271 research outputs found
IPv6: a new security challenge
Tese de mestrado em Segurança Informática, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2011O Protocolo de Internet versão 6 (IPv6) foi desenvolvido com o intuito de resolver alguns dos problemas não endereçados pelo seu antecessor, o Protocolo de Internet versão 4 (IPv4), nomeadamente questões relacionadas com segurança e com o espaço de endereçamento disponível. São muitos os que na última década têm desenvolvido estudos sobre os investimentos necessários à sua adoção e sobre qual o momento certo para que o mesmo seja adotado por todos os players no mercado. Recentemente, o problema da extinção de endereçamentos públicos a ser disponibilizado pelas diversas Region Internet registry – RIRs - despertou o conjunto de entidades envolvidas para que se agilizasse o processo de migração do IPv4 para o IPv6. Ao contrário do IPv4, esta nova versão considera a segurança como um objetivo fundamental na sua implementação, nesse sentido é recomendado o uso do protocolo IPsec ao nível da camada de rede. No entanto, e devido à imaturidade do protocolo e à complexidade que este período de transição comporta, existem inúmeras implicações de segurança que devem ser consideradas neste período de migração. O objetivo principal deste trabalho é definir um conjunto de boas práticas no âmbito da segurança na implementação do IPv6 que possa ser utilizado pelos administradores de redes de dados e pelas equipas de segurança dos diversos players no mercado. Nesta fase de transição, é de todo útil e conveniente contribuir de forma eficiente na interpretação dos pontos fortes deste novo protocolo assim como nas vulnerabilidades a ele associadas.IPv6 was developed to address the exhaustion of IPv4 addresses, but has not yet seen global deployment. Recent trends are now finally changing this picture and IPv6 is expected to take off soon. Contrary to the original, this new version of the Internet Protocol has security as a design goal, for example with its mandatory support for network layer security. However, due to the immaturity of the protocol and the complexity of the transition period, there are several security implications that have to be considered when deploying IPv6. In this project, our goal is to define a set of best practices for IPv6 Security that could be used by IT staff and network administrators within an Internet Service Provider. To this end, an assessment of some of the available security techniques for IPv6 will be made by means of a set of laboratory experiments using real equipment from an Internet Service Provider in Portugal. As the transition for IPv6 seems inevitable this work can help ISPs in understanding the threats that exist in IPv6 networks and some of the prophylactic measures available, by offering recommendations to protect internal as well as customers’ networks
Time-domain optimization of amplifiers based on distributed genetic algorithms
Thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the subject of Electrical and Computer EngineeringThe work presented in this thesis addresses the task of circuit optimization, helping the designer facing the high performance and high efficiency circuits demands of the market and technology evolution. A novel framework is introduced, based on time-domain analysis, genetic algorithm optimization, and distributed processing.
The time-domain optimization methodology is based on the step response of the amplifier. The main advantage of this new time-domain methodology is that, when a given settling-error is reached within the desired settling-time, it is automatically guaranteed that the amplifier has enough open-loop gain, AOL, output-swing (OS), slew-rate (SR), closed loop bandwidth and closed loop stability. Thus, this simplification of the circuit‟s evaluation helps the optimization process to converge faster. The method used to calculate the step response expression of the circuit is based on the inverse Laplace transform applied to the transfer function, symbolically, multiplied by 1/s (which represents the unity input step). Furthermore, may be applied to transfer functions of circuits with unlimited number of zeros/poles, without approximation in order to keep accuracy. Thus, complex circuit, with several design/optimization degrees of freedom can also be considered. The expression of the step response, from the proposed methodology, is based on the DC bias operating point of the devices of the circuit. For this, complex and accurate device models (e.g. BSIM3v3) are integrated. During the optimization process, the time-domain evaluation of the amplifier is used by the genetic algorithm, in the classification of the genetic individuals. The time-domain evaluator is integrated into the developed optimization platform, as independent library, coded using C programming language.
