58 resultados para Column of Marcus Aurelius (Rome, Italy)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Active network scanning injects traffic into a network and observes responses to draw conclusions about the network. Passive network analysis works by looking at network meta data or by analyzing traffic as it traverses a fixed point on the network. It may be infeasible or inappropriate to scan critical infrastructure networks. Techniques exist to uniquely map assets without resorting to active scanning. In many cases, it is possible to characterize and identify network nodes by passively analyzing traffic flows. These techniques are considered in particular with respect to their application to power industry critical infrastructure.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a framework for a telecommunications interface which allows data from sensors embedded in Smart Grid applications to reliably archive data in an appropriate time-series database. The challenge in doing so is two-fold, firstly the various formats in which sensor data is represented, secondly the problems of telecoms reliability. A prototype of the authors' framework is detailed which showcases the main features of the framework in a case study featuring Phasor Measurement Units (PMU) as the application. Useful analysis of PMU data is achieved whenever data from multiple locations can be compared on a common time axis. The prototype developed highlights its reliability, extensibility and adoptability; features which are largely deferred from industry standards for data representation to proprietary database solutions. The open source framework presented provides link reliability for any type of Smart Grid sensor and is interoperable with existing proprietary database systems, and open database systems. The features of the authors' framework allow for researchers and developers to focus on the core of their real-time or historical analysis applications, rather than having to spend time interfacing with complex protocols.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many timber structures may require strengthening due to either decay and aging or an increase of load. This paper presents an experimental study in which eleven timber beams were tested, including three unstrengthened reference beams and eight beams strengthened with NSM CFRP bars. The test parameters include the position of NSM (tensile face or the bottom of the sides), the number of CFRP bars (1 or 2), and additional anchorage of NSM CFRP bars (steel wire U anchors or CFRP U strips). The test results show that the ultimate flexural strength of the timber beams were increased by 14%∼85% with an average of 47% due to NSM CFRP bar strengthening. Their deflection corresponding to the peak load was increased by 33% in average.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

RC beams shear-strengthened with externally-bonded FRP side strips or U-strips usually fail by debonding. As such debonding occurs in a brittle manner at relatively small shear crack widths, some of the internal steel stirrups may not have reached yielding at beam shear failure. Consequently, the internal steel stirrups cannot be fully utilized. This adverse shear interaction between internal steel stirrups and external FRP strips may significantly reduce the benefit of shear-strengthening FRP but has not been considered by any of the existing FRP strengthening design guidelines. In this paper, an improved shear strength model capable of accounting for the effect of the above shear interaction is first presented, in which the unfavorable effect of shear interaction is reflected through a reduction factor (i.e. shear interaction factor). Using a large test database established in the present study, the performance of the proposed model as well as that of three other shear strength models is then assessed. This assessment shows that the proposed shear strength model performs better than the three existing models. The assessment also shows that the inclusion of the proposed shear interaction factor in the existing models can significantly improve their performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The recent ‘horse meat scandal’ in Europe has sparked huge concerns among consumers, as horse meat was found in beef lasagne ready to be consumed. Within STARTEC, a European funded project, this study investigates consumers’ preferences, attitudes and willingness to pay (WTP) towards characteristics of ready to heat (RTH) fresh lasagne, including origin of the meat, tested for meat authenticity, safety of the lasagne, and nutritional value, using Discrete Choice Experiments in six countries - Republic of Ireland, France, Italy, Spain, Germany and Norway. Our representative sample of 4,598 European consumers makes this the largest cross country study of this kind. The questionnaire was administered online in January 2014. Results from models in WTP-space show that, on average, consumers are willing to pay considerable amount (about €4-9) for food authenticity; on this Irish and Italian are the least concerned while Spanish are the most concerned. As expected from discussing with stakeholders, food safety claims and nutritional value of the RTH lasagne are relatively less important. Consumers also value knowing the origin of ingredients preferring locally sourced meat. Primarily, the results of this study present strong evidence that consumers in Europe are highly concerned about authenticity of the meat in ready meals and strongly prefer to know that the meat is national. This evidence suggests that there is great value in providing information on these attributes, both from a consumer perspective and where this leads to an increased consumer confidence has benefits for the food industry.