13 research outputs found

    Reliability Study of a Smart Distribution System with Optimal Sizing and Placement of Capacitors

    No full text
    This work introduces a new modified IEEE 33-node test system to be smart by implementing distributed renewable generation, smart metering load characteristics, and optimal installation of capacitors. The Particle Swarm Optimisation (PSO) technique is adopted to compute the optimal sizing and placement of capacitor in the original network. Then, to assess the reliability of the original and modified test systems, a sequential Monte Carlo simulation takes place. The relevant contribution of this paper is that it offers a comprehensive approach of a reliability assessment in a distribution system, where several smart features have been implemented. In addition, the modified system opens a pathway for future research in which smart distribution system analysis is required related mainly to reliability assessment.Brisban

    A design for a secure malware laboratory

    No full text
    La enseñanza de software malicioso se basa en la teoría, en consecuencia, los estudiantes no experimentan con la práctica real. Por lo tanto, cuando se enfrentan a una incidencia creciente en el mundo real, la respuesta no suele ser en el momento adecuado ni lo suficientemente valiosa. Un enfoque práctico proporcionará una comprensión diferente del problema debido al hecho de que el estudiante podrá reconocer comportamientos sospechosos. Este documento propone el diseño de una plataforma completa que experimente con temas relacionados con el malware en un entorno controlado y seguro. La estrategia presentada es una máquina virtual que integra herramientas que incluyen Metasploit Framework, sistemas vulnerables y escáneres de software. Además, hay un tutorial web disponible para la orientación del usuario; incorpora componentes exclusivos adicionales para Metasploit y un tutorial para desarrollarlosMalicious software teaching is based on theory, consequently, students do not experiment with real practice. Therefore, when they confront a rising incidence in the real world, the response is not usually at the adequate time neither valuable enough. A practical focus will provide a different understanding of the problem due to the fact that the student will be able to recognise suspicious behaviour. This paper proposes the design of an entire platform that experiments with topics related to malware in a controlled and safe environment. The strategy presented is a virtual machine that integrates tools including Metasploit Framework, vulnerable systems, and software scanners. Besides, a web tutorial is available for user orientation; it incorporates additional exclusive components for Metasploit and a tutorial to develop them.Cuenc

    A middleware for managing the heterogeneity of data provining from IoT devices in ambient assisted living environments

    No full text
    Internet of Things (IoT) has been growing exponentially in the commercial market in recent years. It is also a fact that people hold one or more computing devices at home. Many of them have been developed to operate through internet connectivity with cloud computing technologies that result in the demand for fast, robust, and secure services. In most cases, the lack of these services makes difficult the transfer of data to fulfill the devices' purposes. Under these conditions, an intermediate layer or middleware is needed to process, filter, and send data through a more efficient alternative. This paper presents the adaptive solution of a middleware architecture as an intermediate layer between smart devices and cloud computing to enhance the management of the heterogeneity of data provining from IoT devices. The proposed middleware provides easy configuration, adaptability, and bearability for different environments. Finally, this solution has been implemented in the healthcare domain, in which IoT solutions are deployed into Ambient Assisted Living (AAL) environments.Quit

    Introducción de una nueva línea de productos para el cuidado personal con valor agregado para la empresa lile s.a.

    Get PDF
    This project uses advanced techniques of marketing for research a plan for aims to broaden the portfolio of brands specifically for cosmetics products for personal care for women. This new line will be commercialized by Leonisa, (LILE S.A.), a Colombian company that in Ecuador is recognized for sales lingerie products. We conducted a market research to determine the acceptance of the products and analyze the characteristics of greatest consumer preference to buying one of this products; is developing a communication plan, a strategic marketing plan and operational in order to analyze the competitive environment, profitability and develop the brand value, developing an appropriate strategy for the positioning of ling. Through a financial plan one could to establish sceneries in order to analyze the situation of the company with this project, using financial index, having a bigger quite acceptable profitability to the minimum one attractive of the company, with a short period of recovery

    Ataques Zero-day: despliegue y evolución

    No full text
    In cybersecurity and computer science, the term “zero-day” is commonly related to troubles, threats, and hazards due to the lack of knowledge, experience, or misunderstanding. A zero-day attack is generally considered a new vulnerability with no defense; thus, the possible attack will have a highrisk probability, and a critical impact. Unfortunately, only a few surveys on the topic are available that would help understand these threats, which are not enough to construct new solutions to detect, prevent, and mitigate them. In this paper, it is conducted a review of the zero-day attack, how to understand its real impact, and a few different accessible solutions nowadays. This study introduces a useful reference that provides researchers with knowledge to understand the current problem concerning zero- days attacks; hence they could develop solutions for facing them

