812 resultados para Milliken, Weston Freeman


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a new laboratory-based module for embedded systems teaching, which addresses the current lack of consideration for the link between hardware development, software implementation, course content and student evaluation in a laboratory environment. The course introduces second year undergraduate students to the interface between hardware and software and the programming of embedded devices; in this case, the PIC (originally peripheral interface controller, later rebranded programmable intelligent computer) microcontroller. A hardware development board designed for use in the laboratories of this module is presented. Through hands on laboratory experience, students are encouraged to engage with practical problem-solving exercises and develop programming skills across a broad range of scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While WiFi monitoring networks have been deployed in previous research, to date none have assessed live network data from an open access, public environment. In this paper we describe the construction of a replicable, independent WLAN monitoring system and address some of the challenges in analysing the resultant traffic. Analysis of traffic from the system demonstrates that basic traffic information from open-access networks varies over time (temporal inconsistency). The results also show that arbitrary selection of Request-Reply intervals can have a significant effect on Probe and Association frame exchange calculations, which can impact on the ability to detect flooding attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more detail at these lower layers than their wired counterparts as they face unique challenges. The remainder of this chapter will investigate three of these challenges where WiFi deviates significantly from that of wired counterparts:

• Attacks Specific to WiFi Networks: Outlining the additional threats which WIDS must account for: Denial of Service, Encryption Bypass and AP Masquerading attacks.

• The Effect of Deployment Architecture on WIDS Performance: Demonstrating that the deployment environment of a network protected by a WIDS can influence the prioritisation of attacks.

• The Importance of Live Data in WiFi Research: Investigating the different choices for research data sources with an emphasis on encouraging live network data collection for future WiFi research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The IDS (Intrusion Detection System) is a common means of protecting networked systems from attack or malicious misuse. The development and rollout of an IDS can take many different forms in terms of equipment, protocols, connectivity, cost and automation. This is particularly true of WIDS (Wireless Intrusion Detection Systems) which have many more opportunities and challenges associated with data transmission through an open, shared medium.
The operation of a WIDS is a multistep process from origination of an attack through to human readable evaluation. Attention to the performance of each of the processes in the chain from attack detection to evaluation is imperative if an optimum solution is to be sought. At present, research focuses very much on each discrete aspect of a WIDS with little consideration to the operation of the whole system. Taking a holistic view of the technology shows the interconnectivity and inter-dependence between stages, leading to improvements and novel research areas for investigation.
This chapter will outline the general structure of Wireless Intrusion Detection Systems and briefly describe the functions of each development stage, categorised into the following 6 areas:
• Threat Identification,
• Architecture,
• Data Collection,
• Intrusion Detection,
• Alert Correlation,
• Evaluation.
These topics will be considered in broad terms designed for those new to the area. Focus will be placed on ensuring the readers are aware of the impact of choices made at early stages in WIDS development on future stages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The susceptibility of WiFi networks to Rogue Access Point attacks derives from the lack of identity for 802.11 devices. The most common means of detecting these attacks in current research is through tracking the credentials or the location of unauthorised and possibly malicious APs. In this paper, the authors outline a method of distinguishing WiFi Access Points using 802.11 MAC layer management frame traffic profiles. This system does not require location estimation or credential tracking techniques as used in current research techniques, which are known to be inaccurate. These characteristic management traffic profiles are shown to be unique for each device, tantamount to a MAC identity. The application of this technique to solving Rogue AP attacks under the constraints of an open access, public WiFi environment is discussed with the conclusion that the identity is practically very difficult to forge

Relevância:

10.00% 10.00%

Publicador:

Resumo:

DeAuthentication Denial of Service attacks in Public Access WiFi operate by exploiting the lack of authentication of management frames in the 802.11 protocol. Detection of these attacks rely almost exclusively on the selection of appropriate thresholds. In this work the authors demonstrate that there are additional, previously unconsidered, metrics which also influence DoS detection performance. A method of systematically tuning these metrics to optimal values is proposed which ensures that parameter choices are repeatable and verifiable.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Usher syndrome, a combination of retinitis pigmentosa (RP) and sensorineural hearing loss with or without vestibular dysfunction, displays a high degree of clinical and genetic heterogeneity. Three clinical subtypes can be distinguished, based on the age of onset and severity of the hearing impairment, and the presence or absence of vestibular abnormalities. Thus far, eight genes have been implicated in the syndrome, together comprising 347 protein-coding exons.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Identifying rare, highly penetrant risk mutations may be an important step in dissecting the molecular etiology of schizophrenia. We conducted a gene-based analysis of large (>100kb), rare copy number variants (CNVs) in the Wellcome Trust Case Control Consortium 2 (WTCCC2) schizophrenia sample of 1,564 cases and 1,748 controls all from Ireland, and further extended the analysis to include an additional 5,196 UK controls. We found association with duplications at chr20p12.2 (P=0.007) and evidence of replication in large independent European schizophrenia (P=0.052) and UK bipolar disorder case-control cohorts (P=0.047). A combined analysis of Irish/UK subjects including additional psychosis cases (schizophrenia and bipolar disorder) identified 22 carriers in 11,707 cases and 10 carriers in 21,204 controls (meta-analysis CMH P value=2x10(-4) (odds ratio (OR)=11.3, 95% CI=3.7, ∞)). Nineteen of the 22 cases and 8 of the 10 controls carried duplications starting at 9.68Mb with similar breakpoints across samples. By haplotype analysis and sequencing we identified a tandem ∼149kb duplication overlapping the gene p21 Protein-Activated Kinase 7 (PAK7, also called PAK5) which was in linkage disequilibrium with local haplotypes (P=2.5x10(-21)), indicative of a single ancestral duplication event. We confirmed the breakpoints in 8/8 carriers tested and found co-segregation of the duplication with illness in two additional family members of one of the affected probands. We demonstrate that PAK7 is developmentally co-expressed with another known psychosis risk gene (DISC1) suggesting a potential molecular mechanism involving aberrant synapse development and plasticity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Depression in palliative care patients is important because of its intrinsic burden and association with elevated physical symptoms, reduced immunity and increased mortality risk. Identifying risk factors associated with depression can enable clinicians to more readily diagnose it, which is important since depression is treatable. The purpose of this cross-sectional study was to determine the prevalence of depressive symptoms and risk factors associated with them in a large sample of palliative home care patients.

