WorldWideScience

Sample records for ddos distributed denial

  1. Improving Distributed Denial of Service (DDOS Detection using Entropy Method in Software Defined Network (SDN

    Directory of Open Access Journals (Sweden)

    Maman Abdurohman

    2017-12-01

    Full Text Available This research proposed a new method to enhance Distributed Denial of Service (DDoS detection attack on Software Defined Network (SDN environment. This research utilized the OpenFlow controller of SDN for DDoS attack detection using modified method and regarding entropy value. The new method would check whether the traffic was a normal traffic or DDoS attack by measuring the randomness of the packets. This method consisted of two steps, detecting attack and checking the entropy. The result shows that the new method can reduce false positive when there is a temporary and sudden increase in normal traffic. The new method succeeds in not detecting this as a DDoS attack. Compared to previous methods, this proposed method can enhance DDoS attack detection on SDN environment.

  2. A Review of Anomaly Detection Techniques and Distributed Denial of Service (DDoS on Software Defined Network (SDN

    Directory of Open Access Journals (Sweden)

    M. H. H. Khairi

    2018-04-01

    Full Text Available Software defined network (SDN is a network architecture in which the network traffic may be operated and managed dynamically according to user requirements and demands. Issue of security is one of the big challenges of SDN because different attacks may affect performance and these attacks can be classified into different types. One of the famous attacks is distributed denial of service (DDoS. SDN is a new networking approach that is introduced with the goal to simplify the network management by separating the data and control planes. However, the separation leads to the emergence of new types of distributed denial-of-service (DDOS attacks on SDN networks. The centralized role of the controller in SDN makes it a perfect target for the attackers. Such attacks can easily bring down the entire network by bringing down the controller. This research explains DDoS attacks and the anomaly detection as one of the famous detection techniques for intelligent networks.

  3. PENGEMBANGAN PENCEGAHAN SERANGAN DISTRIBUTED DENIAL OF SERVICE (DDOS PADA SUMBER DAYA JARINGAN DENGAN INTEGRASI NETWORK BEHAVIOR ANALYSIS DAN CLIENT PUZZLE

    Directory of Open Access Journals (Sweden)

    Septian Geges

    2015-01-01

    Full Text Available Denial of Service (DoS merupakan permasalahan keamanan jaringan yang sampai saat ini terus berkembang secara dinamis. Semakin tinggi kemampuan komputasi suatu komputer penyerang, serangan DoS yang dapat dihasilkan juga semakin membahayakan. Serangan ini dapat mengakibatkan ketidakmampuan server untuk melayani service request yang sah. Karena itu serangan DoS sangat merugikan dan perlu diberikan pencegahan yang efektif. Ancaman berikutnya yang juga sangat membahayakan adalah Distributed Denial of Service (DDoS, dimana serangan ini memanfaatkan sejumlah besar komputer untuk menjalankan serangan DoS kepada server, web service, atau sumber daya jaringan lain. Mengingat resiko besar yang diakibatkan serangan DDoS ini, banyak peneliti yang terdorong untuk merancang mekanisme penga-manan sumber daya jaringan. Pada penelitian ini, penulis mengkhususkan pokok permasalahan pada pengamanan web service. Penulis mengemuka-kan sebuah mekanisme untuk mengamankan web service dengan cara melakukan filtrasi dan validasi permintaan yang diterima untuk mengakses sumber daya jaringan. Filtrasi dan validasi ini dilakukan dengan gabungan metode Network Behavior Analysis (NBA dan Client Puzzle (CP. Metode NBA menjadi lapisan pertahanan pertama untuk mendeteksi apakah sedang terjadi serangan DDoS dengan mengukur tingkat kepadatan jaringan/Network density. Dari metode NBA, didapatkan IP Address yang perlu divalidasi dengan metode CP sebagai lapisan pertahanan kedua. Apabila suatu service request sudah berhasil melewati proses filtrasi dan validasi ini, maka service request ini baru akan dilayani. Dari hasil percobaan, terbukti metode ini dapat mendeteksi serangan DDoS sekaligus menjamin bahwa service request yang sah mendapat pelayanan yang seharusnya sehingga server dapat melayani service request dengan baik.

  4. Distributed denial of service (DDoS) attack in cloud- assisted wireless body area networks: a systematic literature review.

    Science.gov (United States)

    Latif, Rabia; Abbas, Haider; Assar, Saïd

    2014-11-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.

  5. A statistical and distributed packet filter against DDoS attacks in ...

    Indian Academy of Sciences (India)

    VIKASH C PANDEY

    2018-03-14

    Mar 14, 2018 ... Distributed Denial of Service (DDoS) attacks are a serious threat to Cloud. These attacks ... packet filtering model is proposed against DDoS attacks in Cloud. The key idea of this .... generates alerts or logs. If a deviation from ...

  6. "LUDO" - Kids playing Distributed Denial of Service

    NARCIS (Netherlands)

    Steinberger, Jessica; Cardoso de Santanna, José Jair; Spatharas, E.; Amler, H.; Breuer, N.; Graul, K.; Kuhnert, B.; Piontek, U.; Sperotto, Anna; Baier, H.; Pras, Aiko; Bergström, Johan; Hórvath, Gyöngyi; Schofield, Brook

    2016-01-01

    Distributed denial of service attacks pose a serious threat to the availability of the network infrastructures and services. GE̿ANT, the pan-European network with terabit capacities witnesses close to hundreds of DDoS attacks on a daily basis. The reason is that DDoS attacks are getting larger, more

  7. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  8. Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event

    NARCIS (Netherlands)

    Moreira Moura, Giovane; de Oliveira Schmidt, R.; Heidemann, John; de Vries, Wouter Bastiaan; Müller, Moritz; Wei, Lan; Hesselman, C.E.W.

    2016-01-01

    Distributed Denial-of-Service (DDoS) attacks continue to be a major threat on the Internet today. DDoS attacks overwhelm target services with requests or other traffic, causing requests from legitimate users to be shut out. A common defense against DDoS is to replicate a service in multiple physical

  9. Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event

    NARCIS (Netherlands)

    Moreira Moura, Giovane; de Oliveira Schmidt, R.; Heidemann, John; de Vries, Wouter Bastiaan; Müller, Moritz; Wei, Lan; Hesselman, C.E.W.

    Distributed Denial-of-Service (DDoS) attacks continue to be a major threat in the Internet today. DDoS attacks over- whelm target services with requests or other traffic, causing requests from legitimate users to be shut out. A common defense against DDoS is to replicate the service in multiple

  10. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  11. Measuring the Adoption of DDoS Protection Services

    NARCIS (Netherlands)

    Jonker, Mattijs; Sperotto, Anna; van Rijswijk, Roland M.; Sadre, R.; Pras, Aiko

    2016-01-01

    Distributed Denial-of-Service (DDoS) attacks have steadily gained in popularity over the last decade, their intensity ranging from mere nuisance to severe. The increased number of attacks, combined with the loss of revenue for the targets, has given rise to a market for DDoS Protection Service (DPS)

  12. OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

    OpenAIRE

    Han, Biao; Yang, Xiangrui; Sun, Zhigang; Huang, Jinfeng; Su, Jinshu

    2018-01-01

    Distributed Denial of Service (DDoS) attacks are one of the biggest concerns for security professionals. Traditional middle-box based DDoS attack defense is lack of network-wide monitoring flexibility. With the development of software-defined networking (SDN), it becomes prevalent to exploit centralized controllers to defend against DDoS attacks. However, current solutions suffer with serious southbound communication overhead and detection delay. In this paper, we propose a cross-plane DDoS a...

  13. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  14. A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Adrien Bonguet

    2017-08-01

    Full Text Available Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services. Denial-of-Service (DoS and Distributed Denial-of-Service (DDoS attacks are serious threats to the Cloud services’ availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined. This survey also provides an overview of the existing defense solutions and investigates the experiments and metrics that are usually designed and used to evaluate their performance, which is helpful for the future research in the domain.

  15. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

    2017-01-01

    Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex

  16. Analysing the Impact of a DDoS Attack Announcement on Victim Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud A.M.G.; Nieuwenhuis, Lambertus Johannes Maria

    2017-01-01

    DDoS attacks are increasingly used by 'hackers' and 'hacktivists' for various purposes. A number of on-line tools are available to launch an attack of significant intensity. These attacks lead to a variety of losses at the victim's end. We analyse the impact of Distributed Denial-of-Service (DDoS)

  17. Real-time DDoS defense: a collaborative approach at internet scale

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Pras, Aiko; Baier, Harald

    2014-01-01

    In the last years, Distributed Denial of Service attacks (DDoS) evolved to one of the major causes responsible for network infrastructure and service outages. Often the amount of traffic generated by DDoS attacks is such that, although traditional security solutions as firewalls and Intrusion

  18. On the potential of IPv6 open resolvers for DDoS attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; de Oliveira Schmidt, Ricardo; van Rijswijk-Deij, Roland; Pras, Aiko; Kaafar, Mohamed Ali; Uhlig, Steve; Amann, Johanna

    2017-01-01

    Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelm- ing online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used

  19. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  20. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  1. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  2. Scalable DDoS Mitigation System for Data Centers

    Directory of Open Access Journals (Sweden)

    Zdenek Martinasek

    2015-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS have been used by attackers for over two decades because of their effectiveness. This type of the cyber-attack is one of the most destructive attacks in the Internet. In recent years, the intensity of DDoS attacks has been rapidly increasing and the attackers combine more often different techniques of DDoS to bypass the protection. Therefore, the main goal of our research is to propose a DDoS solution that allows to increase the filtering capacity linearly and allows to protect against the combination of attacks. The main idea is to develop the DDoS defense system in the form of a portable software image that can be installed on the reserve hardware capacities. During a DDoS attack, these servers will be used as filters of this DDoS attack. Our solution is suitable for data centers and eliminates some lacks of commercial solutions. The system employs modular DDoS filters in the form of special grids containing specific protocol parameters and conditions.

  3. Cryptographic Puzzles and Game Theory against DoS and DDoS attacks in Networks

    DEFF Research Database (Denmark)

    Mikalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2008-01-01

    In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In the _rst part, we describe client puzzle techniques that are based on the idea of computationally exhausting a malicious user when he attempts to launch an attack. In the ......In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In the _rst part, we describe client puzzle techniques that are based on the idea of computationally exhausting a malicious user when he attempts to launch an attack....... In the second part we are introducing some basic principles of game theory and we discuss how game theoretical frameworks can protect computer networks. Finally, we show techniques that combine client puzzles with game theory in order to provide DoS and DDoS resilience....

  4. DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions

    OpenAIRE

    Somani, Gaurav; Gaur, Manoj Singh; Sanghi, Dheeraj; Conti, Mauro; Buyya, Rajkumar

    2015-01-01

    Security issues related to the cloud computing are relevant to various stakeholders for an informed cloud adoption decision. Apart from data breaches, the cyber security research community is revisiting the attack space for cloud-specific solutions as these issues affect budget, resource management, and service quality. Distributed Denial of Service (DDoS) attack is one such serious attack in the cloud space. In this paper, we present developments related to DDoS attack mitigation solutions i...

  5. Model for Detection and Classification of DDoS Traffic Based on Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    D. Peraković

    2017-06-01

    Full Text Available Detection of DDoS (Distributed Denial of Service traffic is of great importance for the availability protection of services and other information and communication resources. The research presented in this paper shows the application of artificial neural networks in the development of detection and classification model for three types of DDoS attacks and legitimate network traffic. Simulation results of developed model showed accuracy of 95.6% in classification of pre-defined classes of traffic.

  6. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  7. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  8. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  9. Investigation Model for DDoS Attack Detection in Real-Time

    Directory of Open Access Journals (Sweden)

    Abdulghani Ali Ahmed

    2015-02-01

    Full Text Available Investigating traffic of distributed denial of services (DDoS attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack.

  10. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  11. Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking

    NARCIS (Netherlands)

    Jonker, Mattijs; Sperotto, Anna; Latré, Steven; Charalambides, Marinos; François, Jérôme; Schmitt, Corinna; Stiller, Burkhard

    Over the last years, Distributed Denial-of-Service (DDoS) attacks have become an increasing threat on the Internet, with recent attacks reaching traffic volumes of up to 500 Gbps. To make matters worse, web-based facilities that offer “DDoS-as-a-service‿ (i.e., Booters) allow for the layman to

  12. Multiplayer Game for DDoS Attacks Resilience in Ad Hoc Networks

    DEFF Research Database (Denmark)

    Mikalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles. We divide requests from nodes into separate groups which decreases the ability of malicious nodes to cooperate...... with one another in order to effectively make a DDoS attack. Finally, through our experiments we have shown that the total overhead of the multiplayer game as well as the the total time that each node needs to be served is affordable for devices that have limited resources and for environments like ad hoc...

  13. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  14. Review Of Prevention Techniques For Denial Of Service DOS Attacks In Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Poonam Rolla

    2015-08-01

    Full Text Available Wireless Sensor Networks comprised of several tiny sensor nodes which are densely deployed over the region to monitor the environmental conditions. These sensor nodes have certain design issues out of which security is the main predominant factor as it effects the whole lifetime of network. DDoS Distributed denial of service attack floods unnecessary packets in the sensor network. A review on DDoS attacks and their prevention techniques have been done in this paper.

  15. OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

    Directory of Open Access Journals (Sweden)

    Biao Han

    2018-01-01

    Full Text Available Distributed Denial of Service (DDoS attacks are one of the biggest concerns for security professionals. Traditional middle-box based DDoS attack defense is lack of network-wide monitoring flexibility. With the development of software-defined networking (SDN, it becomes prevalent to exploit centralized controllers to defend against DDoS attacks. However, current solutions suffer with serious southbound communication overhead and detection delay. In this paper, we propose a cross-plane DDoS attack defense framework in SDN, called OverWatch, which exploits collaborative intelligence between data plane and control plane with high defense efficiency. Attack detection and reaction are two key procedures of the proposed framework. We develop a collaborative DDoS attack detection mechanism, which consists of a coarse-grained flow monitoring algorithm on the data plane and a fine-grained machine learning based attack classification algorithm on the control plane. We propose a novel defense strategy offloading mechanism to dynamically deploy defense applications across the controller and switches, by which rapid attack reaction and accurate botnet location can be achieved. We conduct extensive experiments on a real-world SDN network. Experimental results validate the efficiency of our proposed OverWatch framework with high detection accuracy and real-time DDoS attack reaction, as well as reduced communication overhead on SDN southbound interface.

  16. A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

    Directory of Open Access Journals (Sweden)

    S.Seetha

    2010-06-01

    Full Text Available Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service attacks stealthy and difficult to counter. Defense against Distributed Denial- of -Service attacks is one of the hardest security problems on the Internet. Recently these network attacks have been increasing. Therefore more effective countermeasures are required to counter the threat. This requirement has motivated us to propose a novel mechanism against DDoS attack. This paper presents the design details of a distributed defense mechanism against DDoS attack. In our approach, the egress routers of the intermediate network coordinate with each other to provide the information necessary to detect and respond to the attack. Thus, a detection system based on single site will have either high positive or high negative rates. Unlike the traditional IDSs (Intrusion Detection System this method has the potential to achieve high true positive ratio. This work has been done by using consensus algorithms for exchanging the information between the detection systems. So the overall detection time would be reduced for global decision making.

  17. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  18. RESILIENT SCHEME AGAINST REDUCTION OF QUALITY (ROQ DISTRIBUTED DENIAL OF SERVICE ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    S.A. Arunmozhi

    2011-09-01

    Full Text Available Defending against denial-of-service attacks (DoS in a mobile ad hoc network (MANET is challenging because of the dynamic network topology. Security primitives must be dynamically adjusted to cope with the network. The Reduction-of-Quality (RoQ Distributed Denial of Service (DDoS attack is one which throttles the tcp throughput heavily and reduces the quality-of-service (QoS to end systems gradually rather than refusing the clients from the services completely. Supporting QoS in MANET is a challenging task, particularly in the presence of malicious users. In this paper, we propose a DoS resilient technique that uses a flow table to detect the attackers. The proposed defense mechanism identifies the attackers based on the congestion bit notification and asks the sending node to reduce the sending rate. Once the attackers are identified, all the packets from those nodes will be blocked. The throughput and delay performance of TCP or UDP flows are very sensitive to such RoQ attacks. Through extensive ns2 network simulations, we demonstrate the achievement of high throughput and low delay for a network under the RoQ attack.

  19. Distributed Denial of Service Detection with IPFIX Protocol

    Directory of Open Access Journals (Sweden)

    M. R. Mukhtarov

    2011-03-01

    Full Text Available In this article the existing methods of detecting Distributed Denial of Service attacks based on the analysis of network traffic or Netflow data is examined. Advantages and disadvantages of anomaly detection methods are listed. Authors suggest to use a method of maximum entropy estimation for the analysis of IPFIX data and propose an approach for detecting Distributed Denial of Service attacks.

  20. Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack

    Directory of Open Access Journals (Sweden)

    Ming Li

    2008-01-01

    Full Text Available The aim of distributed denial-of-service (DDOS flood attacks is to overwhelm the attacked site or to make its service performance deterioration considerably by sending flood packets to the target from the machines distributed all over the world. This is a kind of local behavior of traffic at the protected site because the attacked site can be recovered to its normal service state sooner or later even though it is in reality overwhelmed during attack. From a view of mathematics, it can be taken as a kind of short-range phenomenon in computer networks. In this paper, we use the Hurst parameter (H to measure the local irregularity or self-similarity of traffic under DDOS flood attack provided that fractional Gaussian noise (fGn is used as the traffic model. As flood attack packets of DDOS make the H value of arrival traffic vary significantly away from that of traffic normally arriving at the protected site, we discuss a method to statistically detect signs of DDOS flood attacks with predetermined detection probability and false alarm probability.

  1. Note on Studying Change Point of LRD Traffic Based on Li's Detection of DDoS Flood Attacking

    Directory of Open Access Journals (Sweden)

    Zhengmin Xia

    2010-01-01

    Full Text Available Distributed denial-of-service (DDoS flood attacks remain great threats to the Internet. To ensure network usability and reliability, accurate detection of these attacks is critical. Based on Li's work on DDoS flood attack detection, we propose a DDoS detection method by monitoring the Hurst variation of long-range dependant traffic. Specifically, we use an autoregressive system to estimate the Hurst parameter of normal traffic. If the actual Hurst parameter varies significantly from the estimation, we assume that DDoS attack happens. Meanwhile, we propose two methods to determine the change point of Hurst parameter that indicates the occurrence of DDoS attacks. The detection rate associated with one method and false alarm rate for the other method are also derived. The test results on DARPA intrusion detection evaluation data show that the proposed approaches can achieve better detection performance than some well-known self-similarity-based detection methods.

  2. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  3. (Distributed) Denial-of-Service : deel 1

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2013-01-01

    De afgelopen maanden zijn denial-of-service aanvallen op de Nederlandse bancaire sector, de KLM, dagblad de Telegraaf, de overheid (belastindienst, DigiD) en andere organisaties prominent in het nieuws. Wat is denial-of-service? Wie doet dat en waarom? Hoe sterk zijn de aanvallen? Wat kunnen of

  4. Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Khundrakpam Johnson Singh

    2016-10-01

    Full Text Available Distributed denial-of-service (DDoS attack is one of the major threats to the web server. The rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in current intrusion detection systems or intrusion prevention systems (IDS/IPS, mostly caused by application-layer DDoS attacks. Within this context, the objective of the paper is to detect a DDoS attack using a multilayer perceptron (MLP classification algorithm with genetic algorithm (GA as learning algorithm. In this work, we analyzed the standard EPA-HTTP (environmental protection agency-hypertext transfer protocol dataset and selected the parameters that will be used as input to the classifier model for differentiating the attack from normal profile. The parameters selected are the HTTP GET request count, entropy, and variance for every connection. The proposed model can provide a better accuracy of 98.31%, sensitivity of 0.9962, and specificity of 0.0561 when compared to other traditional classification models.

  5. (Distributed) Denial-of-Service : deel 2

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2013-01-01

    Het geblokkeerd raken van een dienstverlening wordt in het Engels vaak aangeduid met de term Denial-of-Service (afkort: DoS). Al wordt de term veelal gebruikt in de cyberspace-omgeving, is deze feitelijk generieker, DoS kan zowel een technische oorzaak hebben, als bewust worden veroorzaakt door

  6. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  7. Using DNS amplification DDoS attack for hiding data

    Science.gov (United States)

    Mehić, M.; Voznak, M.; Safarik, J.; Partila, P.; Mikulec, M.

    2014-05-01

    This paper concerns available steganographic techniques that can be used for sending hidden data through public network. Typically, in steganographic communication it is advised to use popular/often used method for sending hidden data and amount of that data need to be high as much as possible. We confirmed this by choosing a Domain Name System (DNS) as a vital protocol of each network and choosing Distributed denial of service (DDoS) attacks that are most popular network attacks currently represented in the world. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols fields and is known for IP, UDP or TCP protocols, but has never been applied to DNS (Domain Name Server) which are the fundamental part of network communications. The second explains the usage of DNS Amplification DDoS Attack to send seamlessly data through public network. The calculation that was performed to estimate the total amount of data that can be covertly transferred by using these technique, regardless of steganalysis, is included in this paper.

  8. Measuring exposure in DDoS protection services

    NARCIS (Netherlands)

    Jonker, Mattijs; Sperotto, Anna

    2017-01-01

    Denial-of-Service attacks have rapidly gained in popularity over the last decade. The increase in frequency, size, and complexity of attacks has made DDoS Protection Services (DPS) an attractive mitigation solution to which the protection of services can be outsourced. Despite a thriving market and

  9. Anycast and its potential for DDoS mitigation

    NARCIS (Netherlands)

    de Vries, Wouter Bastiaan; de Oliveira Schmidt, R.; Pras, Aiko

    IP anycast is widely being used to distribute essential Internet services, such as DNS, across the globe. One of the main reasons for doing so is to increase the redundancy of the service and reduce the impacts of the growing threat of DDoS attacks. IP anycast can be further used to mitigate DDoS

  10. Low-Rate DDoS Attack Detection Using Expectation of Packet Size

    Directory of Open Access Journals (Sweden)

    Lu Zhou

    2017-01-01

    Full Text Available Low-rate Distributed Denial-of-Service (low-rate DDoS attacks are a new challenge to cyberspace, as the attackers send a large amount of attack packets similar to normal traffic, to throttle legitimate flows. In this paper, we propose a measurement—expectation of packet size—that is based on the distribution difference of the packet size to distinguish two typical low-rate DDoS attacks, the constant attack and the pulsing attack, from legitimate traffic. The experimental results, obtained using a series of real datasets with different times and different tolerance factors, are presented to demonstrate the effectiveness of the proposed measurement. In addition, extensive experiments are performed to show that the proposed measurement can detect the low-rate DDoS attacks not only in the short and long terms but also for low packet rates and high packet rates. Furthermore, the false-negative rates and the adjudication distance can be adjusted based on the detection sensitivity requirements.

  11. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.

    Science.gov (United States)

    Latif, Rabia; Abbas, Haider; Latif, Seemab; Masood, Ashraf

    2016-07-01

    Security and privacy are the first and foremost concerns that should be given special attention when dealing with Wireless Body Area Networks (WBANs). As WBAN sensors operate in an unattended environment and carry critical patient health information, Distributed Denial of Service (DDoS) attack is one of the major attacks in WBAN environment that not only exhausts the available resources but also influence the reliability of information being transmitted. This research work is an extension of our previous work in which a machine learning based attack detection algorithm is proposed to detect DDoS attack in WBAN environment. However, in order to avoid complexity, no consideration was given to the traceback mechanism. During traceback, the challenge lies in reconstructing the attack path leading to identify the attack source. Among existing traceback techniques, Probabilistic Packet Marking (PPM) approach is the most commonly used technique in conventional IP- based networks. However, since marking probability assignment has significant effect on both the convergence time and performance of a scheme, it is not directly applicable in WBAN environment due to high convergence time and overhead on intermediate nodes. Therefore, in this paper we have proposed a new scheme called Efficient Traceback Technique (ETT) based on Dynamic Probability Packet Marking (DPPM) approach and uses MAC header in place of IP header. Instead of using fixed marking probability, the proposed scheme uses variable marking probability based on the number of hops travelled by a packet to reach the target node. Finally, path reconstruction algorithms are proposed to traceback an attacker. Evaluation and simulation results indicate that the proposed solution outperforms fixed PPM in terms of convergence time and computational overhead on nodes.

  12. SDN Based Collaborative Scheme for Mitigation of DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Sufian Hameed

    2018-02-01

    Full Text Available Software Defined Networking (SDN has proved itself to be a backbone in the new network design and is quickly becoming an industry standard. The idea of separation of control plane and data plane is the key concept behind SDN. SDN not only allows us to program and monitor our networks but it also helps in mitigating some key network problems. Distributed denial of service (DDoS attack is among them. In this paper we propose a collaborative DDoS attack mitigation scheme using SDN. We design a secure controller-to-controller (C-to-C protocol that allows SDN-controllers lying in different autonomous systems (AS to securely communicate and transfer attack information with each other. This enables efficient notification along the path of an ongoing attack and effective filtering of traffic near the source of attack, thus saving valuable time and network resources. We also introduced three different deployment approaches i.e., linear, central and mesh in our testbed. Based on the experimental results we demonstrate that our SDN based collaborative scheme is fast and reliable in efficiently mitigating DDoS attacks in real time with very small computational footprints.

  13. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  14. A Multivariant Stream Analysis Approach to Detect and Mitigate DDoS Attacks in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Raenu Kolandaisamy

    2018-01-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs are rapidly gaining attention due to the diversity of services that they can potentially offer. However, VANET communication is vulnerable to numerous security threats such as Distributed Denial of Service (DDoS attacks. Dealing with these attacks in VANET is a challenging problem. Most of the existing DDoS detection techniques suffer from poor accuracy and high computational overhead. To cope with these problems, we present a novel Multivariant Stream Analysis (MVSA approach. The proposed MVSA approach maintains the multiple stages for detection DDoS attack in network. The Multivariant Stream Analysis gives unique result based on the Vehicle-to-Vehicle communication through Road Side Unit. The approach observes the traffic in different situations and time frames and maintains different rules for various traffic classes in various time windows. The performance of the MVSA is evaluated using an NS2 simulator. Simulation results demonstrate the effectiveness and efficiency of the MVSA regarding detection accuracy and reducing the impact on VANET communication.

  15. Using the cumulative sum algorithm against distributed denial of service attacks in Internet of Things

    CSIR Research Space (South Africa)

    Machaka, Pheeha

    2015-11-01

    Full Text Available The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS attack...

  16. A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection

    Directory of Open Access Journals (Sweden)

    Xuan Dau Hoang

    2016-10-01

    Full Text Available On the high-speed connections of the Internet or computer networks, the IP (Internet Protocol packet traffic passing through the network is extremely high, and that makes it difficult for network monitoring and attack detection applications. This paper reviews methods to find the high-occurrence-frequency elements in the data stream and applies the most efficient methods to find Hot-IPs that are high-frequency IP addresses of IP packets passing through the network. Fast finding of Hot-IPs in the IP packet stream can be effectively used in early detection of DDoS (Distributed Denial of Service attack targets and spreading sources of network worms. Research results show that the Count-Min method gives the best overall performance for Hot-IP detection thanks to its low computational complexity, low space requirement and fast processing speed. We also propose an early detection model of DDoS attack targets based on Hot-IP finding, which can be deployed on the target network routers.

  17. Evaluation of a Multi-Agent System for Simulation and Analysis of Distributed Denial-of-Service Attacks

    National Research Council Canada - National Science Library

    Huu, Tee

    2003-01-01

    DDoS attack is evolving at a rapid and alarming rate; an effective solution must be formulated using an adaptive approach Most of the simulations are performed at the attack phase of the DDoS attack...

  18. Applying IPFIX Protocol for Detection of Distributed Denial of Service Attacks against Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    M. R. Mukhtarov

    2011-12-01

    Full Text Available The way of monitoring deviations in network traffic behavior inside “Cloud Infrastructure” using IPFIX protocol is suggested in the paper. The proposed algorithm is applied for registration of “Distributed Denial of Service” attacks against “Cloud Infrastructure”.

  19. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.

    Science.gov (United States)

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-11-04

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  20. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Directory of Open Access Journals (Sweden)

    João José Costa Gondim

    2016-11-01

    Full Text Available Concerns about security on Internet of Things (IoT cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests. After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  1. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Science.gov (United States)

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-01-01

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931

  2. Entropy-Based Economic Denial of Sustainability Detection

    Directory of Open Access Journals (Sweden)

    Marco Antonio Sotelo Monge

    2017-11-01

    Full Text Available In recent years, an important increase in the amount and impact of Distributed Denial of Service (DDoS threats has been reported by the different information security organizations. They typically target the depletion of the computational resources of the victims, hence drastically harming their operational capabilities. Inspired by these methods, Economic Denial of Sustainability (EDoS attacks pose a similar motivation, but adapted to Cloud computing environments, where the denial is achieved by damaging the economy of both suppliers and customers. Therefore, the most common EDoS approach is making the offered services unsustainable by exploiting their auto-scaling algorithms. In order to contribute to their mitigation, this paper introduces a novel EDoS detection method based on the study of entropy variations related with metrics taken into account when deciding auto-scaling actuations. Through the prediction and definition of adaptive thresholds, unexpected behaviors capable of fraudulently demand new resource hiring are distinguished. With the purpose of demonstrate the effectiveness of the proposal, an experimental scenario adapted to the singularities of the EDoS threats and the assumptions driven by their original definition is described in depth. The preliminary results proved high accuracy.

  3. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  4. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey

    CSIR Research Space (South Africa)

    Machaka, P

    2016-08-01

    Full Text Available This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks...

  5. Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model

    Directory of Open Access Journals (Sweden)

    Chunming Zhang

    2018-01-01

    Full Text Available The advanced persistent distributed denial-of-service (APDDoS attack is a fairly significant threat to cybersecurity. Formulating a mathematical model for accurate prediction of APDDoS attack is important. However, the dynamical model of APDDoS attack has barely been reported. This paper first proposes a novel dynamical model of APDDoS attack to understand the mechanisms of APDDoS attack. Then, the attacked threshold of this model is calculated. The global stability of attack-free and attacked equilibrium are both proved. The influences of the model’s parameters on attacked equilibrium are discussed. Eventually, the main conclusions of the theoretical analysis are examined through computer simulations.

  6. A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack

    Directory of Open Access Journals (Sweden)

    Yuntao Zhao

    2018-01-01

    Full Text Available The application-layer distributed denial of service (AL-DDoS attack makes a great threat against cyberspace security. The attack detection is an important part of the security protection, which provides effective support for defense system through the rapid and accurate identification of attacks. According to the attacker’s different URL of the Web service, the AL-DDoS attack is divided into three categories, including a random URL attack and a fixed and a traverse one. In order to realize identification of attacks, a mapping matrix of the joint entropy vector is constructed. By defining and computing the value of EUPI and jEIPU, a visual coordinate discrimination diagram of entropy vector is proposed, which also realizes data dimension reduction from N to two. In terms of boundary discrimination and the region where the entropy vectors fall in, the class of AL-DDoS attack can be distinguished. Through the study of training data set and classification, the results show that the novel algorithm can effectively distinguish the web server DDoS attack from normal burst traffic.

  7. Proactive Routing Mutation Against Stealthy Distributed Denial of Service Attacks – Metrics, Modeling and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Qi; Al-Shaer, Ehab; Chatterjee, Samrat; Halappanavar, Mahantesh; Oehmen, Christopher S.

    2018-04-01

    The Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one of the most devastating challenges facing cyber systems. The new generation of IDDoS attacks exploit the inherent weakness of cyber infrastructure including deterministic nature of routes, skew distribution of flows, and Internet ossification to discover the network critical links and launch highly stealthy flooding attacks that are not observable at the victim end. In this paper, first, we propose a new metric to quantitatively measure the potential susceptibility of any arbitrary target server or domain to stealthy IDDoS attacks, and es- timate the impact of such susceptibility on enterprises. Second, we develop a proactive route mutation technique to minimize the susceptibility to these attacks by dynamically changing the flow paths periodically to invalidate the adversary knowledge about the network and avoid targeted critical links. Our proposed approach actively changes these network paths while satisfying security and qualify of service requirements. We present an integrated approach of proactive route mutation that combines both infrastructure-based mutation that is based on reconfiguration of switches and routers, and middle-box approach that uses an overlay of end-point proxies to construct a virtual network path free of critical links to reach a destination. We implemented the proactive path mutation technique on a Software Defined Network using the OpendDaylight controller to demonstrate a feasible deployment of this approach. Our evaluation validates the correctness, effectiveness, and scalability of the proposed approaches.

  8. Bound Maxima as a Traffic Feature under DDOS Flood Attacks

    Directory of Open Access Journals (Sweden)

    Jie Xue

    2012-01-01

    Full Text Available This paper gives a novel traffic feature for identifying abnormal variation of traffic under DDOS flood attacks. It is the histogram of the maxima of the bounded traffic rate on an interval-by-interval basis. We use it to experiment on the traffic data provided by MIT Lincoln Laboratory under Defense Advanced Research Projects Agency (DARPA in 1999. The experimental results profitably enhance the evidences that traffic rate under DDOS attacks is statistically higher than that of normal traffic considerably. They show that the pattern of the histogram of the maxima of bounded rate of attack-contained traffic greatly differs from that of attack-free traffic. Besides, the present traffic feature is simple in mathematics and easy to use in practice.

  9. Evaluation of current state of amplification-based DDoS attacks

    NARCIS (Netherlands)

    Bohte, Edgar; Stamatogiannakis, Manolis; Bos, Herbert

    2018-01-01

    Amplification-based DDoS attacks are still a big threat to the availability of the internet. In quite some time there is no new paper published that gave an update on the current state of amplification DDoS attacks, taken into consideration it was a huge problem a few years ago. We performed

  10. Real-time DDoS attack detection for Cisco IOS using NetFlow

    NARCIS (Netherlands)

    van der Steeg, Daniël; Hofstede, R.J.; Sperotto, Anna; Pras, Aiko

    Flow-based DDoS attack detection is typically performed by analysis applications that are installed on or close to a flow collector. Although this approach allows for easy deployment, it makes detection far from real-time and susceptible to DDoS attacks for the following reasons. First, the fact

  11. Environmental Denial

    Directory of Open Access Journals (Sweden)

    Tomaž Grušovnik

    2013-03-01

    Full Text Available Even though today reliable information about the negative impact of humans on the environment is only two clicks away, a considerable number of people still deny it. Why? Research shows that what we might call 'environmental denial' is a consequence of specific social and psychological factors: if we were to admit the negative impact of our lifestyles on the environment, we would have to change our way of life founded on consumerism. However, consumerism is not simply a way of exchanging goods; it is also something around which we organize the meaning of our lives, as consumer research clearly shows. Therefore we deny the information on the negattive impact of human activity on the environment because admitting it would lead to a conflict between cognition (attitudes, beliefs and actions (behaviour around which we organize the meaning of our lives. Such an exposition points to wider sociopolitical effects. Firstly, it raises questions about education that have to take into account the non-rational nature of human beings, and secondly it raises questions about the directions and possible outcomes of social action.

  12. EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Rabia Latif

    2015-01-01

    Full Text Available Due to the scattered nature of DDoS attacks and advancement of new technologies such as cloud-assisted WBAN, it becomes challenging to detect malicious activities by relying on conventional security mechanisms. The detection of such attacks demands an adaptive and incremental learning classifier capable of accurate decision making with less computation. Hence, the DDoS attack detection using existing machine learning techniques requires full data set to be stored in the memory and are not appropriate for real-time network traffic. To overcome these shortcomings, Very Fast Decision Tree (VFDT algorithm has been proposed in the past that can handle high speed streaming data efficiently. Whilst considering the data generated by WBAN sensors, noise is an obvious aspect that severely affects the accuracy and increases false alarms. In this paper, an enhanced VFDT (EVFDT is proposed to efficiently detect the occurrence of DDoS attack in cloud-assisted WBAN. EVFDT uses an adaptive tie-breaking threshold for node splitting. To resolve the tree size expansion under extreme noise, a lightweight iterative pruning technique is proposed. To analyze the performance of EVFDT, four metrics are evaluated: classification accuracy, tree size, time, and memory. Simulation results show that EVFDT attains significantly high detection accuracy with fewer false alarms.

  13. The effects of DDoS attacks on flow monitoring applications

    NARCIS (Netherlands)

    Sadre, R.; Sperotto, Anna; Pras, Aiko

    Flow-based monitoring has become a popular approach in many areas of network management. However, flow monitoring is, by design, susceptible to anomalies that generate a large number of flows, such as Distributed Denial-Of-Service attacks. This paper aims at getting a better understanding on how a

  14. Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features

    Directory of Open Access Journals (Sweden)

    Jian Kang

    2015-01-01

    Full Text Available We propose using multiple observed features of network traffic to identify new high-distributed low-rate quality of services (QoS violation so that detection accuracy may be further improved. For the multiple observed features, we choose F feature in TCP packet header as a microscopic feature and, P feature and D feature of network traffic as macroscopic features. Based on these features, we establish multistream fused hidden Markov model (MF-HMM to detect stealthy low-rate denial of service (LDoS attacks hidden in legitimate network background traffic. In addition, the threshold value is dynamically adjusted by using Kaufman algorithm. Our experiments show that the additive effect of combining multiple features effectively reduces the false-positive rate. The average detection rate of MF-HMM results in a significant 23.39% and 44.64% improvement over typical power spectrum density (PSD algorithm and nonparametric cumulative sum (CUSUM algorithm.

  15. An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy

    Directory of Open Access Journals (Sweden)

    Yuntao Zhao

    2016-01-01

    Full Text Available DDoS attacks can prevent legitimate users from accessing the service by consuming resource of the target nodes, whose availability of network and service is exposed to a significant threat. Therefore, DDoS traffic perception is the premise and foundation of the whole system security. In this paper the method of DDoS traffic perception for SOA network based on time united conditional entropy was proposed. According to many-to-one relationship mapping between the source IP address and destination IP addresses of DDoS attacks, traffic characteristics of services are analyzed based on conditional entropy. The algorithm is provided with perception ability of DDoS attacks on SOA services by introducing time dimension. Simulation results show that the novel method can realize DDoS traffic perception with analyzing abrupt variation of conditional entropy in time dimension.

  16. A Model to Partly but Reliably Distinguish DDOS Flood Traffic from Aggregated One

    Directory of Open Access Journals (Sweden)

    Ming Li

    2012-01-01

    Full Text Available Reliable distinguishing DDOS flood traffic from aggregated traffic is desperately desired by reliable prevention of DDOS attacks. By reliable distinguishing, we mean that flood traffic can be distinguished from aggregated one for a predetermined probability. The basis to reliably distinguish flood traffic from aggregated one is reliable detection of signs of DDOS flood attacks. As is known, reliably distinguishing DDOS flood traffic from aggregated traffic becomes a tough task mainly due to the effects of flash-crowd traffic. For this reason, this paper studies reliable detection in the underlying DiffServ network to use static-priority schedulers. In this network environment, we present a method for reliable detection of signs of DDOS flood attacks for a given class with a given priority. There are two assumptions introduced in this study. One is that flash-crowd traffic does not have all priorities but some. The other is that attack traffic has all priorities in all classes, otherwise an attacker cannot completely achieve its DDOS goal. Further, we suppose that the protected site is equipped with a sensor that has a signature library of the legitimate traffic with the priorities flash-crowd traffic does not have. Based on those, we are able to reliably distinguish attack traffic from aggregated traffic with the priorities that flash-crowd traffic does not have according to a given detection probability.

