940 resultados para In-network storage


Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper looks at how automatic load transfer may be used as a possible planning tool to help deliver faster connections for customers. A trial on an area of overhead line Network is presented to show how improvements in % feeder utilisation may be realised by changing the location of the open point. The reported Network data is compared to calculated data under two different configurations over a two week trial period. The results show that ALT open point determination in the presence of generation is different from a load only circuit and that the open points may not be fixed with time. Looking at improvements in Network headroom may not be conducive to other improvements in the network such as loss reduction or improving voltage profiles.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Developing analytical models that can accurately describe behaviors of Internet-scale networks is difficult. This is due, in part, to the heterogeneous structure, immense size and rapidly changing properties of today's networks. The lack of analytical models makes large-scale network simulation an indispensable tool for studying immense networks. However, large-scale network simulation has not been commonly used to study networks of Internet-scale. This can be attributed to three factors: 1) current large-scale network simulators are geared towards simulation research and not network research, 2) the memory required to execute an Internet-scale model is exorbitant, and 3) large-scale network models are difficult to validate. This dissertation tackles each of these problems. ^ First, this work presents a method for automatically enabling real-time interaction, monitoring, and control of large-scale network models. Network researchers need tools that allow them to focus on creating realistic models and conducting experiments. However, this should not increase the complexity of developing a large-scale network simulator. This work presents a systematic approach to separating the concerns of running large-scale network models on parallel computers and the user facing concerns of configuring and interacting with large-scale network models. ^ Second, this work deals with reducing memory consumption of network models. As network models become larger, so does the amount of memory needed to simulate them. This work presents a comprehensive approach to exploiting structural duplications in network models to dramatically reduce the memory required to execute large-scale network experiments. ^ Lastly, this work addresses the issue of validating large-scale simulations by integrating real protocols and applications into the simulation. With an emulation extension, a network simulator operating in real-time can run together with real-world distributed applications and services. As such, real-time network simulation not only alleviates the burden of developing separate models for applications in simulation, but as real systems are included in the network model, it also increases the confidence level of network simulation. This work presents a scalable and flexible framework to integrate real-world applications with real-time simulation.^

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The increasing needs for computational power in areas such as weather simulation, genomics or Internet applications have led to sharing of geographically distributed and heterogeneous resources from commercial data centers and scientific institutions. Research in the areas of utility, grid and cloud computing, together with improvements in network and hardware virtualization has resulted in methods to locate and use resources to rapidly provision virtual environments in a flexible manner, while lowering costs for consumers and providers. ^ However, there is still a lack of methodologies to enable efficient and seamless sharing of resources among institutions. In this work, we concentrate in the problem of executing parallel scientific applications across distributed resources belonging to separate organizations. Our approach can be divided in three main points. First, we define and implement an interoperable grid protocol to distribute job workloads among partners with different middleware and execution resources. Second, we research and implement different policies for virtual resource provisioning and job-to-resource allocation, taking advantage of their cooperation to improve execution cost and performance. Third, we explore the consequences of on-demand provisioning and allocation in the problem of site-selection for the execution of parallel workloads, and propose new strategies to reduce job slowdown and overall cost.^

