973 resultados para Distinguishing Attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:


Lip separation is one of the primary sources of inlet distortion, which can result in a loss in fan stability. High angles of incidence are one of several critical causes of lip separation. There have been many studies into inlet performance at high incidence, including the resulting distortion levels when lip separation occurs. However, the vast majority of these investigations have been carried out experimentally, with little in the way of computational results for inlet performance at high incidence. The flow topology within an inlet when lip separation has occurred is also not well understood. This work aims to demonstrate a suitable model for the prediction of inlet flows at high incidence using ANSYS CFX, looking at both the performance of the inlet and the separated flow topology within the inlet. The attenuating effect of the fan is also investigated, with particular emphasis on the flow redistribution ahead of the fan. The results show that the model used is suitable for predicting inlet performance in adverse operating conditions, showing good agreement with experimental results. In addition, the attenuation of the distortion by the fan is also captured by the numerical model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Zeranol, an oestrogenic growth promoter in food animals, is banned within the European Union (EU). However, commercially available immunoassay kits for zeranol cross-react with toxins formed by naturally occurring Fusarium spp. fungi, leading to false-positive screening results. This paper describes the validation of a specificity enhanced, rapid dry reagent time-resolved fluoroimmunoassay (TR-FIA) for zeranol (recovery 99%, limit of detection 1.3 ng ml(-1)) demonstrating that up to 150 ng ml(-1) of Fusarium spp. toxins in urine do not lead to false-positive results. This assay will assist EU Member States to implement Council Directive 961 23\EC, which requires states to monitor for potential abuses of zeranol. A similar TR-FIA for the Fusarium spp. toxin a-zearalenol, using the same sample extract, is also described (recovery 68%, limit of detection 5.6 ng ml(-1)). Only the addition of diluted sample extract is required to perform these dry-reagent TR-FIAs, the results being available within 1 h of extract application. The EU-funded project 'Natural Zeranol' (FAIR5-CT97-3443) will use these fluoroimmunoassays to screen bovine urine in four Member States to gather data on the seasonality of Fusarium spp. toxin contamination of urine and the incidence of zeranol screening test positives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

1. Global declines in biodiversity have stimulated much research into the consequences of species loss for ecosystems and the goods and services they provide. Species at higher trophic levels are at greater risk of human-induced extinction yet remarkably little is known about the effects of consumer species loss across multiple trophic levels in natural complex ecosystems. Previous studies have been criticized for lacking experimental realism and appropriate temporal scale, running for short periods that are not sufficient to detect many of the mechanisms operating in the field.
2. We manipulated the presence of two predator species and two groups of their prey (primary consumers) and measured their independent and interactive effects on primary producers in a natural marine benthic system. The presence of predators and their prey was manipulated in the field for 14 months to distinguish clearly the direct and indirect effects of predators on primary producers and to identify mechanisms driving responses.
3. We found that the loss of either predator species had indirect negative effects on species diversity and total cover of primary producers. These cascading effects of predator species loss were mediated by the presence of intermediate consumers. Moreover, the presence of different intermediate consumers, irrespective of the presence or absence of their predators, determined primary producer assemblage structure. We identified direct negative effects of predators on their prey and several indirect effects of predators on primary producers but not all interactions could have been predicted based on trophic level.
4. Our findings demonstrate the importance of trophic cascade effects coupled with non-trophic interactions when predicting the effects of loss of predator species on primary producers and consequently for ecosystem functioning. There is a pressing need for improved understanding of the effects of loss of consumers, based on realistic scenarios of diversity loss, to test conceptual frameworks linking predator diversity to variation in ecosystem functioning and for the protection of biodiversity, ecosystem functioning and related services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

