47,921 research outputs found

    Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Get PDF
    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.Comment: 19 pages, 7 figure

    Report on visit to four North American airlines

    Get PDF
    The object of the visits was to discuss the current state-of-the-art with the Engineering Departments of several North American airlines which were known to be leading the field in the application of certain advanced techniques. In the limited time available it was decided to confine the talks mainly to those topics on which the chosen operators were known to have had unique experience. This note is presented in chronological sequence and is only intended to be a record of the information gathered; no derivations, or comparisons with other operators, are made. United Air Lines were visited first and reliability programmes are detailed, although the application of critical path techniques to aircraft and engine overhaul is summarised. Continental Air Lines are noted for their use of the continuous maintenance philosophy, and this is reported next. The third visit was to Air Canada where talks ranged from the applications of operations research and electronic data processing (EDP) techniques to aircraft evaluation procedures. Finally the PanAm aircraft system reliability programme is reviewed, together with a note on their general LDP engineering and maintenance activities. A bibliography is given, although it should be appreciated that some of the items listed contain information which may be commercially secure

    Paper Tiger with Whitened Teeth

    Get PDF
    "The authors, Keir Lieber and Daryl Pres, mistakenly link preventive capability in peacetime to coercive power in crisis." Li Bin is the Director of the Arms Control Program and Professor of the Institute of International Studies at Tsinghua University

    Physical activity and affect of the elderly: Contribution to the validation of the Positive and Negative Affect Shedule (PANAS) in the Portuguese population

    Get PDF
    The concept of affect corresponds to the emotional dimension of subjective well-being (Diener, Emmons, Larsen, & Griffin, 1985). It is represented by two dimensions (negative affect and positive affect), which were the basis of the development of the Positive and Negative Affect Schedule - PANAS (Watson, Clark, & Tellegen, 1988). It was translated and validated for the Portuguese population by Galinha and Pais-Ribeiro (2005b). Nevertheless, because the Portuguese version was not validated in a sample of Portuguese elderly, the goals of this study consisted in the translation of the scale (PANAS) from the original version of 20 items and the validation of its measurement model (including a shortened version) for a sample of Portuguese elderly (n = 311), aged 60 years or older (M = 68.53; DP = 6.69); it was then tested by a confirmatory factorial analysis. The results demonstrated that the measurement model (two factors and 10 items) of the shortened Portuguese version of the PANAS presented acceptable psychometric qualities, which adjusted to the data in a satisfactory way (factorial weights ranging between .57 and .70 in positive affect and between .52 and .68 in negative affect). We also concluded that older adults who practice more physical activity perceive higher levels of positive affect F(2, 297) = 3,78, p < .05; η2 = .025, and lower levels of negative affect F (2, 297) = 6,24, p < .001; η2 = .040).This project was supported by the National Funds through FCT - Portuguese Foundation for Science and Technology (UID/DTP/04045/2019) - and the European Fund for regional development (FEDER) allocated by European Union through the COMPETE 2020 Programme (POCI-01-0145-FEDER-006969).info:eu-repo/semantics/publishedVersio

    The Methods to Improve Quality of Service by Accounting Secure Parameters

    Full text link
    A solution to the problem of ensuring quality of service, providing a greater number of services with higher efficiency taking into account network security is proposed. In this paper, experiments were conducted to analyze the effect of self-similarity and attacks on the quality of service parameters. Method of buffering and control of channel capacity and calculating of routing cost method in the network, which take into account the parameters of traffic multifractality and the probability of detecting attacks in telecommunications networks were proposed. The both proposed methods accounting the given restrictions on the delay time and the number of lost packets for every type quality of service traffic. During simulation the parameters of transmitted traffic (self-similarity, intensity) and the parameters of network (current channel load, node buffer size) were changed and the maximum allowable load of network was determined. The results of analysis show that occurrence of overload when transmitting traffic over a switched channel associated with multifractal traffic characteristics and presence of attack. It was shown that proposed methods can reduce the lost data and improve the efficiency of network resources.Comment: 10 pages, 1 figure, 1 equation, 1 table. arXiv admin note: text overlap with arXiv:1904.0520

    Solar proton forecast system and procedures used during the Mariner 5 mission

    Get PDF
    Solar proton forecast system and procedures used during Mariner 5 missio

    Design of a WSN Platform for Long-Term Environmental Monitoring for IoT Applications

    Get PDF
    The Internet of Things (IoT) provides a virtual view, via the Internet Protocol, to a huge variety of real life objects, ranging from a car, to a teacup, to a building, to trees in a forest. Its appeal is the ubiquitous generalized access to the status and location of any "thing" we may be interested in. Wireless sensor networks (WSN) are well suited for long-term environmental data acquisition for IoT representation. This paper presents the functional design and implementation of a complete WSN platform that can be used for a range of long-term environmental monitoring IoT applications. The application requirements for low cost, high number of sensors, fast deployment, long lifetime, low maintenance, and high quality of service are considered in the specification and design of the platform and of all its components. Low-effort platform reuse is also considered starting from the specifications and at all design levels for a wide array of related monitoring application

    A Simple Flood Forecasting Scheme Using Wireless Sensor Networks

    Full text link
    This paper presents a forecasting model designed using WSNs (Wireless Sensor Networks) to predict flood in rivers using simple and fast calculations to provide real-time results and save the lives of people who may be affected by the flood. Our prediction model uses multiple variable robust linear regression which is easy to understand and simple and cost effective in implementation, is speed efficient, but has low resource utilization and yet provides real time predictions with reliable accuracy, thus having features which are desirable in any real world algorithm. Our prediction model is independent of the number of parameters, i.e. any number of parameters may be added or removed based on the on-site requirements. When the water level rises, we represent it using a polynomial whose nature is used to determine if the water level may exceed the flood line in the near future. We compare our work with a contemporary algorithm to demonstrate our improvements over it. Then we present our simulation results for the predicted water level compared to the actual water level.Comment: 16 pages, 4 figures, published in International Journal Of Ad-Hoc, Sensor And Ubiquitous Computing, February 2012; V. seal et al, 'A Simple Flood Forecasting Scheme Using Wireless Sensor Networks', IJASUC, Feb.201
    corecore