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The National Policy on Mental Health is characterized as a territorial - political community , and it has the Psychoso cial Care Strategy (Eaps) as guideline for the proposal and the development of their actions. In its design, CAPS is idealized to be a strategic equipment within the Psychoso cial Care Network/RAPS. Matricial support and at tention to the crisis constitute strategic areas of action of CAPS in its replacement mission , and as it is g uided by the scope of deinstitutionalization, those are essential to the success of these services. We argue that sustain crises in existential territories of life is a condition for the effectiveness of psychosocial care and, ultimately, to the sustainability of its Reform. In this direction, the matricial support tool reveals a territorial supporter, intercessory and powerful in building a psychosocial care to the crisis. Recognized as one of the major challenges by the Brazilian Ministry of Health, forward these fronts materializes for workers in their mi cropolitical crafts. Our research arises as an investment toward empower them , and aimed to understand the operationalization of attention to the crisis and matricial support in a CAPS II, in the view of its workers . Besides, it aims to examine such practi ces forward the principles and purposes of Psychosocial Care Strategy. Inspired by the research - intervention and by the political and social ideas of Institutiona l Analysis, we offer a space for reflection and exchange, by implicational interviews , enablin g workers to launch them in analysis of practices in the EAPs view. We have done a documentary consulting CAPS Technical Project, and a return stage to the institution, by organizing workshop and conversation groups with CAPS workers. The results have show n that there are institutional logics in competition on that service. When operating the logic risk, some difficulties in sustaining most intense crisis situations were identified, the psychiatric hospital internment is used as a facility, particularly in view of some cases, in which the aggressiveness of the person in crises becomes aggressive, and when the brackets SAMU, the CAPS III and Comprehensive Care Beds do not respond satisfactorily to their users requests. Order weaknesses were indicated in this thesis as macropolitical and micropolitical interfering in network support. The matricial actions were identified as a powerful intercessor resource in crisis care appeared weakened, and indicates little porosity in the relationship between the Service and the territory where it takes place. Noticed by the logic of home care, without operate primarily as a knowledge exchange device, we saw capture points in the logic of assistance with ambulatoriza tion production of CAPS, welfare practices and "ext empore " . T he E APs , although it emerge s as a guiding, it is not seen to workers as effective practice. On the one hand, the results signaled that the attention to the crisis and the matricial actions are developed without tenacious connection with the purposes of EA Ps, on the other hand, successful cases were indicated with the main leads to conducting wire of intersectoral actions to the powerful bonds and to the participation of user in their care process es , indicating insurgent forces tha t intend by traditional lo gic .

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In the case of Brazilian Psychiatric Reformation, mental health juvenile reveals itself as a great challenge, with major gaps in terms of needs, services and actions on mental illness in children and adolescents. This research is a qualitative study of descriptive and exploratory, having to analyze the actions and practices of mental health juvenile articulated between the Psychosocial Care Center juvenile (Caps i) and the basic care in Natal-RN, and specific, identify the limits and possibilities for an important precedent of the care network. After submission to the Research Ethics Committee (CEP) of the University Hospital Onofre Lopes (HUOL) of the Federal University of Rio Grande do Norte (UFRN) obtained approval contained in opinion number 777.067 / 2014. For the data collection, it was initially carried out a documentary research in the Municipal Health Department of Christmas about the phenomenon under study, and subsequently, applied semi-structured interviews with the subjects of the research, which were workers Caps i of Natal-RN. The analysis was woven as the thematic analysis technique, understood within the method of content analysis. The results and discussions were organized by categories and subcategories, namely: CATEGORY 1: Limits and weaknesses in the linkage between the Caps i and basic care, with the subcategories: 1.1 Lack of specialized services and devices articulators in network, 1.2 The diversity of situations in the demand juvenile assisted; CATEGORY 2: possibilities for an effective network, with the subcategory: 2.1 Intersectoral collaboration as a strategy for solving attention. The analysis revealed that the integration and coordination of mental health services juvenile and primary care in the city of Natal-RN, has incipient initiatives and/or inadequate for the resolvability intersectoral, where the devices of attention to health involved cannot establish bonds effective and long-lasting in the perspective of co-responsibility and sharing of care. On the other hand, it appears that the existing shares and practiced, configure an exercise in approximation to the dialog between mental health juvenile and basic care. It is highlighted that the shared care and the establishment of intersectoral collaboration within and outside of the health sector is possibility of facilitating the necessary dialog between the services and professionals involved, thus, enabling a better prospect of resolvability of the Network of Psychosocial Care for the youth in reality being investigated.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissolution of non-aqueous phase liquids (NAPLs) or gases into groundwater is a key process, both for contamination problems originating from organic liquid sources, and for dissolution trapping in geological storage of CO2. Dissolution in natural systems typically will involve both high and low NAPL saturations and a wide range of pore water flow velocities within the same source zone for dissolution to groundwater. To correctly predict dissolution in such complex systems and as the NAPL saturations change over time, models must be capable of predicting dissolution under a range of saturations and flow conditions. To provide data to test and validate such models, an experiment was conducted in a two-dimensional sand tank, where the dissolution of a spatially variable, 5x5 cm**2 DNAPL tetrachloroethene source was carefully measured using x-ray attenuation techniques at a resolution of 0.2x0.2 cm**2. By continuously measuring the NAPL saturations, the temporal evolution of DNAPL mass loss by dissolution to groundwater could be measured at each pixel. Next, a general dissolution and solute transport code was written and several published rate-limited (RL) dissolution models and a local equilibrium (LE) approach were tested against the experimental data. It was found that none of the models could adequately predict the observed dissolution pattern, particularly in the zones of higher NAPL saturation. Combining these models with a model for NAPL pool dissolution produced qualitatively better agreement with experimental data, but the total matching error was not significantly improved. A sensitivity study of commonly used fitting parameters further showed that several combinations of these parameters could produce equally good fits to the experimental observations. The results indicate that common empirical model formulations for RL dissolution may be inadequate in complex, variable saturation NAPL source zones, and that further model developments and testing is desirable.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Physical location of data in cloud storage is a problem that gains a lot of attention not only from the actual cloud providers but also from the end users' who lately raise many concerns regarding the privacy of their data. It is a common practice that cloud service providers create replicate users' data across multiple physical locations. However, moving data in different countries means that basically the access rights are transferred based on the local laws of the corresponding country. In other words, when a cloud service provider stores users' data in a different country then the transferred data is subject to the data protection laws of the country where the servers are located. In this paper, we propose LocLess, a protocol which is based on a symmetric searchable encryption scheme for protecting users' data from unauthorized access even if the data is transferred to different locations. The idea behind LocLess is that "Once data is placed on the cloud in an unencrypted form or encrypted with a key that is known to the cloud service provider, data privacy becomes an illusion". Hence, the proposed solution is solely based on encrypting data with a key that is only known to the data owner.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

