807 resultados para Security systems
Resumo:
The identification and classification of network traffic and protocols is a vital step in many quality of service and security systems. Traffic classification strategies must evolve, alongside the protocols utilising the Internet, to overcome the use of ephemeral or masquerading port numbers and transport layer encryption. This research expands the concept of using machine learning on the initial statistics of flow of packets to determine its underlying protocol. Recognising the need for efficient training/retraining of a classifier and the requirement for fast classification, the authors investigate a new application of k-means clustering referred to as 'two-way' classification. The 'two-way' classification uniquely analyses a bidirectional flow as two unidirectional flows and is shown, through experiments on real network traffic, to improve classification accuracy by as much as 18% when measured against similar proposals. It achieves this accuracy while generating fewer clusters, that is, fewer comparisons are needed to classify a flow. A 'two-way' classification offers a new way to improve accuracy and efficiency of machine learning statistical classifiers while still maintaining the fast training times associated with the k-means.
Resumo:
Game-theoretic security resource allocation problems have generated significant interest in the area of designing and developing security systems. These approaches traditionally utilize the Stackelberg game model for security resource scheduling in order to improve the protection of critical assets. The basic assumption in Stackelberg games is that a defender will act first, then an attacker will choose their best response after observing the defender’s strategy commitment (e.g., protecting a specific asset). Thus, it requires an attacker’s full or partial observation of a defender’s strategy. This assumption is unrealistic in real-time threat recognition and prevention. In this paper, we propose a new solution concept (i.e., a method to predict how a game will be played) for deriving the defender’s optimal strategy based on the principle of acceptable costs of minimax regret. Moreover, we demonstrate the advantages of this solution concept by analyzing its properties.
Resumo:
his essay is premised on the following: a conspiracy to fix or otherwise manipulate the outcome of a sporting event for profitable purpose. That conspiracy is in turn predicated on the conspirators’ capacity to: (a) ensure that the fix takes place as pre-determined; (b) manipulate the betting markets that surround the sporting event in question; and (c) collect their winnings undetected by either the betting industry’s security systems or the attention of any national regulatory body or law enforcement agency.
Unlike many essays on this topic, this contribution does not focus on the “fix”– part (a) of the above equation. It does not seek to explain how or why a participant or sports official might facilitate a betting scam through either on-field behaviour that manipulates the outcome of a game or by presenting others with privileged inside information in advance of a game. Neither does this contribution seek to give any real insight into the second part of the above equation: how such conspirators manipulate a sports betting market by playing or laying the handicap or in-play or other offered betting odds. In fact, this contribution is not really about the mechanics of sports betting or match fixing at all; rather it is about the sometimes under explained reason why match fixing has reportedly become increasingly attractive as of late to international crime syndicates. That reason relates to the fact that given the traditional liquidity of gambling markets, sports betting can, and has long been, an attractively accessible conduit for criminal syndicates to launder the proceeds of crime. Accordingly, the term “winnings”, noted in part (c) of the above equation, takes on an altogether more nefarious meaning.
This essay’s attempt to review the possible links between match fixing in sport, gambling-related “winnings” and money laundering is presented in four parts.
First, some context will be given to what is meant by money laundering, how it is currently policed internationally and, most importantly, how the growth of online gambling presents a unique set of vulnerabilities and opportunities to launder the proceeds of crime. The globalisation of organised crime, sports betting and transnational financial services now means that money laundering opportunities have moved well beyond a flutter on the horses at your local racetrack or at the roulette table of your nearest casino. The growth of online gambling platforms means that at a click it is possible for the proceeds of crime in one jurisdiction to be placed on a betting market in another jurisdiction with the winnings drawn down and laundered in a third jurisdiction and thus the internationalisation of gambling-related money laundering threatens the integrity of sport globally.
Second, and referring back to the infamous hearings of the US Senate Special Committee to Investigate Organised Crime in Interstate Commerce of the early 1950s, (“the Kefauver Committee”), this article will begin by illustrating the long standing interest of organised crime gangs – in this instance, various Mafia families in the United States – in money laundering via sports gambling-related means.
Third, and using the seminal 2009 report “Money Laundering through the Football Sector” by the Financial Action Task Force (FATF, an inter-governmental body established in 1989 to promote effective implementation of legal, regulatory and operational measures for combating money laundering, terrorist financing and other related threats to the integrity of the international financial system), this essay seeks to assess the vulnerabilities of international sport to match fixing, as motivated in part by the associated secondary criminality of tax evasion and transnational economic crime.
The fourth and concluding parts of the essay spin from problems to possible solutions. The underlying premise here is that heretofore there has been an insularity to the way that sports organisations have both conceptualised and sought to address the match fixing threat e.g., if we (in sport) initiate player education programmes; establish integrity units; enforce codes of conduct and sanctions strictly; then our integrity or brand should be protected. This essay argues that, although these initiatives are important, the source and process of match fixing is beyond sport’s current capacity, as are the possible solutions.