  17. Denial: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    Denial was a mechanism that Sigmund Freud worked with in his clinical practice and in his formulation of personality. He considered denial, e.g., in his papers on Repression (1915) and on Fetishism (1927) in Collected Papers, Volumes IV and V respectively (London: Hogarth and The Institute of Psycho-Analysis, 1925 and 1950 respectively). It would…

  18. Impact of the increase in broadband access on South African national security and the average citizen

    CSIR Research Space (South Africa)

    Jansen van Vuuren, JC

    2010-04-01

    Full Text Available distributed denial of service (DDOS) attack, flooding Web sites or Internet Service Providers. DDOS attacks are often launched from numerous computers that have been hacked to obey commands of the perpetrator. Network Sabotage: Modification... sector. Cyber attacks with political connotation were seen in Estonia, Georgia and South Korea in the last few years. South Korea, a country with advanced IT developments experienced a distributed denial of service (DDOS) attack in July 2009...

  19. Limited Denial of Participation

    Data.gov (United States)

    Department of Housing and Urban Development — A Limited Denial of Participation (LDP) is an action taken by a HUD Field Office or the Deputy Assistant Secretary for Single Family (DASSF) or Multifamily (DASMF)...

  20. A DDoS Attack Detection Method Based on SVM in Software Defined Network

    Directory of Open Access Journals (Sweden)

    Jin Ye

    2018-01-01

    Full Text Available The detection of DDoS attacks is an important topic in the field of network security. The occurrence of software defined network (SDN (Zhang et al., 2018 brings up some novel methods to this topic in which some deep learning algorithm is adopted to model the attack behavior based on collecting from the SDN controller. However, the existing methods such as neural network algorithm are not practical enough to be applied. In this paper, the SDN environment by mininet and floodlight (Ning et al., 2014 simulation platform is constructed, 6-tuple characteristic values of the switch flow table is extracted, and then DDoS attack model is built by combining the SVM classification algorithms. The experiments show that average accuracy rate of our method is 95.24% with a small amount of flow collecting. Our work is of good value for the detection of DDoS attack in SDN.

  1. Using exponentially weighted moving average algorithm to defend against DDoS attacks

    CSIR Research Space (South Africa)

    Machaka, P

    2016-11-01

    Full Text Available This paper seeks to investigate the performance of the Exponentially Weighted Moving Average (EWMA) for mining big data and detection of DDoS attacks in Internet of Things (IoT) infrastructure. The paper will investigate the tradeoff between...

  2. Multiple-Features-Based Semisupervised Clustering DDoS Detection Method

    Directory of Open Access Journals (Sweden)

    Yonghao Gu

    2017-01-01

    Full Text Available DDoS attack stream from different agent host converged at victim host will become very large, which will lead to system halt or network congestion. Therefore, it is necessary to propose an effective method to detect the DDoS attack behavior from the massive data stream. In order to solve the problem that large numbers of labeled data are not provided in supervised learning method, and the relatively low detection accuracy and convergence speed of unsupervised k-means algorithm, this paper presents a semisupervised clustering detection method using multiple features. In this detection method, we firstly select three features according to the characteristics of DDoS attacks to form detection feature vector. Then, Multiple-Features-Based Constrained-K-Means (MF-CKM algorithm is proposed based on semisupervised clustering. Finally, using MIT Laboratory Scenario (DDoS 1.0 data set, we verify that the proposed method can improve the convergence speed and accuracy of the algorithm under the condition of using a small amount of labeled data sets.

  3. A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning

    Directory of Open Access Journals (Sweden)

    Bin Jia

    2017-01-01

    Full Text Available The explosive growth of network traffic and its multitype on Internet have brought new and severe challenges to DDoS attack detection. To get the higher True Negative Rate (TNR, accuracy, and precision and to guarantee the robustness, stability, and universality of detection system, in this paper, we propose a DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning and design a heuristic detection algorithm based on Singular Value Decomposition (SVD to construct our detection system. Experimental results show that our detection method is excellent in TNR, accuracy, and precision. Therefore, our algorithm has good detective performance for DDoS attack. Through the comparisons with Random Forest, k-Nearest Neighbor (k-NN, and Bagging comprising the component classifiers when the three algorithms are used alone by SVD and by un-SVD, it is shown that our model is superior to the state-of-the-art attack detection techniques in system generalization ability, detection stability, and overall detection performance.

  4. A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems.

    Science.gov (United States)

    Seo, Jung Woo; Lee, Sang Jin

    2016-01-01

    Large-scale network environments require effective detection and response methods against DDoS attacks. Depending on the advancement of IT infrastructure such as the server or network equipment, DDoS attack traffic arising from a few malware-infected systems capable of crippling the organization's internal network has become a significant threat. This study calculates the frequency of network-based packet attributes and analyzes the anomalies of the attributes in order to detect IP-spoofed DDoS attacks. Also, a method is proposed for the effective detection of malware infection systems triggering IP-spoofed DDoS attacks on an edge network. Detection accuracy and performance of the collected real-time traffic on a core network is analyzed thru the use of the proposed algorithm, and a prototype was developed to evaluate the performance of the algorithm. As a result, DDoS attacks on the internal network were detected in real-time and whether or not IP addresses were spoofed was confirmed. Detecting hosts infected by malware in real-time allowed the execution of intrusion responses before stoppage of the internal network caused by large-scale attack traffic.

  5. Young Children's Understanding of Denial

    Science.gov (United States)

    Austin, Keith; Theakston, Anna; Lieven, Elena; Tomasello, Michael

    2014-01-01

    Although a fair amount is known about young children's production of negation, little is known about their comprehension. Here, we focus on arguably the most complex basic form, denial, and how young children understand denial, when it is expressed in response to a question with gesture, single word, or sentence. One hundred twenty-six children in…

  6. Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach

    Directory of Open Access Journals (Sweden)

    Abdulaziz Aborujilah

    2017-01-01

    Full Text Available In this era of technology, cloud computing technology has become essential part of the IT services used the daily life. In this regard, website hosting services are gradually moving to the cloud. This adds new valued feature to the cloud-based websites and at the same time introduces new threats for such services. DDoS attack is one such serious threat. Covariance matrix approach is used in this article to detect such attacks. The results were encouraging, according to confusion matrix and ROC descriptors.

  7. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  8. DDoS-as-a-Service : Investigating Booter Websites

    NARCIS (Netherlands)

    Cardoso de Santanna, José Jair

    2017-01-01

    Why should you care about Distributed Denial of Service (DDoS) attacks? If your Internet home connection would be the target of a DDoS attack, then not only your connectivity is gone, but also your telephone and TV programs. This is because many homes have triple-play-service (a package offered by

  9. Analysis of DDoS-capable IoT malwares

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2017-01-01

    to the top Distributed Denial of Service (DDoS) attacks, making them more powerful and easier to achieve than ever. This paper aims at provide an up-to-date picture of DDoS attacks in the specific subject of the IoT, studying how these attacks work and considering the most common families in the IoT context...

  10. Booter websites characterization: Towards a list of threats

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Cardoso de Santanna, José Jair; Sperotto, Anna; Pras, Aiko

    Distributed Denial of Service (DDoS) attacks mean millions in revenue losses to many industries, such e-commerce and online financial services. The amount of reported DDoS attacks has increased with 47% compared to 2013. One of the reasons for this increase is the availability and ease of

  11. Multi-level anomaly detection: Relevance of big data analytics in ...

    Indian Academy of Sciences (India)

    The Internet has become a vital source of information; internal and exter- .... (iii) DDos detection: Distributed Denial of Service (DDoS) is a common malicious ...... Guirguis M, Bestavros A, Matta I and Zhang Y 2005a Reduction of quality (roq) ...

  12. Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest

    Directory of Open Access Journals (Sweden)

    Mohamed Idhammad

    2018-01-01

    Full Text Available Cloud Computing services are often delivered through HTTP protocol. This facilitates access to services and reduces costs for both providers and end-users. However, this increases the vulnerabilities of the Cloud services face to HTTP DDoS attacks. HTTP request methods are often used to address web servers’ vulnerabilities and create multiple scenarios of HTTP DDoS attack such as Low and Slow or Flooding attacks. Existing HTTP DDoS detection systems are challenged by the big amounts of network traffic generated by these attacks, low detection accuracy, and high false positive rates. In this paper we present a detection system of HTTP DDoS attacks in a Cloud environment based on Information Theoretic Entropy and Random Forest ensemble learning algorithm. A time-based sliding window algorithm is used to estimate the entropy of the network header features of the incoming network traffic. When the estimated entropy exceeds its normal range the preprocessing and the classification tasks are triggered. To assess the proposed approach various experiments were performed on the CIDDS-001 public dataset. The proposed approach achieves satisfactory results with an accuracy of 99.54%, a FPR of 0.4%, and a running time of 18.5s.

  13. Nihilism: a benign denial.

    Science.gov (United States)

    Skandalakis, John E; Mirilas, Petros

    2003-06-01

    Nihilism is the belief that all possible knowledge on a given topic has been amassed and codified. Ranging from benign denial to deliberate attempts at excommunication, nihilism is often encountered in the history of medicine. Eustachius, Columbus, and Sylvius strongly criticized Vesalius and defended the authority of Galen. Riolan fervently rejected Harvey's monumental work on the circulation of blood. Gross stated that no honest and sensible surgeon would ever sanction thyroidectomy. Sandstrom's discovery of the parathyroids was met with silence. Transplantation of parathyroids by Mandl was not appreciated when announced. Aristotle's dictum that the heart cannot withstand serious injury led to Paget's statement that cardiac surgery had reached the limits set by nature, which no new techniques could overcome. The first Billroth I operation was welcomed as, "Hopefully, also the last." Pancreatic surgery was opposed because the organ was of no clinical interest and was impossible for surgeons to reach. Pancreatic transplantation was rejected for many years, despite good results. When Blundell used blood transfusion for postpartum hemorrhage, critics averred that his next exploit would be radical removal of the spleen. Bassini stated that it could be risky to publish more about radical treatment of inguinal hernias. Carcinomas of the lower sigmoid and upper rectum were deemed untreatable because of their inaccessibility. Colostomy during pediatric surgery was rejected many times. Although it is difficult for the human mind to move from a familiar point of view, this propensity should not infect science, thereby impeding advancement.

  14. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    Science.gov (United States)

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  15. Defending Science Denial in Cyberspace

    Science.gov (United States)

    Rosenau, J.

    2013-12-01

    Blogs, Facebook, Twitter, and other social media have proven themselves powerful vectors for science denial. Left unchecked, these attacks on foundational sciences like evolution and climate change undermine public confidence in science and spawn attacks on science-based policy and science education. Scientists can blunt such attacks by being vigorous advocates for their own research and their discipline's core findings, by seeking wide and unexpected audiences for discussions of their science, and by understanding and addressing the social, political, and cultural roots of science denial.

  16. 44 CFR 6.55 - Appeal of denial of request to amend a record.

    Science.gov (United States)

    2010-10-01

    ... an employee of FEMA and the denial to amend involves a record maintained in the employee's Official... right to file a Statement of Disagreement for distribution in accordance with § 6.56. (4) Notice of the...

  17. Coding for effective denial management.

    Science.gov (United States)

    Miller, Jackie; Lineberry, Joe

    2004-01-01

    Nearly everyone will agree that accurate and consistent coding of diagnoses and procedures is the cornerstone for operating a compliant practice. The CPT or HCPCS procedure code tells the payor what service was performed and also (in most cases) determines the amount of payment. The ICD-9-CM diagnosis code, on the other hand, tells the payor why the service was performed. If the diagnosis code does not meet the payor's criteria for medical necessity, all payment for the service will be denied. Implementation of an effective denial management program can help "stop the bleeding." Denial management is a comprehensive process that works in two ways. First, it evaluates the cause of denials and takes steps to prevent them. Second, denial management creates specific procedures for refiling or appealing claims that are initially denied. Accurate, consistent and compliant coding is key to both of these functions. The process of proactively managing claim denials also reveals a practice's administrative strengths and weaknesses, enabling radiology business managers to streamline processes, eliminate duplicated efforts and shift a larger proportion of the staff's focus from paperwork to servicing patients--all of which are sure to enhance operations and improve practice management and office morale. Accurate coding requires a program of ongoing training and education in both CPT and ICD-9-CM coding. Radiology business managers must make education a top priority for their coding staff. Front office staff, technologists and radiologists should also be familiar with the types of information needed for accurate coding. A good staff training program will also cover the proper use of Advance Beneficiary Notices (ABNs). Registration and coding staff should understand how to determine whether the patient's clinical history meets criteria for Medicare coverage, and how to administer an ABN if the exam is likely to be denied. Staff should also understand the restrictions on use of

  18. Holocaust Denial among Slovenian Secondary School Pupils

    Directory of Open Access Journals (Sweden)

    Maša Pavlič

    2015-06-01

    Full Text Available The article presents tendencies of Holocaust denial among secondary school pupils in Slovenia. It focuses on research implemented in January 2012, in which 400 Slovenian secondary school pupils were included. In spite of the assumption that Holocaust denial amongst the youth in Slovenia already exists, we also assumed that a degree of Holocaust denial amongs Slovenian pupils is lower that amongst their peers in other EU countries. Research also inquired about the level of anti-Semitism in conjunction with Holocaust denial. The research project confirmed that students on lower levels of high school education and with less history and sociology lessons in curriculum are more receptive for the Holocaust denial and anti-Semitism is more present in this demographic. The level of Holocaust denial amongst secondary school pupils is not negligible; it suggests that this topic should be more thoroughly discussed in secondary schools.

  19. Illness denial questionnaire for patients and caregivers.

    Science.gov (United States)

    Rossi Ferrario, Silvia; Giorgi, Ines; Baiardi, Paola; Giuntoli, Laura; Balestroni, Gianluigi; Cerutti, Paola; Manera, Marina; Gabanelli, Paola; Solara, Valentina; Fornara, Roberta; Luisetti, Michela; Omarini, Pierangela; Omarini, Giovanna; Vidotto, Giulio

    2017-01-01

    Interest in assessing denial is still present, despite the criticisms concerning its definition and measurement. We tried to develop a questionnaire (Illness Denial Questionnaire, IDQ) assessing patients' and caregivers' denial in relation to their illness/disturbance. After a preliminary study, a final version of 24 dichotomous items (true/false) was selected. We hypothesized a theoretical model with three dimensions: denial of negative emotions, resistance to change, and conscious avoidance, the first two composing the actual Denial and the last representing an independent component of the illness denial behavior. The IDQ was administered to 400 subjects (219 patients and 181 caregivers) together with the Anxiety-Depression Questionnaire - Reduced form (AD-R), in order to assess concurrent validity. Confirmatory factor analysis (CFA), internal consistency indices (Cronbach's α and McDonald's ω), and test-retest analysis were performed. CFA and internal consistency indices (Cronbach's α: 0.87-0.96) indicated a clear and meaningful three-factor structure of IDQ, for both patients and caregivers. Further analyses showed good concurrent validity, with Denial and its subscale negatively associated with anxiety and depression and avoidance positively associated with anxiety and depression. The IDQ also showed a good stability ( r from 0.71 to 0.87). The IDQ demonstrated good psychometric properties. Denial of negative emotions and resistance to change seem to contribute to a real expression of denial, and conscious avoidance seems to constitute a further step in the process of cognitive-affective elaboration of the illness.

  20. Collateral Damage: Interlibrary Loan Lending Denials

    Science.gov (United States)

    Leykam, Andrew

    2009-01-01

    The intent of this paper is to explore the potential of utilizing interlibrary loan (ILL) data relating to lending denials to improve ILL services while highlighting institutional policies that have a negative impact on lending fulfillment rates. Reasons for denial as well as the types of requests being denied are reviewed. In addition, the author…

  1. Denial of shipments - myth or reality

    International Nuclear Information System (INIS)

    Charrette, M.A.; McInnes, D.

    2004-01-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care

  2. Denial of shipments - myth or reality

    Energy Technology Data Exchange (ETDEWEB)

    Charrette, M.A.; McInnes, D. [MDS Nordion, Ottawa, ON (Canada)

    2004-07-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care.

  3. Treatment of Holocaust Denial Literature in Association of Research Libraries

    Science.gov (United States)

    Spidal, Debra F.

    2012-01-01

    Holocaust denial literature has been treated inconsistently in library collections. At one time Holocaust denial literature was classed and subject headings assigned with Holocaust literature. After specific Library of Congress classification numbers and subject headings for Holocaust denial and Holocaust denial literature became available in the…

  4. A survey of Attacks on VoIP networks and Countermeasures

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-06-01

    Jun 1, 2015 ... integrity and availability of the services rendered on VoIP networks. In this paper, the various ... described in [2] and [5], denial of service in [1], eavesdropping ..... distributed denial of service (DDoS) [9],. [2]. •. Session initiation ...

  5. Organizational crisis-denial strategy: the effect of denial on public framing

    NARCIS (Netherlands)

    van der Meer, T.G.L.A.

    2014-01-01

    By applying a framing perspective, this study explores the effect of a crisis-denial strategy on public response. The online public framing of a specific crisis is compared with the crisis-denial frame provided by the organization. An automated semantic-network analysis is used to identify frames

  6. Illness denial questionnaire for patients and caregivers

    Directory of Open Access Journals (Sweden)

    Rossi Ferrario S

    2017-03-01

    Full Text Available Silvia Rossi Ferrario,1 Ines Giorgi,2 Paola Baiardi,3 Laura Giuntoli,4 Gianluigi Balestroni,1 Paola Cerutti,1 Marina Manera,2 Paola Gabanelli,2 Valentina Solara,5 Roberta Fornara,6 Michela Luisetti,1 Pierangela Omarini,1 Giovanna Omarini,1 Giulio Vidotto4 1Psychology Unit, Istituti Clinici Scientifici Maugeri SpA SB, Veruno, NO, Italy; 2Psychology Unit, 3Scientific Direction, Istituti Clinici Scientifici Maugeri SpA SB, Pavia, Italy; 4Department of General Psychology, University of Padova, Padova, Italy; 5Department of Neurology, ALS Centre, “Maggiore della Carita`” University Hospital, Novara, Italy; 6Psychology Unit, SS Trinità Hospital, Borgomanero, NO, Italy Purpose: Interest in assessing denial is still present, despite the criticisms concerning its definition and measurement. We tried to develop a questionnaire (Illness Denial Questionnaire, IDQ assessing patients’ and caregivers’ denial in relation to their illness/disturbance. Patients and methods: After a preliminary study, a final version of 24 dichotomous items (true/false was selected. We hypothesized a theoretical model with three dimensions: denial of negative emotions, resistance to change, and conscious avoidance, the first two composing the actual Denial and the last representing an independent component of the illness denial behavior. The IDQ was administered to 400 subjects (219 patients and 181 caregivers together with the Anxiety–Depression Questionnaire – Reduced form (AD-R, in order to assess concurrent validity. Confirmatory factor analysis (CFA, internal consistency indices (Cronbach’s α and McDonald’s ω, and test–retest analysis were performed. Results: CFA and internal consistency indices (Cronbach’s α: 0.87–0.96 indicated a clear and meaningful three-factor structure of IDQ, for both patients and caregivers. Further analyses showed good concurrent validity, with Denial and its subscale negatively associated with anxiety and depression and

  7. Contrast as denial in multi-dimensional semantics

    NARCIS (Netherlands)

    Spenader, Jennifer; Maier, Emar

    We argue that contrastive statements have the same underlying semantics and affect the context in the same way as denials. We substantiate this claim by giving a unified account of the two phenomena that treats contrast as a subtype of denial. We argue that earlier work on contrast-denial obscured

  8. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  9. Inferring Internet Denial-of-Service Activity

    National Research Council Canada - National Science Library

    Moore, David

    2001-01-01

    .... During this period, we observe more than 2,000 attacks against more than 5,000 distinct targets, ranging from well known e-commerce companies such as Amazon and Hotmail to small foreign ISPs and dial-up connections. We believe that our work is the only publically available data quantifying denial-of-service activity in the Internet.

  10. Data denial experiments for extratropical transition

    Directory of Open Access Journals (Sweden)

    Doris Anwender

    2012-11-01

    Full Text Available Data denial experiments using the European Centre for Medium-Range Weather Forecasts (ECMWF model are designed to investigate the value of targeted observations for historical extratropical transition (ET cases over the Atlantic. The impact of removing data from specified locations linked to the ET development is therefore examined. It is shown that the impact of denying data in the near tropical cyclone (TC environment is, on average, as important as denying data in mid-latitude sensitive regions determined using extratropical singular vectors (SV. The impact of data denial over TC regions propagates downstream from the Atlantic towards Europe, with a maximum degradation at day 4. This degradation is mainly attributed to the data denial at the TC stage, i.e. before ET is completed. When data are denied on mid-latitude sensitive regions, the largest degradation is found around day 2 and also after the day 4 forecast. In general, the loss of information content is larger when data are denied in mid-latitude sensitive areas because these identify dynamically active regions. In both denial experiments, aircraft and satellite radiance data are the most influential observations. For the selected case of Hurricane Irene, the largest degradations are found for forecasts initialised while Irene reached its peak intensity. If observations are denied in the near storm environment, the TC mostly disappears from the analysis and the subsequent forecast. This allows the impact of Irene on the formation of the downstream cut-off low to be investigated.

  11. Denials and Delays of Radioactive Material Shipments

    International Nuclear Information System (INIS)

    El-Shinawy, R.M.K.

    2011-01-01

    delays of shipments of radioactive materials forms an important issue today. Radioactive materials need to be transported using all modes of transport for use in different applications such as public health, industry, research and production of nuclear power. The transport of radioactive materials is governed by national and international regulations, which are based on the International Atomic Energy Agency (IAEA) regulations for safe transport of radioactive materials (TS-R-1). These regulations ensure high standards of safety. Recently there were increasing numbers of instances of denials and delays of shipments of radioactive materials even when complying with the regulations. The denials and delays can result in difficulties to patients and others who rely on products sterilized by radiation. Therefore there is an urgent need for a universally accepted approach to solve this problem. In response, the IAEA has formed an International Steering Committee (ISC) on denials and delays of radioactive materials. Also, it designate the National Focal Points (NFP) representative to help the ISC members and the IAEA by informing about denial operations and how they can help. The Steering Committee developed and adopted an action plan which includes the action to be taken. This plan is based on: Awareness, Training, Communication, Lobbying for marketing, Economic and Harmonization among member states. It is important to work within the mandate of the ISC and in the line of action plan on denials and delays. It identified the following network members such as: National Focal Points, Regional Coordinators, National Committee, National Representative for different modes of transport and similar bodies, Carriers, Producers and Suppliers, Different civil societies, NGO's, Ministry of transport and others.

  12. A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data

    Directory of Open Access Journals (Sweden)

    Bin Jia

    2016-01-01

    Full Text Available In the wake of the rapid development and wide application of information technology and Internet, our society has come into the information explosion era. Meanwhile, it brings in new and severe challenges to the field of network attack behavior detection due to the explosive growth and high complexity of network traffic. Therefore, an effective and efficient detection mechanism that can detect attack behavior from large scale of network traffic plays an important role. In this paper, we focus on how to distinguish the attack traffic from normal data flows in Big Data and propose a novel real-time DDoS attack detection mechanism based on Multivariate Dimensionality Reduction Analysis (MDRA. In this mechanism, we first reduce the dimensionality of multiple characteristic variables in a network traffic record by Principal Component Analysis (PCA. Then, we analyze the correlation of the lower dimensional variables. Finally, the attack traffic can be differentiated from the normal traffic by MDRA and Mahalanobis distance (MD. Compared with previous research methods, our experimental results show that higher precision rate is achieved and it approximates to 100% in True Negative Rate (TNR for detection; CPU computing time is one-eightieth and memory resource consumption is one-third of the previous detection method based on Multivariate Correlation Analysis (MCA; computing complexity is constant.

  13. Postmodernism, historical denial, and history education:

    Directory of Open Access Journals (Sweden)

    Robert John Parkes

    2015-12-01

    Full Text Available History educators frequently ignore, or engage only reluctantly and cautiously with postmodernism. This is arguably because postmodernism is frequently accused of assaulting the epistemological foundations of history as an academic discipline, fostering a climate of cultural relativism, encouraging the proliferation of revisionist histories, and providing fertile ground for historical denial. In the Philosophy of History discipline, Frank Ankersmit has become one of those scholars most closely associated with ‘postmodern history’. This paper explores Ankersmit’s ‘postmodern’ philosophy of history, particularly his key notion of ‘narrative substances’; what it might do for our approach to a problem such as historical denial; and what possibilities it presents for history didactics.

  14. Data denial experiments for extratropical transition

    OpenAIRE

    Anwender, Doris; Cardinali, Carla; Jones, Sarah C.

    2012-01-01

    Data denial experiments using the European Centre for Medium-Range Weather Forecasts (ECMWF) model are designed to investigate the value of targeted observations for historical extratropical transition (ET) cases over the Atlantic. The impact of removing data from specified locations linked to the ET development is therefore examined. It is shown that the impact of denying data in the near tropical cyclone (TC) environment is, on average, as important as denying data in mid-latitude sensitive...

  15. Administrative and clinical denials by a large dental insurance provider

    Directory of Open Access Journals (Sweden)

    Geraldo Elias MIRANDA

    2015-01-01

    Full Text Available The objective of this study was to assess the prevalence and the type of claim denials (administrative, clinical or both made by a large dental insurance plan. This was a cross-sectional, observational study, which retrospectively collected data from the claims and denial reports of a dental insurance company. The sample consisted of the payment claims submitted by network dentists, based on their procedure reports, reviewed in the third trimester of 2012. The denials were classified and grouped into ‘administrative’, ‘clinical’ or ‘both’. The data were tabulated and submitted to uni- and bivariate analyses. The confidence intervals were 95% and the level of significance was set at 5%. The overall frequency of denials was 8.2% of the total number of procedures performed. The frequency of administrative denials was 72.88%, whereas that of technical denials was 25.95% and that of both, 1.17% (p < 0.05. It was concluded that the overall prevalence of denials in the studied sample was low. Administrative denials were the most prevalent. This type of denial could be reduced if all dental insurance providers had unified clinical and administrative protocols, and if dentists submitted all of the required documentation in accordance with these protocols.

  16. Skepticism and Denial: Drawing a line

    Science.gov (United States)

    Byrne, J. M.; Brown, M. B.; Peacock, K.

    2016-12-01

    Climate denialism is distinct from a merely skeptical attitude towards generally accepted views in climate science. But drawing the line between them takes care—there are similarities between skepticism and denial, including a shared reluctance to accept conclusions that nearly all qualified scientists take to be well-justified. Here we will explore both how to draw the line, and how to effectively communicate the differences between denial and skepticism. Identifying which of these two terms best describes someone's attitude turns on whether they reject a generally accepted view based on a `high threshold' for acceptance of conclusions in general, or from a preference that the conclusion in question be false. In most cases, denialism manifests in disregard and mistreatment of evidence, including selective quotation, credulous endorsement of bad sources and incredulous rejection of good sources. Historically, current accepted views became dominant as alternatives were excluded and arguments supporting current views accumulated. The accumulated record of evidence and successful application of those views sets a high bar for proposed alternatives to them. Pure skeptics may refuse to endorse generally accepted views without rejecting or distorting the strong evidence for those views, and typically support policy responses based on the implications of that evidence. But deniers who reject scientific conclusions reject the evidence for those views while endorsing views that a true skeptic would regard as less plausible and well-supported than the accepted views. Thus motivated cognition is the key to defining denial. Pascal's famous argument for belief in God illustrates the problem: even assuming God's existence to be extremely improbable, the expected value of believing is far higher than the expected value of disbelieving. But Pascal's argument undermines its own methodology: without reasons to rely on beliefs as reliable guides to successful action, cost

  17. 36 CFR 1202.80 - How do I appeal the denial of a request to amend a record?

    Science.gov (United States)

    2010-07-01

    ...) For current NARA employees if the denial to amend concerns a record maintained in the employee's... agency, NARA will provide the employee with name and address of the appropriate appeal official in that...) Notice of your right to file a Statement of Disagreement for distribution in accordance with § 1202.82...

  18. 7 CFR 205.405 - Denial of certification.

    Science.gov (United States)

    2010-01-01

    ... PROVISIONS NATIONAL ORGANIC PROGRAM Certification § 205.405 Denial of certification. (a) When the certifying... organic program. (e) An applicant for certification who has received a written notification of... 7 Agriculture 3 2010-01-01 2010-01-01 false Denial of certification. 205.405 Section 205.405...

  19. 12 CFR 404.17 - Appeal of denials of access.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Appeal of denials of access. 404.17 Section 404.17 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Access to Records Under the Privacy Act of 1974 § 404.17 Appeal of denials of access. (a) Appeals to the Assistant General...

  20. 45 CFR 5.34 - Appeal of denials.

    Science.gov (United States)

    2010-10-01

    ... Release and Denial of Records § 5.34 Appeal of denials. (a) Right of appeal. You have the right to appeal... reasons why you believe that the FOIA exemption(s) we cited do not apply to the records that you requested... designated review official will consult with the General Counsel to ensure that the rights and interests of...

  1. Denials of Racism in Canadian English Language Textbooks

    Science.gov (United States)

    Gulliver, Trevor; Thurrell, Kristy

    2016-01-01

    This critical discourse analysis examines denials of racism in descriptions of Canada and Canadians from English language textbooks. Denials of racism often accompany racist and nationalist discourse, preempting observations of racism. The study finds that in representations of Canada or Canadians, English language texts minimize and downplay…

  2. Denial of Service Prevention for 5G

    DEFF Research Database (Denmark)

    Li, Yao; Kaur, Bipjeet; Andersen, Birger

    2011-01-01

    5G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced...... terminals. Our focus is security and especially prevention of Denial of Service (DoS) attacks which we believe will become more common in commercial networks through increasing availability of easy programmable SDRs. We propose a secret version of Adaptive Frequency Hopping, as a possible 5G technology...

  3. Klasifikasi Paket Jaringan Berbasis Analisis Statistik dan Neural Network

    Directory of Open Access Journals (Sweden)

    Harsono Harsono

    2018-01-01

    Full Text Available Distributed Denial-of-Service (DDoS is one of network attack technique which increased every year, especially in both of intensity and volume. DDoS attacks are still one of the world's major Internet threats and become a major problem of cyber-world security. Research in this paper aims to establish a new approach on network packets classification, which can be a basis for framework development on Distributed Denial-of-Service (DDoS attack detection systems. The proposed approach to solving the problem on network packet classification is by combining statistical data quantification methods with neural network methods. Based on the test, it is found that the average percentage of neural network classification accuracy against network data packet is 92.99%.

  4. Inferring the Presence of Reverse Proxies Through Timing Analysis

    Science.gov (United States)

    2015-06-01

    primary platforms from which Internet attacks are launched today. Attacks such as Distributed Denial of Service (DDoS), spam, phishing , and identity...7,272,642. [23] Google Maps. (2014, August). Planetlabs. [24] vmware. (2015, May). [Online]. Available: http://kb.vmware.com/selfservice/ microsites

  5. Wat gaan we doen tegen de cyberaanvallen?

    NARCIS (Netherlands)

    Hartel, Pieter H.; Berg, J.; Junger, Marianne

    2013-01-01

    Een aantal bedrijven, zoals ING, de Telegraaf, en de NS hebben de afgelopen maand last gehad van Distributed Denial of Service (DDoS) aanvallen. Enigszins gesimplificeerd zijn hierin de volgende stappen te onderscheiden: 1) de PC van een gebruiker loopt een computervirus op, bijvoorbeeld omdat de

  6. Cybersecurity (hoofdstuk 13)

    NARCIS (Netherlands)

    van der Meulen, N.S.; Lodder, A.R.; van der Hof, S.; Lodder, A.R.; Zwenne, G.J.

    2014-01-01

    Mede naar aanleiding van incidenten, zoals de hack op DigiNotar in de zomer van 2011, de honderdduizenden patiëntgegevens van het Groene Hart ziekenhuis die in het najaar 2012 benaderbaar bleken en de serie Distributed Denial of Service (DDoS) aanvallen op banken in het voorjaar van 2013, is het

  7. The denial of cancer interview: development and first assessment of psychometric properties in lung cancer patients

    NARCIS (Netherlands)

    Vos, Martina S.; Putter, Hein; Leurs, Amber; Rooijmans, Harry G. M.; de Haes, Hanneke C. J. M.; van Houwelingen, Hans C.

    2007-01-01

    Based on Weissman and Hackett's comprehensive definition of denial, a semi-structured interview was developed to measure denial in cancer patients. The denial in cancer interview (DCI) covers both the patients' recount of their illness experience and the expert's impression of the level of denial in

  8. Science and the Public: Debate, Denial, and Skepticism

    Directory of Open Access Journals (Sweden)

    Stephan Lewandowsky

    2016-08-01

    Full Text Available When the scientific method yields discoveries that imperil people’s lifestyle or worldviews or impinge on corporate vested interests, the public and political response can be anything but favorable. Sometimes the response slides into overt denial of scientific facts, although this denial is often claimed to involve “skepticism”. We outline the distinction between true skepticism and denial with several case studies. We propose some guidelines to enable researchers to differentiate legitimate critical engagement from bad-faith harassment, and to enable members of the public to pursue their skeptical engagement and critique without such engagement being mistaken for harassment.

  9. GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN

    Directory of Open Access Journals (Sweden)

    Mahalakshmi Gunasekaran

    2017-01-01

    Full Text Available Denial-of-sleep (DoSL attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes from going into the sleep mode, thus affecting the network performance. The existing schemes used for the DoSL attack detection do not provide an optimal energy conservation and key pairing operation. Hence, in this paper, an efficient Genetic Algorithm (GA based denial-of-sleep attack detection (GA-DoSLD algorithm is suggested for analyzing the misbehaviors of the nodes. The suggested algorithm implements a Modified-RSA (MRSA algorithm in the base station (BS for generating and distributing the key pair among the sensor nodes. Before sending/receiving the packets, the sensor nodes determine the optimal route using Ad Hoc On-Demand Distance Vector Routing (AODV protocol and then ensure the trustworthiness of the relay node using the fitness calculation. The crossover and mutation operations detect and analyze the methods that the attackers use for implementing the attack. On determining an attacker node, the BS broadcasts the blocked information to all the other sensor nodes in the network. Simulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC, ZKP, and TE2P schemes.

  10. 33 CFR 135.223 - Certificates, denial or revocation.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Financial Responsibility for Offshore Facilities § 135.223 Certificates, denial or revocation... false statement to the Fund Administrator in connection with establishing or maintaining evidence of...

  11. AMC Model for Denial of Sleep Attack Detection

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sens...

  12. Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Abdelali Saidi

    2017-03-01

    Full Text Available Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud.

  13. Global Warming Denial: The Human Brain on Extremes

    Science.gov (United States)

    Marrouch, N.; Johnson, B. T.; Slawinska, J. M.

    2016-12-01

    Future assessments of climate change rely on multi-model intercomparisons, and projections of the extreme events frequency are of particular interest as associated with significant economic costs and social threats. Notably, systematically simulated increases in the number of extreme weather events agree well with observational data over the last decade. At the same time, as the climate grows more volatile, widespread denial of climate change and its anthropocentric causes continues to proliferate (based on nationally representative U.S. polls). Simultaneous increases in both high-impact exposure and its denial is in stark contrast with our knowledge of socio-natural dynamics and its models. Disentangling this paradox requires an understanding of the origins of global warming denial at an individual level, and how subsequently it propagates across social networks of many scales, shaping global policies. However, as the real world and its dynamical models are complex (high-dimensional and coupled), separating the particular feedback of interest remains a challenge. Here, we demonstrate this feedback in a controlled experiment, where increasing unpredictability using helplessness-training paradigms induces changes in global warming denial, and the endorsement of conservative ideology. We explain these results in the context of evolutionary theory framing self-deception and denial as remnants of evolutionary processes that shaped and facilitated the survival of the human species. Further we link these findings to changes in neural and higher-level cognitive processes in response to unpredictable stimuli. We argue that climate change denial is an example of an extreme belief system that carries the potential to threaten the wellbeing of both humans and other species alike. It is therefore crucial to better quantify climate denial using social informatics tools that provide the means to improve its representations in coupled socio-geophysical models to mitigate its

  14. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing

    National Research Council Canada - National Science Library

    Mankins, David

    2001-01-01

    .... By employing different price and purchase functions, the architecture can provide service quality differentiation and furthermore, select good client behavior and discriminate against adversarial behavior...

  15. Denials of Shipments for Radioactive Material - Indian Perspective

    International Nuclear Information System (INIS)

    Singh, Khaidem Ranjankumar; Hussain, S.A; Panda, G.K.; Singh, T. Dewan; Dinakaran, M.C.

    2016-01-01

    Radioactive material (RAM) needs to be transported for use in public health and industry and for production of nuclear power. In India, transport of RAM is governed by national and international regulations which are based on the IAEA Regulations for the safe transport of RAM. However, recently there were increasing numbers of instances of denials and delays of shipment of RAM, reported by many countries worldwide including India, despite compliance with regulations. In Indian experience, the reasons for denials of shipment of RAM by the carriers are varied in nature. From the feedback received from the participants (airport operators, airlines, courier and cargo service providers, cargo forwarding agents, port authorities and sea carriers) of awareness programmes on safe transport of RAM conducted from year 2008 onwards by Atomic Energy Regulatory Board (AERB) it became clear that the denials of shipments in India are mainly due to (1) perception of unnecessary fear for transport of RAM (2) lack of confidence and awareness on the procedures for acceptance of shipment of RAM (3) fear of risk during accidents with packages containing RAM (4) policy of the carriers not to accept consignment of dangerous goods (5) poor infrastructure at the major/transit ports (6) problems of transshipments and (7) shippers not having undergone dangerous goods training. In this paper, the Indian experience in dealing with the problems of denial/delay of shipments containing radioactive material and identified possible consequences of such denials including economical impact are discussed in detail. (author)

  16. Climate Change Denial Books and Conservative Think Tanks

    Science.gov (United States)

    Jacques, Peter J.

    2013-01-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites. PMID:24098056

  17. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline...... the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware...

  18. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  19. Establishing an Effective Combat Strategy for Prevalent Cyber- Attacks

    OpenAIRE

    Vivian Ogochukwu Nwaocha; Inyiama H.C.

