822 resultados para Computer and network security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Demand response programs and models have been developed and implemented for an improved performance of electricity markets, taking full advantage of smart grids. Studying and addressing the consumers’ flexibility and network operation scenarios makes possible to design improved demand response models and programs. The methodology proposed in the present paper aims to address the definition of demand response programs that consider the demand shifting between periods, regarding the occurrence of multi-period demand response events. The optimization model focuses on minimizing the network and resources operation costs for a Virtual Power Player. Quantum Particle Swarm Optimization has been used in order to obtain the solutions for the optimization model that is applied to a large set of operation scenarios. The implemented case study illustrates the use of the proposed methodology to support the decisions of the Virtual Power Player in what concerns the duration of each demand response event.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

XXXIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2015). 15 to 19, May, 2015, III Workshop de Comunicação em Sistemas Embarcados Críticos. Vitória, Brasil.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we propose the Distributed using Optimal Priority Assignment (DOPA) heuristic that finds a feasible partitioning and priority assignment for distributed applications based on the linear transactional model. DOPA partitions the tasks and messages in the distributed system, and makes use of the Optimal Priority Assignment (OPA) algorithm known as Audsley’s algorithm, to find the priorities for that partition. The experimental results show how the use of the OPA algorithm increases in average the number of schedulable tasks and messages in a distributed system when compared to the use of Deadline Monotonic (DM) usually favoured in other works. Afterwards, we extend these results to the assignment of Parallel/Distributed applications and present a second heuristic named Parallel-DOPA (P-DOPA). In that case, we show how the partitioning process can be simplified by using the Distributed Stretch Transformation (DST), a parallel transaction transformation algorithm introduced in [1].

