832 resultados para operation system security mechanism


Relevância:

100.00% 100.00%

Publicador:

Resumo:

It has been remarkable among the Science Teaching debates the necessity that students do not learn only theories, laws and concepts, but also develop skills which allows them to act towards a critical citizenship. Therefore, some of the skills for the natural sciences learning must be taught consciously, intentionally and in a planned way, as component of a basic competence. Studies of the last twenty years have shown that students and teachers have plenty of difficulties about skills development and, among several, the skill of interpreting Cartesian graphics, essential for the comprehension of Natural Science. In that sense, the development of that type of professional knowledge during the initial education of future Chemistry teachers has become strategic, not only because they need to know how to use it, but also because they need to know how to teach it. This research has as its general objective the organization, development and study of a process of formation of the skill of interpreting Cartesian graphics as part of the teachers professional knowledge. It has been accomplished through a formative experience with six undergraduate students of the Teaching Degree Course of Chemistry of Universidade Federal do Rio Grande do Norte (UFRN Federal University of Rio Grande do Norte), in Brazil. In order to develop that skill, we have used as reference P. Ya. Galperin s Theory of the Stepwise Formation of Mental Actions and Concepts and its following qualitative indicators: action form, degree of generalization, degree of consciousness, degree of independence and degree of solidness. The research, in a qualitative approach, has prioritized as instruments of data collecting the registering of the activities of the undergraduate students, the observation, the questionnaire and the diagnosis tests. At the first moment, a teaching framework has been planned for the development of the skill of interpreting Cartesian graphics based on the presupposed conceptions and steps of Galperin s Theory. At the second moment, the referred framework has been applied and the process of the skill formation has been studied. The results have shown the possibility of develop the skill conscious about the invariant operation system, with a high degree of generalization and internalized the operational invariant in the mental plane. The students have attested the contributions at that type of formative experience. The research reveals the importance of going deeper about the teaching comprehension of the individualities tied to the process of internalization, according to Galperin s Theory, when the update of abilities as part of the teaching professional knowledge is the issue

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This work consists of the creation of a Specialist System which utilizes production rules to detect inadequacies in the command circuits of an operation system and commands of electric engines known as Direct Start. Jointly, three other modules are developed: one for the simulation of the commands diagram, one for the simulation of faults and another one for the correction of defects in the diagram, with the objective of making it possible to train the professionals aiming a better qualification for the operation and maintenance. The development is carried through in such a way that the structure of the task allows the extending of the system and a succeeding promotion of other bigger and more complex typical systems. The computational environment LabView is employed to enable the system

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review several trust management techniques in VANETs and argue that the ephemeral nature of VANETs render them useless in practical situations. We identify that the problem of information cascading and oversampling, which commonly arise in social networks, also adversely affects trust management schemes in VANETs. To the best of our knowledge, we are the first to introduce information cascading and oversampling to VANETs. We show that simple voting for decision making leads to oversampling and gives incorrect results in VANETs. To overcome this problem, we propose a novel voting scheme. In our scheme, each vehicle has different voting weight according to its distance from the event. The vehicle which is more closer to the event possesses higher weight. Simulations show that our proposed algorithm performs better than simple voting, increasing the correctness of voting. © 2012 Springer Science + Business Media, LLC.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pós-graduação em Engenharia Elétrica - FEIS

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pós-graduação em Filosofia - FFC

