922 resultados para secure interoperation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, vehicular cloud computing (VCC) has emerged as a new technology which is being used in wide range of applications in the area of multimedia-based healthcare applications. In VCC, vehicles act as the intelligent machines which can be used to collect and transfer the healthcare data to the local, or global sites for storage, and computation purposes, as vehicles are having comparatively limited storage and computation power for handling the multimedia files. However, due to the dynamic changes in topology, and lack of centralized monitoring points, this information can be altered, or misused. These security breaches can result in disastrous consequences such as-loss of life or financial frauds. Therefore, to address these issues, a learning automata-assisted distributive intrusion detection system is designed based on clustering. Although there exist a number of applications where the proposed scheme can be applied but, we have taken multimedia-based healthcare application for illustration of the proposed scheme. In the proposed scheme, learning automata (LA) are assumed to be stationed on the vehicles which take clustering decisions intelligently and select one of the members of the group as a cluster-head. The cluster-heads then assist in efficient storage and dissemination of information through a cloud-based infrastructure. To secure the proposed scheme from malicious activities, standard cryptographic technique is used in which the auotmaton learns from the environment and takes adaptive decisions for identification of any malicious activity in the network. A reward and penalty is given by the stochastic environment where an automaton performs its actions so that it updates its action probability vector after getting the reinforcement signal from the environment. The proposed scheme was evaluated using extensive simulations on ns-2 with SUMO. The results obtained indicate that the proposed scheme yields an improvement of 10 % in detection rate of malicious nodes when compared with the existing schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Currently, the teaching-learning process in domains, such as computer programming, is characterized by an extensive curricula and a high enrolment of students. This poses a great workload for faculty and teaching assistants responsible for the creation, delivery, and assessment of student exercises. The main goal of this chapter is to foster practice-based learning in complex domains. This objective is attained with an e-learning framework—called Ensemble—as a conceptual tool to organize and facilitate technical interoperability among services. The Ensemble framework is used on a specific domain: computer programming. Content issues are tacked with a standard format to describe programming exercises as learning objects. Communication is achieved with the extension of existing specifications for the interoperation with several systems typically found in an e-learning environment. In order to evaluate the acceptability of the proposed solution, an Ensemble instance was validated on a classroom experiment with encouraging results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Atualmente a popularidade das comunicações Wi-Fi tem crescido, os utilizadores acedem a partir de vários dispositivos como telemóveis, tablets, computadores portáteis sendo estes utilizados por qualquer pessoa nos mais variados locais. Com esta utilização massiva por parte dos utilizadores surgiram os hotspots Wi-Fi públicos (em aeroportos, estações de comboios, etc) que permitem a ligação de clientes recorrendo a ligações wireless não seguras (ou abertas). Tais hotspots utilizam, após a ligação de um cliente, um captive portal que captura o tráfego IP com origem no cliente e o redireciona para uma página Web de entrada. A página Web permite ao cliente comprar tempo de acesso à Internet ou, caso já seja um cliente da empresa, autenticar-se para ter acesso à Internet. A necessidade da ligação aberta assenta na possibilidade do operador do hotspot vender acesso à Internet a utilizadores não conhecidos (caso contrário teria de fornecerlhes uma senha previamente). No entanto, fornecer um acesso à Internet wireless sem qualquer tipo de segurança ao nível físico permite que qualquer outro utilizador consiga obter informação sobre a navegação Web dos utilizadores ligados (ex.: escuta de pedidos DNS). Nesta tese pretende-se apresentar uma solução que estenda um dos atuais mecanismos de autenticação Wi-Fi (WPA, WPA2) para que permita, após autenticação em captive portal, a migração de uma ligação aberta para uma ligação segura.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este documento contém todo o estudo e planeamento para a implementação de um novo sistema de monitorização e alarmística, desenvolvido para o serviço de informática, no decorrer do estágio profissional no Instituto Português de Oncologia do Porto. Observou-se que o sistema já existente, apesar de facilitar algumas ações da equipa, apresentava muitas lacunas, mas ao mesmo tempo uma boa abertura para evolução. A criação desse sistema teve que contemplar um conjunto de objetivos que levaram a elaboração de estudos, permitindo uma análise e fundamento na tomada de decisões e na criação de tarefas e testes. É apresentado também um estudo de uma nova arquitetura, pois devido a falta de recursos que a solução já implementada tinha, que permitisse ao serviço de informática obter um sistema robusto, redundante, fiável, seguro e sempre disponível.