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, three approaches for the assessment of credibility in a web environment will be presented, namely the checklists model, the cognitive authority model and the contextual model. This theoretical framework was used to conduct a study about the assessment of web resources credibility among a sample of 195 students, from elementary and secondary schools in a municipality in Oporto district (Portugal). The practices that young people and children claim to use regarding the use of criteria for web resources selection will be presented. In addition, these results will be discussed and compared with the perceptions that these respondents have demonstrated for the use of criteria to establish or assess authorship, originality, or information resources structure. These results will be also discussed and compared with the perceptions that these respondents have demonstrated for the elements that make up each of these criteria.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ao longo dos anos a Internet tornou-se uma ferramenta fundamental para a sociedade e, nos dias de hoje, é praticamente inevitável não usufruir de algumas facilidades proporcionadas pela rede mundial. Devido à sua massificação nos últimos anos, os endereços de IP disponíveis esgotaram-se, pelo que tornou-se necessário a elaboração de uma nova versão do protocolo comunicação, utilizado para suportar todas as comunicações na Internet, o Internet Protocol, versão 6 (IPv6). Apesar da ampla utilização da Internet, a maioria dos seus utilizadores está completamente alheia às questões de segurança, estando por isso exposta a uma diversidade de perigos. O aumento da segurança é também uma das principais missões do IPv6, tendo-se introduzido alguns mecanismos de segurança relevantes. Este trabalho tem como objetivo estudar o IPv6, focando-se especialmente em questões relacionadas com os mecanismos de transição do IPv4 para IPv6 e em aspetos de segurança. Proporcionando uma abordagem teórica ao protocolo e aos conceitos de segurança, este documento apresenta também uma perspetiva mais técnica da implementação do IPv6, pretendendo ser um manual de apoio aos responsáveis pela implementação da versão 6 do IP. Os três métodos de transição, que permitem a atualização do IPv4 para IPv6, são analisados de forma a apoiar a equipa na tomada de decisão sobre qual (ou quais) os métodos de transição a utilizar. Uma parte substancial do trabalho foi dedicada à seleção e estudo de vulnerabilidades que se encontram presentes no IPv6, a forma como são exploradas por parte do atacante, a forma como podem ser classificadas e os processos que diminuem o risco de exposição a essas mesmas vulnerabilidades. Um conjunto de boas práticas na administração da segurança de redes é também apresentada, para melhorar a garantia de que problemas conhecidos não possam ser explorados por utilizadores mal intencionados.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cloud data centers have been progressively adopted in different scenarios, as reflected in the execution of heterogeneous applications with diverse workloads and diverse quality of service (QoS) requirements. Virtual machine (VM) technology eases resource management in physical servers and helps cloud providers achieve goals such as optimization of energy consumption. However, the performance of an application running inside a VM is not guaranteed due to the interference among co-hosted workloads sharing the same physical resources. Moreover, the different types of co-hosted applications with diverse QoS requirements as well as the dynamic behavior of the cloud makes efficient provisioning of resources even more difficult and a challenging problem in cloud data centers. In this paper, we address the problem of resource allocation within a data center that runs different types of application workloads, particularly CPU- and network-intensive applications. To address these challenges, we propose an interference- and power-aware management mechanism that combines a performance deviation estimator and a scheduling algorithm to guide the resource allocation in virtualized environments. We conduct simulations by injecting synthetic workloads whose characteristics follow the last version of the Google Cloud tracelogs. The results indicate that our performance-enforcing strategy is able to fulfill contracted SLAs of real-world environments while reducing energy costs by as much as 21%.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Este documento foi redigido no âmbito da dissertação do Mestrado em Engenharia Informática na área de Arquiteturas, Sistemas e Redes, do Departamento de Engenharia Informática, do ISEP, cujo tema é diagnóstico cardíaco a partir de dados acústicos e clínicos. O objetivo deste trabalho é produzir um método que permita diagnosticar automaticamente patologias cardíacas utilizando técnicas de classificação de data mining. Foram utilizados dois tipos de dados: sons cardíacos gravados em ambiente hospitalar e dados clínicos. Numa primeira fase, exploraram-se os sons cardíacos usando uma abordagem baseada em motifs. Numa segunda fase, utilizamos os dados clínicos anotados dos pacientes. Numa terceira fase, avaliamos a combinação das duas abordagens. Na avaliação experimental os modelos baseados em motifs obtiveram melhores resultados do que os construídos a partir dos dados clínicos. A combinação das abordagens mostrou poder ser vantajosa em situações pontuais.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O mercado de smartphones tem vindo a crescer massivamente nos últimos anos, bem como a diversi cação das suas funcionalidades no dia-a-dia de cada pessoa. O mercado aberto de aplicações para estes equipamentos também tem sofrido uma forte evolução o que permite uma maior qualidade e competitividade pela apresentação de produtos. O conceito de casas inteligentes está cada vez mais presente e é algo que as pessoas se estão a acomodar de forma gradual. Para acompanhar tal feito, é necessário desenvolver as capacidades dos equipamentos que estas pessoas mais usam para que estes possam dar resposta a estas necessidades. Para o caso atual irão ser estudadas as fechaduras inteligentes. Os sistemas comercializados atualmente, são tipicamente sistemas proprietários e apresentam algumas limitações ou faltas (ex: ao nível da segurança, incapacidade de abranger um largo número de dispositivos móveis ou mesmo ao nível do preço). Neste contexto, e com base na caracterização das soluções de controlo de acesso atuais, foi estudada a viabilidade de, usando uma abordagem assente em tecnologias não proprietárias (i.e., abertas), desenvolver soluções de controlo de acesso com características comparáveis com os sistemas proprietários actuais e, eventualmente, ultrapassando os limites e falhas identi cados. Dadas estas premissas o sistema de controlo de acesso móvel pensado envolve um computador BeagleBone Black e a tecnologia sem os Bluetooth. Este sistema permite a fácil integração do computador com qualquer smartphone atual e é dotado de fortes características de segurança e privacidade. O sistema foi concebido inicialmente para ser implementado em fechaduras de portas mas com possibilidade de expansão para outros equipamentos. Além disso, o sistema permitirá também o acesso a terceiros após a devida autorização do dono.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertation for the Master Degree in Technology and Food Security

Relevância:

100.00% 100.00%

Publicador:

Resumo:

What role do social networks play in determining migrant labor market outcomes? We examine this question using data from a random sample of 1500 immigrants living in Ireland. We propose a theoretical model formally predicting that immigrants with more contacts have additional access to job offers, and are therefore better able to become employed and choose higher paid jobs. Our empirical analysis confirms these findings, while focusing more generally on the relationship between migrants’ social networks and a variety of labor market outcomes (namely wages, employment, occupational choice and job security), contrary to the literature. We find evidence that having one more contact in the network is associated with an increase of 11pp in the probability of being employed and with an increase of about 100 euros in the average salary. However, our data is not suggestive of a network size effect on occupational choice and job security. Our findings are robust to sample selection and other endogeneity concerns.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

