804 resultados para Android,Peer to Peer,Wifi,Mesh Network
Resumo:
Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.
Resumo:
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent to compromise the security of an organisation’s confidential data stored at the back-end database. The database is the most valuable data source, and thus, intruders are unrelenting in constantly evolving new techniques to bypass the signature’s solutions currently provided in Web Application Firewalls (WAF) to mitigate SQLIA. There is therefore a need for an automated scalable methodology in the pre-processing of SQLIA features fit for a supervised learning model. However, obtaining a ready-made scalable dataset that is feature engineered with numerical attributes dataset items to train Artificial Neural Network (ANN) and Machine Leaning (ML) models is a known issue in applying artificial intelligence to effectively address ever evolving novel SQLIA signatures. This proposed approach applies numerical attributes encoding ontology to encode features (both legitimate web requests and SQLIA) to numerical data items as to extract scalable dataset for input to a supervised learning model in moving towards a ML SQLIA detection and prevention model. In numerical attributes encoding of features, the proposed model explores a hybrid of static and dynamic pattern matching by implementing a Non-Deterministic Finite Automaton (NFA). This combined with proxy and SQL parser Application Programming Interface (API) to intercept and parse web requests in transition to the back-end database. In developing a solution to address SQLIA, this model allows processed web requests at the proxy deemed to contain injected query string to be excluded from reaching the target back-end database. This paper is intended for evaluating the performance metrics of a dataset obtained by numerical encoding of features ontology in Microsoft Azure Machine Learning (MAML) studio using Two-Class Support Vector Machines (TCSVM) binary classifier. This methodology then forms the subject of the empirical evaluation.
Resumo:
SQL injection is a common attack method used to leverage infor-mation out of a database or to compromise a company’s network. This paper investigates four injection attacks that can be conducted against the PL/SQL engine of Oracle databases, comparing two recent releases (10g, 11g) of Oracle. The results of the experiments showed that both releases of Oracle were vulner-able to injection but that the injection technique often differed in the packages that it could be conducted in.
Resumo:
El presente artículo muestra cómo Internet se convierte en una herramienta de comunicación importante para reconfigurar la red social primaria del adulto mayor, fracturada por efecto de la migración. En la investigación que le da origien, se pudo constatar que hoy esta red se encuentra dividida en red primaria natural, conformada por los parientes y amigos con los que comparte el día a día, y red primaria virtual, integrada por los parientes migrantes. El escrito centra su interés en presentar las características de la red primaria virtual en la que el adulto mayor se vio impelido a participar para satisfacer sus necesidades comunicacionales. Esta red cumple la función de mantener, pero no de extender, su red social primaria. Los resultados dan cuenta de 4 aspectos: las competencias digitales desarrolladas por el adulto mayor, la estructura, las funciones y los atributos de vínculo de la red primaria virtual. Para ello se acudió a autores como Cabrera, Castell; Madarriaga, Abello & Sierra; Narváez A.; Soto, Navarro & Sánchez; Tovar & Villarraga. La investigación fue de tipo etnográfico, con enfoque cualitativo. Se aplicaron entrevistas semi-estructuradas. Para el tratamiento de la información se utilizó la teoría Fundamentad, de Strauss & Corbin (2002).
Resumo:
Dissertação apresentada à Escola Superior de Educação de Paula Frassinetti para obtenção do grau de Mestre em Intervenção Comunitária, especialização em Contextos de risco.
