992 resultados para WiFi protected access II (WPA2)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Maintaining a high level of data security with a low impact on system performance is more challenging in wireless multimedia applications. Protocols that are used for wireless local area network (WLAN) security are known to significantly degrade performance. In this paper, we propose an enhanced security system for a WLAN. Our new design aims to decrease the processing delay and increase both the speed and throughput of the system, thereby making it more efficient for multimedia applications. Our design is based on the idea of offloading computationally intensive encryption and authentication services to the end systems’ CPUs. The security operations are performed by the hosts’ central processor (which is usually a powerful processor) before delivering the data to a wireless card (which usually has a low-performance processor). By adopting this design, we show that both the delay and the jitter are significantly reduced. At the access point, we improve the performance of network processing hardware for real-time cryptographic processing by using a specialized processor implemented with field-programmable gate array technology. Furthermore, we use enhanced techniques to implement the Counter (CTR) Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) and the CTR protocol. Our experiments show that it requires timing in the range of 20–40 μs to perform data encryption and authentication on different end-host CPUs (e.g., Intel Core i5, i7, and AMD 6-Core) as compared with 10–50 ms when performed using the wireless card. Furthermore, when compared with the standard WiFi protected access II (WPA2), results show that our proposed security system improved the speed to up to 3.7 times.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Se presenta una experiencia de elaboración de materiales de Física y Química usando la hoja de cálculo de Open Access II aplicada a tercero de BUP y COU. Se analiza el contexto del centro en el que se desarrolla la experiencia y se procede a la presentación del proyecto, especificando los objetivos propuestos, las posibles aplicaciones didácticas de la hoja de cálculo, la metodología de trabajo en el aula y los conocimientos informáticos necesarios para utilizar el material elaborado. Se presentan los modelos sobre los que se trabaja: 1. Cinética química, 2. Equilibrio químico, 3. Valoración ácido-base, 4. Reacciones de precipitación, 5. Farmacocinética: dosificación de medicamentos, 6. Tiros, 7. Oscilador armónico lineal, 8. Composición de movimientos vibratorios armónicos, 9. Ondas. 10. Interferencias y pulsaciones. Para cada modelo se presenta una guía del profesor y un guión de trabajo para el alumno. El uso de estas aplicaciones acerca al alumno a las técnicas de modelización y simulación. Se adjuntan transparencias y diskettes de apoyo.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVE The ACCESS treatment model offers assertive community treatment embedded in an integrated care program to patients with psychoses. Compared to standard care and within a controlled study, it proved to be more effective in terms of service disengagement and illness outcomes in patients with schizophrenia spectrum disorders over 12 months. ACCESS was implemented into clinical routine and its effectiveness assessed over 24 months in severe schizophrenia spectrum disorders and bipolar I disorder with psychotic features (DSM-IV) in a cohort study. METHOD All 115 patients treated in ACCESS (from May 2007 to October 2009) were included in the ACCESS II study. The primary outcome was rate of service disengagement. Secondary outcomes were change of psychopathology, severity of illness, psychosocial functioning, quality of life, satisfaction with care, medication nonadherence, length of hospital stay, and rates of involuntary hospitalization. RESULTS Only 4 patients (3.4%) disengaged with the service. Another 11 (9.6%) left because they moved outside the catchment area. Patients received a mean of 1.6 outpatient contacts per week. Involuntary admissions decreased from 34.8% in the 2 previous years to 7.8% during ACCESS (P < .001). Mixed models repeated-measures analyses revealed significant improvements among all patients in psychopathology (effect size d = 0.64, P < .001), illness severity (d = 0.84, P = .03), functioning level (d = 0.65, P < .001), quality of life (d = 0.50, P < .001), and client satisfaction (d = 0.11, P < .001). At 24 months, 78.3% were fully adherent to medication, compared to 25.2% at baseline (P = .002). CONCLUSIONS ACCESS was successfully implemented in clinical routine and maintained excellent rates of service engagement and other outcomes in patients with schizophrenia spectrum disorders or bipolar I disorder with psychotic features over 24 months. TRIAL REGISTRATION ClinicalTrials.gov identifier: NCT01888627.