97 resultados para MAFIC INTRUSION


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Given there is currently a migration trend from traditional electrical supervisory control and data acquisition (SCADA) systems towards a smart grid based approach to critical infrastructure management. This project provides an evaluation of existing and proposed implementations for both traditional electrical SCADA and smart grid based architectures, and proposals a set of reference requirements which test bed implementations should implement. A high-level design for smart grid test beds is proposed and initial implementation performed, based on the proposed design, using open source and freely available software tools. The project examines the move towards smart grid based critical infrastructure management and illustrates the increased security requirements. The implemented test bed provides a basic framework for testing network requirements in a smart grid environment, as well as a platform for further research and development. Particularly to develop, implement and test network security related disturbances such as intrusion detection and network forensics. The project undertaken proposes and develops an architecture of the emulation of some smart grid functionality. The Common Open Research Emulator (CORE) platform was used to emulate the communication network of the smart grid. Specifically CORE was used to virtualise and emulate the TCP/IP networking stack. This is intended to be used for further evaluation and analysis, for example the analysis of application protocol messages, etc. As a proof of concept, software libraries were designed, developed and documented to enable and support the design and development of further smart grid emulated components, such as reclosers, switches, smart meters, etc. As part of the testing and evaluation a Modbus based smart meter emulator was developed to provide basic functionality of a smart meter. Further code was developed to send Modbus request messages to the emulated smart meter and receive Modbus responses from it. Although the functionality of the emulated components were limited, it does provide a starting point for further research and development. The design is extensible to enable the design and implementation of additional SCADA protocols. The project also defines an evaluation criteria for the evaluation of the implemented test bed, and experiments are designed to evaluate the test bed according to the defined criteria. The results of the experiments are collated and presented, and conclusions drawn from the results to facilitate discussion on the test bed implementation. The discussion undertaken also present possible future work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In their correspondence, He and colleagues question our conclusion of little or no uplift preceding Emeishan volcanism that we reported in our letter1. Debate concerns the nature of the contact between the Maokou limestone and Emeishan volcanics, the depositional environment and volumetric significance of mafic hydromagmatic deposits (MHDs), and evidence for symmetrical domal thinning. MHDs in the Daqiao section are separated from the Maokou limestone by 100 m of subaerial basaltic lavas, but elsewhere MHDs — previously interpreted as basal conglomerates2, 3 — directly overlie the Maokou2, 3. MHDs thus feature strongly in basal sections of the Emeishan lava succession, as also recently shown4 elsewhere in the Emeishan. An irregular surface at the top of the Maokou limestone has been interpreted as an erosional unconformity2, 3, but clastic deposits presented as evidence of this erosion2, 3 are MHDs produced by explosive magma–water interaction1. A clear demonstration that this irregular top surface is an erosional truncation of limestone reef facies (slope/rim, flat, lagoonal) is currently lacking, but is critical because reefs and carbonate platforms show considerable natural relief of tens of metres. The persistent hot, wet climate since the Oligocene has produced well-developed weathering profiles on exposed Palaeozoic marine sedimentary sequences5, but weathering and karst relief of the uppermost Maokou limestone underlying the flood basalts have not been properly documented, nor shown to be of middle Permian age and immediately preceding emplacement of the large igneous province.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Voluminous (≥3·9 × 105 km3), prolonged (∼18 Myr) explosive silicic volcanism makes the mid-Tertiary Sierra Madre Occidental province of Mexico one of the largest intact silicic volcanic provinces known. Previous models have proposed an assimilation–fractional crystallization origin for the rhyolites involving closed-system fractional crystallization from crustally contaminated andesitic parental magmas, with <20% crustal contributions. The lack of isotopic variation among the lower crustal xenoliths inferred to represent the crustal contaminants and coeval Sierra Madre Occidental rhyolite and basaltic andesite to andesite volcanic rocks has constrained interpretations for larger crustal contributions. Here, we use zircon age populations as probes to assess crustal involvement in Sierra Madre Occidental silicic magmatism. Laser ablation-inductively coupled plasma-mass spectrometry analyses of zircons from rhyolitic ignimbrites from the northeastern and southwestern sectors of the province yield U–Pb ages that show significant age discrepancies of 1–4 Myr compared with previously determined K/Ar and 40Ar/39Ar ages from the same ignimbrites; the age differences are greater than the errors attributable to analytical uncertainty. Zircon xenocrysts with new overgrowths in the Late Eocene to earliest Oligocene rhyolite ignimbrites from the northeastern sector provide direct evidence for some involvement of Proterozoic crustal materials, and, potentially more importantly, the derivation of zircon from Mesozoic and Eocene age, isotopically primitive, subduction-related