897 resultados para in-field detection


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Efforts to address the problems of literacy are often focused on developing countries. However, functional illiteracy is a challenge encountered by up to 50% of adults in developed countries. In this paper we reflect on the challenges we faced in trying to design and study the use of a mobile application to support adult literacy with two user groups: adults enrolled in literacy classes and carpenters without a high school education enrolled in an essential skills program. We also elaborate on aspects of the evaluations that are specific to a marginalized, functionally illiterate, group in a developed country - aspects that are less frequently present in similar studies of mobile literacy support technologies in developing countries. We conclude with presenting the lessons learnt from our evaluations and the impact of the studies' specific challenges on the outcome and uptake of such mobile assistive technologies in providing practical support to low-literacy adults in conjunction with literacy and essential skills training.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We propose a method for detecting and analyzing the so-called replay attacks in intrusion detection systems, when an intruder contributes a small amount of hostile actions to a recorded session of a legitimate user or process, and replays this session back to the system. The proposed approach can be applied if an automata-based model is used to describe behavior of active entities in a computer system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: Financial abuse of elders is an under acknowledged problem and professionals' judgements contribute to both the prevalence of abuse and the ability to prevent and intervene. In the absence of a definitive "gold standard" for the judgement, it is desirable to try and bring novice professionals' judgemental risk thresholds to the level of competent professionals as quickly and effectively as possible. This study aimed to test if a training intervention was able to bring novices' risk thresholds for financial abuse in line with expert opinion. Methods: A signal detection analysis, within a randomised controlled trial of an educational intervention, was undertaken to examine the effect on the ability of novices to efficiently detect financial abuse. Novices (n = 154) and experts (n = 33) judged "certainty of risk" across 43 scenarios; whether a scenario constituted a case of financial abuse or not was a function of expert opinion. Novices (n = 154) were randomised to receive either an on-line educational intervention to improve financial abuse detection (n = 78) or a control group (no on-line educational intervention, n = 76). Both groups examined 28 scenarios of abuse (11 "signal" scenarios of risk and 17 "noise" scenarios of no risk). After the intervention group had received the on-line training, both groups then examined 15 further scenarios (5 "signal" and 10 "noise" scenarios). Results: Experts were more certain than the novices, pre (Mean 70.61 vs. 58.04) and post intervention (Mean 70.84 vs. 63.04); and more consistent. The intervention group (mean 64.64) were more certain of abuse post-intervention than the control group (mean 61.41, p = 0.02). Signal detection analysis of sensitivity (Á) and bias (C) revealed that this was due to the intervention shifting the novices' tendency towards saying "at risk" (C post intervention -.34) and away from their pre intervention levels of bias (C-.12). Receiver operating curves revealed more efficient judgments in the intervention group. Conclusion: An educational intervention can improve judgements of financial abuse amongst novice professionals.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Araucaria angustifolia é uma espécie nativa potencial para a silvicultura brasileira. No entanto, uma série de desafios e limitações técnicas ainda persistem, dificultando sua expansão silvicultural, dentre os quais se destaca a falta de tecnologias de clonagem de materiais genéticos superiores, bem como sua avaliação em condições de campo. Assim, objetivou-se avaliar a potencialidade da utilização de mudas de araucária oriundas de estaquia e de sementes para produção madeireira, por meio da avaliação da sobrevivência e crescimento a campo. Clones provenientes de matrizes masculinas e femininas, de diferentes tipos de estacas e mudas de sementes foram plantadas em espaçamento 3 x 3 m. O experimento foi conduzido em delineamento inteiramente casualizado, com três tratamentos e parcelas de uma planta (one tree plot). Clones do sexo feminino e de estacas contendo o ápice apresentaram maior crescimento em diâmetro à altura do peito (6,4 cm) e altura total (3,6 m) aos 74 meses após o plantio, seguidas das de sementes e demais clones, com resultados similares. Conclui-se que a estaquia é uma técnica potencial de produção de mudas de araucária para fins madeireiros e é favorecida pela utilização de estacas proveniente de matrizes femininas e com ápice.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The electronic conduction of thin-film field-effect-transistors (FETs) of sexithiophene was studied. In most cases the transfer curves deviate from standard FET theory; they are not linear, but follow a power law instead. These results are compared to conduction models of "variable-range hopping" and "multi-trap-and-release". The accompanying IV curves follow a Poole-Frenkel (exponential) dependence on the drain voltage. The results are explained assuming a huge density of traps. Below 200 K, the activation energy for conduction was found to be ca. 0.17 eV. The activation energies of the mobility follow the Meyer-Neldel rule. A sharp transition is seen in the behavior of the devices at around 200 K. The difference in behavior of a micro-FET and a submicron FET is shown. (C) 2004 American Institute of Physics.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Previous research with the ratio-bias task found larger response latencies for conflict trials where the heuristic- and analytic-based responses are assumed to be in opposition (e.g., choosing between 1/10 and 9/100 ratios of success) when compared to no-conflict trials where both processes converge on the same response (e.g., choosing between 1/10 and 11/100). This pattern is consistent with parallel dualprocess models, which assume that there is effective, rather than lax, monitoring of the output of heuristic processing. It is, however, unclear why conflict resolution sometimes fails. Ratio-biased choices may increase because of a decline in analytical reasoning (leaving heuristic-based responses unopposed) or to a rise in heuristic processing (making it more difficult for analytic processes to override the heuristic preferences). Using the process-dissociation procedure, we found that instructions to respond logically and response speed affected analytic (controlled) processing (C), leaving heuristic processing (H) unchanged, whereas the intuitive preference for large nominators (as assessed by responses to equal ratio trials) affected H but not C. These findings create new challenges to the debate between dual-process and singleprocess accounts, which are discussed.