    2011-01-01

    As organisations continue to incorporate the Internet as a key component of their operations, the global cyber-threat level is increasing. One of the most common types of cyber-threats is known as the Distributed Denial of Service (DDoS) attack – an attack preventing users from accessing a system for a period of time. Recent DDoS attacks have left large corporate and government networks inaccessible to customers, partners and users for hours or days, resulting in significant financial, reputa...

  20. 17 CFR 9.12 - Effective date of disciplinary or access denial action.

    Science.gov (United States)

    2010-04-01

    ... ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.12 Effective date of disciplinary or access denial action. (a) Effective date. Any disciplinary or access denial action taken by an... cause a disciplinary action to become effective prior to that time if: (1) As authorized by § 8.25 of...

  1. 2 CFR 2424.1125 - How does a limited denial of participation start?

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false How does a limited denial of participation start? 2424.1125 Section 2424.1125 Grants and Agreements Federal Agency Regulations for Grants and... of Participation § 2424.1125 How does a limited denial of participation start? A limited denial of...

  2. 22 CFR 51.61 - Denial of passports to certain convicted drug traffickers.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Denial of passports to certain convicted drug... Denial, Revocation, and Restriction of Passports § 51.61 Denial of passports to certain convicted drug... felony conviction for a Federal or state drug offense, if the individual used a U.S. passport or...

  3. Denial of impending death: a discourse analysis of the palliative care literature.

    Science.gov (United States)

    Zimmermann, Camilla

    2004-10-01

    Terminally ill patients and their families are often referred to as being "in denial" of impending death. This study uses the qualitative method of discourse analysis to investigate the usage of the term "denial" in the contemporary hospice and palliative care literature. A Medline search (1970-2001) was performed combining the text words "deny" and "denial" with the subject headings "terminal care", "palliative care" and "hospice care," and restricted to English articles discussing death denial in adults. The 30 articles were analysed using a constant comparison technique and emerging themes regarding the meaning and usage of the words "deny" and "denial" identified. This paper focusses on the theme of denial as an individual psychological process. Three dominant subthemes were distinguished: denial as an unconscious "defence mechanism", denial as "healthy" and denial as temporary. The analysis focusses on the intertextuality of these themes with each other and with previous texts on the denial of death. Elements of the psychoanalytic definition of denial as an unconscious defence mechanism are retained in the literature but are interwoven with new themes on patient choice. The result is an overall discourse that is conflictual and at times self-contradictory but overall consistent with the biomedical model of illness. I suggest that the representation of death denial elaborated in these articles may be related to a larger discourse on dying in contemporary Western society, which both invites patients to participate in the planning of their death and labels those who do not comply.

  4. Protecting Dynamic Mobile Agent against Denial of Service Attacks

    Science.gov (United States)

    Aggarwal, Mayank; Nipur, Pallavi

    2010-11-01

    Mobile Agents are softwares migrating from one node to another to fulfill the task of its owner. The introduction of mobile agents has reduced network latency, network traffic a lot but at the same time it has increased the vulnerability for attacks by malicious hosts. One such attack is `Denial of Service', once the agent is launched it is free to roam without any control of its owner, this on one hand decreases the cost of agent—owner interaction and on the other hand increases the chances of `Denial Of Service'. In Denial Of Service attack the malicious host may deny resources required by the agent and kill the agent, thus the result computed so far is lost and this may happen every time the agent visits any malicious host. In this paper we continued the work done in [10] in which the authors proposed techniques by which owner can detect the malicious host for `Denial Of Service' but they did not covered technique for dynamic routes i.e. where the host or agent initiate migrations to hosts which were not contained in the route composed by the owner. We introduced an algorithm and a model which can be useful for the above purpose.

  5. Resilient control under Denial-of-Service: Robust design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not

  6. Resilient Control under Denial-of-Service:Robust Design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not

  7. 44 CFR 73.3 - Denial of flood insurance coverage.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of flood insurance coverage. 73.3 Section 73.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY... sufficient to confirm its identity and location; (2) A clear and unequivocal declaration that the property is...

  8. 9 CFR 2.11 - Denial of initial license application.

    Science.gov (United States)

    2010-01-01

    ... have violated any Federal, State, or local laws or regulations pertaining to animal cruelty within 1... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Denial of initial license application. 2.11 Section 2.11 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT...

  9. 7 CFR 97.105 - Denial of an application.

    Science.gov (United States)

    2010-01-01

    ... certificates or rights are cited, as a reason for denial, their nationality or country, numbers and dates, and... to enable the applicant to identify the cited certificates or rights. (d) If printed publications are... shall be denied. (b) In denying an application, the examiner shall cite the reasons the application was...

  10. 9 CFR 362.4 - Denial or withdrawal of service.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Denial or withdrawal of service. 362.4 Section 362.4 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE..., assaults, abuse, or any other improper means; (iv) has knowingly falsely made, issued, altered, forged, or...

  11. 11 CFR 4.8 - Appeal of denial.

    Science.gov (United States)

    2010-01-01

    ... been received by the Commission, may appeal the adverse determination or the failure to respond by... writing, shall clearly and prominently state on the envelope or other cover and at the top of the first... will not entertain any appeal from an alleged denial or failure to comply with an oral request. Any...

  12. 78 FR 58519 - Denial of Export Privileges; Sixing Liu

    Science.gov (United States)

    2013-09-24

    ... Powers Act (50 U.S.C. 1701, et seq. (2006 & Supp. IV 2010)). I have received notice of Liu's conviction... DEPARTMENT OF COMMERCE Bureau of Industry and Security Denial of Export Privileges; Sixing Liu In the Matter of: Sixing Liu, a/k/a Steve Liu, Inmate 43102-424, FCI Oxford, Federal Correctional...

  13. Economic Levers for Mitigating Interest Flooding Attack in Named Data Networking

    Directory of Open Access Journals (Sweden)

    Licheng Wang

    2017-01-01

    Full Text Available As a kind of unwelcome, unavoidable, and malicious behavior, distributed denial of service (DDoS is an ongoing issue in today’s Internet as well as in some newly conceived future Internet architectures. Recently, a first step was made towards assessing DDoS attacks in Named Data Networking (NDN—one of the promising Internet architectures in the upcoming big data era. Among them, interest flooding attack (IFA becomes one of the main serious problems. Enlightened by the extensive study on the possibility of mitigating DDoS in today’s Internet by employing micropayments, in this paper we address the possibility of introducing economic levers, say, dynamic pricing mechanism, and so forth, for regulating IFA in NDN.

  14. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  15. On-Line Detection of Distributed Attacks from Space-Time Network Flow Patterns

    National Research Council Canada - National Science Library

    Baras, J. S; Cardenas, A. A; Ramezani, V

    2003-01-01

    .... The directionality of the change in a network flow is assumed to have an objective or target. The particular problem of detecting distributed denial of service attacks from distributed observations is presented as a working framework...

  16. Climate change denial, freedom of speech and global justice

    Directory of Open Access Journals (Sweden)

    Trygve Lavik

    2016-10-01

    Full Text Available In this paper I claim that there are moral reasons for making climate denialism illegal . First I define climate denialism, and then I discuss its impact on society and its reception in the media.  I build my philosophical arguments mainly on John Stuart Mill and Thomas M. Scanlon.  According to Mill’s utilitarian justification of free speech, even untrue opinions are valuable in society’s pursuit of more truth. Consequently one might think that Mill’s philosophy would justify climate denialists’ right to free speech.  A major section of the paper argues against that view. The main arguments are: Climate denialism is not beneficial because its main goal is to produce doubt, and not truth. Climate denialism is not sincerely meant, which is a necessary condition for Mill to accept utterances. Climate denialists bring harm, by blocking necessary action on climate change.  Primarily they harm future generations and people in developing countries. Hence the case can be made in terms of global justice: Would future generations and people in developing countries support my claim? I think so, or so I argue. My argument from global justice is built on Scanlon’s distinction between the interests of participants, the interests of audiences, and the interests of bystanders.  The climate denialists have participant interests ‘in being able to call something to the attention of a wide audience’. Audience interests consist in ‘having access to expressions that we wish to hear or read, and even in being exposed to some degree to expressions we have not chosen’. Future generations and people in poor countries are bystanders to the climate debate. If the debate postpones necessary actions, it is the bystanders who must pay the price. I argue that bystanders’ costs outweigh participants’ and audiences’ interests, and that this is an argument for a statutory ban on climate denialism.Article first published online: 21 DEC 2015 

  17. TRAP: A Three-Way Handshake Server for TCP Connection Establishment

    Directory of Open Access Journals (Sweden)

    Fu-Hau Hsu

    2016-11-01

    Full Text Available Distributed denial of service attacks have become more and more frequent nowadays. In 2013, a massive distributed denial of service (DDoS attack was launched against Spamhaus causing the service to shut down. In this paper, we present a three-way handshaking server for Transmission Control Protocol (TCP connection redirection utilizing TCP header options. When a legitimate client attempted to connect to a server undergoing an SYN-flood DDoS attack, it will try to initiate a three-way handshake. After it has successfully established a connection, the server will reply with a reset (RST packet, in which a new server address and a secret is embedded. The client can, thus, connect to the new server that only accepts SYN packets with the corrected secret using the supplied secret.

  18. The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Fengli [Univ. of Arkansas, Fayetteville, AR (United States); Li, QInghua [Univ. of Arkansas, Fayetteville, AR (United States); Mantooth, Homer Alan [Univ. of Arkansas, Fayetteville, AR (United States); Ross, Chase [Univ. of Arkansas, Fayetteville, AR (United States); Yang, Jing [Univ. of Arkansas, Fayetteville, AR (United States); Di, Jia [Univ. of Arkansas, Fayetteville, AR (United States); Balda, Juan Carlos [Univ. of Arkansas, Fayetteville, AR (United States)

    2016-04-02

    According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.

  19. Resistance against brute-force attacks on stateless forwarding in information centric networking

    OpenAIRE

    Alzahrani, Bander A.; Reed, Martin J.; Vassilakis, Vassilios G.

    2015-01-01

    Line Speed Publish/Subscribe Inter-networking (LIPSIN) is one of the proposed forwarding mechanisms in Information Centric Networking (ICN). It is a stateless source-routing approach based on Bloom filters. However, it has been shown that LIPSIN is vulnerable to brute-force attacks which may lead to distributed denial-of-service (DDoS) attacks and unsolicited messages. In this work, we propose a new forwarding approach that maintains the advantages of Bloom filter based forwarding while allow...

  20. Avoiding the internet of insecure industrial things

    OpenAIRE

    Urquhart, Lachlan; McAuley, Derek

    2018-01-01

    Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to ...

  1. Modeling the Effects of Cyber Operations on Kinetic Battles

    Science.gov (United States)

    2014-06-01

    Nakashima, 2013). Equally dangerous are attacks targeting the national economy . In 2012, distributed denial of service (DDoS) attacks were carried out...enable our freedom of action in cyberspace. (USCYBERCOM Concept of Operations, v 1.0, 21 Sep 2010) Global Information Grid ( GIG ): The globally...managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing

  2. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  3. 26 CFR 1.585-5 - Denial of bad debt reserves for large banks.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Denial of bad debt reserves for large banks. 1...) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Banking Institutions § 1.585-5 Denial of bad debt... other section for an addition to a reserve for bad debts. However, for these years, except as provided...

  4. 12 CFR 303.223 - Applicant's right to hearing following denial.

    Science.gov (United States)

    2010-01-01

    ... Criminal Offenses) § 303.223 Applicant's right to hearing following denial. An applicant may request a... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Applicant's right to hearing following denial. 303.223 Section 303.223 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION PROCEDURE AND RULES OF...

  5. 40 CFR 86.1850-01 - Denial, suspension or revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 19 2010-07-01 2010-07-01 false Denial, suspension or revocation of... AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM NEW AND IN-USE HIGHWAY VEHICLES AND...-Duty Vehicles, Light-Duty Trucks, and Complete Otto-Cycle Heavy-Duty Vehicles § 86.1850-01 Denial...

  6. 22 CFR 214.51 - Administrative review of denial for public access to records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Administrative review of denial for public access to records. 214.51 Section 214.51 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADVISORY COMMITTEE MANAGEMENT Administrative Remedies § 214.51 Administrative review of denial for public access to...

  7. 22 CFR 212.36 - Denial of request for access to records.

    Science.gov (United States)

    2010-04-01

    ... Section 212.36 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency... responsible for the denial, and the right of the person to appeal the adverse determination. (b) The denial of... Administrative Services, Bureau for Management, Room 803, SA-2, Agency for International Development, 21st and...

  8. 24 CFR 2002.21 - Authority to deny requests for records and form of denial.

    Science.gov (United States)

    2010-04-01

    ... of a record or information compiled by a criminal law enforcement authority in the course of a...) Be in writing; (2) State simply the reasons for the denial; (3) State that review of the denial by the Inspector General of HUD may be requested; (4) Set forth the steps for obtaining review consistent...

  9. 78 FR 71032 - Foreign Tire Sales, Inc., Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-11-27

    ...-0063; Notice 2] Foreign Tire Sales, Inc., Denial of Petition for Decision of Inconsequential...). ACTION: Denial of Petition. SUMMARY: Foreign Tire Sales, Inc. (FTS), as importer for ProMeter brand medium truck radial replacement tires manufactured by Shandlong Linglong Rubber Company Limited, has...

  10. 78 FR 71030 - Ford Motor Company, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-11-27

    ...-0005; Notice 2] Ford Motor Company, Denial of Petition for Decision of Inconsequential Noncompliance...). ACTION: Denial of Petition. SUMMARY: Ford Motor Company (Ford) has determined that certain model year 2011 Ford E-150, E-250, E-350 and E-450 motor vehicles manufactured [[Page 71031

  11. 17 CFR 9.11 - Form, contents and delivery of notice of disciplinary or access denial action.

    Science.gov (United States)

    2010-04-01

    ... notice of disciplinary or access denial action. 9.11 Section 9.11 Commodity and Securities Exchanges... OTHER ADVERSE ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.11 Form, contents and delivery of notice of disciplinary or access denial action. (a) When required...

  12. The Consent Solution to Punishment and the Explicit Denial Objection

    Directory of Open Access Journals (Sweden)

    Miroslav Imbrisevic

    2010-06-01

    Full Text Available Recently, David Boonin has put forward several objections to Carlos S. Nino's 'Consensual Theory of Punishment'. In this paper I will defend Nino against the 'explicit denial objection'. I will discuss whether Boonin's interpretation of Nino as a tacit consent theorist is right. I will argue that the offender's consent is neither tacit nor express, but a special category of implicit consent. Further, for Nino the legal-normative consequences of an act (of crime are 'irrevocable', i.e. one cannot (expressly and successfully deny liability to them. I will suggest an explanation for Nino's irrevocability claim.

  13. Cascading Denial of Service Attacks on Wi-Fi Networks

    OpenAIRE

    Xin, Liangxiao; Starobinski, David; Noubir, Guevara

    2016-01-01

    We unveil the existence of a vulnerability in Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. We demonstrate the feasibility of such attacks through experiments with real Wi-Fi cards, extensive ns-3 simulations, and theoretical analysis....

  14. The denial of death thesis: sociological critique and implications for palliative care.

    Science.gov (United States)

    Zimmermann, Camilla; Rodin, Gary

    2004-03-01

    It has become commonplace to say that contemporary western society is 'death-denying'. This characterization, which sociologists have termed the 'denial of death thesis', first arose in the social science, psychological and clinical medical literature in the period between 1955 and 1985. During the same time period, the hospice and palliative care movements were developing and in part directed themselves against the perceived cultural denial of death in western society. While the denial of death has been taken for granted by the lay public as well as by clinicians, in the sociological literature it has been increasingly questioned. In this paper we use sociological critiques of the denial of death thesis to raise critical questions about the theory and practice of contemporary palliative care. In particular, we argue that the emphasis of palliative care should not be on extinguishing the denial of death but on the relief of suffering.

  15. Denial of shipments of radioactive materials in Paraguay

    International Nuclear Information System (INIS)

    More Torres, Luis E.; Romero de Gonzalez, V.; Lopez Caceres, S.M.

    2008-01-01

    The Denials, Delays and Abandonment of the Radioactive Materials is a problem at world level that has been increased in the last times with more emphasis starting from the attack of September 11 the 2001 in the USA. From then radioactive materials have been denial or delayed and until abandoned. The materials of short periods used mainly in nuclear medicine as the 99m Tc or the 131 I, when they are rejected, delayed it usually causes the lost of the material because it has surpassed their useful life and in many cases they are abandoned. The rejections, delays and later abandonment of the materials in special of Medical use have originated serious damages for the nuclear medicine patients as much of diagnoses as of treatments, in Teleterapia for many patients of cancer who could not be treated. In the petroliferous prospecting and Industry has originated numerous economic damages due to the delays since most of the used sources they are of long period but the delay causes an important increase in the cost. (author)

  16. The Marley hypothesis: denial of racism reflects ignorance of history.

    Science.gov (United States)

    Nelson, Jessica C; Adams, Glenn; Salter, Phia S

    2013-02-01

    This study used a signal detection paradigm to explore the Marley hypothesis--that group differences in perception of racism reflect dominant-group denial of and ignorance about the extent of past racism. White American students from a midwestern university and Black American students from two historically Black universities completed surveys about their historical knowledge and perception of racism. Relative to Black participants, White participants perceived less racism in both isolated incidents and systemic manifestations of racism. They also performed worse on a measure of historical knowledge (i.e., they did not discriminate historical fact from fiction), and this group difference in historical knowledge mediated the differences in perception of racism. Racial identity relevance moderated group differences in perception of systemic manifestations of racism (but not isolated incidents), such that group differences were stronger among participants who scored higher on a measure of racial identity relevance. The results help illuminate the importance of epistemologies of ignorance: cultural-psychological tools that afford denial of and inaction about injustice.

  17. Rootkits, Trojans, backdoors and new developments

    CSIR Research Space (South Africa)

    Decloedt, HE

    2010-10-01

    Full Text Available . Pg 9 Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 4.2.2 DoS Trojans This type of Trojan gives the attacker the power to start a distributed denial of service (DDoS) attack if there are enough victims. Win... in Warfare and the Safeguarding of Peace to achieve the final goal of the attack. This may be to steal information, disseminate spam or to launch a denial of service (DoS) attack on another computer system over a network. Eventually the compromise...

  18. Coping with stereotype threat: denial as an impression management strategy.

    Science.gov (United States)

    von Hippel, William; von Hippel, Courtney; Conway, Leanne; Preacher, Kristopher J; Schooler, Jonathan W; Radvansky, Gabriel A

    2005-07-01

    Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype of incompetence (Study 1) and hostel-dwelling older adults (Study 2) were more likely to deny incompetence if they were high in impression management. African Americans (Study 3) showed a similar pattern of denying cognitive incompetence, which emerged primarily when they were interviewed by a White experimenter and had attended a predominantly Black high school. In Study 4, White students who expected to take an IQ test and were threatened by a stereotype of being less intelligent than Asians were more likely to deny that intelligence is important if they were high in impression management.

  19. The cerebral neurobiology of anxiety, anxiety displacement, and anxiety denial.

    Science.gov (United States)

    Gottschalk, L A; Fronczek, J; Abel, L; Buchsbaum, M S; Fallon, J H

    2001-01-01

    Previous studies examining the relationship of anxiety scores, derived from the content analysis of speech of normal individuals, have revealed that the anxiety scores occurring in the dreams associated with rapid eye movement (REM) sleep are significantly correlated with localized cerebral glucose metabolic rates assessed by positron emission tomography (PET) scanning. These significant intercorrelations occur in different cerebral areas when the anxiety scores are obtained from mental experiences reported during non-REM sleep or during wakeful silent mentation. The purpose of the present study was to examine the intercorrelations found between anxiety attributed to the self, anxiety-displacement, and anxiety denial measured from computerized content analysis of 5-min verbal reports of subjective thoughts and feelings obtained from wakeful normal subjects and localized cerebral glucose metabolic rates during PET scanning. The subjects were 10 wakeful young males. Their anxiety scores were derived from computerized content analysis of 5-min reports they gave of their subjective thoughts, feelings and fantasies during a 30-min period following an intravenous injection of F D-deoxyglucose (FDG). The subjects were moved 32--45 min after this injection to obtain a PET scan, which records all of the localized cerebral glucose metabolic rates during the 30 min following the FDG injection. Significant intercorrelations of localized cerebral glucose metabolic rates with the scores of self-anxiety, anxiety displacement, and anxiety-denial were found in dissimilar cerebral locations depending on the type of anxiety involved. The significant correlations occurred in brain regions known to be associated with the functions of emotions, cognition, memory, and vision. Specific combinations of cerebral areas, based on glucose metabolic rates, appear to distinguish and be associated with different verbal expressions of anxiety. Replication of this preliminary research will be

  20. A Mechanism Denial Study on the Madden-Julian Oscillation

    Directory of Open Access Journals (Sweden)

    In-Sik Kang

    2011-12-01

    Full Text Available A series of Madden-Julian oscillation (MJO mechanism-denial experiments is performed using an atmospheric general circulation model (AGCM. Daily climatological seasonal cycles of i surface latent heat flux, ii net radiative heating rate, and iii surface wind stress are obtained from a control simulation and prescribed in place of the normal interactive computations of these fields in order to turn off the i wind-induced surface heat exchange (WISHE, ii cloud-radiation interaction (CRI, and iii frictional wave-CISK (FWC mechanisms, respectively. Dual and triple mechanism denial experiments are also conducted by switching off multiple mechanisms together. The influence of each mechanism is assessed by comparing experiments with that mechanism turned off to those in which it is not. CRI and WISHE are both found to be important to the simulated MJO amplitude and propagation speed, while FWC has weaker and less systematic effects. The MJO is weakened when CRI is turned off, but strengthened when WISHE is turned off, indicating that CRI amplifies the MJO in the control simulation while WISHE weakens it. The negative influence of WISHE is shown to result from simulated phase relationships between surface winds, surface fluxes and convection which differ significantly from those found in observations, and thus is not interpreted as evidence against a positive role for WISHE in the development and maintenance of the observed MJO. The positive influence of CRI in the model is consistent with a strong simulated relationship between daily grid-point column-integrated radiative and convective heating; the mean ratio of the latter to the former exceeds 0.2 for rain rates less than 14 mm d-1. CRI is also shown to suppress an excessive excitation of the convectively coupled Kelvin wave so that the amplitude and frequency of the MJO is maintained.

  1. 7 CFR 330.204 - Denial or cancellation of permits; reconsiderations.

    Science.gov (United States)

    2010-01-01

    ...; PLANT PESTS; SOIL, STONE, AND QUARRY PRODUCTS; GARBAGE Movement of Plant Pests § 330.204 Denial or... ground it will involve a danger of dissemination of the plant pest into the State, Territory or...

  2. 20 CFR 404.981 - Effect of Appeals Council's decision or denial of review.

    Science.gov (United States)

    2010-04-01

    ... decision or denial of review. The Appeals Council may deny a party's request for review or it may decide to... law judge if the request for review is denied, is binding unless you or another party file an action...

  3. 75 FR 8193 - Jeri Hassman, M.D.; Denial of Application

    Science.gov (United States)

    2010-02-23

    ... is buying drugs on the street. Id. at 1006. With respect to requests for early refills, Dr. Hare... Part II Department of Justice Drug Enforcement Administration Jeri Hassman, M.D.; Denial of...; [[Page 8194

  4. Semantics and pragmatics of social influence: how affirmations and denials affect beliefs in referent propositions.

    Science.gov (United States)

    Gruenfeld, D H; Wyer, R S

    1992-01-01

    Ss read either affirmations or denials of target propositions that ostensibly came from either newspapers or reference volumes. Denials of the validity of a proposition that was already assumed to be false increased Ss' beliefs in this proposition. The effect generalized to beliefs in related propositions that could be used to support the target's validity. When denials came from a newspaper, their "boomerang effect" was nearly equal in magnitude to the direct effect of affirming the target proposition's validity. When Ss were asked explicitly to consider the implications of the assertions, however, the impact of denials was eliminated. Affirmations of a target proposition that was already assumed to be true also had a boomerang effect. Results have implications for the effects of both semantic and pragmatic processing of assertions on belief change.

  5. A study for the review of export license through the NSG denial notification

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Sun Do; Yang, Seung Hyo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2012-10-15

    All NSG participating members that have rejected applications of export licenses for nuclear export control items within their respective countries must give notice of this to the point of contact at NSG. This is referred to as the Denial Notification, and each of the participating members must respect the denial notifications of the other member nations. When participating members seek to obtain approval for an export license that is essentially identical to the denial notification of other member nations, they must necessarily go through the process of prior discussion with the nation that gave the denial notification. Also, it is regulated that the export license must not be approved without the sufficient exchange of information. Thus, these records of denial notifications must be constantly checked and maintained as the latest updated information and these records must be utilized in related approval examinations. This study analyzes the denial notifications that have been recorded in the past 20 years and it describes the areas that must be mainly examined at the export and import licensing.

  6. Distribution

    Science.gov (United States)

    John R. Jones

    1985-01-01

    Quaking aspen is the most widely distributed native North American tree species (Little 1971, Sargent 1890). It grows in a great diversity of regions, environments, and communities (Harshberger 1911). Only one deciduous tree species in the world, the closely related Eurasian aspen (Populus tremula), has a wider range (Weigle and Frothingham 1911)....

  7. ECONOMIC DENIAL OF SUSTAINABILITY (EDOS ATTACK ON CLOUD – A SURVEY

    Directory of Open Access Journals (Sweden)

    A. Somasundaram

    2016-12-01

    Full Text Available Cloud computing is a promising technology aims to provide reliable, customized and quality of service computation environments for cloud users in terms of Software as a Service-SaaS , Plat- form as a Service-PaaS and Infrastructure as Service-IaaS, which is provided on the pay per use basis. Cloud computing enables services to be deployed and accessed globally on demand with little maintenance by providing QoS as per service level agreement (SLA of customer. However, due to elasticity of resources, cloud systems are facing severe security problems. One of the most serious threats to cloud computing is EDoS (economic Distributed Denial of Service aims to consume the cloud resource by attacker and impose financial burden to the legitimate user, where integrity, availability and confidentiality of the cloud services are never compromised but affects the accountability which leads to inaccurate billing. Since the billing models of cloud services may not be mature enough to properly account for an EDoS attack. These paper surveys, the different techniques that generate, detect and mitigate the EDoS Attack on Cloud.

  8. Insurance denials for cancer clinical trial participation after the Affordable Care Act mandate.

    Science.gov (United States)

    Mackay, Christine B; Antonelli, Kaitlyn R; Bruinooge, Suanna S; Saint Onge, Jarron M; Ellis, Shellie D

    2017-08-01

    The Affordable Care Act (ACA) includes a mandate requiring most private health insurers to cover routine patient care costs for cancer clinical trial participation; however, the impact of this provision on cancer centers' efforts to accrue patients to clinical trials has not been well described. First, members of cancer research centers and community-based institutions (n = 252) were surveyed to assess the status of insurance denials, and then, a focused survey (n = 77) collected denial details. Univariate and multivariate analyses were used to examine associations between the receipt of denials and site characteristics. Overall, 62.7% of the initial survey respondents reported at least 1 insurance denial during 2014. Sites using a precertification process were 3.04 times more likely to experience denials (95% confidence interval, 1.55-5.99; P ≤ .001), and similar rates of denials were reported from sites located in states with preexisting clinical trial coverage laws versus states without them (82.3% vs 85.1%; χ = 50.7; P ≤ .001). Among the focused survey sites, academic centers reported denials more often than community sites (71.4% vs 46.4%). The failure of plans to cover trial participation was cited as the most common reason provided for denials (n = 33 [80.5%]), with nearly 80% of sites (n = 61) not receiving a coverage response from the insurer within 72 hours. Despite the ACA's mandate for most insurers to cover routine care costs for cancer clinical trial participation, denials and delays continue. Denials may continue because some insurers remain exempt from the law, or they may signal an implementation failure. Delays in coverage may affect patient participation in trials. Additional efforts to eliminate this barrier will be needed to achieve federal initiatives to double the pace of cancer research over the next 5 years. Future work should assess the law's effectiveness at the patient level to inform these efforts

  9. Teenage sexuality and rights in Chile: from denial to punishment.

    Science.gov (United States)

    Casas, Lidia; Ahumada, Claudia

    2009-11-01

    While Chile sees itself as a country that has fully restored human rights since its return to democratic rule in 1990, the rights of teenagers to comprehensive sexuality education are still not being met. This paper reviews the recent history of sexuality education in Chile and related legislation, policies and programmes. It also reports a 2008 review of the bylaws of 189 randomly selected Chilean schools, which found that although such bylaws are mandatory, the absence of bylaws to prevent discrimination on grounds of pregnancy, HIV and sexuality was common. In relation to how sexual behaviour and discipline were addressed, bylaws that were non-compliant with the law were very common. Opposition to sexuality education in schools in Chile is predicated on the denial of teenage sexuality, and many schools punish sexual behaviour where transgression is perceived to have taken place. While the wider Chilean society has been moving towards greater recognition of individual autonomy and sexual diversity, this cultural shift has yet to be reflected in the government's political agenda, in spite of good intentions. Given this state of affairs, the Chilean polity needs to recognise its youth as having human rights, or will continue to fail in its commitment to them.

  10. Words as masks: About the importance of denial in management

    Directory of Open Access Journals (Sweden)

    Agnès Vandevelde-Rougale

    2017-03-01

    Full Text Available This article draws on a socio-anthropological research, which questions the effects of managerial discourse on the individual by considering experiences of workplace bullying. It studies the observation that despite the gap between what management says and what management does, words of managerial discourse are still widely used, by managers and employees alike. French philosopher, ethnologist and psychoanalyst Octave Mannoni (1899-1989, reworking Freud’s concept of fetishism, showed in an article entitled “I know very well, but nonetheless…” that a belief can survive the denial (disavowal of reality. Recognizing fantasy as a fantasy is not sufficient to reduce its power over the individual. Based on a case study, the present article demonstrates that the paradoxical logic phrased by Octave Mannoni can help us understand how managerial discourse can exercise its influence on individuals, despite discrepancies between what is said and what is implemented in the organisations. It presents the hypothesis that words can work as “masks” do in some traditional tribes, thus being the means supporting a belief that sustains management authority.

  11. "But I didn't do it!": ethical treatment of sex offenders in denial.

    Science.gov (United States)

    Levenson, Jill S

    2011-09-01

    This article addresses ethical questions and issues related to the treatment of sex offenders in denial, using the empirical research literature and the ethical codes of American Psychological Association (APA) and National Association of Social Workers (NASW) to guide the ethical decision-making process. The empirical literature does not provide an unequivocal link between denial and recidivism, though some studies suggest that decreased denial and increased accountability appear to be associated with greater therapeutic engagement and reduced recidivism for some offenders. The ethical codes of APA and NASW value the client's self-determination and autonomy, and psychologists and social workers have a duty to empower individual well-being while doing no harm to clients or others. Clinicians should view denial not as a categorical construct but as a continuum of distorted cognitions requiring clinical attention. Denial might also be considered as a responsivity factor that can interfere with treatment progress. Offering a reasonable time period for therapeutic engagement might provide a better alternative than automatically refusing treatment to categorical deniers.

  12. Climate Change Denial Books and Conservative Think Tanks: Exploring the Connection.

    Science.gov (United States)

    Dunlap, Riley E; Jacques, Peter J

    2013-06-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites.

  13. Silence and Denial in Everyday Life—The Case of Animal Suffering

    Directory of Open Access Journals (Sweden)

    Deidre Wicks

    2011-02-01

    Full Text Available How can we make sense of the fact that we live in a world where good people co-exist in silence about widespread animal suffering. How is it that sites of suffering such as laboratories, factory farms, abattoirs and animal transportation are all around us and yet we ‘do not, in a certain sense, know about them’ [1]. This ‘not knowing’ is one of the most difficult barriers for animal activists who must constantly develop new strategies in an attempt to catch public attention and translate it into action. Recent contributions from the ‘sociology of denial’ have elucidated many of the mechanisms involved in ‘not knowing’ in relation to human atrocities and genocide. In this context, ‘denial’ refers to the maintenance of social worlds in which an undesirable situation is unrecognized, ignored or made to seem normal [2]. These include different types of denial: personal, official and cultural, as well as the process of normalization whereby suffering becomes invisible through routinization, tolerance, accommodation, collusion and cover up. Denial and normalization reflect both personal and collective states where suffering is not acknowledged [3]. In this paper, I will examine insights from the sociology of denial and apply them to human denial and normalization of animal suffering. This will include an examination of denial which is both individual and social and the implications of these insights for theory and practice in the human/animal relationship.

  14. Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

    Directory of Open Access Journals (Sweden)

    Yang Dan

    2008-12-01

    Full Text Available Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links of a network and caused by the same source (e.g., DDoS attack, worm propagation. The anomaly transiting in a single link might be unnoticeable and hard to detect, while the anomalous aggregation from many links can be prevailing, and does more harm to the networks. Aiming at the similar features of distributed traffic anomaly on many links, this paper proposes a network-wide detection method by performing anomalous correlation analysis of traffic signals' instantaneous parameters. In our method, traffic signals' instantaneous parameters are firstly computed, and their network-wide anomalous space is then extracted via traffic prediction. Finally, an anomaly is detected by a global correlation coefficient of anomalous space. Our evaluation using Abilene traffic traces demonstrates the excellent performance of this approach for distributed traffic anomaly detection.

  15. 78 FR 22876 - Rodenticides; Notice of Intent To Cancel Registrations of, and Notice of Denial of Applications...

    Science.gov (United States)

    2013-04-17

    ... ENVIRONMENTAL PROTECTION AGENCY [FIFRA Docket No. 661; FRL-9804-2] Rodenticides; Notice of Intent To Cancel Registrations of, and Notice of Denial of Applications for, Certain Rodenticide Bait... to the Notice of Intent to Cancel Registration of, and Notice of Denial of Application for, Certain...

  16. 78 FR 49411 - Denial of Petitions for Reconsideration of Regulation of Fuels and Fuel Additives: 2013 Biomass...

    Science.gov (United States)

    2013-08-14

    ...-AR55 Denial of Petitions for Reconsideration of Regulation of Fuels and Fuel Additives: 2013 Biomass... Fuel Additives: 2013 Biomass-Based Diesel Renewable Fuel Volume. DATES: EPA's denials of the petitions... requires that EPA determine the applicable volume of biomass-based diesel to be used in setting annual...

  17. 42 CFR 476.93 - Opportunity to discuss proposed initial denial determination and changes as a result of a DRG...

    Science.gov (United States)

    2010-10-01

    ... determination and changes as a result of a DRG validation. 476.93 Section 476.93 Public Health CENTERS FOR... initial denial determination and changes as a result of a DRG validation. Before a QIO reaches an initial denial determination or makes a change as a result of a DRG validation, it must— (a) Promptly notify the...

  18. 42 CFR 476.85 - Conclusive effect of QIO initial denial determinations and changes as a result of DRG validations.

    Science.gov (United States)

    2010-10-01

    ... determinations and changes as a result of DRG validations. 476.85 Section 476.85 Public Health CENTERS FOR... denial determinations and changes as a result of DRG validations. A QIO initial denial determination or change as a result of DRG validation is final and binding unless, in accordance with the procedures in...

  19. 42 CFR 476.96 - Review period and reopening of initial denial determinations and changes as a result of DRG...

    Science.gov (United States)

    2010-10-01

    ... determinations and changes as a result of DRG validations. 476.96 Section 476.96 Public Health CENTERS FOR... initial denial determinations and changes as a result of DRG validations. (a) General timeframe. A QIO or... initial denial determination or a change as a result of a DRG validation. (b) Extended timeframes. (1) An...

  20. 24 CFR 960.204 - Denial of admission for criminal activity or drug abuse by household members.

    Science.gov (United States)

    2010-04-01

    ... activity or drug abuse by household members. 960.204 Section 960.204 Housing and Urban Development... HOUSING Admission § 960.204 Denial of admission for criminal activity or drug abuse by household members. (a) Required denial of admission—(1) Persons evicted for drug-related criminal activity. The PHA...

  1. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -of-service security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan......Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without putting any...

  2. System justification, the denial of global warming, and the possibility of "system-sanctioned change".

    Science.gov (United States)

    Feygina, Irina; Jost, John T; Goldsmith, Rachel E

    2010-03-01

    Despite extensive evidence of climate change and environmental destruction, polls continue to reveal widespread denial and resistance to helping the environment. It is posited here that these responses are linked to the motivational tendency to defend and justify the societal status quo in the face of the threat posed by environmental problems. The present research finds that system justification tendencies are associated with greater denial of environmental realities and less commitment to pro-environmental action. Moreover, the effects of political conservatism, national identification, and gender on denial of environmental problems are explained by variability in system justification tendencies. However, this research finds that it is possible to eliminate the negative effect of system justification on environmentalism by encouraging people to regard pro-environmental change as patriotic and consistent with protecting the status quo (i.e., as a case of "system-sanctioned change"). Theoretical and practical implications of these findings are discussed.

  3. Entropy Based Analysis of DNS Query Traffic in the Campus Network

    Directory of Open Access Journals (Sweden)

    Dennis Arturo Ludeña Romaña

    2008-10-01

    Full Text Available We carried out the entropy based study on the DNS query traffic from the campus network in a university through January 1st, 2006 to March 31st, 2007. The results are summarized, as follows: (1 The source IP addresses- and query keyword-based entropies change symmetrically in the DNS query traffic from the outside of the campus network when detecting the spam bot activity on the campus network. On the other hand (2, the source IP addresses- and query keywordbased entropies change similarly each other when detecting big DNS query traffic caused by prescanning or distributed denial of service (DDoS attack from the campus network. Therefore, we can detect the spam bot and/or DDoS attack bot by only watching DNS query access traffic.

  4. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    Directory of Open Access Journals (Sweden)

    Michele De Donno

    2018-01-01

    Full Text Available The Internet of Things (IoT revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.

  5. Input-to-State Stabilizing Control Under Denial-of-Service

    NARCIS (Netherlands)

    De Persis, Claudio; Tesi, Pietro

    2015-01-01

    The issue of cyber-security has become ever more prevalent in the analysis and design of networked systems. In this paper, we analyze networked control systems in the presence of denial-of-service (DoS) attacks, namely attacks that prevent transmissions over the network. We characterize frequency

  6. Transforming Pre-Service Teacher Education in Bolivia: From Indigenous Denial to Decolonisation?

    Science.gov (United States)

    Lopes Cardozo, Mieke T. A.

    2012-01-01

    In line with a broader Latin American turn to the left, since 2006 Bolivia's "politics of change" of president Evo Morales includes a new "decolonising" education reform called "Avelino Sinani Elizardo Perez" (ASEP). With the aim to break down deep historical processes of indigenous denial and exclusion in education,…

  7. 40 CFR 123.30 - Judicial review of approval or denial of permits.

    Science.gov (United States)

    2010-07-01

    ... permitting process. A State will meet this standard if State law allows an opportunity for judicial review... 40 Protection of Environment 21 2010-07-01 2010-07-01 false Judicial review of approval or denial... (CONTINUED) WATER PROGRAMS STATE PROGRAM REQUIREMENTS State Program Submissions § 123.30 Judicial review of...

