946 resultados para IP masquerading
Resumo:
结合目前我国高速公路通信传输网络的建设现状和收费系统数据通信的需求,从 结构、性能等方面分析了适应高速公路通信的3种网络技术SDH、ATM和宽带IP技术,以及这 3 种技术的综合集成模型ATM Over SDH、IP Over ATM、IP Over SDH、IP Over WDM。提出 比 较适合于高速公路收费系统联网的技术方案,并设计了网络通信管理和维护的具体内容 。
Resumo:
ABSTRACT Base on Dias-model, this paper study the forward modeling to IP response with MT souece and CSAMT source with the author’s program,that is to provide the theoretical basis for extracting the IP information from the far field, near field and transition field in extremely low frequency electromagnetic sounding with artificial strong fixed source signal. The outline of the paper is as follows. Firstly, review the history of the complex-resistivity-model, and analyses the bases for choosing Dias model; meanwhile, effects and responses of each parameter in Dias model are analyses. Afterward, study the forward modeling to 1D layered model with MT source, numerically simulate the IP effects of classic geoelectric objects; Find the clear anomaly and relationship between the peak value of the amplitude anomaly ratio and phase anomaly difference with and without IP parameters to be considered within a frequency range. On the basis of the modeling of MT, Study the CSAMT modeling with a dipole-source, obtain the anomaly responses and the relationship between anomaly and characters of object. Base on the infinite line source, study the 2D IP effect of geoelectric objects with 2D modeling. Calculate the response with different source distance, object depth and different wall rock resistivity systemically. Finally, conclude the viewpoints and give the discussion of the result, and point out the lack of this research also.
Resumo:
Depression is one of the most important psychological diseases to threaten human health. “Cytokine theory of depression” suggests that cytokines may play an important role in depression, which provided a new perspective in the study the mechanism and the therapy of depressive symptoms. This view is supported by various findings. Administration of pro-inflammatory cytokine or lipoposaccharide in animal induces depressive-like behavior such as anhedonia and low locomotion, which is very similar to the behavioral symptoms of depression in humans. However, the earlier researches may only pay attention to the short-time behavior effects; the effects of long-time behavior changes have not been clearly reported. In addition, there are few reports about the effects of pro-inflammatory cytokine or anti-inflammatory cytokine on the depressive-like behavior induced by chronic stressors. To further understand the role of cytokines in depression, the purpose of the present study is to investigate the dose and time effects of pro-inflammatory cytokines induced by lipoposaccharide on depressive-like behavior, sensitization effect of pro-inflammatory and blockage effect of anti-inflammatory on depressive-like behavior induced by chronic cold swimming stress. The behavioral observation was carried out using sacharin preference test, open field test and elevated-plus maze. The results indicated that: 1) The activated immunity induced by LPS i.p administration could induce significant depressive-like behavior, but these behaviors had no long-term effect; 2)The depressive-like behaviors induced by stress could be elicited earlier and kept longer by the activated immunity induced by LPS ip ; 4) The chronic activated immunity induced by LPS icv administration could provoke significant depressive-like behavior, and the depressive-like behaviors induced by stress could be enhanced by icv LPS, LPS and stress had certain interact-sensitization effect on depressive-like behavior; 5) Anti-inflammatory cytokines IL-10 icv reversed the depressive-like behaviors induced by the stress. In conclusion, cytokines play an important role in the depressive-like behavior. Both peripheral and central administration of LPS induced a certain depressive-like behavior and enhanced stress-induced depressive behavior. The anti-inflammatory cytokine IL-10 icv could reverse the depressive-like behaviors induced by the stress. Keywords: lipoposaccharide, depressive-like behavior, anhedonia, locomotion, chronic cold swimming stress
Resumo:
2009
Resumo:
A "ciganinha", cientificamente conhecida como Memora peregrina (Miers) Sandwith (Bignoniaceae), presente em diversas áreas de cerrado do Brasil Central, vem sendo um sério problema como invasora de pastagens cultivadas, em especial, quando estas já se encontram em adiantado estado de degradação. Nunes (1999) descreve-a como um arbusto, com ramos semilenhosos, entouceirado, ereto, que atinge a altura entre 100 e 150 centímetros. Apresenta inflorescências vistosas com flores amarelas semelhantes às do ipê-amarelo, o que contribuía para que, até recentemente, fosse catalogada apenas como planta ornamental (LORENZI; SOUZA, 1995). O principal período de florada ocorre na primavera e no verão, embora a presença de flores pode ser observada, praticamente, em qualquer época do ano. Sua reprodução se dá por sementes aladas, contidas em camadas sobrepostas no interior de uma cápsula com aspecto de uma longa vagem e, também, por processo vegetativo. Esse último ocorre pela ativação de gemas latentes presentes no caule, tanto em sua parte aérea quanto na subterrânea, em resposta ao seu eventual fracionamento ou quando este sofre lesões de qualquer natureza, especialmente por tratos mecânicos. Pouco se conhece sobre M. peregrina, porque mesmo em pastagens com gramíneas nativas e/ou naturalizadas, como Paspalum notatum (grama batatais ou mato-grosso), Melinis minutiflora (capimgordura) ou Hyparrhenia rufa (capim-jaraguá), manejadas há décadas com roçadeiras ou fogo, essa planta não é considerada problema. A ciganinha só assumiu o status de praga anos depois da implantação de pastagens cultivadas com uso de arados, grades de aração e subsoladores, sendo, em muitos casos, indicadora de pastagens degradadas ou em processo de degradação.
