970 resultados para tooth intrusion
Resumo:
The Minho River, situated 30 km south of the Rias Baixas is the most important freshwater source flowing into the Western Galician Coast (NW of the Iberian Peninsula). This discharge is important to determine the hydrological patterns adjacent to its mouth, particularly close to the Galician coastal region. The buoyancy generated by the Minho plume can flood the Rias Baixas for long periods, reversing the normal estuarine density gradients. Thus, it becomes important to analyse its dynamics as well as the thermohaline patterns of the areas affected by the freshwater spreading. Thus, the main aim of this work was to study the propagation of the Minho estuarine plume to the Rias Baixas, establishing the conditions in which this plume affects the circulation and hydrographic features of these coastal systems, through the development and application of the numerical model MOHID. For this purpose, the hydrographic features of the Rias Baixas mouths were studied. It was observed that at the northern mouths, due to their shallowness, the heat fluxes between the atmosphere and ocean are the major forcing, influencing the water temperature, while at the southern mouths the influence of the upwelling events and the Minho River discharge were more frequent. The salinity increases from south to north, revealing that the observed low values may be caused by the Minho River freshwater discharge. An assessment of wind data along the Galician coast was carried out, in order to evaluate the applicability of the study to the dispersal of the Minho estuarine plume. Firstly, a comparative analysis between winds obtained from land meteorological stations and offshore QuikSCAT satellite were performed. This comparison revealed that satellite data constitute a good approach to study wind induced coastal phenomena. However, since the numerical model MOHID requires wind data with high spatial and temporal resolution close to the coast, results of the forecasted model WRF were added to the previous study. The analyses revealed that the WRF model data is a consistent tool to obtain representative wind data near the coast, showing good results when comparing with in situ wind observations from oceanographic buoys. To study the influence of the Minho buoyant discharge influence on the Rias Baixas, a set of three one-way nested models was developed and implemented, using the numerical model MOHID. The first model domain is a barotropic model and includes the whole Iberian Peninsula coast. The second and third domains are baroclinic models, where the second domain is a coarse representation of the Rias Baixas and adjacent coastal area, while the third includes the same area with a higher resolution. A bi-dimensional model was also implemented in the Minho estuary, in order to quantify the flow (and its properties) that the estuary injects into the ocean. The chosen period for the Minho estuarine plume propagation validation was the spring of 1998, since a high Minho River discharge was reported, as well as favourable wind patterns to advect the estuarine plume towards the Rias Baixas, and there was field data available to compare with the model predictions. The obtained results show that the adopted nesting methodology was successful implemented. Model predictions reproduce accurately the hydrodynamics and thermohaline patterns on the Minho estuary and Rias Baixas. The importance of the Minho river discharge and the wind forcing in the event of May 1998 was also studied. The model results showed that a continuous moderate Minho River discharge combined with southerly winds is enough to reverse the Rias Baixas circulation pattern, reducing the importance of the occurrence of specific events of high runoff values. The conditions in which the estuarine plume Minho affects circulation and hydrography of the Rias Baixas were evaluated. The numerical results revealed that the Minho estuarine plume responds rapidly to wind variations and is also influenced by the bathymetry and morphology of the coastline. Without wind forcing, the plume expands offshore, creating a bulge in front of the river mouth. When the wind blows southwards, the main feature is the offshore extension of the plume. Otherwise, northward wind spreads the river plume towards the Rias Baixas. The plume is confined close to the coast, reaching the Rias Baixas after 1.5 days. However, for Minho River discharges higher than 800 m3 s-1, the Minho estuarine plume reverses the circulation patterns in the Rias Baixas. It was also observed that the wind stress and Minho River discharge are the most important factors influencing the size and shape of the Minho estuarine plume. Under the same conditions, the water exchange between Rias Baixas was analysed following the trajectories particles released close to the Minho River mouth. Over 5 days, under Minho River discharges higher than 2100 m3 s-1 combined with southerly winds of 6 m s-1, an intense water exchange between Rias was observed. However, only 20% of the particles found in Ria de Pontevedra come directly from the Minho River. In summary, the model application developed in this study contributed to the characterization and understanding of the influence of the Minho River on the Rias Baixas circulation and hydrography, highlighting that this methodology can be replicated to other coastal systems.