  8. 77 FR 11190 - Yokohama Tire Company, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2012-02-24

    ..., endurance and low inflation pressure performance. The tires also meet all of the physical dimension...-0115; Notice 2] Yokohama Tire Company, Denial of Petition for Decision of Inconsequential Noncompliance...: Yokohama Tire Company (YTC),\\1\\ has determined that certain P215/60R15 93H AVID H4S passenger car...

  9. Conceptualizing Sex Offender Denial from a Multifaceted Framework: Investigating the Psychometric Qualities of a New Instrument

    Science.gov (United States)

    Jung, Sandy; Daniels, Melissa

    2012-01-01

    The authors examined the psychometric properties of a clinician-rated measure of sex offender denial. Convergent and discriminant validity for the measure was supported, and given its relationship to treatment attitudes, the measure demonstrated utility for assessing treatment change and readiness. (Contains 3 tables.)

  10. 76 FR 15985 - Hartech Corporation; Denial Without Prejudice of Food Additive Petition

    Science.gov (United States)

    2011-03-22

    ...] (Formerly Docket No. 91F-0111) Hartech Corporation; Denial Without Prejudice of Food Additive Petition...) is denying a food additive petition (FAP 1M4246) proposing that the food additive regulations be... of April 16, 1991 (56 FR 15373), FDA announced that a food additive petition (FAP 1M4246) had been...

  11. 76 FR 15986 - Alpha Omega Technology, Inc.; Denial Without Prejudice of Food Additive Petition

    Science.gov (United States)

    2011-03-22

    ...] (Formerly Docket No. 90F-0074) Alpha Omega Technology, Inc.; Denial Without Prejudice of Food Additive... Administration (FDA) is denying a food additive petition (FAP 0M4181) proposing that the food additive... 15, 1990 (55 FR 9772), FDA announced that a food additive petition (FAP 0M4181) had been filed by...

  12. A system for denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping

    Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS

  13. Denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Lu, Bao-Liang; Zhang, Liqing; Kwok, James

    2011-01-01

    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order

  14. 15 CFR 285.13 - Denial, suspension, revocation, or termination of accreditation.

    Science.gov (United States)

    2010-01-01

    ... advertising during the suspension period in the area(s) affected by the suspension. (2) NVLAP will not require... reasons for the proposed denial or revocation and the procedure for appealing such a decision. (1) The... appeal the decision to the Director of NIST. If the laboratory appeals the decision to the Director of...

  15. 7 CFR 54.1023 - Denial or withdrawal of appeal service.

    Science.gov (United States)

    2010-01-01

    ... MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) REGULATIONS AND STANDARDS UNDER THE AGRICULTURAL MARKETING ACT OF 1946 AND THE EGG PRODUCTS INSPECTION ACT..., Processing, and Packaging of Livestock and Poultry Products § 54.1023 Denial or withdrawal of appeal service...

  16. Transport of radioactive materials by air: a national approach to cope with denials and delays

    International Nuclear Information System (INIS)

    Perez Pijuan, Saul; Izquierdo Perez, Jorge; Rodriguez Martinez, Mercedes; Guillen Campos, Alba

    2008-01-01

    Full text: Around 300 nuclear medicine services in the Greater Caribbean depend, almost exclusively, on the airlines to receive radiopharmaceuticals. Less than 20 % of the regional airlines accept radioactive materials in addition to delays and denials, altogether, result in hardships to patients undergoing diagnosis and treatment, despite compliance with regulations. In the international framework leaded by the IAEA to alleviate the difficulties encountered, national approaches are needed to support this effort. The paper presents the Cuban experience regarding statistics of denials and delays by air, generic examples and classification of causes. The role of a Facilitation Working Group and actions taken in communication, awareness, harmonization of regulations, education and training are discussed. The results show a sensitive improvement in the reported instances of denials and delays at domestic level, strongly influenced by the corporative social responsibility of the main national airline and the actions underway. On the other hand, the increasing number of reported denials by international airlines in the last two years, demonstrate how much work must be done at regional and international level. (author)

  17. 24 CFR 982.552 - PHA denial or termination of assistance for family.

    Science.gov (United States)

    2010-04-01

    ... family has committed fraud, bribery, or any other corrupt or criminal act in connection with any Federal... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false PHA denial or termination of... terminate assistance for a participant under the programs because of the family's action or failure to act...

  18. 36 CFR 1270.42 - Denial of access to public; right to appeal.

    Science.gov (United States)

    2010-07-01

    ...; right to appeal. 1270.42 Section 1270.42 Parks, Forests, and Public Property NATIONAL ARCHIVES AND... Denial of access to public; right to appeal. (a) Any person denied access to a Presidential record... library director at the address cited in part 1253 of this chapter. (b) All appeals must be received by...

  19. 77 FR 11189 - Yokohama Tire Corporation, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2012-02-24

    ...-0056; Notice 2] Yokohama Tire Corporation, Denial of Petition for Decision of Inconsequential... Inconsequential Noncompliance. SUMMARY: Yokohama Tire Corporation, (YTC),\\1\\ replacement tires for passenger cars... Federal Motor Vehicle Safety Standard (FMVSS) No. 139, New Pneumatic Radial Tires for Light Vehicles. YTC...

  20. 9 CFR 352.6 - Denial or withdrawal of inspection service.

    Science.gov (United States)

    2010-01-01

    ... improper means; (4) has knowingly represented that any exotic animal carcass, or exotic animal product, has... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Denial or withdrawal of inspection service. 352.6 Section 352.6 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF...

  1. Deference, Denial, and Beyond: A Repertoire Approach to Mass Media and Schooling

    Science.gov (United States)

    Rymes, Betsy

    2011-01-01

    In this article, the author outlines two general research approaches, within the education world, to these mass-mediated formations: "Deference" and "Denial." Researchers who recognize the social practices that give local meaning to mass media formations and ways of speaking do not attempt to recontextualize youth media in their own social…

  2. 11 CFR 9405.8 - Appeals of denials of requests for records.

    Science.gov (United States)

    2010-01-01

    ... received by the Commission, may appeal the adverse determination or the failure to respond by requesting... occur. (b) The appeal request shall be in writing, shall clearly and prominently state on the envelope... not entertain any appeal from an alleged denial or failure to comply with an oral request. Any person...

  3. ‘Not My Child’: Parents’ Denial About Adolescent Sexuality in Harare, Zimbabwe

    Directory of Open Access Journals (Sweden)

    Manase Kudzai Chiweshe

    2018-03-01

    Full Text Available Objective: To find out adult views on adolescent sexualities in Zimbabwe and how adults construct sexual cultures that deny adolescence access to sex.Materials and methods: The paper uses qualitative methodologies, with purposively selected parents and key informants. A total of ten in depth interviews, four focus groups and six key informant interviews with purposively sampled male and female respondents were conducted. Key informants included a headmaster, teacher, social worker, nurses and a member of traditional healers association.Results: Parents that were interviewed denied that their adolescent children were sexually active. This denial of adolescent sexuality was seen throughout the interviews. The denial of adolescent sexuality was linked to the other themes that emerged including sexual surveillance and sexual communication, school pregnancy, STIs and sexual education, and adult anxiety on adolescent sex.Conclusion: The denial of youth sexuality has serious impacts on youths’ access to information and ability to protect themselves from sexually transmitted diseases and HIV. We argue that government policies and lack of comprehensive sex education in schools are based on this denial of adolescent sexuality and should be addressed.

  4. 77 FR 43216 - Denial of Motor Vehicle Defect Petition and Petition for a Hearing

    Science.gov (United States)

    2012-07-24

    ... hearing to address whether Ford Motor Company (Ford) and Mazda North American Operations (Mazda) met their... Denial of Motor Vehicle Defect Petition and Petition for a Hearing AGENCY: National Highway Traffic... petitioned NHTSA to open defect investigations on Model Year (MY) 2002-2004 Ford Escape and 2001-2004 Mazda...

  5. 16 CFR 1014.8 - Appeal of initial denial of access, correction or amendment.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Appeal of initial denial of access, correction or amendment. 1014.8 Section 1014.8 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION... Federal District Court for judicial review of the decision; and (3) The right of the requester to file...

  6. 40 CFR 89.126 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 89.126 Section 89.126 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Standards and Certification Provisions § 89.126 Denial, revocation of certificate of conformity. (a) If... issued certificate of conformity if the Administrator finds any one of the following infractions to be...

  7. 40 CFR 90.123 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 90.123 Section 90.123 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Emission Standards and Certification Provisions § 90.123 Denial, revocation of certificate of conformity... conformity if the Administrator finds any one of the following infractions to be substantial: (1) The engine...

  8. 40 CFR 91.123 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 91.123 Section 91.123 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Certification Provisions § 91.123 Denial, revocation of certificate of conformity. (a) If, after review of the... conformity if the Administrator finds any one of the following infractions to be substantial: (1) The engine...

  9. 2 CFR 801.1105 - Cause for a limited denial of participation.

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Cause for a limited denial of participation. 801.1105 Section 801.1105 Grants and Agreements Federal Agency Regulations for Grants and Agreements... (Department of Veterans Affairs Optional Subpart for OMB Guidance at 2 CFR Part 180). § 801.1105 Cause for a...

  10. 17 CFR 8.15 - Denial of charges and right to hearing.

    Science.gov (United States)

    2010-04-01

    ... EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Disciplinary Procedure § 8.15... a charge which is denied, or on a penalty set by the disciplinary committee under § 8.14(a)(2), he... denied and/or penalties set by the disciplinary committee under § 8.14(a)(2) for which a hearing has been...

  11. Fluctuating confidence: the dynamic consequences of true/false affirmatives and denials on how a listener appraises their personal past.

    Science.gov (United States)

    Davis, Jolee; Bayantemur, Sharon Y; Seecharan, Sasha; Unger, Leslie D; Hellgren, Johanna; Stone, Charles B

    2018-08-01

    The present study examined the mnemonic consequences of true/false denials and affirmatives on how a listener appraises their personal past. To this end, participants (listeners) rated the extent to which they were confident certain events occurred during their childhood. They rated these events both before and after a confederate (speaker) denied or affirmed the occurrence of four different childhood events each, for a total of eight "rehearsed" events. For each set (denials and affirmatives) of events, half were true and half were false. In turn, this created four types of events (two each): true denials, true affirmatives, false denials, and false affirmatives. Additionally, half of the participants were told that the speaker was provided independent information about the veracity of the event's occurrence ("expert" condition). Overall, listeners were less confident in the occurrence of false denial events, but more so when they believed the speaker to be more knowledgeable of the listeners memories, more confident in false affirmative events and, counter intuitively, more confident in the occurrence of true denial events. These results underscore the importance of a nuanced approach to the mnemonic consequences of true and false denials and affirmations in the course of social interactions.

  12. Using "Making Sense of Climate Science Denial" MOOC videos in a college course

    Science.gov (United States)

    Schuenemann, K. C.; Cook, J.

    2015-12-01

    The Massive Open Online Course (MOOC) "Denial101x: Making Sense of Climate Science Denial" teaches students to make sense of the science and respond to climate change denial. The course is made up of a series of short, myth-debunking lecture videos that can be strategically used in college courses. The videos and the visuals within have proven a great resource for an introductory college level climate change course. Methods for using the videos in both online and in-classroom courses will be presented, as well as student reactions and learning from the videos. The videos introduce and explain a climate science topic, then paraphrase a common climate change myth, explain why the myth is wrong by identifying the characteristic of climate denial used, and concludes by reinforcing the correct science. By focusing on common myths, the MOOC has made an archive of videos that can be used by anyone in need of a 5-minute response to debunk a myth. By also highlighting five characteristics of climate denial: fake experts, logical fallacies, impossible expectations, cherry picking, and conspiracy theories (FLICC), the videos also teach the viewer the skills they need to critically examine myths they may encounter in the real world on a variety of topics. The videos also include a series of expert scientist interviews that can be used to drive home points, as well as put some faces to the science. These videos are freely available outside of the MOOC and can be found under the relevant "Most used climate myths" section on the skepticalscience.com webpage, as well as directly on YouTube. Discover ideas for using videos in future courses, regardless of discipline.

  13. Avoidable Technical and Clinical Denial Write-Off Management in Hospitals, Physician Offices, and Clinics.

    Science.gov (United States)

    Terra, Sandra Marlene; Byrne, Amanda

    2016-01-01

    This article reviews the various types of technical and clinical denials that are usually "written off" and proposes strategies to prevent this loss. For purposes of this writing, avoidable technical and clinical denial write-offs are defined as revenue lost from "first-pass" denials rejections. For example, a procedure that requires an authorization is performed without having had an authorization obtained. After appeals and attempts to recoup the revenue, often unsuccessful, the organization ultimately "writes off" the revenue as not collectable. The question to ask is: Are these claims really not collectable or can actionable steps be taken to conserve these dollars and improve the bottom line? Acute care hospitals, physician offices, and clinics. In today's environment, the need to manage costs is ubiquitous. Cost management is on the priority list of all savvy health care executives, even if margins are healthy, revenue is under pressure, and the magnitude of cost reduction needed is greater than what past efforts have achieved. As hospitals and physician clinics prioritize areas for improvement, reduction in lost revenue-especially avoidable lost revenue-should be at the top of the list. Attentively managing claim denial write-offs will significantly reduce lost revenue. There is significant interface between case management and the revenue cycle. Developing core competencies for reducing clinical and technical denials should be a critical imperative in overall cost management strategy. Case managers are well placed to prevent these unnecessary losses through accurate status determination and clinical documentation review. These clinical professionals can also provide insight into work flow and other processes inherent in the preauthorization process.

  14. Interactive analysis of SDN-driven defence against Distributed Denial of Service attacks

    NARCIS (Netherlands)

    Koning, R.; de Graaff, B.; de Laat, C.; Meijer, R.; Grosso, P.

    2016-01-01

    The Secure Autonomous Response Networks (SARNET) framework introduces a mechanism to respond autonomously to security attacks in Software Defined Networks (SDN). Still the range of responses possible and their effectiveness need to be properly evaluated such that the decision making process and the

  15. Inferring Passenger Denial Behavior of Taxi Drivers from Large-Scale Taxi Traces.

    Directory of Open Access Journals (Sweden)

    Sihai Zhang

    Full Text Available How to understand individual human actions is a fundamental question to modern science, which drives and incurs many social, technological, racial, religious and economic phenomena. Human dynamics tries to reveal the temporal pattern and internal mechanism of human actions in letter or electronic communications, from the perspective of continuous interactions among friends or acquaintances. For interactions between stranger to stranger, taxi industry provide fruitful phenomina and evidence to investigate the action decisions. In fact, one striking disturbing events commonly reported in taxi industry is passenger refusing or denial, whose reasons vary, including skin color, blind passenger, being a foreigner or too close destination, religion reasons and anti specific nationality, so that complaints about taxi passenger refusing have to be concerned and processed carefully by local governments. But more universal factors for this phenomena are of great significance, which might be fulfilled by big data research to obtain novel insights in this question. In this paper, we demonstrate the big data analytics application in revealing novel insights from massive taxi trace data, which, for the first time, validates the passengers denial in taxi industry and estimates the denial ratio in Beijing city. We first quantify the income differentiation facts among taxi drivers. Then we find out that choosing the drop-off places also contributes to the high income for taxi drivers, compared to the previous explanation of mobility intelligence. Moreover, we propose the pick-up, drop-off and grid diversity concepts and related diversity analysis suggest that, high income taxi drivers will deny passengers in some situations, so as to choose the passengers' destination they prefer. Finally we design an estimation method for denial ratio and infer that high income taxi drivers will deny passengers with 8.52% likelihood in Beijing. Our work exhibits the power of big

  16. Procedural Anathema: The Criminal Prosecution of Money Laundering as a Denial of the Right of Defense

    Directory of Open Access Journals (Sweden)

    Antonio Eduardo Ramires Santoro

    2016-10-01

    Full Text Available The idea of independence between money laundering and the original offense, became common the practice of prosecutors use of the evidence submitted by the defense to support criminal proceedings for laundering. The question is: would it not be a denial of the right of defense, since it requires the magistrate to accept the the criminal prosecution to anticipate an evaluative judgment on the evidence before the systematically appropriate procedural time? Therefore we conducted a literature qualitative research.

  17. The making of a civic discourse on controversial historical past: from denial to parrhesia

    Directory of Open Access Journals (Sweden)

    Giovanna LEONE

    2017-07-01

    Full Text Available This contribution discusses the pragmatic effects of different rhetoric strategies conveying evidence of past ingroup violence after a long lasting social denial (Cohen, 2001. In particular, a case study is presented on the making of a civic discourse on controversial historical past: war crimes committed by the Italian Army during the colonial invasion of Ethiopia (1935-36. Although very well proved (Del Boca, 2005, these facts were only recently inserted in Italian history textbooks (Leone & Mastrovito, 2010; Cajani, 2013. In this same period, evidence of these crimes was officially presented during discussions of the Italian Parliament. In spite of these recent acknowledgments of the Italian responsibilities for these crimes, a social myth is still widely shared by the public opinion, representing Italians as good fellows (Italiani, brava gente: cfr. Del Boca, 2005, unable to be cruel both in everyday life and in wartimes (Volpato et al., 2012. This specific situation, denying even the reality of facts happened, has been defined literal social denial, i.e. the deepest among the three possible states of denial (literal, interpretive, implicative: cfr. Cohen, 2001. The issue of literal social denial of past ingroup violence is at the intersection among theories on narratives on national past (László, 2003, social representations of history (Liu et al., 2014, conflict ethos (Bar-Tal et al., 2012; Kelman, 2008, group-based emotions (Allpress et al., 2010; Leone, 2000 and intergroup reconciliation processes (Nadler et al., 2008. Namely, understanding how a social denial could break down implies the theorization of human mind’s reflexivity as grounded on historical awareness (Ortega y Gasset, 1930, and the notion of social change as primarily rooted in natality, i.e. the fact that each birth represents a new beginning (Arendt, 1958. Drawing on this theoretical background, we will present an ongoing research program (Leone, in press on the

  18. 40 CFR 164.21 - Contents of a denial of registration, notice of intent to cancel a registration, or notice of...

    Science.gov (United States)

    2010-07-01

    ..., notice of intent to cancel a registration, or notice of intent to change a classification. 164.21 Section... denial of registration, notice of intent to cancel a registration, or notice of intent to change a classification. (a) Contents. The denial of registration or a notice of intent to cancel a registration or to...

  19. 13 CFR 120.1824 - How will an SISMBD receive notice of an approval or denial of a loan or request for an advance...

    Science.gov (United States)

    2010-01-01

    ... advance under an SISMBD Loan? (a) Applicants will receive notice of approval or denial of an SISMBD Loan... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false How will an SISMBD receive notice of an approval or denial of a loan or request for an advance under an SISMBD Loan? 120.1824 Section...

  20. Alcohol and cancer: risk perception and risk denial beliefs among the French general population.

    Science.gov (United States)

    Bocquier, Aurélie; Fressard, Lisa; Verger, Pierre; Legleye, Stéphane; Peretti-Watel, Patrick

    2017-08-01

    Worldwide, millions of deaths each year are attributed to alcohol. We sought to examine French people's beliefs about the risks of alcohol, their correlates, and their associations with alcohol use. Data came from the 2010 Baromètre Cancer survey, a random cross-sectional telephone survey of the French general population (n = 3359 individuals aged 15-75 years). Using principal component analysis of seven beliefs about alcohol risks, we built two scores (one assessing risk denial based on self-confidence and the other risk relativization). Two multiple linear regressions explored these scores' socio-demographic and perceived information level correlates. Multiple logistic regressions tested the associations of these scores with daily drinking and with heavy episodic drinking (HED). About 60% of the respondents acknowledged that alcohol increases the risk of cancer, and 89% felt well-informed about the risks of alcohol. Beliefs that may promote risk denial were frequent (e.g. 72% agreed that soda and hamburgers are as bad as alcohol for your health). Both risk denial and risk relativization scores were higher among men, older respondents and those of low socioeconomic status. The probability of daily drinking increased with the risk relativization score and that of HED with both scores. Beliefs that can help people to deny the cancer risks due to alcohol use are common in France and may exist in many other countries where alcoholic beverages have been an integral part of the culture. These results can be used to redesign public information campaigns about the risks of alcohol. © The Author 2017. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  1. Model for the reduction of denials of expeditions of radioactive material in the region of the America

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Bruno, Natanael

    2013-01-01

    The denials, restraints and delays of shipments of radioactive material likely to have occurred and continue to occur. Reducing them to acceptable levels can be a tangible goal that senders and recipients can anticipate and get. The basis for resolving cases of denials and delays should consider not only the participation of the competent national nuclear authorities but also other government authorities. Carriers, shippers, transport companies and recipients should consider in their queries all the wide range of authorities apparently have no involvement but they really have. This paper describes the experience gained in the country of Brazil and provides the basis of a model that could prove useful to other countries and regions, including America, if we adopt and adapt, to reduce the incidence of denials and delays of shipments of radioactive material, according to its own conditions and characteristics

  2. Denial of illness in schizophrenia as a disturbance of self-reflection, self-perception and insight.

    Science.gov (United States)

    Bedford, Nicholas J; David, Anthony S

    2014-01-01

    A substantial proportion of schizophrenia patients deny aspects of their illness to others, which may indicate a deeper disturbance of 'insight' and a self-reflection deficit. The present study used a 'levels-of-processing' mnemonic paradigm to examine whether such patients engage in particularly brief and shallow self-reflection during mental illness-related self-evaluation. 26 schizophrenia patients with either an overall acceptance or denial of their illness and 25 healthy controls made timed decisions about the self-descriptiveness, other-person-descriptiveness and phonological properties of mental illness traits, negative traits and positive traits, before completing surprise tests of retrieval for these traits. The acceptance patients and denial patients were particularly slow in their mental illness-related self-evaluation, indicating that they both found this exercise particularly difficult. Both patient groups displayed intact recognition but particularly reduced recall for self-evaluated traits in general, possibly indicating poor organisational processing during self-reflection. Lower recall for self-evaluated mental illness traits significantly correlated with higher denial of illness and higher illness-severity. Whilst explicit and implicit measures of self-perception corresponded in the healthy controls (who displayed an intact positive>negative 'self-positivity bias') and acceptance patients (who displayed a reduced self-positivity bias), the denial patients' self-positivity bias was explicitly intact but implicitly reduced. Schizophrenia patients, regardless of their illness-attitudes, have a particular deficit in recalling new self-related information that worsens with increasing denial of illness. This deficit may contribute towards rigid self-perception and disturbed self-awareness and insight in patients with denial of illness. © 2013.

  3. Denials and delays of shipments in the transport of radioactive materials in Brazil

    International Nuclear Information System (INIS)

    Sobreira, Ana Celia F.; Bemelmans, Denise

    2007-01-01

    REM Industria e Comercio is a Brazilian private company which has been performing transport of radioactive material in Brazil for more than 15 years and is also experiencing this situation. In Brazil, over 50,000 shipments of radioactive materials are carried out every year, mostly for medical purposes. There are 4 airlines companies operating the domestic routes and only is currently accepting material of Class 7 (radioactive) for transport. When transporting by road, REM uses its own vehicles or hires associated cargo companies. For the sea transport, there is not a certified vessel for this kind of material in Brazil which increases the prices and makes the transport by this mode very expensive and more difficult. Reasons for denials have been identified as misinterpretation of the regulations, lack of harmonization between regulations, fear of indemnity costs for accidents, restrictive rules at ports not allowing storage of radioactive material in transit, frequent changes in modal regulations, lack of education and training of cargo handlers and the misconception of public perception concerning radiation risks. Seeking for local solutions, REM has organized meetings involving medical societies, competent authorities and carriers and has taken part on commissions for revising standards and regulations and trained cargo handling personnel as well. This paper addresses causes for delays and denials and reports identified domestic solutions. (author)

  4. Transplant recipients are vulnerable to coverage denial under Medicare Part D.

    Science.gov (United States)

    Potter, Lisa M; Maldonado, Angela Q; Lentine, Krista L; Schnitzler, Mark A; Zhang, Zidong; Hess, Gregory P; Garrity, Edward; Kasiske, Bertram L; Axelrod, David A

    2018-02-15

    Transplant immunosuppressants are often used off-label because of insufficient randomized prospective trial data to achieve organ-specific US Food and Drug Administration (FDA) approval. Transplant recipients who rely on Medicare Part D for immunosuppressant drug coverage are vulnerable to coverage denial for off-label prescriptions, unless use is supported by Centers for Medicare & Medicaid Services (CMS)-approved compendia. An integrated dataset including national transplant registry data and 3 years of dispensed pharmacy records was used to identify the prevalence of immunosuppression use that is both off-label and not supported by CMS-approved compendia. Numbers of potentially vulnerable transplant recipients were identified. Off-label and off-compendia immunosuppression regimens are frequently prescribed (3-year mean: lung 66.5%, intestine 34.2%, pancreas 33.4%, heart 21.8%, liver 16.5%, kidney 0%). The annual retail cost of these at-risk medications exceeds $30 million. This population-based study of transplant immunosuppressants vulnerable to claim denials under Medicare Part D coverage demonstrates a substantial gap between clinical practice, current FDA approval processes, and policy mandates for pharmaceutical coverage. This coverage barrier reduces access to life-saving medications for patients without alternative resources and may increase the risk of graft loss and death from medication nonadherence. © 2018 The American Society of Transplantation and the American Society of Transplant Surgeons.

  5. DDoS Attacks as Political Assemblages

    Directory of Open Access Journals (Sweden)

    Robbie Fordyce

    2013-10-01

    Full Text Available This article seeks to unpack the idea of the automaton as a figure of political dissent within technological networks. The idea of the automaton is that of a body where the concepts of life, agency, and subjectivity are in question; these questions have made the automaton into an important element in the projects of Enlightenment humanism and as an unspoken element in posthumanist examination of the cyborg. The figure of the automaton is an expression of Cartesian mind-body dualism that reverses the idea of cogito ergo sum, by questioning the intentionality that lies behind the acts of another body. The body exists, but does it think? This article is not concerned with the idea of the automaton as an object of transcendental dualism, but rather aims to investigate this idea in terms of its immanence within network communication. The automaton is an idea that deliberately complicates the relationship between machines and individuals within a network, without prioritising either perspective. As Alan Turing shows, we cannot predict whether a computer on a network (or other machine is being used by a human agent, or whether the machine is simply programmed to act autonomously. The issue is then, are the actions of political dissent of a single node on a computer network the product of an independent agent working in tandem within a democratic framework? Or, is it the reverse: are these acts of political dissidence the automated actions of a small number of individuals exploiting systems of automation in order to achieve political goals? If we use the automaton to stand in as a figure that is neither entirely human nor entirely cyborgean, then certain concerns of network politics and assumptions about the democratic nature of network communications become destabilised.

  6. Happiness: When Does It Lead to Self-Indulgence and When Does It Lead to Self-Denial?

    Science.gov (United States)

    Perry, Louise C.; And Others

    1985-01-01

    Confirmed the hypothesis that happiness leads to self-indulgence when children have no reason to believe that excessive self-gratification is morally wrong but that happiness promotes self-denial when children fear that excessive self-gratification violates a moral rule. Results with 112 White, middle-class, Australian children ages four to five…

  7. Third-person Diagnostic Interview on the Cognitive Insight Level of Psychotic Patients with an Insight at the Denial Level.

    Science.gov (United States)

    Mehdizadeh, Mahsa; Rezaei, Omid

    2016-01-01

    According to the previous findings, the third-person technique improved the clinical insight of psychotic patients, therefore the present study aims to examine the effect of a third-person interview compared to a first-person interview on the level of cognitive insight of psychotic patients with an insight at the denial level. In this study, using interviews and questionnaires, a total number of 44 patients of Razi Psychiatric Educational and Treatment Center with an insight at the denial level being assessed using diagnostic interviews were divided randomly into two groups. Then, the two groups of patients' cognitive insights were evaluated using Beck Cognitive Insight Scale. The findings indicated that in psychotic patients with an insight at the denial level, the third-person technique of interview compared to the first-person had little effect on the improvement of overall cognitive insight and its components, including self-reflection and self-assurance; however, this effect was not strong enough to make a significant difference between the two groups of patients. According to the study findings, we can conclude that the third-person interview compared to the first-person interview has no effect on the improvement of the cognitive insight of psychotic patients with an insight at the denial level. This finding is consistent with the previous studies indicating that although the theory of mind has some correlations with the clinical insight of patients, it has no effect on their cognitive insight.

  8. 42 CFR 476.94 - Notice of QIO initial denial determination and changes as a result of a DRG validation.

    Science.gov (United States)

    2010-10-01

    ... changes as a result of a DRG validation. 476.94 Section 476.94 Public Health CENTERS FOR MEDICARE... changes as a result of a DRG validation. (a) Notice of initial denial determination—(1) Parties to be... retrospective review, (excluding DRG validation and post procedure review), within 3 working days of the initial...

  9. 75 FR 31285 - Decision-Making Authority Regarding the Denial, Suspension, or Revocation of a Federal Firearms...

    Science.gov (United States)

    2010-06-03

    ... No. ATF 17F; AG Order No. 3160-2010 (2008R-10P)] Decision-Making Authority Regarding the Denial... decision-making and to address any case backlogs that may occur. DATES: This rule is effective August 2... Assistant Director (Enforcement Programs and Services). These changes to the decision-making and related...

  10. 24 CFR 982.553 - Denial of admission and termination of assistance for criminals and alcohol abusers.

    Science.gov (United States)

    2010-04-01

    ... ASSISTANCE: HOUSING CHOICE VOUCHER PROGRAM Family Obligations; Denial and Termination of Assistance § 982.553... responsibility on behalf of the PHA (including a PHA employee or a PHA contractor, subcontractor or agent). (B... supporting information from such sources as a probation officer, a landlord, neighbors, social service agency...

  11. My mother painted my father in white: affections and race denial in interracial families

    Directory of Open Access Journals (Sweden)

    Lia Vainer Schucman

    2017-12-01

    Full Text Available This article, a piece of a bigger research about interracial families, aims to describe the ways in which black, black history and black ancestry have been denied in the discourse of interracial families. For this understanding we present the case study of two families with the intention of thinking about the place of the race in these dynamics. The results obtained in the bigger research pointed out that family is a privilegedinstitution for the development of strategiesagainst racial violence expriencied in society on a larger scale, but also the place where it is possible to legitimate racist experiences and race violence. And, within these experiences, it was possible to realize that the psychosocial mechanism of denial is one of several ways of negotiating the conflicts and racial tensions that are enunciated within these families.

  12. Asbestos exposure and health hazards: a global emergency, Epidemiological evidence and denial theories

    Directory of Open Access Journals (Sweden)

    Francesca Zazzara

    2013-11-01

    Full Text Available On June 3rd 2013, in Turin, Italy, the Swiss industrialist Schmidheiny has been sentenced to 18 years imprisonment for intentional disaster for 3,000 asbestos-linked tumours in Italian workers at cement multinational Eternit. The indiscriminate use of asbestos, however, continues worldwide. Although many studies have shown that asbestos is associated with an increased risk of mortality and morbidity, denial theories were spread over time, showing how the logic of profit governs the production of asbestos. We examined the history of the epidemiological evidence of asbestos related risks and, second, the main sources of exposure in Italy and in the world, occupational, non-occupational, and post-disaster exposure (as occurred after L’Aquila earthquake in April 2009. The theme of inequality and social justice is ever so alarming in the fight against asbestos and its lobbies.

  13. Court finds ambiguity in denial of off-label AIDS drug.

    Science.gov (United States)

    1998-03-06

    A home intravenous drug therapy provider and an insurance company operated by the American Consulting Engineers Council have gone to court over disputed medical claims. An AIDS patient being treated with ganciclovir for CMV retinitis had a decrease in his white blood cell count, neutropenia, that endangered his life. The physicians prescribed neupogen, approved by the Food and Drug Administration (FDA) for cancer treatment, to counteract the neutropenia. The health care provider, I.V. Services of America, continued the neupogen treatment; the treatments were covered as an inpatient but denied after discharge. I.V. Services sued, alleging that the cause of the neutropenia should not bar coverage. The New York judge found in favor of the health care provider, calling the insurance company's position self serving and the denial of the claim arbitrary.

  14. The Impossible Trinity of Denial. European Economic Governance in a Conceptual Framework

    Directory of Open Access Journals (Sweden)

    István BENCZES

    2013-06-01

    Full Text Available The first ten years of the Economic and Monetary Union were a remarkable success story. Nevertheless, the European financial-cum-sovereign- debt-crisis made it clear that the original design of European economic governance is not feasible any longer. The crisis compelled Europeans to admit that the implicit consent of Maastricht on a triple denial with regard to the single currency area, i.e., (1 no exit, (2 no bail-out, and (3 no default, is no longer tenable. By introducing the concept of the ‘impossible trinity of denial’, the current paper argues that pursuing these three goals simultaneously is not attainable, and that one of these should be sacrificed in order for the single currency to survive the current crisis. Also, supranational institutions should enjoy more control over crisis resolution in the future.

  15. Is human society in denial regarding the tough questions about sustainability?

    Directory of Open Access Journals (Sweden)

    John Cairns, Jr.

    2004-07-01

    Full Text Available The news media report daily on unsustainable practices and events that impede progress toward sustainable use of the planet - production of greenhouse gases, biotic impoverishment, depletion of fossil waters (aquifers, human population growth, production of persistent toxic substances, loss of agricultural topsoil and land, rapid loss of old growth forests, and so on. Exponential economic growth both depletes natural capital more rapidly than it is regenerated and also gives an illusion of sustainable prosperity. Failure to act more expeditiously is almost certainly due to a number of factors; however, denial that a problem exists is, arguably, one of the most likely reasons. Just as an alcoholic or drug addict must first acknowledge that a problem exists before successful treatment is possible, so must those addicted to exponential growth on a finite planet.

  16. Distributed Sensing and Processing Adaptive Collaboration Environment (D-SPACE)

    Science.gov (United States)

    2014-07-01

    RISC 525 Brooks Road Rome NY 13441-4505 10. SPONSOR/MONITOR’S ACRONYM(S) AFRL/RI 11. SPONSOR/MONITOR’S REPORT NUMBER AFRL-RI-RS-TR-2014-195 12...cloud” technologies are not appropriate for situation understanding in areas of denial, where computation resources are limited, data not easily...graph matching process. D-SPACE distributes graph exploitation among a network of autonomous computational resources, designs the collaboration policy

  17. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Science.gov (United States)

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  18. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Directory of Open Access Journals (Sweden)

    Malik N Ahmed

    Full Text Available Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  19. From denial to awareness: a conceptual model for obtaining equity in healthcare.

    Science.gov (United States)

    Höglund, Anna T; Carlsson, Marianne; Holmström, Inger K; Lännerström, Linda; Kaminsky, Elenor

    2018-01-22

    Although Swedish legislation prescribes equity in healthcare, studies have reported inequalities, both in face-to-face encounters and in telephone nursing. Research has suggested that telephone nursing has the capability to increase equity in healthcare, as it is open to all and not limited by long distances. However, this requires an increased awareness of equity in healthcare among telephone nurses. The aim of this study was to explore and describe perceptions of equity in healthcare among Swedish telephone nurses who had participated in an educational intervention on equity in health, including which of the power constructs gender, ethnicity and age they commented upon most frequently. Further, the aim was to develop a conceptual model for obtaining equity in healthcare, based on the results of the empirical investigation. A qualitative method was used. Free text comments from questionnaires filled out by 133 telephone nurses before and after an educational intervention on equity in health, as well as individual interviews with five participants, were analyzed qualitatively. The number of comments related to inequity based on gender, ethnicity or age in the free text comments was counted descriptively. Gender was the factor commented upon the least and ethnicity the most. Four concepts were found through the qualitative analysis: Denial, Defense, Openness, and Awareness. Some informants denied inequity in healthcare in general, and in telephone nursing in particular. Others acknowledged it, but argued that they had workplace routines that protected against it. There were also examples of an openness to the fact that inequity existed and a willingness to learn and prevent it, as well as an already high awareness of inequity in healthcare. A conceptual model was developed in which the four concepts were divided into two qualitatively different blocks, with Denial and Defense on one side of a continuum and Openness and Awareness on the other. In order to reach

  20. Disturbing Information and Denial in the Classroom and Beyond: Climate Change, Emotions and Everyday Life

    Science.gov (United States)

    Norgaard, K. M.

    2015-12-01

    Global warming is the most significant environmental issue of our time, yet public response in Western nations has been meager. Why have so few taken any action? Most studies of public response to climate change have focused on information deficit approaches. Many in the general public and environmental community have presumed that the public's failure to engage is a function of lack of concern about climate change. Instead, using interviews and ethnographic research on how knowledge of climate change is experienced in everyday life I describe "the social organization of climate denial" and discuss how it impacts classroom learning and the broader social understanding of climate change. Disturbing emotions of guilt, helplessness and fear of the future arose when people were confronted with the idea of climate change. People then normalized these disturbing emotions by changing the subject of conversations, shifting their attention elsewhere, telling jokes, and drawing on stock social discourses that deflected responsibility to others. The difficulty people have in making sense of climate change is in direct relation to the social world around them. This research suggests that educational strategies in the classroom and for the general public that consider and target the social, cultural and political aspects of the meaning of climate change will be most effective (in addition to factors that affect individual cognition).

  1. Patient-reported denials, appeals, and complaints: associations with overall plan ratings.

    Science.gov (United States)

    Quigley, Denise D; Haviland, Amelia M; Dembosky, Jacob W; Klein, David J; Elliott, Marc N

    2018-03-01

    To assess whether Medicare patients' reports of denied care, appeals/complaints, and satisfactory resolution were associated with ratings of their health plan or care. Retrospective analysis of 2010 Medicare Advantage Consumer Assessment of Healthcare Providers and Systems (CAHPS) survey data. Multivariate linear regression of data from 154,766 respondents (61.1% response rate) tested the association of beneficiary ratings of plan and care with beneficiary reports of denied care, appeals, complaints, and complaint resolution, adjusting for beneficiary demographics. Beneficiaries who reported being denied needed care rated their plans and care significantly less positively, by 17.2 points (on a 100-point scale) and 9.1 points, respectively. Filing an appeal was not statistically significantly associated with further lower ratings. Beneficiaries who filed a complaint that was satisfactorily resolved gave slightly lower ratings of plans (-3.4 points) and care (-2.5 points) than those not filing a complaint (P plans. Our results suggest that beneficiaries may attribute the actions that lead to complaints or denials to plans more than to the care they received. Successful complaint resolution and utilization management review might eliminate most deficits associated with complaints and denied care, consistent with the service recovery paradox. High rates of complaints and denied care might identify areas that need improved utilization management review, customer service, and quality improvement. Among those reporting being denied care, filing an appeal was not associated with lower patient ratings of plan or care.