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Esse trabalho compara os algoritmos C4.5 e MLP (do inglês “Multilayer Perceptron”) aplicados a avaliação de segurança dinâmica ou (DSA, do inglês “Dynamic Security Assessment”) e em projetos de controle preventivo, com foco na estabilidade transitória de sistemas elétricos de potência (SEPs). O C4.5 é um dos algoritmos da árvore de decisão ou (DT, do inglês “Decision Tree”) e a MLP é um dos membros da família das redes neurais artificiais (RNA). Ambos os algoritmos fornecem soluções para o problema da DSA em tempo real, identificando rapidamente quando um SEP está sujeito a uma perturbação crítica (curto-circuito, por exemplo) que pode levar para a instabilidade transitória. Além disso, o conhecimento obtido de ambas as técnicas, na forma de regras, pode ser utilizado em projetos de controle preventivo para restaurar a segurança do SEP contra perturbações críticas. Baseado na formação de base de dados com exaustivas simulações no domínio do tempo, algumas perturbações críticas específicas são tomadas como exemplo para comparar os algoritmos C4.5 e MLP empregadas a DSA e ao auxílio de ações preventivas. O estudo comparativo é testado no sistema elétrico “New England”. Nos estudos de caso, a base de dados é gerada por meio do programa PSTv3 (“Power System Toolbox”). As DTs e as RNAs são treinada e testadas usando o programa Rapidminer. Os resultados obtidos demonstram que os algoritmos C4.5 e MLP são promissores nas aplicações de DSA e em projetos de controle preventivo.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pós-graduação em Serviço Social - FCHS

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Through awareness of new trends of consumption of the population with regard to housing, comfort, entertainment, security and sustainability, it was crafted a work that set out to study and develop the concept of home automation and how it will revolutionize the electrical installation projects and energy savings. A pre-wiring project, taking into account, basically, the installed load, is presented as a basis for comparison. The protocols for communication between intelligent devices in an automation environment, used in the work, are the X-10, LonWorks and UPnP. The home network is studied and divided into subsystems, for a better understanding, which are the lighting, audio, video and multimedia system, security, air conditioning and central vacuum system, and the idea of integrated design and system integrator is introduced, showing the change necessity in the design philosophy of electrical installations. The main means of energy savings in an automated home, such as dimerization, master off and smart meters are presented and, finally, it was concluded that there is a need to structure electrical installation projects more comprehensive with regard to home automation, in order to become more efficient and useful to users

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The modernization of the world made the speed, accuracy and reliability of all existing processes become increasingly necessary. For this evolution to occur every day, the evolution of the equipment was strategic, but not as much as needed. It is necessary for such equipment to ensure its function and, in case of failure, an early diagnosis to prevent loss. Therefore the evolution of maintainability and reliability in equipment is also paramount. Thus, the growth of forms of maintenance was driven by this scenario, forming maintenance philosophies. Among many, there is the RCM, which have its focus on the identification, parameters development and performance preview. One of those methodologies from this idea is the FMEA, process that has been studied and implemented this work, aiming the anticipation of failure modes and guidance for the use of a heat exchanger and a pump. This implementation has the aid of another process of RCM, the PHA, which was also shown and implemented, these results being used to start the FMEA process. The results show the activities with the highest chance of failure, presenting also the measures to be taken to avoid or minimize them. It is shown, in this paper, concern with the valves because they maintain control and system security, and its flaws related to accidents with possible danger to people and the whole system, emphasizing the priority of action

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The modernization of the world made the speed, accuracy and reliability of all existing processes become increasingly necessary. For this evolution to occur every day, the evolution of the equipment was strategic, but not as much as needed. It is necessary for such equipment to ensure its function and, in case of failure, an early diagnosis to prevent loss. Therefore the evolution of maintainability and reliability in equipment is also paramount. Thus, the growth of forms of maintenance was driven by this scenario, forming maintenance philosophies. Among many, there is the RCM, which have its focus on the identification, parameters development and performance preview. One of those methodologies from this idea is the FMEA, process that has been studied and implemented this work, aiming the anticipation of failure modes and guidance for the use of a heat exchanger and a pump. This implementation has the aid of another process of RCM, the PHA, which was also shown and implemented, these results being used to start the FMEA process. The results show the activities with the highest chance of failure, presenting also the measures to be taken to avoid or minimize them. It is shown, in this paper, concern with the valves because they maintain control and system security, and its flaws related to accidents with possible danger to people and the whole system, emphasizing the priority of action

