927 resultados para security network
Resumo:
Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud. However, addressing security concerns has been seen as the biggest challenge to the adoption of IT services in the cloud. This study set up a cloud system via VMware suite to emulate hosting unified communications (UC), the integration of two or more real time communication systems, services in the cloud in a laboratory environment. An Internet Protocol Security (IPSec) gateway was also set up to support network-level security for UCaaS against possible security exposures. This study was aimed at analysis of an implementation of UCaaS over IPSec and evaluation of the latency of encrypted UC traffic while protecting that traffic. Our test results show no latency while IPSec is implemented with a G.711 audio codec. However, the performance of the G.722 audio codec with an IPSec implementation affects the overall performance of the UC server. These results give technical advice and guidance to those involved in security controls in UC security on premises as well as in the cloud.
Resumo:
The safety and performance of bridges could be monitored and evaluated by Structural Health Monitoring (SHM) systems. These systems try to identify and locate the damages in a structure and estimate their severities. Current SHM systems are applied to a single bridge, and they have not been used to monitor the structural condition of a network of bridges. This paper propose a new method which will be used in Synthetic Rating Procedures (SRP) developed by the authors of this paper and utilizes SHM systems for monitoring and evaluating the condition of a network of bridges. Synthetic rating procedures are used to assess the condition of a network of bridges and identify their ratings. As an additional part of the SRP, the method proposed in this paper can continuously monitor the behaviour of a network of bridges and therefore it can assist to prevent the sudden collapses of bridges or the disruptions to their serviceability. The method could be an important part of a bridge management system (BMS) for managers and engineers who work on condition assessment of a network of bridges.
Resumo:
This contribution is a long-term study of the evolving use of the organization-wide groupware in a service network. We are describing the practices related to organization-wide groupware in conjunction with local groupware-related practices and how they have proceeded since the organization was established. In the discussion of these practices we are focussing on issues such as: 1. tendencies for proliferation and integration, 2. local appropriations of a variety of systems, 3. creative appropriations, including the creation of a unique heterogeneous groupware fabric, 4. the design strategy of multiple parallel experimental use an; 5. the relation between disparate local meanings and successful computer supported cooperative practice. As an overarching theme we are exploring the explanatory value of the concepts of objectification and appropriation as compared to the concepts of design vs. use.
Resumo:
Sensor networks for environmental monitoring present enormous benefits to the community and society as a whole. Currently there is a need for low cost, compact, solar powered sensors suitable for deployment in rural areas. The purpose of this research is to develop both a ground based wireless sensor network and data collection using unmanned aerial vehicles. The ground based sensor system is capable of measuring environmental data such as temperature or air quality using cost effective low power sensors. The sensor will be configured such that its data is stored on an ATMega16 microcontroller which will have the capability of communicating with a UAV flying overhead using UAV communication protocols. The data is then either sent to the ground in real time or stored on the UAV using a microcontroller until it lands or is close enough to enable the transmission of data to the ground station.
Resumo:
This technical report describes a Light Detection and Ranging (LiDAR) augmented optimal path planning at low level flight methodology for remote sensing and sampling Unmanned Aerial Vehicles (UAV). The UAV is used to perform remote air sampling and data acquisition from a network of sensors on the ground. The data that contains information on the terrain is in the form of a 3D point clouds maps is processed by the algorithms to find an optimal path. The results show that the method and algorithm are able to use the LiDAR data to avoid obstacles when planning a path from a start to a target point. The report compares the performance of the method as the resolution of the LIDAR map is increased and when a Digital Elevation Model (DEM) is included. From a practical point of view, the optimal path plan is loaded and works seemingly with the UAV ground station and also shows the UAV ground station software augmented with more accurate LIDAR data.
Resumo:
The rights of individuals to self-determination and participation in social, political and economic life are recognised and supported by Articles 1, 3 and 25 of the International Covenant on Civil and Political Rights 1966.4 Article 1 of the United Nations’ Human Rights Council’s Resolution on the Promotion and Protection of Human Rights on the Internet of July 2012 confirms individuals have the same rights online as offline. Access to the internet is essential and as such the UN: Calls upon all States to promote and facilitate access to the Internet and international cooperation aimed at the development of media and information and communications facilities in all countries (Article 3) Accordingly, access to the internet per se is a fundamental human right, which requires direct State recognition and support.5 The obligations of the State to ensure its citizens are able, and are enabled, to access the internet, are not matters that should be delegated to commercial parties. Quite simply – access to the internet, and high-speed broadband, by whatever means are “essential services” and therefore “should be treated as any other utility service”...
