Analisando a Viabilidade da Implementação Prática de Sistemas Tolerantes a Intrusões

With the evolution of Robotics is requested therobots automation and the use of techniques from the areas ofartificial intelligence and computer vision are essential. Footballmatches between robots is a very interesting scenario that allowsthe realization of experiments and real tests for perfecting therobots. The matches are a form inspiring in the study of robotics,computer vision and artificial intelligence, because only with acamera getting a bird's-eye view of the football field, you shouldimplement a strategy game that feeds of information generated byimage processing. This article proposes an efficient segmentationmethod of the robot invariant to brightness, interesting fact sinceother computer vision systems depend on a lot of light. MicrosoftKinect, which has an RGB camera, obtains the color imagesand an infrared camera returns the distance (depth) betweenMicrosoft Kinect and the objects captured by the camera. Thesystem consists of two steps, first the image of infrared camerais segmented through the depth and subsequently only the areaof interest is segmented again using the Otsu method on a RGBimage. Rafael R. ObelheiroAlysson Neves BessaniLau Cheuk Lung

Building secure, inviolable systems using traditional mechanisms is increasingly becoming an unattainable goal. Recognition of this fact has increased interest in alternative approaches to security such as intrusion tolerance, which applies fault tolerance concepts and techniques to security problems. One of the main issues surrounding intrusion-tolerant systems is that many of the algorithms used for building them assume that system components fail or are compromised independently, and this assumption has been repeatedly called into question. In this paper we show that diversity enables us to build real intrusion-tolerant systems. We investigate several kinds of diversity and discuss how they can help with this task. Furthermore, we provide a practical example of how an intrusion-tolerant system can be built using diversity.

Caso o link acima esteja inválido, faça uma busca pelo texto completo na Web: Buscar na Web

Biblioteca Digital Brasileira de Computação - Contato:
     Mantida por: