3 resultados para Middle and upper Eocene


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Belgian coastal plain occupies a key position as it is located at the transition between the Southern North Sea Basin and the Strait of Dover. It is characterized by thick sequences (> 20 m) of Pleistocene terrestrial and littoral sediments. Yet the wider stratigraphical and palaeo-environmental significance of these sediments received little attention. In this paper we draw on the results of a recent sedimentological study based on > 100 drillings that spans the Pleistocene sequence, and present new biostratigraphical (pollen, foraminifera, ostracods) data, all revealing a complex history of deposition. The record includes evidence of the development of incised-valley systems that were initiated in the late Middle and Late Pleistocene. Five phases of fluvial incision can be identified. The majority of the infills are deposited in an estuarine environment that passes into a fluvial environment land inward, except the Weichselian infill which has a predominant fluvial origin. The greatest part of the most seaward located zone of the western coastal plain was free of valley incisions, there, shallow marine sediments built up the record. Local biostratigraphical investigations provide a timeframe. The result is placed in a regional context.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an analytical performance investigation of both beamforming (BF) and interference cancellation (IC) strategies for a device-to-device (D2D) communication system underlaying a cellular network with an M-antenna base station (BS). We first derive new closed-form expressions for the ergodic achievable rate for BF and IC precoding strategies with quantized channel state information (CSI), as well as, perfect CSI. Then, novel lower and upper bounds are derived which apply for an arbitrary number of antennas and are shown to be sufficiently tight to the Monte-Carlo results. Based on these results, we examine in detail three important special cases including: high signal-to-noise ratio (SNR), weak interference between cellular link and D2D link, and BS equipped with a large number of antennas. We also derive asymptotic expressions for the ergodic achievable rate for these scenarios. Based on these results, we obtain valuable insights into the impact of the system parameters, such as the number of antennas, SNR and the interference for each link. In particular, we show that an irreducible saturation point exists in the high SNR regime, while the ergodic rate under IC strategy is verified to be always better than that under BF strategy. We also reveal that the ergodic achievable rate under perfect CSI scales as log2M, whilst it reaches a ceiling with quantized CSI.