  2. Workplace Suicide and States of Denial: The France Telecom and Foxconn Cases Compared

    Directory of Open Access Journals (Sweden)

    Sarah Waters

    2017-03-01

    Full Text Available Workplace suicides are sharply on the rise and reflect a generalised deterioration in working conditions across the globalised economy. Despite their growing prevalence, workplace suicides are subject to specific modes of repression that tend to keep them hidden from public view. Suicides and their social recognition threaten the vested interests of corporate and political elites by giving material embodiment to relations of production in the form of extreme human suffering. This article focuses on 'suicide waves' at two distant corporations in the information and communications sector: in France, the telecoms provider, France Télécom (rebranded Orange in 2013 and in China, electronics supplier, Foxconn. Drawing on Stanley Cohen's notion of 'states of denial', the article examines the tactics used by corporate and political elites in an effort to keep the suicides concealed. These include discourses that denied the suicides, individualised their causes and repressive tactics intended to control information and impede investigations. Recognising workplace suicides and the forms of repression that seek to occlude them, is crucial if we are to confront the profound human costs of a new international division of digital labour on lived experiences of work.

  3. Use of Data Denial Experiments to Evaluate ESA Forecast Sensitivity Patterns

    Energy Technology Data Exchange (ETDEWEB)

    Zack, J; Natenberg, E J; Knowe, G V; Manobianco, J; Waight, K; Hanley, D; Kamath, C

    2011-09-13

    wind speed and vertical temperature difference. Ideally, the data assimilation scheme used in the experiments would have been based upon an ensemble Kalman filter (EnKF) that was similar to the ESA method used to diagnose the Mid-Colombia Basin sensitivity patterns in the previous studies. However, the use of an EnKF system at high resolution is impractical because of the very high computational cost. Thus, it was decided to use the three-dimensional variational analysis data assimilation that is less computationally intensive and more economically practical for generating operational forecasts. There are two tasks in the current project effort designed to validate the ESA observational system deployment approach in order to move closer to the overall goal: (1) Perform an Observing System Experiment (OSE) using a data denial approach which is the focus of this task and report; and (2) Conduct a set of Observing System Simulation Experiments (OSSE) for the Mid-Colombia basin region. The results of this task are presented in a separate report. The objective of the OSE task involves validating the ESA-MOOA results from the previous sensitivity studies for the Mid-Columbia Basin by testing the impact of existing meteorological tower measurements on the 0- to 6-hour ahead 80-m wind forecasts at the target locations. The testing of the ESA-MOOA method used a combination of data assimilation techniques and data denial experiments to accomplish the task objective.

  4. "Preaching To The Choir" And Empowering The Congregation: Using Facebook And Face Time To Counter Denial

    Science.gov (United States)

    Akuginow, E.; Haines-Stiles, G.; Alley, R. B.

    2012-12-01

    "Earth: The Operators' Manual" (ETOM) is an education and outreach initiative, supported by NSF, which uses stories, metaphors and innovative communications strategies to cut through misinformation about climate change and promote positive action. External evaluation provides both quantitative and qualitative evidence on the success of this approach. This presentation includes short videos illustrating the strategy, and images from live nationwide events and Facebook posts. ETOM includes three PBS specials, a series of on-site presentations by scientists and military officers, a website functioning as portal to its video components, and a lively and growing Facebook community where uninformed statements about climate are often rebutted by 3rd party contributors not formally affiliated with the project. At outreach events at science centers such as the Science Museum of Minnesota, geoscientist Richard Alley, host of the TV programs, presented to large audiences with ample opportunities for follow-up Q&A. Audience surveys reported that Alley offered "the most clear explanation of linking carbon dioxide to climate change" and noted that his physical performance (nodding his head to show his North Pole bald spot to illustrate precession) was memorable. "I'll have that vision in my mind forever." 91% said the information was new to them, and 96% said the performance encouraged them to discuss the issues with friends: "He gave us language that we can use to communicate to other people, and I think that's what we need more than more data." But surveys also requested still more arguments to counter denial. The producers added a set of rebuttals ("But my brother-in-law said…") to the next live performance, at a Science Pub in Portland OR, with positive responses. The live events relied on stories and metaphors that audiences found new and memorable. Emitting CO2 is rather like how we used to dump filthy human waste out our windows, before the sanitation revolution. "You

  5. An autonomic security monitor for distributed operating systems

    OpenAIRE

    Arenas, A.; Aziz, Benjamin; Maj, S.; Matthews, B.

    2011-01-01

    This paper presents an autonomic system for the monitoring of security-relevant information in a Grid-based operating system. The system implements rule-based policies using Java Drools. Policies are capable of controlling the system environment based on changes in levels of CPU/memory usage, accesses to system resources, detection of abnormal behaviour such as DDos attacks.

  6. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  7. On effectiveness of network sensor-based defense framework

    Science.gov (United States)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  8. 34 CFR Appendix A to Part 106 - Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color...

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color, National Origin, Sex, and Handicap in Vocational Education Programs A... RIGHTS, DEPARTMENT OF EDUCATION NONDISCRIMINATION ON THE BASIS OF SEX IN EDUCATION PROGRAMS OR ACTIVITIES...

  9. 34 CFR Appendix B to Part 104 - Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color...

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color, National Origin, Sex, and Handicap in Vocational Education Programs B Appendix B to Part 104 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL...

  10. 34 CFR Appendix B to Part 100 - Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color...

    Science.gov (United States)

    2010-07-01

    ... vocational education programs or courses because of architectural or equipment barriers, or because of the... 34 Education 1 2010-07-01 2010-07-01 false Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color, National Origin, Sex, and Handicap in Vocational Education Programs B...

  11. The Errors of Individualistic Public Health Interventions: Denial of Treatment to Obese Persons; Comment on “Denial of Treatment to Obese Patients—the Wrong Policy on Personal Responsibility for Health”

    Directory of Open Access Journals (Sweden)

    Daniel S. Goldberg

    2013-01-01

    Full Text Available I agree entirely with Nir Eyal’s perspective that denying treatment to obese patients is morally wrong. However, the reasons for this belief differ in some ways from Eyal’s analysis. In this commentary, I will try to explain the similarities and differences in our perspectives. My primary claim is that the denial of treatment to obese patients is wrong principally because (i it eschews a whole-population approach to the problem of poor nutrition and is therefore likely to be ineffective; (ii it is likely to expand obesity-related health inequities; and (iii it is likely to intensify stigma against already-marginalized social groups. I shall consider each in turn, and explore the extent to which Eyal would be likely to agree with my claims.

  12. When the circus comes to town: Countering campus presentations on climate denial

    Science.gov (United States)

    Corbin, J.

    2012-12-01

    been far better prepared for post-event publicity if we had anticipated that social media tools can effectively nationalize discussions that take place even at small colleges. Even with that knowledge, however, the balance of power in carrying on a debate in the public sphere seems strongly weighted toward the network of climate deniers. I co-authored an EOS Forum paper that described our experiences at Union College and at nearby Rensselaer Polytechnic Institute. The number of blog or Twitter references to EOS pales in comparison to those linking to a reply authored by Monckton and posted online. At this point, communication of climate science seems at a distinct disadvantage compared to communication of climate denial. This is not to say that we should yield the floor to those who attempt to discredit our research and contradict what we teach in our classes - doing so risks giving the impression that scientific literacy and public awareness of climate change are of little importance to us. Instead, when we engage climate science deniers, we make clear that we believe much is at stake.

  13. The need for a greater commitment to america region to prevent denials of shipments of radioactive materials

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Schwela, Ulric

    2013-01-01

    Radioactive sources are used worldwide in a wide range of applications in industry health care, industrial applications, manufacturing materials, exploration and technological development, as well as basic scientific research. The ability to use such radioactive material in these sectors depends on both its safe transport within a country and between different countries, for developed and developing countries can have access to this technology, in a timely manner and in conditions economically acceptable. In this paper the issue of denials and restraints of shipment of radioactive material and the need for greater commitment that Member States of the International Atomic Energy Agency (IAEA) must assume to facilitate the transport of radioactive materials for the benefit of society is analyzed

  14. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    Science.gov (United States)

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-08-17

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  15. Testing Situation Awareness Network for the Electrical Power Infrastructure

    Directory of Open Access Journals (Sweden)

    Rafał Leszczyna

    2016-09-01

    Full Text Available The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and communication Technologies (ICT in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent Threats (APT or Distributed-Denial-ofService (DDoS attacks. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. To counter evolved and highly sophisticated threats such as the APT or DDoS, state-of-the-art technologies including Security Incident and Event Management (SIEM systems, extended Intrusion Detection/Prevention Systems (IDS/IPS and Trusted Platform Modules (TPM are required. Developing and deploying extensive ICT infrastructure that supports wide situational awareness and allows precise command and control is also necessary. In this paper the results of testing the Situational Awareness Network (SAN designed for the energy sector are presented. The purpose of the tests was to validate the selection of SAN components and check their operational capability in a complex test environment. During the tests’ execution appropriate interaction between the components was verified.

  16. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

    Directory of Open Access Journals (Sweden)

    Roberto Alonso

    2016-08-01

    Full Text Available The Domain Name System (DNS is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS. The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  17. 78 FR 70551 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Science.gov (United States)

    2013-11-26

    ... denial-of-service (DDoS), and cybersecurity best practices. DATES: December 4, 2013. ADDRESSES: Federal... members have made business and travel plans in accordance with this schedule, and there is no date within...://transition.fcc.gov/Daily_Releases/Daily_Business/2013/db1120/DA-13-2225A1.pdf . Additional information...

  18. 77 FR 75636 - Baldev Raj Bhutani; Denial of Hearing on Application for Special Termination of Debarment

    Science.gov (United States)

    2012-12-21

    ... information and analyses sufficient to create a basis for a hearing concerning this action. DATES: This order... his company's manufacture and distribution of the drug products LACTULOSE Syrup and K + 10. According...

  19. The role of revenge, denial, and terrorism distress in restoring just world beliefs: the impact of the 2008 Mumbai attacks on British and Indian students.

    Science.gov (United States)

    Ferguson, Neil; Kamble, Shanmukh V

    2012-01-01

    Just world beliefs for students (N = 413) from India and the United Kingdom were measured. The participants then read a scenario about the 2008 terrorist attacks on Mumbai. The participants were then assessed for terrorism distress and offered multiple strategies (revenge and denial) to restore their just world beliefs. The findings indicate that students resident in India along with those who hold strong just world beliefs felt more distress, held a greater desire for revenge, and demonstrated more denial than the British students and those who had weak beliefs in a just world. These results indicate the important role just world beliefs play in responding to the threat created by mass casualty terrorist attacks. The implications for just world theory are also discussed.

  20. Silence speaks volumes: the effectiveness of reticence in comparison to apology and denial for responding to integrity- and competence-based trust violations.

    Science.gov (United States)

    Ferrin, Donald L; Kim, Peter H; Cooper, Cecily D; Dirks, Kurt T

    2007-07-01

    Prior research on responses to trust violations has focused primarily on the effects of apology and denial. The authors extended this research by studying another type of verbal response that is often used to respond to trust violations but has not been considered in the trust literature: reticence. An accused party may use reticence in a sincere and even legitimate attempt to persuade a trustor to withhold judgment. Yet, by considering information diagnosticity and belief formation mechanisms through which verbal responses influence trust, the authors argue that reticence is a suboptimal response because it combines the least effective elements of apology and denial. Specifically, reticence is a suboptimal response to an integrity violation because, like apology, it fails to address guilt. And reticence is a suboptimal response to a competence violation because, like denial, it fails to signal redemption. Results from 2 laboratory studies, simulating different contexts and using research participants from 2 different countries, provide support for the prediction. The results offer important implications for those who might use reticence to respond to a perceived trust violation and also for those who must judge another's reticence.

  1. Personal Denial Of Service (PDOS Attacks: A Discussion and Exploration of a New Category of Cyber Crime

    Directory of Open Access Journals (Sweden)

    Michael Raymond Bartolacci

    2014-03-01

    Full Text Available The growth of the Internet has created a corresponding growth in Internet-based crimes and online misbehavior, particularly among younger computer-savvy people who learned the technical skills necessary for such activities throughout their entire lives. We define a new category of cyber crime called a Personal Denial of Service attack (PDOS. A PDOS is a cyber crime in which an individual deliberately prevents the access of an individual or small group to online services such as email or banking. Due to the nature of a PDOS, these acts can be overlooked by law enforcement and organizations that operate Internet infrastructure such as universities. We analyze a PDOS attack in the context of the Routine Activities Theory of criminal justice. We also surveyed university students to ascertain their attitudes towards online account breaches as related to a PDOS attack.  Our motivation for this work is twofold: to stress the need for cyber ethics education at the university level, and to illustrate how a previously uncategorized type of cyber crime is easily perpetrated in such an environment.

  2. Model for the reduction of denials of expeditions of radioactive material in the region of the America; Modelo para reducir los casos de rechazos de expediciones de material radiactivo en la region de America

    Energy Technology Data Exchange (ETDEWEB)

    Mallaupoma, Mario, E-mail: mmallaupoma@ipen.gob.pe, E-mail: mmallaupomag@yahoo.es [Instituto Peruano de Energia Nuclear (IPEN), Lima (Peru); Bruno, Natanael, E-mail: nbruno@cnen.gov.br [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil)

    2013-07-01

    The denials, restraints and delays of shipments of radioactive material likely to have occurred and continue to occur. Reducing them to acceptable levels can be a tangible goal that senders and recipients can anticipate and get. The basis for resolving cases of denials and delays should consider not only the participation of the competent national nuclear authorities but also other government authorities. Carriers, shippers, transport companies and recipients should consider in their queries all the wide range of authorities apparently have no involvement but they really have. This paper describes the experience gained in the country of Brazil and provides the basis of a model that could prove useful to other countries and regions, including America, if we adopt and adapt, to reduce the incidence of denials and delays of shipments of radioactive material, according to its own conditions and characteristics.

  3. Research on a Denial of Service (DoS Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment

    Directory of Open Access Journals (Sweden)

    Seoksoo Kim

    2010-11-01

    Full Text Available This research suggests a Denial of Service (DoS detection method based on the collection of interdependent behavior data in a sensor network environment. In order to collect the interdependent behavior data, we use a base station to analyze traffic and behaviors among nodes and introduce methods of detecting changes in the environment with precursor symptoms. The study presents a DoS Detection System based on Global Interdependent Behaviors and shows the result of detecting a sensor carrying out DoS attacks through the test-bed.

  4. Exorcising the demons of collectivism in art history’: Branko Mitrović, Rage and Denials. Collectivist Philosophy, Politics, and Art Historiography, 1890-1947, University Park, Pennsylvania University Press 2015

    Directory of Open Access Journals (Sweden)

    Ladislav Kesner

    2016-12-01

    Full Text Available Branko Mitrović´s Rage and Denials. Collectivist Philosophy, Politics, and Art Historiography, 1890-1947 traces the history of collectivist approaches in (art historiography and debates between the individualist and collectivist positions, with the dominant focus on German-speaking scholarship. Author further suggests that denials and false appropriations and other forms of bizzare and irrational claims inherent in many of these collectivist historiographies originated in the failures of self-esteem regulation of their authors. The review then critically examines some problematic claims and assumptions which constitute the theoretical and conceptual backbone of the historical survey.

  5. Detecting A Botnet By Reverse Engineering

    Directory of Open Access Journals (Sweden)

    Oesman Hendra Kelana

    2013-06-01

    Full Text Available Abstract— Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS and other activities that are generally profitable to the owner of the bot (botmaster or those who use botnet services. The problem is that many computers have been controlled by botnets without the knowledge of the computer owner.  There are many ways to examine botnets, for example by studying the traffic from the botnet network, studying how botnets communicate to each, studying how each robot receives orders to do something, and so forth. Of the many methods, the most frequently and commonly used is the reverse engineering, where researchers study how a botnet works by botnet debugging. In this study the author tries to understand or research botnets by taking a type of botnet, namely Agobot, using reverse engineering.  One of the result of the research is that malware program files in general and in particular botnet has a technique to obscure the way that research using reverse engineering. Another result also shows that the botnet Agobot runs on computers by using the Windows service, and by changing the Windows registry so that every time the computer starts, Agobot always actively works in the computer memory. Keywords— Malware, Bot, Botnet, Botmaster, Agobot, Spam, Distributed Denial of Services, Identity Theft, Computer Security, Reverse Engineering, Debug, Windows Service, the Registry.

  6. State-Sponsored Homophobia and the Denial of the Right of Assembly in Central and Eastern Europe : The "Boomerang" and the "Ricochet" between European Organizations and Civil Society to Uphold Human Rights

    NARCIS (Netherlands)

    Holzhacker, Ronald

    2013-01-01

    State-sponsored homophobia emerged in certain Central and Eastern European states in the past decade, with the denial of the right of assembly for gay pride marches. However, more recently there has been progress in the recognition of the fundamental democratic right of assembly. What accounts for

  7. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  8. Distributional Inference

    NARCIS (Netherlands)

    Kroese, A.H.; van der Meulen, E.A.; Poortema, Klaas; Schaafsma, W.

    1995-01-01

    The making of statistical inferences in distributional form is conceptionally complicated because the epistemic 'probabilities' assigned are mixtures of fact and fiction. In this respect they are essentially different from 'physical' or 'frequency-theoretic' probabilities. The distributional form is

  9. Detailed Debunking of Denial

    Science.gov (United States)

    Enting, I. G.; Abraham, J. P.

    2012-12-01

    The disinformation campaign against climate science has been compared to a guerilla war whose tactics undermine the traditional checks and balances of science. One comprehensive approach has to been produce archives of generic responses such as the websites of RealClimate and SkepticalScience. We review our experiences with an alternative approach of detailed responses to a small number of high profile cases. Our particular examples were Professor Ian Plimer and Christopher Monckton, the Third Viscount Monckton of Brenchley, each of whom has been taken seriously by political leaders in our respective countries. We relate our experiences to comparable examples such as John Mashey's analysis of the Wegman report and the formal complaints about Lomborg's "Skeptical Environmentalist" and Durkin's "Great Global Warming Swindle". Our two approaches used contrasting approaches: an on-line video of a lecture vs an evolving compendium of misrepresentations. Additionally our approaches differed in the emphasis. The analysis of Monckton concentrated on the misrepresentation of the science, while the analysis of Plimer concentrated on departures from accepted scientific practice: fabrication of data, misrepresentation of cited sources and unattributed use of the work of others. Benefits of an evolving compendium were the ability to incorporate contributions from members of the public who had identified additional errors and the scope for addressing new aspects as they came to public attention. `Detailed debunking' gives non-specialists a reference point for distinguishing non-science when engaging in public debate.

  10. Thinking About Denial

    Science.gov (United States)

    2017-01-01

    Abstract This essay considers the frequent and varied uses of ‘denial’ in modern political discourse, suggests the specific psychoanalytic meanings the term has acquired and asks how useful this Freudian concept may be for historians. It notes the debates among historians over the uses of psychoanalysis, but argues that concepts such as ‘denial’, ‘disavowal’, ‘splitting’ and ‘negation’ can help us to understand both individual and group behaviour. The authors dwell, especially, on ‘disavowal’ and argue it can provide a particularly useful basis for exploring how and why states of knowing and not knowing co-exist. Historical examples are utilized to explore these states of mind: most briefly, a fragment from a report about the war criminals, produced by an American psychiatrist at the Nuremberg Trial; at greater length, the political arguments and historical writings of an eighteenth-century slave-owner; and finally, a case in a borough of London in the late-twentieth-century, where the neglect, abuse and murder of a child was shockingly ‘missed’ by a succession of social agencies and individuals, who had evidence of the violence available to them.

  11. Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim

    Directory of Open Access Journals (Sweden)

    Hae-Duck J. Jeong

    2017-12-01

    Full Text Available Internet utilisation has steadily increased, predominantly due to the rapid recent development of information and communication networks and the widespread distribution of smartphones. As a result of this increase in Internet consumption, various types of services, including web services, social networking services (SNS, Internet banking, and remote processing systems have been created. These services have significantly enhanced global quality of life. However, as a negative side-effect of this rapid development, serious information security problems have also surfaced, which has led to serious to Internet privacy invasions and network attacks. In an attempt to contribute to the process of addressing these problems, this paper proposes a process to detect anomalous traffic using self-similarity analysis in the Anomaly Teletraffic detection Measurement analysis Simulator (ATMSim environment as a research method. Simulations were performed to measure normal and anomalous traffic. First, normal traffic for each attack, including the Address Resolution Protocol (ARP and distributed denial-of-service (DDoS was measured for 48 h over 10 iterations. Hadoop was used to facilitate processing of the large amount of collected data, after which MapReduce was utilised after storing the data in the Hadoop Distributed File System (HDFS. A new platform on Hadoop, the detection system ATMSim, was used to identify anomalous traffic after which a comparative analysis of the normal and anomalous traffic was performed through a self-similarity analysis. There were four categories of collected traffic that were divided according to the attack methods used: normal local area network (LAN traffic, DDoS attack, and ARP spoofing, as well as DDoS and ARP attack. ATMSim, the anomaly traffic detection system, was used to determine if real attacks could be identified effectively. To achieve this, the ATMSim was used in simulations for each scenario to test its ability to

  12. Positive tertiary appraisals and posttraumatic stress disorder in U.S. male veterans of the war in Vietnam: the roles of positive affirmation, positive reformulation, and defensive denial.

    Science.gov (United States)

    Dohrenwend, Bruce P; Neria, Yuval; Turner, J Blake; Turse, Nicholas; Marshall, Randall; Lewis-Fernandez, Roberto; Koenen, Karestan C

    2004-06-01

    A 70.9% majority of the U.S. male veterans in a nationwide sample appraised the impact of their service in Vietnam on their present lives as mainly positive. A substantial minority, 41.7%, judged the effects to be highly salient. With controls on level of exposure to war-zone stressors measured with data from military records, the valence and salience of these appraisals are investigated in relation to posttraumatic stress disorder (PTSD) and other indicators of wartime and postwar functioning. The results are consistent with the hypothesis that mainly positive tertiary appraisals are affirmations of successful wartime and postwar adaptation rather than defensive denials related to maladaptive outcomes. The possibility that mainly positive tertiary appraisals also contribute to successful postwar adaptation is discussed. (c) 2004 APA, all rights reserved

  13. The exclusion of the body in Sein und Zeit and the denial of a phenomenology of the body in Heidegger’s thought

    Directory of Open Access Journals (Sweden)

    Felipe Johnson

    2016-05-01

    Full Text Available Through a reflection on the lack of a detailed thematization of the human body in Sein und Zeit and, considering the denial of a «phenomenology of the body» in Zollikoner Seminare, this paper aims to develop the methodical advice behind Heidegger’s treatment of human corporality. In this context, we will emphasize the incompatibility between the kind of being of Dasein and the kind of being that make up the traditional interpretation of the body: the body as a thing. Based on the foregoing, this study will discuss on the necessity to concentrate the attention on the ontological belonging of the body to the being of human being by the attempt to deploy an existential consideration of human corporality.

  14. The Unsinkable Aircraft Carrier: An American Response to the Chinese Anti-Access/Area Denial (A2/AD) Challenge

    Science.gov (United States)

    2013-04-01

    Graduation Requirements Advisor: Dr. Jeffrey M. Reilly Maxwell Air Force Base, Alabama April 2013 DISTRIBUTION A. Approved for public release... Distribution unlimited Maj. John O. Birkeland CDOS Research Paper CDOS Seminar 1 ii Disclaimer The views expressed on this...Battalion-71 st Artillery to Taiwan with the new Nike -Hercules missile batteries. 121 The idea of an active defense against missiles has been

  15. Poisson distribution

    NARCIS (Netherlands)

    Hallin, M.; Piegorsch, W.; El Shaarawi, A.

    2012-01-01

    The random variable X taking values 0,1,2,…,x,… with probabilities pλ(x) = e−λλx/x!, where λ∈R0+ is called a Poisson variable, and its distribution a Poisson distribution, with parameter λ. The Poisson distribution with parameter λ can be obtained as the limit, as n → ∞ and p → 0 in such a way that

  16. Distributed Visualization

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed Visualization allows anyone, anywhere, to see any simulation, at any time. Development focuses on algorithms, software, data formats, data systems and...

  17. Dyadic distributions

    International Nuclear Information System (INIS)

    Golubov, B I

    2007-01-01

    On the basis of the concept of pointwise dyadic derivative dyadic distributions are introduced as continuous linear functionals on the linear space D d (R + ) of infinitely differentiable functions compactly supported by the positive half-axis R + together with all dyadic derivatives. The completeness of the space D' d (R + ) of dyadic distributions is established. It is shown that a locally integrable function on R + generates a dyadic distribution. In addition, the space S d (R + ) of infinitely dyadically differentiable functions on R + rapidly decreasing in the neighbourhood of +∞ is defined. The space S' d (R + ) of dyadic distributions of slow growth is introduced as the space of continuous linear functionals on S d (R + ). The completeness of the space S' d (R + ) is established; it is proved that each integrable function on R + with polynomial growth at +∞ generates a dyadic distribution of slow growth. Bibliography: 25 titles.

  18. The Unsinkable Aircraft Carrier - An American Response to the Chinese Anti-Access/Area Denial (A2/AD) Challenge

    Science.gov (United States)

    2013-04-01

    DISTRIBUTION /AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16...new Nike -Hercules missile batteries. 121 The idea of an active defense against missiles has been disregarded by some because the necessary... Nike -Hercules) Defends Northern Taiwan 1958-1959.” http://www.2-71adataiwan.com/Member%20Articles/RHM%20Deployment%20Article.htm 122 Martin

  19. Spatial distribution

    DEFF Research Database (Denmark)

    Borregaard, Michael Krabbe; Hendrichsen, Ditte Katrine; Nachman, Gøsta Støger

    2008-01-01

    , depending on the nature of intraspecific interactions between them: while the individuals of some species repel each other and partition the available area, others form groups of varying size, determined by the fitness of each group member. The spatial distribution pattern of individuals again strongly......Living organisms are distributed over the entire surface of the planet. The distribution of the individuals of each species is not random; on the contrary, they are strongly dependent on the biology and ecology of the species, and vary over different spatial scale. The structure of whole...... populations reflects the location and fragmentation pattern of the habitat types preferred by the species, and the complex dynamics of migration, colonization, and population growth taking place over the landscape. Within these, individuals are distributed among each other in regular or clumped patterns...

  20. Distribution automation

    International Nuclear Information System (INIS)

    Gruenemeyer, D.

    1991-01-01

    This paper reports on a Distribution Automation (DA) System enhances the efficiency and productivity of a utility. It also provides intangible benefits such as improved public image and market advantages. A utility should evaluate the benefits and costs of such a system before committing funds. The expenditure for distribution automation is economical when justified by the deferral of a capacity increase, a decrease in peak power demand, or a reduction in O and M requirements

  1. Distributed creativity

    DEFF Research Database (Denmark)

    Glaveanu, Vlad Petre

    This book challenges the standard view that creativity comes only from within an individual by arguing that creativity also exists ‘outside’ of the mind or more precisely, that the human mind extends through the means of action into the world. The notion of ‘distributed creativity’ is not commonly...... used within the literature and yet it has the potential to revolutionise the way we think about creativity, from how we define and measure it to what we can practically do to foster and develop creativity. Drawing on cultural psychology, ecological psychology and advances in cognitive science......, this book offers a basic framework for the study of distributed creativity that considers three main dimensions of creative work: sociality, materiality and temporality. Starting from the premise that creativity is distributed between people, between people and objects and across time, the book reviews...

  2. Distributed systems

    CERN Document Server

    Van Steen, Maarten

    2017-01-01

    For this third edition of "Distributed Systems," the material has been thoroughly revised and extended, integrating principles and paradigms into nine chapters: 1. Introduction 2. Architectures 3. Processes 4. Communication 5. Naming 6. Coordination 7. Replication 8. Fault tolerance 9. Security A separation has been made between basic material and more specific subjects. The latter have been organized into boxed sections, which may be skipped on first reading. To assist in understanding the more algorithmic parts, example programs in Python have been included. The examples in the book leave out many details for readability, but the complete code is available through the book's Website, hosted at www.distributed-systems.net.

  3. Sex, violence and HIV on the inside: cultures of violence, denial, gender inequality and homophobia negatively influence the health outcomes of those in closed settings.

    Science.gov (United States)

    Kelly-Hanku, Angela; Kawage, Thomas; Vallely, Andrew; Mek, Agnes; Mathers, Bradley

    2015-01-01

    To map the context of HIV in closed settings in Papua New Guinea (PNG), semi-structured interviews were undertaken with 56 prisoners and detainees and 60 key stakeholders. The nature of HIV-related risk differs for detained women and men, and reflects important gender-based issues present in PNG society more broadly. Women in detention are vulnerable to sexual violence and exploitation and at greatest risk of HIV while detained in police holding cells, where they are typically supervised by male officers, in contrast to prisons, where they have little contact with male staff. HIV risk for men in prison is associated with consensual and non-consensual sex; this risk is perpetuated by a pervasive culture of denial and institutionalised homophobia. The illegal nature of sodomy and male-to-male sex provides Correctional Services the legal grounds by which to refuse access to condoms for prisoners. Addressing HIV risk among detained men and women in PNG requires the reform of legislation, police and prison practices and an understanding of broader structural problems of gender-based violence and stigma and discrimination.

  4. Denial of pain medication by health care providers predicts in-hospital illicit drug use among individuals who use illicit drugs.

    Science.gov (United States)

    Ti, Lianping; Voon, Pauline; Dobrer, Sabina; Montaner, Julio; Wood, Evan; Kerr, Thomas

    2015-01-01

    Undertreated pain is common among people who use illicit drugs (PWUD), and can often reflect the reluctance of health care providers to provide pain medication to individuals with substance use disorders. To investigate the relationship between having ever been denied pain medication by a health care provider and having ever reported using illicit drugs in hospital. Data were derived from participants enrolled in two Canadian prospective cohort studies between December 2012 and May 2013. Using bivariable and multivariable logistic regression analyses, the relationship between having ever been denied pain medication by a health care provider and having ever reported using illicit drugs in hospital was examined. Among 1053 PWUD who had experienced ≥ 1 hospitalization, 452 (44%) reported having ever used illicit drugs while in hospital and 491(48%) reported having ever been denied pain medication. In a multivariable model adjusted for confounders, having been denied pain medication was positively associated with having used illicit drugs in hospital (adjusted OR 1.46 [95% CI 1.14 to 1.88]). The results of the present study suggest that the denial of pain medication is associated with the use of illicit drugs while hospitalized. These findings raise questions about how to appropriately manage addiction and pain among PWUD and indicate the potential role that harm reduction programs may play in hospital settings.

  5. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  6. Distributed propulsion.

    OpenAIRE

    Lindström, Robin; Rosvall, Tobias

    2013-01-01

    En prestandaanalys utfördes på en SAAB 2000 som referensobjekt. Olika metoder för att driva flygplan på ett miljövänligare sätt utvärderades tillsammans med distributed propulsion. Efter undersökningar valdes elmotorer tillsammans med Zink-luft batterier för att driva SAAB 2000 med distributed propulsion. En prestandaanalys utfördes på detta plan på samma sätt som för den ursprungliga SAAB 2000. Resultaten jämfördes och slutsatsen blev att räckvidden var för kort för att konfigurationen skull...

  7. Quasihomogeneous distributions

    CERN Document Server

    von Grudzinski, O

    1991-01-01

    This is a systematic exposition of the basics of the theory of quasihomogeneous (in particular, homogeneous) functions and distributions (generalized functions). A major theme is the method of taking quasihomogeneous averages. It serves as the central tool for the study of the solvability of quasihomogeneous multiplication equations and of quasihomogeneous partial differential equations with constant coefficients. Necessary and sufficient conditions for solvability are given. Several examples are treated in detail, among them the heat and the Schrödinger equation. The final chapter is devoted to quasihomogeneous wave front sets and their application to the description of singularities of quasihomogeneous distributions, in particular to quasihomogeneous fundamental solutions of the heat and of the Schrödinger equation.

  8. Distributed SLAM

    Science.gov (United States)

    Binns, Lewis A.; Valachis, Dimitris; Anderson, Sean; Gough, David W.; Nicholson, David; Greenway, Phil

    2002-07-01

    Previously, we have developed techniques for Simultaneous Localization and Map Building based on the augmented state Kalman filter. Here we report the results of experiments conducted over multiple vehicles each equipped with a laser range finder for sensing the external environment, and a laser tracking system to provide highly accurate ground truth. The goal is simultaneously to build a map of an unknown environment and to use that map to navigate a vehicle that otherwise would have no way of knowing its location, and to distribute this process over several vehicles. We have constructed an on-line, distributed implementation to demonstrate the principle. In this paper we describe the system architecture, the nature of the experimental set up, and the results obtained. These are compared with the estimated ground truth. We show that distributed SLAM has a clear advantage in the sense that it offers a potential super-linear speed-up over single vehicle SLAM. In particular, we explore the time taken to achieve a given quality of map, and consider the repeatability and accuracy of the method. Finally, we discuss some practical implementation issues.

  9. Distributional Replication

    OpenAIRE

    Beare, Brendan K.

    2009-01-01

    Suppose that X and Y are random variables. We define a replicating function to be a function f such that f(X) and Y have the same distribution. In general, the set of replicating functions for a given pair of random variables may be infinite. Suppose we have some objective function, or cost function, defined over the set of replicating functions, and we seek to estimate the replicating function with the lowest cost. We develop an approach to estimating the cheapest replicating function that i...

  10. Mail distribution

    CERN Multimedia

    2007-01-01

    Please note that starting from 1 March 2007, the mail distribution and collection times will be modified for the following buildings: 6, 8, 9, 10, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 29, 69, 40, 70, 101, 102, 109, 118, 152, 153, 154, 155, 166, 167, 169, 171, 174, 261, 354, 358, 576, 579 and 580. Complementary Information on the new times will be posted on the entry doors and left in the mail boxes of each building. TS/FM Group

  11. Distribution switchgear

    CERN Document Server

    Stewart, Stan

    2004-01-01

    Switchgear plays a fundamental role within the power supply industry. It is required to isolate faulty equipment, divide large networks into sections for repair purposes, reconfigure networks in order to restore power supplies and control other equipment.This book begins with the general principles of the Switchgear function and leads on to discuss topics such as interruption techniques, fault level calculations, switching transients and electrical insulation; making this an invaluable reference source. Solutions to practical problems associated with Distribution Switchgear are also included.

  12. Risk Denial and Socio-Economic Factors Related to High HIV Transmission in a Fishing Community in Rakai, Uganda: A Qualitative Study.

    Directory of Open Access Journals (Sweden)

    Muhamadi Lubega

    Full Text Available In Kasensero fishing community, home of the first recorded case of HIV in Uganda, HIV transmission is still very high with an incidence of 4.3 and 3.1 per 100 person-years in women and men, respectively, and an HIV prevalence of 44%, reaching up to 74% among female sex workers. We explored drivers for the high HIV transmission at Kasensero from the perspective of fishermen and other community members to inform future policy and preventive interventions.20 in-depth interviews including both HIV positive and HIV negative respondents, and 12 focus-group discussions involving a total of 92 respondents from the Kasensero fishing community were conducted during April-September 2014. Content analysis was performed to identify recurrent themes.The socio-economic risk factors for high HIV transmission in Kasensero fishing community cited were multiple and cross-cutting and categorized into the following themes: power of money, risk denial, environmental triggers and a predisposing lifestyle and alcoholism and drug abuse. Others were: peer pressure, poor housing and the search for financial support for both the men and women which made them vulnerable to HIV exposure and or risk behavior.There is a need for context specific combination prevention interventions in Kasensero that includes the fisher folk and other influential community leaders. Such groups could be empowered with the knowledge and social mobilization skills to fight the negative and risky behaviors, perceptions, beliefs, misconceptions and submission attitudes to fate that exposes the community to high HIV transmission. There is also need for government/partners to ensure effective policy implementation, life jackets for all fishermen, improve the poor housing at the community so as to reduce overcrowding and other housing related predispositions to high HIV rates at the community. Work place AIDS-competence teams have been successfully used to address high HIV transmission in similar

  13. Recording of dissimulation and denial in the context of the psychosomatic evaluation at living kidney transplantation using the Minnesota Multiphasic Personality Inventory (MMPI)

    Science.gov (United States)

    Wutzler, Uwe; Venner, Margit; Villmann, Thomas; Decker, Oliver; Ott, Undine; Steiner, Thomas; Gumz, Antje

    2009-01-01

    Objective: Living organ donation involves interference with a healthy organism. Therefore, most transplantation centres ascertain the voluntariness of the donation as well as its motivation by means of a psychosomatic evaluation. The circumstance that the evaluation is compulsory and not a primary concern of the donor-recipient pair may occasion respondents to present only what they consider innocuous and socially adequate. Thus, the information value of the results can be considerably affected. Methods: In the context of a psychosomatic evaluation prior to living kidney transplantation, 71 donor-recipient pairs were screened at the transplantation centre of Friedrich Schiller University, Jena. Using the validity scales of the Minnesota Multiphasic Personality Inventory (MMPI) (“infrequency” (F), “lie” (L) and “correction-scales” (K)) and the Dissimulation Index according to Gough (“F-K”), we tried to find traits of dissimulation and denial. Results: About 50% of the participants showed an infrequency raw score of zero. This means that at least half of the sample is apprehensive which may cause a cautious and controlled attitude towards the examination. The K-value (T≥59) and the Dissimulation Index (F-K≤–15) indicated dissimulation in 29% and 26% of the overall sample. Moreover, it affects the score of 11 respondents (8%) so profoundly that any significance regarding the personality traits is lost. Conclusion: In the setup of the examination situation as well as in the interpretation of test-psychological findings, the occurrence and possible influence of dissimulation should be considered. The validity scale of the MMPI can help to obtain an objective clinical impression of dissimulation in problem cases. PMID:19911073

  14. The old lady says "no": the language of denial in Brian Friel's The Loves of Cass McGuireDOI:10.5007/2175-8026.2010n58p53

    Directory of Open Access Journals (Sweden)

    Giovanna Tallone

    2010-01-01

    Full Text Available In Brian Friel's The Loves of Cass McGuire the presence of negative expressions both in stage directions and dialogue acts as a structuring principle and emphasizes the metadramatic construction of the play. Negative forms underlie Cass's growing awareness of disappointment and hopelessness, denying the "loves" ironically mentioned in the title. Only the alternative imaginary recreation of her own life - her "rhapsody" - is significantly marked by the absence of negative forms. The language of denial is thus both subject and object in the play.

  15. AntBot: Anti-pollution peer-to-peer botnets

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Guanhua [Los Alamos National Laboratory; Eidenbenz, Stephan [Los Alamos National Laboratory; Ha, Duc T [UNIV. AT BUFFALO

    2009-01-01

    Botnets, which are responsible for many email sparnming and DDoS (Distributed Denial of Service) attacks in the current Internet, have emerged as one of most severe cyber-threats in recent years. To evade detection and improve resistance against countermeasures, botnets have evolved from the first generation that relies on IRC chat channels to deliver commands to the current generation that uses highly resilient P2P (Peer-to-Peer) protocols to spread their C&C (Command and Control) information. It is, however, revealed that P2P botnets, although relieved from the single point of failure that IRC botnets suffer, can be easily disrupted using pollution-based mitigation schemes [15]. In this paper, we play the devil's advocate and propose a new type of hypothetical botnets called AntBot, which aim to propagate their C&C information to individual bots even though there exists an adversary that persistently pollutes keys used by seized bots to search the command information. The key idea of AntBot is a tree-like structure that bots use to deliver the command so that captured bots reveal only limited information. To evaluate effectiveness of AntBot against pollution-based mitigation in a virtual environment, we develop a distributed P2P botnet simulator. Using extensive experiments, we demonstrate that AntBot operates resiliently against pollution-based mitigation. We further present a few potential defense schemes that could effectively disrupt AntBot operations.