What role do social networks play in determining migrant labor market outcomes? We examine this question using data from a random sample of 1500 immigrants living in Ireland. We propose a theoretical model formally predicting that immigrants with more contacts have additional access to job offers, and are therefore better able to become employed and choose higher paid jobs. Our empirical analysis confirms these findings, while focusing more generally on the relationship between migrants’ social networks and a variety of labor market outcomes (namely wages, employment, occupational choice and job security), contrary to the literature. We find evidence that having one more contact in the network is associated with an increase of 11pp in the probability of being employed and with an increase of about 100 euros in the average salary. However, our data is not suggestive of a network size effect on occupational choice and job security. Our findings are robust to sample selection and other endogeneity concerns.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cultural heritage has arousing the interest of the general public (e.g. tourists), resulting in the increasing number of visitations to archaeological sites. However, many buildings and monuments are severely damaged or completely destroyed, which doesn’t allow to get a full experience of “travelling in time”. Over the years, several Augmented Reality (AR) approaches were proposed to overcome these issues by providing three-dimensional visualization of reconstructed ancient structures in situ. However, most of these systems were made available through heavy and expensive technological bundles. Alternatively, MixAR intends to be a lightweight and cost-effective Mixed Reality system which aims to provide the visualization of virtual ancient buildings reconstructions in situ, properly superimposed and aligned with real-world ruins. This paper proposes and compares different AR mobile units setups to be used in the MixAR system, with low-cost and lightweight requirements in mind, providing different levels of immersion. It was propounded four different mobile units, based on: a laptop computer, a single-board computer (SBC), a tablet and a smartphone, which underwent a set of tests to evaluate their performances. The results show that mobile units based on laptop computer and SBC reached a good overall performance while mobile units based on tablet and smartphone did not meet such a satisfactory result even though they are acceptable for the intended use.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper intends to present and reflect upon some of the findings emerging from a research project entitled “Navigating with ‘Magalhães’: Study on the Impact of Digital Media on Schoolchildren” that was conducted at the Communication and Society Research Centre at the University of Minho, Braga, Portugal. The project focused on the politics of the governmental programme “One Laptop per Child” part of the Portuguese Technological Plan for Education, and the uses of the “Magalhães” computer, and other media, by children aged 8-10 years. This paper analyses the impact of this particular public policy on digital literacy of young children based mostly on the perspectives of parents and their modes of mediation. It also debates parents’ and children’s perspectives on parental rules on computer and Internet usage. It ends by concluding that the impact of this programme occurred mainly at the level of access rather than the social and educational uses and practices. It also highlights the importance of family in the way children access and use ICT.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The objective of this paper is to measure the impact of different kinds of knowledge and external economies on urban growth in an intraregional context. The main hypothesis is that knowledge leads to growth, and that this knowledge is related to the existence of agglomeration and network externalities in cities. We develop a three-tage methodology: first, we measure the amount and growth of knowledge in cities using the OCDE (2003) classification and employment data; second, we identify the spatial structure of the area of analysis (networks of cities); third, we combine the Glaeser - Henderson - De Lucio models with spatial econometric specifications in order to contrast the existence of spatially static (agglomeration) and spatially dynamic (network) external economies in an urban growth model. Results suggest that higher growth rates are associated to higher levels of technology and knowledge. The growth of the different kinds of knowledge is related to local and spatial factors (agglomeration and network externalities) and each knowledge intensity shows a particular response to these factors. These results have implications for policy design, since we can forecast and intervene on local knowledge development paths.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The creation, reform and/or restructuring of the police in post-conflict societies remains one of the key challenges for practitioners and scholars in the contemporary fields of peace and security, particularly due to the changing nature of conflicts. Since the 1990s the world has witnessed a proliferation of international police missions, with regional organisations gradually acquiring a prominent role. This paper analyses the 2003-2005 period of the European Union Police Mission (EUPM) in Bosnia and Herzegovina. Much is at stake in this mission, both in terms of the development of the EU´s external identity but also for Bosnia and Herzegovina’s road to EU membership and sustainable peace. This paper will argue that by 2005 the balance sheet was mixed. EUPM fell short of fulfilling its overall goal of ‘Europeanising’ Bosnian police services, and of its desire to be seen as providing that additional ingredient in police matters that would set it apart from the earlier UN mission. Nevertheless, despite its shortcomings, the Mission did not merit the harsh criticisms it was faced with. Its lack of success was not entirely the Mission’s doing. The paper focuses on three aspects: political and economic viability and sustainability, security levels in Bosnia and Herzegovina, and institution and capacity building. The explanatory framework used in this paper is based on the democratic policing discourse. In doing so the argument developed here will also shed light on the nature of so-called “best European practices” in police matters.