Methods: The data come from interRAI Palliative Care assessments completed between 2006 and 2012. The sample (n = 5144) consists of adults residing in Ontario (Canada), receiving home care services, classified as palliative, and not experiencing significant cognitive impairment. Logistic regression identified the risk factors associated with depressive symptoms. The dependent variable was the Depression Rating Scale (DRS) and the independent variables were functional indicators from the interRAI assessment and other variables identified in the literature. We examined the results of the complete case and multiple imputation analyses, and found them to be similar.

Results: The prevalence of depressive symptoms was 9.8%. The risk factors associated with depressive symptoms were (pooled estimates, multiple imputation): low life satisfaction (OR = 3.01 [CI = 2.37-3.82]), severe and moderate sleep disorders (2.56 [2.05-3.19] and 1.56 [1.18-2.06]), health instability (2.12 [1.42-3.18]), caregiver distress 2.01 [1.62-2.51]), daily pain (1.73 [1.35-2.22]), cognitive impairment (1.45 [1.13-1.87]), being female (1.37 [1.11-1.68]), and gastrointestinal symptoms (1.27 [1.03-1.55]). Life satisfaction mediated the effect of prognostic awareness on depressive symptoms.

Conclusions: The prevalence of depressive symptoms in our study was close to the median of 10-20% reported in the palliative care literature, suggesting they are present but by no means inevitable in palliative patients. Most of the factors associated with depressive symptoms in our study are amenable to clinical intervention and often targeted in palliative care programs. Designing interventions to address them can be challenging, however, requiring careful attention to patient preferences, the spectrum of comorbid conditions they face, and their social supports. Life satisfaction was one of the strongest factors associated with depressive symptoms in our study, and is likely to be among the most challenging to address.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A novel method for characterising the full spectrum of deuteron ions emitted by laser driven multi-species ion sources is discussed. The procedure is based on using differential filtering over the detector of a Thompson parabola ion spectrometer, which enables discrimination of deuterium ions from heavier ion species with the same charge-to-mass ratio (such as C6 +, O8 +, etc.). Commonly used Fuji Image plates were used as detectors in the spectrometer, whose absolute response to deuterium ions over a wide range of energies was calibrated by using slotted CR-39 nuclear track detectors. A typical deuterium ion spectrum diagnosed in a recent experimental campaign is presented, which was produced from a thin deuterated plastic foil target irradiated by a high power laser.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The energy transfer by stimulated Brillouin backscatter from a long pump pulse (15 ps) to a short seed pulse (1 ps)has been investigated in a proof-of-principle demonstration experiment. The two pulses were both amplified in differentbeamlines of a Nd:glass laser system, had a central wavelength of 1054 nm and a spectral bandwidth of 2 nm, and crossedeach other in an underdense plasma in a counter-propagating geometry, off-set by 10◦. It is shown that the energy transferand the wavelength of the generated Brillouin peak depend on the plasma density, the intensity of the laser pulses, and thecompetition between two-plasmon decay and stimulated Raman scatter instabilities. The highest obtained energy transferfrom pump to probe pulse is 2.5%, at a plasma density of 0.17ncr, and this energy transfer increases significantly withplasma density. Therefore, our results suggest that much higher efficiencies can be obtained when higher densities (above0.25ncr) are used.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We report on the successful demonstration of selective acceleration of deuterium ions by target-normal sheath acceleration (TNSA) with a high-energy petawatt laser. TNSA typically produces a multi-species ion beam that originates from the intrinsic hydrocarbon and water vapor contaminants on the target surface. Using the method first developed by Morrison et al. [Phys. Plasmas 19, 030707 (2012)], an ion beam with >99% deuterium ions and peak energy 14 MeV/nucleon is produced with a 200 J, 700 fs, > 10 20 W/cm 2 laser pulse by cryogenically freezing heavy water (D<inf>2</inf>O) vapor onto the rear surface of the target prior to the shot. Within the range of our detectors (0°-8.5°), we find laser-to-deuterium-ion energy conversion efficiency of 4.3% above 0.7 MeV/nucleon while a conservative estimate of the total beam gives a conversion efficiency of 9.4%.