963 resultados para networks attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this study was to predict by means of Artificial Neural Network (ANN), multilayer perceptrons, the texture attributes of light cheesecurds perceived by trained judges based on instrumental texture measurements. Inputs to the network were the instrumental texture measurements of light cheesecurd (imitative and fundamental parameters). Output variables were the sensory attributes consistency and spreadability. Nine light cheesecurd formulations composed of different combinations of fat and water were evaluated. The measurements obtained by the instrumental and sensory analyses of these formulations constituted the data set used for training and validation of the network. Network training was performed using a back-propagation algorithm. The network architecture selected was composed of 8-3-9-2 neurons in its layers, which quickly and accurately predicted the sensory texture attributes studied, showing a high correlation between the predicted and experimental values for the validation data set and excellent generalization ability, with a validation RMSE of 0.0506.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent developments in power electronics technology have made it possible to develop competitive and reliable low-voltage DC (LVDC) distribution networks. Further, islanded microgrids—isolated small-scale localized distribution networks— have been proposed to reliably supply power using distributed generations. However, islanded operations face many issues such as power quality, voltage regulation, network stability, and protection. In this thesis, an energy management system (EMS) that ensures efficient energy and power balancing and voltage regulation has been proposed for an LVDC island network utilizing solar panels for electricity production and lead-acid batteries for energy storage. The EMS uses the master/slave method with robust communication infrastructure to control the production, storage, and loads. The logical basis for the EMS operations has been established by proposing functionalities of the network components as well as by defining appropriate operation modes that encompass all situations. During loss-of-powersupply periods, load prioritizations and disconnections are employed to maintain the power supply to at least some loads. The proposed EMS ensures optimal energy balance in the network. A sizing method based on discrete-event simulations has also been proposed to obtain reliable capacities of the photovoltaic array and battery. In addition, an algorithm to determine the number of hours of electric power supply that can be guaranteed to the customers at any given location has been developed. The successful performances of all the proposed algorithms have been demonstrated by simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tutkielma käsittelee Yhdysvaltain CIAn miehittämättömiä lennokki-iskuja Pakistanissa kansainvälisen humanitaarisen oikeuden suhteellisuusperiaatteen näkökulmasta. Suhteellisuusperiaatteen mukaan aseellisista iskuista saatavan sotilaallisen hyödyn tulee olla suhteellinen verrattuna siviileille aiheutuvaan haittaan. CIAn iskuja Pakistanissa on kritisoitu, että ne eivät täytä suhteellisuusperiaatteen asettamia vaatimuksia. Tutkielmassa perehdytään ensinnäkin selvittämään ne velvollisuudet, jotka suhteellisuusperiaate asettaa hyökkääjille. Sen jälkeen CIAn lennokki-iskuja tutkitaan näiden velvollisuuksien valossa. Tutkielmassa pyritään selvittämään antaako suhteellisuusperiaatteen luomat oikeudelliset velvollisuudet riittävää suojaa Pakistanin siviileille lennokki-iskujen tuhoja vastaan. Lisäksi pyritään selvittämään, onko lennokki-iskuissa viitteitä suhteellisuusperiaatteen vastaisista iskuista. Tutkimusmenetelmänä käytetään positivistista lainopin metodia, jonka avulla selvitetään voimassa olevaa kansainvälisen humanitaarisen tapaoikeuden suhteellisuusperiaatteen sisältöä. Oikeudellisina lähteinä käytetään pääasiassa humanitaarista tapaoikeutta, mutta tulkinnallisena apuna myös kansainvälisiä sopimuksia sekä oikeuden päätöksiä. Lisäksi oikeudellinen kirjallisuus on tutkimuksessa tärkeässä asemassa. Tutkimuksessa päädytään siihen, että suhteellisuusperiaatteen asettamat velvollisuudet hyökkääjälle ovat niin epämääräiset, että ne eivät anna riittävää suojaa siviileille. Ensinnäkin hyökkääjä voi määrittää sotilaallisen hyödyn omien päämääriensä mukaisesti suhteellisuusanalyysissä. Lisäksi kynnys sille, mikä katsotaan suhteellisuusperiaatteen vastaisuudeksi on hyvin epämääräinen ja korkea. Tämän vuoksi varotoimenpiteet iskujen suunnittelussa ovat hyvin tärkeässä asemassa myös suhteellisuusanalyysissä. Kuitenkin jos hyökkääjä edes jossain määrin osoittaa, että on tehnyt iskut hyvässä uskossa niiden laillisuudesta, iskujen katsotaan yleensä olevan suhteellisuusperiaatteen mukaisia. CIAn lennokki-iskuissa Pakistanissa on viitteitä suhteellisuusperiaatteen vastaisuudesta erityisesti ”tunnusmerkki-iskujen” osalta. ”Tunnusmerkki-iskut” johtavat yleensä vain vähäiseen sotilaalliseen hyötyyn aiheuttaen silti siviiliuhreja. Lisäksi erityisesti tunnusmerkki-iskuissa edellytetään korkeampaa tarkkuutta varotoimenpiteissä. Kuitenkin useat siviiliuhrit voivat merkitä sitä, että näitä varotoimenpiteitä ei ole noudatettu iskuissa.