881 resultados para Tor, Network Forensics, Traffic Analysis, Hidden Service, Deanonymization, Traffic Correlation
Resumo:
Relatório de estágio para obtenção do grau de Mestre em Engenharia Civil na Área de Especialização em Vias de Comunicação e Transportes
Resumo:
Most of distribution generation and smart grid research works are dedicated to the study of network operation parameters, reliability among others. However, many of this research works usually uses traditional test systems such as IEEE test systems. This work proposes a voltage magnitude study in presence of fault conditions considering the realistic specifications found in countries like Brazil. The methodology considers a hybrid method of fuzzy set and Monte Carlo simulation based on the fuzzyprobabilistic models and a remedial action algorithm which is based on optimal power flow. To illustrate the application of the proposed method, the paper includes a case study that considers a real 12 bus sub-transmission network.
Resumo:
Dissertação apresentada para a obtenção do Grau de Doutor em Informática pela Universidade Nova de Lisboa, Faculdade de Ciências e Tecnologia
Resumo:
De forma a não comprometer o conforto ou a qualidade de vida, nos dias de hoje, é obrigatório que a energia elétrica esteja presente. Sendo indispensável, torna-se necessário assegurar que a sua distribuição seja feita da forma mais qualitativa possível. Uma resposta rápida e eficaz a possíveis falhas que ocorram na rede, irá garantir a tal qualidade de serviço desejada. Para isso, a automatização dos processos é uma grande evolução e objetivo de concretização do setor elétrico. Neste contexto surge o conceito de Smart Grid, que tem como principal objetivo a combinação entre o setor elétrico e a evolução da tecnologia. A par desta característica, estes tipos de redes vêm também trazer evoluções no âmbito ambiental, pois a produção de energia elétrica é feita, maioritariamente, por fontes de energia renovável. Este projeto incide na análise das vantagens técnicas e económicas da inclusão de equipamentos que detêm capacidades de armazenamento de energia, as Baterias de Armazenamento de Energia (BAE), neste tipo de redes. Para tal, procedeu-se à utilização do método do Despacho Económico, que tem como principal objetivo a determinação dos níveis de produção de todas as unidades geradoras do sistema, satisfazendo a carga, ao mais baixo custo de produção. Com este método, foram criados vários cenários de estudo com vista a validar todo o propósito deste projeto. Nesta dissertação, é também realizado um estudo de viabilidade económica destes equipamentos de armazenamento de energia.
Resumo:
Dissertação submetida para obtenção do grau de Doutor em Saúde Pública Especialidade de Economia da Saúde
Resumo:
Dissertation submitted in partial fulfillment of the requirements for the Degree of Master of Science in Geospatial Technologies.
Resumo:
En este proyecto se presenta un estudio y una implementación sobre estrategias de selección de nodos de la red TOR. Para esto en una primera parte teorica se da a conocer todo lo que comportan las redes anónimas y su implementación en diferentes entornos. A continuación se estudian los requerimientos y la viabilidad del proyecto. Finalmente exponemos el diseño y desarrollo de los distintos algoritmos propuestos juntamente con las pruebas realizadas y las conclusiones a las que se ha llegado.
Resumo:
Networks are considered increasingly important for policy-making. The literature on new modes of governance in Europe suggests that their horizontal coordination capacity and flexible and informal structures are particularly suitable for governing the multilevel architecture of the European polity. However, empirical evidence about the effects of networks on policy-making and public policies is still quite limited. This article uses the case of the European network of energy regulators to explore the determinants of the position of network members and, in turn, the domestic adoption of soft rules developed within this network. The empirical analysis, based on multivariate statistics and semi-directive interviews, supports the expectation that institutional complementarities increase actors' centrality in networks, while arguments based on organisational resources and age are disproved. Furthermore, results show that the overall level of adoption is considerable and that centrality might have a small positive effect on domestic adoption.
Resumo:
In this paper we look at how a web-based social software can be used to make qualitative data analysis of online peer-to-peer learning experiences. Specifically, we propose to use Cohere, a web-based social sense-making tool, to observe, track, annotate and visualize discussion group activities in online courses. We define a specific methodology for data observation and structuring, and present results of the analysis of peer interactions conducted in discussion forum in a real case study of a P2PU course. Finally we discuss how network visualization and analysis can be used to gather a better understanding of the peer-to-peer learning experience. To do so, we provide preliminary insights on the social, dialogical and conceptual connections that have been generated within one online discussion group.
Resumo:
We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.
