2 resultados para Artificial potential fields
em Abertay Research Collections - Abertay University’s repository
Resumo:
This paper is the second in a series of studies working towards constructing a realistic, evolving, non-potential coronal model for the solar magnetic carpet. In the present study, the interaction of two magnetic elements is considered. Our objectives are to study magnetic energy build-up, storage and dissipation as a result of emergence, cancellation, and flyby of these magnetic elements. In the future these interactions will be the basic building blocks of more complicated simulations involving hundreds of elements. Each interaction is simulated in the presence of an overlying uniform magnetic field, which lies at various orientations with respect to the evolving magnetic elements. For these three small-scale interactions, the free energy stored in the field at the end of the simulation ranges from 0.2 – 2.1×1026 ergs, whilst the total energy dissipated ranges from 1.3 – 6.3×1026 ergs. For all cases, a stronger overlying field results in higher energy storage and dissipation. For the cancellation and emergence simulations, motion perpendicular to the overlying field results in the highest values. For the flyby simulations, motion parallel to the overlying field gives the highest values. In all cases, the free energy built up is sufficient to explain small-scale phenomena such as X-ray bright points or nanoflares. In addition, if scaled for the correct number of magnetic elements for the volume considered, the energy continually dissipated provides a significant fraction of the quiet Sun coronal heating budget.
Resumo:
The Internet of things (IoT) is still in its infancy and has attracted much interest in many industrial sectors including medical fields, logistics tracking, smart cities and automobiles. However, as a paradigm, it is susceptible to a range of significant intrusion threats. This paper presents a threat analysis of the IoT and uses an Artificial Neural Network (ANN) to combat these threats. A multi-level perceptron, a type of supervised ANN, is trained using internet packet traces, then is assessed on its ability to thwart Distributed Denial of Service (DDoS/DoS) attacks. This paper focuses on the classification of normal and threat patterns on an IoT Network. The ANN procedure is validated against a simulated IoT network. The experimental results demonstrate 99.4% accuracy and can successfully detect various DDoS/DoS attacks.