949 resultados para making computer games


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The modeling technique of Mackay et al. is applied to simulate the coronal magnetic field of NOAA active region AR10977 over a seven day period (2007 December 2-10). The simulation is driven with a sequence of line-of-sight component magnetograms from SOHO/MDI and evolves the coronal magnetic field though a continuous series of non-linear force-free states. Upon comparison with Hinode/XRT observations, results show that the simulation reproduces many features of the active region's evolution. In particular, it describes the formation of a flux rope across the polarity inversion line during flux cancellation. The flux rope forms at the same location as an observed X-ray sigmoid. After five days of evolution, the free magnetic energy contained within the flux rope was found to be 3.9 × 1030 erg. This value is more than sufficient to account for the B1.4 GOES flare observed from the active region on 2007 December 7. At the time of the observed eruption, the flux rope was found to contain 20% of the active region flux. We conclude that the modeling technique proposed in Mackay et al.—which directly uses observed magnetograms to energize the coronal field—is a viable method to simulate the evolution of the coronal magnetic field.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Background: Digital forensics is a rapidly expanding field, due to the continuing advances in computer technology and increases in data stage capabilities of devices. However, the tools supporting digital forensics investigations have not kept pace with this evolution, often leaving the investigator to analyse large volumes of textual data and rely heavily on their own intuition and experience. Aim: This research proposes that given the ability of information visualisation to provide an end user with an intuitive way to rapidly analyse large volumes of complex data, such approached could be applied to digital forensics datasets. Such methods will be investigated; supported by a review of literature regarding the use of such techniques in other fields. The hypothesis of this research body is that by utilising exploratory information visualisation techniques in the form of a tool to support digital forensic investigations, gains in investigative effectiveness can be realised. Method:To test the hypothesis, this research examines three different case studies which look at different forms of information visualisation and their implementation with a digital forensic dataset. Two of these case studies take the form of prototype tools developed by the researcher, and one case study utilises a tool created by a third party research group. A pilot study by the researcher is conducted on these cases, with the strengths and weaknesses of each being drawn into the next case study. The culmination of these case studies is a prototype tool which was developed to resemble a timeline visualisation of the user behaviour on a device. This tool was subjected to an experiment involving a class of university digital forensics students who were given a number of questions about a synthetic digital forensic dataset. Approximately half were given the prototype tool, named Insight, to use, and the others given a common open-source tool. The assessed metrics included: how long the participants took to complete all tasks, how accurate their answers to the tasks were, and how easy the participants found the tasks to complete. They were also asked for their feedback at multiple points throughout the task. Results:The results showed that there was a statistically significant increase in accuracy for one of the six tasks for the participants using the Insight prototype tool. Participants also found completing two of the six tasks significantly easier when using the prototype tool. There were no statistically significant different difference between the completion times of both participant groups. There were no statistically significant differences in the accuracy of participant answers for five of the six tasks. Conclusions: The results from this body of research show that there is evidence to suggest that there is the potential for gains in investigative effectiveness when information visualisation techniques are applied to a digital forensic dataset. Specifically, in some scenarios, the investigator can draw conclusions which are more accurate than those drawn when using primarily textual tools. There is also evidence so suggest that the investigators found these conclusions to be reached significantly more easily when using a tool with a visual format. None of the scenarios led to the investigators being at a significant disadvantage in terms of accuracy or usability when using the prototype visual tool over the textual tool. It is noted that this research did not show that the use of information visualisation techniques leads to any statistically significant difference in the time taken to complete a digital forensics investigation.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators examining the operation of software. The ability to carry out reverse-engineering of software is of great importance within the security and forensics elds, particularly when investigating malicious software or carrying out forensic analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Uni ed Device Architecture) framework, it is not clear how best to approach the reverse engineering of a piece of CUDA software. We carry out a review of the di erent binary output formats which may be encountered from the CUDA compiler, and their implications on reverse engineering. We then demonstrate the process of carrying out disassembly of an example CUDA application, to establish the various techniques available to forensic investigators carrying out black-box disassembly and reverse engineering of CUDA binaries. We show that the Nvidia compiler, using default settings, leaks useful information. Finally, we demonstrate techniques to better protect intellectual property in CUDA algorithm implementations from reverse engineering.