3,648 research outputs found

    SUSTAV ZA OTKRIVANJE I OBRANU KORIÅ TENJEM RUDARENJA PODATAKA

    Get PDF
    Network security helps to prevent the network against the intruders from performing malicious activities. The security can be provided to the networks using firewalls, anti-virus software and scanners, cryptographic systems, Secure Socket Layer (SSL) and Intrusion Detection Systems (IDS).Authentication is the commonly used technique to protect the unauthorized users from the network. But, it is easy to compromise the login passwords using brute force attacks. The IDS and firewalls concentrate on the external attacks, while the internal attacks are not taken into account. In order to solve these issues, this paper proposes an Inner Interruption Discovery and Defense System (IIDDS) at the System Call (SC) level using data mining and forensic techniques. The userā€™s profiles are maintained and compared with the actual dataset using Hellinger distance. A hash function is applied on the incoming messages and they are summarized in the sketch dataset. The experimental results evaluate the proposed system in terms of accuracy and response time.Mrežna sigurnost pomaže zaÅ”tititi mrežu od uljeza u obavljanju zlonamjernih aktivnosti. Sigurnost se može osigurati mrežama koristeći vatrozide, antivirusni softver i skenere, kriptografske sustave, Secure Socket Layer (SSL) i sustave za otkrivanje upada (IDS). Autentifikacija je najčeŔće koriÅ”tena tehnika za zaÅ”titu neovlaÅ”tenih korisnika na mreži. No, lako je kompromitirati lozinke za prijavu pomoću napada na silu. IDS i vatrozidi koncentriraju se na vanjske napade, dok se interni napadi ne uzimaju u obzir. Da bi se rijeÅ”ili ti problemi, u članku se predlaže unutarnje prekidanje i obrambeni sustav (IIDDS) na razini System Call (SC) razine pomoću rudarenja podataka i forenzičke tehnike. Profili korisnika održavaju se i uspoređuju sa stvarnim skupom podataka pomoću Hellingerove udaljenosti. Na dolazne poruke primjenjuje se hash funkcija i oni su sažeti u skupu skica podataka. Eksperimentalni rezultati procjenjuju predloženi sustav u smislu točnosti i vremena odziva

    A massive warm baryonic halo in the Coma cluster

    Get PDF
    Several deep PSPC observations of the Coma cluster reveal a very large-scale halo of soft X-ray emission, substantially in excess of the well known radiation from the hot intra-cluster medium. The excess emission, previously reported in the central region of the cluster using lower-sensitivity EUVE and ROSAT data, is now evident out to a radius of 2.6 Mpc, demonstrating that the soft excess radiation from clusters is a phenomenon of cosmological significance. The X-ray spectrum at these large radii cannot be modeled non-thermally, but is consistent with the original scenario of thermal emission from warm gas at ~ 10^6 K. The mass of the warm gas is on par with that of the hot X-ray emitting plasma, and significantly more massive if the warm gas resides in low-density filamentary structures. Thus the data lend vital support to current theories of cosmic evolution, which predict that at low redshift \~30-40 % of the baryons reside in warm filaments converging at clusters of galaxies.Comment: Astrophysical Journal, in pres

    Application of spectral analysis to determine the magnetic source depths in ibarapa district, oyo state, sw nigeria

    Get PDF
    The method of spectral analysis was applied to the total aeromagnetic intensity data covering the district of Ibapara, located on the Nigeria Basement Complex in Oyo State, SW Nigeria. Prior to the spectral analysis, inclined magnetisation was converted to vertical, reduced to the pole and filtered out in order to more correctly reflect spatial location and morphology of magnetic sources over geological bodies, and enhance the effects of shallower sources over deeper ones. The data was divided into blocks and sub-blocks, and was spectrally analysed for the depths to the deep- and shallow-seated magnetic sources. The Curie-point-depths computed from these depths vary between 20.8 and 32.73 km, indicating that the magnetized basement rocks are at different elevations and are probably block faulted. The correlation of shallow Curie-point-depth with the Older Granites inferred that the low Curie-point-depth is due to magmatic intrusion in the highly deformed migmatite unit, the main geologic unit. The surface heat flows derived from the Curie-point-depths vary between 40.82 and 62.84 with a mean of 50.10 mW m-2, with areas having high surface heat flow presumed to be areas of recent intrusions where the elevated heat has transformed appropriate minerals to sapphire, tourmaline and aquamarine. Correlations of the surface heat flows and the average geothermal gradients on one hand and the Curie-point-depth on the other, unlike global compilation, yielded close empirical relations that are attributed to homogeneous geology of the area

    CDM in sub-Saharan Africa and the prospects of the Nairobi Framework Initiative

    Get PDF
    To what extent can capacity-building activities under the Nairobi Framework (NF) Initiative overcome barriers to the Clean Development Mechanism (CDM) in sub-Saharan Africa and, in particular, the East African region? The level of CDM penetration into sub-Saharan Africa is compared with CDM market trends globally. The relatively low CDM penetration in sub-Saharan Africa and the East African Community (SSA/EAC) countries is a result of endogenous barriers, particularly the inadequate general investment climate, the low level of industrialization of many countries, and the lack of CDM capacity, particularly with regard to institutional infrastructure. To assess these barriers, case studies were conducted in Rwanda and Uganda, while South Africa was taken as a reference case since it has - in the context of sub-Saharan Africa - a relatively well-developed CDM business. The NF Initiative, which was developed to deal with the lack of CDM capacity in Africa, cannot address the general investment climate of host countries or their economic structure as these are beyond its scope. Nor does the NF address investors' perceptions of the investment climate, but instead focuses its capacity-building efforts on HRD (human resource development; i.e. training courses) rather than on institutional questions, thereby failing to address some of the real issues at stake.\ud \u

    Chandra Measurements of a Complete Sample of X-ray Luminous Galaxy Clusters: The Luminosity-Mass Relation

    Get PDF
    We present the results of work involving a statistically complete sample of 34 galaxy clusters, in the redshift range 0.15ā‰¤\lezā‰¤\le0.3 observed with ChandraChandra. We investigate the luminosity-mass (LMLM) relation for the cluster sample, with the masses obtained via a full hydrostatic mass analysis. We utilise a method to fully account for selection biases when modeling the LMLM relation, and find that the LMLM relation is significantly different than the relation modelled when not account for selection effects. We find that the luminosity of our clusters is 2.2Ā±\pm0.4 times higher (when accounting for selection effects) than the average for a given mass, its mass is 30% lower than the population average for a given luminosity. Equivalently, using the LMLM relation measured from this sample without correcting for selection biases would lead to the underestimation by 40% of the average mass of a cluster with a given luminosity. Comparing the hydrostatic masses to mass estimates determined from the YXY_{X} parameter, we find that they are entirely consistent, irrespective of the dynamical state of the cluster.Comment: 31 pages, 43 figures, accepted for publication in MNRA

    Error Estimations, Error Computations, and Convergence Rates in FEM for BVPs

    Get PDF
    This paper presents derivation of a priori error estimates and convergence rates of finite element processes for boundary value problems (BVPs) described by self adjoint, non-self adjoint, and nonlinear differential operators. A posteriori error estimates are discussed in context with local approximations in higher order scalar product spaces. A posteriori error computational framework (without the knowledge of theoretical solution) is presented for all BVPs regardless of the method of approximation employed in constructing the integral form. This enables computations of local errors as well as the global errors in the computed finite element solutions. The two most significant and essential aspects of the research presented in this paper that enable all of the features described above are: 1) ensuring variational consistency of the integral form(s) resulting from the methods of approximation for self adjoint, non-self adjoint, and nonlinear differential operators and 2) choosing local approximations for the elements of a discretization in a subspace of a higher order scalar product space that is minimally conforming, hence ensuring desired global differentiability of the approximations over the discretizations. It is shown that when the theoretical solution of a BVP is analytic, the a priori error estimate (in the asymptotic range, discussed in a later section of the paper) is independent of the method of approximation or the nature of the differential operator provided the resulting integral form is variationally consistent. Thus, the finite element processes utilizing integral forms based on different methods of approximation but resulting in VC integral forms result in the same a priori error estimate and convergence rate. It is shown that a variationally consistent (VC) integral form has best approximation property in some norm, conversely an integral form with best approximation property in some norm is variationally consistent. That is best approximation property of the integral form and the VC of the integral form is equivalent, one cannot exist without the other, hence can be used interchangeably. Dimensional model problems consisting of diffusion equation, convection-diffusion equation, and Burgers equation described by self adjoint, non-self adjoint, and nonlinear differential operators are considered to present extensive numerical studies using Galerkin method with weak form (GM/WF) and least squares process (LSP) to determine computed convergence rates of various error norms and present comparisons with the theoretical convergence rates

