2 resultados para Variabile ambientale concentrazione di benzene in atmosfera, software ILWIS(Integrated Land and Water Information System)
em Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco
Resumo:
Single-spin asymmetries were investigated in inclusive electroproduction of charged pions and kaons from transversely polarized protons at the HERMES experiment. The asymmetries were studied as a function of the azimuthal angle psi about the beam direction between the target-spin direction and the hadron production plane, the transverse hadron momentum P-T relative to the direction of the incident beam, and the Feynman variable x(F). The sin psi* amplitudes are positive for pi(+) and K+ slightly negative for pi(-) and consistent with zero for K-, with particular P-T but weak x(F) dependences. Especially large asymmetries are observed for two small subsamples of events, where also the scattered electron was recorded by the spectrometer. (C) 2013 The Authors. Published by Elsevier B.V. All rights reserved.
Resumo:
Nowadays, Power grids are critical infrastructures on which everything else relies, and their correct behavior is of the highest priority. New smart devices are being deployed to be able to manage and control power grids more efficiently and avoid instability. However, the deployment of such smart devices like Phasor Measurement Units (PMU) and Phasor Data Concentrators (PDC), open new opportunities for cyber attackers to exploit network vulnerabilities. If a PDC is compromised, all data coming from PMUs to that PDC is lost, reducing network observability. Our approach to solve this problem is to develop an Intrusion detection System (IDS) in a Software-defined network (SDN). allowing the IDS system to detect compromised devices and use that information as an input for a self-healing SDN controller, which redirects the data of the PMUs to a new, uncompromised PDC, maintaining the maximum possible network observability at every moment. During this research, we have successfully implemented Self-healing in an example network with an SDN controller based on Ryu controller. We have also assessed intrinsic vulnerabilities of Wide Area Management Systems (WAMS) and SCADA networks, and developed some rules for the Intrusion Detection system which specifically protect vulnerabilities of these networks. The integration of the IDS and the SDN controller was also successful. \\To achieve this goal, the first steps will be to implement an existing Self-healing SDN controller and assess intrinsic vulnerabilities of Wide Area Measurement Systems (WAMS) and SCADA networks. After that, we will integrate the Ryu controller with Snort, and create the Snort rules that are specific for SCADA or WAMS systems and protocols.