47,921 research outputs found
Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
Existing anomaly and intrusion detection schemes of wireless sensor networks
have mainly focused on the detection of intrusions. Once the intrusion is
detected, an alerts or claims will be generated. However, any unidentified
malicious nodes in the network could send faulty anomaly and intrusion claims
about the legitimate nodes to the other nodes. Verifying the validity of such
claims is a critical and challenging issue that is not considered in the
existing cooperative-based distributed anomaly and intrusion detection schemes
of wireless sensor networks. In this paper, we propose a validation algorithm
that addresses this problem. This algorithm utilizes the concept of
intrusion-aware reliability that helps to provide adequate reliability at a
modest communication cost. In this paper, we also provide a security resiliency
analysis of the proposed intrusion-aware alert validation algorithm.Comment: 19 pages, 7 figure
Report on visit to four North American airlines
The object of the visits was to discuss the current state-of-the-art
with the Engineering Departments of several North American airlines which were
known to be leading the field in the application of certain advanced techniques.
In the limited time available it was decided to confine the talks mainly to
those topics on which the chosen operators were known to have had unique
experience.
This note is presented in chronological sequence and is only intended
to be a record of the information gathered; no derivations, or comparisons with
other operators, are made.
United Air Lines were visited first and reliability programmes are
detailed, although the application of critical path techniques to aircraft and
engine overhaul is summarised. Continental Air Lines are noted for their use
of the continuous maintenance philosophy, and this is reported next. The third
visit was to Air Canada where talks ranged from the applications of operations
research and electronic data processing (EDP) techniques to aircraft evaluation
procedures. Finally the PanAm aircraft system reliability programme is reviewed,
together with a note on their general LDP engineering and maintenance activities.
A bibliography is given, although it should be appreciated that some
of the items listed contain information which may be commercially secure
Paper Tiger with Whitened Teeth
"The authors, Keir Lieber and Daryl Pres, mistakenly link preventive capability in peacetime to coercive power in crisis." Li Bin is the Director of the Arms Control Program and Professor of the Institute of International Studies at Tsinghua University
Physical activity and affect of the elderly: Contribution to the validation of the Positive and Negative Affect Shedule (PANAS) in the Portuguese population
The concept of affect corresponds to the emotional dimension of subjective well-being (Diener, Emmons, Larsen, & Griffin, 1985). It is represented by two dimensions (negative affect and positive affect), which were the basis of the development of the Positive and Negative Affect Schedule - PANAS (Watson, Clark, & Tellegen, 1988). It was translated and validated for the Portuguese population by Galinha and Pais-Ribeiro (2005b). Nevertheless, because the Portuguese version was not validated in a sample of Portuguese elderly, the goals of this study consisted in the translation of the scale (PANAS) from the original version of 20 items and the validation of its measurement model (including a shortened version) for a sample of Portuguese elderly (n = 311), aged 60 years or older (M = 68.53; DP = 6.69); it was then tested by a confirmatory factorial analysis. The results demonstrated that the measurement model (two factors and 10 items) of the shortened Portuguese version of the PANAS presented acceptable psychometric qualities, which adjusted to the data in a satisfactory way (factorial weights ranging between .57 and .70 in positive affect and between .52 and .68 in negative affect). We also concluded that older adults who practice more physical activity perceive higher levels of positive affect F(2, 297) = 3,78, p < .05; η2 = .025, and lower levels of negative affect F (2, 297) = 6,24, p < .001; η2 = .040).This project was supported by the National Funds through FCT - Portuguese Foundation for Science and
Technology (UID/DTP/04045/2019) - and the European Fund for regional development (FEDER) allocated
by European Union through the COMPETE 2020 Programme (POCI-01-0145-FEDER-006969).info:eu-repo/semantics/publishedVersio
Computer recommendations for an automatic approach and landing system for V/STOL aircraft. Volume 1 - Computer recommendations
Evaluation of digital computer for V/STOL aircraft automatic approach and landing syste
The Methods to Improve Quality of Service by Accounting Secure Parameters
A solution to the problem of ensuring quality of service, providing a greater
number of services with higher efficiency taking into account network security
is proposed. In this paper, experiments were conducted to analyze the effect of
self-similarity and attacks on the quality of service parameters. Method of
buffering and control of channel capacity and calculating of routing cost
method in the network, which take into account the parameters of traffic
multifractality and the probability of detecting attacks in telecommunications
networks were proposed. The both proposed methods accounting the given
restrictions on the delay time and the number of lost packets for every type
quality of service traffic. During simulation the parameters of transmitted
traffic (self-similarity, intensity) and the parameters of network (current
channel load, node buffer size) were changed and the maximum allowable load of
network was determined. The results of analysis show that occurrence of
overload when transmitting traffic over a switched channel associated with
multifractal traffic characteristics and presence of attack. It was shown that
proposed methods can reduce the lost data and improve the efficiency of network
resources.Comment: 10 pages, 1 figure, 1 equation, 1 table. arXiv admin note: text
overlap with arXiv:1904.0520
Solar proton forecast system and procedures used during the Mariner 5 mission
Solar proton forecast system and procedures used during Mariner 5 missio
Design of a WSN Platform for Long-Term Environmental Monitoring for IoT Applications
The Internet of Things (IoT) provides a virtual view, via the Internet Protocol, to a huge variety of real life objects, ranging from a car, to a teacup, to a building, to trees in a forest. Its appeal is the ubiquitous generalized access to the status and location of any "thing" we may be interested in. Wireless sensor networks (WSN) are well suited for long-term environmental data acquisition for IoT representation. This paper presents the functional design and implementation of a complete WSN platform that can be used for a range of long-term environmental monitoring IoT applications. The application requirements for low cost, high number of sensors, fast deployment, long lifetime, low maintenance, and high quality of service are considered in the specification and design of the platform and of all its components. Low-effort platform reuse is also considered starting from the specifications and at all design levels for a wide array of related monitoring application
A Simple Flood Forecasting Scheme Using Wireless Sensor Networks
This paper presents a forecasting model designed using WSNs (Wireless Sensor
Networks) to predict flood in rivers using simple and fast calculations to
provide real-time results and save the lives of people who may be affected by
the flood. Our prediction model uses multiple variable robust linear regression
which is easy to understand and simple and cost effective in implementation, is
speed efficient, but has low resource utilization and yet provides real time
predictions with reliable accuracy, thus having features which are desirable in
any real world algorithm. Our prediction model is independent of the number of
parameters, i.e. any number of parameters may be added or removed based on the
on-site requirements. When the water level rises, we represent it using a
polynomial whose nature is used to determine if the water level may exceed the
flood line in the near future. We compare our work with a contemporary
algorithm to demonstrate our improvements over it. Then we present our
simulation results for the predicted water level compared to the actual water
level.Comment: 16 pages, 4 figures, published in International Journal Of Ad-Hoc,
Sensor And Ubiquitous Computing, February 2012; V. seal et al, 'A Simple
Flood Forecasting Scheme Using Wireless Sensor Networks', IJASUC, Feb.201
- …