2,097 research outputs found

    Monitoring and Cordoning Wildfires with an Autonomous Swarm of Unmanned Aerial Vehicles

    Get PDF
    Unmanned aerial vehicles, or drones, are already an integral part of the equipment used by firefighters to monitor wildfires. They are, however, still typically used only as remotely operated, mobile sensing platforms under direct real-time control of a human pilot. Meanwhile, a substantial body of literature exists that emphasises the potential of autonomous drone swarms in various situational awareness missions, including in the context of environmental protection. In this paper, we present the results of a systematic investigation by means of numerical methods i.e., Monte Carlo simulation. We report our insights into the influence of key parameters such as fire propagation dynamics, surface area under observation and swarm size over the performance of an autonomous drone force operating without human supervision. We limit the use of drones to perform passive sensing operations with the goal to provide real-time situational awareness to the fire fighters on the ground. Therefore, the objective is defined as being able to locate, and then establish a continuous perimeter (cordon) around, a simulated fire event to provide live data feeds such as e.g., video or infra-red. Special emphasis was put on exclusively using simple, robust and realistically implementable distributed decision functions capable of supporting the self-organisation of the swarm in the pursuit of the collective goal. Our results confirm the presence of strong nonlinear effects in the interaction between the aforementioned parameters, which can be closely approximated using an empirical law. These findings could inform the mobilisation of adequate resources on a case-by-case basis, depending on known mission characteristics and acceptable odds (chances of success)

    Towards understanding and mitigating attacks leveraging zero-day exploits

    Get PDF
    Zero-day vulnerabilities are unknown and therefore not addressed with the result that they can be exploited by attackers to gain unauthorised system access. In order to understand and mitigate against attacks leveraging zero-days or unknown techniques, it is necessary to study the vulnerabilities, exploits and attacks that make use of them. In recent years there have been a number of leaks publishing such attacks using various methods to exploit vulnerabilities. This research seeks to understand what types of vulnerabilities exist, why and how these are exploited, and how to defend against such attacks by either mitigating the vulnerabilities or the method / process of exploiting them. By moving beyond merely remedying the vulnerabilities to defences that are able to prevent or detect the actions taken by attackers, the security of the information system will be better positioned to deal with future unknown threats. An interesting finding is how attackers exploit moving beyond the observable bounds to circumvent security defences, for example, compromising syslog servers, or going down to lower system rings to gain access. However, defenders can counter this by employing defences that are external to the system preventing attackers from disabling them or removing collected evidence after gaining system access. Attackers are able to defeat air-gaps via the leakage of electromagnetic radiation as well as misdirect attribution by planting false artefacts for forensic analysis and attacking from third party information systems. They analyse the methods of other attackers to learn new techniques. An example of this is the Umbrage project whereby malware is analysed to decide whether it should be implemented as a proof of concept. Another important finding is that attackers respect defence mechanisms such as: remote syslog (e.g. firewall), core dump files, database auditing, and Tripwire (e.g. SlyHeretic). These defences all have the potential to result in the attacker being discovered. Attackers must either negate the defence mechanism or find unprotected targets. Defenders can use technologies such as encryption to defend against interception and man-in-the-middle attacks. They can also employ honeytokens and honeypots to alarm misdirect, slow down and learn from attackers. By employing various tactics defenders are able to increase their chance of detecting and time to react to attacks, even those exploiting hitherto unknown vulnerabilities. To summarize the information presented in this thesis and to show the practical importance thereof, an examination is presented of the NSA's network intrusion of the SWIFT organisation. It shows that the firewalls were exploited with remote code execution zerodays. This attack has a striking parallel in the approach used in the recent VPNFilter malware. If nothing else, the leaks provide information to other actors on how to attack and what to avoid. However, by studying state actors, we can gain insight into what other actors with fewer resources can do in the future

    Section Abstracts: Biomedical and General Engineering

    Get PDF
    Abstracts of the Biomedical and General Engineering Section for the 94th Annual Virginia Academy of Science Meeting, May 18-20, 2016, at University of Mary Washington, Fredericksburg, VA

    Identification of functional modules in human protein interaction networks.

    Get PDF
    The novel method proposed in this thesis is able to identify functional modules making use of large-scale interaction and expression data. While theveri tion of these subnetworks remains di ult, they identify sets of proteins, which may play a key role in the development of malignancies. The modules provide an attractive basis for further research and may provide new targets for drug development

    Vomocytosis: Too Much Booze, Base, or Calcium?

