822 resultados para Computer and network security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Developments in computer and three dimensional (3D) digitiser technologies have made it possible to keep track of the broad range of data required to simulate an insect moving around or over the highly heterogeneous habitat of a plant's surface. Properties of plant parts vary within a complex canopy architecture, and insect damage can induce further changes that affect an animal's movements, development and likelihood of survival. Models of plant architectural development based on Lindenmayer systems (L-systems) serve as dynamic platforms for simulation of insect movement, providing ail explicit model of the developing 3D structure of a plant as well as allowing physiological processes associated with plant growth and responses to damage to be described and Simulated. Simple examples of the use of the L-system formalism to model insect movement, operating Lit different spatial scales-from insects foraging on an individual plant to insects flying around plants in a field-are presented. Such models can be used to explore questions about the consequences of changes in environmental architecture and configuration on host finding, exploitation and its population consequences. In effect this model is a 'virtual ecosystem' laboratory to address local as well as landscape-level questions pertinent to plant-insect interactions, taking plant architecture into account. (C) 2002 Elsevier Science B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

What sort of component coordination strategies emerge in a software integration process? How can such strategies be discovered and further analysed? How close are they to the coordination component of the envisaged architectural model which was supposed to guide the integration process? This paper introduces a framework in which such questions can be discussed and illustrates its use by describing part of a real case-study. The approach is based on a methodology which enables semi-automatic discovery of coordination patterns from source code, combining generalized slicing techniques and graph manipulation

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Devido ao facto de hoje em dia a informação que é processada numa rede informática empresarial, ser cada vez mais de ordem confidencial, torna-se necessário que essa informação esteja o mais protegida possível. Ao mesmo tempo, é necessário que esta a informação esteja disponível com a devida rapidez, para os parceiros certos, num mundo cada vez mais globalizado. Com este trabalho pretende-se efectuar o estudo e implementação da segurança, numa pequena e genérica rede de testes, que facilmente seja extrapolada, para uma rede da dimensão, de uma grande empresa com potenciais ramificações por diversos locais. Pretende-se implementar/monitorização segurança quer externamente, (Internet service provider ISP) quer internamente (activos de rede, postos de trabalho/utilizadores). Esta análise é baseada na localização (local, wireless ou remota), e, sempre que seja detectada qualquer anomalia, seja identificada a sua localização, sendo tomadas automaticamente acções de protecção. Estas anomalias poderão ser geridas recorrendo a ferramentas open source ou comerciais, que façam a recolha de toda a informação necessária, e tomem acções de correcção ou alerta mediante o tipo de anomalia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mestrado em Engenharia Electrotécnica e de Computadores

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVE: To estimate the prevalence and identify correlates of physical activity among adolescents. METHODS: Cross-sectional study nested within a cohort of 4,325 subjects from the city of Pelotas, Southern Brazil, aged 14-15 years in 2008. Physical activity was analyzed using three different approaches: (1) prevalence of any leisure-time physical activity; (2) prevalence of any active commuting to school; and (3) prevalence of engaging in at least 300 minutes per week of both (1) and (2) combined. Independent variables included sociodemographic, behavioral, social, and biological characteristics, and number of different leisure-time physical activites practiced. Statistical analyses were carried out using Poisson regression. RESULTS: The proportion of adolescents involved in any type of leisure-time physical activity was 75.6%, while 73.4% displayed some form of active commuting to school. Prevalence of total physical activity score (> 300 min/week) was 48.2%, being greater among boys (62.6%) than among girls (34.5%). Furthermore, prevalence increased along with the number of physical activity modalities practiced (p<0.001). Factors associated with greater physical activity (leisure + commuting) at the recommended levels were: nonwhite skin color, having failed at school, and playing videogames. Lower socioeconomic status, more time spent on the computer, and parental physical activity were associated with the outcome only among girls. CONCLUSIONS: Less than half the adolescents reached recommended levels of physical activity, and this proportion tended to decrease among subjects with higher socioeconomic level. Associated factors were different for leisure-time and commuting. Engaging in a wide variety of physical activities should be encouraged already during childhood.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação para a obtenção do grau de Mestre em Engenharia Electrotécnica Ramo de Energia