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nos últimos anos o aumento exponencial da utilização de dispositivos móveis e serviços disponibilizados na “Cloud” levou a que a forma como os sistemas são desenhados e implementados mudasse, numa perspectiva de tentar alcançar requisitos que até então não eram essenciais. Analisando esta evolução, com o enorme aumento dos dispositivos móveis, como os “smartphones” e “tablets” fez com que o desenho e implementação de sistemas distribuidos fossem ainda mais importantes nesta área, na tentativa de promover sistemas e aplicações que fossem mais flexíveis, robutos, escaláveis e acima de tudo interoperáveis. A menor capacidade de processamento ou armazenamento destes dispositivos tornou essencial o aparecimento e crescimento de tecnologias que prometem solucionar muitos dos problemas identificados. O aparecimento do conceito de Middleware visa solucionar estas lacunas nos sistemas distribuidos mais evoluídos, promovendo uma solução a nível de organização e desenho da arquitetura dos sistemas, ao memo tempo que fornece comunicações extremamente rápidas, seguras e de confiança. Uma arquitetura baseada em Middleware visa dotar os sistemas de um canal de comunicação que fornece uma forte interoperabilidade, escalabilidade, e segurança na troca de mensagens, entre outras vantagens. Nesta tese vários tipos e exemplos de sistemas distribuídos e são descritos e analisados, assim como uma descrição em detalhe de três protocolos (XMPP, AMQP e DDS) de comunicação, sendo dois deles (XMPP e AMQP) utilzados em projecto reais que serão descritos ao longo desta tese. O principal objetivo da escrita desta tese é demonstrar o estudo e o levantamento do estado da arte relativamente ao conceito de Middleware aplicado a sistemas distribuídos de larga escala, provando que a utilização de um Middleware pode facilitar e agilizar o desenho e desenvolvimento de um sistema distribuído e traz enormes vantagens num futuro próximo.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As plataformas com múltiplos núcleos tornaram a programação paralela/concorrente num tópico de interesse geral. Diversos modelos de programação têm vindo a ser propostos, facilitando aos programadores a identificação de regiões de código potencialmente paralelizáveis, deixando ao sistema operativo a tarefa de as escalonar dinamicamente em tempo de execução, explorando o maior grau possível de paralelismo. O Java não foge a esta tendência, disponibilizando ao programador um número crescente de bibliotecas de mecanismos de sincronização e paralelização de código. Neste contexto, esta tese apresenta e discute um conjunto de resultados obtidos através de testes intensivos à eficiência de algoritmos de ordenação implementados com recurso aos mecanismos de concorrência da API do Java 8 (Threads, Threadpools, ExecutorService, CountdownLach, ExecutorCompletionService e ForkJoinPools) em sistemas com um número de núcleos variável. Para cada um dos mecanismos, são apresentadas conclusões sobre o seu funcionamento e discutidos os cenários em que o seu uso pode ser rentabilizado de modo a serem obtidos melhores tempos de execução.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

ABSTRACT Background Mental health promotion is supported by a strong body of knowledge and is a matter of public health with the potential of a large impact on society. Mental health promotion programs should be implemented as soon as possible in life, preferably starting during pregnancy. Programs should focus on malleable determinants, introducing strategies to reduce risk factors or their impact on mother and child, and also on strengthening protective factors to increase resilience. The ambition of early detecting risk situations requires the development and use of tools to assess risk, and the creation of a responsive network of services based in primary health care, especially maternal consultation during pregnancy and the first months of the born child. The number of risk factors and the way they interact and are buffered by protective factors are relevant for the final impact. Maternal-fetal attachment (MFA) is not yet a totally understood and well operationalized concept. Methodological problems limit the comparison of data as many studies used small size samples, had an exploratory character or used different selection criteria and different measures. There is still a lack of studies in high risk populations evaluating the consequences of a weak MFA. Instead, the available studies are not very conclusive, but suggest that social support, anxiety and depression, self-esteem and self-control and sense of coherence are correlated with MFA. MFA is also correlated with health practices during pregnancy, that influence pregnancy and baby outcomes. MFA seems a relevant concept for the future mother baby interaction, but more studies are needed to clarify the concept and its operationalization. Attachment is a strong scientific concept with multiple implications for future child development, personality and relationship with others. Secure attachment is considered an essential basis of good mental health, and promoting mother-baby interaction offers an excellent opportunity to intervention