With the development of information technology, the theory and methodology of complex network has been introduced to the language research, which transforms the system of language in a complex networks composed of nodes and edges for the quantitative analysis about the language structure. The development of dependency grammar provides theoretical support for the construction of a treebank corpus, making possible a statistic analysis of complex networks. This paper introduces the theory and methodology of the complex network and builds dependency syntactic networks based on the treebank of speeches from the EEE-4 oral test. According to the analysis of the overall characteristics of the networks, including the number of edges, the number of the nodes, the average degree, the average path length, the network centrality and the degree distribution, it aims to find in the networks potential difference and similarity between various grades of speaking performance. Through clustering analysis, this research intends to prove the network parameters’ discriminating feature and provide potential reference for scoring speaking performance.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

One of the most important components in electrochemical storage devices (batteries and supercapacitors) is undoubtedly the electrolyte. The basic function of any electrolyte in these systems is the transport of ions between the positive and negative electrodes. In addition, electrochemical reactions occurring at each electrode/electrolyte interface are the origin of the current generated by storage devices. In other words, performances (capacity, power, efficiency and energy) of electrochemical storage devices are strongly related to the electrolyte properties, as well as, to the affinity for the electrolyte to selected electrode materials. Indeed, the formulation of electrolyte presenting good properties, such as high ionic conductivity and low viscosity, is then required to enhance the charge transfer reaction at electrode/electrolyte interface (e.g. charge accumulation in the case of Electrochemical Double Layer Capacitor, EDLC). For practical and safety considerations, the formulation of novel electrolytes presenting a low vapor pressure, a large liquid range temperature, a good thermal and chemical stabilities is also required.

This lecture will be focused on the effect of the electrolyte formulation on the performances of electrochemical storage devices (Li-ion batteries and supercapacitors). During which, a summary of the physical, thermal and electrochemical data obtained by our group, recently, on the formulation of novel electrolyte-based on the mixture of an ionic liquid (such as EmimNTf2 and Pyr14NTf2) and carbonate or dinitrile solvents will be presented and commented. The impact of the electrolyte formulation on the storage performances of EDLC and Li-ion batteries will be also discussed to further understand the relationship between electrolyte formulation and electrochemical performances. This talk will also be an opportunity to further discuss around the effects of additives (SEI builder: fluoroethylene carbonate and vinylene carbonate), ionic liquids, structure and nature of lithium salt (LiTFSI vs LiPF6) on the cyclability of negative electrode to then enhance the electrolyte formulation. For that, our recent results on TiSnSb and graphite negative electrodes will be presented and discussed, for example 1,2.

