumpliendo los requisitos de sensibilidad mínimos de las redes de radio cognitiva incluso con un 12 de usuarios reiteradamente maliciosos o un 10 de atacantes puntuales.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes the state of the art of secure ad hoc routing protocols and presents SEDYMO, a mechanism to secure a dynamic multihop ad hoc routing protocol. The proposed solution defeats internal and external attacks usinga trustworthiness model based on a distributed certification authority. Digital signatures and hash chains are used to ensure the correctness of the protocol. The protocol is compared with other alternatives in terms of security strength, energy efficiency and time delay. Both computational and transmission costs are considered and it is shown that the secure protocol overhead is not a critical factor compared to the high network interface cost.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An Unmanned Aerial Vehicle is a non-piloted airplane designed to operate in dangerous and repetitive situations. With the advent of UAV's civil applications, UAVs are emerging as a valid option in commercial scenarios. If it must be economically viable, the same platform should implement avariety of missions with little reconguration time and overhead.This paper presents a middleware-based architecture specially suited to operate as a exible payload and mission controller in a UAV. The system is composed of low-costcomputing devices connected by network. The functionality is divided into reusable services distributed over a number ofnodes with a middleware managing their lifecycle and communication.Some research has been done in this area; yetit is mainly focused on the control domain and in its realtime operation. Our proposal differs in that we address the implementation of adaptable and reconfigurable unmannedmissions in low-cost and low-resources hardware.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Peer reviewed

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Peer reviewed

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tässä diplomityössä tutkitaan tekniikoita, joillavesileima lisätään spektrikuvaan, ja menetelmiä, joilla vesileimat tunnistetaanja havaitaan spektrikuvista. PCA (Principal Component Analysis) -algoritmia käyttäen alkuperäisten kuvien spektriulottuvuutta vähennettiin. Vesileiman lisääminen spektrikuvaan suoritettiin muunnosavaruudessa. Ehdotetun mallin mukaisesti muunnosavaruuden komponentti korvattiin vesileiman ja toisen muunnosavaruuden komponentin lineaarikombinaatiolla. Lisäyksessä käytettävää parametrijoukkoa tutkittiin. Vesileimattujen kuvien laatu mitattiin ja analysoitiin. Suositukset vesileiman lisäykseen esitettiin. Useita menetelmiä käytettiin vesileimojen tunnistamiseen ja tunnistamisen tulokset analysoitiin. Vesileimojen kyky sietää erilaisia hyökkäyksiä tarkistettiin. Diplomityössä suoritettiin joukko havaitsemis-kokeita ottamalla huomioon vesileiman lisäyksessä käytetyt parametrit. ICA (Independent Component Analysis) -menetelmää pidetään yhtenä mahdollisena vaihtoehtona vesileiman havaitsemisessa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Major histocompatibility complex (MHC) molecules are of crucial importance for the immune system to recognize and defend the body against external attacks. Foreign antigens are presented by specialized cells, called antigen presenting cells, to T lymphocytes in the context of MHC molecules, thereby inducing T cell activation. In addition, MHC molecules are essential for Natural Killer (NK) cell biology, playing a role in NK cell education and activation. Recently, the NOD-like receptor (NLR) family member NLRC5 (NLR caspase recruitment domain containing protein 5) was found to act as transcriptional regulator of MHC class I, in particular in T and NK cells. Its role in MHC class I expression is however minor in dendritic cells (DCs). This raised the question of whether inflammatory conditions, which augment the levels of NLRC5 in DCs, could increase its contribution to MHC class I expression. Our work shows that MHC class I transcript and intracellular levels depend on NLRC5, while its role in MHC class I surface expression is instead negligible. We describe however a general salvage mechanism that enables cells with low intracellular MHC class I levels to nevertheless maintain relatively high MHC class I on the cell surface. In addition, we lack a thorough understanding of NLRC5 target gene specificity and mechanism of action. Our work delineates the unique consensus sequence in MHC class I promoters required for