23,290 research outputs found

    Sistema de bloqueio de computadores

    Get PDF
    Mestrado em Engenharia de Computadores e TelemáticaThe use of multiple computing devices per person is increasing more and more. Nowadays is normal that mobile devices like smartphones, tablets and laptops are present in the everyday life of a single person and in many cases people use these devices to perform important operations related with their professional life. This also presents a problem, as these devices come with the user in everyday life and the fact that often they have a high monetary value means that these devices are susceptible to theft. This thesis introduces a computer locking system that distinguishes itself from existing similar systems because (i) it is designed to work independently of the Operating System(s) installed on the laptop or mobile device, (ii) depends on a firrmware driver that implements the lock operation making it resistant to storage device formats or any other attack that uses software operations. It is also explored the operation of a device that has a firrmware that follows the Unified Extensible Firmware Interface (UEFI) specification as well as the development of drivers for this type of firrmware. It was also developed a security protocol and various cryptographic techniques where explored and implemented.O uso de vários dispositivos computacionais por pessoa está a aumentar cada vez mais. Hoje em dia é normal dispositivos móveis como o smartphone, tablet e computador portátil estarem presentes no quotidiano das pessoas e em muitos casos as pessoas necessitam de realizar tarefas na sua vida profissional nestes dispositivos. Isto apresenta também um problema, como estes dispositivos acompanham o utilizador no dia a dia e pelo facto de muitas vezes terem um valor monetário elevado faz com que estes dispositivos sejam suscetíveis a roubos. Esta tese introduz um sistema de bloqueio de computadores que se distingue dos sistemas similares existentes porque, (i) _e desenhado para funcionar independentemente do(s) sistema(s) operativo(s) instalado(s) no computador portátil ou no dispositivo móvel, (ii) depende de um driver do firrmware que concretiza a operação de bloqueio fazendo com que seja resistente contra formatação do dispositivo de armazenamento ou qualquer outro ataque que tenho por base a utilização de software. É explorado então o funcionamento de um dispositivo que tenha um firmware que respeita a especificação Unfied Extensible Firmware Interface (UEFI) assim como a programação de drivers para este tipo de firmware. Foi também desenvolvido um protocolo de segurança e são exploradas várias técnicas criptográficas passiveis de serem implementadas

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    A Design Science Research Approach to Smart and Collaborative Urban Supply Networks

    Get PDF
    Urban supply networks are facing increasing demands and challenges and thus constitute a relevant field for research and practical development. Supply chain management holds enormous potential and relevance for society and everyday life as the flow of goods and information are important economic functions. Being a heterogeneous field, the literature base of supply chain management research is difficult to manage and navigate. Disruptive digital technologies and the implementation of cross-network information analysis and sharing drive the need for new organisational and technological approaches. Practical issues are manifold and include mega trends such as digital transformation, urbanisation, and environmental awareness. A promising approach to solving these problems is the realisation of smart and collaborative supply networks. The growth of artificial intelligence applications in recent years has led to a wide range of applications in a variety of domains. However, the potential of artificial intelligence utilisation in supply chain management has not yet been fully exploited. Similarly, value creation increasingly takes place in networked value creation cycles that have become continuously more collaborative, complex, and dynamic as interactions in business processes involving information technologies have become more intense. Following a design science research approach this cumulative thesis comprises the development and discussion of four artefacts for the analysis and advancement of smart and collaborative urban supply networks. This thesis aims to highlight the potential of artificial intelligence-based supply networks, to advance data-driven inter-organisational collaboration, and to improve last mile supply network sustainability. Based on thorough machine learning and systematic literature reviews, reference and system dynamics modelling, simulation, and qualitative empirical research, the artefacts provide a valuable contribution to research and practice

    SYSTEM AND METHOD FOR SENSITIVE DATA PROTECTION FOR ACCESSIBILITY USERS

    Get PDF
    Present disclosure discloses a method and a system for sensitive data protection for accessibility users. In some embodiments, the method includes receiving a message from user device (102-1) from the accessibility user, and identifying if the message includes sensitive data by using a predefined technique. Thereafter, the method discloses detecting if an audio device (106) is plugged in or not plugged in to the user device (102-1). If the audio device (106) is not plugged in to the user device (102-1) , the method includes performing obfuscation of the sensitive data and reads out the sensitive data with obfuscation. However, if the audio device (106) is plugged in to the user device (102-1), the method includes reading out the sensitive data without obfuscation. The present disclosure provides a secure environment with personalized obfuscation mechanism for protection of sensitive data for the accessibility users

    A Decision Support System for Economic Viability and Environmental Impact Assessment of Vertical Farms

