822 resultados para Computer and network security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Energy resource scheduling becomes increasingly important, as the use of distributed resources is intensified and massive gridable vehicle use is envisaged. The present paper proposes a methodology for dayahead energy resource scheduling for smart grids considering the intensive use of distributed generation and of gridable vehicles, usually referred as Vehicle- o-Grid (V2G). This method considers that the energy resources are managed by a Virtual Power Player (VPP) which established contracts with V2G owners. It takes into account these contracts, the user´s requirements subjected to the VPP, and several discharge price steps. Full AC power flow calculation included in the model allows taking into account network constraints. The influence of the successive day requirements on the day-ahead optimal solution is discussed and considered in the proposed model. A case study with a 33 bus distribution network and V2G is used to illustrate the good performance of the proposed method.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Perante a evolução constante da Internet, a sua utilização é quase obrigatória. Através da web, é possível conferir extractos bancários, fazer compras em países longínquos, pagar serviços sem sair de casa, entre muitos outros. Há inúmeras alternativas de utilização desta rede. Ao se tornar tão útil e próxima das pessoas, estas começaram também a ganhar mais conhecimentos informáticos. Na Internet, estão também publicados vários guias para intrusão ilícita em sistemas, assim como manuais para outras práticas criminosas. Este tipo de informação, aliado à crescente capacidade informática do utilizador, teve como resultado uma alteração nos paradigmas de segurança informática actual. Actualmente, em segurança informática a preocupação com o hardware é menor, sendo o principal objectivo a salvaguarda dos dados e continuidade dos serviços. Isto deve-se fundamentalmente à dependência das organizações nos seus dados digitais e, cada vez mais, dos serviços que disponibilizam online. Dada a mudança dos perigos e do que se pretende proteger, também os mecanismos de segurança devem ser alterados. Torna-se necessário conhecer o atacante, podendo prever o que o motiva e o que pretende atacar. Neste contexto, propôs-se a implementação de sistemas de registo de tentativas de acesso ilícitas em cinco instituições de ensino superior e posterior análise da informação recolhida com auxílio de técnicas de data mining (mineração de dados). Esta solução é pouco utilizada com este intuito em investigação, pelo que foi necessário procurar analogias com outras áreas de aplicação para recolher documentação relevante para a sua implementação. A solução resultante revelou-se eficaz, tendo levado ao desenvolvimento de uma aplicação de fusão de logs das aplicações Honeyd e Snort (responsável também pelo seu tratamento, preparação e disponibilização num ficheiro Comma Separated Values (CSV), acrescentando conhecimento sobre o que se pode obter estatisticamente e revelando características úteis e previamente desconhecidas dos atacantes. Este conhecimento pode ser utilizado por um administrador de sistemas para melhorar o desempenho dos seus mecanismos de segurança, tais como firewalls e Intrusion Detection Systems (IDS).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The recent massive inflow of refugees to the European Union (EU) raises a number of unanswered questions on the economic impact of this phenomenon. To examine these questions, we constructed an overlapping-generations model that describes the evolution of the skill premium and of the welfare benefit level in relevant European countries, in the aftermath of an inflow of asylum-seekers. In our simulation, relative wages of skilled workers increase between 8% and 11% in the period of the inflow; their subsequent time path is dependent on the initial skill premium. The entry of migrants creates a fiscal surplus of about 8%, which can finance higher welfare benefits in the subsequent periods. These effects are weaker in a scenario where refugees do not fully integrate into the labor market.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Magdeburg, Univ., Fak. für Informatik, Diss., 2009

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper characterizes the equilibria in airline networks and their welfare implications in an unregulated environment. Competing airlines may adopt either fully-connected (FC) or hub-and-spoke (HS) network structures; and passengers exhibiting low brand loyalty to their preferred carrier choose an outside option to travel so that markets are partially served by airlines. In this context, carriers adopt hubbing strategies when costs are sufficiently low, and asymmetric equilibria where one carrier chooses a FC strategy and the other chooses a HS strategy may arise. Quite interestingly, flight frequency can become excessive under HS network configurations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network airlines have been increasingly focusing their operations on hub airports through the exploitation of connecting traffic, allowing them to take advantage of economies of traffic density, which are unequivocal in the airline industry. Less attention has been devoted to airlines? decisions on point-to-point thin routes, which could be served using different aircraft technologies and different business models. This paper examines, both theoretically and empirically, the impact on airlines ?networks of the two major innovations in the airline industry in the last two decades: the regional jet technology and the low-cost business model. We show that, under certain circumstances, direct services on point-to-point thin routes can be viable and thus airlines may be interested in deviating passengers out of the hub.