79 resultados para Event-based control


Relevância:

40.00% 40.00%

Publicador:

Resumo:

AIM: To evaluate the association between various lifestyle factors and achalasia risk.

METHODS: A population-based case-control study was conducted in Northern Ireland, including n= 151 achalasia cases and n = 117 age- and sex-matched controls. Lifestyle factors were assessed via a face-to-face structured interview. The association between achalasia and lifestyle factors was assessed by unconditional logistic regression, to produce odds ratios (OR) and 95% confidence interval (CI).

RESULTS: Individuals who had low-class occupations were at the highest risk of achalasia (OR = 1.88, 95%CI: 1.02-3.45), inferring that high-class occupation holders have a reduced risk of achalasia. A history of foreign travel, a lifestyle factor linked to upper socio-economic class, was also associated with a reduced risk of achalasia (OR = 0.59, 95%CI: 0.35-0.99). Smoking and alcohol consumption carried significantly reduced risks of achalasia, even after adjustment for socio-economic status. The presence of pets in the house was associated with a two-fold increased risk of achalasia (OR = 2.00, 95%CI: 1.17-3.42). No childhood household factors were associated with achalasia risk.

CONCLUSION: Achalasia is a disease of inequality, and individuals from low socio-economic backgrounds are at highest risk. This does not appear to be due to corresponding alcohol and smoking behaviours. An observed positive association between pet ownership and achalasia risk suggests an interaction between endotoxin and viral infection exposure in achalasia aetiology.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents a tensegrity-based co-operative control algorithm for an aircraft formation. The 6 degrees-of-freedom model of the well-known Aerosonde unmanned aerial vehicle (UAV), is integrated with the model of the tensegrity structure and a decentralised control scheme is proposed. The strategy is shown to be scalable for 2n number of UAVs and is able to maintain a firm geometry whilst allowing flexible shape transformations. Simulation results demonstrate the effectiveness and stability of the proposed tensegrity-based formation control algorithm in 3D.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.