910 resultados para Dynamic changes


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Classrooms of the 21st century are complex systems. They support diverse learners from varied contexts and function in a “messy” bricolage of policy contexts. This complexity is also evident in the nature of teaching and learning deployed in these classrooms. There is also, in current contexts, a general expectation that teachers will support students to construct, rather than simply receive knowledge. This process of constructing knowledge requires a focus on critical thinking in complex social and real world contexts (see also Elen & Clarebout, 2001; Yang, Chang & Hsu 2008). Critical thinking, which involves the identification and evaluation of multiple perspectives when making decisions, is a process of knowing – a tool of wisdom (Kuhn & Udell, 2001). Schommer-Aikens, Bird and Bakken (2010) refer to classrooms that encourage critical thinking as “epistemologically based” in which “the teacher encourages his/her students to look for connections among concepts within the text, with their prior knowledge, and with concepts found in the world beyond themselves” (p. 48).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intelligent surveillance systems typically use a single visual spectrum modality for their input. These systems work well in controlled conditions, but often fail when lighting is poor, or environmental effects such as shadows, dust or smoke are present. Thermal spectrum imagery is not as susceptible to environmental effects, however thermal imaging sensors are more sensitive to noise and they are only gray scale, making distinguishing between objects difficult. Several approaches to combining the visual and thermal modalities have been proposed, however they are limited by assuming that both modalities are perfuming equally well. When one modality fails, existing approaches are unable to detect the drop in performance and disregard the under performing modality. In this paper, a novel middle fusion approach for combining visual and thermal spectrum images for object tracking is proposed. Motion and object detection is performed on each modality and the object detection results for each modality are fused base on the current performance of each modality. Modality performance is determined by comparing the number of objects tracked by the system with the number detected by each mode, with a small allowance made for objects entering and exiting the scene. The tracking performance of the proposed fusion scheme is compared with performance of the visual and thermal modes individually, and a baseline middle fusion scheme. Improvement in tracking performance using the proposed fusion approach is demonstrated. The proposed approach is also shown to be able to detect the failure of an individual modality and disregard its results, ensuring performance is not degraded in such situations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper treats the crush behaviour and energy absorption response of foam-filled conical tubes subjected to oblique impact loading. Dynamic computer simulation techniques validated by experimental testing are used to carry out a parametric study of such devices. The study aims at quantifying the energy absorption of empty and foam-filled conical tubes under oblique impact loading, for variations in the load angle and geometry parameters of the tube. It is evident that foam-filled conical tubes are preferable as impact energy absorbers due to their ability to withstand oblique impact loads as effectively as axial impact loads. Furthermore, it is found that the energy absorption capacity of filled tubes is better maintained compared to that of empty tubes as the load orientation increases. The primary outcome of this study is design information for the use of foam-filled conical tubes as energy absorbers where oblique impact loading is expected.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users’ access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer from the assumption that users will (can) not depart from the expected behaviour implicit in the authorisation policy. In reality however, users can and do depart from the canonical behaviour. This paper argues that the conflict of interest between insiders and authorisation mechanisms is analogous to the subset of problems formally studied in the field of game theory. It proposes a game theoretic authorisation model that can ensure users’ potential misuse of a resource is explicitly considered while making an authorisation decision. The resulting authorisation model is dynamic in the sense that its access decisions vary according to the changes in explicit factors that influence the cost of misuse for both the authorisation mechanism and the insider.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective. Previous studies have shown the influence of subchondral bone osteoblasts (SBOs) on phenotypical changes of articular cartilage chondrocytes (ACCs) during the development of osteoarthritis (OA). The molecular mechanisms involved during this process remain elusive, in particular, the signal transduction pathways. The aim of this study was to investigate the in vitro effects of OA SBOs on the phenotypical changes in normal ACCs and to unveil the potential involvement of MAPK signaling pathways during this process. Methods. Normal and arthritic cartilage and bone samples were collected for isolation of ACCs and SBOs. Direct and indirect coculture models were applied to study chondrocyte hypertrophy under the influence of OA SBOs. MAPKs in the regulation of the cell–cell interactions were monitored by phosphorylated antibodies and relevant inhibitors. Results. OA SBOs led to increased hypertrophic gene expression and matrix calcification in ACCs by means of both direct and indirect cell–cell interactions. In this study, we demonstrated for the first time that OA SBOs suppressed p38 phosphorylation and induced ERK-1/2 signal phosphorylation in cocultured ACCs. The ERK-1/2 pathway inhibitor PD98059 significantly attenuated the hypertrophic changes induced by conditioned medium from OA SBOs, and the p38 inhibitor SB203580 resulted in the up-regulation of hypertrophic genes in ACCs. Conclusion. The findings of this study suggest that the pathologic interaction of OA SBOs and ACCs is mediated via the activation of ERK-1/2 phosphorylation and deactivation of p38 phosphorylation, resulting in hypertrophic differentiation of ACCs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Structural health is a vital aspect of infrastructure sustainability. As a part of a vital infrastructure and transportation network, bridge structures must function safely at all times. However, due to heavier and faster moving vehicular loads and function adjustment, such as Busway accommodation, many bridges are now operating at an overload beyond their design capacity. Additionally, the huge renovation and replacement costs are a difficult burden for infrastructure owners. The structural health monitoring (SHM) systems proposed recently are incorporated with vibration-based damage detection techniques, statistical methods and signal processing techniques and have been regarded as efficient and economical ways to assess bridge condition and foresee probable costly failures. In this chapter, the recent developments in damage detection and condition assessment techniques based on vibration-based damage detection and statistical methods are reviewed. The vibration-based damage detection methods based on changes in natural frequencies, curvature or strain modes, modal strain energy, dynamic flexibility, artificial neural networks, before and after damage, and other signal processing methods such as Wavelet techniques, empirical mode decomposition and Hilbert spectrum methods are discussed in this chapter.