Resumo:
This paper proposes a method for the design of gear tooth profiles using parabolic curve as its line of action. A mathematical model, including the equation of the line of action, the equation of the tooth profile, and the equation of the conjugate tooth profile, is developed based on the meshing theory. The equation of undercutting condition is derived from the model. The influences of the two design parameters, that present the size (or shape) of the parabolic curve relative to the gear size, on the shape of tooth profiles and on the contact ratio are also studied through the design of an example drive. The strength, including the contact and the bending stresses, of the gear drive designed by using the proposed method is analyzed by an FEA simulation. A comparison of the above characteristics of the gear drive designed with the involute gear drive is also carried out in this work. The results confirm that the proposed design method is more flexible to control the shape of the tooth profile by changing the parameters of the parabola.
Resumo:
In recent years, vehicular cloud computing (VCC) has emerged as a new technology which is being used in wide range of applications in the area of multimedia-based healthcare applications. In VCC, vehicles act as the intelligent machines which can be used to collect and transfer the healthcare data to the local, or global sites for storage, and computation purposes, as vehicles are having comparatively limited storage and computation power for handling the multimedia files. However, due to the dynamic changes in topology, and lack of centralized monitoring points, this information can be altered, or misused. These security breaches can result in disastrous consequences such as-loss of life or financial frauds. Therefore, to address these issues, a learning automata-assisted distributive intrusion detection system is designed based on clustering. Although there exist a number of applications where the proposed scheme can be applied but, we have taken multimedia-based healthcare application for illustration of the proposed scheme. In the proposed scheme, learning automata (LA) are assumed to be stationed on the vehicles which take clustering decisions intelligently and select one of the members of the group as a cluster-head. The cluster-heads then assist in efficient storage and dissemination of information through a cloud-based infrastructure. To secure the proposed scheme from malicious activities, standard cryptographic technique is used in which the auotmaton learns from the environment and takes adaptive decisions for identification of any malicious activity in the network. A reward and penalty is given by the stochastic environment where an automaton performs its actions so that it updates its action probability vector after getting the reinforcement signal from the environment. The proposed scheme was evaluated using extensive simulations on ns-2 with SUMO. The results obtained indicate that the proposed scheme yields an improvement of 10 % in detection rate of malicious nodes when compared with the existing schemes.
Resumo:
The Miocene PX1 gabbro-pyroxenite pluton, Fuerteventura, Canary Islands, is a 3.5 x 5.5 km shallow-level intrusion (0.15-0.2 GPa and 1100-1120 degrees C), interpreted as the feeder-zone to an ocean-island volcano. It displays a vertical magmatic banding expressed in five 50 to 100 metre-wide NNE-SSW trending alkaline gabbro sequences alternating with pyroxenites. This emplacement geometry was controlled by brittle to ductile shear zones, generated by a regional E-W extensional tectonic setting that affected Fuerteventura during the Miocene. At a smaller scale, the PX1 gabbro and pyroxenite bands consist of metre-thick differentiation units, which suggest emplacement by periodic injection of magma pulses as vertical dykes that amalgamated, similarly to a sub-volcanic sheeted dyke complex. Individual dykes underwent internal differentiation following a solidification front parallel to the dyke edges. This solidification front may have been favoured by a significant lateral/horizontal thermal gradient, expressed by the vertical banding in the gabbros, the fractionation asymmetry within individual dykes and the migmatisation of the wall rocks. Pyroxenitic layers result from the fractionation and accumulation of clinopyroxene +/- olivine +/- plagioclase crystals from a mildly alkaline basaltic liquid. They are interpreted as truncated differentiation sequences, from which residual melts were extracted at various stages of their chemical evolution by subsequent dyke intrusions, either next to or within the crystallising unit. Compaction and squeezing of the crystal mush is ascribed to the incoming and inflating magma pulses. The expelled interstitial liquid was likely collected and erupted along with the magma flowing through the newly injected dykes. Clinopyroxene mineral orientation - as evidenced by EBSD and micro X-ray tomography investigations - displays a marked pure-shear component, supporting the interpretation of the role of compaction in the generation of the pyroxenites. Conversely, gabbro sequences underwent minor melt extraction and are believed to represent crystallised coalesced magma