NLRC5 recruitment and pinpoints conserved features conferring its specificity. Furthermore, through genome-wide analyses, we confirm that NLRC5 regulates classical MHC class I genes and identify novel target genes all encoding non-classical MHC class I molecules exerting an array of functions in immunity and tolerance. We finally asked why a dedicated factor co-regulates MHC class I expression specifically in T and NK lymphocytes. We show that deregulated NLRC5 expression affects the education of NK cells and alters the crosstalk between T and NK cells, leading to NK cell-mediated killing of T lymphocytes. Altogether this thesis work brings insights into molecular and physiological aspects of NLRC5 function, which might help understand certain aspects of immune responses and disorders. -- Les molécules du complexe majeur d'histocompatibilité (CMH) sont essentielles au système immunitaire pour l'initiation de la réponse immunitaire. En effet, l'activation des lymphocytes T nécessite la reconnaissance d'un antigène étranger présenté par les cellules présentatrices d'antigènes sur une molécule du CMH. Les molécules du CMH ont également un rôle fondamental pour la fonction des cellules Natural Killer (NK) puisqu'elles sont nécessaires à leur processus d'éducation et d'activation. Récemment, NLRC5 (NLR caspase recruitment domain containing protein 5), un membre de la famille des récepteurs de type NOD (NLRs), a été décrit comme un facteur de transactivation de l'expression des gènes du CMH de classe I. A l'état basai, cette fonction transcriptionnelle est essentielle dans les lymphocytes T et NK, alors que ce rôle reste mineur pour l'expression des molécules du CMH de classe I dans les cellules dendritiques (DCs). Dans des conditions inflammatoires, l'expression de NLRC5 augmente dans les DCs. Notre travail démontre que, dans ces conditions, les transcrits et les niveaux intracellulaires des molécules du CMH de classe I augmentent aussi d'une façon dépendante de NLRC5. A contrario, le rôle de NLRC5 sur les niveaux de molécules de surface reste minoritaire. Cette observation nous a conduits à l'identification d'un mécanisme général de compensation qui permet aux cellules de maintenir des niveaux relativement élevés de molécules de CMH de class I à leur surface malgré de faibles niveaux intracellulaires. De plus, il semblait nécessaire de s'orienter vers une approche plus globale afin de déterminer l'étendue de la fonction transcriptionnelle de NLRC5. Par une approche du génome entier, nous avons pu décrire une séquence consensus conservée présente dans les promoteurs des gènes du CMH de classe I, sur laquelle NLRC5 est spécifiquement recruté. Nous avons pu également identifier de nouveaux gènes cibles codant pour des molécules de CMH de classe I non classiques impliqués dans l'immunité et la tolérance. Finalement, nous nous sommes demandé quel est l'intérêt d'avoir un facteur transcriptionnel, en l'occurrence NLRC5, qui orchestre l'expression du CMH de classe I dans les lymphocytes T et NK. Nous montrons que la dérégulation de l'expression de NLRC5 affecte l'éducation des cellules NK et conduit à la mort cellulaire des lymphocytes T médiée par les cellules NK. Dans l'ensemble ce travail de thèse contribue à la caractérisation du rôle de NLRC5, tant au niveau moléculaire que physiologique, ce qui présente un intérêt dans le cadre de la compréhension de certains aspects physiopathologique de la réponse immunitaire.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El uso de imágenes procedentes de sensores multiespectrales de resolución media como es el caso de Landsat TM ha sido ampliamente utilizado desde décadas para detectar, entre otras variables, el decaimiento y la defoliación provocada por plagas y enfermedades forestales. El presente trabajo evalúa la utilidad del uso de estas imágenes en la detección de rodales de pino laricio (Pinus nigra Arn.) y pino silvestre (Pinus sylvestris L.) afectados por escolítidos. El área de estudio se localizó en el Solsonés (prepirineo de Lleida) seleccionando 34 áreas de entrenamiento (17 rodales afectados por la plaga y 17 rodales sanos). El análisis exploratorio de las imágenes se realizó mediante el programa ERDAS® IMAGINE 8.x. Los resultados del estudio mostraron una significación espectral en 5 de las 7 bandas analizadas, siendo TM5 y TM7 las que mejor comportamiento presentaron. Los niveles digitales obtenidos y los espacios de características creados señalaron sendas tendencias al agrupamiento de rodales afectados versus sanos, consiguiéndose plantear mejoras en el procedimiento metodológico.