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Langattomat lähiverkot ovat yleistyneet ja monin paikoin niillä pyritään täysin korvaamaan perinteiset kaapeloidut verkot. Samalla verkoissa välitettävät palvelut monipuolistuvat. Etenkin interaktiivisten sisältöjen ja viiveriippuvaisten palvelujen välittämisessä korostuvat verkolle asettavat vaatimukset suorituskyvystä ja palveluntasosta. Radiotaajuuksilla tapahtuva tiedonsiirto on ongelmallista siirtomedian jaetun luonteen vuoksi. Käytettäessä ympärisäteileviä antenneja jokainen kantomatkan päässä oleva asema kuulee lähetyksen, vaikkei se olisi sille suunnattu. Tämä luo turvallisuusongelman, mutta lisäksi heikentää tehokkuutta, koska nykyisellä antenniteknologialla vain yksi asema kerrallaan voi lähettää häiriöttä kantoalueellaan. Täsmälähetykset yhden lähteen ja useiden kohteiden välillä luovat erillisiä siirtolinkkejä. Olisi luontevampaa luoda yksi lähetysvirta, johon useat vastaanottajat voivat kytkeytyä. Kaistan säästön vastapainona on tarve luoda ja ylläpitää näitä yhteyksiä. Käyttäjien liikkuvuuden ja siirtotien vaihtelevien ominaisuuksien vuoksi langattoman verkon rakenne ja rajat ovat epäselviä. Näihin haasteisiin on vastattava sekä protokolla- että sovellustasolla. Tässä tutkielmassa käydään ensin läpi IEEE 802.11 -standardin mukaisen langattoman verkon perusteet ja sen ominaisuuksiin liittyvät tyypilliset ongelmakohdat. Yleis- ja ryhmälähetyksiä tarkastellaan ensin perinteisessä IEEE 802.3 standardin mukaisessa langallisessa lähiverkossa ja selvitetään, miten vastaavat ominaisuudet toteutuvat IEEE 802.11 standardien mukaisissa langattomissa verkoissa. Käyttötapaustutkimuksissa keskitytään rajatussa ympäristössä tapahtuviin ryhmälähetyksiin. Erityisesti tutkitaan langattomien ryhmälähetysten käyttökelpoisuutta sekä langattoman ympäristön asettamia erityisvaatimuksia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is the Logistics Development Forum's assignment and the work dealing with the development of the Port of Helsinki as part of Helsinki hub. The Forum aims to develop logistics efficiency through public-private co-operation and development of the port is clearly dependent on both factors. Freight volumes in the Port of Helsinki are the biggest single factor in hub and, therefore, the role of the port of the entire hub development is strong. The aim is to look at how the port will develop as a result of changes in the foreign trade of Finland and the Northern European logistics trends in 25 years time period. Work includes the current state analysis and scenario work. The analyses are intended to find out, which trends are the most important in the port volume development. The change and effect of trends is examined through scenarios based on current state. Based on the work, the structure of Finnish export industry and international demand are in the key role in the port volume development. There is significant difference between demands of Finnish exporting products in different export markets and the development between the markets has different impacts on the port volumes by mass and cargo type. On the other hand, the Finnish economy is stuck in a prolonged recession and competition between ports has become a significant factor in the individual port's volume development. Ecological valuesand regulations have changed the competitive landscape and maritime transport emissions reductions has become an important competitive factor for short routes in the Baltic Sea, such as in the link between Helsinki and Tallinn.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internetin yhteisöpalveluiden käyttäjien avoimuus ja sosiaalisuus altistavat heidät monenlaisille riskeille. “Social engineering” eli käyttäjien manipulointi on uhka, joka liittyy informaation hankkimiseen perinteisen kanssakäymisen kautta, mutta yhä enenevissä määrin myös internetissä. Kun kanssakäyminen tapahtuu internetin välityksellä, käyttäjien manipuloijat hyödyntävät yhteisöpalveluita yhteydenpitoon uhrien kanssa sekä paljon käyttäjäinformaatiota sisältävänä alustana. Tämän tutkielman tarkoitus on löytää internetin yhteisöpalveluiden ja käyttäjien manipuloinnin välinen yhteys. Tämä päämäärä saavutettiin etsimällä vastauksia kysymyksiin kuten: Mitkä ovat tyypilliset hyökkäystyypit? Miksi informaatiolla on niin suuri rooli? Mitä seurauksia ilmiöllä on ja miten hyökkäyksiltä on mahdollista suojautua? Vastaukset kysymyksiin löydettiin toteuttamalla systemaattinen kirjallisuuskatsaus. Katsaus muodostui yhdistämällä tärkeimmät löydökset 60 tarkoin valitusta