    Get PDF
    Vertical farming (VF) is the practice of growing crops or animals using the vertical dimension via multi-tier racks or vertically inclined surfaces. In this thesis, I focus on the emerging industry of plant-specific VF. Vertical plant farming (VPF) is a promising and relatively novel practice that can be conducted in buildings with environmental control and artificial lighting. However, the nascent sector has experienced challenges in economic viability, standardisation, and environmental sustainability. Practitioners and academics call for a comprehensive financial analysis of VPF, but efforts are stifled by a lack of valid and available data. A review of economic estimation and horticultural software identifies a need for a decision support system (DSS) that facilitates risk-empowered business planning for vertical farmers. This thesis proposes an open-source DSS framework to evaluate business sustainability through financial risk and environmental impact assessments. Data from the literature, alongside lessons learned from industry practitioners, would be centralised in the proposed DSS using imprecise data techniques. These techniques have been applied in engineering but are seldom used in financial forecasting. This could benefit complex sectors which only have scarce data to predict business viability. To begin the execution of the DSS framework, VPF practitioners were interviewed using a mixed-methods approach. Learnings from over 19 shuttered and operational VPF projects provide insights into the barriers inhibiting scalability and identifying risks to form a risk taxonomy. Labour was the most commonly reported top challenge. Therefore, research was conducted to explore lean principles to improve productivity. A probabilistic model representing a spectrum of variables and their associated uncertainty was built according to the DSS framework to evaluate the financial risk for VF projects. This enabled flexible computation without precise production or financial data to improve economic estimation accuracy. The model assessed two VPF cases (one in the UK and another in Japan), demonstrating the first risk and uncertainty quantification of VPF business models in the literature. The results highlighted measures to improve economic viability and the viability of the UK and Japan case. The environmental impact assessment model was developed, allowing VPF operators to evaluate their carbon footprint compared to traditional agriculture using life-cycle assessment. I explore strategies for net-zero carbon production through sensitivity analysis. Renewable energies, especially solar, geothermal, and tidal power, show promise for reducing the carbon emissions of indoor VPF. Results show that renewably-powered VPF can reduce carbon emissions compared to field-based agriculture when considering the land-use change. The drivers for DSS adoption have been researched, showing a pathway of compliance and design thinking to overcome the ‘problem of implementation’ and enable commercialisation. Further work is suggested to standardise VF equipment, collect benchmarking data, and characterise risks. This work will reduce risk and uncertainty and accelerate the sector’s emergence

    OLIG2 neural progenitor cell development and fate in Down syndrome

    Full text link
    Down syndrome (DS) is caused by triplication of human chromosome 21 (HSA21) and is the most common genetic form of intellectual disability. It is unknown precisely how triplication of HSA21 results in the intellectual disability, but it is thought that the global transcriptional dysregulation caused by trisomy 21 perturbs multiple aspects of neurodevelopment that cumulatively contribute to its etiology. While the characteristics associated with DS can arise from any of the genes triplicated on HSA21, in this work we focus on oligodendrocyte transcription factor 2 (OLIG2). The progeny of neural progenitor cells (NPCs) expressing OLIG2 are likely to be involved in many of the cellular changes underlying the intellectual disability in DS. To explore the fate of OLIG2+ neural progenitors, we took advantage of two distinct models of DS, the Ts65Dn mouse model and induced pluripotent stem cells (iPSCs) derived from individuals with DS. Our results from these two systems identified multiple perturbations in development in the cellular progeny of OLIG2+ NPCs. In Ts65Dn, we identified alterations in neurons and glia derived from the OLIG2 expressing progenitor domain in the ventral spinal cord. There were significant differences in the number of motor neurons and interneurons present in the trisomic lumbar spinal cord depending on age of the animal pointing both to a neurodevelopment and a neurodegeneration phenotype in the Ts65Dn mice. Of particular note, we identified changes in oligodendrocyte (OL) maturation in the trisomic mice that are dependent on spatial location and developmental origin. In the dorsal corticospinal tract, there were significantly fewer mature OLs in the trisomic mice, and in the lateral funiculus we observed the opposite phenotype with more mature OLs being present in the trisomic animals. We then transitioned our studies into iPSCs where we were able to pattern OLIG2+ NPCs to either a spinal cord-like or a brain-like identity and study the OL lineage that differentiated from each progenitor pool. Similar to the region-specific dysregulation found in the Ts65Dn spinal cord, we identified perturbations in trisomic OLs that were dependent on whether the NPCs had been patterned to a brain-like or spinal cord-like fate. In the spinal cord-like NPCs, there was no difference in the proportion of cells expressing either OLIG2 or NKX2.2, the two transcription factors whose co-expression is essential for OL differentiation. Conversely, in the brain-like NPCs, there was a significant increase in OLIG2+ cells in the trisomic culture and a decrease in NKX2.2 mRNA expression. We identified a sonic hedgehog (SHH) signaling based mechanism underlying these changes in OLIG2 and NKX2.2 expression in the brain-like NPCs and normalized the proportion of trisomic cells expressing the transcription factors to euploid levels by modulating the activity of the SHH pathway. Finally, we continued the differentiation of the brain-like and spinal cord-like NPCs to committed OL precursor cells (OPCs) and allowed them to mature. We identified an increase in OPC production in the spinal cord-like trisomic culture which was not present in the brain-like OPCs. Conversely, we identified a maturation deficit in the brain-like trisomic OLs that was not present in the spinal cord-like OPCs. These results underscore the importance of regional patterning in characterizing changes in cell differentiation and fate in DS. Together, the findings presented in this work contribute to the understanding of the cellular and molecular etiology of the intellectual disability in DS and in particular the contribution of cells differentiated from OLIG2+ progenitors