programmes targeted at enhancing mental health and well-being. Understanding the process of attachment and intervening to improve attachment requires a comprehension of more proximal factors, but also a broader approach that assesses the impact of more distal social conditions on attachment and how this social impact is mediated by family functioning and mother-baby interaction. Finally, it is essential to understand how this knowledge could be translated in effective mental health promoting interventions and measures that could reach large populations of pregnant mothers and families. Strengthening emotional availability (EA) seems to be a relevant approach to improve the mother-baby relationship. In this review we have offered evidence suggesting a range of determinants of mother-infant relationship, including age, marital relationship, social disadvantages, migration, parental psychiatric disorders and the situations of abuse or neglect. Based on this theoretical background we constructed a theoretical model that included proximal and distal factors, risk and protective factors, including variables related to the mother, the father, their social support and mother baby interaction from early pregnancy until six months after birth. We selected the Antenatal Psychosocial Health Assessment (ALPHA) for use as an instrument to detect psychosocial risk during pregnancy. Method Ninety two pregnant women were recruited from the Maternal Health Consultation in Primary Health Care (PHC) at Amadora. They had three moments of assessment: at T1 (until 12 weeks of pregnancy) they filed out a questionnaire that included socio-demographic data, ALPHA, Edinburgh post-natal Depression Scale (EDPS), General Health Questionnaire (GHQ) and Sense of Coherence (SOC); at T2 (after the 20th weeks of pregnancy) they answered EDPS, SOC and MFA Scale (MFAS), and finally at T3 (6 months after birth), they repeated EDPS and SOC, and their interaction with their babies was videotaped and later evaluated using EA Scales. A statistical analysis has been done using descriptive statistics, correlation analysis, univariate logistic regression and multiple linear regression. Results The study has increased our knowledge on this particular population living in a multicultural, suburb community. It allow us to identify specific groups with a higher level of psychosocial risk, such as single or divorced women, young couples, mothers with a low level of education and those who are depressed or have a low SOC. The hypothesis that psychosocial risk is directly correlated with MFAS and that MFA is directly correlated with EA was not confirmed, neither the correlation between prenatal psychosocial risk and mother-baby EA. The study identified depression as a relevant risk factor in pregnancy and its higher prevalence in single or divorced women, immigrants and in those who have a higher global psychosocial risk. Depressed women have a poor MFA, and a lower structuring capacity and a higher hostility to their babies. In average, depression seems to reduce among pregnant women in the second part of their pregnancy. The children of immigrant mothers show a lower level of responsiveness to their mothers what could be transmitted through depression, as immigrant mothers have a higher risk of depression in the beginning of pregnancy and six months after birth. Young mothers have a low MFA and are more intrusive. Women who have a higher level of education are more sensitive and their babies showed to be more responsive. Women who are or have been submitted to abuse were found to have a higher level of MFA but their babies are less responsive to them. The study highlights the relevance of SOC as a potential protective factor while it is strongly and negatively related with a wide range of risk factors and mental health outcomes especially depression before, during and after pregnancy. Conclusions ALPHA proved to be a valid, feasible and reliable instrument to Primary Health Care (PHC) that can be used as a total sum score. We could not prove the association between psychosocial risk factors and MFA, neither between MFA and EA, or between psychosocial risk and EA. Depression and SOC seems to have a clear and opposite relevance on this process. Pregnancy can be considered as a maturational process and an opportunity to change, where adaptation processes occur, buffering risk, decreasing depression and increasing SOC. Further research is necessary to better understand interactions between variables and also to clarify a better operationalization of MFA. We recommend the use of ALPHA, SOC and EDPS in early pregnancy as a way of identifying more vulnerable women that will require additional interventions and support in order to decrease risk. At political level we recommend the reinforcement of Immigrant integration and the increment of education in women. We recommend more focus in health care and public health in mental health condition and psychosocial risk of specific groups at high risk. In PHC special attention should be paid to pregnant women who are single or divorced, very young, low educated and to immigrant mothers. This study provides the basis for an intervention programme for this population, that aims to reduce broad spectrum risk factors and to promote Mental Health in women who become pregnant. Health and mental health policies should facilitate the implementation of the