  16. SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications.

    Directory of Open Access Journals (Sweden)

    Ahmad Karim

    Full Text Available Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS, disseminating other malwares and much more. Likewise traditional PC based botnet, Mobile botnets have the same operational impact except the target audience is particular to smartphone users. Therefore, it is import to uncover this security issue prior to its widespread adaptation. We propose SMARTbot, a novel dynamic analysis framework augmented with machine learning techniques to automatically detect botnet binaries from malicious corpus. SMARTbot is a component based off-device behavioral analysis framework which can generate mobile botnet learning model by inducing Artificial Neural Networks' back-propagation method. Moreover, this framework can detect mobile botnet binaries with remarkable accuracy even in case of obfuscated program code. The results conclude that, a classifier model based on simple logistic regression outperform other machine learning classifier for botnet apps' detection, i.e 99.49% accuracy is achieved. Further, from manual inspection of botnet dataset we have extracted interesting trends in those applications. As an outcome of this research, a mobile botnet dataset is devised which will become the benchmark for future studies.

  17. COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE

    Directory of Open Access Journals (Sweden)

    Nisha Mariam Varughese

    2014-07-01

    Full Text Available Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM, cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.

  18. SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications.

    Science.gov (United States)

    Karim, Ahmad; Salleh, Rosli; Khan, Muhammad Khurram

    2016-01-01

    Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS), disseminating other malwares and much more. Likewise traditional PC based botnet, Mobile botnets have the same operational impact except the target audience is particular to smartphone users. Therefore, it is import to uncover this security issue prior to its widespread adaptation. We propose SMARTbot, a novel dynamic analysis framework augmented with machine learning techniques to automatically detect botnet binaries from malicious corpus. SMARTbot is a component based off-device behavioral analysis framework which can generate mobile botnet learning model by inducing Artificial Neural Networks' back-propagation method. Moreover, this framework can detect mobile botnet binaries with remarkable accuracy even in case of obfuscated program code. The results conclude that, a classifier model based on simple logistic regression outperform other machine learning classifier for botnet apps' detection, i.e 99.49% accuracy is achieved. Further, from manual inspection of botnet dataset we have extracted interesting trends in those applications. As an outcome of this research, a mobile botnet dataset is devised which will become the benchmark for future studies.

  19. SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications

    Science.gov (United States)

    Karim, Ahmad; Salleh, Rosli; Khan, Muhammad Khurram

    2016-01-01

    Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS), disseminating other malwares and much more. Likewise traditional PC based botnet, Mobile botnets have the same operational impact except the target audience is particular to smartphone users. Therefore, it is import to uncover this security issue prior to its widespread adaptation. We propose SMARTbot, a novel dynamic analysis framework augmented with machine learning techniques to automatically detect botnet binaries from malicious corpus. SMARTbot is a component based off-device behavioral analysis framework which can generate mobile botnet learning model by inducing Artificial Neural Networks’ back-propagation method. Moreover, this framework can detect mobile botnet binaries with remarkable accuracy even in case of obfuscated program code. The results conclude that, a classifier model based on simple logistic regression outperform other machine learning classifier for botnet apps’ detection, i.e 99.49% accuracy is achieved. Further, from manual inspection of botnet dataset we have extracted interesting trends in those applications. As an outcome of this research, a mobile botnet dataset is devised which will become the benchmark for future studies. PMID:26978523

  20. Handbook of distribution

    International Nuclear Information System (INIS)

    Mo, In Gyu

    1992-01-01

    This book tells of business strategy and distribution innovation, purpose of intelligent distribution, intelligent supply distribution, intelligent production distribution, intelligent sale distribution software for intelligence and future and distribution. It also introduces component technology keeping intelligent distribution such as bar cord, OCR, packing, and intelligent auto-warehouse, system technology, and cases in America, Japan and other countries.

  1. Review on Malware and Malware Detection ‎Using Data Mining Techniques

    Directory of Open Access Journals (Sweden)

    Wesam S Bhaya

    2017-11-01

    Full Text Available Malicious software is any type of software or codes which hooks some: private information, data from the computer system, computer operations or(and merely just to do malicious goals of the author on the computer system, without permission of the computer users. (The short abbreviation of malicious software is Malware. However, the detection of malware has become one of biggest issues in the computer security field because of the current communication infrastructures are vulnerable to penetration from many types of malware infection strategies and attacks.  Moreover, malwares are variant and diverse in volume and types and that strictly explode the effectiveness of traditional defense methods like signature approach, which is unable to detect a new malware. However, this vulnerability will lead to a successful computer system penetration (and attack as well as success of more advanced attacks like distributed denial of service (DDoS attack. Data mining methods can be used to overcome limitation of signature-based techniques to detect the zero-day malware. This paper provides an overview of malware and malware detection system using modern techniques such as techniques of data mining approach to detect known and unknown malware samples.

  2. A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network

    Directory of Open Access Journals (Sweden)

    Jun Li

    2017-03-01

    Full Text Available With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes.

  3. Techniques to maintain functionality during degraded performance

    Science.gov (United States)

    McCoy, Joseph R.; White, Joshua S.

    2010-04-01

    In technology the notion of beyond state-of-the-art often begins when a paradigm is shifted. In this paper the authors present their work which has fundamentally enabled an enterprise to insure operational viability under the very real cyber facts: "we are under constant attack, it is a hostile space and we can control the point of contact." That point of contact is the optical bit stream which is currently beyond the scope of the standard cyber toolset. EverisTM, in working with our customers, has developed the tools to capture, view, analyze, and control the correlative (interdependent network, metadata, data and users) information as it traverses the core, regional, and global fiber optic networks. This capability to visualize below the operational picture afforded by current network intrusion detection systems can be combined with real-time intervention at the network core yielding prioritization, identification, and authentication of authentication. This directly translates into sophisticated end user interaction across the interdependencies often viewed as the "cloud". Everis has demonstrated unique applications based on this capability that includes mitigation of DDOS (Distributed Denial of Service), identification of "forged" IP (Internet Protocol) addresses, malicious executable destruction, WAN (Wide Area Network) IPS (Intrusion Prevention System) and connectionless routing vs. connection based switching.

  4. Delay and Denial of Shipment

    International Nuclear Information System (INIS)

    Wright, T. de; Gray, P.; Sobriera, A.C.F.; Xavier, C.C.; Schwela, U.

    2016-01-01

    Despite the strong safety and security record for shipments of Radioactive Material (RAM), Class 7 goods, transportation often continues to provide challenges as many carriers and ports (air and sea) choose not to engage in RAM product transportation. This paper discusses factors impacting the availability of regular air and sea transport routes for RAM, including: negative perception about radiation due to a lack of awareness and information about the industry; concerns about the cost and extent of training required of those who handle radioactive materials; multiplicity and diversity of regulations governing the handling, use and transport of these products; lack of harmonisation between governments in applying international regulations; and, a lack of outreach and public awareness about the needs and applications of radioactive materials. The particular issues involved in sea transport of: relatively small trade volumes; additional requirements or bans on port access, both for transit and trans-shipment; and scheduling difficulties due to commercial carrier routing decisions are also discussed. Initiatives being taken internationally, regionally and nationally to overcome these issues and examples of success are described. (author)

  5. The need for a greater commitment to america region to prevent denials of shipments of radioactive materials; La necesidad de un mayor compromiso en la region America para prevenir los rechazos de expediciones de material radiactivo

    Energy Technology Data Exchange (ETDEWEB)

    Mallaupoma, Mario, E-mail: mmallaupoma@ipen.gob.pe [Instituto Peruano de Energia Nuclear (IPEN), Lima (Peru); Schwela, Ulric, E-mail: tech@tanb.org [Tantalum-Niobiom International Study Center (TIC), Lasne (Belgium)

    2013-07-01

    Radioactive sources are used worldwide in a wide range of applications in industry health care, industrial applications, manufacturing materials, exploration and technological development, as well as basic scientific research. The ability to use such radioactive material in these sectors depends on both its safe transport within a country and between different countries, for developed and developing countries can have access to this technology, in a timely manner and in conditions economically acceptable. In this paper the issue of denials and restraints of shipment of radioactive material and the need for greater commitment that Member States of the International Atomic Energy Agency (IAEA) must assume to facilitate the transport of radioactive materials for the benefit of society is analyzed.

  6. On the Impact of Wireless Jamming on the Distributed Secondary Microgrid Control

    DEFF Research Database (Denmark)

    Danzi, Pietro; Stefanovic, Cedomir; Meng, Lexuan

    2017-01-01

    The secondary control in direct current microgrids (MGs) is used to restore the voltage deviations caused by the primary droop control, where the latter is implemented locally in each distributed generator and reacts to load variations. Numerous recent works propose to implement the secondary con...... the secondary MG control. Compared to other denial-of-service attacks that are oriented against the tertiary control, such as economic dispatch, the attack on the secondary control presented here can be more severe, as it disrupts the basic functionality of the MG.......The secondary control in direct current microgrids (MGs) is used to restore the voltage deviations caused by the primary droop control, where the latter is implemented locally in each distributed generator and reacts to load variations. Numerous recent works propose to implement the secondary...... control in a distributed fashion, relying on a communication system to achieve consensus among MG units. This paper shows that, if the system is not designed to cope with adversary communication impairments, then a malicious attacker can apply a simple jamming of a few units of the MG and thus compromise...

  7. An exponential distribution

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    In this presentation author deals with the probabilistic evaluation of product life on the example of the exponential distribution. The exponential distribution is special one-parametric case of the weibull distribution.

  8. Probability distribution relationships

    Directory of Open Access Journals (Sweden)

    Yousry Abdelkader

    2013-05-01

    Full Text Available In this paper, we are interesting to show the most famous distributions and their relations to the other distributions in collected diagrams. Four diagrams are sketched as networks. The first one is concerned to the continuous distributions and their relations. The second one presents the discrete distributions. The third diagram is depicted the famous limiting distributions. Finally, the Balakrishnan skew-normal density and its relationship with the other distributions are shown in the fourth diagram.

  9. Reactor power distribution monitor

    International Nuclear Information System (INIS)

    Hoizumi, Atsushi.

    1986-01-01

    Purpose: To grasp the margin for the limit value of the power distribution peaking factor inside the reactor under operation by using the reactor power distribution monitor. Constitution: The monitor is composed of the 'constant' file, (to store in-reactor power distributions obtained from analysis), TIP and thermocouple, lateral output distribution calibrating apparatus, axial output distribution synthesizer and peaking factor synthesizer. The lateral output distribution calibrating apparatus is used to make calibration by comparing the power distribution obtained from the thermocouples to the power distribution obtained from the TIP, and then to provide the power distribution lateral peaking factors. The axial output distribution synthesizer provides the power distribution axial peaking factors in accordance with the signals from the out-pile neutron flux detector. These axial and lateral power peaking factors are synthesized with high precision in the three-dimensional format and can be monitored at any time. (Kamimura, M.)

  10. DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study

    NARCIS (Netherlands)

    van Rijswijk, Roland M.; Sperotto, Anna; Pras, Aiko

    2014-01-01

    Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the DNS that relies on digital signatures. DNSSEC strengthens DNS by preventing attacks such as cache poisoning. However, a common argument against the deployment of DNSSEC is its potential for abuse in

  11. Collaborative DDoS Defense using Flow-based Security Event Information

    NARCIS (Netherlands)

    Steinberger, Jessica; Kuhnert, Benjamin; Sperotto, Anna; Baier, Harald; Pras, Aiko

    Over recent years, network-based attacks evolved to the top concerns responsible for network infrastructure and service outages. To counteract such attacks, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). In addition, exchanging threat

  12. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  13. Danger of Prolific Cybercrime and Network DDOS from Unprotected IoT Devices

    Science.gov (United States)

    internet, the internet of things pumping all of the big data, all of the, enable all types of the security framework that you can use the big data, leveraging the AI based approach, fully leveraging that vulnerability detection like the use case we mentioned earlier or to protect the whole traffic and network so

  14. On bivariate geometric distribution

    Directory of Open Access Journals (Sweden)

    K. Jayakumar

    2013-05-01

    Full Text Available Characterizations of bivariate geometric distribution using univariate and bivariate geometric compounding are obtained. Autoregressive models with marginals as bivariate geometric distribution are developed. Various bivariate geometric distributions analogous to important bivariate exponential distributions like, Marshall-Olkin’s bivariate exponential, Downton’s bivariate exponential and Hawkes’ bivariate exponential are presented.

  15. Extended Poisson Exponential Distribution

    Directory of Open Access Journals (Sweden)

    Anum Fatima

    2015-09-01

    Full Text Available A new mixture of Modified Exponential (ME and Poisson distribution has been introduced in this paper. Taking the Maximum of Modified Exponential random variable when the sample size follows a zero truncated Poisson distribution we have derived the new distribution, named as Extended Poisson Exponential distribution. This distribution possesses increasing and decreasing failure rates. The Poisson-Exponential, Modified Exponential and Exponential distributions are special cases of this distribution. We have also investigated some mathematical properties of the distribution along with Information entropies and Order statistics of the distribution. The estimation of parameters has been obtained using the Maximum Likelihood Estimation procedure. Finally we have illustrated a real data application of our distribution.

  16. Distributed Data Management and Distributed File Systems

    CERN Document Server

    Girone, Maria

    2015-01-01

    The LHC program has been successful in part due to the globally distributed computing resources used for collecting, serving, processing, and analyzing the large LHC datasets. The introduction of distributed computing early in the LHC program spawned the development of new technologies and techniques to synchronize information and data between physically separated computing centers. Two of the most challenges services are the distributed file systems and the distributed data management systems. In this paper I will discuss how we have evolved from local site services to more globally independent services in the areas of distributed file systems and data management and how these capabilities may continue to evolve into the future. I will address the design choices, the motivations, and the future evolution of the computing systems used for High Energy Physics.

  17. Addressing security issues related to virtual institute distributed activities

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2008-03-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the

  18. Random Access Performance of Distributed Sensors Attacked by Unknown Jammers

    Directory of Open Access Journals (Sweden)

    Dae-Kyo Jeong

    2017-11-01

    Full Text Available In this paper, we model and investigate the random access (RA performance of sensor nodes (SN in a wireless sensor network (WSN. In the WSN, a central head sensor (HS collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if they are friendly jammers generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS and simply induces denial of service (DoS without any need to hack HS or SNs. On the other hand, code jammers mimic legitimate SNs by sending fake signals and thus need to know certain system parameters that are used by the legitimate SNs. As a result of code jamming, HS falsely allocates radio resources to SNs. The code jamming hence increases the failure probability in sending the information messages, as well as misleads the usage of radio resources. In this paper, we present the probabilities of successful preamble transmission with power ramping according to the jammer types and provide the resulting throughput and delay of information transmission by SNs, respectively. The effect of two jamming attacks on the RA performances is compared with numerical investigation. The results show that, compared to RA without jammers, power and code jamming degrade the throughput by up to 30.3% and 40.5%, respectively, while the delay performance by up to 40.1% and 65.6%, respectively.

  19. Unifying distribution functions: some lesser known distributions.

    Science.gov (United States)

    Moya-Cessa, J R; Moya-Cessa, H; Berriel-Valdos, L R; Aguilar-Loreto, O; Barberis-Blostein, P

    2008-08-01

    We show that there is a way to unify distribution functions that describe simultaneously a classical signal in space and (spatial) frequency and position and momentum for a quantum system. Probably the most well known of them is the Wigner distribution function. We show how to unify functions of the Cohen class, Rihaczek's complex energy function, and Husimi and Glauber-Sudarshan distribution functions. We do this by showing how they may be obtained from ordered forms of creation and annihilation operators and by obtaining them in terms of expectation values in different eigenbases.

  20. Cumulative Poisson Distribution Program

    Science.gov (United States)

    Bowerman, Paul N.; Scheuer, Ernest M.; Nolty, Robert

    1990-01-01

    Overflow and underflow in sums prevented. Cumulative Poisson Distribution Program, CUMPOIS, one of two computer programs that make calculations involving cumulative Poisson distributions. Both programs, CUMPOIS (NPO-17714) and NEWTPOIS (NPO-17715), used independently of one another. CUMPOIS determines cumulative Poisson distribution, used to evaluate cumulative distribution function (cdf) for gamma distributions with integer shape parameters and cdf for X (sup2) distributions with even degrees of freedom. Used by statisticians and others concerned with probabilities of independent events occurring over specific units of time, area, or volume. Written in C.

  1. Predictable return distributions

    DEFF Research Database (Denmark)

    Pedersen, Thomas Quistgaard

    trace out the entire distribution. A univariate quantile regression model is used to examine stock and bond return distributions individually, while a multivariate model is used to capture their joint distribution. An empirical analysis on US data shows that certain parts of the return distributions......-of-sample analyses show that the relative accuracy of the state variables in predicting future returns varies across the distribution. A portfolio study shows that an investor with power utility can obtain economic gains by applying the empirical return distribution in portfolio decisions instead of imposing...

  2. Drinking Water Distribution Systems

    Science.gov (United States)

    Learn about an overview of drinking water distribution systems, the factors that degrade water quality in the distribution system, assessments of risk, future research about these risks, and how to reduce cross-connection control risk.

  3. Distributed multiscale computing

    NARCIS (Netherlands)

    Borgdorff, J.

    2014-01-01

    Multiscale models combine knowledge, data, and hypotheses from different scales. Simulating a multiscale model often requires extensive computation. This thesis evaluates distributing these computations, an approach termed distributed multiscale computing (DMC). First, the process of multiscale

  4. TRANSMUTED EXPONENTIATED EXPONENTIAL DISTRIBUTION

    OpenAIRE

    MEROVCI, FATON

    2013-01-01

    In this article, we generalize the exponentiated exponential distribution using the quadratic rank transmutation map studied by Shaw etal. [6] to develop a transmuted exponentiated exponential distribution. Theproperties of this distribution are derived and the estimation of the model parameters is discussed. An application to real data set are finally presented forillustration

  5. Leadership for Distributed Teams

    NARCIS (Netherlands)

    De Rooij, J.P.G.

    2009-01-01

    The aim of this dissertation was to study the little examined, yet important issue of leadership for distributed teams. Distributed teams are defined as: “teams of which members are geographically distributed and are therefore working predominantly via mediated communication means on an

  6. Extreme value distributions

    CERN Document Server

    Ahsanullah, Mohammad

    2016-01-01

    The aim of the book is to give a through account of the basic theory of extreme value distributions. The book cover a wide range of materials available to date. The central ideas and results of extreme value distributions are presented. The book rwill be useful o applied statisticians as well statisticians interrested to work in the area of extreme value distributions.vmonograph presents the central ideas and results of extreme value distributions.The monograph gives self-contained of theory and applications of extreme value distributions.

  7. Distributed plot-making

    DEFF Research Database (Denmark)

    Jensen, Lotte Groth; Bossen, Claus

    2016-01-01

    different socio-technical systems (paper-based and electronic patient records). Drawing on the theory of distributed cognition and narrative theory, primarily inspired by the work done within health care by Cheryl Mattingly, we propose that the creation of overview may be conceptualised as ‘distributed plot......-making’. Distributed cognition focuses on the role of artefacts, humans and their interaction in information processing, while narrative theory focuses on how humans create narratives through the plot construction. Hence, the concept of distributed plot-making highlights the distribution of information processing...

  8. Hierarchical species distribution models

    Science.gov (United States)

    Hefley, Trevor J.; Hooten, Mevin B.

    2016-01-01

    Determining the distribution pattern of a species is important to increase scientific knowledge, inform management decisions, and conserve biodiversity. To infer spatial and temporal patterns, species distribution models have been developed for use with many sampling designs and types of data. Recently, it has been shown that count, presence-absence, and presence-only data can be conceptualized as arising from a point process distribution. Therefore, it is important to understand properties of the point process distribution. We examine how the hierarchical species distribution modeling framework has been used to incorporate a wide array of regression and theory-based components while accounting for the data collection process and making use of auxiliary information. The hierarchical modeling framework allows us to demonstrate how several commonly used species distribution models can be derived from the point process distribution, highlight areas of potential overlap between different models, and suggest areas where further research is needed.

  9. Weighted Lomax distribution.

    Science.gov (United States)

    Kilany, N M

    2016-01-01

    The Lomax distribution (Pareto Type-II) is widely applicable in reliability and life testing problems in engineering as well as in survival analysis as an alternative distribution. In this paper, Weighted Lomax distribution is proposed and studied. The density function and its behavior, moments, hazard and survival functions, mean residual life and reversed failure rate, extreme values distributions and order statistics are derived and studied. The parameters of this distribution are estimated by the method of moments and the maximum likelihood estimation method and the observed information matrix is derived. Moreover, simulation schemes are derived. Finally, an application of the model to a real data set is presented and compared with some other well-known distributions.

  10. Are Parton Distributions Positive?

    CERN Document Server

    Forte, Stefano; Ridolfi, Giovanni; Altarelli, Guido; Forte, Stefano; Ridolfi, Giovanni

    1999-01-01

    We show that the naive positivity conditions on polarized parton distributions which follow from their probabilistic interpretation in the naive parton model are reproduced in perturbative QCD at the leading log level if the quark and gluon distribution are defined in terms of physical processes. We show how these conditions are modified at the next-to-leading level, and discuss their phenomenological implications, in particular in view of the determination of the polarized gluon distribution

  11. Are parton distributions positive?

    International Nuclear Information System (INIS)

    Forte, Stefano; Altarelli, Guido; Ridolfi, Giovanni

    1999-01-01

    We show that the naive positivity conditions on polarized parton distributions which follow from their probabilistic interpretation in the naive parton model are reproduced in perturbative QCD at the leading log level if the quark and gluon distribution are defined in terms of physical processes. We show how these conditions are modified at the next-to-leading level, and discuss their phenomenological implications, in particular in view of the determination of the polarized gluon distribution

  12. dftools: Distribution function fitting

    Science.gov (United States)

    Obreschkow, Danail

    2018-05-01

    dftools, written in R, finds the most likely P parameters of a D-dimensional distribution function (DF) generating N objects, where each object is specified by D observables with measurement uncertainties. For instance, if the objects are galaxies, it can fit a mass function (D=1), a mass-size distribution (D=2) or the mass-spin-morphology distribution (D=3). Unlike most common fitting approaches, this method accurately accounts for measurement in uncertainties and complex selection functions.

  13. Sorting a distribution theory

    CERN Document Server

    Mahmoud, Hosam M

    2011-01-01

    A cutting-edge look at the emerging distributional theory of sorting Research on distributions associated with sorting algorithms has grown dramatically over the last few decades, spawning many exact and limiting distributions of complexity measures for many sorting algorithms. Yet much of this information has been scattered in disparate and highly specialized sources throughout the literature. In Sorting: A Distribution Theory, leading authority Hosam Mahmoud compiles, consolidates, and clarifies the large volume of available research, providing a much-needed, comprehensive treatment of the

  14. Electric distribution systems

    CERN Document Server

    Sallam, A A

    2010-01-01

    "Electricity distribution is the penultimate stage in the delivery of electricity to end users. The only book that deals with the key topics of interest to distribution system engineers, Electric Distribution Systems presents a comprehensive treatment of the subject with an emphasis on both the practical and academic points of view. Reviewing traditional and cutting-edge topics, the text is useful to practicing engineers working with utility companies and industry, undergraduate graduate and students, and faculty members who wish to increase their skills in distribution system automation and monitoring."--

  15. Cooling water distribution system

    Science.gov (United States)

    Orr, Richard

    1994-01-01

    A passive containment cooling system for a nuclear reactor containment vessel. Disclosed is a cooling water distribution system for introducing cooling water by gravity uniformly over the outer surface of a steel containment vessel using an interconnected series of radial guide elements, a plurality of circumferential collector elements and collector boxes to collect and feed the cooling water into distribution channels extending along the curved surface of the steel containment vessel. The cooling water is uniformly distributed over the curved surface by a plurality of weirs in the distribution channels.

  16. Distributed Structure Searchable Toxicity

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Distributed Structure Searchable Toxicity (DSSTox) online resource provides high quality chemical structures and annotations in association with toxicity data....

  17. Distributed Energy Technology Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Distributed Energy Technologies Laboratory (DETL) is an extension of the power electronics testing capabilities of the Photovoltaic System Evaluation Laboratory...

  18. Distribution of Chinese names

    Science.gov (United States)

    Huang, Ding-wei

    2013-03-01

    We present a statistical model for the distribution of Chinese names. Both family names and given names are studied on the same basis. With naive expectation, the distribution of family names can be very different from that of given names. One is affected mostly by genealogy, while the other can be dominated by cultural effects. However, we find that both distributions can be well described by the same model. Various scaling behaviors can be understood as a result of stochastic processes. The exponents of different power-law distributions are controlled by a single parameter. We also comment on the significance of full-name repetition in Chinese population.

  19. Statistical distribution sampling

    Science.gov (United States)

    Johnson, E. S.

    1975-01-01

    Determining the distribution of statistics by sampling was investigated. Characteristic functions, the quadratic regression problem, and the differential equations for the characteristic functions are analyzed.

  20. Distributed security in closed distributed systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario

    properties. This is also restricted to distributed systems in which the set of locations is known a priori. All this follows techniques borrowed from both the model checking and the static analysis communities. In the end, we reach a step towards solving the problem of enforcing security in distributed...... systems. We achieve the goal of showing how this can be done, though we restrict ourselves to closed systems and with a limited set of enforceable security policies. In this setting, our approach proves to be efficient. Finally, we achieve all this by bringing together several fields of Computer Science......The goal of the present thesis is to discuss, argue and conclude about ways to provide security to the information travelling around computer systems consisting of several known locations. When developing software systems, security of the information managed by these plays an important role...

  1. How to Achieve Early Botnet Detection at the Provider Level?

    NARCIS (Netherlands)

    Dietz, Christian; Sperotto, Anna; Dreo, G.; Pras, Aiko

    Botnets are an enabler for many cyber-criminal activities and often responsible for DDoS attacks, banking fraud, cyber-espionage and extortion. Botnets are controlled by a botmaster that uses various advanced techniques to create, maintain and hide their complex and distributed C&C infrastructures.

  2. Distributed intelligence in CAMAC

    International Nuclear Information System (INIS)

    Kunz, P.F.

    1977-01-01

    The CAMAC digital interface standard has served us well since 1969. During this time there have been enormous advances in digital electronics. In particular, low cost microprocessors now make it feasible to consider use of distributed intelligence even in simple data acquisition systems. This paper describes a simple extension of the CAMAC standard which allows distributed intelligence at the crate level

  3. Distributed intelligence in CAMAC

    International Nuclear Information System (INIS)

    Kunz, P.F.

    1977-01-01

    A simple extension of the CAMAC standard is described which allows distributed intelligence at the crate level. By distributed intelligence is meant that there is more than one source of control in a system. This standard is just now emerging from the NIM Dataway Working Group and its European counterpart. 1 figure

  4. Wigner distribution in optics

    NARCIS (Netherlands)

    Bastiaans, M.J.; Testorf, M.; Hennelly, B.; Ojeda-Castañeda, J.

    2009-01-01

    In 1932 Wigner introduced a distribution function in mechanics that permitted a description of mechanical phenomena in a phase space. Such a Wigner distribution was introduced in optics by Dolin and Walther in the sixties, to relate partial coherence to radiometry. A few years later, the Wigner

  5. Cache Oblivious Distribution Sweeping

    DEFF Research Database (Denmark)

    Brodal, G.S.; Fagerberg, R.

    2002-01-01

    We adapt the distribution sweeping method to the cache oblivious model. Distribution sweeping is the name used for a general approach for divide-and-conquer algorithms where the combination of solved subproblems can be viewed as a merging process of streams. We demonstrate by a series of algorith...

  6. Distributed Energy Implementation Options

    Energy Technology Data Exchange (ETDEWEB)

    Shah, Chandralata N [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-09-13

    This presentation covers the options for implementing distributed energy projects. It distinguishes between options available for distributed energy that is government owned versus privately owned, with a focus on the privately owned options including Energy Savings Performance Contract Energy Sales Agreements (ESPC ESAs). The presentation covers the new ESPC ESA Toolkit and other Federal Energy Management Program resources.

  7. Distributed Operating Systems

    NARCIS (Netherlands)

    Mullender, Sape J.

    1987-01-01

    In the past five years, distributed operating systems research has gone through a consolidation phase. On a large number of design issues there is now considerable consensus between different research groups. In this paper, an overview of recent research in distributed systems is given. In turn, the

  8. Intelligent distribution network design

    NARCIS (Netherlands)

    Provoost, F.

    2009-01-01

    Distribution networks (medium voltage and low voltage) are subject to changes caused by re-regulation of the energy supply, economical and environmental constraints more sensitive equipment, power quality requirements and the increasing penetration of distributed generation. The latter is seen as

  9. Smart Distribution Systems

    Directory of Open Access Journals (Sweden)

    Yazhou Jiang

    2016-04-01

    Full Text Available The increasing importance of system reliability and resilience is changing the way distribution systems are planned and operated. To achieve a distribution system self-healing against power outages, emerging technologies and devices, such as remote-controlled switches (RCSs and smart meters, are being deployed. The higher level of automation is transforming traditional distribution systems into the smart distribution systems (SDSs of the future. The availability of data and remote control capability in SDSs provides distribution operators with an opportunity to optimize system operation and control. In this paper, the development of SDSs and resulting benefits of enhanced system capabilities are discussed. A comprehensive survey is conducted on the state-of-the-art applications of RCSs and smart meters in SDSs. Specifically, a new method, called Temporal Causal Diagram (TCD, is used to incorporate outage notifications from smart meters for enhanced outage management. To fully utilize the fast operation of RCSs, the spanning tree search algorithm is used to develop service restoration strategies. Optimal placement of RCSs and the resulting enhancement of system reliability are discussed. Distribution system resilience with respect to extreme events is presented. Test cases are used to demonstrate the benefit of SDSs. Active management of distributed generators (DGs is introduced. Future research in a smart distribution environment is proposed.

  10. The Distributed Criterion Design

    Science.gov (United States)

    McDougall, Dennis

    2006-01-01

    This article describes and illustrates a novel form of the changing criterion design called the distributed criterion design, which represents perhaps the first advance in the changing criterion design in four decades. The distributed criterion design incorporates elements of the multiple baseline and A-B-A-B designs and is well suited to applied…

  11. Evaluating Distributed Timing Constraints

    DEFF Research Database (Denmark)

    Kristensen, C.H.; Drejer, N.

    1994-01-01

    In this paper we describe a solution to the problem of implementing time-optimal evaluation of timing constraints in distributed real-time systems.......In this paper we describe a solution to the problem of implementing time-optimal evaluation of timing constraints in distributed real-time systems....

  12. Advanced Distribution Management System

    OpenAIRE

    Avazov, Artur; Sobinova, Lubov Anatolievna

    2016-01-01

    This article describes the advisability of using advanced distribution management systems in the electricity distribution networks area and considers premises of implementing ADMS within the Smart Grid era. Also, it gives the big picture of ADMS and discusses the ADMS advantages and functionalities.

  13. Advanced Distribution Management System

    Science.gov (United States)

    Avazov, Artur R.; Sobinova, Liubov A.

    2016-02-01

    This article describes the advisability of using advanced distribution management systems in the electricity distribution networks area and considers premises of implementing ADMS within the Smart Grid era. Also, it gives the big picture of ADMS and discusses the ADMS advantages and functionalities.

  14. Advanced Distribution Management System

    Directory of Open Access Journals (Sweden)

    Avazov Artur R.

    2016-01-01

    Full Text Available This article describes the advisability of using advanced distribution management systems in the electricity distribution networks area and considers premises of implementing ADMS within the Smart Grid era. Also, it gives the big picture of ADMS and discusses the ADMS advantages and functionalities.

  15. Development of distributed target

    CERN Document Server

    Yu Hai Jun; Li Qin; Zhou Fu Xin; Shi Jin Shui; Ma Bing; Chen Nan; Jing Xiao Bing

    2002-01-01

    Linear introduction accelerator is expected to generate small diameter X-ray spots with high intensity. The interaction of the electron beam with plasmas generated at the X-ray converter will make the spot on target increase with time and debase the X-ray dose and the imaging resolving power. A distributed target is developed which has about 24 pieces of thin 0.05 mm tantalum films distributed over 1 cm. due to the structure adoption, the distributed target material over a large volume decreases the energy deposition per unit volume and hence reduces the temperature of target surface, then reduces the initial plasma formalizing and its expansion velocity. The comparison and analysis with two kinds of target structures are presented using numerical calculation and experiments, the results show the X-ray dose and normalized angle distribution of the two is basically the same, while the surface of the distributed target is not destroyed like the previous block target

  16. Distributed Analysis in CMS

    CERN Document Server

    Fanfani, Alessandra; Sanches, Jose Afonso; Andreeva, Julia; Bagliesi, Giusepppe; Bauerdick, Lothar; Belforte, Stefano; Bittencourt Sampaio, Patricia; Bloom, Ken; Blumenfeld, Barry; Bonacorsi, Daniele; Brew, Chris; Calloni, Marco; Cesini, Daniele; Cinquilli, Mattia; Codispoti, Giuseppe; D'Hondt, Jorgen; Dong, Liang; Dongiovanni, Danilo; Donvito, Giacinto; Dykstra, David; Edelmann, Erik; Egeland, Ricky; Elmer, Peter; Eulisse, Giulio; Evans, Dave; Fanzago, Federica; Farina, Fabio; Feichtinger, Derek; Fisk, Ian; Flix, Josep; Grandi, Claudio; Guo, Yuyi; Happonen, Kalle; Hernandez, Jose M; Huang, Chih-Hao; Kang, Kejing; Karavakis, Edward; Kasemann, Matthias; Kavka, Carlos; Khan, Akram; Kim, Bockjoo; Klem, Jukka; Koivumaki, Jesper; Kress, Thomas; Kreuzer, Peter; Kurca, Tibor; Kuznetsov, Valentin; Lacaprara, Stefano; Lassila-Perini, Kati; Letts, James; Linden, Tomas; Lueking, Lee; Maes, Joris; Magini, Nicolo; Maier, Gerhild; McBride, Patricia; Metson, Simon; Miccio, Vincenzo; Padhi, Sanjay; Pi, Haifeng; Riahi, Hassen; Riley, Daniel; Rossman, Paul; Saiz, Pablo; Sartirana, Andrea; Sciaba, Andrea; Sekhri, Vijay; Spiga, Daniele; Tuura, Lassi; Vaandering, Eric; Vanelderen, Lukas; Van Mulders, Petra; Vedaee, Aresh; Villella, Ilaria; Wicklund, Eric; Wildish, Tony; Wissing, Christoph; Wurthwein, Frank

    2009-01-01

    The CMS experiment expects to manage several Pbytes of data each year during the LHC programme, distributing them over many computing sites around the world and enabling data access at those centers for analysis. CMS has identified the distributed sites as the primary location for physics analysis to support a wide community with thousands potential users. This represents an unprecedented experimental challenge in terms of the scale of distributed computing resources and number of user. An overview of the computing architecture, the software tools and the distributed infrastructure is reported. Summaries of the experience in establishing efficient and scalable operations to get prepared for CMS distributed analysis are presented, followed by the user experience in their current analysis activities.

  17. Managing Distributed Software Projects

    DEFF Research Database (Denmark)

    Persson, John Stouby

    Increasingly, software projects are becoming geographically distributed, with limited face-toface interaction between participants. These projects face particular challenges that need careful managerial attention. This PhD study reports on how we can understand and support the management...... of distributed software projects, based on a literature study and a case study. The main emphasis of the literature study was on how to support the management of distributed software projects, but also contributed to an understanding of these projects. The main emphasis of the case study was on how to understand...... the management of distributed software projects, but also contributed to supporting the management of these projects. The literature study integrates what we know about risks and risk-resolution techniques, into a framework for managing risks in distributed contexts. This framework was developed iteratively...

  18. Distributed Control Diffusion

    DEFF Research Database (Denmark)

    Schultz, Ulrik Pagh

    2007-01-01

    . Programming a modular, self-reconfigurable robot is however a complicated task: the robot is essentially a real-time, distributed embedded system, where control and communication paths often are tightly coupled to the current physical configuration of the robot. To facilitate the task of programming modular....... This approach allows the programmer to dynamically distribute behaviors throughout a robot and moreover provides a partial abstraction over the concrete physical shape of the robot. We have implemented a prototype of a distributed control diffusion system for the ATRON modular, self-reconfigurable robot......, self-reconfigurable robots, we present the concept of distributed control diffusion: distributed queries are used to identify modules that play a specific role in the robot, and behaviors that implement specific control strategies are diffused throughout the robot based on these role assignments...

  19. Distributed Language and Dialogism

    DEFF Research Database (Denmark)

    Steffensen, Sune Vork

    2015-01-01

    addresses Linell’s critique of Distributed Language as rooted in biosemiotics and in theories of organism-environment systems. It is argued that Linell’s sense-based approach entails an individualist view of how conspecific Others acquire their status as prominent parts of the sense-maker’s environment......This article takes a starting point in Per Linell’s (2013) review article on the book Distributed Language (Cowley, 2011a) and other contributions to the field of ‘Distributed Language’, including Cowley et al. (2010) and Hodges et al. (2012). The Distributed Language approach is a naturalistic...... and anti-representational approach to language that builds on recent developments in the cognitive sciences. With a starting point in Linell’s discussion of the approach, the article aims to clarify four aspects of a distributed view of language vis-à-vis the tradition of Dialogism, as presented by Linell...

  20. Pervasive Electricity Distribution System

    Directory of Open Access Journals (Sweden)

    Muhammad Usman Tahir

    2017-06-01

    Full Text Available Now a days a country cannot become economically strong until and unless it has enough electrical power to fulfil industrial and domestic needs. Electrical power being the pillar of any country’s economy, needs to be used in an efficient way. The same step is taken here by proposing a new system for energy distribution from substation to consumer houses, also it monitors the consumer consumption and record data. Unlike traditional manual Electrical systems, pervasive electricity distribution system (PEDS introduces a fresh perspective to monitor the feeder line status at distribution and consumer level. In this system an effort is taken to address the issues of electricity theft, manual billing, online monitoring of electrical distribution system and automatic control of electrical distribution points. The project is designed using microcontroller and different sensors, its GUI is designed in Labview software.