1-C. Marino, A. Darwiche1, N. Dupré, H.A. Wilhelm, B. Lestriez, H. Martinez, R. Dedryvère, W. Zhang, F. Ghamouss, D. Lemordant, L. Monconduit “ Study of the Electrode/Electrolyte Interface on Cycling of a Conversion Type Electrode Material in Li Batteries” J. Phys.chem. C, 2013, 117, 19302-19313

2- Mouad Dahbi, Fouad Ghamouss, Mérièm Anouti, Daniel Lemordant, François Tran-Van “Electrochemical lithiation and compatibility of graphite anode using glutaronitrile/dimethyl carbonate mixtures containing LiTFSI as electrolyte” 2013, 43, 4, 375-385.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Cybercriminals ramp up their efforts with sophisticated techniques while defenders gradually update their typical security measures. Attackers often have a long-term interest in their targets. Due to a number of factors such as scale, architecture and nonproductive traffic however it makes difficult to detect them using typical intrusion detection techniques. Cyber early warning systems (CEWS) aim at alerting such attempts in their nascent stages using preliminary indicators. Design and implementation of such systems involves numerous research challenges such as generic set of indicators, intelligence gathering, uncertainty reasoning and information fusion. This paper discusses such challenges and presents the reader with compelling motivation. A carefully deployed empirical analysis using a real world attack scenario and a real network traffic capture is also presented.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Verbal fluency is the ability to produce a satisfying sequence of spoken words during a given time interval. The core of verbal fluency lies in the capacity to manage the executive aspects of language. The standard scores of the semantic verbal fluency test are broadly used in the neuropsychological assessment of the elderly, and different analytical methods are likely to extract even more information from the data generated in this test. Graph theory, a mathematical approach to analyze relations between items, represents a promising tool to understand a variety of neuropsychological states. This study reports a graph analysis of data generated by the semantic verbal fluency test by cognitively healthy elderly (NC), patients with Mild Cognitive Impairment – subtypes amnestic(aMCI) and amnestic multiple domain (a+mdMCI) - and patients with Alzheimer’s disease (AD). Sequences of words were represented as a speech graph in which every word corresponded to a node and temporal links between words were represented by directed edges. To characterize the structure of the data we calculated 13 speech graph attributes (SGAs). The individuals were compared when divided in three (NC – MCI – AD) and four (NC – aMCI – a+mdMCI – AD) groups. When the three groups were compared, significant differences were found in the standard measure of correct words produced, and three SGA: diameter, average shortest path, and network density. SGA sorted the elderly groups with good specificity and sensitivity. When the four groups were compared, the groups differed significantly in network density, except between the two MCI subtypes and NC and aMCI. The diameter of the network and the average shortest path were significantly different between the NC and AD, and between aMCI and AD. SGA sorted the elderly in their groups with good specificity and sensitivity, performing better than the standard score of the task. These findings provide support for a new methodological frame to assess the strength of semantic memory through the verbal fluency task, with potential to amplify the predictive power of this test. Graph analysis is likely to become clinically relevant in neurology and psychiatry, and may be particularly useful for the differential diagnosis of the elderly.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Upgrade of hydrogen to valuable fuel is a central topic in modern research due to its high availability and low price. For the difficulties in hydrogen storage, different pathways are still under investigation. A promising way is in the liquid-phase chemical hydrogen storage materials, because they can lead to greener transformation processes with the on line development of hydrogen for fuel cells. The aim of my work was the optimization of catalysts for the decomposition of formic acid made by sol immobilisation method (a typical colloidal method). Formic acid was selected because of the following features: it is a versatile renewable reagent for green synthesis studies. The first aim of my research was the synthesis and optimisation of Pd nanoparticles by sol-immobilisation to achieve better catalytic performances and investigate the effect of particle size, oxidation state, role of stabiliser and nature of the support. Palladium was chosen because it is a well-known active metal for the catalytic decomposition of formic acid. Noble metal nanoparticles of palladium were immobilized on carbon charcoal and on titania. In the second part the catalytic performance of the “homemade” catalyst Pd/C to a commercial Pd/C and the effect of different monometallic and bimetallic systems (AuxPdy) in the catalytic formic acid decomposition was investigated. The training period for the production of this work was carried out at the University of Cardiff (Group of Dr. N. Dimitratos).