7,715 research outputs found
Analyzing Network Traffic for Malicious Hacker Activity
Since the Internet came into life in the 1970s, it has been growing more than 100% every year. On the other hand, the solutions to detecting network intrusion are far outpaced. The economic impact of malicious attacks in lost revenue to a single e-commerce company can vary from 66 thousand up to 53 million US dollars. At the same time, there is no effective mathematical model widely available to distinguish anomaly network behaviours such as port scanning, system exploring, virus and worm propagation from normal traffic.
PDS proposed by Random Knowledge Inc., detects and localizes traffic patterns consistent with attacks hidden within large amounts of legitimate traffic. With the network’s packet traffic stream being its input, PDS relies on high fidelity models for normal traffic from which it can critically judge the legitimacy of any substream of packet traffic. Because of the reliability on an accurate baseline model for normal network traffic, in this workshop, we concentrate on modelling normal network traffic with a Poisson process
An Automated Algorithm for Decline Analysis
Oil and gas wells are regularly monitored for their production rates. For a variety of reasons, typical production rate data is noisy and highly discontinuous, and we wish to use this data to extrapolate trends in the production rate to forecast future production and ultimate cumulative reserve recovery.
The proposed solution consists of three main steps: (1) Segmentation of Data, (2) Curve fitting, and (3) a Decision Process. Segmentation of Data attempts to identify intervals in the data where a single trend is dominant. A curve from an appropriate family of functions is then fitted to this interval of data. The Decision Process gauges the quality of the trends identified and either formulates a final answer or, if the program cannot come to a reliable answer, '
flags' the well to be looked at by an operator
Studies on bacterial speck of tomatoes caused by Pseudomonas syringae pv tomato : a thesis presented in fulfilment of a Masterate of Science by thesis only at Massey University
Page 42 is missing from the original copy.The taxonomy of the causal agent of bacterial speck of tomatoes is discussed and the trinomial Pseudomonas syringae pathovar tomato (Okabe) Young, Dye and Wilkie is adopted. A vacuum infiltration method of artificially inoculating seed was used and P.syringae pv tomato was detected in both artificially and naturally infested seed using sensitive enrichment culture techniques. The pathogen can remain viable between seed harvest and sowing in association with seed but seed-plant transfer was only occasionally demonstrated. The acid seed extraction method and other germicidal seed treatments were evaluated for their effect on the seedborne pathogen. Streptomycin sulphate as a slurry treatment (2.5g a.i./Kg of seed) just prior to seed sowing was the only totally effective seed treatment tested. The potential for survival in infected crop debris, soil and on alternative hosts was shown. However, the pathogen was not isolated from weeds in infected tomato crops and no conclusive evidence of systemic infection was found
Periodic Review, Push Inventory Policies for Remanufacturing
Sustainability has become a major issue in most economies, causing many leading companies to focus on product recovery and reverse logistics. This research is focused on product recovery, and in particular on production control and inventory management in the remanufacturing context. We study a remanufacturing facility that receives a stream of returned products according to a Poisson process. Demand is uncertain and also follows a Poisson process. The decision problems for the remanufacturing facility are when to release returned products to the remanufacturing line and how many new products to manufacture. We assume that remanufactured products are as good as new. In this paper, we employ a "push" policy that combines these two decisions. It is well known that the optimal policy parameters are difficult to find analytically; therefore, we develop several heuristics based on traditional inventory models. We also investigate the performance of the system as a function of return rates, backorder costs and manufacturing and remanufacturing lead times; and we develop approximate lower and upper bounds on the optimal solution. We illustrate and explain some counter-intuitive results and we test the performance of the heuristics on a set of sample problems. We find that the average error of the heuristics is quite low.inventory;reverse logistics;remanufacturing;environment;heuristics
Crime and Social media
Purpose-The study complements the scant macroeconomic literature on the development outcomes of social media by examining the relationship between Facebook penetration and violent crime levels in a cross-section of 148 countries for the year 2012.
Design/methodology/approach-The empirical evidence is based on Ordinary Least Squares (OLS), Tobit and Quantile regressions. In order to respond to policy concerns on the limited evidence on the consequences of social media in developing countries, the dataset is disaggregated into regions and income levels. The decomposition by income levels included: low income, lower middle income, upper middle income and high income. The corresponding regions include: Europe and Central Asia, East Asia and the Pacific, Middle East and North Africa, Sub-Saharan Africa and Latin America.
Findings-From OLS and Tobit regressions, there is a negative relationship between Facebook penetration and crime. However, Quantile regressions reveal that the established negative relationship is noticeable exclusively in the 90th crime decile. Further, when the dataset is decomposed into regions and income levels, the negative relationship is evident in the Middle East and North Africa (MENA) while a positive relationship is confirmed for sub-Saharan Africa. Policy implications are discussed.
Originality/value- Studies on the development outcomes of social media are sparse because of a lack of reliable macroeconomic data on social media. This study primarily complemented three existing studies that have leveraged on a newly available dataset on Facebook
Estereotipos raciales y formación de identidades subétnicas en entre nuevos estadounidenses de origen asiático
The NBS Cord Time Sharing System
Computer with on-line remote device time-sharing, and command system
- …