  1. Distribution Integration | Grid Modernization | NREL

    Science.gov (United States)

    Distribution Integration Distribution Integration The goal of NREL's distribution integration research is to tackle the challenges facing the widespread integration of distributed energy resources NREL engineers mapping out a grid model on a whiteboard. NREL's research on the integration of

  2. Distributed Propulsion Vehicles

    Science.gov (United States)

    Kim, Hyun Dae

    2010-01-01

    Since the introduction of large jet-powered transport aircraft, the majority of these vehicles have been designed by placing thrust-generating engines either under the wings or on the fuselage to minimize aerodynamic interactions on the vehicle operation. However, advances in computational and experimental tools along with new technologies in materials, structures, and aircraft controls, etc. are enabling a high degree of integration of the airframe and propulsion system in aircraft design. The National Aeronautics and Space Administration (NASA) has been investigating a number of revolutionary distributed propulsion vehicle concepts to increase aircraft performance. The concept of distributed propulsion is to fully integrate a propulsion system within an airframe such that the aircraft takes full synergistic benefits of coupling of airframe aerodynamics and the propulsion thrust stream by distributing thrust using many propulsors on the airframe. Some of the concepts are based on the use of distributed jet flaps, distributed small multiple engines, gas-driven multi-fans, mechanically driven multifans, cross-flow fans, and electric fans driven by turboelectric generators. This paper describes some early concepts of the distributed propulsion vehicles and the current turboelectric distributed propulsion (TeDP) vehicle concepts being studied under the NASA s Subsonic Fixed Wing (SFW) Project to drastically reduce aircraft-related fuel burn, emissions, and noise by the year 2030 to 2035.

  3. Centralized versus distributed propulsion

    Science.gov (United States)

    Clark, J. P.

    1982-01-01

    The functions and requirements of auxiliary propulsion systems are reviewed. None of the three major tasks (attitude control, stationkeeping, and shape control) can be performed by a collection of thrusters at a single central location. If a centralized system is defined as a collection of separated clusters, made up of the minimum number of propulsion units, then such a system can provide attitude control and stationkeeping for most vehicles. A distributed propulsion system is characterized by more numerous propulsion units in a regularly distributed arrangement. Various proposed large space systems are reviewed and it is concluded that centralized auxiliary propulsion is best suited to vehicles with a relatively rigid core. These vehicles may carry a number of flexible or movable appendages. A second group, consisting of one or more large flexible flat plates, may need distributed propulsion for shape control. There is a third group, consisting of vehicles built up from multiple shuttle launches, which may be forced into a distributed system because of the need to add additional propulsion units as the vehicles grow. The effects of distributed propulsion on a beam-like structure were examined. The deflection of the structure under both translational and rotational thrusts is shown as a function of the number of equally spaced thrusters. When two thrusters only are used it is shown that location is an important parameter. The possibility of using distributed propulsion to achieve minimum overall system weight is also examined. Finally, an examination of the active damping by distributed propulsion is described.

  4. Beyond denial and exclusion: The history of relations between Christians and Muslims in the Cape Colony during the 17th–18th centuries with lessons for a post-colonial theology of religions

    Directory of Open Access Journals (Sweden)

    Jaco Beyers

    2016-04-01

    Full Text Available Learning from the past prepares one for being able to cope with the future. History is made up of strings of relationships. This article follows a historical line from colonialism, through apartheid to post-colonialism in order to illustrate inter-religious relations in South-Africa and how each context determines these relations. Social cohesion is enhanced by a post-colonial theology of religions based on the current context. By describing the relationship between Christians and Muslims during the 17th–18th centuries in the Cape Colony, lessons can be deduced to guide inter-religious relations in a post-colonial era in South Africa. One of the most prominent Muslim leaders during the 17th century in the Cape Colony was Sheik Yusuf al-Makassari. His influence determined the future face of Islam in the Cape Colony and here, during the 18th century, ethics started playing a crucial role in determining the relationship between Christians and Muslims. The ethical guidance of the Imams formed the Muslim communities whilst ethical decline was apparent amongst the Christian colonists during the same period. The place of ethics as determinative of future inter-religious dialogue is emphasised. Denial and exclusion characterised relationships between Christians and Muslims. According to a post-colonial understanding of inter-religious contact the equality and dignity of non-Christian religions are to be acknowledged. In the postcolonial and postapartheid struggle for equality, also of religions, prof Graham Duncan, to whom this article is dedicated, contributed to the process of acknowledging the plurality of the religious reality in South Africa.

  5. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  6. Electric power distribution handbook

    CERN Document Server

    Short, Thomas Allen

    2014-01-01

    Of the ""big three"" components of electrical infrastructure, distribution typically gets the least attention. In fact, a thorough, up-to-date treatment of the subject hasn't been published in years, yet deregulation and technical changes have increased the need for better information. Filling this void, the Electric Power Distribution Handbook delivers comprehensive, cutting-edge coverage of the electrical aspects of power distribution systems. The first few chapters of this pragmatic guidebook focus on equipment-oriented information and applications such as choosing transformer connections,

  7. Distributed analysis at LHCb

    International Nuclear Information System (INIS)

    Williams, Mike; Egede, Ulrik; Paterson, Stuart

    2011-01-01

    The distributed analysis experience to date at LHCb has been positive: job success rates are high and wait times for high-priority jobs are low. LHCb users access the grid using the GANGA job-management package, while the LHCb virtual organization manages its resources using the DIRAC package. This clear division of labor has benefitted LHCb and its users greatly; it is a major reason why distributed analysis at LHCb has been so successful. The newly formed LHCb distributed analysis support team has also proved to be a success.

  8. Agile distributed software development

    DEFF Research Database (Denmark)

    Persson, John Stouby; Mathiassen, Lars; Aaen, Ivan

    2012-01-01

    While face-to-face interaction is fundamental in agile software development, distributed environments must rely extensively on mediated interactions. Practicing agile principles in distributed environments therefore poses particular control challenges related to balancing fixed vs. evolving quality...... requirements and people vs. process-based collaboration. To investigate these challenges, we conducted an in-depth case study of a successful agile distributed software project with participants from a Russian firm and a Danish firm. Applying Kirsch’s elements of control framework, we offer an analysis of how...

  9. Money distribution with intermediation

    OpenAIRE

    Teles, Caio Augusto Colnago

    2013-01-01

    This pap er analyzes the distribution of money holdings in a commo dity money search-based mo del with intermediation. Intro ducing heterogeneity of costs to the Kiyotaki e Wright ( 1989 ) mo del, Cavalcanti e Puzzello ( 2010) gives rise to a non-degenerated distribution of money. We extend further this mo del intro ducing intermediation in the trading pro cess. We show that the distribution of money matters for savings decisions. This gives rises to a xed p oint problem for the ...

  10. Learning Networks Distributed Environment

    NARCIS (Netherlands)

    Martens, Harrie; Vogten, Hubert; Koper, Rob; Tattersall, Colin; Van Rosmalen, Peter; Sloep, Peter; Van Bruggen, Jan; Spoelstra, Howard

    2005-01-01

    Learning Networks Distributed Environment is a prototype of an architecture that allows the sharing and modification of learning materials through a number of transport protocols. The prototype implements a p2p protcol using JXTA.

  11. Sheaves of Schwartz distributions

    International Nuclear Information System (INIS)

    Damyanov, B.P.

    1991-09-01

    The theory of sheaves is a relevant mathematical language for describing the localization principle, known to be valid for the Schwartz distributions (generalized functions). After introducing some fundamentals of sheaves and the basic facts about distribution spaces, the distribution sheaf D Ω of topological C-vector spaces over an open set Ω in R n is systematically studied. A sheaf D M of distributions on a C ∞ -manifold M is then introduced, following a definition of Hoermander's for its particular elements. Further, a general definition of sheaves on a manifold, that are locally isomorphic to (or, modelled on) a sheaf on R n , in proposed. The sheaf properties of D M are studied and this sheaf is shown to be locally isomorphic to D Ω , as a sheaf of topological vector spaces. (author). 14 refs

  12. Fuzzy barrier distributions

    International Nuclear Information System (INIS)

    Piasecki, E.

    2009-01-01

    Heavy-ion collisions often produce a fusion barrier distribution with structures displaying a fingerprint of couplings to highly collective excitations [1]. Basically the same distribution can be obtained from large-angle quasi-elastic scattering, though here the role of the many weak direct-reaction channels is unclear. For 2 0N e + 9 0Z r we have observed the barrier structures expected for the highly deformed neon projectile, but for 2 0N e + 9 2Z r we find completely smooth distribution (see Fig.1). We find that transfer channels in these systems are of similar strength but single particle excitations are significantly stronger in the latter case. They apparently reduce the 'resolving power' of the quasi-elastic channel, what leads to smeared out, or 'fuzzy' barrier distribution. This is the first case when such a phenomenon has been observed.(author)

  13. ATLAS Distributed Computing Automation

    CERN Document Server

    Schovancova, J; The ATLAS collaboration; Borrego, C; Campana, S; Di Girolamo, A; Elmsheuser, J; Hejbal, J; Kouba, T; Legger, F; Magradze, E; Medrano Llamas, R; Negri, G; Rinaldi, L; Sciacca, G; Serfon, C; Van Der Ster, D C

    2012-01-01

    The ATLAS Experiment benefits from computing resources distributed worldwide at more than 100 WLCG sites. The ATLAS Grid sites provide over 100k CPU job slots, over 100 PB of storage space on disk or tape. Monitoring of status of such a complex infrastructure is essential. The ATLAS Grid infrastructure is monitored 24/7 by two teams of shifters distributed world-wide, by the ATLAS Distributed Computing experts, and by site administrators. In this paper we summarize automation efforts performed within the ATLAS Distributed Computing team in order to reduce manpower costs and improve the reliability of the system. Different aspects of the automation process are described: from the ATLAS Grid site topology provided by the ATLAS Grid Information System, via automatic site testing by the HammerCloud, to automatic exclusion from production or analysis activities.

  14. Global Landslide Hazard Distribution

    Data.gov (United States)

    National Aeronautics and Space Administration — Global Landslide Hazard Distribution is a 2.5 minute grid of global landslide and snow avalanche hazards based upon work of the Norwegian Geotechnical Institute...

  15. Financing Distributed Generation

    Energy Technology Data Exchange (ETDEWEB)

    Walker, A.

    2001-06-29

    This paper introduces the engineer who is undertaking distributed generation projects to a wide range of financing options. Distributed generation systems (such as internal combustion engines, small gas turbines, fuel cells and photovoltaics) all require an initial investment, which is recovered over time through revenues or savings. An understanding of the cost of capital and financing structures helps the engineer develop realistic expectations and not be offended by the common requirements of financing organizations. This paper discusses several mechanisms for financing distributed generation projects: appropriations; debt (commercial bank loan); mortgage; home equity loan; limited partnership; vendor financing; general obligation bond; revenue bond; lease; Energy Savings Performance Contract; utility programs; chauffage (end-use purchase); and grants. The paper also discusses financial strategies for businesses focusing on distributed generation: venture capital; informal investors (''business angels''); bank and debt financing; and the stock market.

  16. DOLIB: Distributed Object Library

    Energy Technology Data Exchange (ETDEWEB)

    D' Azevedo, E.F.

    1994-01-01

    This report describes the use and implementation of DOLIB (Distributed Object Library), a library of routines that emulates global or virtual shared memory on Intel multiprocessor systems. Access to a distributed global array is through explicit calls to gather and scatter. Advantages of using DOLIB include: dynamic allocation and freeing of huge (gigabyte) distributed arrays, both C and FORTRAN callable interfaces, and the ability to mix shared-memory and message-passing programming models for ease of use and optimal performance. DOLIB is independent of language and compiler extensions and requires no special operating system support. DOLIB also supports automatic caching of read-only data for high performance. The virtual shared memory support provided in DOLIB is well suited for implementing Lagrangian particle tracking techniques. We have also used DOLIB to create DONIO (Distributed Object Network I/O Library), which obtains over a 10-fold improvement in disk I/O performance on the Intel Paragon.

  17. DOLIB: Distributed Object Library

    Energy Technology Data Exchange (ETDEWEB)

    D`Azevedo, E.F.; Romine, C.H.

    1994-10-01

    This report describes the use and implementation of DOLIB (Distributed Object Library), a library of routines that emulates global or virtual shared memory on Intel multiprocessor systems. Access to a distributed global array is through explicit calls to gather and scatter. Advantages of using DOLIB include: dynamic allocation and freeing of huge (gigabyte) distributed arrays, both C and FORTRAN callable interfaces, and the ability to mix shared-memory and message-passing programming models for ease of use and optimal performance. DOLIB is independent of language and compiler extensions and requires no special operating system support. DOLIB also supports automatic caching of read-only data for high performance. The virtual shared memory support provided in DOLIB is well suited for implementing Lagrangian particle tracking techniques. We have also used DOLIB to create DONIO (Distributed Object Network I/O Library), which obtains over a 10-fold improvement in disk I/O performance on the Intel Paragon.

  18. Financing Distributed Generation

    International Nuclear Information System (INIS)

    Walker, A.

    2001-01-01

    This paper introduces the engineer who is undertaking distributed generation projects to a wide range of financing options. Distributed generation systems (such as internal combustion engines, small gas turbines, fuel cells and photovoltaics) all require an initial investment, which is recovered over time through revenues or savings. An understanding of the cost of capital and financing structures helps the engineer develop realistic expectations and not be offended by the common requirements of financing organizations. This paper discusses several mechanisms for financing distributed generation projects: appropriations; debt (commercial bank loan); mortgage; home equity loan; limited partnership; vendor financing; general obligation bond; revenue bond; lease; Energy Savings Performance Contract; utility programs; chauffage (end-use purchase); and grants. The paper also discusses financial strategies for businesses focusing on distributed generation: venture capital; informal investors (''business angels''); bank and debt financing; and the stock market

  19. Tradeoffs in distributed databases

    OpenAIRE

    Juntunen, R. (Risto)

    2016-01-01

    Abstract In a distributed database data is spread throughout the network into separated nodes with different DBMS systems (Date, 2000). According to CAP-theorem three database properties — consistency, availability and partition tolerance cannot be achieved simultaneously in distributed database systems. Two of these properties can be achieved but not all three at the same time (Brewer, 2000). Since this theorem there has b...

  20. Distributed generation hits market

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    The pace at which vendors are developing and marketing gas turbines and reciprocating engines for small-scale applications may signal the widespread growth of distributed generation. Loosely defined to refer to applications in which power generation equipment is located close to end users who have near-term power capacity needs, distributed generation encompasses a broad range of technologies and load requirements. Disagreement is inevitable, but many industry observers associate distributed generation with applications anywhere from 25 kW to 25 MW. Ten years ago, distributed generation users only represented about 2% of the world market. Today, that figure has increased to about 4 or 5%, and probably could settle in the 20% range within a 3-to-5-year period, according to Michael Jones, San Diego, Calif.-based Solar Turbines Inc. power generation marketing manager. The US Energy Information Administration predicts about 175 GW of generation capacity will be added domestically by 2010. If 20% comes from smaller plants, distributed generation could account for about 35 GW. Even with more competition, it's highly unlikely distributed generation will totally replace current market structures and central stations. Distributed generation may be best suited for making market inroads when and where central systems need upgrading, and should prove its worth when the system can't handle peak demands. Typical applications include small reciprocating engine generators at remote customer sites or larger gas turbines to boost the grid. Additional market opportunities include standby capacity, peak shaving, power quality, cogeneration and capacity rental for immediate demand requirements. Integration of distributed generation systems--using gas-fueled engines, gas-fired combustion engines and fuel cells--can upgrade power quality for customers and reduce operating costs for electric utilities

  1. Tourism distribution channels

    OpenAIRE

    Camilleri, Mark Anthony

    2017-01-01

    The distribution channels link the customers with the businesses. For many years, the tourism businesses may have distributed their products and services through intermediaries. However, the latest advances in technology have brought significant changes in this regard. More individuals and corporate customers are increasingly benefiting of ubiquitous technologies, including digital media. The development of mobile devices and their applications, are offering a wide range of possibilities to t...

  2. Diphoton generalized distribution amplitudes

    International Nuclear Information System (INIS)

    El Beiyad, M.; Pire, B.; Szymanowski, L.; Wallon, S.

    2008-01-01

    We calculate the leading order diphoton generalized distribution amplitudes by calculating the amplitude of the process γ*γ→γγ in the low energy and high photon virtuality region at the Born order and in the leading logarithmic approximation. As in the case of the anomalous photon structure functions, the γγ generalized distribution amplitudes exhibit a characteristic lnQ 2 behavior and obey inhomogeneous QCD evolution equations.

  3. Distributed password cracking

    OpenAIRE

    Crumpacker, John R.

    2009-01-01

    Approved for public release, distribution unlimited Password cracking requires significant processing power, which in today's world is located at a workstation or home in the form of a desktop computer. Berkeley Open Infrastructure for Network Computing (BOINC) is the conduit to this significant source of processing power and John the Ripper is the key. BOINC is a distributed data processing system that incorporates client-server relationships to generically process data. The BOINC structu...

  4. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  5. TensorFlow Distributions

    OpenAIRE

    Dillon, Joshua V.; Langmore, Ian; Tran, Dustin; Brevdo, Eugene; Vasudevan, Srinivas; Moore, Dave; Patton, Brian; Alemi, Alex; Hoffman, Matt; Saurous, Rif A.

    2017-01-01

    The TensorFlow Distributions library implements a vision of probability theory adapted to the modern deep-learning paradigm of end-to-end differentiable computation. Building on two basic abstractions, it offers flexible building blocks for probabilistic computation. Distributions provide fast, numerically stable methods for generating samples and computing statistics, e.g., log density. Bijectors provide composable volume-tracking transformations with automatic caching. Together these enable...

  6. Intelligent distributed computing

    CERN Document Server

    Thampi, Sabu

    2015-01-01

    This book contains a selection of refereed and revised papers of the Intelligent Distributed Computing Track originally presented at the third International Symposium on Intelligent Informatics (ISI-2014), September 24-27, 2014, Delhi, India.  The papers selected for this Track cover several Distributed Computing and related topics including Peer-to-Peer Networks, Cloud Computing, Mobile Clouds, Wireless Sensor Networks, and their applications.

  7. Parton Distributions Working Group

    International Nuclear Information System (INIS)

    Barbaro, L. de; Keller, S. A.; Kuhlmann, S.; Schellman, H.; Tung, W.-K.

    2000-01-01

    This report summarizes the activities of the Parton Distributions Working Group of the QCD and Weak Boson Physics workshop held in preparation for Run II at the Fermilab Tevatron. The main focus of this working group was to investigate the different issues associated with the development of quantitative tools to estimate parton distribution functions uncertainties. In the conclusion, the authors introduce a Manifesto that describes an optimal method for reporting data

  8. Distribution System Pricing with Distributed Energy Resources

    Energy Technology Data Exchange (ETDEWEB)

    Hledik, Ryan [The Brattle Group, Cambridge, MA (United States); Lazar, Jim [The Regulatory Assistance Project, Montpelier, VT (United States); Schwartz, Lisa [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2017-08-16

    Technological changes in the electric utility industry bring tremendous opportunities and significant challenges. Customers are installing clean sources of on-site generation such as rooftop solar photovoltaic (PV) systems. At the same time, smart appliances and control systems that can communicate with the grid are entering the retail market. Among the opportunities these changes create are a cleaner and more diverse power system, the ability to improve system reliability and system resilience, and the potential for lower total costs. Challenges include integrating these new resources in a way that maintains system reliability, provides an equitable sharing of system costs, and avoids unbalanced impacts on different groups of customers, including those who install distributed energy resources (DERs) and low-income households who may be the least able to afford the transition.

  9. Vaginal drug distribution modeling.

    Science.gov (United States)

    Katz, David F; Yuan, Andrew; Gao, Yajing

    2015-09-15

    This review presents and applies fundamental mass transport theory describing the diffusion and convection driven mass transport of drugs to the vaginal environment. It considers sources of variability in the predictions of the models. It illustrates use of model predictions of microbicide drug concentration distribution (pharmacokinetics) to gain insights about drug effectiveness in preventing HIV infection (pharmacodynamics). The modeling compares vaginal drug distributions after different gel dosage regimens, and it evaluates consequences of changes in gel viscosity due to aging. It compares vaginal mucosal concentration distributions of drugs delivered by gels vs. intravaginal rings. Finally, the modeling approach is used to compare vaginal drug distributions across species with differing vaginal dimensions. Deterministic models of drug mass transport into and throughout the vaginal environment can provide critical insights about the mechanisms and determinants of such transport. This knowledge, and the methodology that obtains it, can be applied and translated to multiple applications, involving the scientific underpinnings of vaginal drug distribution and the performance evaluation and design of products, and their dosage regimens, that achieve it. Copyright © 2015 Elsevier B.V. All rights reserved.

  10. Sparse distributed memory overview

    Science.gov (United States)

    Raugh, Mike

    1990-01-01

    The Sparse Distributed Memory (SDM) project is investigating the theory and applications of massively parallel computing architecture, called sparse distributed memory, that will support the storage and retrieval of sensory and motor patterns characteristic of autonomous systems. The immediate objectives of the project are centered in studies of the memory itself and in the use of the memory to solve problems in speech, vision, and robotics. Investigation of methods for encoding sensory data is an important part of the research. Examples of NASA missions that may benefit from this work are Space Station, planetary rovers, and solar exploration. Sparse distributed memory offers promising technology for systems that must learn through experience and be capable of adapting to new circumstances, and for operating any large complex system requiring automatic monitoring and control. Sparse distributed memory is a massively parallel architecture motivated by efforts to understand how the human brain works. Sparse distributed memory is an associative memory, able to retrieve information from cues that only partially match patterns stored in the memory. It is able to store long temporal sequences derived from the behavior of a complex system, such as progressive records of the system's sensory data and correlated records of the system's motor controls.

  11. Distributed processor systems

    International Nuclear Information System (INIS)

    Zacharov, B.

    1976-01-01

    In recent years, there has been a growing tendency in high-energy physics and in other fields to solve computational problems by distributing tasks among the resources of inter-coupled processing devices and associated system elements. This trend has gained further momentum more recently with the increased availability of low-cost processors and with the development of the means of data distribution. In two lectures, the broad question of distributed computing systems is examined and the historical development of such systems reviewed. An attempt is made to examine the reasons for the existence of these systems and to discern the main trends for the future. The components of distributed systems are discussed in some detail and particular emphasis is placed on the importance of standards and conventions in certain key system components. The ideas and principles of distributed systems are discussed in general terms, but these are illustrated by a number of concrete examples drawn from the context of the high-energy physics environment. (Auth.)

  12. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices

    Directory of Open Access Journals (Sweden)

    Hwankuk Kim

    2018-05-01

    Full Text Available Since 2016, Mirai and Persirai malware have infected hundreds of thousands of Internet of Things (IoT devices and created a massive IoT botnet, which caused distributed denial of service (DDoS attacks. IoT malware targets vulnerable IoT devices, which are vulnerable to security risks. Techniques are needed to prevent IoT devices from being exploited by attackers. However, unlike high-performance PCs, IoT devices are lightweight, low-power, and low-cost, having performance limitations regarding processing and memory, which makes it difficult to install security and anti-malware programs. Recently, several studies have been attempted to quickly search for vulnerable internet-connected devices to solve this real issue. Issues yet to be studied still exist regarding these types of internet-wide scan technologies, such as filtering by security devices and a shortage of collected operating system (OS information. This paper proposes an intelligent internet-wide scan model that improves IP state scanning with advanced internet protocol (IP randomization, reactive protocol (port scanning, and OS fingerprinting scanning, applying k* algorithm in order to find vulnerable IoT devices. Additionally, we describe the experiment’s results compared to the existing internet-wide scan technologies, such as ZMap and Shodan. As a result, the proposed model experimentally shows improved performance. Although we improved the ZMap, the throughput per minute (TPM performance is similar to ZMap without degrading the IP scan throughput and the performance of generating a single IP address is about 118% better than ZMap. In the protocol scan performance experiments, it is about 129% better than the Censys based ZMap, and the performance of OS fingerprinting is better than ZMap, with about 50% accuracy.

  13. A New Distribution-Random Limit Normal Distribution

    OpenAIRE

    Gong, Xiaolin; Yang, Shuzhen

    2013-01-01

    This paper introduces a new distribution to improve tail risk modeling. Based on the classical normal distribution, we define a new distribution by a series of heat equations. Then, we use market data to verify our model.

  14. A distribution network review

    Energy Technology Data Exchange (ETDEWEB)

    Fairbairn, R.J.; Maunder, D.; Kenyon, P.

    1999-07-01

    This report summarises the findings of a study reviewing the distribution network in England, Scotland and Wales to evaluate its ability to accommodate more embedded generation from both fossil fuel and renewable energy sources. The background to the study is traced, and descriptions of the existing electricity supply system, the licence conditions relating to embedded generation, and the effects of the Review of Electricity Trading Arrangements are given. The ability of the UK distribution networks to accept embedded generation is examined, and technical benefits/drawbacks arising from embedded generation, and the potential for uptake of embedded generation technologies are considered. The distribution network capacity and the potential uptake of embedded generation are compared, and possible solutions to overcome obstacles are suggested. (UK)

  15. A distribution network review

    International Nuclear Information System (INIS)

    Fairbairn, R.J.; Maunder, D.; Kenyon, P.

    1999-01-01

    This report summarises the findings of a study reviewing the distribution network in England, Scotland and Wales to evaluate its ability to accommodate more embedded generation from both fossil fuel and renewable energy sources. The background to the study is traced, and descriptions of the existing electricity supply system, the licence conditions relating to embedded generation, and the effects of the Review of Electricity Trading Arrangements are given. The ability of the UK distribution networks to accept embedded generation is examined, and technical benefits/drawbacks arising from embedded generation, and the potential for uptake of embedded generation technologies are considered. The distribution network capacity and the potential uptake of embedded generation are compared, and possible solutions to overcome obstacles are suggested. (UK)

  16. Distributed Robotics Education

    DEFF Research Database (Denmark)

    Lund, Henrik Hautop; Pagliarini, Luigi

    2011-01-01

    Distributed robotics takes many forms, for instance, multirobots, modular robots, and self-reconfigurable robots. The understanding and development of such advanced robotic systems demand extensive knowledge in engineering and computer science. In this paper, we describe the concept of a distribu......Distributed robotics takes many forms, for instance, multirobots, modular robots, and self-reconfigurable robots. The understanding and development of such advanced robotic systems demand extensive knowledge in engineering and computer science. In this paper, we describe the concept...... to be changed, related to multirobot control and human-robot interaction control from virtual to physical representation. The proposed system is valuable for bringing a vast number of issues into education – such as parallel programming, distribution, communication protocols, master dependency, connectivity...

  17. Industrial power distribution

    CERN Document Server

    Fehr, Ralph

    2016-01-01

    In this fully updated version of Industrial Power Distribution, the author addresses key areas of electric power distribution from an end-user perspective for both electrical engineers, as well as students who are training for a career in the electrical power engineering field. Industrial Power Distribution, Second Edition, begins by describing how industrial facilities are supplied from utility sources, which is supported with background information on the components of AC power, voltage drop calculations, and the sizing of conductors and transformers. Important concepts and discussions are featured throughout the book including those for sequence networks, ladder logic, motor application, fault calculations, and transformer connections. The book concludes with an introduction to power quality, how it affects industrial power systems, and an expansion of the concept of power factor, including a distortion term made necessary by the existence of harmonic.

  18. Advanced air distribution

    DEFF Research Database (Denmark)

    Melikov, Arsen Krikor

    2011-01-01

    The aim of total volume air distribution (TVAD) involves achieving uniform temperature and velocity in the occupied zone and environment designed for an average occupant. The supply of large amounts of clean and cool air are needed to maintain temperature and pollution concentration at acceptable...... levels in the entire space, leading to increased energy consumption and the use of large and costly HVAC and duct systems. The performance of desk installed PV combined with background TVAD used for room temperature control has been studied in an office building located in a hot and humid climate....... Ventilation in hospitals is essential to decrease the risk of airborne cross-infection. At present, mixing air distribution at a minimum of 12 ach is used in infection wards. Advanced air distribution has the potential to aid in achieving healthy, comfortable and productive indoor environments at levels...

  19. Electricity Distribution Effectiveness

    Directory of Open Access Journals (Sweden)

    Waldemar Szpyra

    2015-12-01

    Full Text Available This paper discusses the basic concepts of cost accounting in the power industry and selected ways of assessing the effectiveness of electricity distribution. The results of effectiveness analysis of MV/LV distribution transformer replacement are presented, and unit costs of energy transmission through various medium-voltage line types are compared. The calculation results confirm the viability of replacing transformers manufactured before 1975. Replacing transformers manufactured after 1975 – only to reduce energy losses – is not economically justified. Increasing use of a PAS type line for energy transmission in local distribution networks is reasonable. Cabling these networks under the current calculation rules of discounts for excessive power outages is not viable, even in areas particularly exposed to catastrophic wire icing.

  20. ATLAS Distributed Computing

    CERN Document Server

    Schovancova, J; The ATLAS collaboration

    2011-01-01

    The poster details the different aspects of the ATLAS Distributed Computing experience after the first year of LHC data taking. We describe the performance of the ATLAS distributed computing system and the lessons learned during the 2010 run, pointing out parts of the system which were in a good shape, and also spotting areas which required improvements. Improvements ranged from hardware upgrade on the ATLAS Tier-0 computing pools to improve data distribution rates, tuning of FTS channels between CERN and Tier-1s, and studying data access patterns for Grid analysis to improve the global processing rate. We show recent software development driven by operational needs with emphasis on data management and job execution in the ATLAS production system.

  1. Distributed Wind Market Applications

    Energy Technology Data Exchange (ETDEWEB)

    Forsyth, T.; Baring-Gould, I.

    2007-11-01

    Distributed wind energy systems provide clean, renewable power for on-site use and help relieve pressure on the power grid while providing jobs and contributing to energy security for homes, farms, schools, factories, private and public facilities, distribution utilities, and remote locations. America pioneered small wind technology in the 1920s, and it is the only renewable energy industry segment that the United States still dominates in technology, manufacturing, and world market share. The series of analyses covered by this report were conducted to assess some of the most likely ways that advanced wind turbines could be utilized apart from large, central station power systems. Each chapter represents a final report on specific market segments written by leading experts in this field. As such, this document does not speak with one voice but rather a compendium of different perspectives, which are documented from a variety of people in the U.S. distributed wind field.

  2. Distributed Problem-Solving

    DEFF Research Database (Denmark)

    Chemi, Tatiana

    2016-01-01

    This chapter aims to deconstruct some persistent myths about creativity: the myth of individualism and of the genius. By looking at literature that approaches creativity as a participatory and distributed phenomenon and by bringing empirical evidence from artists’ studios, the author presents a p......, what can educators at higher education learn from the ways creative groups solve problems? How can artists contribute to inspiring higher education?......This chapter aims to deconstruct some persistent myths about creativity: the myth of individualism and of the genius. By looking at literature that approaches creativity as a participatory and distributed phenomenon and by bringing empirical evidence from artists’ studios, the author presents...... a perspective that is relevant to higher education. The focus here is on how artists solve problems in distributed paths, and on the elements of creative collaboration. Creative problem-solving will be looked at as an ongoing dialogue that artists engage with themselves, with others, with recipients...

  3. Distributed Web Service Repository

    Directory of Open Access Journals (Sweden)

    Piotr Nawrocki

    2015-01-01

    Full Text Available The increasing availability and popularity of computer systems has resulted in a demand for new, language- and platform-independent ways of data exchange. That demand has in turn led to a significant growth in the importance of systems based on Web services. Alongside the growing number of systems accessible via Web services came the need for specialized data repositories that could offer effective means of searching of available services. The development of mobile systems and wireless data transmission technologies has allowed the use of distributed devices and computer systems on a greater scale. The accelerating growth of distributed systems might be a good reason to consider the development of distributed Web service repositories with built-in mechanisms for data migration and synchronization.

  4. Remote entanglement distribution

    International Nuclear Information System (INIS)

    Sanders, B.C.; Gour, G.; Meyer, D.A.

    2005-01-01

    Full text: Shared bipartite entanglement is a crucial shared resource for many quantum information tasks such as teleportation, entanglement swapping, and remote state preparation. In general different nodes of a quantum network share an entanglement resource, such as ebits, that are consumed during the task. In practice, generating entangled states is expensive, but here we establish a protocol by which a quantum network requires only a single supplier of entanglement to all nodes who, by judicious measurements and classical communication, provides the nodes with a unique pair wise entangled state independent of the measurement outcome. Furthermore, we extend this result to a chain of suppliers and nodes, which enables an operational interpretation of concurrence. In the special case that the supplier shares bipartite states with two nodes, and such states are pure and maximally entangled, our protocol corresponds to entanglement swapping. However, in the practical case that initial shared entanglement between suppliers and nodes involves partially entangled or mixed states, we show that general local operations and classical communication by all parties (suppliers and nodes) yields distributions of entangled states between nodes. In general a distribution of bipartite entangled states between any two nodes will include states that do not have the same entanglement; thus we name this general process remote entanglement distribution. In our terminology entanglement swapping with partially entangled states is a particular class of remote entanglement distribution protocols. Here we identify which distributions of states that can or cannot be created by remote entanglement distribution. In particular we prove a powerful theorem that establishes an upper bound on the entanglement of formation that can be produced between two qubit nodes. We extend this result to the case of a linear chain of parties that play the roles of suppliers and nodes; this extension provides

  5. Nuclear parton distributions

    Directory of Open Access Journals (Sweden)

    Kulagin S. A.

    2017-01-01

    Full Text Available We review a microscopic model of the nuclear parton distribution functions, which accounts for a number of nuclear effects including Fermi motion and nuclear binding, nuclear meson-exchange currents, off-shell corrections to bound nucleon distributions and nuclear shadowing. We also discuss applications of this model to a number of processes including lepton-nucleus deep inelastic scattering, proton-nucleus Drell-Yan lepton pair production at Fermilab, as well as W± and Z0 boson production in proton-lead collisions at the LHC.

  6. Securing Distributed Research

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.

  7. Rayleigh Pareto Distribution

    Directory of Open Access Journals (Sweden)

    Kareema ‎ Abed Al-Kadim

    2017-12-01

    Full Text Available In this paper Rayleigh Pareto distribution have  introduced denote by( R_PD. We stated some  useful functions. Therefor  we  give some of its properties like the entropy function, mean, mode, median , variance , the r-th moment about the mean, the rth moment about the origin, reliability, hazard functions, coefficients of variation, of sekeness and of kurtosis. Finally, we estimate the parameters  so the aim of this search  is to introduce a new distribution

  8. A Distributed Tier-1

    DEFF Research Database (Denmark)

    Fischer, Lars; Grønager, Michael; Kleist, Josva

    2008-01-01

    The Tier-1 facility operated by the Nordic DataGrid Facility (NDGF) differs significantly from other Tier-1s in several aspects: firstly, it is not located at one or a few premises, but instead is distributed throughout the Nordic countries; secondly, it is not under the governance of a single...... organization but instead is a meta-center built of resources under the control of a number of different national organizations. We present some technical implications of these aspects as well as the high-level design of this distributed Tier-1. The focus will be on computing services, storage and monitoring....

  9. Reconfiguration of distribution nets

    International Nuclear Information System (INIS)

    Latorre Bayona, Gerardo; Angarita Marquez, Jorge Luis

    2000-01-01

    Starting of the location of the reconfiguration problem inside the context of the operation of distribution nets, of the quality indicators definition and of the presentation of the alternatives more used for reduction of technical losses, they are related diverse reconfiguration methodologies proposed in the technical literature, pointing out their three principals limitations; also are presents the results of lost obtained starting from simulation works carried out in distribution circuits of the ESSA ESP, which permitting to postulate the reconfiguration of nets like an excellent alternative to reduce technical losses

  10. A distributed Tier-1

    Science.gov (United States)

    Fischer, L.; Grønager, M.; Kleist, J.; Smirnova, O.

    2008-07-01

    The Tier-1 facility operated by the Nordic DataGrid Facility (NDGF) differs significantly from other Tier-1s in several aspects: firstly, it is not located at one or a few premises, but instead is distributed throughout the Nordic countries; secondly, it is not under the governance of a single organization but instead is a meta-center built of resources under the control of a number of different national organizations. We present some technical implications of these aspects as well as the high-level design of this distributed Tier-1. The focus will be on computing services, storage and monitoring.

  11. Liquidity, welfare and distribution

    Directory of Open Access Journals (Sweden)

    Martín Gil Samuel

    2012-01-01

    Full Text Available This work presents a dynamic general equilibrium model where wealth distribution is endogenous. I provide channels of causality that suggest a complex relationship between financial markets and the real activity which breaks down the classical dichotomy. As a consequence, the Friedman rule does not hold. In terms of the current events taking place in the world economy, this paper provides a rationale to advert against the perils of an economy satiated with liquidity. Efficiency and distribution cannot thus be considered as separate attributes once we account for the interactions between financial markets and the economic performance.

  12. Distributed photovoltaic grid transformers

    CERN Document Server

    Shertukde, Hemchandra Madhusudan

    2014-01-01

    The demand for alternative energy sources fuels the need for electric power and controls engineers to possess a practical understanding of transformers suitable for solar energy. Meeting that need, Distributed Photovoltaic Grid Transformers begins by explaining the basic theory behind transformers in the solar power arena, and then progresses to describe the development, manufacture, and sale of distributed photovoltaic (PV) grid transformers, which help boost the electric DC voltage (generally at 30 volts) harnessed by a PV panel to a higher level (generally at 115 volts or higher) once it is

  13. AFRREV IJAH, Vol.1 (3) July, 2012

    African Journals Online (AJOL)

    Dr Abimbola

    denial of sacraments extends to denial of funeral Mass. Again, ... The Roman Catholics generously distributed medicines thereby upsetting the. CMS by ... names to attract membership as we hear today of cross over night service, anointing ...

  14. Gap length distributions by PEPR

    International Nuclear Information System (INIS)

    Warszawer, T.N.

    1980-01-01

    Conditions guaranteeing exponential gap length distributions are formulated and discussed. Exponential gap length distributions of bubble chamber tracks first obtained on a CRT device are presented. Distributions of resulting average gap lengths and their velocity dependence are discussed. (orig.)

  15. A distributed multimedia toolbox

    NARCIS (Netherlands)

    Scholten, Johan; Jansen, P.G.

    1997-01-01

    Emphasis of our research lies on the application of realtime multimedia technology: tele-teaching, teleconferencing and collaborative work. To support this research we need a real-time environment that supports rapid prototyping of distributed multimedia applications. Because other systems were not

  16. Distributed Parameter Modelling Applications

    DEFF Research Database (Denmark)

    Sales-Cruz, Mauricio; Cameron, Ian; Gani, Rafiqul

    2011-01-01

    and the development of a short-path evaporator. The oil shale processing problem illustrates the interplay amongst particle flows in rotating drums, heat and mass transfer between solid and gas phases. The industrial application considers the dynamics of an Alberta-Taciuk processor, commonly used in shale oil and oil...... the steady state, distributed behaviour of a short-path evaporator....