    Semantic Recommender Systems for Digital TV: From Demographic Stereotyping to Personalized Recommendations

    No full text
    Compared to analog transmissions, Digital Television (DTV) standards allows a higher number of available TV stations and consequently, a larger entertainment offer. In this context, Recommender Systems (RS) support users in choosing entertainment content by narrowing their options to a reduced set based on their preferences an interests. However, new users or those having incomplete profiles prevent the system to produce accurate recommendations, which is more noticeable in early stages of the RS. This paper proposes the use of a demographic stereotyping approach based on minimal user attributes acquired during user registration. Furthermore, we propose an experimental procedure that can be used to compare the system accuracy for the created stereotypes and for users making extensive use of the system.Quit

    Decategorizing demographically stereotyped users in a semantic recommender system

    No full text
    In the domain of Digital Television (DTV) broadcasting technology, the enhancement of signals features over classic analog signal transmission allows increasing the amount of content available for TV viewers. Recommender Systems (RS) arose as a suitable choice to assist users in the overwhelming task of selecting audiovisual content, however, the cold-start problem normally associated to the lack of information in early RS stages, causes that user stereotyping approaches are employed meanwhile the lack of information in user profiles is overcome. This paper presents an experimental approach aimed to determine the best conditions for which users who were categorized within a determined stereotype during the cold-start stage, could migrate to a new state in which they receive personalized recommendations. Experimental results show that the best condition under the selected demographic stereotyping scheme for this transition is directly related to the number of TV programs that a user has rated while making use of the system.Valparais

    Development of the CMS detector for the CERN LHC Run 3

    No full text
    International audienceSince the initial data taking of the CERN LHC, the CMS experiment has undergone substantial upgrades and improvements. This paper discusses the CMS detector as it is configured for the third data-taking period of the CERN LHC, Run 3, which started in 2022. The entire silicon pixel tracking detector was replaced. A new powering system for the superconducting solenoid was installed. The electronics of the hadron calorimeter was upgraded. All the muon electronic systems were upgraded, and new muon detector stations were added, including a gas electron multiplier detector. The precision proton spectrometer was upgraded. The dedicated luminosity detectors and the beam loss monitor were refurbished. Substantial improvements to the trigger, data acquisition, software, and computing systems were also implemented, including a new hybrid CPU/GPU farm for the high-level trigger

    Development of the CMS detector for the CERN LHC Run 3

    No full text
    Since the initial data taking of the CERN LHC, the CMS experiment has undergone substantial upgrades and improvements. This paper discusses the CMS detector as it is configured for the third data-taking period of the CERN LHC, Run 3, which started in 2022. The entire silicon pixel tracking detector was replaced. A new powering system for the superconducting solenoid was installed. The electronics of the hadron calorimeter was upgraded. All the muon electronic systems were upgraded, and new muon detector stations were added, including a gas electron multiplier detector. The precision proton spectrometer was upgraded. The dedicated luminosity detectors and the beam loss monitor were refurbished. Substantial improvements to the trigger, data acquisition, software, and computing systems were also implemented, including a new hybrid CPU/GPU farm for the high-level trigger.Since the initial data taking of the CERN LHC, the CMS experiment has undergone substantial upgrades and improvements. This paper discusses the CMS detector as it is configured for the third data-taking period of the CERN LHC, Run 3, which started in 2022. The entire silicon pixel tracking detector was replaced. A new powering system for the superconducting solenoid was installed. The electronics of the hadron calorimeter was upgraded. All the muon electronic systems were upgraded, and new muon detector stations were added, including a gas electron multiplier detector. The precision proton spectrometer was upgraded. The dedicated luminosity detectors and the beam loss monitor were refurbished. Substantial improvements to the trigger, data acquisition, software, and computing systems were also implemented, including a new hybrid CPU/GPU farm for the high-level trigger

    Development of the CMS detector for the CERN LHC Run 3

    No full text
    International audienceSince the initial data taking of the CERN LHC, the CMS experiment has undergone substantial upgrades and improvements. This paper discusses the CMS detector as it is configured for the third data-taking period of the CERN LHC, Run 3, which started in 2022. The entire silicon pixel tracking detector was replaced. A new powering system for the superconducting solenoid was installed. The electronics of the hadron calorimeter was upgraded. All the muon electronic systems were upgraded, and new muon detector stations were added, including a gas electron multiplier detector. The precision proton spectrometer was upgraded. The dedicated luminosity detectors and the beam loss monitor were refurbished. Substantial improvements to the trigger, data acquisition, software, and computing systems were also implemented, including a new hybrid CPU/GPU farm for the high-level trigger
    corecore