75 resultados para Beiwu intrusion, Hajiang suture zone, southwest China
Resumo:
Choudhuri and Gilman (1987) considered certain implications of the hypothesis that the magnetic flux within the Sun is generated at the bottom of the convection zone and then rises through it. Taking flux rings symmetric around the rotation axis and using reasonable values of different parameters, they found that the Coriolis force deflects these flux rings into trajectories parallel to the rotation axis so that they emerge at rather high latitudes. This paper looks into the question of whether the action of the Coriolis force is subdued when the initial configuration of the flux ring has non-axisymmetries in the form of loop structures. The results depend dramatically on whether the flux ring with the loops lies completely within the convection zone or whether the lower parts of it are embedded in the stable layers underneath the convection zone. In the first case, the Coriolis force supresses the non-axisymmetric perturbations so that the flux ring tends to remain symmetric and the trajectories are very similar to those of Choudhuri and Gilman (1987). In the second case, however, the lower parts of the flux ring may remain anchored underneath the bottom of the convection zone, but the upper parts of the loops still tend to move parallel to the rotation axis and emerge at high latitudes. Thus the problem of the magnetic flux not being able to come out at the sunspot latitudes still persists after the non-axisymmetries in the flux rings are taken into account.
Resumo:
The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.
Resumo:
We consider the problem of quickest detection of an intrusion using a sensor network, keeping only a minimal number of sensors active. By using a minimal number of sensor devices, we ensure that the energy expenditure for sensing, computation and communication is minimized (and the lifetime of the network is maximized). We model the intrusion detection (or change detection) problem as a Markov decision process (MDP). Based on the theory of MDP, we develop the following closed loop sleep/wake scheduling algorithms: (1) optimal control of Mk+1, the number of sensors in the wake state in time slot k + 1, (2) optimal control of qk+1, the probability of a sensor in the wake state in time slot k + 1, and an open loop sleep/wake scheduling algorithm which (3) computes q, the optimal probability of a sensor in the wake state (which does not vary with time), based on the sensor observations obtained until time slot k. Our results show that an optimum closed loop control on Mk+1 significantly decreases the cost compared to keeping any number of sensors active all the time. Also, among the three algorithms described, we observe that the total cost is minimum for the optimum control on Mk+1 and is maximum for the optimum open loop control on q.
Resumo:
Acoustic emission (AE) energy, instead of amplitude, associated with each of the event is used to estimate the fracture process zone (FPZ) size. A steep increase in the cumulative AE energy of the events with respect to time is correlated with the formation of FPZ. Based on the AE energy released during these events and the locations of the events, FPZ size is obtained. The size-independent fracture energy is computed using the expressions given in the boundary effect model by least squares method since over-determined system of equations are obtained when data from several specimens are used. Instead of least squares method a different method is suggested in which the transition ligament length, measured from the plot of histograms of AE events plotted over the un-cracked ligament, is used directly to obtain size-independent fracture energy. The fracture energy thus calculated seems to be size-independent.
Resumo:
The MIT Lincoln Laboratory IDS evaluation methodology is a practical solution in terms of evaluating the performance of Intrusion Detection Systems, which has contributed tremendously to the research progress in that field. The DARPA IDS evaluation dataset has been criticized and considered by many as a very outdated dataset, unable to accommodate the latest trend in attacks. Then naturally the question arises as to whether the detection systems have improved beyond detecting these old level of attacks. If not, is it worth thinking of this dataset as obsolete? The paper presented here tries to provide supporting facts for the use of the DARPA IDS evaluation dataset. The two commonly used signature-based IDSs, Snort and Cisco IDS, and two anomaly detectors, the PHAD and the ALAD, are made use of for this evaluation purpose and the results support the usefulness of DARPA dataset for IDS evaluation.