suggested measures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The second half of the XX century was marked by a great increase in the number of people living in cities. Urban agglomerations became poles of attraction for migration flows and these phenomena, coupled with growing car-ownership rates, resulted in the fact that modern transport systems are characterized by large number of users and traffic modes. The necessity to organize these complex systems and to provide space for different traffic modes changed the way cities look. Urban areas had to cope with traffic flows, and as a result nowadays typical street pattern consists of a road for motorized vehicles, a cycle lane (in some cases), pavement for pedestrians, parking and a range of crucial signage to facilitate navigation and make mobility more secure. However, this type of street organization may not be desirable in certain areas, more specifically, in the city centers. Downtown areas have always been places where economic, leisure, social and other types of facilities are concentrated, not surprisingly, they often attract large number of people and this frequently results in traffic jams, air and noise pollution, thus creating unpleasant environment. Besides, excessive traffic signage in central locations can harm the image and perception of a place, this relates in particular to historical centers with architectural heritage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tese de mestrado em Biologia Humana e Ambiente, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2015

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Con el examen conjunto de datos de seguimiento satelital de la flota pesquera y de marcaje electrónico de aves marinas, se analizan las interacciones entre la actividad pesquera y el forrajeo de las aves en periodo de reproducción. Se evidencia que las aves pueden mitigar la competencia con la pesca hasta cierto punto, forrajeando más lejos o quedándose más tiempo en el mar. Sin embargo, las aves en reproducción enfrentan a la vez un alto requerimiento energético para alimentar los pichones, y viajes de forrajeo limitados en distancia y tiempo por la necesidad de atender el nido. Para optimizar el éxito reproductivo de las aves marinas se recomienda: (1) Estimar, con la ayuda de modelos ecotróficos, qué cantidad de anchoveta sería conveniente ‘reservar’ para la alimentación de las aves; (2) Establecer zonas temporalmente cerradas a la pesca, alrededor de las principales colonias en los meses de reproducción de las aves. Los rangos máximos de forrajeo observados en guanayes y piqueros sugieren un radio de 50 a 100 km alrededor de las colonias, lo cual permitiría asegurar el forrajeo de estas especies en periodo de reproducción y así favorecer la sostenibilidad de sus poblaciones.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Concussion, a frequent injury in sports, is rarely evoked and often trivialized in children and teenagers. Knowledge of the diverse symptoms and signs to seek for is essential to an appropriate and secure management. The initial treatment relies on cognitive and physical rest followed by a progressive return to school and subsequently sport activities. The aim of this article is to review an injury whose prognosis is generally favourable, but whose rare complications can prove dramatic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The majority of transcatheter aortic valve implantations, structural heart procedures and the newly developed transcatheter mitral valve repair and replacement are traditionally performed either through a transfemoral or a transapical access site, depending on the presence of severe peripheral vascular disease or anatomic limitations. The transapical approach, which carries specific advantages related to its antegrade nature and the short distance between the introduction site and the cardiac target, is traditionally performed through a left anterolateral mini-thoracotomy and requires rib retractors, soft tissue retractors and reinforced apical sutures to secure, at first, the left ventricular apex for the introduction of the stent-valve delivery systems and then to seal the access site at the end of the procedure. However, despite the advent of low-profile apical sheaths and newly designed delivery systems, the apical approach represents a challenge for the surgeon, as it has the risk of apical tear, life-threatening apical bleeding, myocardial damage, coronary damage and infections. Last but not least, the use of large-calibre stent-valve delivery systems and devices through standard mini-thoracotomies compromises any attempt to perform transapical transcatheter structural heart procedures entirely percutaneously, as happens with the transfemoral access site, or via a thoracoscopic or a miniaturised video-assisted percutaneous technique. During the past few years, prototypes of apical access and closure devices for transapical heart valve procedures have been developed and tested to make this standardised successful procedure easier. Some of them represent an important step towards the development of truly percutaneous transcatheter transapical heart valve procedures in the clinical setting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The study focuses on five lower secondary school pupils’ daily use of their one-toone computers, the overall aim being to investigate