Um dos desafios da agricultura de precisão é oferecer subsídios para a definição de unidades de manejo para posteriores intervenções. Portanto, o objetivo deste trabalho foi avaliar os atributos químicos do solo e a produtividade da cultura de cana-de-açúcar por meio da geoestatística e mineração de dados pela indução da árvore de decisão. A produtividade da cana-de-açúcar foi mapeada em uma área de aproximadam...
A colheita da cana-de-açúcar envolve cinco operações básicas, que são o corte dos colmos na base, o corte dos colmos no ponteiro, a alimentação dos colmos para o interior da colhedora, a retirada das folhas e a picagem do colmo, que é opcional. No entanto, ainda hoje há uma carência de processos para efetuar estas operações de forma eficiente. O corte de base utilizado nas colhedoras convencionais é composto de...
Tese de doutoramento (ramo de conhecimento em Tecnologias e Sistemas de Informação) ; Os processos de autenticação representam, em qualquer sistema, um ponto crítico que exige processos confiáveis, dado que são a base para o estabelecimento das relações de confiança que estão subjacentes aos privilégios atribuidos a cada utilizador. Tradicionalmente, estes processos baseiam-se na partilha de um segredo entre o...
The majority of computer systems employ a login ID and password as the principal method for access security. In stand-alone situations, this level of security may be adequate, but when computers are connected to the internet, the vulnerability to a security breach is increased. In order to reduce vulnerability to attack, biometric solutions have been employed. In this paper, we investigate the use of a behaviou...
The information agent has requirements in the Information Technology (IT) age that are in everything comparable to those of one hundred years ago. But, despite being similar, they require new forms of implementation due to the evolution of the communication platforms and protocols and to the increase in the amount of information that has to be known, stored, transmitted, and interpreted. Although, in many situa...
The traditional authentication system used in technological applications is the well-known and widely spread user/password pair. This technology as proved itself as well acceptable by the users and quite safe when used according to good security practices, this is: frequent change of the password; use of letters, number and symbols in the password; not revealing the password to others; not using the same passwo...
Authenticating a user is a complex problem in which we depend to provide some level of trust to the Security Proceedings of the Information System and to the Information System itself. Biometric technologies have shown that they are able to provide high rates of accuracy but they also raise many ethical issues. On the other side of the problem, many times authentication must be made without the collaboration of...
Comunicação apresentada na 2nd Annual International Conference on Global e-Security, Docklands, UK, 20 - 22 April 2006. ; Most computer systems are secured using a login id and password. When computers are connected to the internet, they become more vulnerable as more machines are available to attack them. In this paper, we present a novel method for protecting/enhancing login protection that can reduce the ...
For a query in a Research Information System (CRIS) to return adequate results, it is necessary that the system can “understand” the intention of the enquiring agent. One possible approach to guarantee the success of this communication is to create an intermediate module, responsible for the knowledge discovery processes, that can define concepts translatable in the languages used by the different agents involv...
E-mail systems are essential, but they also provide terrorists with an opportunity to impersonate public officials and, with the legitimacy and authority of the alleged sender, obtain collaborations or spread misinformation in critical situations, where the urgent need to responses relegates identity confirmations to a lower priority. This paper presents an e-mail system architecture that uses Public Key Infras...
Financiadores do RCAAP | |||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |