15 research outputs found

    Experimental and theoretical investigation for the suppression of the plasma arc drop in the thermionic converter

    Get PDF
    Ion generation and recombination mechanisms in the cesium plasma as they pertain to the advanced mode thermionic energy converter were studied. The decay of highly ionized cesium plasma was studied in the near afterglow to examine the recombination processes. Very low recombination in such a plasma may prove to be of considerable importance in practical converters. The approaches of external cesium generation were vibrationally excited nitrogen as an energy source of ionization of cesium ion, and microwave power as a means of resonant sustenance of the cesium plasma. Experimental data obtained so far show that all three techniques - i.e., the non-LTE high-voltage pulsing, the energy transfer from vibrationally excited diatomic gases, and the external pumping with a microwave resonant cavity - can produce plasmas with their densities significantly higher than the Richardson density. The implication of these findings as related to Lam's theory is discussed

    Network intrusion and fault detection: a statistical anomaly approach

    No full text

    HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification

    No full text
    Abstract—In this paper we introduce the Hierarchical Intrusion DEtection (HIDE) system, which detects network-based attacks as anomalies using statistical preprocessing and neural network classification. We describe our system architecture and the statistical preprocessing technique and components. We tested five different types of neural network classifiers: Perceptron, Backpropagation (BP), Perceptron-backpropagation-hybrid (PBH), Fuzzy ARTMAP, and Radial-based Function. Our results indicate that BP and PBH provide more efficient classification for our data than the alternatives. We also stress-tested the entire system, which showed that HIDE can reliably detect UDP flooding attacks with attack intensity as low as five to ten percent of background traffic
    corecore