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network airlines have been increasingly focusing their operations on hub airports through the exploitation of connecting traffic, allowing them to take advantage of economies of traffic density, which are unequivocal in the airline industry. Less attention has been devoted to airlines' decisions on point-to-point thin routes, which could be served using different aircraft technologies and different business models. This paper examines, both theoretically and empirically, the impact on airlines' networks of the two major innovations in the airline industry in the last two decades: the regional jet technology and the low-cost business model. We show that, under certain circumstances, direct services on point-to-point thin routes can be viable and thus airlines may be interested in deviating passengers out of the hub. Keywords: regional jet technology; low-cost business model; point-to-point network; hub-and-spoke network JEL Classi…fication Numbers: L13; L2; L93

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present text, based on previous work done by the authors on peace research (Grasa 1990 and 2010) and the disarmament campaigns linked to Human Security (Alcalde 2009 and 2010), has two objectives. First, to present a new agenda for peace research, based on the resolution/transformation of conflicts and the promotion of collective action in furtherance of human security and human development. Second, to focus specifically on collective action and on a positive reading of some of the campaigns that have taken place during the last decades in order to see how the experiences of such will affect the future agenda for peace research and action for peace.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Document de síntesi d'aquest estudi que analitza -seguint una metodologia quantitativa basada en una mostra representativa de 2.093 professors i 23.864 estudiants i reforçada amb elements qualitatius- la transició que es produeix en el sistema universitari públic català cap a un model més adaptat a les noves necessitats de la societat xarxa. Per a això, es posa especial èmfasi en l'anàlisi dels usos que es fa d'Internet (l'eina clau de la societat xarxa) en el món universitari i en les transformacions que es donen o es donaran com a conseqüència d'aquests usos.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Why are the old politically successful? We build a simple interest group model in which political pressure is time-intensive, showing that in the political competitive equilibrium each group lobbies for government policies that lower their own value of time but the old do so to a greater extent and as a result are net gainers from the political process. What distinguishes the elderly from other political groups (and what makes them more succesful) is that they have lower labor productivity and/or that we are all likely to become elderly at some point, while we are relatively unlikely to change gender, race, sexual orientation, or even ocupation, The model has a variety of implications for the design of social security programs, which we test using data from the Social Security Administration. For example, the model predicts that social security programs with retirement incentives are larger and that the old are more "single-minded" in their politics, implications which we verify using cross-country government finance data and cross-country political participation surveys. Finally, we show that the forced savings programs intended to "reform" the social security system may increase the amount of intergenerational redistribution. As a model for evaluating policy reforms, ours has the attractive feature that reforms must be time time consistent from a political point of view rather than a public interest point of view.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Visual perception of body motion is vital for everyday activities such as social interaction, motor learning or car driving. Tumors to the left lateral cerebellum impair visual perception of body motion. However, compensatory potential after cerebellar damage and underlying neural mechanisms remain unknown. In the present study, visual sensitivity to point-light body motion was psychophysically assessed in patient SL with dysplastic gangliocytoma (Lhermitte-Duclos disease) to the left cerebellum before and after neurosurgery, and in a group of healthy matched controls. Brain activity during processing of body motion was assessed by functional magnetic resonance imaging (MRI). Alterations in underlying cerebro-cerebellar circuitry were studied by psychophysiological interaction (PPI) analysis. Visual sensitivity to body motion in patient SL before neurosurgery was substantially lower than in controls, with significant improvement after neurosurgery. Functional MRI in patient SL revealed a similar pattern of cerebellar activation during biological motion processing as in healthy participants, but located more medially, in the left cerebellar lobules III and IX. As in normalcy, PPI analysis showed cerebellar communication with a region in the superior temporal sulcus, but located more anteriorly. The findings demonstrate a potential for recovery of visual body motion processing after cerebellar damage, likely mediated by topographic shifts within the corresponding cerebro-cerebellar circuitry induced by cerebellar reorganization. The outcome is of importance for further understanding of cerebellar plasticity and neural circuits underpinning visual social cognition.