    Eagle Mountain To Big Fossil Creek Diversion Tarrant, County, Texas

    Get PDF
    The City of Fort Worth is proposing to construct the Eagle Mountain to Big Fossil Diversion Pipeline in northern Tarrant County. Alan Plummer Associates, Inc. is handling the environmental permitting for the construction of the pipeline. AR Consultants, Inc. was contracted to conduct a cultural resource survey, which included archival research, to determine the presence of prehistoric and historic archaeological sites along the route and make recommendations about eligibility for the National Register of Historic Places (NRHP) and State Antiquities Landmark (SAL) designation. Four survey areas were identified, totaling approximately 3.1 kilometers of the approximately 9-km-long route. The westernmost survey area of the pipeline crosses Dosier Creek on the northside of Boat Club Road. The central segment out of the four survey areas is parallel to Park Drive and was investigated due to the presence of structures shown on historic maps within the 100-foot survey corridor. The longest segment in the east is parallel an intermittent tributary flowing northeast into Big Fossil Creek, while the final survey area approaches Big Fossil Creek in its floodplain. Survey of the approximately 25 acres was conducted on January 09, 2018. One site, 41TR309, was recorded and represents the remains of a historic farmstead. The site is not recommended eligible for NRHP or SAL. No other cultural resources were identified on or below the surface during the survey. Based on the results of the survey, ARC concludes that further cultural resource investigations for this project are unwarranted, and requests that the Texas Historical Commission (THC) concur with this recommendation. However, if buried cultural materials are discovered during construction, the Archeology Division of the THC should be notified. The records will be curated at the Center for Archaeological Studies at Texas State University in San Marcos

    Archeological Survey Of The Proposed Sanger Outfall Pipeline Denton County, Texas

    Get PDF
    The City of Sanger is proposing to construct the 3.06-kilometer-long Sanger Outfall Pipeline in Denton County, Texas. Alan Plummer Associates, Inc. contracted with AR Consultants, Inc. to survey a 100-foot-wide corridor along the proposed route. AR Consultants, Inc. hypothesized that there would be low potential for both prehistoric and historic cultural resources. These hypotheses were based on the location of the pipeline route in the narrow Ranger Branch floodplain and lack of mapped historic structures remaining in the project area. Fieldwork was conducted on May 31, 2018 under Texas Antiquities permit 8338, during which 19 shovel tests were excavated and a total of 11 acres were surveyed. No historic or prehistoric cultural resources were noted within the survey corridor. As such, AR Consultants, Inc. recommends that no further cultural resource investigations are necessary for this project, and requests that the Texas Historical Commission concur with this recommendation. Project documents will be curated at the Center for Archaeological Studies, Texas State University, San Marcos

    Restrictions on the Material Coefficients in the Constitutive Theories for Non-Classical Viscous Fluent Continua

    Get PDF
    This paper considers conservation and balance laws and the constitutive theo-ries for non-classical viscous fluent continua without memory, in which in-ternal rotation rates due to the velocity gradient tensor are incorporated in the thermodynamic framework. The constitutive theories for the deviatoric part of the symmetric Cauchy stress tensor and the Cauchy moment tensor are de-rived based on integrity. The constitutive theories for the Cauchy moment tensor are considered when the balance of moments of moments 1) is not a balance law and 2) is a balance law. The constitutive theory for heat vector based on integrity is also considered. Restrictions on the material coefficients in the constitutive theories for the stress tensor, moment tensor, and heat vector are established using the conditions resulting from the entropy inequa-lity, keeping in mind that the constitutive theories derived here based on inte-grity are in fact nonlinear constitutive theories. It is shown that in the case of the simplest linear constitutive theory for stress tensor used predominantly for compressible viscous fluids, Stokesā€™ hypothesis or Stokesā€™ assumption has no thermodynamic basis, hence may be viewed incorrect. Thermodynamically consistent derivations of the restrictions on various material coefficients are presented for non-classical as well as classical theories that are applicable to nonlinear constitutive theories, which are inevitable if the constitutive theo-ries are derived based on integrity
    • ā€¦
    corecore