120 resultados para collision attack
Resumo:
New U-Th-Ra, major and trace element, and Sr-Nd-Pb isotope data are presented for young lavas from the New Britain and Western Bismarck arcs in Papua New Guinea. New Britain is an oceanic arc, whereas the latter is the site of an arc-continent collision. Building on a recent study of the Manus Basin, contrasts between the two arcs are used to evaluate the processes and timescales of magma generation accompanying arc-continent collision and possible slab detachment. All three suites share many attributes characteristic of arc lavas that can be ascribed to the addition of a regionally uniform subduction component derived from the subducting altered oceanic crust and sediment followed by dynamic melting of the modified mantle. However, the Western Bismarck arc lavas diverge from the Pb isotope mixing array formed by the New Britain and the Manus Basin lavas toward elevated Pb-208/Pb-204. We interpret this to reflect a second and subsequent addition of sediment melt at crustal depth during collision. U-238 and Ra-226 excesses are preserved in all of the lavas and are greatest in the Western Bismarck arc. High-Mg andesites with high Sr/Y ratios in the westernmost arc are attributed to recent shallow mantle flux melting at the slab edge. Data for two historical rhyolites are also presented. Although these rhyolites formed in quite different tectonic settings and display different geochemical and isotopic compositions, both formed from mafic parents within millennia.
Resumo:
We consider a collision-sensitive secondary system that intends to opportunistically aggregate and utilize spectrum of a primary system to achieve higher data rates. In such opportunistic spectrum access, secondary transmission can collide with primary transmission. When the secondary system aggregates more channels for data transmission, more frequent collisions may occur, limiting the performance obtained by the opportunistic spectrum aggregation. In this context, dynamic spectrum aggregation problem is formulated to maximize the ergodic channel capacity under the constraint of collision tolerable level. To solve the problem, we develop the optimal spectrum aggregation approach, deriving closed-form expressions for the collision probability in terms of primary user traffic load, secondary user transmission interval, and the random number of sub-channels aggregated. Our results show that aggregating only a subset of sub-channels will be a better choice, depending on the ratio of collision sensitivity requirement to the primary user traffic.
Resumo:
In this short paper, we present an integrated approach to detecting and mitigating cyber-attacks to modern interconnected industrial control systems. One of the primary goals of this approach is that it is cost effective, and thus whenever possible it builds on open-source security technologies and open standards, which are complemented with novel security solutions that address the specific challenges of securing critical infrastructures.
Resumo:
Context: Mg VIII emission lines are observed in a range of astronomical objects such as the Sun, other cool stars and in the coronal line region of Seyfert galaxies. Under coronal conditions Mg VIII emits strongly in the extreme ultraviolet (EUV) and soft X-ray spectral regions which makes it an ideal ion for plasma diagnostics.
Aims. Two theoretical atomic models, consisting of 125 fine structure levels, are developed for the Mg VIII ion. The 125 levels arise from the 2s(2)2p, 2s(2)p2, 2p(3), 2s(2)3s, 2s(2)3p, 2s(2)3d, 2s2p3s, 2s2p3p, 2s2p3d, 2p(2)3s, 2p(2)3p and 2p(2)3d configurations. Electron impact excitation collision strengths and radiative transition probabilities are calculated for both Mg VIII models, compared with existing data, and the best model selected to generate a set of theoretical emission line intensities. The EUV lines, covering 312-790 angstrom, are compared with existing solar spectra (SERTS-89 and SUMER), while the soft X-ray transitions (69-97 angstrom) are examined for potential density diagnostic line ratios and also compared with the limited available solar and stellar observational data.
Methods. The R-matrix codes Breit-Pauli RMATRXI and RMATRXII are utilised, along with the PSTGF code, to calculate the collision strengths for two Mg VIII models. Collision strengths are averaged over a Maxwellian distribution to produce the corresponding effective collision strengths for use in astrophysical applications. Transition probabilities are also calculated using the CIV3 atomic structure code. The best data are then incorporated into the modelling code CLOUDY and line intensities generated for a range of electron temperatures and densities appropriate to solar and stellar coronal plasmas.
Results. The present effective collision strengths are compared with two previous calculations. Good levels of agreement are found with the most recent, but there are large differences with the other for forbidden transitions. The resulting line intensities compare favourably with the observed values from the SERTS-89 and SUMER spectra. Theoretical soft X-ray emission lines are presented and several density diagnostic line ratios examined, which are in reasonable agreement with the limited observational data available.
Resumo:
Context. Absorption or emission lines of Fe II are observed in many astrophysical spectra and accurate atomic data are required to interpret these lines. The calculation of electron-impact excitation rates for transitions among even the lowest lying levels of Fe II is a formidable task for theoreticians.
Aims. In this paper, we present collision strengths and effective collision strengths for electron-impact excitation of Fe II for low-lying forbidden transitions among the lowest 16 fine-structure levels arising from the four LS states 3d(6)4s D-6(e), 3d(7) F-4(e), 3d(6)4s D-4(e), and 3d(7) P-4(e). The effective collision strengths are calculated for a wide range of electron temperatures of astrophysical importance from 30-100 000 K.
Methods. The parallel suite of Breit-Pauli codes are utilised to compute the collision cross sections for electron-impact excitation of Fe II and relativistic terms are included explicitly in both the target and the scattering approximation. 100 LS or 262-jj levels formed from the basis configurations 3d(6)4s, 3d(7), and 3d(6)4p were included in the wavefunction representation of the target, including all doublet, quartet, and sextet terms. Collision strengths for a total of 34191 individual transitions were computed.