Resumo:
This thesis develops and tests various transient and steady-state computational models such as direct numerical simulation (DNS), large eddy simulation (LES), filtered unsteady Reynolds-averaged Navier-Stokes (URANS) and steady Reynolds-averaged Navier-Stokes (RANS) with and without magnetic field to investigate turbulent flows in canonical as well as in the nozzle and mold geometries of the continuous casting process. The direct numerical simulations are first performed in channel, square and 2:1 aspect rectangular ducts to investigate the effect of magnetic field on turbulent flows. The rectangular duct is a more practical geometry for continuous casting nozzle and mold and has the option of applying magnetic field either perpendicular to broader side or shorter side. This work forms the part of a graphic processing unit (GPU) based CFD code (CU-FLOW) development for magnetohydrodynamic (MHD) turbulent flows. The DNS results revealed interesting effects of the magnetic field and its orientation on primary, secondary flows (instantaneous and mean), Reynolds stresses, turbulent kinetic energy (TKE) budgets, momentum budgets and frictional losses, besides providing DNS database for two-wall bounded square and rectangular duct MHD turbulent flows. Further, the low- and high-Reynolds number RANS models (k-ε and Reynolds stress models) are developed and tested with DNS databases for channel and square duct flows with and without magnetic field. The MHD sink terms in k- and ε-equations are implemented as proposed by Kenjereš and Hanjalić using a user defined function (UDF) in FLUENT. This work revealed varying accuracies of different RANS models at different levels. This work is useful for industry to understand the accuracies of these models, including continuous casting. After realizing the accuracy and computational cost of RANS models, the steady-state k-ε model is then combined with the particle image velocimetry (PIV) and impeller probe velocity measurements in a 1/3rd scale water model to study the flow quality coming out of the well- and mountain-bottom nozzles and the effect of stopper-rod misalignment on fluid flow. The mountain-bottom nozzle was found more prone to the longtime asymmetries and higher surface velocities. The left misalignment of stopper gave higher surface velocity on the right leading to significantly large number of vortices forming behind the nozzle on the left. Later, the transient and steady-state models such as LES, filtered URANS and steady RANS models are combined with ultrasonic Doppler velocimetry (UDV) measurements in a GaInSn model of typical continuous casting process. LES-CU-LOW is the fastest and the most accurate model owing to much finer mesh and a smaller timestep. This work provided a good understanding on the performance of these models. The behavior of instantaneous flows, Reynolds stresses and proper orthogonal decomposition (POD) analysis quantified the nozzle bottom swirl and its importance on the turbulent flow in the mold. Afterwards, the aforementioned work in GaInSn model is extended with electromagnetic braking (EMBr) to help optimize a ruler-type brake and its location for the continuous casting process. The magnetic field suppressed turbulence and promoted vortical structures with their axis aligned with the magnetic field suggesting tendency towards 2-d turbulence. The stronger magnetic field at the nozzle well and around the jet region created large scale and lower frequency flow behavior by suppressing nozzle bottom swirl and its front-back alternation. Based on this work, it is advised to avoid stronger magnetic field around jet and nozzle bottom to get more stable and less defect prone flow.
Resumo:
En este trabajo se ha desarrollado un nuevo método basado en Inteligencia Artificial para resolver un problema del matriz origen-destino (O-D) aplicado al caso de una red de tráfico vehicular en la ciudad de Ambato. El método implementado, basado en algoritmos genéticos (AG), resuelve el problema de minimización asociado al problema de matriz O-D. Para validar la técnica, se ha utilizado una red vial correspondiente a la zona del Mercado Modelo en la ciudad de Ambato, que es una zona de alta congestión vehicular.
Resumo:
The trees, hedgerows and woods are current configuration of the tree network in several ecological regions of the world. In Trás–os–Montes region, Northeast of Portugal, they are a traditional component of Terra fria landscape and they could be seen in several forms: scatter trees, fencerows, small woodlots, riparian buffer strips, among others. The extensive livestock systems in this region are based on a set of circuits across the landscape. In this practice, flocks interacts with these structures using them for different functions inducing an influence on the itineraries. Our purpose will be focused on the woody features of landscape regarding their configurations, abundance and spacial distribution; in order to examine how the grazing systems depends on the currency of these formations; particularly how species flocks behaviors are related on. Depending on spatial data, The investigation attain to compare the tree network within the agriculture matrix, to the grazed territory crossed by flocks. From the other side, the importance of spatial data on interpreting the issue by suggesting different parameter that may influence the circuits. The recognition of the pressure exerciced by the occurence of the woody structures on the grazed circuits is possible. We believe that the role of these woody structures features in supporting the tradicional silvopastoral systems has been sufficiently strong for change their distribution pattern.