DeAuthentication Denial of Service attacks in Public Access WiFi operate by exploiting the lack of authentication of management frames in the 802.11 protocol. Detection of these attacks rely almost exclusively on the selection of appropriate thresholds. In this work the authors demonstrate that there are additional, previously unconsidered, metrics which also influence DoS detection performance. A method of systematically tuning these metrics to optimal values is proposed which ensures that parameter choices are repeatable and verifiable.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that, over a sequence of rounds, an adversary either inserts a node with arbitrary connections or deletes an arbitrary node from the network. The network responds to each such change by quick “repairs,” which consist of adding or deleting a small number of edges. These repairs essentially preserve closeness of nodes after adversarial deletions, without increasing node degrees by too much, in the following sense. At any point in the algorithm, nodes v and w whose distance would have been l in the graph formed by considering only the adversarial insertions (not the adversarial deletions), will be at distance at most l log n in the actual graph, where n is the total number of vertices seen so far. Similarly, at any point, a node v whose degree would have been d in the graph with adversarial insertions only, will have degree at most 3d in the actual graph. Our distributed data structure, which we call the Forgiving Graph, has low latency and bandwidth requirements. The Forgiving Graph improves on the Forgiving Tree distributed data structure from Hayes et al. (2008) in the following ways: 1) it ensures low stretch over all pairs of nodes, while the Forgiving Tree only ensures low diameter increase; 2) it handles both node insertions and deletions, while the Forgiving Tree only handles deletions; 3) it requires only a very simple and minimal initialization phase, while the Forgiving Tree initially requires construction of a spanning tree of the network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that, over a sequence of rounds, an adversary either inserts a node with arbitrary connections or deletes an arbitrary node from the network. The network responds to each such change by quick "repairs," which consist of adding or deleting a small number of edges. These repairs essentially preserve closeness of nodes after adversarial deletions,without increasing node degrees by too much, in the following sense. At any point in the algorithm, nodes v and w whose distance would have been - in the graph formed by considering only the adversarial insertions (not the adversarial deletions), will be at distance at most - log n in the actual graph, where n is the total number of vertices seen so far. Similarly, at any point, a node v whose degreewould have been d in the graph with adversarial insertions only, will have degree at most 3d in the actual graph. Our distributed data structure, which we call the Forgiving Graph, has low latency and bandwidth requirements. The Forgiving Graph improves on the Forgiving Tree distributed data structure from Hayes et al. (2008) in the following ways: 1) it ensures low stretch over all pairs of nodes, while the Forgiving Tree only ensures low diameter increase; 2) it handles both node insertions and deletions, while the Forgiving Tree only handles deletions; 3) it requires only a very simple and minimal initialization phase, while the Forgiving Tree initially requires construction of a spanning tree of the network. © Springer-Verlag 2012.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rural communities in the Haut-Uele Province of northern Democratic Republic of Congo live in constant danger of attack and/or abduction by units of the Lord's Resistance Army operating in the region. This pilot study sought to develop and evaluate a community-participative psychosocial intervention involving life skills and relaxation training and Mobile Cinema screenings with this war-affected population living under current threat. 159 war-affected children and young people (aged 7-18) from the villages of Kiliwa and Li-May in north-eastern DR Congo took part in this study. In total, 22% of participants had been abduction previously while 73% had a family member abducted. Symptoms of post-traumatic stress reactions, internalising problems, conduct problems and pro-social behaviour were assessed by blinded interviewers at pre- and post-intervention and at 3-month follow-up. Participants were randomised (with an accompanying caregiver) to 8 sessions of a group-based, community-participative, psychosocial intervention (n=79) carried out by supervised local, lay facilitators or a wait-list control group (n=80). Average seminar attendance rates were high: 88% for participants and 84% for caregivers. Drop-out was low: 97% of participants were assessed at post-intervention and 88% at 3 month follow-up. At post-test, participants reported significantly fewer symptoms of post-traumatic stress reactions compared to controls (Cohen's d=0.40). At 3 month follow up, large improvements in internalising symptoms and moderate improvements in pro-social scores were reported, with caregivers noting a moderate to large decline in conduct problems among the young people. Trial Registration clinicalTrials.gov, Identifier: NCT01542398.