Resumo:
This paper investigates the impacts of globalization processes on the Swiss business elite community during the 1980-2010 period. Switzerland has been characterized in the 20th century by its extraordinary stability and by the strong cohesion of its elite community. To study recent changes, we focus on Switzerland's 110 largest firms' by adopting a diachronic perspective based on three elite cohorts (1980, 2000, and 2010). An analysis of interlocking directorates allows us to describe the decline of the Swiss corporate network. The second analysis focuses on top managers' profiles in terms of education, nationality as well as participation in national community networks that used to reinforce the cultural cohesion of the Swiss elite community, especially the militia army. Our results highlight a slow but profound transformation of top management profiles, characterized by a decline of traditional national elements of legitimacy and the emergence of new "global" elements. The diachronic and combined analysis brings into light the strong cultural changes experienced by the national business elite community.
Resumo:
Efficient problem solving in cellular networks is important when enhancing the network performance and liability. Analysis of calls and packet switched sessions in protocol level between the network elements is an important part of this process. They can provide very detailed information about error situations which otherwise would be difficult to recognise. In this thesis we seek solutions for monitoring GPRS/EDGE sessions in two specific interfaces simultaneously in such manner that all information important to the users will be provided in easily understandable form. This thesis focuses on Abis and AGPRS interfaces of GSM radio network and introduces a solution for managing the correlation between these interfaces by using signalling messages and common parameters as linking elements. ~: Finally this thesis presents an implementation of GPRS/EDGE session monitoring application for Abis and AGPRS interfaces and evaluates its benefits to the end users. Application is implemented as a part of Windows based 3G/GSM network analyser.
Resumo:
The main objective of this Master’s thesis is to find out which one of the two pricing models is the most cost-effective. In this thesis there are two companies that have made an outsourcing contract, in which they have a possibility to choose between two different pricing models. The first model is so called FTE (Full Time Employee) -based. The total cost will be based on the amount of outsourced person-workyears. The second pricing model is the transaction-based, in which the price will be formed according to the amount of transactions. Changing the pricing model from FTE-based to the transaction-based will also incur other costs. It is very important that these other costs are also taken into consideration, so that it is possible to determine the total costs of the pricing models. These other costs are direct costs, indirect costs and performance related costs of outsourcing. Activity based-costing (ABC) was used in order to find out the trues indirect costs of the outsourced processes. Performance related costs are related to quality, so Pareto-analysis was used to analyse the costs. Based on all of that, a framework for service related cost analysis was developed. Quality costs were almost impossible to quantify, so quality had to be taken into consideration in a qualitative way. Furthermore, considering only the indirect and direct costs in a quantitative way and quality costs in a qualitative way, it was possible to find a conditional solution for the research question.
Resumo:
The purpose of this thesis is to examine how services can be developed and how the voice of the customer can be incorporated to the strategic planning of services. Furthermore, the objective is to investigate the methods of customer need analysis and service bundling. The data is collected from secondary and primary sources by reviewing the existing academic literature and by conducting in-depth interviews and surveys. The main findings of this research indicate that the service development in personal security service industry should be conducted through a formalized process and the process should begin with setting the strategic objectives. Moreover, the voice of the customer should be incorporated into all stages of the development process, especially into the front-end of the process. Furthermore, the information on customer needs should be gathered in a manner tailored for the purposes of service development.
Resumo:
Internet of Things (IoT) technologies are developing rapidly, and therefore there exist several standards of interconnection protocols and platforms. The existence of heterogeneous protocols and platforms has become a critical challenge for IoT system developers. To mitigate this challenge, few alliances and organizations have taken the initiative to build a framework that helps to integrate application silos. Some of these frameworks focus only on a specific domain like home automation. However, the resource constraints in the large proportion of connected devices make it difficult to build an interoperable system using such frameworks. Therefore, a general purpose, lightweight interoperability framework that can be used for a range of devices is required. To tackle the heterogeneous nature, this work introduces an embedded, distributed and lightweight service bus, Lightweight IoT Service bus Architecture (LISA), which fits inside the network stack of a small real-time operating system for constrained nodes. LISA provides a uniform application programming interface for an IoT system on a range of devices with variable resource constraints. It hides platform and protocol variations underneath it, thus facilitating interoperability in IoT implementations. LISA is inspired by the Network on Terminal Architecture, a service centric open architecture by Nokia Research Center. Unlike many other interoperability frameworks, LISA is designed specifically for resource constrained nodes and it provides essential features of a service bus for easy service oriented architecture implementation. The presented architecture utilizes an intermediate computing layer, a Fog layer, between the small nodes and the cloud, thereby facilitating the federation of constrained nodes into subnetworks. As a result of a modular and distributed design, the part of LISA running in the Fog layer handles the heavy lifting to assist the lightweight portion of LISA inside the resource constrained nodes. Furthermore, LISA introduces a new networking paradigm, Node Centric Networking, to route messages across protocol boundaries to facilitate interoperability. This thesis presents a concept implementation of the architecture and creates a foundation for future extension towards a comprehensive interoperability framework for IoT.