Resumo:
De nombreux problèmes liés aux domaines du transport, des télécommunications et de la logistique peuvent être modélisés comme des problèmes de conception de réseaux. Le problème classique consiste à transporter un flot (données, personnes, produits, etc.) sur un réseau sous un certain nombre de contraintes dans le but de satisfaire la demande, tout en minimisant les coûts. Dans ce mémoire, on se propose d'étudier le problème de conception de réseaux avec coûts fixes, capacités et un seul produit, qu'on transforme en un problème équivalent à plusieurs produits de façon à améliorer la valeur de la borne inférieure provenant de la relaxation continue du modèle. La méthode que nous présentons pour la résolution de ce problème est une méthode exacte de branch-and-price-and-cut avec une condition d'arrêt, dans laquelle nous exploitons à la fois la méthode de génération de colonnes, la méthode de génération de coupes et l'algorithme de branch-and-bound. Ces méthodes figurent parmi les techniques les plus utilisées en programmation linéaire en nombres entiers. Nous testons notre méthode sur deux groupes d'instances de tailles différentes (gran-des et très grandes), et nous la comparons avec les résultats donnés par CPLEX, un des meilleurs logiciels permettant de résoudre des problèmes d'optimisation mathématique, ainsi qu’avec une méthode de branch-and-cut. Il s'est avéré que notre méthode est prometteuse et peut donner de bons résultats, en particulier pour les instances de très grandes tailles.
Resumo:
In this thesis connections between messages on the public wall of the Russian social network Vkontakte are analysed and classified. A total of 1818 messages from three different Vkontakte groups were collected and analysed according to a new framework based on Halliday and Hasan’s (1976) research into cohesion and Simmons’s (1981) adaptation of their classification for Russian. The two categories of textuality, cohesion and coherence, describe the linguistic connections between messages. The main aim was to find out how far the traditional categories of cohesion are applicable to an online social network including written text as well as multimedia-files. In addition to linguistic cohesion the pragmatic and topic coherence between Vkontakte messages was also analysed. The analysis of pragmatic coherence classifies the messages with acts according to their pragmatic function in relation to surrounding messages. Topic coherence analyses the content of the messages, describes where a topic begins, changes or is abandoned. Linguistic cohesion, topic coherence and pragmatic coherence enable three different types of connections between messages and these together form a coherent communication on the message wall. The cohesion devices identified by Halliday and Hasan and Simmons were found to occur in these texts, but additional devices were also identified: these are multimodal, graphical and grammatical cohesion.
Resumo:
Tämän työn tavoitteena on skenaarioiden avulla luoda pitkän aikavälin alueellinen sähkökuormien kehitysennuste Rovaniemen Verkko Oy:lle. Pitkän aikavälin kuormitusennusteet ovat välttämättömiä verkon kehittämisen pohjalle, jotta verkko voidaan mitoittaa vastaamaan kuormitusta pitkälle tulevaisuuteen tekniset ja taloudelliset vaatimukset huomioiden. Kuormitusennusteen onkin jatkossa tarkoitus toimia apuvälineenä verkon strategisessa kehittämisessä. Pohjana kuormitusennusteissa on tilastokeskuksen ja Rovaniemen kaupungin väestö- ja työpaikkaennusteet. Väestöennusteiden ja erilaisten rakentamistilastoiden avulla arvioidaan uudisrakentamisen määrä tulevaisuudessa. Uudisrakentamisen kuormitusvaikutuksiin päästään työssä määritettyjen paikallisten ja rakennustyyppikohtaisten sähkön ominaiskulutuksien avulla. Kuormituksien alueellinen sijoittautuminen arvioidaan kaavoituksen ja kaupungin maankäytön toteuttamisohjelman avulla. Työssä tutkitaan myös tulevaisuudessa sähkönkäytössä tapahtuvien useiden muutosten vaikutusta alueelliseen kuormitukseen. Näitä muutoksia ovat muun muassa sähköautojen, hajautetun tuotannon, lämpöpumppujen ja kysynnän jouston lisääntyminen. Myös rakennusten jatkuvasti parantuva energiatehokkuus aiheuttaa muutoksia sähkön kulutukseen.
Resumo:
Este trabalho tem como objetivo desenvolver uma metodologia de seletividade cinética, para os pseudocomponentes do petróleo em escoamento gás-liquido em colunas de bolhas usando a Fluidodinâmica Computacional (CFD). Uma geometria cilíndrica de 2,5m de altura e 0,162m de diâmetro foi usada tanto na validação fluidodinâmica com base em dados experimentais da literatura, como na análise cinética do reator operando em dois modos distintos em relação a fase líquida: batelada e contínuo. Todos os casos de estudo operam em regime heterogêneo de escoamento, com velocidade superficial do gás igual a 8 cm/s e diâmetro médio de bolhas de 6 mm. O modelo fluidodinâmico validado apresentou boa concordância com os dados experimentais, sendo empregado como base para a implementação do modelo cinético de rede de Krishna e Saxena (1989). A análise da hidroconversão foi realizada a 371ºC, e os resultados mostraram o comportamento esperado para o processo reativo estudado, definindo-se os tempos (batelada) e posições axiais (contínuo) de coleta ideal para os pseudocomponentes leves. Em síntese, ressaltase o uso da ferramenta CFD no entendimento, desenvolvimento e otimização de processos.