batches emplaced at lower rates at the end of eruptive cycles. Clinopyroxene orientations in gabbros record a simple shear component suggesting syn-magmatic deformation parallel to observed NNE-SSW trending shear zones induced by the regional tensional stress field. This emplacement model implies a crystallisation time of 1 to 5 years for individual dykes, consistent with PX1 emplacement over less than 0.5 My. A minimum amount of approximately 150 km(3) of magma is needed to generate the pluton, part of it having been erupted through the Central Volcanic Centre of Fuerteventura. If the regional extensional tectonic regime controls the PX1 feeder-zone initiation and overall geometry, rates and volumes of magma depend on other, source-related factors. High injection rates are likely to induce intrusion growth rates larger than could be accommodated by the regional extension. In this case, dyke intrusion by propagation of a weak tip, combined with the inability of magma to circulate through previously emplaced and crystallised dykes could result in an increase of non-lithostatic pressure on previously emplaced mushy dyke walls; thus generating strong pure-shear compaction within the pluton feeder-zone and interstitial melt expulsion. These compaction-dominated processes are recorded by the cumulitic pyroxenite bands. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
The Mont Collon mafic complex is one of the best preserved examples of the Early Permian magmatism in the Central Alps, related to the intra-continental collapse of the Variscan belt. It mostly consists (> 95 vol.%) of ol+hy-nonnative plagioclase-wehrlites, olivine- and cpx-gabbros with cumulitic structures, crosscut by acid dikes. Pegmatitic gabbros, troctolites and anorthosites outcrop locally. A well-preserved cumulative, sequence is exposed in the Dents de Bertol area (center of intrusion). PT-calculations indicate that this layered magma chamber emplaced at mid-crustal levels at about 0.5 GPa and 1100 degrees C. The Mont Collon cumulitic rocks record little magmatic differentiation, as illustrated by the restricted range of clinopyroxene mg-number (Mg#(cpx)=83-89). Whole-rock incompatible trace-element contents (e.g. Nb, Zr, Ba) vary largely and without correlation with major-element composition. These features are characteristic of an in-situ crystallization process with variable amounts of interstitial liquid L trapped between the cumulus mineral phases. LA-ICPMS measurements show that trace-element distribution in the latter is homogeneous, pointing to subsolidus re-equilibration between crystals and interstitial melts. A quantitative modeling based on Langmuir's in-situ crystallization equation successfully duplicated the REE concentrations in cumulitic minerals of all rock facies of the intrusion. The calculated amounts of interstitial liquid L vary between 0 and 35% for degrees of differentiation F of 0 to 20%, relative to the least evolved facies of the intrusion. L values are well correlated with the modal proportions of interstitial amphibole and whole-rock incompatible trace-element concentrations (e.g. Zr, Nb) of the tested samples. However, the in-situ crystallization model reaches its limitations with rock containing high modal content of REE-bearing minerals (i.e. zircon), such as pegmatitic gabbros. Dikes of anorthositic composition, locally crosscutting the layered lithologies, evidence that the Mont Collon rocks evolved in open system with mixing of intercumulus liquids of different origins and possibly contrasting compositions. The proposed model is not able to resolve these complex open systems, but migrating liquids could be partly responsible for the observed dispersion of points in some correlation diagrams. Absence of significant differentiation with recurrent lithologies in the cumulitic pile of Dents de Bertol points to an efficiently convective magma chamber, with possible periodic replenishment, (c) 2005 Elsevier B.V. All rights reserved.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
Preclinical and clinical tooth important and significant aspect of preparation is an a dental student's education. The associated procedures rely heavily on the development of particular psychomotor skills. The most common format of instruction and evaluation in tooth preparation at many Dental Faculties, emphasizes the product (tooth preparation) and associates performance with characteristics of this product. This integrated study examines which skills should be developed and how a course of instruction can best be structured to develop the necessary skills. The skills which are identified are those necessary for tooth preparation are selected from a psychomotor taxonomy. The purpose of evaluating these skills is identified. Behavioral objectives are set for student performance and the advisability of establishing standards of performance is examined. After reviewing studies related to learning strategy for dental psychomotor the most suitable tasks as well as articles on instructor effectiveness a model is proposed. A pilot project at the University of Toronto, based on this proposed model is described. The paper concludes wi th a discussion of the implications of this proposed model.