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The IEEE 802.15.4 is the most widespread used protocol for Wireless Sensor Networks (WSNs) and it is being used as a baseline for several higher layer protocols such as ZigBee, 6LoWPAN or WirelessHART. Its MAC (Medium Access Control) supports both contention-free (CFP, based on the reservation of guaranteed time-slots GTS) and contention based (CAP, ruled by CSMA/CA) access, when operating in beacon-enabled mode. Thus, it enables the differentiation between real-time and best-effort traffic. However, some WSN applications and higher layer protocols may strongly benefit from the possibility of supporting more traffic classes. This happens, for instance, for dense WSNs used in time-sensitive industrial applications. In this context, we propose to differentiate traffic classes within the CAP, enabling lower transmission delays and higher success probability to timecritical messages, such as for event detection, GTS reservation and network management. Building upon a previously proposed methodology (TRADIF), in this paper we outline its implementation and experimental validation over a real-time operating system. Importantly, TRADIF is fully backward compatible with the IEEE 802.15.4 standard, enabling to create different traffic classes just by tuning some MAC parameters.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The IEEE 802.15.4 protocol has the ability to support time-sensitive Wireless Sensor Network (WSN) applications due to the Guaranteed Time Slot (GTS) Medium Access Control mechanism. Recently, several analytical and simulation models of the IEEE 802.15.4 protocol have been proposed. Nevertheless, currently available simulation models for this protocol are both inaccurate and incomplete, and in particular they do not support the GTS mechanism. In this paper, we propose an accurate OPNET simulation model, with focus on the implementation of the GTS mechanism. The motivation that has driven this work is the validation of the Network Calculus based analytical model of the GTS mechanism that has been previously proposed and to compare the performance evaluation of the protocol as given by the two alternative approaches. Therefore, in this paper we contribute an accurate OPNET model for the IEEE 802.15.4 protocol. Additionally, and probably more importantly, based on the simulation model we propose a novel methodology to tune the protocol parameters such that a better performance of the protocol can be guaranteed, both concerning maximizing the throughput of the allocated GTS as well as concerning minimizing frame delay.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Admission controllers are used to prevent overload in systems with dynamically arriving tasks. Typically, these admission controllers are based on suÆcient (but not necessary) capacity bounds in order to maintain a low computational complexity. In this paper we present how exact admission-control for aperiodic tasks can be eÆciently obtained. Our rst result is an admission controller for purely aperiodic task sets where the test has the same runtime complexity as utilization-based tests. Our second result is an extension of the previous controller for a baseload of periodic tasks. The runtime complexity of this test is lower than for any known exact admission-controller. In addition to presenting our main algorithm and evaluating its performance, we also discuss some general issues concerning admission controllers and their implementation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper proposes a Flexibility Requirements Model and a Factory Templates Framework to support the dynamic Virtual Organization decision-makers in order to reach effective response to the emergent business opportunities ensuring profitability. Through the construction and analysis of the flexibility requirements model, the network managers can achieve and conceive better strategies to model and breed new dynamic VOs. This paper also presents the leagility concept as a new paradigm fit to equip the network management with a hybrid approach that better tackle the performance challenges imposed by the new and competitive business environments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Most of small islands around the world today, are dependent on imported fossil fuels for the majority of their energy needs especially for transport activities and electricity production. The use of locally renewable energy resources and the implementation of energy efficiency measures could make a significant contribution to their economic development by reducing fossil fuel imports. An electrification of vehicles has been suggested as a way to both reduce pollutant emissions and increase security of supply of the transportation sector by reducing the dependence on oil products imports and facilitate the accommodation of renewable electricity generation, such as wind and, in the case of volcanic islands like Sao Miguel (Azores) of the geothermal energy whose penetration has been limited by the valley electricity consumption level. In this research, three scenarios of EV penetration were studied and it was verified that, for a 15% LD fleet replacement by EVs with 90% of all energy needs occurring during the night, the accommodation of 10 MW of new geothermal capacity becomes viable. Under this scenario, reductions of 8% in electricity costs, 14% in energy, 23% in fossil fuels use and CO2 emissions for the transportation and electricity production sectors could be expected.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertation for a Masters Degree in Computer and Electronic Engineering

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mestrado em Engenharia Electrotécnica e de Computadores - Área de Especialização de Telecomunicações

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação de Mestrado apresentada ao Instituto Superior de Contabilidade e Administração do Porto para a obtenção do grau de Mestre em Marketing Digital, sob orientação do Mestre José Duarte Santos