980 resultados para Ce-anomaly
Resumo:
Raman spectra of the uranyl titanate mineral brannerite were analysed and related to the mineral structure. A comparison is made with the Raman spectra of uranyl oxyhydroxide hydrates. Observed bands are attributed to the TiO and (UO2)2+ stretching and bending vibrations, U-OH bending vibrations, H2O and (OH)- stretching, bending and libration modes. U-O bond lengths in uranyls and O-H…O bond lengths are calculated from the wavenumbers assigned to the stretching vibrations. Raman bands of brannerite are in harmony with those of the uranyl oxyhydroxides. The mineral brannerite is metamict as is evidenced by the intensity of the UO stretching and bending modes being of lower intensity than expected and with bands that are significantly broader.
Resumo:
Automated visual surveillance of crowds is a rapidly growing area of research. In this paper we focus on motion representation for the purpose of abnormality detection in crowded scenes. We propose a novel visual representation called textures of optical flow. The proposed representation measures the uniformity of a flow field in order to detect anomalous objects such as bicycles, vehicles and skateboarders; and can be combined with spatial information to detect other forms of abnormality. We demonstrate that the proposed approach outperforms state-of-the-art anomaly detection algorithms on a large, publicly-available dataset.
Resumo:
Raman spectra of the uranyl titanate mineral euxenite were analyzed and related to the mineral structure. A comparison is made with the Raman spectra of uranyl oxyhydroxide hydrates. The obsd. bands are attributed to the Ti[n.63743]O and (UO2)2+ stretching and bending vibrations, as well as lattice vibrations of rare-earth ions. The Raman bands of euxenite are in harmony with those of the uranyl oxyhydroxides. The mineral euxenite is metamict as is evidenced by the intensity of the U[n.63743]O stretching and bending modes, which are of lower intensity than expected, and with bands that are significantly broader.
Resumo:
Data preprocessing is widely recognized as an important stage in anomaly detection. This paper reviews the data preprocessing techniques used by anomaly-based network intrusion detection systems (NIDS), concentrating on which aspects of the network traffic are analyzed, and what feature construction and selection methods have been used. Motivation for the paper comes from the large impact data preprocessing has on the accuracy and capability of anomaly-based NIDS. The review finds that many NIDS limit their view of network traffic to the TCP/IP packet headers. Time-based statistics can be derived from these headers to detect network scans, network worm behavior, and denial of service attacks. A number of other NIDS perform deeper inspection of request packets to detect attacks against network services and network applications. More recent approaches analyze full service responses to detect attacks targeting clients. The review covers a wide range of NIDS, highlighting which classes of attack are detectable by each of these approaches. Data preprocessing is found to predominantly rely on expert domain knowledge for identifying the most relevant parts of network traffic and for constructing the initial candidate set of traffic features. On the other hand, automated methods have been widely used for feature extraction to reduce data dimensionality, and feature selection to find the most relevant subset of features from this candidate set. The review shows a trend toward deeper packet inspection to construct more relevant features through targeted content parsing. These context sensitive features are required to detect current attacks.
Resumo:
Background: Pregnant women find themselves subject to comments and questions from people in public areas. Normally, becoming ‘public property’ is considered friendly and is relatively easy for pregnant women to deal with. However, following diagnosis of a fetal anomaly, the experience of being public property can exacerbate the emotional turmoil experienced by couples. Original research question: What is the experience of couples who continue pregnancy following the diagnosis of a fetal anomaly? Method: The study used an interpretive design informed by Merleau-Ponty and this paper reports on a subset of findings. Thirty-one interviews with pregnant women and their partners were undertaken following the diagnosis of a serious or lethal fetal anomaly. Women were between 25 and 38 weeks gestation at the time of their first interview. The non-directive interviews were audiotaped, transcribed verbatim and the transcripts were thematically analysed. Findings: A prominent theme that emerged during data analysis was that pregnancy is embodied therefore physically evident and ‘public’. Women found it difficult to deal with being public property when the fetus had a serious or lethal anomaly. Some women avoided social situations; others did not disclose the fetal condition but gave minimal or avoidant answers to minimise distress to themselves and others. The male participants were not visibly pregnant and they could continue life in public without being subject to the public’s gaze, but they were very aware and concerned about its impact on their partner. Conclusion: The public tend to assume that pregnancy is normal and will produce a healthy baby. This becomes problematic for women who have a fetus with an anomaly. Women use strategies to help them cope with becoming public property during pregnancy. Midwives can play an important role in reducing the negative consequences of a woman becoming public property following the diagnosis of a fetal anomaly.
Resumo:
PURPOSE: To explore the experience of couples who continued pregnancy following a diagnosis of serious or lethal fetal anomaly. STUDY DESIGN: Thirty-one male and female participants were recruited from a high-risk maternal–fetal medicine clinic in Washington State. Data were collected using in-depth interviews during pregnancy and after the birth of their baby. Transcribed interviews were thematically analyzed through the phenomenological lens of Merleau-Ponty. FINDINGS: Participants described how time became reconfigured and reconstituted as they tried to compress a lifetime of love for their future child into a limited period. Participants’ concepts of time became distorted and were related to their perceptual lived experience rather than the schedule-filled,regimented, linear clock time that governed the health professionals. CONCLUSION: Living in distorted time may be a mechanism parents use to cope with overwhelming and disorienting feelings when their unborn baby is diagnosed with a fetal anomaly.