Resumo:
In this paper, we propose a new load distribution strategy called `send-and-receive' for scheduling divisible loads, in a linear network of processors with communication delay. This strategy is designed to optimally utilize the network resources and thereby minimizes the processing time of entire processing load. A closed-form expression for optimal size of load fractions and processing time are derived when the processing load originates at processor located in boundary and interior of the network. A condition on processor and link speed is also derived to ensure that the processors are continuously engaged in load distributions. This paper also presents a parallel implementation of `digital watermarking problem' on a personal computer-based Pentium Linear Network (PLN) topology. Experiments are carried out to study the performance of the proposed strategy and results are compared with other strategies found in literature.
Resumo:
On the basis of a more realistic tetrakaidecahedral structure of foam bubbles, a network model of static foam drainage has been developed. The model considers the foam to be made up of films and Plateau borders. The films drain into the adjacent Plateau borders, which in turn form a network through which the liquid moves from the foam to the liquid pool. From the structure, a unit flow cell was found, which constitutes the foam when stacked together both horizontally and vertically. Symmetry in the unit flow cell indicates that the flow analysis of a part of it can be employed to obtain the drainage for the whole foam. Material balance equations have been written for each segment of this subsection, ensuring connectivity, and solved with the appropriate boundary and initial conditions. The calculated rates of drainage, when compared with the available experimental results, indicate that the model predicts the experimental results well.
Resumo:
In this paper, we present an improved load distribution strategy, for arbitrarily divisible processing loads, to minimize the processing time in a distributed linear network of communicating processors by an efficient utilization of their front-ends. Closed-form solutions are derived, with the processing load originating at the boundary and at the interior of the network, under some important conditions on the arrangement of processors and links in the network. Asymptotic analysis is carried out to explore the ultimate performance limits of such networks. Two important theorems are stated regarding the optimal load sequence and the optimal load origination point. Comparative study of this new strategy with an earlier strategy is also presented.
Resumo:
In this paper, a new high precision focused word sense disambiguation (WSD) approach is proposed, which not only attempts to identify the proper sense for a word but also provides the probabilistic evaluation for the identification confidence at the same time. A novel Instance Knowledge Network (IKN) is built to generate and maintain semantic knowledge at the word, type synonym set and instance levels. Related algorithms based on graph matching are developed to train IKN with probabilistic knowledge and to use IKN for probabilistic word sense disambiguation. Based on the Senseval-3 all-words task, we run extensive experiments to show the performance enhancements in different precision ranges and the rationality of probabilistic based automatic confidence evaluation of disambiguation. We combine our WSD algorithm with five best WSD algorithms in senseval-3 all words tasks. The results show that the combined algorithms all outperform the corresponding algorithms.
Resumo:
Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.
Resumo:
This research improved the measurement of public transport accessibility by capturing; travellers' behaviour; diversity of public transport mode; and the subjectivity of travellers' decision in the complex transport networks. The results of this research not only highlighted the importance of considering public transport network characteristics but also, revealed the impact of public transport diversity in the modelling of public transport accessibility. The research developed a hybrid discrete choice model with a nested logit structure to treat the correlation among the public transport mode choices and, a logit correction factor to rectify the correlation among the stop choices.
Resumo:
We analyse the fault-tolerant parameters and topological properties of a hierarchical network of hypercubes. We take a close look at the Extended Hypercube (EH) and the Hyperweave (HW) architectures and also compare them with other popular architectures. These two architectures have low diameter and constant degree of connectivity making it possible to expand these networks without affecting the existing configuration. A scheme for incrementally expanding this network is also presented. We also look at the performance of the ASCEND/DESCEND class of algorithms on these architectures.
Resumo:
Trimesic acid (TMA) and alcohols were recently shown to self-assemble into a stable, two-component linear pattern at the solution/highly oriented pyrolytic graphite (HOPG) interface. Away from equilibrium, the TMA/alcohol self-assembled molecular network (SAMN) can coexist with pure-TMA networks. Here, we report on some novel characteristics of these non-equilibrium TMA structures, investigated by scanning tunneling microscopy (STM). We observe that both the chicken-wire and flower-structure TMA phases can host 'guest' C60 molecules within their pores, whereas the TMA/alcohol SAMN does not offer any stable adsorption sites for the C60 molecules. The presence of the C60 molecules at the solution/solid interface was found to improve the STM image quality. We have taken advantage of the high-quality imaging conditions to observe unusual TMA bonding geometries at domain boundaries in the TMA/alcohol SAMN. Boundaries between aligned TMA/alcohol domains can give rise to doubled TMA dimer rows in two different configurations, as well as a tripled-TMA row. The boundaries created between non-aligned domains can create geometries that stabilize TMA bonding configurations not observed on surfaces without TMA/alcohol SAMNs, including small regions of the previously predicted 'super flower' TMA bonding geometry and a tertiary structure related to the known TMA phases. These structures are identified as part of a homologic class of TMA bonding motifs, and we explore some of the reasons for the stabilization of these phases in our multicomponent system.