495 research outputs found
The Binary Invariant Differential Operators on Weighted Densities on the superspace and Cohomology
Over the -dimensional real superspace, , we classify
-invariant binary differential operators acting on the
superspaces of weighted densities, where is the Lie
superalgebra of contact vector fields. This result allows us to compute the
first differential cohomology of %the Lie superalgebra with
coefficients in the superspace of linear differential operators acting on the
superspaces of weighted densities--a superisation of a result by Feigin and
Fuchs. We explicitly give 1-cocycles spanning these cohomology spaces
Recommended from our members
Designing Host and Network Sensors to Mitigate the Insider Threat
We propose a design for insider threat detection that combines an array of complementary techniques that aims to detect evasive adversaries. We are motivated by real world incidents and our experience with building isolated detectors: such standalone mechanisms are often easily identified and avoided by malefactors. Our work-in-progress combines host-based user-event monitoring sensors with trap-based decoys and remote network detectors to track and correlate insider activity. We identify several challenges in scaling up, deploying, and validating our architecture in real environments
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user's real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment
Prediction of academic dropout in university students using data mining: Engineering case
Student dropout is considered an important indicator for measuring social mobility and reflecting the social contribution that universities offer. In economic terms, there is evidence that students attribute their decision to defect from their academic programs because of their economic situation. Dropout causes significant waging gaps among people who complete their tertiary studies compared to those who do not, leading to a lack of skilled human capital that pays greater productivity to economic development of a country. Given the above, the objective of this study is to present a tree-based classification of decisions (CBAD) with optimized parameters to predict the dropout of students at Colombian universities. The study analyses 10,486 cases of students from three private universities with similar characteristics. The result of the application of this technique with optimized parameters achieved a precision ratio of 88.14%
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
Nonlinear fractional differential equations in nonreflexive Banach spaces and fractional calculus
The aim of this paper is to correct some ambiguities and inaccuracies in Agarwal et al. (Commun. Nonlinear Sci. Numer. Simul. 20(1): 59-73, 2015; Adv. Differ. Equ. 2013: 302, 2013, doi:10.1186/1687-1847-2013-302) and to present new ideas and approaches for fractional calculus and fractional differential equations in nonreflexive Banach spaces
Retention of health workers in Malawi: perspectives of health workers and district management
<p>Abstract</p> <p>Background</p> <p>Shortage of human resources is a major problem facing Malawi, where more than 50% of the population lives in rural areas. Most of the district health services are provided by clinical health officers specially trained to provide services that would normally be provided by fully qualified doctors or specialists. As this cadre and the cadre of enrolled nurses are the mainstay of the Malawian health service at the district level, it is important that they are supported and motivated to deliver a good standard of service to the population. This study explores how these cadres are managed and motivated and the impact this has on their performance.</p> <p>Methods</p> <p>A quantitative survey measured health workers' job satisfaction, perceptions of the work environment and sense of justice in the workplace, and was reported elsewhere. It emerged that health workers were particularly dissatisfied with what they perceived as unfair access to continuous education and career advancement opportunities, as well as inadequate supervision. These issues and their contribution to demotivation, from the perspective of both management and health workers, were further explored by means of qualitative techniques.</p> <p>Focus group discussions were held with health workers, and key-informant interviews were conducted with members of district health management teams and human resource officers in the Ministry of Health. The focus groups used convenience sampling that included all the different cadres of health workers available and willing to participate on the day the research team visited the health facility. The interviews targeted district health management teams in three districts and the human resources personnel in the Ministry of Health, also sampling those who were available and agreed to participate.</p> <p>Results</p> <p>The results showed that health workers consider continuous education and career progression strategies to be inadequate. Standard human resource management practices such as performance appraisal and the provision of job descriptions were not present in many cases. Health workers felt that they were inadequately supervised, with no feedback on performance. In contrast to health workers, managers did not perceive these human resources management deficiencies in the system as having an impact on motivation.</p> <p>Conclusion</p> <p>A strong human resource management function operating at the district level is likely to improve worker motivation and performance.</p
- …