753 resultados para security in wireless sensor networks
Resumo:
This research aimed to investigate the implications of changing agricultural land use from food production towards increased cashew cultivation for food security and poverty alleviation in Jaman North District, Brong-Ahafo Region of Ghana. Based on qualitative, participatory research with a total of 60 participants, the research found that increased cashew production had led to improvements in living standards for many farmers and their children over recent years. Global demand for cashew is projected to continue to grow rapidly in the immediate future and cashew-growing areas of Ghana are well placed to respond to this demand. Cashew farmers however were subject to price fluctuations in the value of Raw Cashew Nuts (RCN) due to unequal power relations with intermediaries and export buyer companies and global markets, in addition to other vulnerabilities that constrained the quality and quantity of cashew and food crops they could produce. The expansion of cashew plantations was leading to pressure on the remaining family lands available for food crop production, which community members feared could potentially compromise the food security of rural communities and the land inheritance of future generations.
Resumo:
Dominant paradigms of causal explanation for why and how Western liberal-democracies go to war in the post-Cold War era remain versions of the 'liberal peace' or 'democratic peace' thesis. Yet such explanations have been shown to rest upon deeply problematic epistemological and methodological assumptions. Of equal importance, however, is the failure of these dominant paradigms to account for the 'neoliberal revolution' that has gripped Western liberal-democracies since the 1970s. The transition from liberalism to neoliberalism remains neglected in analyses of the contemporary Western security constellation. Arguing that neoliberalism can be understood simultaneously through the Marxian concept of ideology and the Foucauldian concept of governmentality – that is, as a complementary set of 'ways of seeing' and 'ways of being' – the thesis goes on to analyse British security in policy and practice, considering it as an instantiation of a wider neoliberal way of war. In so doing, the thesis draws upon, but also challenges and develops, established critical discourse analytic methods, incorporating within its purview not only the textual data that is usually considered by discourse analysts, but also material practices of security. This analysis finds that contemporary British security policy is predicated on a neoliberal social ontology, morphology and morality – an ideology or 'way of seeing' – focused on the notion of a globalised 'network-market', and is aimed at rendering circulations through this network-market amenable to neoliberal techniques of government. It is further argued that security practices shaped by this ideology imperfectly and unevenly achieve the realisation of neoliberal 'ways of being' – especially modes of governing self and other or the 'conduct of conduct' – and the re-articulation of subjectivities in line with neoliberal principles of individualism, risk, responsibility and flexibility. The policy and practice of contemporary British 'security' is thus recontextualised as a component of a broader 'neoliberal way of war'.
Resumo:
Multibiometrics aims at improving biometric security in presence of spoofing attempts, but exposes a larger availability of points of attack. Standard fusion rules have been shown to be highly sensitive to spoofing attempts – even in case of a single fake instance only. This paper presents a novel spoofing-resistant fusion scheme proposing the detection and elimination of anomalous fusion input in an ensemble of evidence with liveness information. This approach aims at making multibiometric systems more resistant to presentation attacks by modeling the typical behaviour of human surveillance operators detecting anomalies as employed in many decision support systems. It is shown to improve security, while retaining the high accuracy level of standard fusion approaches on the latest Fingerprint Liveness Detection Competition (LivDet) 2013 dataset.
Resumo:
Trust is one of the most important factors that influence the successful application of network service environments, such as e-commerce, wireless sensor networks, and online social networks. Computation models associated with trust and reputation have been paid special attention in both computer societies and service science in recent years. In this paper, a dynamical computation model of reputation for B2C e-commerce is proposed. Firstly, conceptions associated with trust and reputation are introduced, and the mathematical formula of trust for B2C e-commerce is given. Then a dynamical computation model of reputation is further proposed based on the conception of trust and the relationship between trust and reputation. In the proposed model, classical varying processes of reputation of B2C e-commerce are discussed. Furthermore, the iterative trust and reputation computation models are formulated via a set of difference equations based on the closed-loop feedback mechanism. Finally, a group of numerical simulation experiments are performed to illustrate the proposed model of trust and reputation. Experimental results show that the proposed model is effective in simulating the dynamical processes of trust and reputation for B2C e-commerce.
Resumo:
By considering a network of dissipative quantum harmonic oscillators, we deduce and analyse the optimum topologies which are able to store quantum superposition states, protecting them from decoherence, for the longest period of time. The storage is made dynamically, in that the states to be protected evolve through the network before being retrieved back in the oscillator where they were prepared. The decoherence time during the dynamic storage process is computed and we demonstrate that it is proportional to the number of oscillators in the network for a particular regime of parameters.
Resumo:
Demands are one of the most uncertain parameters in a water distribution network model. A good calibration of the model demands leads to better solutions when using the model for any purpose. A demand pattern calibration methodology that uses a priori information has been developed for calibrating the behaviour of demand groups. Generally, the behaviours of demands in cities are mixed all over the network, contrary to smaller villages where demands are clearly sectorised in residential neighbourhoods, commercial zones and industrial sectors. Demand pattern calibration has a final use for leakage detection and isolation. Detecting a leakage in a pattern that covers nodes spread all over the network makes the isolation unfeasible. Besides, demands in the same zone may be more similar due to the common pressure of the area rather than for the type of contract. For this reason, the demand pattern calibration methodology is applied to a real network with synthetic non-geographic demands for calibrating geographic demand patterns. The results are compared with a previous work where the calibrated patterns were also non-geographic.