    Interobserver and Intertest Agreement in Telemedicine Glaucoma Screening with Optic Disk Photos and Optical Coherence Tomography

    Get PDF
    t: Purpose: To evaluate interobserver and intertest agreement between optical coherence tomography (OCT) and retinography in the detection of glaucoma through a telemedicine program. Methods: A stratified sample of 4113 individuals was randomly selected, and those who accepted underwent examination including visual acuity, intraocular pressure (IOP), non-mydriatic retinography, and imaging using a portable OCT device. Participants' data and images were uploaded and assessed by 16 ophthalmologists on a deferred basis. Two independent evaluations were performed for all participants. Agreement between methods was assessed using the kappa coefficient and the prevalence-adjusted bias-adjusted kappa (PABAK). We analyzed potential factors possibly influencing the level of agreement. Results: The final sample comprised 1006 participants. Of all suspected glaucoma cases (n = 201), 20.4% were identified in retinographs only, 11.9% in OCT images only, 46.3% in both, and 21.4% were diagnosed based on other data. Overall interobserver agreement outcomes were moderate to good with a kappa coefficient of 0.37 and a PABAK index of 0.58. Higher values were obtained by experienced evaluators (kappa = 0.61; PABAK = 0.82). Kappa and PABAK values between OCT and photographs were 0.52 and 0.82 for the first evaluation. Conclusion: In a telemedicine screening setting, interobserver agreement on diagnosis was moderate but improved with greater evaluator expertise

    Rastreabilidade de matérias primas e produtos, e a sua integração com o ERP da empresa

    Get PDF
    No campo da rastreabilidade industrial têm surgido sistemas tecnológicos, nomeadamente, sistemas automáticos de rastreabilidade que ajudam as empresas na sua organização, na forma de encarar os problemas e sobretudo ajudam a melhorar ou a manter a sua competitividade, agilizando os fluxos de informação. As empresas que adotem sistemas manuais de rastreabilidade estão sujeitas a uma elevada ocorrência de erros e a uma redução de velocidade de atualização dos dados. Estes problemas são de todo dispensáveis, daí a necessidade de integração ou implementação de novas tecnologias nos sistemas de rastreabilidade - sistemas Automatic Identification and Data Capture (AIDC). Com estes sistemas consegue-se obter economia de tempo, garantia de qualidade, controlo da distribuição interna e externa da empresa e controlo in-time da produção. Com a aparição da Indústria 4.0 e a consequente integração com vários conceitos dela intrínsecos, como a Internet of Things, estes sistemas automáticos de rastreabilidade tornaram-se ainda mais relevantes e automatizados onde é possível criar objetos inteligentes, com a capacidade de comunicar com várias plataformas através da Internet. Para desenvolver estes sistemas é necessário utilizar várias tecnologias, onde se destaca a tecnologia Radio-Frequency Identification (RFID). Esta é das tecnologias com mais aplicações e potencialidades devido à sua capacidade de identificação de objetos sem contacto, alta velocidade e precisão na transmissão de dados. Neste contexto, uma parte do processo produtivo da Vista Alegre, foi utilizado como exemplo de um chão de fábrica no qual se aplica o sistema de rastreabilidade desenvolvido durante este projeto. O sistema concebido faz uso de um microcontrolador de baixo custo, neste caso o ESP-12E, utilizado como unidade de processamento responsável por processar as as mensagens trocadas com o leitor RFID. Estes dois componentes formam um dispositivo móvel oferecendo a capacidade de leitura e escrita do sistema RFID, em qualquer parte do chão de fábrica que tenha cobertura Wi-Fi da empresa, isto porque o ESP-12E tem um módulo Wi-Fi utilizado na comunicação com um servidor local que processa e envia os dados para uma base de dados MySQL. Foi desenvolvida uma interface gráfica baseada em linguagens web, onde existe a possibilidade de interação com o utilizador com o intuito de serem registados vários dados considerados importantes para a empresa. São também apresentadas várias informações do processo produtivo, como o histórico de produção. Este sistema vem confirmar a viabilidade e as potencialidades dos microcontroladores de baixo custo e ferramentas open source no desenvolvimento de sistemas de rastreabilidade industrial.In the field of industrial traceability, technological systems have emerged, namely, automatic traceability systems that help companies in their organization, in their form of facing problems and, above all, they help to improve or maintain their competitiveness, streamlining information flows. Companies that adopt manual traceability systems are subject to a high occurrence of errors and reduced data update speed. These issues are absolutely unnecessary, hence the need to integrate or implement new technologies in the traceability systems - Automatic Identification and Data Capture (AIDC) systems. With these systems it is possible to obtain time savings, quality assurance, control of the company’s internal and external distribution and in-time control of production. With the appearance of Industry 4.0 and the consequent integration with several intrinsic concepts, such as Internet of Things, these automatic traceability systems have become even more relevant and automated, in the way that it is possible to create intelligent objects, with the ability to communicate with multiple platforms over the Internet. To develop these systems it is necessary to use several technologies, where Radio-Frequency Identification (RFID) technology stands out. This is one of the technologies with the most applications and potential due to its ability to identify objects without needing contact and high speed and precision in data transmission. In this context, part of Vista Alegre’s production process was used as an example of a factory floor to which the traceability system developed during this project was applied. The designed system makes use of a low cost microcontroller, in this case the ESP-12E, used as a processing unit responsible for processing the messages exchanged with the RFID reader. These two components form a mobile device offering the ability to read and write of the RFID system, anywhere on the factory floor that has the company’s Wi-Fi coverage, because the ESP-12E has a Wi-Fi module used in communication with a local server that processes and sends the data to a MySQL database. A graphical interface based on web languages was developed, where there is the possibility of interaction with the user in order to record data considered important for the company. Various information about the production process is also presented, such as the production history. This system confirms the viability and potential of low cost microcontrollers and open source tools in the development of industrial traceability systems.Mestrado em Engenharia Mecânic