The genetic algorithms have demonstrated to be a good approach for optimization since they are flexible and independent from the optimization-objective. Different levels of abstraction can be optimized either system level or circuit level. Optimization of any new block is basically carried-out by simply providing additional configuration files, e.g. chromosome format, in text format; and the circuit library where the fitness value of each individual of the genetic algorithm is computed.
Distributed processing is also employed to address the increasing processing time demanded by the complex circuit analysis, and the accurate models of the circuit devices. The communication by remote processing nodes is based on Message Passing interface (MPI). It is demonstrated that the distributed processing reduced the optimization run-time by more than one order of magnitude.
Platform assessment is carried by several examples of two-stage amplifiers, which have been optimized and successfully used, embedded, in larger systems, such as data converters. A dedicated example of an inverter-based self-biased two-stage amplifier has been designed, laid-out and fabricated as a stand-alone circuit and experimentally evaluated. The measured results are a direct demonstration of the effectiveness of the proposed time-domain optimization methodology.Portuguese Foundation for the Science and Technology (FCT
Performance assessment of mobility solutions for IPv6-based healthcare wireless sensor networks
This thesis focuses on the study of mobile wireless sensor networks applied to healthcare
scenarios. The promotion of better quality-of-life for hospitalized patients is addressed in this
research work with a solution that can help these patients to keep their mobility (if possible).
The solution proposed allows remote monitoring and control of patients’ health in real-time
and without interruptions. Small sensor nodes able to collect and send wirelessly the health
parameters allow for the control of the patients' health condition. A network infrastructure,
composed by several access points, allows the connection of the sensor nodes (carried by the
patients) to remote healthcare providers. To ensure continuous access to sensor nodes special
attention should be dedicated to manage the transition of these sensor nodes between
different access points’ coverage areas. The process of changing an access point attachment
of a sensor node is called handover. In that context, this thesis proposes a new handover
mechanism that can ensure continuous connection to mobile sensor nodes in a healthcare
wireless sensor network. Due to the limitations of sensor nodes’ resources, namely available
energy (these sensor nodes are typically powered by small batteries), the proposed
mechanism pays a special attention in the optimization of energy consumption. To achieve
this optimization, part of this work is dedicated to the construction of a small sensor node.
The handover mechanism proposed in this work is called Hand4MAC (handover mechanism for
MAC layer). This mechanism is compared with other mechanisms commonly used in handover
management. The Hand4MAC mechanism is deployed and validated through by simulation and
in a real testbed. The scenarios used for the validation reproduces a hospital ward. The
performance evaluation is focused in the percentage of time that senor nodes are accessible
to the network while traveling across several access points’ coverage areas and the energy
expenditures in handover processes. The experiments performed take into account various
parameters that are the following: number of sent messages, number of received messages,
multicast message usage, energy consumption, number of sensor nodes present in the
scenario, velocity of sensor nodes, and time-to-live value. In both simulation and real
testbed, the Hand4MAC mechanism is shown to perform better than all the other handover
mechanisms tested. In this comparison it was only considered the most promising handover
mechanisms proposed in the literature.Fundação para a Ciência e a Tecnologia (FCT
Notícias da Actividade Cultural. III Seminário de Arqueologia do Noroeste Peninsular. Uma inscrição inédita a Júpiter Optimo Máximo na Mata, Beira-Baixa.
95 Jan.-Dez. 1985, p. 159-163
Exploring the influential factors of continuance intention to use mobile apps : extending the expectation confirmation model
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business IntelligenceThe use of mobile applications (Apps) has been growing in the world of technology, a phenomenon related to the increasing number of smartphone users. With a huge mobile Apps market, few studies have been made on what makes individuals continue to use a mobile App or stop using it. This study aims to uncover the factors that underlie the continuance intention to use mobile Apps, addressing two theoretical models: Expectation confirmation model (ECM) and the extended unified theory of acceptance and use of technology (UTAUT2). A total of 304 valid questionnaires were collected by survey to test the theoretical framework proposal, using structural equation modelling (SEM). Our findings indicate that the most important drivers of continuance intention of mobile Apps are respectively; satisfaction, habit, performance expectancy, and effort expectancy
Explaining the Ergonomic Assessment of Human Movement in Industrial Contexts
Manufacturing processes are based on human labour and the symbiosis between human
operators and machines. The operators are required to follow predefined sequences
of movements. The operations carried out at assembly lines are repetitive, being identified
as a risk factor for the onset of musculoskeletal disorders.