Resumo:
Apresentação; Dados da IP de Vale dos Vinhedos;Georreferenciamento; relevo; imagens
Resumo:
C.H. Orgill, N.W. Hardy, M.H. Lee, and K.A.I. Sharpe. An application of a multiple agent system for flexible assemble tasks. In Knowledge based envirnments for industrial applications including cooperating expert systems in control. IEE London, 1989.
Resumo:
R. Zwiggelaar and M.G.F. Wilson, 'Single Mueller matrix description of the propagation of degree of polarisation in a uniformly anisotropic single-mode optical fibre', IEE Proceedings Optoelectronics 141 (6), 367-372 (1994)
Resumo:
Bain, William, 'Are There Any Lessons of History?: The English School and the Activity of Being an Historian', International Politics (2007) 44(5) pp.513-530 RAE2008
Resumo:
Erskine, Toni, 'Qualifying Cosmopolitanism? Solidarity, Criticism, and Michael Walzer's 'View from the Cave'', International Politics (2007) 44(1) pp.125-149 RAE2008
Resumo:
Shepherd, Alistair, 'Irrelevant or Indispensable? ESDP, the ?War on Terror' and the Fallout from Iraq', International Politics (2006) 43(1) pp.71-92 RAE2008
Resumo:
Detecting and understanding anomalies in IP networks is an open and ill-defined problem. Toward this end, we have recently proposed the subspace method for anomaly diagnosis. In this paper we present the first large-scale exploration of the power of the subspace method when applied to flow traffic. An important aspect of this approach is that it fuses information from flow measurements taken throughout a network. We apply the subspace method to three different types of sampled flow traffic in a large academic network: multivariate timeseries of byte counts, packet counts, and IP-flow counts. We show that each traffic type brings into focus a different set of anomalies via the subspace method. We illustrate and classify the set of anomalies detected. We find that almost all of the anomalies detected represent events of interest to network operators. Furthermore, the anomalies span a remarkably wide spectrum of event types, including denial of service attacks (single-source and distributed), flash crowds, port scanning, downstream traffic engineering, high-rate flows, worm propagation, and network outage.
Resumo:
The popularity of TCP/IP coupled with the premise of high speed communication using Asynchronous Transfer Mode (ATM) technology have prompted the network research community to propose a number of techniques to adapt TCP/IP to ATM network environments. ATM offers Available Bit Rate (ABR) and Unspecified Bit Rate (UBR) services for best-effort traffic, such as conventional file transfer. However, recent studies have shown that TCP/IP, when implemented using ABR or UBR, leads to serious performance degradations, especially when the utilization of network resources (such as switch buffers) is high. Proposed techniques-switch-level enhancements, for example-that attempt to patch up TCP/IP over ATMs have had limited success in alleviating this problem. The major reason for TCP/IP's poor performance over ATMs has been consistently attributed to packet fragmentation, which is the result of ATM's 53-byte cell-oriented switching architecture. In this paper, we present a new transport protocol, TCP Boston, that turns ATM's 53-byte cell-oriented switching architecture into an advantage for TCP/IP. At the core of TCP Boston is the Adaptive Information Dispersal Algorithm (AIDA), an efficient encoding technique that allows for dynamic redundancy control. AIDA makes TCP/IP's performance less sensitive to cell losses, thus ensuring a graceful degradation of TCP/IP's performance when faced with congested resources. In this paper, we introduce AIDA and overview the main features of TCP Boston. We present detailed simulation results that show the superiority of our protocol when compared to other adaptations of TCP/IP over ATMs. In particular, we show that TCP Boston improves TCP/IP's performance over ATMs for both network-centric metrics (e.g., effective throughput) and application-centric metrics (e.g., response time).
Resumo:
While ATM bandwidth-reservation techniques are able to offer the guarantees necessary for the delivery of real-time streams in many applications (e.g. live audio and video), they suffer from many disadvantages that make them inattractive (or impractical) for many others. These limitations coupled with the flexibility and popularity of TCP/IP as a best-effort transport protocol have prompted the network research community to propose and implement a number of techniques that adapt TCP/IP to the Available Bit Rate (ABR) and Unspecified Bit Rate (UBR) services in ATM network environments. This allows these environments to smoothly integrate (and make use of) currently available TCP-based applications and services without much (if any) modifications. However, recent studies have shown that TCP/IP, when implemented over ATM networks, is susceptible to serious performance limitations. In a recently completed study, we have unveiled a new transport protocol, TCP Boston, that turns ATM's 53-byte cell-oriented switching architecture into an advantage for TCP/IP. In this paper, we demonstrate the real-time features of TCP Boston that allow communication bandwidth to be traded off for timeliness. We start with an overview of the protocol. Next, we analytically characterize the dynamic redundancy control features of TCP Boston. Next, We present detailed simulation results that show the superiority of our protocol when compared to other adaptations of TCP/IP over ATMs. In particular, we show that TCP Boston improves TCP/IP's performance over ATMs for both network-centric metrics (e.g., effective throughput and percent of missed deadlines) and real-time application-centric metrics (e.g., response time and jitter).
Resumo:
We describe and evaluate options for providing anonymous IP service, argue for the further investigation of local anonymity, and sketch a framework for the implementation of locally anonymous networks.