Resumo:
In this paper we study the effect of two distinct discrete delays on the dynamics of a Wilson-Cowan neural network. This activity based model describes the dynamics of synaptically interacting excitatory and inhibitory neuronal populations. We discuss the interpretation of the delays in the language of neurobiology and show how they can contribute to the generation of network rhythms. First we focus on the use of linear stability theory to show how to destabilise a fixed point, leading to the onset of oscillatory behaviour. Next we show for the choice of a Heaviside nonlinearity for the firing rate that such emergent oscillations can be either synchronous or anti-synchronous depending on whether inhibition or excitation dominates the network architecture. To probe the behaviour of smooth (sigmoidal) nonlinear firing rates we use a mixture of numerical bifurcation analysis and direct simulations, and uncover parameter windows that support chaotic behaviour. Finally we comment on the role of delays in the generation of bursting oscillations, and discuss natural extensions of the work in this paper.
Resumo:
Part 20: Health and Care Networks
Resumo:
Terephthalic acid (PTA) is one of the monomers used for the synthesis of the polyester, polyethylene terephthalate (PET), that is used for the large-scale manufacture of synthetic fibers and plastic bottles. PTA is largely produced from the liquid-phase oxidation of petroleum-derived p-xylene (PX). However, there are now ongoing worldwide efforts exploring alternative routes for producing PTA from renewable, biomass resources.
In this thesis, I present a new route to PTA starting from the biomass-derived platform chemical, 5-hydroxymethylfurfural (HMF). This route utilizes new, selective Diels-Alder-dehydration reactions involving ethylene and is advantageous over the previously proposed Diels-Alder-dehydration route to PTA from HMF via 2,5-dimethylfuran (DMF) since the H2 reduction of HMF to DMF is avoided. Specifically, oxidized derivatives of HMF are reacted as is, or after etherification-esterification with methanol, with ethylene over solid Lewis acid catalysts that do not contain strong Brønsted acids in order to synthesize intermediates of PTA and its equally important diester, dimethyl terephthalate (DMT). The partially oxidized HMF, 5-(hydroxymethyl)furoic acid (HMFA) is reacted with high pressure ethylene over a pure-silica molecular sieve catalyst containing framework tin (Sn-Beta) to produce the Diels-Alder-dehydration product, 4-(hydroxymethyl)benzoic acid (HMBA), with ~30% selectivity at ~20% yield. If HMFA is protected with methanol to form methyl 5-(methoxymethyl)furan-2-carboxylate (MMFC), MMFC can react with ethylene in the presence of a pure-silica molecular sieve containing framework zirconium (Zr-Beta) to produce methyl 4-(methoxymethyl)benzenecarboxylate (MMBC) with >70% selectivity at >20% yield. HMBA and MMBC can then be oxidized to produce PTA and DMT, respectively. When Lewis acid containing mesoporous silica (MCM-41) and amorphous silica, or Brønsted acid containing zeolites (Al-Beta), are used as catalysts, a significant decrease in selectivity/yield of the Diels-Alder-dehydration product is observed.
An investigation to elucidate the reaction network and side products in the conversion of MMFC to MMBC was performed, and the main side products are found to be methyl 4-formylcyclohexa-1,3-diene-1-carboxylate and the ethylene Diels-Alder adduct of this cyclohexadiene. These products presumably form by a different dehydration pathway of the MMFC/ethylene Diels-Alder adduct and should be included when determining the overall selectivity to PTA or DMT since, like MMBC, these compounds are precursors to PTA or DMT.
Fundamental physical and chemical information on the ethylene Diels-Alder-dehydration reactions catalyzed by the Lewis acid-containing molecular sieves was obtained. Madon-Boudart experiments using Zr-Beta as catalyst show that the reaction rates are limited by chemical kinetics only (physical transport limitations are not present), all the Zr4+ centers are incorporated into the framework of the molecular sieve, and the whole molecular sieve crystal is accessible for catalysis. Apparent activation energies using Zr-Beta are low, suggesting that the overall activation energy of the system may be determined by a collection of terms and is not the true activation energy of a single chemical step.