900 resultados para Local computer network
Resumo:
Nowadays, organizations face the problem of keeping their information protected, available and trustworthy. In this context, machine learning techniques have also been extensively applied to this task. Since manual labeling is very expensive, several works attempt to handle intrusion detection with traditional clustering algorithms. In this paper, we introduce a new pattern recognition technique called Optimum-Path Forest (OPF) clustering to this task. Experiments on three public datasets have showed that OPF classifier may be a suitable tool to detect intrusions on computer networks, since it outperformed some state-of-the-art unsupervised techniques. © 2012 IEEE.
Resumo:
Pós-graduação em Engenharia Elétrica - FEB
Resumo:
Pós-graduação em Engenharia Elétrica - FEIS
Resumo:
Pós-graduação em Engenharia Elétrica - FEIS
Resumo:
Consiste no estudo sobre a formação de uma rede de empresas prestadoras de serviço subcontratadas pela Alunorte, como conseqüência do processo de flexibilização produtiva desta indústria de alumina, localizada no distrito industrial de Barcarena, no Estado do Pará. O objetivo principal é analisar se a relação estabelecida entre essa grande indústria e sua rede de subcontratadas e deste conjunto de empresas com as instituições locais tem desencadeado efeitos germinativos locais de desenvolvimento. Tem como base teórica diversos estudos, segundo os quais, é a partir do modo como esses agentes interagem, articulando-se através de sistemas de inovação, que se define o formato do arranjo produtivo ou cadeia de firmas. Tal formato será ou não capaz de estimular a produção contínua e disseminada de inovações tecnológicas e organizacionais, bem como a formação de capital humano e social, fundamentais para impulsionar o desenvolvimento endógeno. A pesquisa de campo, porém, demonstrou que, apesar do relacionamento com a maior produtora mundial de alumina, indústria vinculada à lógica global de competitividade e de inovação tecnológica e gerencial, não há uma ampla difusão e assimilação desse conhecimento entre as empresas subcontratadas. Não apenas em função da insuficiência de qualificação e de condições tecnológicas para isso, mas também pela ausência de relações de confiança mútua e de cooperação produtiva e inovativa entre as referidas empresas e destas com a rede de instituições locais. Essa lacuna inviabiliza possíveis avanços desse arranjo produtivo, em tennos de obtenção de economias de escala e de melhorias nos níveis de produtividade e competitividade. Não há, portanto, um ambiente favorável às iniciativas dinamizadoras do desenvolvimento local.
Resumo:
The implementation of local geodetic networks for georeferencing of rural properties has become a requirement after publication of the Georeferencing Technical Standard by INCRA. According to this standard, the maximum distance of baselines to GNSS L1 receivers is of 20 km. Besides the length of the baseline, the geometry and the number of geodetic control stations are other factors to be considered in the implementation of geodetic networks. Thus, this research aimed to examine the influence of baseline lengths higher than the regulated limit of 20 km, the geometry and the number of control stations on quality of local geodetic networks for georeferencing, and also to demonstrate the importance of using specific tests to evaluate the solution of ambiguities and on the quality of the adjustment. The results indicated that the increasing number of control stations has improved the quality of the network, the geometry has not influenced on the quality and the baseline length has influenced on the quality; however, lengths higher than 20 km has not interrupted the implementation, with GPS L1 receiver, of the local geodetic network for the purpose of georeferencing. Also, the use of different statistical tests, both for the evaluation of the resolution of ambiguities and for the adjustment, have enabled greater clearness in analyzing the results, which allow that unsuitable observations may be eliminated.