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ability of an autonomous agent to select rational actions is vital in enabling it to achieve its goals. To do so effectively in a high-stakes setting, the agent must be capable of considering the risk and potential reward of both immediate and future actions. In this paper we provide a novel method for calculating risk alongside utility in online planning algorithms. We integrate such a risk-aware planner with a BDI agent, allowing us to build agents that can set their risk aversion levels dynamically based on their changing beliefs about the environment. To guide the design of a risk-aware agent we propose a number of principles which such an agent should adhere to and show how our proposed framework satisfies these principles. Finally, we evaluate our approach and demonstrate that a dynamically risk-averse agent is capable of achieving a higher success rate than an agent that ignores risk, while obtaining a higher utility than an agent with a static risk attitude.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we identify requirements for choosing a threat modelling formalisation for modelling sophisticated malware such as Duqu 2.0. We discuss the gaps in current formalisations and propose the use of Attack Trees with Sequential Conjunction when it comes to analysing complex attacks. The paper models Duqu 2.0 based on the latest information sourced from formal and informal sources. This paper provides a well structured model which can be used for future analysis of Duqu 2.0 and related attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Synchrophasors have become an important part of the modern power system and numerous applications have been developed covering wide-area monitoring, protection and control. Most applications demand continuous transmission of synchrophasor data across large geographical areas and require an efficient communication framework. IEEE C37.118-2 evolved as one of the most successful synchrophasor communication standards and is widely adopted. However, it lacks a predefined security mechanism and is highly vulnerable to cyber attacks. This paper analyzes different types of cyber attacks on IEEE C37.118-2 communication system and evaluates their possible impact on any developed synchrophasor application. Further, the paper also recommends an efficent security mechanism that can provide strong protection against cyber attacks. Although, IEEE C37.118-2 has been widely adopted, there is no clear understanding of the requirements and limitations. To this aim, the paper also presents detailed performance evaluation of IEEE C37.118-2 implementations which could help determine required resources and network characteristics before designing any synchrophasor application.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The complexity of modern SCADA networks and their associated cyber-attacks requires an expressive but flexible manner for representing both domain knowledge and collected intrusion alerts with the ability to integrate them for enhanced analytical capabilities and better understanding of attacks. This paper proposes an ontology-based approach for contextualized intrusion alerts in SCADA networks. In this approach, three security ontologies were developed to represent and store information on intrusion alerts, Modbus communications, and Modbus attack descriptions. This information is correlated into enriched intrusion alerts using simple ontology logic rules written in Semantic Query-Enhanced Web Rules (SQWRL). The contextualized alerts give analysts the means to better understand evolving attacks and to uncover the semantic relationships between sequences of individual attack events. The proposed system is illustrated by two use case scenarios.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present a new wrapper feature selection algorithm for human detection. This algorithm is a hybrid featureselection approach combining the benefits of filter and wrapper methods. It allows the selection of an optimalfeature vector that well represents the shapes of the subjects in the images. In detail, the proposed featureselection algorithm adopts the k-fold subsampling and sequential backward elimination approach, while thestandard linear support vector machine (SVM) is used as the classifier for human detection. We apply theproposed algorithm to the publicly accessible INRIA and ETH pedestrian full image datasets with the PASCALVOC evaluation criteria. Compared to other state of the arts algorithms, our feature selection based approachcan improve the detection speed of the SVM classifier by over 50% with up to 2% better detection accuracy.Our algorithm also outperforms the equivalent systems introduced in the deformable part model approach witharound 9% improvement in the detection accuracy

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Lough Neagh is the largest and the most economically important lake in Ireland. It is also one of the most nutrient rich amongst the world's major lakes. In this study, 16S rRNA analysis of total metagenomic DNA from the water column of Lough Neagh has revealed a high proportion of Cyanobacteria and low levels of Actinobacteria, Acidobacteria, Chloroflexi, and Firmicutes. The planktonic virome of Lough Neagh has been sequenced and 2,298,791 2×300 bp Illumina reads analysed. Comparison with previously characterised lakes demonstrates that the Lough Neagh viral community has the highest level of sequence diversity. Only about 15% of reads had homologs in the RefSeq database and tailed bacteriophages (Caudovirales) were identified as a major grouping. Within the Caudovirales, the Podoviridae and Siphoviridae were the two most dominant families (34.3% and 32.8% of the reads with sequence homology to the RefSeq database), while ssDNA bacteriophages constituted less than 1% of the virome. Putative cyanophages were found to be abundant. 66,450 viral contigs were assembled with the largest one being 58,805 bp; its existence, and that of another 34,467 bp contig, in the water column was confirmed. Analysis of the contigs confirmed the high abundance of cyanophages in the water column.