ilmiötä käsittelevästä artikkelista. Käyttäjien manipuloinnin huomattiin olevan hyvin laaja ja monimutkainen ilmiö internetin yhteisöpalveluissa. Huomattiin, että manipulointia ilmenee sivustoilla useissa erilaisissa muodoissa, joita ovat muun muassa tietojen kalastelu, profiilien yhdistäminen, sosiaaliset sovellukset, roskaposti, haitalliset linkit, identiteettivarkaudet, tietovuodot ja erilaiset huijaukset, jotka hyödyntävät sekä ihmisluonnon että sivustojen perusominaisuuksia. Haavoittuvuus ja luottamus havaittiin myös tärkeiksi aspekteiksi, sillä ne yhdistävät informaation merkityksen ja ihmisluonnon, jotka molemmat ovat avaintekijöitä sekä manipuloinnissa että yhteisöpalvelusivustoilla. Vaikka ilmiön seurausten huomattiin olevan negatiivisia niin käyttäjien olemukselle internetissä kuin todellisessakin elämässä, havaittiin myös, että ilmiön ymmärtäminen ja tunnistaminen helpottaa siltä suojautumista

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasingly growing share of distributed generation in the whole electrical power system’s generating system is currently a worldwide tendency, driven by several factors, encircling mainly difficulties in refinement of megalopolises’ distribution networks and its maintenance; widening environmental concerns adding to both energy efficiency approaches and installation of renewable sources based generation, inherently distributed; increased power quality and reliability needs; progress in IT field, making implementable harmonization of needs and interests of different-energy-type generators and consumers. At this stage, the volume, formed by system-interconnected distributed generation facilities, have reached the level of causing broad impact toward system operation under emergency and post-emergency conditions in several EU countries, thus previously implementable approach of their preliminary tripping in case of a fault, preventing generating equipment damage and disoperation of relay protection and automation, is not applicable any more. Adding to the preceding, withstand capability and transient electromechanical stability of generating technologies, interconnecting in proximity of load nodes, enhanced significantly since the moment Low Voltage Ride-Through regulations, followed by techniques, were introduced in Grid Codes. Both aspects leads to relay protection and auto-reclosing operation in presence of distributed generation generally connected after grid planning and construction phases. This paper proposes solutions to the emerging need to ensure correct operation of the equipment in question with least possible grid refinements, distinctively for every type of distributed generation technology achieved its technical maturity to date and network’s protection. New generating technologies are equivalented from the perspective of representation in calculation of initial steady-state short-circuit current used to dimension current-sensing relay protection, and widely adopted short-circuit calculation practices, as IEC 60909 and VDE 0102. The phenomenon of unintentional islanding, influencing auto-reclosing, is addressed, and protection schemes used to eliminate an sustained island are listed and characterized by reliability and implementation related factors, whereas also forming a crucial aspect of realization of the proposed protection operation relieving measures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this bachelor’s thesis are examined the benefits of current distortion detection device application in customer premises low voltage networks. The purpose of this study was to find out if there are benefits for measuring current distortion in low-voltage residential networks. Concluding into who can benefit from measuring the power quality. The research focuses on benefits based on the standardization in Europe and United States of America. In this research, were also given examples of appliances in which current distortion detection device could be used. Along with possible illustration of user interface for the device. The research was conducted as an analysis of the benefits of current distortion detection device in residential low voltage networks. The research was based on literature review. The study was divided to three sections. The first explain the reasons for benefitting from usage of the device and the second portrays the low-cost device, which could detect one-phase current distortion, in theory. The last section discuss of the benefits of usage of current distortion detection device while focusing on the beneficiaries. Based on the result of this research, there are benefits from usage to the current distortion detection device. The main benefitting party of the current distortion detection device was found to be manufactures, as they are held responsible of limiting the current distortion on behalf of consumers. Manufactures could adjust equipment to respond better to the distortion by having access to on-going current distortion in network. The other benefitting party are system operators, who would better locate distortion issues in low-voltage residential network to start prevention of long-term problems caused by current distortion early on.