39 resultados para Intrusion Detection, Computer Security, Misuse
Resumo:
This paper presents three methods for automatic detection of dust devils tracks in images of Mars. The methods are mainly based on Mathematical Morphology and results of their performance are analyzed and compared. A dataset of 21 images from the surface of Mars representative of the diversity of those track features were considered for developing, testing and evaluating our methods, confronting their outputs with ground truth images made manually. Methods 1 and 3, based on closing top-hat and path closing top-hat, respectively, showed similar mean accuracies around 90% but the time of processing was much greater for method 1 than for method 3. Method 2, based on radial closing, was the fastest but showed worse mean accuracy. Thus, this was the tiebreak factor. © 2011 Springer-Verlag.
Resumo:
Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is a very important problem with wide range of implications, including safety related and congestion avoidance applications. We discuss several limitations of existing misbehavior detection schemes (MDS) designed for VANETs. Most MDS are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners, e.g. for gaining access to a particular lane. It is therefore more important to detect false information than to identify misbehaving nodes. We introduce the concept of data-centric misbehavior detection and propose algorithms which detect false alert messages and misbehaving nodes by observing their actions after sending out the alert messages. With the data-centric MDS, each node can decide whether an information received is correct or false. The decision is based on the consistency of recent messages and new alerts with reported and estimated vehicle positions. No voting or majority decisions is needed, making our MDS resilient to Sybil attacks. After misbehavior is detected, we do not revoke all the secret credentials of misbehaving nodes, as done in most schemes. Instead, we impose fines on misbehaving nodes (administered by the certification authority), discouraging them to act selfishly. This reduces the computation and communication costs involved in revoking all the secret credentials of misbehaving nodes. © 2011 IEEE.
Resumo:
This paper presents a control method that is effective to reduce the degenerative effects of delay time caused by a treacherous network. In present application a controlled DC motor is part of an inverted pendulum and provides the equilibrium of this system. The control of DC motor is accomplished at the distance through a treacherous network, which causes delay time in the control signal. A predictive technique is used so that it turns the system free of delay. A robust digital sliding mode controller is proposed to control the free-delay system. Due to the random conditions of the network operation, a delay time detection and accommodation strategy is also proposed. A computer simulation is shown to illustrate the design procedures and the effectiveness of the proposed method. © 2011 IEEE.
Resumo:
Identification and classification of overlapping nodes in networks are important topics in data mining. In this paper, a network-based (graph-based) semi-supervised learning method is proposed. It is based on competition and cooperation among walking particles in a network to uncover overlapping nodes by generating continuous-valued outputs (soft labels), corresponding to the levels of membership from the nodes to each of the communities. Moreover, the proposed method can be applied to detect overlapping data items in a data set of general form, such as a vector-based data set, once it is transformed to a network. Usually, label propagation involves risks of error amplification. In order to avoid this problem, the proposed method offers a mechanism to identify outliers among the labeled data items, and consequently prevents error propagation from such outliers. Computer simulations carried out for synthetic and real-world data sets provide a numeric quantification of the performance of the method. © 2012 Springer-Verlag.
Resumo:
The objective of this study was to optimize an internal control to improve SYBR-Green-based qPCR to amplify/detect the BoHV-5 US9 gene in bovine embryos produced invitro and experimentally exposed to the virus. We designed an SYBR-Green-based binding assay that is quick to perform, reliable, easily optimized and compares well with the published assay. Herein we demonstrated its general applicability to detect BoHV-5 US9 gene in bovine embryos produced invitro experimentally exposed to BoHV-5. In order to validate the assay, three different reference genes were tested; and the histone 2a gene was shown to be the most adequate for normalizing the qPCR reaction, by considering melting and standard curves ( p<0.05). On the other hand, no differences were found in the development of bovine embryos invitro whether they were exposed to BoHV-5 reference and field strains comparing to unexposed embryos. The developed qPCR assay may have important field applications as it provides an accurate BoHV-5 US9 gene detection using a proven reference gene and is considerably less expensive than the TaqMan qPCR currently employed in sanitary programs. © 2013 Elsevier Ltd.
Resumo:
Pós-graduação em Ciência da Computação - IBILCE
Resumo:
Pós-graduação em Ciência da Computação - IBILCE
Resumo:
Electrochemical detection method and related aspects Herein is disclosed an electrochemical test method comprising (i) comparing how a plurality of immittance functions and/or components thereof vary with a change in a parameter of interest for a first system, and then selecting an immittance function or component thereof for use in an electrochemical test; (ii) carryingout an electrochemical test step for a second system to determine at least one value for the immittance function or component thereof selected in step (i), and then, by using a quantitative relationship between the selected immittance function and the parameter of interest, determining a value in the parameter of interest. A computer program and apparatus are also disclosed herein.
Resumo:
This is an experience report on clinical pharmacy in New York, United States of America, in a teaching hospital, describing the results of drug therapy monitoring in critically ill patients, as well as interventions to solve or prevent identified drug therapy problems. The cross-sectional study was conducted by the clinical staff at the Surgical Intensive Care Unit during August 20th to 24th, 2012. Blood counts, serum levels of certain antibiotics, microbiological cultures and their antibiotic susceptibility, possible drug interactions, dosage of each drug prescribed and the compatibility between the route of administration and pharmaceutical form were assessed daily through review of electronic medical records. Twenty seven patients were followed up and 16 drug therapy problems were identified: Unnecessary drug therapy (seven), adverse drug reaction (four), needs additional drug therapy (two), noncompliance (two) and dosage too low (one). After evaluation, the drug therapy problems and their pharmaceutical interventions were reported to clinical pharmaceutical responsible for the Surgical ICU, as well as the multidisciplinary team. Further, the clinical outcomes were monitored and interventions were classified as to its acceptance. Data demonstrate that clinical pharmacists can contribute to the security and proper use of medications, as the trigger tools for intensive monitoring helps in early detection of drug therapy problems and patient safety.