Resumo:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
Resumo:
Coordinated patterns of electrical activity are important for the early development of sensory systems. The spatiotemporal dynamics of these early activity patterns and the role of the peripheral sensory input for their generation are essentially unknown. There are two projects in this thesis. In project1, we performed extracellular multielectrode recordings in the somatosensory cortex of postnatal day 0 to 7 rats in vivo and observed three distinct patterns of synchronized oscillatory activity. (1) Spontaneous and periphery-driven spindle bursts of 1–2 s in duration and ~10 Hz in frequency occurred approximately every 10 s. (2) Spontaneous and sensory-driven gamma oscillations of 150–300 ms duration and 30–40 Hz in frequency occurred every 10–30 s. (3) Long oscillations appeared only every ~20 min and revealed the largest amplitude (250–750 µV) and longest duration (>40 s). These three distinct patterns of early oscillatory activity differently synchronized the neonatal cortical network. Whereas spindle bursts and gamma oscillations did not propagate and synchronized a local neuronal network of 200–400 µm in diameter, long oscillations propagated with 25–30 µm/s and synchronized 600-800 µm large ensembles. All three activity patterns were triggered by sensory activation. Single electrical stimulation of the whisker pad or tactile whisker activation elicited neocortical spindle bursts and gamma activity. Long oscillations could be only evoked by repetitive sensory stimulation. The neonatal oscillatory patterns in vivo depended on NMDAreceptor-mediated synaptic transmission and gap junctional coupling. Whereas spindle bursts and gamma oscillations may represent an early functional columnar-like pattern, long oscillations may serve as a propagating activation signal consolidating these immature neuronal networks. In project2, Using voltage-sensitive dye imaging and simultaneous multi-channel extracellular recordings in the barrel cortex and somatosensory thalamus of newborn rats in vivo, we found that spontaneous and whisker stimulation induced activity patterns were restricted to functional cortical columns already at the day of birth. Spontaneous and stimulus evoked cortical activity consisted of gamma oscillations followed by spindle bursts. Spontaneous events were mainly generated in the thalamus or by spontaneous whisker movements. Our findings indicate that during early developmental stages cortical networks self-organize in ontogenetic columns via spontaneous gamma oscillations triggered by the thalamus or sensory periphery.
Resumo:
This book will serve as a foundation for a variety of useful applications of graph theory to computer vision, pattern recognition, and related areas. It covers a representative set of novel graph-theoretic methods for complex computer vision and pattern recognition tasks. The first part of the book presents the application of graph theory to low-level processing of digital images such as a new method for partitioning a given image into a hierarchy of homogeneous areas using graph pyramids, or a study of the relationship between graph theory and digital topology. Part II presents graph-theoretic learning algorithms for high-level computer vision and pattern recognition applications, including a survey of graph based methodologies for pattern recognition and computer vision, a presentation of a series of computationally efficient algorithms for testing graph isomorphism and related graph matching tasks in pattern recognition and a new graph distance measure to be used for solving graph matching problems. Finally, Part III provides detailed descriptions of several applications of graph-based methods to real-world pattern recognition tasks. It includes a critical review of the main graph-based and structural methods for fingerprint classification, a new method to visualize time series of graphs, and potential applications in computer network monitoring and abnormal event detection.
Resumo:
Energy is of primary concern in wireless sensor networks (WSNs). Low power transmission makes the wireless links unreliable, which leads to frequent topology changes. Resulting packet retransmissions aggravate the energy consumption. Beaconless routing approaches, such as opportunistic routing (OR) choose packet forwarders after data transmissions, and are promising to support dynamic features of WSNs. This paper proposes SCAD - Sensor Context-aware Adaptive Duty-cycled beaconless OR for WSNs. SCAD is a cross-layer routing solution and it brings the concept of beaconless OR into WSNs. SCAD selects packet forwarders based on multiple types of network contexts. To achieve a balance between performance and energy efficiency, SCAD adapts duty-cycles of sensors based on real-time traffic loads and energy drain rates. We implemented SCAD in TinyOS running on top of Tmote Sky sensor motes. Real-world evaluations show that SCAD outperforms other protocols in terms of both throughput and network lifetime.
Resumo:
From research groups at the universities of developed countries there is a growing interest in providing solutions to problems of developing countries. In this context we have studied typical problems in many (educational) institutions, such as the lack of technicians who repair the computers, the administration of the machines, and also the difficulty to maintain and configure the old hardware available due to the variety of characteristics of the different machines and the amount of hardware breakdowns and software issues (viruses, administration issues) that the local staff has to face up to with their equipments. We propose a thin client approach that takes into account the human, hardware and software characteristics of developing institutions to provide a complete service for a computer network. The network administration is reduced to the administration of one server only. The maintenance of the machines is simplified and old computers can simulate the running of a powerful computer. Our proposal results in a cheap, simple (from the support point of view) and powerful (in terms of achieved functionalities) design.
Resumo:
Includes "Bibliographical section".
Resumo:
Nuclear science abstracts
Resumo:
Vita.
Resumo:
Published by: Harvard Law Review Association,