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Coronal jets represent important manifestations of ubiquitous solar transients, which may be the source of significant mass and energy input to the upper solar atmosphere and the solar wind. While the energy involved in a jet-like event is smaller than that of “nominal” solar flares and coronal mass ejections (CMEs), jets share many common properties with these phenomena, in particular, the explosive magnetically driven dynamics. Studies of jets could, therefore, provide critical insight for understanding the larger, more complex drivers of the solar activity. On the other side of the size-spectrum, the study of jets could also supply important clues on the physics of transients close or at the limit of the current spatial resolution such as spicules. Furthermore, jet phenomena may hint to basic process for heating the corona and accelerating the solar wind; consequently their study gives us the opportunity to attack a broad range of solar-heliospheric problems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Becoming a mother presents a woman with new challenges and a need to access new sources of information. This work considers the increase in the use of online parenting support as the first group of millennials become parents. Initial results from a survey comparing the use of technology pre and post the experience of childbirth is presented. The survey reveals that mothers are likely to increase the time they spend online and are strongly motivated by seeking social contact. The paper concludes by considering the implications of this survey for healthcare professionals wishing to give information and support through online media and suggests how HCI professionals can become involved in this work.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Within the last decade design has had a strategic role in tackling escalating environmental, social and economic problems. Through design thinking, creative methods have been applied to problem solving in a process of collaboration and designers working in new territories and knowledge domains. As the designer has moved further afield the method of Knowledge Exchange (KE) has become more recognised as a democratic approach to collaboration with the ethos that everyone has something creative and productive to offer. This paper provides reflections on early stage findings from a strategic design innovation process in which collaborative partnerships between academics, SMEs and designers emerged through KE and suggests that there is value to be had from using design strategically for not only those from a business or academic background but also for those from the design community and points to a need for more training for designers from all disciplines in how to use design strategically

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Targeted cancer therapy aims to disrupt aberrant cellular signalling pathways. Biomarkers are surrogates of pathway state, but there is limited success in translating candidate biomarkers to clinical practice due to the intrinsic complexity of pathway networks. Systems biology approaches afford better understanding of complex, dynamical interactions in signalling pathways targeted by anticancer drugs. However, adoption of dynamical modelling by clinicians and biologists is impeded by model inaccessibility. Drawing on computer games technology, we present a novel visualisation toolkit, SiViT, that converts systems biology models of cancer cell signalling into interactive simulations that can be used without specialist computational expertise. SiViT allows clinicians and biologists to directly introduce for example loss of function mutations and specific inhibitors. SiViT animates the effects of these introductions on pathway dynamics, suggesting further experiments and assessing candidate biomarker effectiveness. In a systems biology model of Her2 signalling we experimentally validated predictions using SiViT, revealing the dynamics of biomarkers of drug resistance and highlighting the role of pathway crosstalk. No model is ever complete: the iteration of real data and simulation facilitates continued evolution of more accurate, useful models. SiViT will make accessible libraries of models to support preclinical research, combinatorial strategy design and biomarker discovery.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis. This includes data related to: Host, Network, Session, Asset, Alert and Protocols. Security Onion can be implemented as a standalone deployment with server and sensor included or with a master server and multiple sensors allowing for the system to be scaled as required. Many interfaces and tools are available for management of the system and analysis of data such as Sguil, Snorby, Squert and Enterprise Log Search and Archive (ELSA). These interfaces can be used for analysis of alerts and captured events and then can be further exported for analysis in Network Forensic Analysis Tools (NFAT) such as NetworkMiner, CapME or Xplico. The Security Onion platform also provides various methods of management such as Secure SHell (SSH) for management of server and sensors and Web client remote access. All of this with the ability to replay and analyse example malicious traffic makes the Security Onion a suitable low cost alternative for Network Security Management. In this paper, we have a feature and functionality review for the Security Onion in terms of: types of data, configuration, interface, tools and system management.