388 resultados para Extended techniques


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Lead is present everywhere in the environment and has been defined as one of the greatest threats to the human health. In this paper, attempts have been made to study a way of recycling the lead produced from waste usage and disposed of in such a way as to avoid degrading the surrounding environment. In order to contain the waste, recycled asphalt material is mixed with the lead and then heated with microwave energy. This is an attempt to solidify and reduce the lead contaminants and use the final product as sub-base material in road pavement construction. The microwave heating of the specimens is carried out with 30%, 50%, 80% and 100% of power at 800W. The optimum power mode is used to compare with the conventional heating of asphalt with sulfur additive. The results are characterized by compact density, permeability, and subjected to toxicity test with regards to lead concentration. A mechanical test to evaluate the stability is also performed on the three methods of solidification and to prove that microwave zapping method allow to convert into an environmentally stable material for recycling without having to be deposited in a landfill site.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.