Resumo:
Tesis (Doctorado en Ciencias con Especialidad en Biología Molecular e Ingeniería Genética) UANL
Resumo:
Thesis written in co-mentorship with director: Nelly Huynh; co-directors: Frank Rauch and Jean-Marc Retrouvey; collaborators: Clarice Nishio, Duy-Dat Vu and Nathalie Alos
Resumo:
The study conducted on the salinity intrusion and seasonal water quality variations in the tidal canals of cochin. The main objectives are, salinity intrusion profile, water quality variation of the surface water of the canals,hierarchical utility of the water bodies and to understand the non-conservative components in the water body. The parameters monitored werepH,temperature,alkalinity,conductivity,DO(dissolvedoxygen),COD(chemical oxygen demand),BOD(biochemical oxygen demand0,chloride, total hardness, calcium hardness, dissolved phosphate, nitrate, total iron, sulphate, turbidity, total coliform and SUVA at 254nm. The tidal canals of GCDA were found to be creeks extending to the interior, canals inter connecting parts of the estuary or canals with seasonally broken segments. Based on utility the canals could be classified as: canals heavely polluted and very saline,canals polluted by urban waste , canals having fresh water for most part of the year and not much polluted, fresh water bodies heavily polluted. During the rainy months carbon fixation by plankton is nonexistent,and during the dry months Chitrapuzha becomes a sink of phosphate. The study indicated abiotic subrouts for dissolved phosphate and revealed the potential pitfalls in LOICZ modeling exercise on sewage ladentidal canals. It was also found that all canals except for the canals of West cochin and chittoorpuzha have fresh water for some part of the year. The water quality index in the durable fresh water stretches was found to be of below average category.
Resumo:
Dental caries persists to be the most predominant oral disease in spite of remarkable progress made during the past half- century to reduce its prevalence. Early diagnosis of carious lesions is an important factor in the prevention and management of dental caries. Conventional procedures for caries detection involve visual-tactile and radiographic examination, which is considered as “gold standard”. These techniques are subjective and are unable to detect the lesions until they are well advanced and involve about one-third of the thickness of enamel. Therefore, all these factors necessitate the need for the development of new techniques for early diagnosis of carious lesions. Researchers have been trying to develop various instruments based on optical spectroscopic techniques for detection of dental caries during the last two decades. These optical spectroscopic techniques facilitate noninvasive and real-time tissue characterization with reduced radiation exposure to patient, thereby improving the management of dental caries. Nonetheless, a costeffective optical system with adequate sensitivity and specificity for clinical use is still not realized and development of such a system is a challenging task.Two key techniques based on the optical properties of dental hard tissues are discussed in this current thesis, namely laser-induced fluorescence (LIF) and diffuse reflectance (DR) spectroscopy for detection of tooth caries and demineralization. The work described in this thesis is mainly of applied nature, focusing on the analysis of data from in vitro tooth samples and extending these results to diagnose dental caries in a clinical environment. The work mainly aims to improve and contribute to the contemporary research on fluorescence and diffuse reflectance for discriminating different stages of carious lesions. Towards this, a portable and compact laser-induced fluorescence and reflectance spectroscopic system (LIFRS) was developed for point monitoring of fluorescence and diffuse reflectance spectra from tooth samples. The LIFRS system uses either a 337 nm nitrogen laser or a 404 nm diode laser for the excitation of tooth autofluorescence and a white light source (tungsten halogen lamp) for measuring diffuse reflectance.Extensive in vitro studies were carried out on extracted tooth samples to test the applicability of LIFRS system for detecting dental caries, before being tested in a clinical environment. Both LIF and DR studies were performed for diagnosis of dental caries, but special emphasis was given for early detection and also to discriminate between different stages of carious lesions. Further the potential of LIFRS system in detecting demineralization and remineralization were also assessed.In the clinical trial on 105 patients, fluorescence reference standard (FRS) criteria was developed based on LIF spectral ratios (F500/F635 and F500/F680) to discriminate different stages