455 research outputs found
Calculated photoelectron pitch angle and energy spectra
Calculations of the steady-state photoelectron energy and angular distribution in the altitude region between 120 and 1000 km are presented. The distribution is found to be isotropic at all altitudes below 250 km, while above this altitude anisotropies in both pitch angle and energy are found. The isotropy found in the angular distribution below 250 km implies that photoelectron transport below 250 km is insignificant, while the angular anisotropy found above this altitude implies a net photoelectron current in the upward direction. The energy anisotropy above 500 km arises from the selective backscattering of the low energy photoelectron population of the upward flux component by Coulomb collisions with the ambient ions. The total photoelectron flux attains its maximum value between about 40 and 70 km above the altitude at which the photoelectron production rate is maximum. The displacement of the maximum of the equilibrium flux is attributed to an increasing (with altitude) photoelectron lifetime. Photoelectrons at altitudes above that where the flux is maximum are on the average more energetic than those below that altitude
Recommended from our members
Ubiquitous healthcare profile management applying smart card technology
Nowadays, the patient-centric healthcare approach is focused on ubiquitous healthcare services. Furthermore, the adoption of cloud computing technology leads to more efficient ubiquitous healthcare systems. Moreover, the personalization of the delivery of ubiquitous healthcare services is enabled with the introduction of user profiles. In this paper, we propose five generic healthcare profile structures corresponding to the main categories of the participating entities included in a typical ubiquitous healthcare system in a cloud computing environment. In addition, we propose a profile management system incorporating smart card technology to increase its efficiency and the quality of the provided services of the ubiquitous healthcare system
Recommended from our members
A new framework architecture for next generation e-Health services
The challenge for fast and low-cost deployment of ubiquitous personalized e-Health services has prompted us to propose a new framework architecture for such services. We have studied the operational features and the environment of e-Health services and we led to a framework structure that extends the ETSI/Parlay architecture, which is used for the deployment of standardized services over the next generation IP networks. We expanded the ETSI/Parlay architecture with new service capability features as well as sensor, profiling and security mechanisms. The proposed framework assists the seamless integration, within the e-Health service structure, of diverse facilities provided by both the underlying communication and computing infrastructure as well as the patient's bio and context sensor networks. Finally, we demonstrate the deployment of a tele-monitoring service in smart home environment based on the proposed framework architecture
Kodiak: An Implementation Framework for Branch and Bound Algorithms
Recursive branch and bound algorithms are often used to refine and isolate solutions to several classes of global optimization problems. A rigorous computation framework for the solution of systems of equations and inequalities involving nonlinear real arithmetic over hyper-rectangular variable and parameter domains is presented. It is derived from a generic branch and bound algorithm that has been formally verified, and utilizes self-validating enclosure methods, namely interval arithmetic and, for polynomials and rational functions, Bernstein expansion. Since bounds computed by these enclosure methods are sound, this approach may be used reliably in software verification tools. Advantage is taken of the partial derivatives of the constraint functions involved in the system, firstly to reduce the branching factor by the use of bisection heuristics and secondly to permit the computation of bifurcation sets for systems of ordinary differential equations. The associated software development, Kodiak, is presented, along with examples of three different branch and bound problem types it implements
Recommended from our members
HIDROID: prototyping a behavioral host-based intrusion detection and prevention system for android