Resumo:
Il s’agit de faire des étudiants étrangers des usagers de bibliothèques et des apprenants heureux. Les professionnels des bibliothèques peuvent y contribuer, pour peu qu’ils soient sensibles à leurs points forts et aux difficultés qu’ils rencontrent. Cet article part du point de vue des étudiants étrangers recueillis lors d’une enquête qualitative menée dans deux universités australiennes. Celle-ci a révélé que, pris collectivement,ces étudiants sont satisfaits de leur bibliothèque universitaire. D’un point de vue individuel cependant, des difficultés apparaissent, liées à l’organisation de la bibliothèque, de ses services et de ses ressources. Pour certains étudiants, le rôle du personnel est assez flou ; ils ne se doutent même pas que les bibliothécaires peuvent les assister dans leurs études. Pour finir, les formations à la maîtrise de l’information ont été jugées inadaptées à leurs besoins. Cet article se concentre sur trois points à l’attention des bibliothécaires universitaires australiens : être sensible aux expériences des étudiants internationaux ; identifier les besoins d’apprentissage et mettre en oeuvre des stratégies qui répondent à ces besoins.
Resumo:
In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis was applied which lead to a decrease of about 80 of the amount of monitored features.
Resumo:
Some minerals are colloidal and show no X-ray diffraction patterns. Vibrational spectroscopy offers one of the few methods for the assessment of the structure of these types of mineral. Among this group of minerals is kemmlitzite (Sr,Ce)Al3(AsO4)(SO4)(OH)6. The objective of this research is to determine the molecular structure of the mineral kemmlitzite using vibrational spectroscopy. Raman microscopy offers a useful method for the analysis of such colloidal minerals. Raman and infrared bands are attributed to the AsO43- , SO42- and water stretching vibrations. The Raman spectrum is dominated by a very intense sharp band at 984 cm-1 assigned to the SO42- symmetric stretching mode. Raman bands at 690, 772 and 825 cm-1 may be assigned to the AsO43- antisymmetric and symmetric stretching modes. Raman bands observed at 432 and 465 cm-1 are attributable to the doubly degenerate 2 (SO4)2- bending mode. Vibrational spectroscopy is important in the assessment of the molecular structure of the kemmlitzite, especially when the mineral is non-diffracting or poorly diffracting.
Resumo:
Online social networks can be modelled as graphs; in this paper, we analyze the use of graph metrics for identifying users with anomalous relationships to other users. A framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users. Experimental results on real-world data collected from online social networks show that the majority of users typically have friends who are friends themselves, whereas anomalous users’ graphs typically do not follow this common rule. Empirical analysis also shows that the relationship between average betweenness centrality and edges identifies anomalies more accurately than other approaches.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
Anomaly detection compensates shortcomings of signature-based detection such as protecting against Zero-Day exploits. However, Anomaly Detection can be resource-intensive and is plagued by a high false-positive rate. In this work, we address these problems by presenting a Cooperative Intrusion Detection approach for the AIS, the Artificial Immune System, as an example for an anomaly detection approach. In particular we show, how the cooperative approach reduces the false-positive rate of the detection and how the overall detection process can be organized to account for the resource constraints of the participating devices. Evaluations are carried out with the novel network simulation environment NeSSi as well as formally with an extension to the epidemic spread model SIR
Resumo:
Detecting anomalies in the online social network is a significant task as it assists in revealing the useful and interesting information about the user behavior on the network. This paper proposes a rule-based hybrid method using graph theory, Fuzzy clustering and Fuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies. Fuzzy C-Means clustering is used to cluster the data and Fuzzy inference engine is used to generate rules based on the cluster behavior. The proposed method is able to achieve improved accuracy for identifying anomalies in comparison to existing methods.
Resumo:
This research is a step forward in improving the accuracy of detecting anomaly in a data graph representing connectivity between people in an online social network. The proposed hybrid methods are based on fuzzy machine learning techniques utilising different types of structural input features. The methods are presented within a multi-layered framework which provides the full requirements needed for finding anomalies in data graphs generated from online social networks, including data modelling and analysis, labelling, and evaluation.
Resumo:
Samples of marble from Chillagoe, North Queensland have been analyzed using scanning electron microscopy (SEM) with energy dispersive X-ray spectroscopy (EDS) and Raman spectroscopy. Chemical analyses provide evidence for the presence of minerals other than limestone and calcite in the marble, including silicate minerals. Some of these analyses correspond to silicate minerals. The Raman spectra of these crystals were obtained and the Raman spectrum corresponds to that of allanite from the Arizona State University data base (RRUFF) data base. The combination of SEM with EDS and Raman spectroscopy enables the characterization of the mineral allanite in the Chillagoe marble.