igneous basement. The youngest rhyolitic ignimbrites from the southwestern sector show even stronger evidence for inheritance in the age spectra, but lack old inherited zircon (i.e. Eocene or older). Instead, these Early Miocene ignimbrites are dominated by antecrystic zircons, representing >33 to ∼100% of the dated population; most antecrysts range in age between ∼20 and 32 Ma. A sub-population of the antecrystic zircons is chemically distinct in terms of their high U (>1000 ppm to 1·3 wt %) and heavy REE contents; these are not present in the Oligocene ignimbrites in the northeastern sector of the Sierra Madre Occidental. The combination of antecryst zircon U–Pb ages and chemistry suggests that much of the zircon in the youngest rhyolites was derived by remelting of partially molten to solidified igneous rocks formed during preceding phases of Sierra Madre Occidental volcanism. Strong Zr undersaturation, and estimations for very rapid dissolution rates of entrained zircons, preclude coeval mafic magmas being parental to the rhyolite magmas by a process of lower crustal assimilation followed by closed-system crystal fractionation as interpreted in previous studies of the Sierra Madre Occidental rhyolites. Mafic magmas were more probably important in providing a long-lived heat and material flux into the crust, resulting in the remelting and recycling of older crust and newly formed igneous materials related to Sierra Madre Occidental magmatism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Elaborated Intrusion (EI) theory of desire posits that visual imagery plays a key role in craving. We report a series of experiments testing this hypothesis in a drug addiction context. Experiment 1 showed that a mental visual imagery task with neutral content reduced cigarette craving in abstaining smokers, but that an equivalent auditory task did not. The effect of visual imagery was replicated in Experiment 2, which also showed comparable effects of non-imagery visual working memory interference. Experiment 3 showed that the benefit of visual over auditory interference was not dependent upon imagery being used to induce craving. Experiment 4 compared a visuomotor task, making shapes from modeling clay, with a verbal task (counting back from 100), and again showed a benefit of the visual over the non-visual task. We conclude that visual imagery supports craving for cigarettes. Competing imagery or visual working memory tasks may help tackle craving in smokers trying to quit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Groundwater is a major resource on Bribie Island and its sustainable management is essential to maintain the natural and modified eco-systems, as well as the human population and the integrity of the island as a sand mass. An effective numerical model is essential to enable predictions, and to test various water use and rainfall/climate scenarios. Such a numerical model must, however, be based on a representative conceptual hydrogeological model to allow incorporation of realistic controls and processes. Here we discuss the various hydrogeological models and parameters, and hydrological properties of the materials forming the island. We discuss the hydrological processes and how they can be incorporated into these models, in an integrated manner. Processes include recharge, discharge to wetlands and along the coastline, abstraction, evapotranspiration and potential seawater intrusion. The types and distributions of groundwater bores and monitoring are considered, as are scenarios for groundwater supply abstraction. Different types of numerical models and their applicability are also considered

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bacterially mediated iron redox cycling exerts a strong influence on groundwater geochemistry, but few studies have investigated iron biogeochemical processes in coastal alluvial aquifers from a microbiological viewpoint. The shallow alluvial aquifer located adjacent to Poona estuary on the subtropical Southeast Queensland coast represents a redox-stratified system where iron biogeochemical cycling potentially affects water quality. Using a 300 m transect of monitoring wells perpendicular to the estuary, we examined groundwater physico-chemical conditions and the occurrence of cultivable bacterial populations involved in iron (and manganese, sulfur) redox reactions in this aquifer. Results showed slightly acidic and near-neutral pH, suboxic conditions and an abundance of dissolved iron consisting primarily of iron(II) in the majority of wells. The highest level of dissolved iron(III) was found in a well proximal to the estuary most likely a result of iron curtain effects due to tidal intrusion. A number of cultivable, (an)aerobic bacterial populations capable of diverse carbon, iron, or sulfur metabolism coexisted in groundwater redox transition zones. Our findings indicated aerobic, heterotrophic respiration and bacterially mediated iron/sulfur redox reactions were integral to carbon cycling in the aquifer. High abundances of dissolved iron and cultivable iron and sulfur bacterial populations in estuary-adjacent aquifers have implications for iron transport to marine waters. This study demonstrated bacterially mediated iron redox cycling and associated biogeochemical processes in subtropical coastal groundwaters using culture-based methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two main deformational phases are recognised in the Archaean Boorara Domain of the Kalgoorlie Terrane, Eastern Goldfields Superterrane, Yilgarn Craton, Western Australia, primarily involving southover- north thrust faulting that repeated and thickened the stratigraphy, followed by east northeast – west-southwest shortening that resulted in macroscale folding of the greenstone lithologies. The domain preserves mid-greenschist facies metamorphic grade, with an increase to lower amphibolite metamorphic grade towards the north of the region. As a result of the deformation and