Previous research efforts on developing an Intrusion Detection and Prevention Systems (IDPS) for Android mobile devices rely mostly on centralized data collection and processing on a cloud server. However, this trend is characterized by two major limitations. First, it requires a continuous connection between monitored devices and the server, which might be infeasible, due to mobile network's outage or partial coverage. Second, it increases the risk of sensitive information leakage and the violation of user's privacy. To help alleviate these problems, in this paper, we develop a novel Host-based IDPS for Android (HIDROID), which runs completely on a mobile device, with a minimal computation burden. It collects data in run-time, by periodically sampling features reflecting the utilization of scarce resources on a mobile device (e.g. CPU, memory, battery, bandwidth, etc.). The detection engine exploits statistical and machine learning algorithms to build a data-driven model for the benign behavior. Any observation failing to match this model triggers an alert, and the preventive agent takes proper countermeasure(s) to minimize the risk. HIDROID requires no malicious data for training or tuning, which makes it handy for day-to-day usage. Experimental test results, on a real-life device, show that HIDROID is well able to learn and discriminate normal from malicious behavior, with very promising accuracy of up to 0.9, while maintaining false positive rate by 0.03
Genomic insights into the biosynthesis and physiology of the cyanobacterial neurotoxin 2,4-diaminobutanoic acid (2,4-DAB)
Cyanobacteria are an ancient clade of photosynthetic prokaryotes, whose worldwide occurrence, especially in water, presents health hazards to humans and animals due to the production of a range of toxins (cyanotoxins). These include the sometimes co-occurring, non-encoded diaminoacid neurotoxins 2,4-diaminobutanoic acid (2,4-DAB) and its structural analogue β-N-methylaminoalanine (BMAA). Knowledge of the biosynthetic pathway for 2,4-DAB, and its role in cyanobacteria, is lacking. The aspartate 4-phosphate pathway is a known route of 2,4-DAB biosynthesis in other bacteria and in some plant species. Another pathway to 2,4-DAB has been described in Lathyrus species. Here, we use bioinformatics analyses to investigate hypotheses concerning 2,4-DAB biosynthesis in cyanobacteria. We assessed the presence or absence of each enzyme in candidate biosynthesis routes, the aspartate 4-phosphate pathway and a pathway to 2,4-DAB derived from S-adenosyl-L-methionine (SAM), in 130 cyanobacterial genomes using sequence alignment, profile hidden Markov models, substrate specificity/active site identification and the reconstruction of gene phylogenies. In the aspartate 4-phosphate pathway, for the 18 species encoding diaminobutanoate-2-oxo-glutarate transaminase, the co-localisation of genes encoding the transaminase with the downstream decarboxylase or ectoine synthase – often within hybrid non-ribosomal peptide synthetase (NRPS)-polyketide synthases (PKS) clusters, NRPS-independent siderophore (NIS) clusters and incomplete ectoine clusters – is compatible with the hypothesis that some cyanobacteria use the aspartate 4-phosphate pathway for 2,4-DAB production. Through this route, in cyanobacteria, 2,4-DAB may be functionally associated with environmental iron-scavenging, via the production of siderophores of the schizokinen/synechobactin type and of some polyamines. In the pathway to 2,4-DAB derived from SAM, eight cyanobacterial species encode homologs of SAM-dependent 3-amino-3-carboxypropyl transferases. Other enzymes in this pathway have not yet been purified or sequenced. Ultimately, the biosynthesis of 2,4-DAB appears to be either restricted to some cyanobacterial species, or there may be multiple and additional routes, and roles, for the synthesis of this neurotoxin.</p
Towards an autonomous host-based intrusion detection system for android mobile devices
In the 5G era, mobile devices are expected to play a pivotal role in our daily life. They will provide a wide range of appealing features to enable users to access a rich set of high quality personalized services. However, at the same time, mobile devices (e.g., smartphones) will be one of the most attractive targets for future attackers in the upcoming 5G communications systems. Therefore, security mechanisms such as mobile Intrusion Detection Systems (IDSs) are essential to protect mobile devices from a plethora of known and unknown security breaches and to ensure user privacy. However, despite the fact that a lot of research effort has been placed on IDSs for mobile devices during the last decade, autonomous host-based IDS solutions for 5G mobile devices are still required to protect them in a more efficient and effective manner. Towards this direction, we propose an autonomous host-based IDS for Android mobile devices applying Machine Learning (ML) methods to inspect different features representing how the device’s resources (e.g., CPU, memory, etc.) are being used. The simulation results demonstrate a promising detection accuracy of above 85%, reaching up to 99.99%
- …