5 resultados para Year 2000 date conversion (Computer systems)

em Digital Commons - Michigan Tech


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since it is very toxic and accumulates in organisms, particularly in fish, mercury is a very important pollutant and one of the most studies. And this concern over the toxicity and human health risks of mercury has prompted efforts to regulate anthropogenic emissions. As mercury pollution problem is getting increasingly serious, we are curious about how serious this problem will be in the future. What is more, how the climate change in the future will affect the mercury concentration in the atmosphere. So we investigate the impact of climate change on mercury concentration in the atmosphere. We focus on the comparison between the mercury data for year 2000 and for year 2050. The GEOS-Chem model shows that the mercury concentrations for all tracers (1 to 3), elemental mercury (Hg(0)), divalent mercury (Hg(II)) and primary particulate mercury (Hg(P)) have differences between 2000 and 2050 in most regions over the world. From the model results, we can see the climate change from 2000 to 2050 would decrease Hg(0) surface concentration in most of the world. The driving factors of Hg(0) surface concentration changes are natural emissions(ocean and vegetation) and the transformation reactions between Hg(0) and Hg(II). The climate change from 2000 to 2050 would increase Hg(II) surface concentration in most of mid-latitude continental parts of the world while decreasing Hg(II) surface concentration in most of high-latitude part of the world. The driving factors of Hg(II) surface concentration changes is deposition amount change (majorly wet deposition) from 2000 to 2050 and the transformation reactions between Hg(0) and Hg(II). Climate change would increase Hg(P) concentration in most of mid-latitude area of the world and meanwhile decrease Hg(P) concentration in most of high-latitude regions of the world. For the Hg(P) concentration changes, the major driving factor is the deposition amount change (mainly wet deposition) from 2000 to 2050.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A post classification change detection technique based on a hybrid classification approach (unsupervised and supervised) was applied to Landsat Thematic Mapper (TM), Landsat Enhanced Thematic Plus (ETM+), and ASTER images acquired in 1987, 2000 and 2004 respectively to map land use/cover changes in the Pic Macaya National Park in the southern region of Haiti. Each image was classified individually into six land use/cover classes: built-up, agriculture, herbaceous, open pine forest, mixed forest, and barren land using unsupervised ISODATA and maximum likelihood supervised classifiers with the aid of field collected ground truth data collected in the field. Ground truth information, collected in the field in December 2007, and including equalized stratified random points which were visual interpreted were used to assess the accuracy of the classification results. The overall accuracy of the land classification for each image was respectively: 1987 (82%), 2000 (82%), 2004 (87%). A post classification change detection technique was used to produce change images for 1987 to 2000, 1987 to 2004, and 2000 to 2004. It was found that significant changes in the land use/cover occurred over the 17- year period. The results showed increases in built up (from 10% to 17%) and herbaceous (from 5% to 14%) areas between 1987 and 2004. The increase of herbaceous was mostly caused by the abandonment of exhausted agriculture lands. At the same time, open pine forest and mixed forest areas lost (75%) and (83%) of their area to other land use/cover types. Open pine forest (from 20% to 14%) and mixed forest (from18 to 12%) were transformed into agriculture area or barren land. This study illustrated the continuing deforestation, land degradation and soil erosion in the region, which in turn is leading to decrease in vegetative cover. The study also showed the importance of Remote Sensing (RS) and Geographic Information System (GIS) technologies to estimate timely changes in the land use/cover, and to evaluate their causes in order to design an ecological based management plan for the park.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

With today's prevalence of Internet-connected systems storing sensitive data and the omnipresent threat of technically skilled malicious users, computer security remains a critically important field. Because of today's multitude of vulnerable systems and security threats, it is vital that computer science students be taught techniques for programming secure systems, especially since many of them will work on systems with sensitive data after graduation. Teaching computer science students proper design, implementation, and maintenance of secure systems is a challenging task that calls for the use of novel pedagogical tools. This report describes the implementation of a compiler that converts mandatory access control specification Domain-Type Enforcement Language to the Java Security Manager, primarily for pedagogical purposes. The implementation of the Java Security Manager was explored in depth, and various techniques to work around its inherent limitations were explored and partially implemented, although some of these workarounds do not appear in the current version of the compiler because they would have compromised cross-platform compatibility. The current version of the compiler and implementation details of the Java Security Manager are discussed in depth.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This report summarizes the work done for the Vehicle Powertrain Modeling and Design Problem Proposal portion of the EcoCAR3 proposal as specified in the Request for Proposal from Argonne National Laboratory. The results of the modeling exercises presented in the proposal showed that: An average conventional vehicle powered by a combustion engine could not meet the energy consumption target when the engine was sized to meet the acceleration target, due the relatively low thermal efficiency of the spark ignition engine. A battery electric vehicle could not meet the required range target of 320 km while keeping the vehicle weight below the gross vehicle weight rating of 2000 kg. This was due to the low energy density of the batteries which necessitated a large, and heavy, battery pack to provide enough energy to meet the range target. A series hybrid electric vehicle has the potential to meet the acceleration and energy consumption parameters when the components are optimally sized. A parallel hybrid electric vehicle has less energy conversion losses than a series hybrid electric vehicle which results in greater overall efficiency, lower energy consumption, and less emissions. For EcoCAR3, Michigan Tech proposes to develop a plug-in parallel hybrid vehicle (PPHEV) powered by a small Diesel engine operating on B20 Bio-Diesel fuel. This architecture was chosen over other options due to its compact design, lower cost, and its ability to provide performance levels and energy efficiency that meet or exceed the design targets. While this powertrain configuration requires a more complex control system and strategy than others, the student engineering team at Michigan Tech has significant recent experience with this architecture and has confidence that it will perform well in the events planned for the EcoCAR3 competition.