Relevância:

100.00% 100.00%

Publicador:

Resumo:

2-Cys peroxiredoxin (Prx) enzymes are ubiquitously distributed peroxidases that make use of a peroxidatic cysteine (Cys(P)) to decompose hydroperoxides. A disulfide bond is generated as a consequence of the partial unfolding of the alpha-helix that contains Cys(P). Therefore, during its catalytic cycle, 2-Cys Prx alternates between two states, locally unfolded and fully folded. Tsa1 (thiol-specific antioxidant protein 1 from yeast) is by far the most abundant Cys-based peroxidase in Saccharomyces cerevisiae. In this work, we present the crystallographic structure at 2.8 angstrom resolution of Tsa1(C47S) in the decameric form [(alpha(2))(5)] with a DTT molecule bound to the active site, representing one of the few available reports of a 2-Cys Prx (AhpC-Prx1 subfamily) (AhpC, alkyl hydroperoxide reductase subunit C) structure that incorporates a ligand. The analysis of the Tsa1(C47S) structure indicated that G1u50 and Arg146 participate in the stabilization of the Cys(P) alpha-helix. As a consequence, we raised the hypothesis that G1u50 and Arg146 might be relevant to the Cys(P) reactivity. Therefore, Tsa1(E50A) and Tsa1(R146Q) mutants were generated and were still able to decompose hydrogen peroxide, presenting a second-order rate constant in the range of 10(6) M-1 S-1. Remarkably, although Tsa1(E50A) and Tsa1(R146Q) were efficiently reduced by the low-molecular-weight reductant DTT, these mutants displayed only marginal thioredoxin (Trx)-dependent peroxidase activity, indicating that G1u50 and Arg146 are important for the Tsa1-Trx interaction. These results may impact the comprehension of downstream events of signaling pathways that are triggered by the oxidation of critical Cys residues, such as Trx. (C) 2012 Elsevier Ltd. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The dopamine receptor antagonist metoclopramide (paspertin, primpéran, gastrosil, meclopran, gastro-timelets), used as monotherapy or in combination with an inhibitor of the cyclooxygenase enzyme, affords good results in orthostatic hypotension due to insufficiency of the sympathetic nervous system. The mechanism of action in these cases is unclear but is assumed to be elevation of vascular tone in the splanchnic vessels. A case is discussed which documents the effectiveness of metoclopramide therapy in orthostatic hypotension, even in absence of signs of autonomic dysfunction.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En los últimos años, la seguridad en redes y servicios ha evolucionado de manera exponencial debido al crecimiento de dispositivos conectados a Internet. Con el avance de las nuevas tecnologías es imprescindible dotar a cualquier servicio o dispositivo de la seguridad adecuada dado que éstos se pueden ver afectados por diversas amenazas tales como la accesibilidad, la integridad, la identidad del usuario, la disponibilidad y la confidencialidad de los datos. Cuando se trata de comunicaciones, la seguridad cobra especial importancia dado que los datos enviados a través de la red pueden ser interceptados por un agente no autorizado y utilizarlos para su propio beneficio o alterar su contenido. Para contrarrestar estos ataques, se han definido unos servicios de seguridad como son, por ejemplo, la confidencialidad y la integridad de los datos. Existen diversos mecanismos de seguridad que implementan estos servicios los cuales se apoyan en técnicas criptográficas. Desde el comienzo de las primeras comunicaciones se han desarrollado diferentes técnicas criptográficas que han ido evolucionando a la vez que éstas. La primera de estas técnicas conocida fue escítala lacedemonia en el siglo V a.C. Los éforos espartanos, que eran los que utilizaban dicha técnica, escribían el mensaje en una cinta de cuero o papiro enrollada en una vara de grosor variable. A continuación desenrollaban la cinta y la enviaban al receptor. Sí el mensaje era interceptado solo podrían leer una pila de letras sin sentido. Sí el mensaje llegaba al receptor, éste enrollaría de nuevo la cinta en una vara del mismo grosor que lo hizo el emisor y leería el mensaje. En este proyecto de fin de grado se va a realizar un estudio del estado de arte sobre mecanismos de seguridad para posteriormente diseñar e implementar un componente de seguridad que ofrecerá los servicios citados. Dicho componente se integrará en el sistema del proyecto Europeo I3RES como un servicio más de los definidos dentro del propio proyecto. Los servicios de seguridad que