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in leaps and bounds. From tenuous beginnings, where the only safe way to deploy a WLAN was to assume it was hostile and employ higherlayer information security controls, to the current state of the art, all manner of improvements have been conceived and many implemented. This work investigates some of the remaining issues surrounding IEEE 802.11 WLAN operation. While the inherent issues in WLAN deployments and the problems of the original Wired Equivalent Privacy (WEP) provisions are well known and widely documented, there still exist a number of unresolved security issues. These include the security of management and control frames and the data link layer protocols themselves. This research introduces a novel proposal to enhance security at the link layer of IEEE 802.11 WLANs and then conducts detailed theoretical and empirical investigation and analysis of the eects of such proposals. This thesis �rst de�nes the state of the art in WLAN technology and deployment, including an overview of the current and emerging standards, the various threats, numerous vulnerabilities and current exploits. The IEEE 802.11i MAC security enhancements are discussed in detail, along with the likely outcomes of the IEEE 802.11 Task Group W1, looking into protected management frames. The problems of the remaining unprotected management frames, the unprotected control frames and the unprotected link layer headers are reviewed and a solution is hypothesised, to encrypt the entire MAC Protocol Data Unit (MPDU), including the MAC headers, not just the MAC Service Data Unit (MSDU) commonly performed by existing protocols. The proposal is not just to encrypt a copy of the headers while still using cleartext addresses to deliver the frame, as used by some existing protocols to support the integrity and authenticity of the headers, but to pass the entire MPDU only as ciphertext to also support the con�dentiality of the frame header information. This necessitates the decryption of every received frame using every available key before a station can determine if it is the intended recipient. As such, this raises serious concerns as to the viability of any such proposal due to the likely impact on throughput and scalability. The bulk of the research investigates the impacts of such proposals on the current WLAN protocols. Some possible variations to the proposal are also provided to enhance both utility and speed. The viability this proposal with respect to the eect on network throughput is then tested using a well known and respected network simulation tool, along with a number of analysis tools developed speci�cally for the data generated here. The simulator's operation is �rst validated against recognised test outputs, before a comprehensive set of control data is established, and then the proposal is tested and and compared against the controls. This detailed analysis of the various simulations should be of bene�t to other researchers who need to validate simulation results. The analysis of these tests indicate areas of immediate improvement and so the protocols are adjusted and a further series of experiments conducted. These �nal results are again analysed in detail and �nal appraisals provided.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The article presents the “LungoSolofrana” project, carried out during the course “Urban and Mobility” in the academic year 2009/2010, held during the bachelor in Environmental Engineering at the University of Naples “Federico II”. The work has also been chosen as a finalist at the “UrbanPromo 2010” contest, the urban and territorial marketing event sponsored by the National Institute of Urban Planning and Urbit which was held in Venice in 2010. The project consists in a green mobility proposal, developed with an approach based on the integration of the environmental redevelopment of a portion of river Solofrana, located in the Salerno Province, and of the renewal of seven local stations of the railway line Mercato San Severino – Nocera Inferiore, including the realization of a cycle-path network for the natural environment fruition. Furthermore the work drew attention to the local and regional administration. The main intent of the project is to integrate sustainable mobility themes with the environment recovery in a territory affected by high environmental troubles. The area includes the municipalities of Nocera Inferiore, Nocera Superiore, Mercato San Severino, Castel San Giorgio and Roccapiemonte, situated in Salerno’s province, with a total population about 114.000 (font Demo ISTAT 2010). The area extension is about 84,30 sqkm and it is crossed by river Solofrana that is the central point of the project idea. The intervention strategy is defined in two kinds of actions: internal and external rail station interventions. The external rail station interventions regard the construction of pedestrian-cycle paths with the scope of increasing the spaces dedicated to cyclists and to pedestrians along the river Solofrana sides and to connect the urban areas with the railway station. In this way, it’s also possible to achieve an urban requalification of the interested area. On the other side, the interventions inside the station , according to Transit Oriented Development principles, aim at redeveloping common spaces with the insertion of new activities and at realizing new automatic cycle parks covered by photovoltaic panels. The project proposal consists of the urban regeneration of small railway stations along the route-Nocera-Codola Mercato San Severino in the province of Salerno, through interventions aimed at improving pedestrian accessibility. The project involves in particular the construction of pedestrian paths protected access to the station and connecting with neighboring towns and installation of innovative bike parking stations in elevation, covering surfaces coated with solar panels and spaces information. The project is aimed to propose a new model of sustainable transport for small and medium shifts as an alternative to private transportation