    Credibility of Cyber Threat Communication on Twitter – Expert Evaluation of Indicators for Automated Credibility Assessment

    Get PDF
    Computer Emergency Response Teams (CERTs) are experts responsible for managing cybersecurity incidents. To identify cyber threats, they consider a wide range of sources from official vulnerability databases to public sources such as Twitter, which has an active cybersecurity community. Due to the high number of topic-related tweets per day, credibility assessment represents an immense effort in the daily work of CERTs. Although approaches for automated credibility assessment have already been developed in previous research, these mainly take peripheral cues into account, although users with domain expertise and a high level of personal involvement also assess content-related cues. We therefore conducted interviews with CERT members to re-evaluate known indicators for automated credibility assessment from an expert perspective. In doing so, we contribute valuable insights to the development of automated approaches for credibility assessment targeting users with high domain knowledge and personal involvement

    Data-to-text generation with neural planning

    Get PDF
    In this thesis, we consider the task of data-to-text generation, which takes non-linguistic structures as input and produces textual output. The inputs can take the form of database tables, spreadsheets, charts, and so on. The main application of data-to-text generation is to present information in a textual format which makes it accessible to a layperson who may otherwise find it problematic to understand numerical figures. The task can also automate routine document generation jobs, thus improving human efficiency. We focus on generating long-form text, i.e., documents with multiple paragraphs. Recent approaches to data-to-text generation have adopted the very successful encoder-decoder architecture or its variants. These models generate fluent (but often imprecise) text and perform quite poorly at selecting appropriate content and ordering it coherently. This thesis focuses on overcoming these issues by integrating content planning with neural models. We hypothesize data-to-text generation will benefit from explicit planning, which manifests itself in (a) micro planning, (b) latent entity planning, and (c) macro planning. Throughout this thesis, we assume the input to our generator are tables (with records) in the sports domain. And the output are summaries describing what happened in the game (e.g., who won/lost, ..., scored, etc.). We first describe our work on integrating fine-grained or micro plans with data-to-text generation. As part of this, we generate a micro plan highlighting which records should be mentioned and in which order, and then generate the document while taking the micro plan into account. We then show how data-to-text generation can benefit from higher level latent entity planning. Here, we make use of entity-specific representations which are dynam ically updated. The text is generated conditioned on entity representations and the records corresponding to the entities by using hierarchical attention at each time step. We then combine planning with the high level organization of entities, events, and their interactions. Such coarse-grained macro plans are learnt from data and given as input to the generator. Finally, we present work on making macro plans latent while incrementally generating a document paragraph by paragraph. We infer latent plans sequentially with a structured variational model while interleaving the steps of planning and generation. Text is generated by conditioning on previous variational decisions and previously generated text. Overall our results show that planning makes data-to-text generation more interpretable, improves the factuality and coherence of the generated documents and re duces redundancy in the output document
    corecore