requiere el proyecto I3RES, y por tanto los que ofrecerá el componente, son los de autenticación, integridad, no repudio y confidencialidad. El proyecto I3RES basa su sistema en una arquitectura distribuida por lo que es necesario realizar un estudio del estado del arte sobre dichas arquitecturas para el correcto despliegue del componente en el sistema. Actualmente, la mayoría de los sistemas mantienen una arquitectura distribuida. Este tipo de arquitectura conecta distintos equipos y dispositivos que están separados físicamente mediante una red llamada middleware. Estos equipos trabajan conjuntamente para implementar un conjunto de servicios. En el documento presente se tratan todos los temas anteriormente citados y se detalla el componente a desarrollar así como las correspondientes pruebas de validación y las conclusiones obtenidas. ABSTRACT. Security in networks and services have been extensively developed in last decades due to the arising of multiple devices connected to Internet. Advances in new technologies enhanced the necessity of security requirements to in order to avoid several warnings such as accessibility, integrity, user identity, availability, and confidentiality of our data. In terms of communications, security is crucial due to data could be intercepted on Internet by non-authorised agents which could use them or even alter their content. In order to avoid this warnings, security services have been defined such as data confidentiality and integrity. There is several security mechanism which implement this services based on cryptographic techniques. In parallel to the evolution of communication, cryptographic technics have been also developed with. The most ancient of technics was described in s. V b.C called escitala lacedemonia. Spartan ephorts, which extensively used this method, were used to write messages on the surface of a leather tape or papyri which were rolled on a rod. Next, they unrolled the tape and they sent to the receptor. Whether the message was intercepted they just would be able to read a mess of letters without sense. On the other hand, if the message arrive to the proper receptor, he roll the tape again in a rod with similar anchor of the transmitter one which leads to the adequate read. This Degree Project is focused on an analysis of the state of art about security mechanism together with a design and implement of a security component which offered the services mentioned. This component will be integrated within the European project I3RES as one of the security elements defined inside the project. The security components required in project I3REs are authentication, integrity and non-repudiation will be offered by the designed component as well. Nowadays, the most of the systems maintain a distributed architecture. This type of architecture connect several devices which are physically separated by a network called middleware. This equipment work altogether to implement a set of services. This document is focused on all the topics mentioned as well as the details of the component developed together with the validation tests required and the conclusions obtained.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the early events in physiological shock is the generation of activators for leukocytes, endothelial cells, and other cells in the cardiovascular system. The mechanism by which these activators are produced has remained unresolved. We examine here the hypothesis that pancreatic digestive enzymes in the ischemic intestine may be involved in the generation of activators during intestinal ischemia. The lumen of the small intestine of rats was continuously perfused with saline containing a broadly acting pancreatic enzyme inhibitor (6-amidino-2-naphthyl p-guanidinobenzoate dimethanesulfate, 0.37 mM) before and during ischemia of the small intestine by splanchnic artery occlusion. This procedure inhibited activation of circulating leukocytes during occlusion and reperfusion. It also prevented the appearance of activators in portal venous and systemic artery plasma and attenuated initiating symptoms of multiple organ injury in shock. Intestinal tissue produces only low levels of activators in the absence of pancreatic enzymes, whereas in the presence of enzymes, activators are produced in a concentration- and time-dependent fashion. The results indicate that pancreatic digestive enzymes in the ischemic intestine serve as an important source for cell activation and inflammation, as well as multiple organ failure.