916 resultados para Tidal Intrusion


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Arrays of tidal energy converters have the potential to provide clean renewable energy for future generations. Benthic communities may, however, be affected by changes in current speeds resulting from arrays of tidal converters located in areas characterised by strong currents. Current speed, together with bottom type and depth, strongly influence benthic community distributions; however the interaction of these factors in controlling benthic dynamics in high energy environments is poorly understood. The Strangford Lough Narrows, the location of SeaGen, the world’s first single full-scale, grid-compliant tidal energy extractor, is characterised by spatially heterogenous high current flows. A hydrodynamic model was used to select a range of benthic community study sites that had median flow velocities between 1.5–2.4 m/s in a depth range of 25–30 m. 25 sites were sampled for macrobenthic community structure using drop down video survey to test the sensitivity of the distribution of benthic communities to changes in the flow field. A diverse range of species were recorded which were consistent with those for high current flow environments and corresponding to very tide-swept faunal communities in the EUNIS classification. However, over the velocity range investigated, no changes in benthic communities were observed. This suggested that the high physical disturbance associated with the high current flows in the Strangford Narrows reflected the opportunistic nature of the benthic species present with individuals being continuously and randomly affected by turbulent forces and physical damage. It is concluded that during operation, the removal of energy by marine tidal energy arrays in the far-field is unlikely to have a significant effect on benthic communities in high flow environments. The results are of major significance to developers and regulators in the tidal energy industry when considering the environmental impacts for site licences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security technology and exploring new methods to detect cyber-attacks with the DARPA 1998 dataset for Intrusion Detection and the modified versions of this dataset KDDCup99 and NSL-KDD, but until now no one have examined the performance of the Top 10 data mining algorithms selected by experts in data mining. The compared classification learning algorithms in this thesis are: C4.5, CART, k-NN and Naïve Bayes. The performance of these algorithms are compared with accuracy, error rate and average cost on modified versions of NSL-KDD train and test dataset where the instances are classified into normal and four cyber-attack categories: DoS, Probing, R2L and U2R. Additionally the most important features to detect cyber-attacks in all categories and in each category are evaluated with Weka’s Attribute Evaluator and ranked according to Information Gain. The results show that the classification algorithm with best performance on the dataset is the k-NN algorithm. The most important features to detect cyber-attacks are basic features such as the number of seconds of a network connection, the protocol used for the connection, the network service used, normal or error status of the connection and the number of data bytes sent. The most important features to detect DoS, Probing and R2L attacks are basic features and the least important features are content features. Unlike U2R attacks, where the content features are the most important features to detect attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Internet of things (IoT) is still in its infancy and has attracted much interest in many industrial sectors including medical fields, logistics tracking, smart cities and automobiles. However, as a paradigm, it is susceptible to a range of significant intrusion threats. This paper presents a threat analysis of the IoT and uses an Artificial Neural Network (ANN) to combat these threats. A multi-level perceptron, a type of supervised ANN, is trained using internet packet traces, then is assessed on its ability to thwart Distributed Denial of Service (DDoS/DoS) attacks. This paper focuses on the classification of normal and threat patterns on an IoT Network. The ANN procedure is validated against a simulated IoT network. The experimental results demonstrate 99.4% accuracy and can successfully detect various DDoS/DoS attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work presents the analysis of wave and turbulence measurements collected at a tidal energy site. A new method is introduced to produce more consistent and rigorous estimations of the velocity fluctuations power spectral densities. An analytical function is further proposed to fit the observed spectra and could be input to the numerical models predicting power production and structural loading on tidal turbines. Another new approach is developed to correct for the effect of the Doppler noise on the high frequencies power spectral densities. The analysis of velocity time series combining wave and turbulent contributions demonstrates that the turbulent motions are coherent throughout the water column, rendering the wave coherence-based methods not applicable to our dataset. To avoid this problem, an alternative approach relying on the pressure data collected by the ADCP is introduced and shows appreciable improvement in the wave-turbulence separation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we collate the algorithms used, the development of the systems and the outcome of their implementation. It provides an introduction and review of the key developments within this field, in addition to making suggestions for future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One key step of the industrial development of a tidal energy device is the testing of scale prototype devices within a controlled laboratory environment. At present, there is no available experimental protocol which addresses in a quantitative manner the differences which can be expected between results obtained from the different types of facilities currently employed for this type of testing. As a consequence, where differences between results are found it has been difficult to confirm the extent to which these differences relate to the device performance or to the