Resumo:
In physical layer security systems there is a clear need to exploit the radio link characteristics to automatically generate an encryption key between two end points. The success of the key generation depends on the channel reciprocity, which is impacted by the non-simultaneous measurements and the white nature of the noise. In this paper, an OFDM subcarriers' channel responses based key generation system with enhanced channel reciprocity is proposed. By theoretically modelling the OFDM subcarriers' channel responses, the channel reciprocity is modelled and analyzed. A low pass filter is accordingly designed to improve the channel reciprocity by suppressing the noise. This feature is essential in low SNR environments in order to reduce the risk of the failure of the information reconciliation phase during key generation. The simulation results show that the low pass filter improves the channel reciprocity, decreases the key disagreement, and effectively increases the success of the key generation.
Resumo:
Este relatório apresenta o estudo de duas linhas de montagem de câmaras de vigilância da empresa Bosch Security Systems, S.A. de Ovar. Numa primeira fase procedeu-se à elaboração das listas de tarefas e respectivas precedências, seguindo-se a medição de trabalho, com o intuito de se actualizarem os tempos padrão existentes. Procedeu-se à comparação dos tempos obtidos com os que se encontravam em vigor de modo a perceber as diferenças e motivos das mesmas. Numa segunda fase, realizaram-se balanceamentos para as duas linhas tendo como cenários a manutenção das duas linhas e a possibilidade da sua junção numa linha única. Analisaram-se todos os resultados e efectuou-se um levantamento do investimento necessário associado a cada um dos cenários. Realizou-se deste modo uma análise de viabilidade com vista ao apoio à decisão. Por fim, realizou-se o workshop Lean Line Design que teve como resultado a configuração física da linha final. Este projecto permitiu chegar a resultados aliciantes, com ganhos a vários níveis. Constituiu mais uma acção de melhoria da empresa, levando-a a rectificar lacunas existentes e ao cumprimento de procedimentos ergonómicos que já se encontravam definidos.
Resumo:
Projecto apresentado ao Instituto Politécnico do Porto para obtenção do Grau de Mestre em Logística Orientada por Prof. Doutor Gouveia
Resumo:
Dissertação para a obtenção do grau de Mestre em Engenharia Electrotécnica Ramo de Energia/Automação e Eletrónica Industrial
Resumo:
Com o progresso da tecnologia aeronáutica, a deslocação de pessoas e bens tornou-se bastante acessível para variados pontos de mundo, com espaço de tempo muito reduzido. Um dos motores essenciais deste avanço, concernente à mobilidade, é o transporte aéreo e a sua evolução. Este tipo de transporte requer a máxima segurança, sendo que um único acidente pode gerar centenas de vítimas. Atendendo a estas condições, a qualidade dos pavimentos aeroportuários é de grande importância para a segurança da movimentação das aeronaves em solo. Mas, por razões económicas e por vezes de espaço, perspetivas de novas construções perdem viabilidade comparativamente a soluções de reabilitação. A posição geográfica do aeroporto de Ondjiva faz com que seja um importante ponto de passagem entre a África do Sul e a Namíbia e, prevê-se que o número de voos que se efetuam no aeroporto cresça, sendo que o país está numa fase de grande evolução. O presente trabalho visa o conhecimento do processo de dimensionamento para pavimentos aeroportuários e soluções de correção para anomalias que possam apresentar, aplicando-os ao aeroporto de Ondjiva, em Angola. Atualmente, o aeroporto revela um grande desgaste das pistas de táxi, inadaptabilidade das cabeceiras face às cargas estáticas a que são submetidas e, largura insuficiente da pista para a aeronave de projeto, ou aeronave crítica, atendendo ao regulamento da ICAO (International Civil Aviation Organization). Para melhorar o conforto, a segurança e eficiência dos serviços aéreos, o dimensionamento do aeroporto deve obedecer aos princípios e regras da ICAO. Pretende-se também a modelação de uma solução de reforço para o pavimento existente, para que não seja necessário construir um aeroporto de raiz, minimizando custos. Após a realização do dimensionamento, foi estudada a sinalização horizontal e luminosa da pista, para que esteja em conformidade com as suas novas medidas.
Effectiveness Of Feature Detection Operators On The Performance Of Iris Biometric Recognition System
Resumo:
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed systems, make it a good candidate to replace most of thesecurity systems around. By making use of the distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person. Identification of this person is possible by applying appropriate matching algorithm.In this paper, Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical analysis of different feature detection operators is performed, features extracted is encoded using Haar wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and False Reject Rate is 10%.