Resumo:
Sociedades pós-modernas caracterizam-se pela transição de economias baseadas em ativos tangíveis para economias de conhecimento, onde indivíduos vivenciam uma imprescindível conectividade, mas ao mesmo tempo, experimentam um enfraquecimento das estruturas sociais, que tem generado uma crescente necessidade de se criar bases cognitivas e afetivas para a vida (Rheingold, 1992; Wasko & Farah, 2005; Arvidsson, 2008). Nesse cenário se desenvolve o fenômeno das redes sociais virtuais, agregando milhões de pessoas que compartilham mensagens de texto, imagens e vídeos todos os dias (Nielsen, 2012) fazendo com que organizações privadas foquem cada vez mais seus investimentos para acompanhar as novas tendências (McWilliam, 2000; Reichheld & Schefter, 2000; Yoo, Suh & Lee, 2002; Arvidsson, 2008). Consequentemente, uma das mais importantes questões que vem ganhando importância no meio academico e entre profissionais da área é justamente: por que as pessoas compartilham conhecimento online? (Monge, Fulk, Kalman, Flanigan, Parnassa & Rumsey, 1998; Lin, 2001) Por meio de uma metodologia de estudo de caso conduzida no Brasil e na França, este estudo objetiva produzir uma relevante revisão teórica acerca do tema, trazendo novas idéias de diferentes contextos, e propondo um modelo para avaliar as principais motivações que conduzem indivíduos a compartilhar conhecimento em redes sociais virtuais. Essas razões foram estruturadas em cinco dimensões: capital estrutural, cognitivo e relacional, motivações pessoais e razões monetárias (Nahapiet & Ghoshal, 1998; Wasko & Faraj, 2005; Chiu et al, 2006). As evidências sugerem que o processo de participar e compartilhar conhecimento em redes sociais virtuais é resultado de uma complexa combinação de motivações de orientação pessoal e coletiva, que parecem variar pouco de acordo com os diferentes objetivos e contextos dessas comunidades, onde as razões financeiras parecem ser secundárias.
Resumo:
We develop a simple model of endogenous bank networks to study financial contagion and how leverage regulation may affect it. Banks maximize expected profit by choosing the optimal allocation of resources between three different classes of assets. An interbank network arise as result of loans between banks, creating a direct channel of contagion in the financial system. Contagion may occur when the realized return of the risky asset is sufficiently low to make a bank insolvent, subsequently triggering a cascade effect that propagates through default in interbank loans. Contrary to what would be expected, our results show that despite forcing banks to deleverage, increasing minimum capital requirements may lead to a system with higher aggregate levels of default.
Resumo:
This article develops a life-cycle general equilibrium model with heterogeneous agents who make choices of nondurables consumption, investment in homeowned housing and labour supply. Agents retire from an specific age and receive Social Security benefits which are dependant on average past earnings. The model is calibrated, numerically solved and is able to match stylized U.S. aggregate statistics and to generate average life-cycle profiles of its decision variables consistent with data and literature. We also conduct an exercise of complete elimination of the Social Security system and compare its results with the benchmark economy. The results enable us to emphasize the importance of endogenous labour supply and benefits for agents' consumption-smoothing behaviour.
Resumo:
The community of lawyers and their clients form a scale-free bipartite network that develops naturally as the outcome of the recommendation process through which lawyers form their client base. This process is an example of preferential attachment where lawyers with more clients are more likely to be recommended to new clients. Consumer litigation is an important market for lawyers. In large consumer societies, there always a signi cant amount of consumption disputes that escalate to court. In this paper we analyze a dataset of thousands of lawsuits, reconstructing the lawyer-client network embedded in the data. Analyzing the degree distribution of this network we noticed that it follows that of a scale-free network built by preferential attachment, but for a few lawyers with much larger client base than could be expected by preferential attachment. Incidentally, most of these also gured on a list put together by the judiciary of Lawyers which openly advertised the bene ts of consumer litigation. According to the code of ethics of their profession, lawyers should not stimulate clients into litigation, but it is not strictly illegal. From a network formation point of view, this stimulation can be seen as a separate growth mechanism than preferential attachment alone. In this paper we nd that this composite growth can be detected by a simple statistical test, as simulations show that lawyers which use both mechanisms quickly become the \Dragon-Kings" of the distribution of the number of clients per lawyer.
Resumo:
The Wireless Sensor Networks (WSN) methods applied to the lifting of oil present as an area with growing demand technical and scientific in view of the optimizations that can be carried forward with existing processes. This dissertation has as main objective to present the development of embedded systems dedicated to a wireless sensor network based on IEEE 802.15.4, which applies the ZigBee protocol, between sensors, actuators and the PLC (Programmable Logic Controller), aiming to solve the present problems in the deployment and maintenance of the physical communication of current elevation oil units based on the method Plunger-Lift. Embedded systems developed for this application will be responsible for acquiring information from sensors and control actuators of the devices present at the well, and also, using the Modbus protocol to make this network becomes transparent to the PLC responsible for controlling the production and delivery information for supervisory SISAL
Resumo:
Spiking neural networks - networks that encode information in the timing of spikes - are arising as a new approach in the artificial neural networks paradigm, emergent from cognitive science. One of these new models is the pulsed neural network with radial basis function, a network able to store information in the axonal propagation delay of neurons. Learning algorithms have been proposed to this model looking for mapping input pulses into output pulses. Recently, a new method was proposed to encode constant data into a temporal sequence of spikes, stimulating deeper studies in order to establish abilities and frontiers of this new approach. However, a well known problem of this kind of network is the high number of free parameters - more that 15 - to be properly configured or tuned in order to allow network convergence. This work presents for the first time a new learning function for this network training that allow the automatic configuration of one of the key network parameters: the synaptic weight decreasing factor.