Results. A detailed comparison is made with previous theoretical works and significant differences were found to occur in the effective collision strengths, particularly at low temperatures.
Resumo:
We show that the use of a recently proposed iterative collision model with interenvironment swaps displays a signature of strongly non-Markovian dynamics that is highly dependent on the establishment of system-environment correlations. Two models are investigated: one in which such correlations are canceled iteratively and one in which they are kept all across the dynamics. The degree of non-Markovianity, quantified using a measure based on the trace distance, is found to be much greater for all coupling strengths, when system-environment correlations are maintained.
Resumo:
In order to address road safety effectively, it is essential to understand all the factors, which
attribute to the occurrence of a road collision. This is achieved through road safety
assessment measures, which are primarily based on historical crash data. Recent advances
in uncertain reasoning technology have led to the development of robust machine learning
techniques, which are suitable for investigating road traffic collision data. These techniques
include supervised learning (e.g. SVM) and unsupervised learning (e.g. Cluster Analysis).
This study extends upon previous research work, carried out in Coll et al. [3], which
proposed a non-linear aggregation framework for identifying temporal and spatial hotspots.
The results from Coll et al. [3] identified Lisburn area as the hotspot, in terms of road safety,
in Northern Ireland. This study aims to use Cluster Analysis, to investigate and highlight any
hidden patterns associated with collisions that occurred in Lisburn area, which in turn, will
provide more clarity in the causation factors so that appropriate countermeasures can be put
in place.
Resumo:
The discovery of P/2010 A2 by the LINEAR survey in January 2010 revealed an object displaying a large trail of material similar in shape to a cometary tail although no central condensation or coma could be detected. The appearance of this object in an asteroidal orbit in the inner main belt attracted attention as a potential new member of the Main Belt Comets class (MBCs) but the discovery of a nucleus, with an estimated diameter of 120 m, around 1500 km away from the trail implied that the extended object we were seeing could be the debris trail from a recent collision rather than the tail of a comet. Due to the low inclination of its orbit, it is difficult to conclude about the nature of P/2010 A2 from Earth-based data only, as different scenarios lead to the same appearance in the orbital configuration at the times of observations. We present here another set of images, acquired from the unique viewing geometry provided by ESA's Rosetta spacecraft en route to comet 67P/Churyumov-Gerasimenko. Albeit faint (22 magnitude), the object could be observed by the high-resolution camera OSIRIS. We used a Finson-Probstein model to simulate the shape of the trail, and estimate the time of emission and β parameter (ratio between solar radiation pressure and gravity) for the dust grains. Simulations were compared to the OSIRIS images and ground based observations acquired at NTT and Palomar telescopes. Thanks to the different phase angle provided by Rosetta, we could reduce the number of solutions to a unique model, leading to the conclusive demonstration that the trail is due to a single event rather than a period of cometary activity.
Resumo:
The peculiar object P/2010A2 was discovered in January 2010 and given a cometary designation because of the presence of a trail of material, although there was no central condensation or coma. The appearance of this object, in an asteroidal orbit (small eccentricity and inclination) in the inner main asteroid belt attracted attention as a potential new member of the recently recognized class of main-belt comets. If confirmed, this new object would expand the range in heliocentric distance over which main-belt comets are found. Here we report observations of P/2010A2 by the Rosetta spacecraft. We conclude that the trail arose from a single event, rather than a period of cometary activity, in agreement with independent results. The trail is made up of relatively large particles of millimetre to centimetre size that remain close to the parent asteroid. The shape of the trail can be explained by an initial impact ejecting large clumps of debris that disintegrated and dispersed almost immediately. We determine that this was an asteroid collision that occurred around 10 February 2009.
Resumo:
This paper employs a unique decentralised cooperative control method to realise a formation-based collision avoidance strategy for a group of autonomous vehicles. In this approach, the vehicles' role in the formation and their alert and danger areas are first defined, and the formation-based intra-group and external collision avoidance methods are then proposed to translate the collision avoidance problem into the formation stability problem. The extension–decomposition–aggregation formation control method is next employed to stabilise the original and modified formations, whilst manoeuvring, and subsequently solve their collision avoidance problem indirectly. Simulation study verifies the feasibility and effectiveness of the intra-group and external collision avoidance strategy. It is demonstrated that both formation control and collision avoidance problems can be simultaneously solved if the stability of the expanded formation including external obstacles can be satisfied.
Resumo:
A new niche of densely populated, unprotected networks is becoming more prevalent in public areas such as Shopping Malls, defined here as independent open-access networks, which have attributes that make attack detection more challenging than in typical enterprise networks. To address these challenges, new detection systems which do not rely on knowledge of internal device state are investigated here. This paper shows that this lack of state information requires an additional metric (The exchange timeout window) for detection of WLAN Denial of Service Probe Flood attacks. Variability in this metric has a significant influence on the ability of a detection system to reliably detect the presence of attacks. A parameter selection method is proposed which is shown to provide reliability and repeatability in attack detection in WLANs. Results obtained from ongoing live trials are presented that demonstrate the importance of accurately estimating probe request and probe response timeouts in future Independent Intrusion Detection Systems.
Resumo:
The alkali activation of waste products has become a widespread topic of research, mainly due to environmental benefits. Portland cement and alkali-activated mortar samples were prepared to compare their resistance to silage effluent which contains lactic acid. The mechanism of attack on each sample has also been investigated.
Resumo:
Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.