of caries and for early detection of dental caries. The FRS ratio scatter plots developed showed better sensitivity and specificity as compared to clinical and radiographic examination, and the results were validated with the blindtests. Moreover, the LIF spectra were analyzed by curve-fitting using Gaussian spectral functions and the derived curve-fitted parameters such as peak position, Gaussian curve area, amplitude and width were found to be useful for distinguishing different stages of caries. In DR studies, a novel method was established based on DR ratios (R500/R700, R600/R700 and R650/R700) to detect dental caries with improved accuracy. Further the diagnostic accuracy of LIFRS system was evaluated in terms of sensitivity, specificity and area under the ROC curve. On the basis of these results, the LIFRS system was found useful as a valuable adjunct to the clinicians for detecting carious lesions.
Resumo:
The ongoing depletion of the coastal aquifer in the Gaza strip due to groundwater overexploitation has led to the process of seawater intrusion, which is continually becoming a serious problem in Gaza, as the seawater has further invaded into many sections along the coastal shoreline. As a first step to get a hold on the problem, the artificial neural network (ANN)-model has been applied as a new approach and an attractive tool to study and predict groundwater levels without applying physically based hydrologic parameters, and also for the purpose to improve the understanding of complex groundwater systems and which is able to show the effects of hydrologic, meteorological and anthropogenic impacts on the groundwater conditions. Prediction of the future behaviour of the seawater intrusion process in the Gaza aquifer is thus of crucial importance to safeguard the already scarce groundwater resources in the region. In this study the coupled three-dimensional groundwater flow and density-dependent solute transport model SEAWAT, as implemented in Visual MODFLOW, is applied to the Gaza coastal aquifer system to simulate the location and the dynamics of the saltwater–freshwater interface in the aquifer in the time period 2000-2010. A very good agreement between simulated and observed TDS salinities with a correlation coefficient of 0.902 and 0.883 for both steady-state and transient calibration is obtained. After successful calibration of the solute transport model, simulation of future management scenarios for the Gaza aquifer have been carried out, in order to get a more comprehensive view of the effects of the artificial recharge planned in the Gaza strip for some time on forestall, or even to remedy, the presently existing adverse aquifer conditions, namely, low groundwater heads and high salinity by the end of the target simulation period, year 2040. To that avail, numerous management scenarios schemes are examined to maintain the ground water system and to control the salinity distributions within the target period 2011-2040. In the first, pessimistic scenario, it is assumed that pumping from the aquifer continues to increase in the near future to meet the rising water demand, and that there is not further recharge to the aquifer than what is provided by natural precipitation. The second, optimistic scenario assumes that treated surficial wastewater can be used as a source of additional artificial recharge to the aquifer which, in principle, should not only lead to an increased sustainable yield of the latter, but could, in the best of all cases, revert even some of the adverse present-day conditions in the aquifer, i.e., seawater intrusion. This scenario has been done with three different cases which differ by the locations and the extensions of the injection-fields for the treated wastewater. The results obtained with the first (do-nothing) scenario indicate that there will be ongoing negative impacts on the aquifer, such as a higher propensity for strong seawater intrusion into the Gaza aquifer. This scenario illustrates that, compared with 2010 situation of the baseline model, at the end of simulation period, year 2040, the amount of saltwater intrusion into the coastal aquifer will be increased by about 35 %, whereas the salinity will be increased by 34 %. In contrast, all three cases of the second (artificial recharge) scenario group can partly revert the present seawater intrusion. From the water budget point of view, compared with the first (do nothing) scenario, for year 2040, the water added to the aquifer by artificial recharge will reduces the amount of water entering the aquifer by seawater intrusion by 81, 77and 72 %, for the three recharge cases, respectively. Meanwhile, the salinity in the Gaza aquifer will be decreased by 15, 32 and 26% for the three cases, respectively.