    Get PDF
    Macrophages are well known for their phagocytic activity and their role in innate immune responses. Macrophages eat non-self particles, via a variety of mechanisms, and typically break down internalized cargo into small macromolecules. However, some pathogenic agents have the ability to evade this endosomal degradation through a nonlytic exocytosis process termed vomocytosis. This phenomenon has been most often studied for Cryptococcus neoformans, a yeast that causes roughly 180,000 deaths per year, primarily in immunocompromised (e.g., human immunodeficiency virus [HIV]) patients. Existing dogma purports that vomocytosis involves distinctive cellular pathways and intracellular physicochemical cues in the host cell during phagosomal maturation. Moreover, it has been observed that the immunological state of the individual and macrophage phenotype affect vomocytosis outcomes. Here we compile the current knowledge on the factors (with respect to the phagocytic cell) that promote vomocytosis of C. neoformans from macrophages

    Tech Sanctions Against Russia: Turning the West's Assumptions Into Lessons

    Get PDF
    The West assumed that its unprecedented tech sanctions would be the response to Russia’s full-scale invasion of Ukraine that would hurt the country most. While their impact took different routes than expected, Russia has been forced to scale back its goals for technological advancement and become more dependent on third countries than ever. As Russia is preparing to wage a protracted war, the EU must make unity and coordination on tech among its member states and partners its ongoing priority. Implementing the restrictive measures and closing loopholes is essential

    A study on stryi-icnos potatorum and pisum sativum as natural coagulants for meat food processing wastewater

    Get PDF
    Slow maintained load test is widely used by contractors in Malaysia to ensure the driven pile could accommodate the design load of the structure. Slow maintained load test is a test to determine load-settlement curve and pile capacity for a period of time using conventional load test. Conventional static pile load test equipment is large in size thus making it heavier and takes a long time to install. In addition, it consumes a lot of space which causes congestion at construction sites. Therefore, the objective of this thesis is to conduct a conventional load test by replacing the pile kentledge load with anchorage and reaction pile. Preparations of ten designs comprising six commercial designs were reviewed. In addition, four proposed designs were suggested for the setup. Final design was produced based on its safety factors and criteria referred via literature review. The test frame consists of reaction frame with four reaction helical pile with two helixes per reaction pile. The deformation shapes, safety factor, stress, and strain of the design and finite element of the model has been analysed with the use of SolidWorks and Pia.xis 30 software. SolidWorks software emphasizes on the model load-deflection relationship while Plaxis 30 ensures a correlation of reaction between pile uplift force and soil. Then, the model was tested on site to determine the relationship between physical load­deflection and pile-soil uplift force. The results of uplift force and displacement for numerical and physical test were nearly identical which increment of load­displacement graph pattern. The higher the uplift force, the higher the displacement obtained. In conclusion, the result obtained and the design may be considered as a guideline for future application of sustainable slow maintained pile load test

    Public Health Policy and Infectious Disease Control: Lessons from Recent Outbreaks

    Get PDF
    This research explores the complex dynamics of public health policy and its crucial role in managing pandemics, considering the unprecedented challenges presented by recent outbreaks of infectious diseases. Examining the worldwide consequences of the COVID-19 pandemic and the Ebola outbreak, we analyze the insights gained from these emergencies, highlighting the necessity for flexible policy development, cooperative endeavors, and the incorporation of community-led strategies. This study adds to the current discussion on pandemic preparedness and the development of robust public health systems. This research paper examines the significant influence of the COVID-19 pandemic and the Ebola outbreak on worldwide public health. It specifically analyzes the efficacy of public health policies and the involvement of mathematical models in managing infectious diseases. Understanding the development of public health responses requires considering the historical context of infectious disease outbreaks such as the Spanish Flu, H1N1, SARS, and MERS. This study conducts a comparative analysis of the responses to the COVID-19 pandemic and the Ebola outbreak, taking into account their distinct challenges and contextual factors. The emergence of the COVID-19 pandemic, resulting from the SARS-CoV-2 virus, has presented a multifaceted global health crisis that requires swift and flexible public health measures. Conversely, the Ebola epidemic in the Democratic Republic of Congo revealed difficulties that are unique to areas affected by conflict and emphasized the significance of involving the community in efforts to control the disease. The paper explores the global ramifications of these outbreaks, encompassing not only health consequences but also economic, societal, and international relations implications. The interdependence of global health is examined by analyzing the responses to COVID-19 and Ebola, highlighting the crucial requirement for collaborative endeavors, exchange of information, and fair allocation of resources. The research utilizes a case study methodology, specifically examining the COVID-19 pandemic and the Ebola outbreak as illustrative instances. Data collection encompasses the evaluation of implemented public health policies, the utilization of mathematical models for analysis, and the contemplation of ethical ramifications in the study of global health emergencies. The paper concludes by providing policy recommendations derived from the insights gained from these outbreaks. It highlights the importance of flexible and data-driven policymaking, international collaboration, and the incorporation of community-led strategies
    • …
    corecore