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Current low-level networking abstractions on modern operating systems are commonly implemented in the kernel to provide sufficient performance for general purpose applications. However, it is desirable for high performance applications to have more control over the networking subsystem to support optimizations for their specific needs. One approach is to allow networking services to be implemented at user-level. Unfortunately, this typically incurs costs due to scheduling overheads and unnecessary data copying via the kernel. In this paper, we describe a method to implement efficient application-specific network service extensions at user-level, that removes the cost of scheduling and provides protected access to lower-level system abstractions. We present a networking implementation that, with minor modifications to the Linux kernel, passes data between "sandboxed" extensions and the Ethernet device without copying or processing in the kernel. Using this mechanism, we put a customizable networking stack into a user-level sandbox and show how it can be used to efficiently process and forward data via proxies, or intermediate hosts, in the communication path of high performance data streams. Unlike other user-level networking implementations, our method makes no special hardware requirements to avoid unnecessary data copies. Results show that we achieve a substantial increase in throughput over comparable user-space methods using our networking stack implementation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

What are fundamental entities in social networks and what information is contained in social graphs? We will discuss some selected concepts in social network analysis, such as one- and two mode networks, prestige and centrality, and cliques, clans and clubs. Readings: Web tool predicts election results and stock prices, J. Palmer, New Scientist, 07 February (2008) [Protected Access] Optional: Social Network Analysis, Methods and Applications, S. Wasserman and K. Faust (1994)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We will discuss several examples and research efforts related to the small world problem and set the ground for our discussion of network theory and social network analysis. Readings: An Experimental Study of the Small World Problem, J. Travers and S. Milgram Sociometry 32 425-443 (1969) [Protected Access] Optional: The Strength of Weak Ties, M.S. Granovetter The American Journal of Sociology 78 1360--1380 (1973) [Protected Access] Optional: Worldwide Buzz: Planetary-Scale Views on an Instant-Messaging Network, J. Leskovec and E. Horvitz MSR-TR-2006-186. Microsoft Research, June 2007. [Web Link, the most recent and comprehensive study on the subject!] Originally from: http://kmi.tugraz.at/staff/markus/courses/SS2008/707.000_web-science/

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Se estudia la aplicación de las letras como signos al aprendizaje de las desigualdades. El cuestionario se aplica en 6 aulas: una de séptimo de EGB, una de octavo de EGB, dos de primero de BUP y dos de segundo REM. Comienza con una introducción histórica y una profundización teórica sobre el uso de las letras como signos o símbolos. Ofrece un estudio empírico y un análisis técnico y de metodología didáctica con el desarrollo y aplicación de nuevas lecciones sobre inecuaciones con expresión de resultados observados en su experimentación con estudiantes. Estas lecciones han sido creadas en forma de juego didáctico y aplicando la teoría de situaciones y han demostrado su eficacia para la introducción del concepto de desigualdad. Se elabora un cuestionario sobre el uso y la interpretación de las letras en álgebra elemental y otro sobre desigualdades. Utiliza los programas informáticos: Statitcf, Open Access II plus y BMDP. Se elaboran tres estudios estadísticos con tres programas informáticos diferentes para el cuestionario sobre el uso de la lengua y cinco análisis comparativos. Se realiza un análisis factorial de correspondencias con los datos del cuestionario sobre desigualdades.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Este es el material base para la realización de un curso sobre hojas de cálculo perteneciente al Programa de Nuevas Tecnologías de la Información y de la Comunicación del MEC. Trata de proporcionar una formación de usuario para fines de 'alfabetización informática' o para fines instrumentales en las hojas de cálculo planning assistant y open access II.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Includes bibliography

Relevância:

100.00% 100.00%

Publicador:

Resumo:

CONTEXT: E-learning resources, such as virtual patients (VPs), can be more effective when they are integrated in the curriculum. To gain insights that can inform guidelines for the curricular integration of VPs, we explored students' perceptions of scenarios with integrated and non-integrated VPs aimed at promoting clinical reasoning skills. METHODS: During their paediatric clerkship, 116 fifth-year medical students were given at least ten VPs embedded in eight integrated scenarios and as non-integrated add-ons. The scenarios differed in the sequencing and alignment of VPs and related educational activities, tutor involvement, number of VPs, relevance to assessment and involvement of real patients. We sought students' perceptions on the VP scenarios in focus group interviews with eight groups of 4-7 randomly selected students (n = 39). The interviews were recorded, transcribed and analysed qualitatively. RESULTS: The analysis resulted in six themes reflecting students' perceptions of important features for effective curricular integration of VPs: (i) continuous and stable online access, (ii) increasing complexity, adapted to students' knowledge, (iii) VP-related workload offset by elimination of other activities, (iv) optimal sequencing (e.g.: lecture--1 to 2 VP(s)--tutor-led small group discussion--real patient) and (V) optimal alignment of VPs and educational activities, (vi) inclusion of VP topics in assessment. CONCLUSIONS: The themes appear to offer starting points for the development of a framework to guide the curricular integration of VPs. Their impact needs to be confirmed by studies using quantitative controlled designs.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

While WiFi monitoring networks have been deployed in previous research, to date none have assessed live network data from an open access, public environment. In this paper we describe the construction of a replicable, independent WLAN monitoring system and address some of the challenges in analysing the resultant traffic. Analysis of traffic from the system demonstrates that basic traffic information from open-access networks varies over time (temporal inconsistency). The results also show that arbitrary selection of Request-Reply intervals can have a significant effect on Probe and Association frame exchange calculations, which can impact on the ability to detect flooding attacks.