Resumo:
Die zunehmende Vernetzung der Informations- und Kommunikationssysteme führt zu einer weiteren Erhöhung der Komplexität und damit auch zu einer weiteren Zunahme von Sicherheitslücken. Klassische Schutzmechanismen wie Firewall-Systeme und Anti-Malware-Lösungen bieten schon lange keinen Schutz mehr vor Eindringversuchen in IT-Infrastrukturen. Als ein sehr wirkungsvolles Instrument zum Schutz gegenüber Cyber-Attacken haben sich hierbei die Intrusion Detection Systeme (IDS) etabliert. Solche Systeme sammeln und analysieren Informationen von Netzwerkkomponenten und Rechnern, um ungewöhnliches Verhalten und Sicherheitsverletzungen automatisiert festzustellen. Während signatur-basierte Ansätze nur bereits bekannte Angriffsmuster detektieren können, sind anomalie-basierte IDS auch in der Lage, neue bisher unbekannte Angriffe (Zero-Day-Attacks) frühzeitig zu erkennen. Das Kernproblem von Intrusion Detection Systeme besteht jedoch in der optimalen Verarbeitung der gewaltigen Netzdaten und der Entwicklung eines in Echtzeit arbeitenden adaptiven Erkennungsmodells. Um diese Herausforderungen lösen zu können, stellt diese Dissertation ein Framework bereit, das aus zwei Hauptteilen besteht. Der erste Teil, OptiFilter genannt, verwendet ein dynamisches "Queuing Concept", um die zahlreich anfallenden Netzdaten weiter zu verarbeiten, baut fortlaufend Netzverbindungen auf, und exportiert strukturierte Input-Daten für das IDS. Den zweiten Teil stellt ein adaptiver Klassifikator dar, der ein Klassifikator-Modell basierend auf "Enhanced Growing Hierarchical Self Organizing Map" (EGHSOM), ein Modell für Netzwerk Normalzustand (NNB) und ein "Update Model" umfasst. In dem OptiFilter werden Tcpdump und SNMP traps benutzt, um die Netzwerkpakete und Hostereignisse fortlaufend zu aggregieren. Diese aggregierten Netzwerkpackete und Hostereignisse werden weiter analysiert und in Verbindungsvektoren umgewandelt. Zur Verbesserung der Erkennungsrate des adaptiven Klassifikators wird das künstliche neuronale Netz GHSOM intensiv untersucht und wesentlich weiterentwickelt. In dieser Dissertation werden unterschiedliche Ansätze vorgeschlagen und diskutiert. So wird eine classification-confidence margin threshold definiert, um die unbekannten bösartigen Verbindungen aufzudecken, die Stabilität der Wachstumstopologie durch neuartige Ansätze für die Initialisierung der Gewichtvektoren und durch die Stärkung der Winner Neuronen erhöht, und ein selbst-adaptives Verfahren eingeführt, um das Modell ständig aktualisieren zu können. Darüber hinaus besteht die Hauptaufgabe des NNB-Modells in der weiteren Untersuchung der erkannten unbekannten Verbindungen von der EGHSOM und der Überprüfung, ob sie normal sind. Jedoch, ändern sich die Netzverkehrsdaten wegen des Concept drif Phänomens ständig, was in Echtzeit zur Erzeugung nicht stationärer Netzdaten führt. Dieses Phänomen wird von dem Update-Modell besser kontrolliert. Das EGHSOM-Modell kann die neuen Anomalien effektiv erkennen und das NNB-Model passt die Änderungen in Netzdaten optimal an. Bei den experimentellen Untersuchungen hat das Framework erfolgversprechende Ergebnisse gezeigt. Im ersten Experiment wurde das Framework in Offline-Betriebsmodus evaluiert. Der OptiFilter wurde mit offline-, synthetischen- und realistischen Daten ausgewertet. Der