2 resultados para Bayesian inference, Behaviour analysis, Security, Visual surveillance
em Coffee Science - Universidade Federal de Lavras
Resumo:
In this thesis, the origin of large-scale structures in hot star winds, believed to be responsible for the presence of discrete absorption components (DACs) in the absorption troughs of ultraviolet resonance lines, is constrained using both observations and numerical simulations. These structures are understood as arising from bright regions on the stellar surface, although their physical cause remains unknown. First, we use high quality circular spectropolarimetric observations of 13 well-studied OB stars to evaluate the potential role of dipolar magnetic fields in producing DACs. We perform longitudinal field measurements and place limits on the field strength using Bayesian inference, assuming that it is dipolar. No magnetic field was detected within this sample. The derived constraints statistically refute any significant dynamical influence from a magnetic dipole on the wind for all of these stars, ruling out such fields as a cause for DACs. Second, we perform numerical simulations using bright spots constrained by broadband optical photometric observations. We calculate hydrodynamical wind models using three sets of spot sizes and strengths. Co-rotating interaction regions are yielded in each model, and radiative transfer shows that the properties of the variations in the UV resonance lines synthesized from these models are consistent with those found in observed UV spectra, establishing the first consistent link between UV spectroscopic line profile variability and photometric variations and thus supporting the bright spot paradigm (BSP). Finally, we develop and apply a phenomenological model to quantify the measurable effects co-rotating bright spots would have on broadband optical photometry and on the profiles of photopheric lines in optical spectra. This model can be used to evaluate the existence of these spots, and, in the event of their detection, characterize them. Furthermore, a tentative spot evolution model is presented. A preliminary analysis of its output, compared to the observed photometric variations of xi Persei, suggests the possible existence of “active longitudes” on the surface of this star. Future work will expand the range of observational diagnostics that can be interpreted within the BSP, and link phenomenology (bright spots) to physical processes (magnetic spots or non-radial pulsations).
Resumo:
In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of us. Browsers can be breached in different ways. Because of the over privileged access, extensions are responsible for many security issues. Browser vendors try to keep safe extensions in their official extension galleries. However, their security control measures are not always effective and adequate. The distribution of unsafe extensions through different social engineering techniques is also a very common practice. Therefore, before installation, users should thoroughly analyze the security of browser extensions. Extensions are not only available for desktop browsers, but many mobile browsers, for example, Firefox for Android and UC browser for Android, are also furnished with extension features. Mobile devices have various resource constraints in terms of computational capabilities, power, network bandwidth, etc. Hence, conventional extension security analysis techniques cannot be efficiently used by end users to examine mobile browser extension security issues. To overcome the inadequacies of the existing approaches, we propose CLOUBEX, a CLOUd-based security analysis framework for both desktop and mobile Browser EXtensions. This framework uses a client-server architecture model. In this framework, compute-intensive security analysis tasks are generally executed in a high-speed computing server hosted in a cloud environment. CLOUBEX is also enriched with a number of essential features, such as client-side analysis, requirements-driven analysis, high performance, and dynamic decision making. At present, the Firefox extension ecosystem is most susceptible to different security attacks. Hence, the framework is implemented for the security analysis of the Firefox desktop and Firefox for Android mobile browser extensions. A static taint analysis is used to identify malicious information flows in the Firefox extensions. In CLOUBEX, there are three analysis modes. A dynamic decision making algorithm assists us to select the best option based on some important parameters, such as the processing speed of a client device and network connection speed. Using the best analysis mode, performance and power consumption are improved significantly. In the future, this framework can be leveraged for the security analysis of other desktop and mobile browser extensions, too.