5 resultados para open Hamiltonian systems
em Nottingham eTheses
Resumo:
We propose an adaptive mesh refinement strategy based on exploiting a combination of a pre-processing mesh re-distribution algorithm employing a harmonic mapping technique, and standard (isotropic) mesh subdivision for discontinuous Galerkin approximations of advection-diffusion problems. Numerical experiments indicate that the resulting adaptive strategy can efficiently reduce the computed discretization error by clustering the nodes in the computational mesh where the analytical solution undergoes rapid variation.
Resumo:
In this article we consider the a posteriori error estimation and adaptive mesh refinement of discontinuous Galerkin finite element approximations of the bifurcation problem associated with the steady incompressible Navier-Stokes equations. Particular attention is given to the reliable error estimation of the critical Reynolds number at which a steady pitchfork or Hopf bifurcation occurs when the underlying physical system possesses reflectional or Z_2 symmetry. Here, computable a posteriori error bounds are derived based on employing the generalization of the standard Dual-Weighted-Residual approach, originally developed for the estimation of target functionals of the solution, to bifurcation problems. Numerical experiments highlighting the practical performance of the proposed a posteriori error indicator on adaptively refined computational meshes are presented.
Resumo:
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules
Resumo:
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules
Resumo:
This paper reports the results of a postal survey of intermediate care co-ordinators (ICCs) on the organization and delivery of intermediate care services for older people in England, conducted between November 2003 and May 2004. Questionnaires, which covered a range of issues with a variety of quantitative, ‘tick-box’ and open-ended questions, were returned by 106 respondents, representing just over 35% of primary care trusts (PCTs). We discuss the role of ICCs, the integration of local systems of intermediate care provision, and the form, function and model of delivery of services described by respondents. Using descriptive and statistical analysis of the responses, we highlight in particular the relationship between provision of admission avoidance and supported discharge, the availability of 24-hour care, and the locations in which care is provided, and relate our findings to the emerging evidence base for intermediate care, guidance on implementation from central government, and debate in the literature. Whilst the expansion and integration of intermediate care appear to be continuing apace, much provision seems concentrated in supported discharge services rather than acute admission avoidance, and particularly in residential forms of post-acute intermediate care. Supported discharge services tend to be found in residential settings, while admission avoidance provision tends to be non-residential in nature. Twenty-four hour care in non-residential settings is not available in several responding PCTs. These findings raise questions about the relationship between the implementation of intermediate care and the evidence for and aims of the policy as part of NHS modernization, and the extent to which intermediate care represents a genuinely novel approach to the care and rehabilitation of older people.