adaptive Klassifikator wurde mit dem 10-Fold Cross Validation Verfahren evaluiert, um dessen Genauigkeit abzuschätzen. Im zweiten Experiment wurde das Framework auf einer 1 bis 10 GB Netzwerkstrecke installiert und im Online-Betriebsmodus in Echtzeit ausgewertet. Der OptiFilter hat erfolgreich die gewaltige Menge von Netzdaten in die strukturierten Verbindungsvektoren umgewandelt und der adaptive Klassifikator hat sie präzise klassifiziert. Die Vergleichsstudie zwischen dem entwickelten Framework und anderen bekannten IDS-Ansätzen zeigt, dass der vorgeschlagene IDSFramework alle anderen Ansätze übertrifft. Dies lässt sich auf folgende Kernpunkte zurückführen: Bearbeitung der gesammelten Netzdaten, Erreichung der besten Performanz (wie die Gesamtgenauigkeit), Detektieren unbekannter Verbindungen und Entwicklung des in Echtzeit arbeitenden Erkennungsmodells von Eindringversuchen.
Resumo:
Intrusive memories are common in the immediate aftermath of traumatic events, but neither their presence or frequency are good predictors of the persistence of posttraumatic stress disorder (PTSD). Two studies of assault survivors, a cross-sectional study (N = 81) and a 6-month prospective longitudinal study (N = 73), explored whether characteristics of the intrusive memories improve the prediction. Intrusion characteristics were assessed with an Intrusion Interview and an Intrusion Provocation Task. The distress caused by the intrusions, their "here and now" quality, and their lack of a context predicted PTSD severity. The presence of intrusive memories only explained 9% of the variance of PTSD severity at 6 months after assault. Among survivors with intrusions, intrusion frequency only explained 8% of the variance of PTSD symptom severity at 6 months. Nowness, distress and lack of context explained an additional 43% of the variance. These intrusion characteristics also predicted PTSD severity at 6 months over and above what could be predicted from PTSD diagnostic status at initial assessment. Further predictors of PTSD severity were rumination about. the intrusive memories, and the ease and persistence with which intrusive memories could be triggered by photographs depicting assaults. The results have implications for the early identification of trauma survivors at risk of chronic PTSD. (c) 2004 Elsevier Ltd. All rights reserved.
Resumo:
This paper represents the first step in an on-going work for designing an unsupervised method based on genetic algorithm for intrusion detection. Its main role in a broader system is to notify of an unusual traffic and in that way provide the possibility of detecting unknown attacks. Most of the machine-learning techniques deployed for intrusion detection are supervised as these techniques are generally more accurate, but this implies the need of labeling the data for training and testing which is time-consuming and error-prone. Hence, our goal is to devise an anomaly detector which would be unsupervised, but at the same time robust and accurate. Genetic algorithms are robust and able to avoid getting stuck in local optima, unlike the rest of clustering techniques. The model is verified on KDD99 benchmark dataset, generating a solution competitive with the solutions of the state-of-the-art which demonstrates high possibilities of the proposed method.