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Convolutional Neural Networks (CNN) have become the state-of-the-art methods on many large scale visual recognition tasks. For a lot of practical applications, CNN architectures have a restrictive requirement: A huge amount of labeled data are needed for training. The idea of generative pretraining is to obtain initial weights of the network by training the network in a completely unsupervised way and then fine-tune the weights for the task at hand using supervised learning. In this thesis, a general introduction to Deep Neural Networks and algorithms are given and these methods are applied to classification tasks of handwritten digits and natural images for developing unsupervised feature learning. The goal of this thesis is to find out if the effect of pretraining is damped by recent practical advances in optimization and regularization of CNN. The experimental results show that pretraining is still a substantial regularizer, however, not a necessary step in training Convolutional Neural Networks with rectified activations. On handwritten digits, the proposed pretraining model achieved a classification accuracy comparable to the state-of-the-art methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The thesis explores the role of diaspora network in opportunity exploitation by ethnic entrepreneurs in Finland. The purpose of this study is to how ethnic entrepreneurs in Finland can exploit diaspora networks and how significant support of these networks in comparison with governmental and other official institutional support. Increased mobility of the global population and number of immigrants all around the world contribute into interest of academics to this topic. At the same time, in comparison with other European countries for Finland this phenomenon is new. However, increasing number of immigrants add to academic interest to this topic. The theoretical background of this thesis consists of the collection of studies done on diaspora networks and ethnic entrepreneurs as internationally as in Finland. The concept of cooperation between diaspora and ethnic entrepreneurs describes how diaspora can support ethnic entrepreneur and emphasize importance of diaspora ties for business. At the end of the theoretical section theoretical a special grid was proposed as summary of the academic literature review. The empirical research for this study is based on the interviews with five ethnic entrepreneurs in Finland. Empirical data was analyzed and compared with the similar studies done internationally. During the interviews analyses were stressed aspects of the significance of governmental and other official institutional support. During the interviews analyses were stressed aspects of the significance of the governmental and other official institutional support. According to the main findings diaspora can play positive and in some cases crucial role in the business of ethnic entrepreneurs in Finland. Moreover, diaspora can be a facilitator of internationalization of ethnic entrepreneurs. At the same time, there are several factors which might increase or decrease role of diaspora. The ways of the utilization of diaspora network were combined in the empirical grid. The study enhance understanding of the challenges of ethnic entrepreneurs and provides certain recommendations for the policy makers, ethnic entrepreneurs and managers of official institutions involved in cooperation with ethnic entrepreneurs

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of current master thesis research is to investigate the role of social networks in internationalization of Russian and Finnish firms. Literature review of existing empirical researches on the topic is conducted in order to identify the gap, which is fulfilled by empirical research of 4 Russian and 1 Finnish firm that have established international operations no later than 8 years since their foundation. In-depth semi-structured interviews have shown that business network has been an influencing factor in firms’ internationalization and that even if social network is not the driver of internationalization, it becomes important when a company has established international presence and is working on its enlargement. The study has both theoretical and practical contribution by contributing to research of Russian and Finnish firms’ internationalization and by showing examples of successful foreign market entry of companies from different industries. General practical implication of current thesis is that it shows the efficient ways of entrepreneurs’ social network usage in business development in international scope.