Resumo:
El fenómeno del terrorismo de carácter trasnacional,Especialmente aquel que hace referencia a la vertiente yihadista, ha despertado preocupación dentro de la comunidad internacional, específicamente dentro de aquellos centros de poder occidentales que se han visto vulnerados por algún tipo de acción llevada a cabo por grupos de esta índole. Organizaciones como AlQaeda, que mediante la concentración y labor de múltiples células vinculadas en su haber, operan y ejecutan acciones terroristas en varias regiones del mundo, son identificadas hoy en día, como una nueva amenaza no estatal dentro de los sistemas de seguridad occidentales. El caso español representa un claro ejemplo de la transnacionalización del terrorismo, en particular aquel que se denomina de carácter yihadista dentro de territorio europeo, puesto que es a partir de los atentados perpetuados en el metro de Madrid, que se activan las alarmas hacia el interior de la Unión Europea y se inician una serie de reformas pertinentes a enfrentar dicha amenaza dentro de los sistemas de seguridad de la mayoría de Estados miembros de la unión.De esta manera, y dentro del campo de estudio que ofrecen las Relaciones Internacionales, la amenaza que el terrorismo de carácter yihadista representa para la seguridad española, puede ser comprendida, a partir del análisis de elementos claves tales como: España como escenario directo de la amenaza terrorista, proximidad geográfica con las regiones del Mediterráneo, Magreb y Sahél, ideología de los grupos yihadistas y finamente la ampliación de la agenda de seguridad española a partir del 11-M, entre otros. Los alcances del terrorismo yihadista son definitivamente percibidos dentro de la comunidad internacional, de allí reside la importancia del estudio de la estrategia contra terrorista elaborada por España para combatir este fenómeno, puesto que no solo se encuentra al interior de su territorio sino además en las regiones aledañas.
Resumo:
Previous research has shown that often there is clear inertia in individual decision making---that is, a tendency for decision makers to choose a status quo option. I conduct a laboratory experiment to investigate two potential determinants of inertia in uncertain environments: (i) regret aversion and (ii) ambiguity-driven indecisiveness. I use a between-subjects design with varying conditions to identify the effects of these two mechanisms on choice behavior. In each condition, participants choose between two simple real gambles, one of which is the status quo option. I find that inertia is quite large and that both mechanisms are equally important.
Resumo:
Na fábrica da EPAL, em Vale da Pedra, o risco de queda em altura no acesso vertical a espaços confinados, foi avaliado como sendo aceitável mediante a adoção de medidas de controlo que não existiam, ou que não eram adequadas, ou ainda que não eram utilizadas. Para responder a este problema, foi concebido, desenvolvido e ensaiado um inovador dispositivo portátil anti-queda. Este previne a queda no acesso entre o pavimento e os primeiros degraus de aberturas verticais conducentes a espaços confinados. Além da função preventiva, também pode fazer parte da proteção anti-queda, como ponto de ancoragem dos equipamentos de proteção contra quedas. Os ensaios realizados revelaram que, em comparação com as alternativas pré-fabricadas disponíveis, esta solução é mais adequada para prevenir quedas, por se adaptar a múltiplas configurações de acesso, com um dispositivo relativamente leve, fácil de transportar e de aplicar, estável e resistente. / In EPAL factory in Vale da Pedra, the risk of falling from a height in the vertical access to confined spaces, was evaluated as being acceptable by the adoption of control measures that did not exist, or were not suitable, or were not used. To respond to this problem, an innovative portable anti-falling device was designed, developed and tested. This prevents falling in access between the ground and the first steps of vertical openings leading to confined spaces. In addition to the preventive function, it can also be part of the fall-arrest protection, as anchor point of fall protection equipment. The tests revealed that, in comparison with the prefabricated alternatives available, this solution is best suited to prevent falls, due to its adaptability to multiple access settings, with a relatively light device, easy to carry and to use, stable and resistant.
Resumo:
Taking exception with the often-heard bromide that Europe needs more integration to save its social model, Daniel Gros reiterates his position in this new CEPS Commentary that faster economic and population growth are key to ensuring the future of Europe’s social security systems.
Resumo:
The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.
Resumo:
Apesar do indiscutível avanço que os sistemas previdenciários representaram no campo social verifica-se, em todo o mundo, um crescente consenso quanto à necessidade de se repensar sua estrutura. As recentes transformações da estrutura demográfica, do mercado de trabalho e do processo de globalização da economia, nos remetem a uma nova realidade e ao imperativo de buscar novas soluções para assegurar a proteção social. Por outro lado, o Estado, enquanto promotor do desenvolvimento e de redução das desigualdades, se encontra sob severo questionamento, ao passo que a moral individualista e os méritos do mercado gozam de crescente prestígio. Como resultado destas múltiplas pressões, o Brasil, a exemplo de vários outros países, vem experimentando um processo de ajustes e reforma de seu sistema previdenciário, no qual o fortalecimento do elo entre contribuições e beneficios tem-se constituído o principal elemento. Nesse sentido, o desenvolvimento do regime complementar privado ocupa um espaço cada vez maior na formulação e execução de políticas públicas. Com a aprovação da Emenda Constitucional no. 20 (em dezembro de 1998) foram lançadas as novas diretrizes para o sistema previdenciário brasileiro. O trabalho analisa as iniciativas estatais até o momento realizadas, e sua contribuição para a construção de um arcabouço regulatório para a área, mais adequado às novas demandas sociais, econômicas e políticas