71 research outputs found
A statistical framework for intrusion detection in ad hoc networks
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also generate false positives. Combining theories of hypothesis testing and approximation algorithms, we develop a framework to counter different threats while minimizing the resource consumption. We obtain computationally simple optimal rules for aggregating and thereby minimizing the errors in the decisions of the nodes executing the intrusion detection software (IDS) modules. But, we show that the selection of the optimal set of nodes for executing the IDS is an NP-hard problem. We describe a polynomial complexity, distributed selection algorithm, Maximum Unsatisfied Neighbors in Extended Neighborhood (MUNEN) that attains the best possible approximation ratio. The aggregation rules and MUNEN can be executed by mobile nodes with limited processing power. The overall framework provides a good balance between complexity and performance for attaining robust intrusion detection in ad hoc networks
A Framework for Misuse Detection in Ad Hoc Networks—Part I
We consider ad hoc networks with multiple, mobile intruders. We investigate the placement of the intrusion detection modules for misuse-based detection strategy. Our goal is to maximize the detection rate subject to limited availability of communication and computational resources. We mathematically formulate this problem, and show that computing the optimal solution is NP-hard. Thereafter, we propose two approximation algorithms that approximate the optimal solution within a constant factor, and prove that they attain the best possible approximation ratios. The approximation algorithms though require recomputation every time the topology changes. Thereafter, we modify these algorithms to adapt seamlessly to topological changes. We obtain analytical expressions to quantify the resource consumption versus detection rate tradeoffs for different algorithms. Using analysis and simulation, we evaluate these algorithms, and identify the appropriate algorithms for different detection rate and resource consumption tradeoffs
Analysis of dryer performance for the improvement of small-scale litchi processing
Litchi is a significant cash crop in Thailand, but marketing is constrained by the perishable nature of the fruit. Drying can extend the shelf life of the fruit; however, in Thailand drying technology is still in its early stages of development. With the aim of improving locally available small-scale drying equipment, the performance of a litchi batch-dryer by a farmers' cooperative near Chiang Mai was studied. Drying conditions, energy consumption and product quality were monitored over three trials. Energy performance was analysed using instantaneous indices, leading to suggestions for possible design-modifications. About 29.8% of the heat input was used for moisture evaporation, 38.4% was lost via unsaturated exhaust air and 17.6% was lost to the ambient environment. An optimum air flow rate, one that minimises exhaust heat losses without increasing the drying time, was calculated. Temperature and air flow within the drying chamber varied, resulting in a non-uniform batch. To improve performance, a new design for the drying chamber air inlet is recommended
Recommended from our members
LIDF: Layered intrusion detection framework for ad-hoc networks
As ad-hoc networks have different characteristics from a wired network, the intrusion detection techniques used for wired networks are no longer sufficient and effective when adapted directly to a wireless ad-hoc network. In this article, first τhe security challenges in intrusion detection for ad-hoc networks are identified and the related work for anomaly detection is discussed. We then propose a layered intrusion detection framework, which consists of collection, detection and alert modules that are handled by local agents. The collection, detection and alert modules are uniquely enabled with the main operations of ad-hoc networking, which are found at the OSI link and network layers. The proposed modules are based on interpolating polynomials and linear threshold schemes. An experimental evaluation of these modules shows their efficiency for several attack scenarios, such as route logic compromise, traffic patterns distortion and denial of service attacks
Improved energy efficiency of farmers' cooperative litchi drying operation in Northern Thailand
In 2007, Hmong farmers growing litchi in the mountainous region of Northern Thailand started to dry the fruit in response to its declining market price. However, the locally available dryer, although affordable and of a size appropriate for smallholder farmers' cooperatives, showed excessive gas consumption, and this, along with rising fuel costs, imposed a threat to the drying operation. The objective of this study was to test low-cost, easy-to-implement modifications to a locally available convection dryer, to improve its energy efficiency. Experiments were conducted in cooperation with a Hmong farmers' cooperative in Northern Thailand. Insulation of the air ducts and control of the air recirculation rate led to energy cost savings of US$2.45 per dryer-load. With the modifications required being simple, the investment needed was recovered after only approximately 20 loads, while the energy efficiency of the dryer increased from 33% to 39%
Pollination by the locally endangered island flying fox (Pteropus hypomelanus) enhances fruit production of the economically important durian (Durio zibethinus)
Fruit bats provide valuable pollination services to humans through a unique coevolutionary relationship with chiropterophilous plants. However, chiropterophily in the
Old World and the pollination roles of large bats, such as flying foxes (Pteropus spp., Acerodon spp., Desmalopex spp.), are still poorly understood and require further elucidation. Efforts to protect these bats have been hampered by a lack of basic quantitative information on their role as ecosystem service providers. Here, we investigate the role of the locally endangered island flying fox Pteropus hypomelanus in the pollination
ecology of durian (Durio zibethinus), an economically important crop in Southeast Asia.On Tioman Island, Peninsular Malaysia, we deployed 19 stations of paired infrared camera and video traps across varying heights at four individual flowering trees in a durian orchard. We detected at least nine species of animal visitors, but only bats had mutualistic interactions with durian flowers. There was a clear vertical stratification in
the feeding niches of flying foxes and nectar bats, with flying foxes feeding at greater heights in the trees. Flying foxes had a positive effect on mature fruit set and therefore serve as important pollinators for durian trees. As such, semi-wild durian trees—particularly
tall ones—may be dependent on flying foxes for enhancing reproductive success. Our study is the first to quantify the role of flying foxes in durian pollination, demonstrating that these giant fruit bats may have far more important ecological, evolutionary, and economic roles than previously thought. This has important implications
and can aid efforts to promote flying fox conservation, especially in Southeast Asian countries
Flacourtia rukam: biochemistry, functions and utilization
Flacourtia rukam is a species of the Flacourtiaceae. The edible, cherry-like, sweet and sour fruits of the species are not known to be commercially exploited. Phenolic compounds and flavonoids are the main constituents of the fruits, which have also been reported to have good antioxidant properties. However, the available information on the phytochemical and pharmacological aspects of F. rukam indicated it to be very much an underutilized tropical fruit tree. Nevertheless, based on the ethnomedicinal uses of the fruits and other parts of the plant, its economic potential as a health giving food crop should be further investigated and properly evaluated
- …