test facility type. In the present study, a comparative ”Round Robin” testing programme has been conducted as part of the EC FP VII MaRINET program in order to evaluate the impact of different experimental facilities on the test results. The aim of the trials was to test the same model tidal turbine in four different test facilities to explore the sensitivity of the results to the choice of facility. The facilities comprised two towing tanks, of very different size, and two circulating water channels. Performance assessments in terms of torque, drag and inflow speed showed very similar results in all facilities. However, expected differences between the different tank types (circulating and towing) were observed in the fluctuations of torque and drag measurements. The main facility parameters which can influence the behaviour of the turbine were identified; in particular the effect of blockage was shown to be significant in cases yielding for high thrust coefficients, even at relatively small blockage ratios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Today the Ria de Aveiro of northern Portugal has a hydromorphological regime in which river influence is limited to periods of flood. For most of the annual cycle, tidal currents and wind waves are the major forcing agents in this complex coastal lagoon–estuarine system. The system has evolved over two centuries from one that was naturally fluvially dominant to one that is today tidally dominant. Human influence was a trigger for these changes, starting in 1808 when its natural evolution was halted by the construction of a new inlet/outlet channel through the mobile sand spit that isolates it from the Atlantic Ocean. In consequence, tidal ranges in the lagoon increased rapidly from ~0.1 m to >1 m and continued to increase, as a result of continued engineering works and dredging, today reaching ~3 m on spring tides. Hydromorphological adjustments that have taken place include the deepening of channels, an increase in the area of inter-tidal flats, regression of salt marsh, increased tidal propagation and increased saline intrusion. Loss of once abundant submerged aquatic vegetation (SAV), due to increased tidal flows, exacerbated by increased recreational activities, has been accompanied by a change from fine cohesive sediments to coarser, mobile sediments with reduced biological activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, is difficult to analyze. Intrusion alert correlation is the task of automating some of this analysis by grouping related alerts together. Attack graphs provide an intuitive model for such analysis. Unfortunately alert flooding attacks can still cause a loss of service on sensors, and when performing attack graph correlation, there can be a large number of extraneous alerts included in the output graph. This obscures the fine structure of genuine attacks and makes them more difficult for human operators to discern. This paper explores modified correlation algorithms which attempt to minimize the impact of this attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are very hard to stop completely, our aim is to present techniques that improve alert throughput and capacity to such an extent that the resources required to successfully mount the attack become prohibitive. The key idea presented is to combine a token bucket filter with a realtime correlation algorithm. The proposed algorithm throttles alert output from the IDS when an attack is detected. The attack graph used in the correlation algorithm is used to make sure that alerts crucial to forming strategies are not discarded by throttling.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, many tidal turbine projects have been developed using composites blades. Tidal turbine blades are subject to ocean forces and sea water aggressions, and the reliability of these components is crucial to the profitability of ocean energy recovery systems. The majority of tidal turbine developers have preferred carbon/epoxy blades, so there is a need to understand how prolonged immersion in the ocean affects these composites. In this study the long term behaviour of different carbon/epoxy composites has been studied using accelerated ageing tests. A significant reduction of composite strengths has been observed after saturation of water in the material. For longer immersions only small further changes in these properties occur. No significant changes have been observed for moduli nor for composite toughness. The effect of sea water ageing on damage thresholds and kinetics has been studied and modelled. After saturation, the damage threshold is modified while kinetics of damage development remain the same.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Markov Chain analysis was recently proposed to assess the time scales and preferential pathways into biological or physical networks by computing residence time, first passage time, rates of transfer between nodes and number of passages in a node. We propose to adapt an algorithm already published for simple systems to physical systems described with a high resolution hydrodynamic model. The method is applied to bays and estuaries on the Eastern Coast of Canada for their interest in shellfish aquaculture. Current velocities have been computed by using a 2 dimensional grid of elements and circulation patterns were summarized by averaging Eulerian flows between adjacent elements. Flows and volumes allow computing probabilities of transition between elements and to assess the average time needed by virtual particles to move from one element to another, the rate of transfer between two elements, and the average residence time of each system. We also combined transfer rates and times to assess the main pathways of virtual particles released in farmed areas and the potential influence of farmed areas on other areas. We suggest that Markov chain is complementary to other sets of ecological indicators proposed to analyse the interactions between farmed areas - e.g. depletion index, carrying capacity assessment. Markov Chain has several advantages with respect to the estimation of connectivity between pair of sites. It makes possible to estimate transfer rates and times at once in a very quick and efficient way, without the need to perform long term simulations of particle or tracer concentration.