literacy in this form of computing. Theoretically, the study is rooted in the New Literacy tradition with an ecological perspective, in combination with socio-semiotic theory in a multimodal perspective. New Literacy in the ecological perspective focuses on literacy practices and place/space and on the links between them. Literacy is viewed as socially based, in specific situations and in recurring social practices. Socio-semiotic theory embodying the multimodal perspective is used for the text analysis. The methodology is known as socio-semiotic ethnography. The ethnographic methods encompass just over two years of fieldwork with participating observations of the five participants’ computing activities at home, at school and elsewhere. The participants, one boy and two girls from the Blue (Anemone) School and two girls from the White (Anemone) School, were chosen to reflect a broad spectrum in terms of sociocultural and socioeconomic background. The study shows the existence of a both broad and deep variation in the way digital literacy features in the participants’ one-to-one computing. These variations are associated with experience in relation to the home, the living environment, place, personal qualities and school. The more varied computer usage of the Blue School participants is connected with the interests they developed in their homes and living environments and in the computing practices undertaken in school. Their more varied usage of the computer is reflected in their broader digital literacy repertoires and their greater number and variety of digital literacy abilities. The Blue School participants’ text production is more multifaceted, covers a wider range of subjects and displays a broader palette of semiotic resources. It also combines more text types and the texts are generally longer than those of the White School participants. The Blue School girls have developed a text culture that is close to that of the school. In their case, there is clear linkage between school-initiated and self-initiated computing activities, while other participants do not have the same opportunities to link and integrate self-initiated computing activities into the school context. It also becomes clear that the Blue School girls can relate and adapt their texts to different communicative practices and recipients. In addition, the study shows that the Blue School girls have some degree of scope in their school practice as a result of incorporating into it certain communicative practices that they have developed in nonschool contexts. Quite contrary to the hopes expressed that one-to-one computing would reduce digital inequality, it has increased between these participants. Whether the same or similar results apply in a larger perspective, on a more structural level, is a question that this study cannot answer. It can only draw attention to the need to investigate the matter. The study shows in a variety of ways that the White School participants do not have the same opportunity to develop their digital literacy as the Blue School participants. In an equivalence perspective, schools have a compensational task to perform. It is abundantly clear from the study that investing in one-to-one projects is not enough to combat digital inequality and achieve the digitisation goals established for school education. Alongside their investments in technology, schools need to develop a didactic that legitimises and compensates for the different circumstances of different pupils. The compensational role of schools in this connection is important not only for the present participants but also for the community at large, in that it can help to secure a cohesive, open and democratic society.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The writings of John Dewey (1859-1952) and Simone Weil (1909-1943) were analyzed with a view to answering 3 main questions: What is wisdom? How is wisdom connected to experience? How does one educate for a love of wisdom? Using a dialectical method whereby Dewey (a pragmatist) was critiqued by Weil (a Christian Platonist) and vice versa, commonalities and differences were identified and clarified. For both, wisdom involved the application of thought to specific, concrete problems in order to secure a better way of life. For Weil, wisdom was centered on a love of truth that involved a certain way of applying one's attention to a concrete or theoretical problem. Weil believed that nature was subject to a divine wisdom and that a truly democratic society had supernatural roots. Dewey believed that any attempt to move beyond nature would stunt the growth of wisdom. For him, wisdom could be nourished only by natural streams-even if some ofthem were given a divine designation. For both, wisdom emerged through the discipline of work understood as intelligent activity, a coherent relationship between thinking and acting. Although Weil and Dewey differed on how they distinguished these 2 activities, they both advocated a type of education which involved practical experience and confronted concrete problems. Whereas Dewey viewed each problem optimistically with the hope of solving it, Weil saw wisdom in, contemplating insoluble contradictions. For both, educating for a love of wisdom meant cultivating a student's desire to keep thinking in line with acting-wanting to test ideas in action and striving to make sense of actions observed.