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Brown dwarfs and giant gas extrasolar planets have cold atmospheres with rich chemical compositions from which mineral cloud particles form. Their properties, like particle sizes and material composition, vary with height, and the mineral cloud particles are charged due to triboelectric processes in such dynamic atmospheres. The dynamics of the atmospheric gas is driven by the irradiating host star and/or by the rotation of the objects that changes during its lifetime. Thermal gas ionisation in these ultra-cool but dense atmospheres allows electrostatic interactions and magnetic coupling of a substantial atmosphere volume. Combined with a strong magnetic field , a chromosphere and aurorae might form as suggested by radio and x-ray observations of brown dwarfs. Non-equilibrium processes like cosmic ray ionisation and discharge processes in clouds will increase the local pool of free electrons in the gas. Cosmic rays and lighting discharges also alter the composition of the local atmospheric gas such that tracer molecules might be identified. Cosmic rays affect the atmosphere through air showers in a certain volume which was modelled with a 3D Monte Carlo radiative transfer code to be able to visualise their spacial extent. Given a certain degree of thermal ionisation of the atmospheric gas, we suggest that electron attachment to charge mineral cloud particles is too inefficient to cause an electrostatic disruption of the cloud particles. Cloud particles will therefore not be destroyed by Coulomb explosion for the local temperature in the collisional dominated brown dwarf and giant gas planet atmospheres. However, the cloud particles are destroyed electrostatically in regions with strong gas ionisation. The potential size of such cloud holes would, however, be too small and might occur too far inside the cloud to mimic the effect of, e.g. magnetic field induced star spots.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We present a new model for the Sun's global photospheric magnetic field during a deep minimum of activity, in which no active regions emerge. The emergence and subsequent evolution of small- scale magnetic features across the full solar surface is simulated, subject to the influence of a global supergranular flow pattern. Visually, the resulting simulated magnetograms reproduce the typical structure and scale observed in quiet Sun magnetograms. Quantitatively, the simulation quickly reaches a steady state, resulting in a mean field and flux distribution that are in good agreement with those determined from observations. A potential coronal magnetic field is extrapolated from the simulated full Sun magnetograms, to consider the implications of such a quiet photospheric magnetic field on the corona and inner heliosphere. The bulk of the coronal magnetic field closes very low down, in short connections between small-scale features in the simulated magnetic network. Just 0.1% of the photospheric magnetic flux is found to be open at 2:5 Rʘ, around 10 - 100 times less than that determined for typical HMI synoptic map observations. If such conditions were to exist on the Sun, this would lead to a significantly weaker interplanetary magnetic field than is presently observed, and hence a much higher cosmic ray flux at Earth.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This analysis paper presents previously unknown properties of some special cases of the Wright function whose consideration is necessitated by our work on probability theory and the theory of stochastic processes. Specifically, we establish new asymptotic properties of the particular Wright function 1Ψ1(ρ, k; ρ, 0; x) = X∞ n=0 Γ(k + ρn) Γ(ρn) x n n! (|x| < ∞) when the parameter ρ ∈ (−1, 0)∪(0, ∞) and the argument x is real. In the probability theory applications, which are focused on studies of the Poisson-Tweedie mixtures, the parameter k is a non-negative integer. Several representations involving well-known special functions are given for certain particular values of ρ. The asymptotics of 1Ψ1(ρ, k; ρ, 0; x) are obtained under numerous assumptions on the behavior of the arguments k and x when the parameter ρ is both positive and negative. We also provide some integral representations and structural properties involving the ‘reduced’ Wright function 0Ψ1(−−; ρ, 0; x) with ρ ∈ (−1, 0) ∪ (0, ∞), which might be useful for the derivation of new properties of members of the power-variance family of distributions. Some of these imply a reflection principle that connects the functions 0Ψ1(−−;±ρ, 0; ·) and certain Bessel functions. Several asymptotic relationships for both particular cases of this function are also given. A few of these follow under additional constraints from probability theory results which, although previously available, were unknown to analysts.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We have conducted a mini-survey for low-frequency radio emission from some of the closest brown dwarfs to the Sun with rapid rotation rates: SIMP J013656.5 +093347, WISEPC 150649.97+702736.0, and WISEPA J174124.26+255319.5.We have placed robust 3s upper limits on the flux density in the 111 – 169 MHz frequency range for these targets: WISE 1506: < 0:72 mJy; WISE 1741: < 0:87 mJy; SIMP 0136: < 0:66 mJy. At 8 hours of integration per target to achieve these limits, we find that systematic and detailed study of this class of object at LOFAR frequencies will require a substantial dedication of resources.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This was a peer-reviewed event that took place at the DiGRA-FDG conference in August 2016. While it has a paper component (the attached proposal), the output was a demonstration of games rather than a conference paper. As such, this entry should be considered an Event or Exhibition.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This study collected a sample of YouTube videos in which parents recorded their young children utilizing mobile touchscreen devices. Focusing on the more frequently viewed and highly-discussed videos, the paper analyzes the ways in which babies’ ‘digital dexterity’ is coded and understood in terms of contested notions of ‘naturalness’, and how the display of these capabilities is produced for a networked public. This reading of the ‘baby-iPad encounter’ helps expand existing scholarly concepts such as parental mediation and technology domestication. Recruiting several theoretical frameworks, the paper seeks to go beyond concerns of mobile devices and immobile children by analyzing children’s digital dexterity not just as a kind of mobility, but also as a set of reciprocal mobilizations that work across domestic, virtual and publically networked spaces.