metamorphism, individual stratigraphic horizons are difficult to trace continuously throughout the entire domain. Volcanological and sedimentological textures and structures, primary lithological contacts, petrography and geochemistry have been used to correlate lithofacies between faultbounded structural blocks. The correlated stratigraphic sequence for the Boorara Domain comprises quartzo-feldspathic turbidite packages, overlain by high-Mg tholeiitic basalt (lower basalt), coherent and clastic dacite facies, intrusive and extrusive komatiite units, an overlying komatiitic basalt unit (upper basalt), and at the stratigraphic top of the sequence, volcaniclastic quartz-rich turbidites. Reconstruction of the stratigraphy and consideration of emplacement dynamics has allowed reconstruction of the emplacement history and setting of the preserved sequence. This involves a felsic, mafic and ultramafic magmatic system emplaced as high-level intrusions, with localised emergent volcanic centres, into a submarine basin in which active sedimentation was occurring.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the mid seventies there was a spate of legal claims involving unincorporated not-for-profit associations. These claims highlighted the liability exposure of management committee members and prompted a dramatic increase in the number of associations seeking shelter behind the corporate veil. Corporate structure decisions during this period were primarily motivated by the incentive of limited liability. Twenty years later, the not-for-profit sector is subject to new challenges. The Industry Commission Report into Charitable Organisations in Australia heralds an increasing intrusion of legislative responsibilities and reform in the sector. The traditional sources of funds for not-for-profit organisations are about to radically change with the advent of “competitive tendering” for government funding and the declining benevolence of society. The legal scuffle between Australian Rugby Football League Limited (the “ARL”) and News Limited has also exposed the vulnerability of not-for-profit groups and the many legal and commercial minefields in structural decision-making. The sector is beginning to respond to these pressures by rationalisation and restructure. Corporate structure decisions are now motivated by the need to promote efficiency and resilience. Survival of the fittest. Restructuring is by no means a task for the faint-hearted. A delicate balance between legality and practicality needs to be maintained. The focus of this paper is on the restructuring choices for not-for-profit organisations and groups in Queensland. It answers “how-to” questions and identifies some important restructuring issues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Elaborated Intrusion theory (EI theory; Kavanagh, Andrade, & May, 2005) posits two main cognitive components in craving: associative processes that lead to intrusive thoughts about the craved substance or activity, and elaborative processes supporting mental imagery of the substance or activity. We used a novel visuospatial task to test the hypothesis that visual imagery plays a key role in craving. Experiment 1 showed that spending 10 min constructing shapes from modeling clay (plasticine) reduced participants' craving for chocolate compared with spending 10 min 'letting your mind wander'. Increasing the load on verbal working memory using a mental arithmetic task (counting backwards by threes) did not reduce craving further. Experiment 2 compared effects on craving of a simpler verbal task (counting by ones) and clay modeling. Clay modeling reduced overall craving strength and strength of craving imagery, and reduced the frequency of thoughts about chocolate. The results are consistent with EI theory, showing that craving is reduced by loading the visuospatial sketchpad of working memory but not by loading the phonological loop. Clay modeling might be a useful self-help tool to help manage craving for chocolate, snacks and other foods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sensory imagery is a powerful tool for inducing craving because it is a key component of the cognitive system that underpins human motivation. The role of sensory imagery in motivation is explained by Elaborated Intrusion (EI) theory. Imagery plays an important role in motivation because it conveys the emotional qualities of the desired event, mimicking anticipated pleasure or relief, and continual elaboration of the imagery ensures that the target stays in mind. We argue that craving is a conscious state, intervening between unconscious triggers and consumption, and summarise evidence that interfering with sensory imagery can weaken cravings. We argue that treatments for addiction can be enhanced by the application of EI theory to maintain motivation, and assist in the management of craving in high-risk situations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis was applied which lead to a decrease of about 80 of the amount of monitored features.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A complex attack is a sequence of temporally and spatially separated legal and illegal actions each of which can be detected by various IDS but as a whole they constitute a powerful attack. IDS fall short of detecting and modeling complex attacks therefore new methods are required. This paper presents a formal methodology for modeling and detection of complex attacks in three phases: (1) we extend basic attack tree (AT) approach to capture temporal dependencies between components and expiration of an attack, (2) using enhanced AT we build a tree automaton which accepts a sequence of actions from input message streams from various sources if there is a traversal of an AT from leaves to root, and (3) we show how to construct an enhanced parallel automaton that has each tree automaton as a subroutine. We use simulation to test our methods, and provide a case study of representing attacks in WLANs.