Resumo:
The motivation behind the fusion of Intrusion Detection Systems was the realization that with the increasing traffic and increasing complexity of attacks, none of the present day stand-alone Intrusion Detection Systems can meet the high demand for a very high detection rate and an extremely low false positive rate. Multi-sensor fusion can be used to meet these requirements by a refinement of the combined response of different Intrusion Detection Systems. In this paper, we show the design technique of sensor fusion to best utilize the useful response from multiple sensors by an appropriate adjustment of the fusion threshold. The threshold is generally chosen according to the past experiences or by an expert system. In this paper, we show that the choice of the threshold bounds according to the Chebyshev inequality principle performs better. This approach also helps to solve the problem of scalability and has the advantage of failsafe capability. This paper theoretically models the fusion of Intrusion Detection Systems for the purpose of proving the improvement in performance, supplemented with the empirical evaluation. The combination of complementary sensors is shown to detect more attacks than the individual components. Since the individual sensors chosen detect sufficiently different attacks, their result can be merged for improved performance. The combination is done in different ways like (i) taking all the alarms from each system and avoiding duplications, (ii) taking alarms from each system by fixing threshold bounds, and (iii) rule-based fusion with a priori knowledge of the individual sensor performance. A number of evaluation metrics are used, and the results indicate that there is an overall enhancement in the performance of the combined detector using sensor fusion incorporating the threshold bounds and significantly better performance using simple rule-based fusion.
Resumo:
The momentum balance of the linear-combination integral model for the transition zone is investigated for constant pressure flows. The imbalance is found to be small enough to be negligible for all practical purposes. [S0889-504X(00)00703-0].
Resumo:
We present a low-complexity algorithm for intrusion detection in the presence of clutter arising from wind-blown vegetation, using Passive Infra-Red (PIR) sensors in a Wireless Sensor Network (WSN). The algorithm is based on a combination of Haar Transform (HT) and Support-Vector-Machine (SVM) based training and was field tested in a network setting comprising of 15-20 sensing nodes. Also contained in this paper is a closed-form expression for the signal generated by an intruder moving at a constant velocity. It is shown how this expression can be exploited to determine the direction of motion information and the velocity of the intruder from the signals of three well-positioned sensors.
Resumo:
New methods involving the manipulation of fundamental wavefronts (e.g., plane and spherical) with simple optical components such as pinholes and spherical lenses have been developed for the fabrication of elliptic, hyperbolic and conical holographic zone plates. Also parabolic zone plates by holographic techniques have been obtained for the first time. The performance behaviour of these zone plates has been studied. Further a phenomenological explanation is offered for the observed improved fringe contrast obtained with a spherical reference wave.
Resumo:
Working under the hypothesis that magnetic flux in the sun is generated at the bottom of the convection zone, Choudhuri and Gilman (1987; Astrophys. J. 316, 788) found that a magnetic flux tube symmetric around the rotation axis, when released at the bottom of the convection zone, gets deflected by the Coriolis force and tends to move parallel to the rotation axis as it rises in the convection zone. As a result, all the flux emerges at rather high latitudes and the flux observed at the typical sunspot latitudes remains unexplained. Choudhuri (1989; Solar Physics, in press) finds that non-axisymmetric perturbations too cannot subdue the Coriolis force. In this paper, we no longer treat the convection zone to be passive as in the previous papers, but we consider the role of turbulence in the convection zone in inhibiting the Coriolis force. The interaction of the flux tubes with the turbulence is treated in a phenomenological way as follows: (1) Large scale turbulence on the scale of giant cells can physically drag the tubes outwards, thus pulling the flux towards lower latitudes by dominating over the Coriolis force. (2) Small scale turbulence of the size of the tubes can exchange angular momentum with the tube, thus suppressing the growth of the Coriolis force and making the tubes emerge at lower latitudes. Numerical simulations show that the giant cells can drag the tubes and make them emerge at lower latitufes only if the velocities within the giant cells are unrealistically large of if the radii of the flux tubes are as small as 10 km. However, small scale turbulence can successfully suppress the growth of the Coriolis force if the tubes have radii smaller than about 300 km which may not be unreasonable. Such flux tubes can then emerge at low latitudes where sunspots are seen.