Ergonomics plays a big role in preventing occupational diseases. Ergonomic risk
scores measure the overall risk exposure of operators however these methods still present
challenges: the scores are often associated to a given workstation, being agnostic to the
variability among operators. Observation methods are most often employed yet require a
significant amount of effort, preventing an accurate and continuous ergonomic evaluation
to the entire population of operators. Finally, the risk’s results are rendered as index
scores, hindering a more comprehensive interpretation by occupational physicians.
This dissertation developed a solution for automatic operator risk exposure in assembly
lines. Three main contributions were presented: (1) an upper limb and torso
motion tracking algorithm which relies on inertial sensors to estimate the orientation of
anatomical joints; (2) an adjusted ergonomic risk score; (3) an ergonomic risk explanation
approach based on the analysis of the angular risk factors. Throughout the research, two
experimental assessments were conducted: laboratory validation and field evaluation.
The laboratory tests enabled the creation of a movements’ dataset and used an optical
motion capture system as reference. The field evaluation dataset was acquired on an automotive
assembly line and serve as the basis for an ergonomic risk evaluation study. The
experimental results revealed that the proposed solution has the potential to be applied
in a real environment. Through direct measures, the ergonomic feedback is fastened, and
consequently, the evaluation can be extended to more operators, ultimately preventing,
in long-term, work-related injuries
Introduction to the special issue “Robotica 2016”
Autonomous robotics has seen its popularity and application in distinct fields, namely in services and industry, increase significantly in the last two decades. Several areas related with robotics have been addressed by the academic community and thus journals and conferences emerged to broadly disseminate the developed knowledge. The IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC) gathers participants from academia and industry, working in the field of autonomous robot systems and related areas. It is organized since 2001 in parallel to the Portuguese Robotics Open, and aims at exploring and discussing the latest trends in research and technology in the fields of robotics and related areas.
The authors of the best papers presented at ICARSC 2016 were invited to submit extended and improved versions of their manuscripts to this “Robotica 2016” special issue.info:eu-repo/semantics/publishedVersio
Nota acerca de uma conta-amuleto encontrada no "Tholos" da Tituaria (Mafra)
Estuda-se uma conta-amuleto de mineral verde, encontrada na escavação de
uma sepultura do tipo " (tholos", situada perto de Tituaria (Mafra) e escavada
em 1977.
Discute-se o conceito de pingentes e amuletos.
Estabelecem-se comparações com os ídolos do tipo El Garcel de Almeria
- Los Millares e com os ídolos de Tróia. Admite-se que a ocorrência,
agora registada, possa ser expressão das influências, embora indirectas, havidas
no decurso do terceiro milénio a.c. entre o Mediterrâneo oriental e a
Península Ibérica. Trata-se, com efeito, de peça de adorno e de prestigio.
A bead-amulet found at a "tholos" excavated in 1977 near Tituaria (Mafra)
is studied. The concept of pendant and amulet is discussed. A comparison is
made between this arlifact and idols of El Garcel type (from Almeria - Los
Millares region) and idols found in Tróia.
Fina1ly a possibility is raised of this artifact to be one of the expressions
of contacts, although indirectly, between oriental mediterranean sea and lhe
Iberian Peninsula, along 3. rd millenium B. c., thal would be al lhe origin
of lhe copper metallurgy .A bead-amulet found at a "lholos" exeavated in 1977 near Tituaria (Mafra)
is studied. The concept of pendam and amulet is discussed. A comparison is
made between this arlifaet and idols of EI Careel type (from Almeria - Los
Mil/ares region) and idols found in Tróia.
Fina1ly a possibility is raised of this artlfact to be one of the expressions
of contacts, although indirectly, belween oriental mediteTYanean sea and lhe
Iberian Peninsula, along 3. rd miller/ium B. c., lhal would be al lhe origin
of lhe copper metallurgy
- …