  17. A MULTIVARIATE WEIBULL DISTRIBUTION

    Directory of Open Access Journals (Sweden)

    Cheng Lee

    2010-07-01

    Full Text Available A multivariate survival function of Weibull Distribution is developed by expanding the theorem by Lu and Bhattacharyya. From the survival function, the probability density function, the cumulative probability function, the determinant of the Jacobian Matrix, and the general moment are derived.

  18. Distribution center consolidation games

    NARCIS (Netherlands)

    Klijn, F.; Slikker, M.

    2005-01-01

    We study a location-inventory model to analyze the impact of consolidation of distribution centers on facility and inventory costs. We introduce a cooperative game and show that when demand processes are i.i.d. the core is non-empty, i.e., consolidation allows for a stable division of the minimal

  19. Distributed Digital Book

    Directory of Open Access Journals (Sweden)

    Mario Žagar

    2006-06-01

    Full Text Available Concept of distributed digital book (DDB based on the XML is proposed. The author's side as well as the reader's side are analyzed. Different book modules and their frameworks are defined. Module design tools are proposed. Practical solution with appropriate examples is shown.

  20. Distributed Systems 3/e

    NARCIS (Netherlands)

    Tanenbaum, A.S.; van Steen, M.R.

    2016-01-01

    For this third edition of "Distributed Systems," the material has been thoroughly revised and extended, integrating principles and paradigms into nine chapters: 1. Introduction 2. Architectures 3. Processes 4. Communication 5. Naming 6. Coordination 7. Replication 8. Fault tolerance 9. Security A

  1. Enabling distributed petascale science

    International Nuclear Information System (INIS)

    Baranovski, Andrew; Bharathi, Shishir; Bresnahan, John

    2007-01-01

    Petascale science is an end-to-end endeavour, involving not only the creation of massive datasets at supercomputers or experimental facilities, but the subsequent analysis of that data by a user community that may be distributed across many laboratories and universities. The new SciDAC Center for Enabling Distributed Petascale Science (CEDPS) is developing tools to support this end-to-end process. These tools include data placement services for the reliable, high-performance, secure, and policy-driven placement of data within a distributed science environment; tools and techniques for the construction, operation, and provisioning of scalable science services; and tools for the detection and diagnosis of failures in end-to-end data placement and distributed application hosting configurations. In each area, we build on a strong base of existing technology and have made useful progress in the first year of the project. For example, we have recently achieved order-of-magnitude improvements in transfer times (for lots of small files) and implemented asynchronous data staging capabilities; demonstrated dynamic deployment of complex application stacks for the STAR experiment; and designed and deployed end-to-end troubleshooting services. We look forward to working with SciDAC application and technology projects to realize the promise of petascale science

  2. Hyperfinite representation of distributions

    Indian Academy of Sciences (India)

    A nonstandard treatment of the theory of distributions in terms of a hyperfinite representa- ... is an (internal) hyperfinite set of hyperreal numbers with internal cardinality 2. ..... The factor space ΠgI ΠDIauI is a C-vector space which may be.

  3. LHC Power Distribution

    CERN Document Server

    Pedersen, J

    1999-01-01

    The power distribution for the LHC machine and its experiments will be realised making extensive use of the existing infrastructure for the LEP. The overall power requirement is approximately the same, about 125 MW. The load distribution will however change. The even points will loose in importance and the points 1 and 5 will, due to the installation of ATLAS and CMS, gain. A thorough reorganisation of the 18 kV distribution will thus be necessary. Due to the important cryogenic installations required for the LHC, the 3.3 kV distribution system, supplying mainly cryogenic compressors, will be extended with a number of new substations. The important number of new surface buildings, underground caverns and other underground structures all will receive general service installations: Lighting and power. The new injection tunnels will require complete installations: A.C. supplies for the power converters and for general service, and D.C. cabling for the magnets of the beam line. Special safe power installations ar...

  4. Two Photon Distribution Amplitudes

    International Nuclear Information System (INIS)

    El Beiyad, M.; Pire, B.; Szymanowski, L.; Wallon, S.

    2008-01-01

    The factorization of the amplitude of the process γ*γ→γγ in the low energy and high photon virtuality region is demonstrated at the Born order and in the leading logarithmic approximation. The leading order two photon (generalized) distribution amplitudes exhibit a characteristic ln Q 2 behaviour and obey new inhomogeneous evolution equations

  5. Plutonium valence state distributions

    International Nuclear Information System (INIS)

    Silver, G.L.

    1974-01-01

    A calculational method for ascertaining equilibrium valence state distributions of plutonium in acid solutions as a function of the plutonium oxidation number and the solution acidity is illustrated with an example. The method may be more practical for manual use than methods based upon polynomial equations. (T.G.)

  6. Distributed Treatment Systems.

    Science.gov (United States)

    Zgonc, David; Plante, Luke

    2017-10-01

    This section presents a review of the literature published in 2016 on topics relating to distributed treatment systems. This review is divided into the following sections with multiple subsections under each: constituent removal; treatment technologies; and planning and treatment system management.

  7. Tensions in Distributed Leadership

    Science.gov (United States)

    Ho, Jeanne; Ng, David

    2017-01-01

    Purpose: This article proposes the utility of using activity theory as an analytical lens to examine the theoretical construct of distributed leadership, specifically to illuminate tensions encountered by leaders and how they resolved these tensions. Research Method: The study adopted the naturalistic inquiry approach of a case study of an…

  8. Distributed intelligence at CELLO

    International Nuclear Information System (INIS)

    Boer, W. de

    1981-01-01

    This paper describes the use of distributed intelligence at CELLO, a large 4π detector at PETRA. Besides special purpose hardware processors for online calibration and reformatting of data, several microcomputers are used for monitoring and testing the various detector components. (orig.)

  9. On dose distribution comparison

    International Nuclear Information System (INIS)

    Jiang, Steve B; Sharp, Greg C; Neicu, Toni; Berbeco, Ross I; Flampouri, Stella; Bortfeld, Thomas

    2006-01-01

    In radiotherapy practice, one often needs to compare two dose distributions. Especially with the wide clinical implementation of intensity-modulated radiation therapy, software tools for quantitative dose (or fluence) distribution comparison are required for patient-specific quality assurance. Dose distribution comparison is not a trivial task since it has to be performed in both dose and spatial domains in order to be clinically relevant. Each of the existing comparison methods has its own strengths and weaknesses and there is room for improvement. In this work, we developed a general framework for comparing dose distributions. Using a new concept called maximum allowed dose difference (MADD), the comparison in both dose and spatial domains can be performed entirely in the dose domain. Formulae for calculating MADD values for various comparison methods, such as composite analysis and gamma index, have been derived. For convenience in clinical practice, a new measure called normalized dose difference (NDD) has also been proposed, which is the dose difference at a point scaled by the ratio of MADD to the predetermined dose acceptance tolerance. Unlike the simple dose difference test, NDD works in both low and high dose gradient regions because it considers both dose and spatial acceptance tolerances through MADD. The new method has been applied to a test case and a clinical example. It was found that the new method combines the merits of the existing methods (accurate, simple, clinically intuitive and insensitive to dose grid size) and can easily be implemented into any dose/intensity comparison tool

  10. World distribution of Owlaholics

    Science.gov (United States)

    Heimo Mikkola

    1997-01-01

    Owlaholics are people who collect anything with an owl on it. This paper gives the most common reasons how and why people become addicted to owls and shows their known distribution. Although thousands of owl collectors and enthusiasts reside all over the world, the majority live in Europe and the United States. While no evidence exists of owl collecting clubs in Latin...

  11. Multiagent distributed watershed management

    Science.gov (United States)

    Giuliani, M.; Castelletti, A.; Amigoni, F.; Cai, X.

    2012-04-01

    Deregulation and democratization of water along with increasing environmental awareness are challenging integrated water resources planning and management worldwide. The traditional centralized approach to water management, as described in much of water resources literature, is often unfeasible in most of the modern social and institutional contexts. Thus it should be reconsidered from a more realistic and distributed perspective, in order to account for the presence of multiple and often independent Decision Makers (DMs) and many conflicting stakeholders. Game theory based approaches are often used to study these situations of conflict (Madani, 2010), but they are limited to a descriptive perspective. Multiagent systems (see Wooldridge, 2009), instead, seem to be a more suitable paradigm because they naturally allow to represent a set of self-interested agents (DMs and/or stakeholders) acting in a distributed decision process at the agent level, resulting in a promising compromise alternative between the ideal centralized solution and the actual uncoordinated practices. Casting a water management problem in a multiagent framework allows to exploit the techniques and methods that are already available in this field for solving distributed optimization problems. In particular, in Distributed Constraint Satisfaction Problems (DCSP, see Yokoo et al., 2000), each agent controls some variables according to his own utility function but has to satisfy inter-agent constraints; while in Distributed Constraint Optimization Problems (DCOP, see Modi et al., 2005), the problem is generalized by introducing a global objective function to be optimized that requires a coordination mechanism between the agents. In this work, we apply a DCSP-DCOP based approach to model a steady state hypothetical watershed management problem (Yang et al., 2009), involving several active human agents (i.e. agents who make decisions) and reactive ecological agents (i.e. agents representing

  12. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Jaerventausta, P; Verho, P; Kaerenlampi, M; Pitkaenen, M [Tampere Univ. of Technology (Finland); Partanen, J [Lappeenranta Univ. of Technology (Finland)

    1998-08-01

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion to the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. Nowadays the SCADA is the main computer system (and often the only) in the control center. However, the information displayed by the SCADA is often inadequate, and several tasks cannot be solved by a conventional SCADA system. A need for new computer applications in control center arises from the insufficiency of the SCADA and some other trends. The latter means that the overall importance of the distribution networks is increasing. The slowing down of load-growth has often made network reinforcements unprofitable. Thus the existing network must be operated more efficiently. At the same time larger distribution areas are for economical reasons being monitored at one control center and the size of the operation staff is decreasing. The quality of supply requirements are also becoming stricter. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the

  13. Summer Steelhead Distribution [ds341

    Data.gov (United States)

    California Natural Resource Agency — Summer Steelhead Distribution October 2009 Version This dataset depicts observation-based stream-level geographic distribution of anadromous summer-run steelhead...

  14. The distributional properties of the family of logistic distributions ...

    African Journals Online (AJOL)

    The distributional properties of half logistic distribution and Type I generalized logistic distribution were studied, bringing out the L-moments (up to order four) of each of these. Skewness and Kurtosis were obtained. Keywords: Logistic distribution, L-moments ...

  15. Transmuted Complementary Weibull Geometric Distribution

    Directory of Open Access Journals (Sweden)

    Ahmed Z. A…fify

    2014-12-01

    Full Text Available This paper provides a new generalization of the complementary Weibull geometric distribution that introduced by Tojeiro et al. (2014, using the quadratic rank transmutation map studied by Shaw and Buckley (2007. The new distribution is referred to as transmuted complementary Weibull geometric distribution (TCWGD. The TCWG distribution includes as special cases the complementary Weibull geometric distribution (CWGD, complementary exponential geometric distribution(CEGD,Weibull distribution (WD and exponential distribution (ED. Various structural properties of the new distribution including moments, quantiles, moment generating function and RØnyi entropy of the subject distribution are derived. We proposed the method of maximum likelihood for estimating the model parameters and obtain the observed information matrix. A real data set are used to compare the ‡exibility of the transmuted version versus the complementary Weibull geometric distribution.

  16. Distribution view: a tool to write and simulate distributions

    OpenAIRE

    Coelho, José; Branco, Fernando; Oliveira, Teresa

    2006-01-01

    In our work we present a tool to write and simulate distributions. This tool allows to write mathematical expressions which can contain not only functions and variables, but also statistical distributions, including mixtures. Each time the expression is evaluated, for all inner distributions, is generated a value according to the distribution and is used for expression value determination. The inversion method can be used in this language, allowing to generate all distributions...

  17. Light Meson Distribution Amplitudes

    CERN Document Server

    Arthur, R.; Brommel, D.; Donnellan, M.A.; Flynn, J.M.; Juttner, A.; de Lima, H.Pedroso; Rae, T.D.; Sachrajda, C.T.; Samways, B.

    2010-01-01

    We calculated the first two moments of the light-cone distribution amplitudes for the pseudoscalar mesons ($\\pi$ and $K$) and the longitudinally polarised vector mesons ($\\rho$, $K^*$ and $\\phi$) as part of the UKQCD and RBC collaborations' $N_f=2+1$ domain-wall fermion phenomenology programme. These quantities were obtained with a good precision and, in particular, the expected effects of $SU(3)$-flavour symmetry breaking were observed. Operators were renormalised non-perturbatively and extrapolations to the physical point were made, guided by leading order chiral perturbation theory. The main results presented are for two volumes, $16^3\\times 32$ and $24^3\\times 64$, with a common lattice spacing. Preliminary results for a lattice with a finer lattice spacing, $32^3\\times64$, are discussed and a first look is taken at the use of twisted boundary conditions to extract distribution amplitudes.

  18. Bounding species distribution models

    Directory of Open Access Journals (Sweden)

    Thomas J. STOHLGREN, Catherine S. JARNEVICH, Wayne E. ESAIAS,Jeffrey T. MORISETTE

    2011-10-01

    Full Text Available Species distribution models are increasing in popularity for mapping suitable habitat for species of management concern. Many investigators now recognize that extrapolations of these models with geographic information systems (GIS might be sensitive to the environmental bounds of the data used in their development, yet there is no recommended best practice for “clamping” model extrapolations. We relied on two commonly used modeling approaches: classification and regression tree (CART and maximum entropy (Maxent models, and we tested a simple alteration of the model extrapolations, bounding extrapolations to the maximum and minimum values of primary environmental predictors, to provide a more realistic map of suitable habitat of hybridized Africanized honey bees in the southwestern United States. Findings suggest that multiple models of bounding, and the most conservative bounding of species distribution models, like those presented here, should probably replace the unbounded or loosely bounded techniques currently used [Current Zoology 57 (5: 642–647, 2011].

  19. Bounding Species Distribution Models

    Science.gov (United States)

    Stohlgren, Thomas J.; Jarnevich, Cahterine S.; Morisette, Jeffrey T.; Esaias, Wayne E.

    2011-01-01

    Species distribution models are increasing in popularity for mapping suitable habitat for species of management concern. Many investigators now recognize that extrapolations of these models with geographic information systems (GIS) might be sensitive to the environmental bounds of the data used in their development, yet there is no recommended best practice for "clamping" model extrapolations. We relied on two commonly used modeling approaches: classification and regression tree (CART) and maximum entropy (Maxent) models, and we tested a simple alteration of the model extrapolations, bounding extrapolations to the maximum and minimum values of primary environmental predictors, to provide a more realistic map of suitable habitat of hybridized Africanized honey bees in the southwestern United States. Findings suggest that multiple models of bounding, and the most conservative bounding of species distribution models, like those presented here, should probably replace the unbounded or loosely bounded techniques currently used [Current Zoology 57 (5): 642-647, 2011].

  20. DIRAC distributed computing services

    International Nuclear Information System (INIS)

    Tsaregorodtsev, A

    2014-01-01

    DIRAC Project provides a general-purpose framework for building distributed computing systems. It is used now in several HEP and astrophysics experiments as well as for user communities in other scientific domains. There is a large interest from smaller user communities to have a simple tool like DIRAC for accessing grid and other types of distributed computing resources. However, small experiments cannot afford to install and maintain dedicated services. Therefore, several grid infrastructure projects are providing DIRAC services for their respective user communities. These services are used for user tutorials as well as to help porting the applications to the grid for a practical day-to-day work. The services are giving access typically to several grid infrastructures as well as to standalone computing clusters accessible by the target user communities. In the paper we will present the experience of running DIRAC services provided by the France-Grilles NGI and other national grid infrastructure projects.

  1. Distribution load estimation (DLE)

    Energy Technology Data Exchange (ETDEWEB)

    Seppaelae, A; Lehtonen, M [VTT Energy, Espoo (Finland)

    1998-08-01

    The load research has produced customer class load models to convert the customers` annual energy consumption to hourly load values. The reliability of load models applied from a nation-wide sample is limited in any specific network because many local circumstances are different from utility to utility and time to time. Therefore there is a need to find improvements to the load models or, in general, improvements to the load estimates. In Distribution Load Estimation (DLE) the measurements from the network are utilized to improve the customer class load models. The results of DLE will be new load models that better correspond to the loading of the distribution network but are still close to the original load models obtained by load research. The principal data flow of DLE is presented

  2. Distributed picture compilation demonstration

    Science.gov (United States)

    Alexander, Richard; Anderson, John; Leal, Jeff; Mullin, David; Nicholson, David; Watson, Graham

    2004-08-01

    A physical demonstration of distributed surveillance and tracking is described. The demonstration environment is an outdoor car park overlooked by a system of four rooftop cameras. The cameras extract moving objects from the scene, and these objects are tracked in a decentralized way, over a real communication network, using the information form of the standard Kalman filter. Each node therefore has timely access to the complete global picture and because there is no single point of failure in the system, it is robust. The demonstration system and its main components are described here, with an emphasis on some of the lessons we have learned as a result of applying a corpus of distributed data fusion theory and algorithms in practice. Initial results are presented and future plans to scale up the network are also outlined.

  3. Managing Distributed Knowledge Systems

    DEFF Research Database (Denmark)

    Sørensen, Brian Vejrum; Gelbuda, Modestas

    2005-01-01

    . This paper contributes to the research on organizations as distributed knowledge systems by addressing two weaknesses of the social practice literature. Firstly, it downplays the importance of formal structure and organizational design and intervention efforts by key organizational members. Secondly, it does......The article argues that the growth of de novo knowledge-based organization depends on managing and coordinating increasingly growing and, therefore, distributed knowledge. Moreover, the growth in knowledge is often accompanied by an increasing organizational complexity, which is a result...... of integrating new people, building new units and adding activities to the existing organization. It is argued that knowledge is not a stable capacity that belongs to any actor alone, but that it is rather an ongoing social accomplishment, which is created and recreated as actors engage in mutual activities...

  4. Agile & Distributed Project Management

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene

    2011-01-01

    Scrum has gained surprising momentum as an agile IS project management approach. An obvious question is why Scrum is so useful? To answer that question we carried out a longitudinal study of a distributed project using Scrum. We analyzed the data using coding and categorisation and three carefully...... selected theoretical frameworks. Our conclusion in this paper is that Scrum is so useful because it provides effective communication in the form of boundary objects and boundary spanners, it provides effective social integration by building up social team capital, and it provides much needed control...... and coordination mechanisms by allowing both local and global articulation of work in the project. That is why Scrum is especially useful for distributed IS project management and teamwork....

  5. Air Distribution in Rooms

    DEFF Research Database (Denmark)

    Nielsen, Peter V.

    The research on air distribution in rooms is often done as full-size investigations, scale-model investigations or by Computational Fluid Dynamics (CFD). New activities have taken place within all three areas and this paper draws comparisons between the different methods. The outcome of the l......EA sponsored research "Air Flow Pattern within Buildings" is used for comparisons in some parts of the paper because various types of experiments and many countries are involved....

  6. Auroal electron distribution function

    International Nuclear Information System (INIS)

    Kaufmann, R.L.; Dusenbery, P.B.; Thomas, B.J.; Arnoldy, R.L.

    1978-01-01

    The electron velocity distribution function is presented in the energy range 25 eV 8 cm/s (E=300 eV) are nearly isotropic in pitch angle throughout the flight. Upgoing electrons show almost no pitch angle dependence beyond 120 0 , and their fluxes decline smoothly as energy increases, with little or no evidence of a plateau. Preliminary results of numerical integrations, to study bulk properties and stability of the plasma are presented

  7. Distributed Computerized Catalog System

    Science.gov (United States)

    Borgen, Richard L.; Wagner, David A.

    1995-01-01

    DarkStar Distributed Catalog System describes arbitrary data objects in unified manner, providing end users with versatile, yet simple search mechanism for locating and identifying objects. Provides built-in generic and dynamic graphical user interfaces. Design of system avoids some of problems of standard DBMS, and system provides more flexibility than do conventional relational data bases, or object-oriented data bases. Data-collection lattice partly hierarchical representation of relationships among collections, subcollections, and data objects.

  8. Distributional Watson transforms

    NARCIS (Netherlands)

    Dijksma, A.; Snoo, H.S.V. de

    1974-01-01

    For all Watson transforms W in L2(R+) a triple of Hilbert space LG ⊂ L2(R+) ⊂ L'G is constructed such that W may be extended to L'G. These results allow the construction of a triple L ⊂ L2(R+) ⊂ L', where L is a Gelfand-Fréchet space. This leads to a theory of distributional Watson transforms.

  9. Distributed propulsion for ships

    OpenAIRE

    Nylund, Vilde

    2017-01-01

    It is anticipated that using distributed electric propulsion (DEP) on conventional ships will increase the total propulsive efficiency. This is mainly due to two reasons; firstly, because the total propeller disk area can be increased. Secondly, because each propeller can be optimised for the local wake where it is operating. In this work, the benefits of using DEP has been investigated for a 14 000 TEU container ship. Based on a literary study of the present state of propeller modelling ...

  10. Angular Distribution of GRBs

    Directory of Open Access Journals (Sweden)

    L. G. Balázs

    2012-01-01

    Full Text Available We studied the complete randomness of the angular distribution of BATSE gamma-ray bursts (GRBs. Based on their durations and peak fluxes, we divided the BATSE sample into 5 subsamples (short1, short2, intermediate, long1, long2 and studied the angular distributions separately. We used three methods to search for non-randomness in the subsamples: Voronoi tesselation, minimal spanning tree, and multifractal spectra. To study any non-randomness in the subsamples we defined 13 test-variables (9 from Voronoi tesselation, 3 from the minimal spanning tree and one from the multifractal spectrum. We made Monte Carlo simulations taking into account the BATSE’s sky-exposure function. We tested therandomness by introducing squared Euclidean distances in the parameter space of the test-variables. We recognized that the short1, short2 groups deviate significantly (99.90%, 99.98% from the fully random case in the distribution of the squared Euclidean distances but this is not true for the long samples. In the intermediate group, the squared Euclidean distances also give significant deviation (98.51%.

  11. The tensor distribution function.

    Science.gov (United States)

    Leow, A D; Zhu, S; Zhan, L; McMahon, K; de Zubicaray, G I; Meredith, M; Wright, M J; Toga, A W; Thompson, P M

    2009-01-01

    Diffusion weighted magnetic resonance imaging is a powerful tool that can be employed to study white matter microstructure by examining the 3D displacement profile of water molecules in brain tissue. By applying diffusion-sensitized gradients along a minimum of six directions, second-order tensors (represented by three-by-three positive definite matrices) can be computed to model dominant diffusion processes. However, conventional DTI is not sufficient to resolve more complicated white matter configurations, e.g., crossing fiber tracts. Recently, a number of high-angular resolution schemes with more than six gradient directions have been employed to address this issue. In this article, we introduce the tensor distribution function (TDF), a probability function defined on the space of symmetric positive definite matrices. Using the calculus of variations, we solve the TDF that optimally describes the observed data. Here, fiber crossing is modeled as an ensemble of Gaussian diffusion processes with weights specified by the TDF. Once this optimal TDF is determined, the orientation distribution function (ODF) can easily be computed by analytic integration of the resulting displacement probability function. Moreover, a tensor orientation distribution function (TOD) may also be derived from the TDF, allowing for the estimation of principal fiber directions and their corresponding eigenvalues.

  12. Distributed sensor networks

    CERN Document Server

    Rubin, Donald B; Carlin, John B; Iyengar, S Sitharama; Brooks, Richard R; University, Clemson

    2014-01-01

    An Overview, S.S. Iyengar, Ankit Tandon, and R.R. BrooksMicrosensor Applications, David ShepherdA Taxonomy of Distributed Sensor Networks, Shivakumar Sastry and S.S. IyengarContrast with Traditional Systems, R.R. BrooksDigital Signal Processing Background, Yu Hen HuImage-Processing Background Lynne Grewe and Ben ShahshahaniObject Detection and Classification, Akbar M. SayeedParameter Estimation David FriedlanderTarget Tracking with Self-Organizing Distributed Sensors R.R. Brooks, C. Griffin, D.S. Friedlander, and J.D. KochCollaborative Signal and Information Processing: AnInformation-Directed Approach Feng Zhao, Jie Liu, Juan Liu, Leonidas Guibas, and James ReichEnvironmental Effects, David C. SwansonDetecting and Counteracting Atmospheric Effects Lynne L. GreweSignal Processing and Propagation for Aeroacoustic Sensor Networks, Richard J. Kozick, Brian M. Sadler, and D. Keith WilsonDistributed Multi-Target Detection in Sensor Networks Xiaoling Wang, Hairong Qi, and Steve BeckFoundations of Data Fusion f...

  13. Reactor power distribution monitor

    International Nuclear Information System (INIS)

    Sekimizu, Koichi

    1980-01-01

    Purpose: To improve the performance and secure the safety of a nuclear reactor by rapidly computing and display the power density in the nuclear reactor by using a plurality of processors. Constitution: Plant data for a nuclear reactor containing the measured values from a local power monitor LPRM are sent and recorded in a magnetic disc. They are also sent to a core performance computer in which burn-up degree distribution and the like are computed, and the results are sent and recorded in the magnetic disc. A central processors loads programs to each of the processors and applies data recorded in the magnetic disc to each of the processors. Each of the processors computes the corresponding power distribution in four fuel assemblies surrounding the LPRM string by the above information. The central processor compiles the computation results and displays them on a display. In this way, power distribution in the fuel assemblies can rapidly be computed to thereby secure the improvement of the performance and safety of the reactor. (Seki, T.)

  14. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P.; Jaerventausta, P.; Kaerenlampi, M.; Paulasaari, H. [Tampere Univ. of Technology (Finland); Partanen, J. [Lappeenranta Univ. of Technology (Finland)

    1996-12-31

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion of the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the vendors of the other systems. In the research project this alternative is preferred and used in developing an independent distribution management system

  15. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P; Jaerventausta, P; Kaerenlampi, M; Paulasaari, H [Tampere Univ. of Technology (Finland); Partanen, J [Lappeenranta Univ. of Technology (Finland)

    1997-12-31

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion of the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the vendors of the other systems. In the research project this alternative is preferred and used in developing an independent distribution management system

  16. Structure functions and parton distributions

    International Nuclear Information System (INIS)

    Olness, F.; Tung, Wu-Ki

    1991-04-01

    Activities of the structure functions and parton distributions group is summarized. The impact of scheme-dependence of parton distributions (especially sea-quarks and gluons) on the quantitative formulation of the QCD parton model is highlighted. Recent progress on the global analysis of parton distributions is summarized. Issues on the proper use of the next-to-leading parton distributions are stressed

  17. Multivariate Matrix-Exponential Distributions

    DEFF Research Database (Denmark)

    Bladt, Mogens; Nielsen, Bo Friis

    2010-01-01

    be written as linear combinations of the elements in the exponential of a matrix. For this reason we shall refer to multivariate distributions with rational Laplace transform as multivariate matrix-exponential distributions (MVME). The marginal distributions of an MVME are univariate matrix......-exponential distributions. We prove a characterization that states that a distribution is an MVME distribution if and only if all non-negative, non-null linear combinations of the coordinates have a univariate matrix-exponential distribution. This theorem is analog to a well-known characterization theorem...

  18. GASIFICATION FOR DISTRIBUTED GENERATION

    Energy Technology Data Exchange (ETDEWEB)

    Ronald C. Timpe; Michael D. Mann; Darren D. Schmidt

    2000-05-01

    A recent emphasis in gasification technology development has been directed toward reduced-scale gasifier systems for distributed generation at remote sites. The domestic distributed power generation market over the next decade is expected to be 5-6 gigawatts per year. The global increase is expected at 20 gigawatts over the next decade. The economics of gasification for distributed power generation are significantly improved when fuel transport is minimized. Until recently, gasification technology has been synonymous with coal conversion. Presently, however, interest centers on providing clean-burning fuel to remote sites that are not necessarily near coal supplies but have sufficient alternative carbonaceous material to feed a small gasifier. Gasifiers up to 50 MW are of current interest, with emphasis on those of 5-MW generating capacity. Internal combustion engines offer a more robust system for utilizing the fuel gas, while fuel cells and microturbines offer higher electric conversion efficiencies. The initial focus of this multiyear effort was on internal combustion engines and microturbines as more realistic near-term options for distributed generation. In this project, we studied emerging gasification technologies that can provide gas from regionally available feedstock as fuel to power generators under 30 MW in a distributed generation setting. Larger-scale gasification, primarily coal-fed, has been used commercially for more than 50 years to produce clean synthesis gas for the refining, chemical, and power industries. Commercial-scale gasification activities are under way at 113 sites in 22 countries in North and South America, Europe, Asia, Africa, and Australia, according to the Gasification Technologies Council. Gasification studies were carried out on alfalfa, black liquor (a high-sodium waste from the pulp industry), cow manure, and willow on the laboratory scale and on alfalfa, black liquor, and willow on the bench scale. Initial parametric tests

  19. DNS in Computer Forensics

    Directory of Open Access Journals (Sweden)

    Neil Fowler Wright

    2012-06-01

    Full Text Available The Domain Name Service (DNS is a critical core component of the global Internet and integral to the majority of corporate intranets. It provides resolution services between the human-readable name-based system addresses and the machine operable Internet Protocol (IP based addresses required for creating network level connections. Whilst structured as a globally dispersed resilient tree data structure, from the Global and Country Code Top Level Domains (gTLD/ccTLD down to the individual site and system leaf nodes, it is highly resilient although vulnerable to various attacks, exploits and systematic failures. This paper examines the history along with the rapid growth of DNS up to its current critical status. It then explores the often overlooked value of DNS query data; from packet traces, DNS cache data, and DNS logs, with its use in System Forensics and more frequently in Network Forensics, extrapolating examples and experiments that enhance knowledge.Continuing on, it details the common attacks that can be used directly against the DNS systems and services, before following on with the malicious uses of DNS in direct system attacks, Distributed Denial of Service (DDoS, traditional Denial of Service (DOS attacks and malware. It explores both cyber-criminal activities and cyber-warfare based attacks, and also extrapolates from a number of more recent attacks the possible methods for data exfiltration. It explores some of the potential analytical methodologies including; common uses in Intrusion Detection Systems (IDS, as well as infection and activity tracking in malware traffic analysis, and covers some of the associated methods around technology designed to defend against, mitigate, and/or manage these and other risks, plus the effect that ISP and nation states can have by direct manipulation of DNS queries and return traffic.This paper also investigates potential behavioural analysis and time-lining, which can then be used for the

  20. Transmuted Generalized Inverse Weibull Distribution

    OpenAIRE

    Merovci, Faton; Elbatal, Ibrahim; Ahmed, Alaa

    2013-01-01

    A generalization of the generalized inverse Weibull distribution so-called transmuted generalized inverse Weibull dis- tribution is proposed and studied. We will use the quadratic rank transmutation map (QRTM) in order to generate a flexible family of probability distributions taking generalized inverse Weibull distribution as the base value distribution by introducing a new parameter that would offer more distributional flexibility. Various structural properties including explicit expression...

  1. Planning Systems for Distributed Operations

    Science.gov (United States)

    Maxwell, Theresa G.

    2002-01-01

    This viewgraph representation presents an overview of the mission planning process involving distributed operations (such as the International Space Station (ISS)) and the computer hardware and software systems needed to support such an effort. Topics considered include: evolution of distributed planning systems, ISS distributed planning, the Payload Planning System (PPS), future developments in distributed planning systems, Request Oriented Scheduling Engine (ROSE) and Next Generation distributed planning systems.

  2. Optimizing queries in distributed systems

    Directory of Open Access Journals (Sweden)

    Ion LUNGU

    2006-01-01

    Full Text Available This research presents the main elements of query optimizations in distributed systems. First, data architecture according with system level architecture in a distributed environment is presented. Then the architecture of a distributed database management system (DDBMS is described on conceptual level followed by the presentation of the distributed query execution steps on these information systems. The research ends with presentation of some aspects of distributed database query optimization and strategies used for that.

  3. Oil palm seed distribution

    Directory of Open Access Journals (Sweden)

    Durand-Gasselin Tristan

    2005-03-01

    Full Text Available For a tropical plant, the oil palm commodity chain has the peculiarity of possessing a major seed production sector for reasons that are primarily genetic. This seed sector has numerous original aspects. Breeders are also propagators and usually also distribute their seeds. Oil palm seeds are semi-recalcitrant: they display pseudo-dormancy. Achieving seed germination is difficult and requires lengthy treatments and special installations. This restriction greatly influences seed distribution and the role of the different stakeholders in the commodity chain. It was only once it had been discovered how the “sh” gene functioned, which controls shell thickness, and when it became necessary to produce “tenera” seeds derived from exclusively “dura x pisifera” crosses, that a true seed market developed. In addition it is difficult to organize seed distribution to smallholders. This is partly due to difficulties that the profession, or a State-run organization, has in controlling middlemen networks, and partly to the absence of any protective systems (UPOV, plant breeder certificate, etc. that generally oblige breeders to preserve and propagate parents in their own installations. In fact there are major inequalities in the access to seeds between agroindustry and smallholders. Another peculiarity of the oil palm seed market is the virtually total absence of guarantees for buyers: the quality of the research conducted by breeders, the seed production strategies necessary for transferring genetic progress, and the technical quality of production. The only guarantee today comes from the relations of confidence established year after year between breeders/distributors and growers. In this fields, research can lead to some proposals: molecular biology offers some interesting prospects for certifying seed quality and social science develop effective communication methods.

  4. VLBA Archive &Distribution Architecture

    Science.gov (United States)

    Wells, D. C.

    1994-01-01

    Signals from the 10 antennas of NRAO's VLBA [Very Long Baseline Array] are processed by a Correlator. The complex fringe visibilities produced by the Correlator are archived on magnetic cartridges using a low-cost architecture which is capable of scaling and evolving. Archive files are copied to magnetic media to be distributed to users in FITS format, using the BINTABLE extension. Archive files are labelled using SQL INSERT statements, in order to bind the DBMS-based archive catalog to the archive media.

  5. Distributed energy store railgun

    International Nuclear Information System (INIS)

    Marshall, R.A.

    1991-01-01

    This paper reports that when the limiting case of a distributed energy store railgun is analyzed, i.e., the case where the space between adjacent energy stores become indefinitely small, three important results are obtained. First, the shape of the current pulse delivered by each store is sinusoidal and an exponential tail. Second, the rail-to-rail voltage behind the rear-most active store approaches zero. Third, it is not possible to choose parameters in such a way that capacitor crowbars can be eliminated

  6. Distributed Optimization System

    Science.gov (United States)

    Hurtado, John E.; Dohrmann, Clark R.; Robinett, III, Rush D.

    2004-11-30

    A search system and method for controlling multiple agents to optimize an objective using distributed sensing and cooperative control. The search agent can be one or more physical agents, such as a robot, and can be software agents for searching cyberspace. The objective can be: chemical sources, temperature sources, radiation sources, light sources, evaders, trespassers, explosive sources, time dependent sources, time independent sources, function surfaces, maximization points, minimization points, and optimal control of a system such as a communication system, an economy, a crane, and a multi-processor computer.

  7. Distribution load estimation - DLE

    Energy Technology Data Exchange (ETDEWEB)

    Seppaelae, A. [VTT Energy, Espoo (Finland)

    1996-12-31

    The load research project has produced statistical information in the form of load models to convert the figures of annual energy consumption to hourly load values. The reliability of load models is limited to a certain network because many local circumstances are different from utility to utility and time to time. Therefore there is a need to make improvements in the load models. Distribution load estimation (DLE) is the method developed here to improve load estimates from the load models. The method is also quite cheap to apply as it utilises information that is already available in SCADA systems

  8. Distributed Sensor Networks

    Science.gov (United States)

    1979-09-30

    University, Pittsburgh, Pennsylvania (1976). 14. R. L. Kirby, "ULISP for PDP-11s with Memory Management ," Report MCS-76-23763, University of Maryland...teletVpe or 9 raphIc S output. The recor iuL, po , uitist il so mon itot its owvn ( Onmand queue and a( knowlede commands Sent to It hN the UsCtr interfa I...kernel. By a net- work kernel we mean a multicomputer distributed operating system kernel that includes proces- sor schedulers, "core" memory managers , and

  9. DEM - distribution energy management

    Energy Technology Data Exchange (ETDEWEB)

    Seppaelae, A; Kekkonen, V; Koreneff, G [VTT Energy, Espoo (Finland); and others

    1998-08-01

    The electricity market was de-regulated in Finland at the end of 1995 and the customers can now freely choose their power suppliers. The national grid and local distribution network operators are now separated from the energy business. The network operators transmit the electric power to the customers on equal terms regardless from whom the power is purchased. The Finnish national grid is owned by one company Finnish Power Grid PLC (Fingrid). The major shareholders of Fingrid are the state of Finland, two major power companies and institutional investors. In addition there are about 100 local distribution utilities operating the local 110 kV, 20 kV and 0.4 kV networks. The distribution utilities are mostly owned by the municipalities and towns. In each network one energy supplier is always responsible for the hourly energy balance in the network (a `host`) and it also has the obligation to provide public energy prices accessible to any customer in the network`s area. The Finnish regulating authorities nominate such a supplier who has a dominant market share in the network`s area as the supplier responsible for the network`s energy balance. A regulating authority, called the Electricity Market Centre, ensures that the market is operating properly. The transmission prices and public energy prices are under the Electricity Market Centre`s control. For domestic and other small customers the cost of hourly metering (ca. 1000 US$) would be prohibitive and therefore the use of conventional energy metering and load models is under consideration by the authorities. Small customer trade with the load models (instead of the hourly energy recording) is scheduled to start in the first half of 1998. In this presentation, the problems of energy management from the standpoint of the energy trading and distributing companies in the new situation are first discussed. The topics covered are: the hourly load data management, the forecasting and estimation of hourly energy demands

  10. Data Distribution Manager

    International Nuclear Information System (INIS)

    C. Timmer; D.J. Abbott; V.H. Gyurjyan; W.G. Heyes; E. Jastrembski; E. Wolin

    2001-01-01

    Jefferson Lab produces voluminous amounts of data, currently over 10 MB/sec. We developed a software package designed to manage and distribute all of this data as it is being produced - in real time. Called the Event Transfer (ET) system, it allows users to create data (events) and insert them into the system as well as allow other users to retrieve these events sequentially. The ET system is designed to be easy to use as well as very robust. Although initially implemented in C on Solaris and Linux platforms, we completed a recent port to Java. This paper presents a description of this software package as well as some performance measures

  11. Distribution load estimation - DLE

    Energy Technology Data Exchange (ETDEWEB)

    Seppaelae, A [VTT Energy, Espoo (Finland)

    1997-12-31

    The load research project has produced statistical information in the form of load models to convert the figures of annual energy consumption to hourly load values. The reliability of load models is limited to a certain network because many local circumstances are different from utility to utility and time to time. Therefore there is a need to make improvements in the load models. Distribution load estimation (DLE) is the method developed here to improve load estimates from the load models. The method is also quite cheap to apply as it utilises information that is already available in SCADA systems

  12. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  13. [Beyond eugenics: posthumanism as Homo patiens denials].

    Science.gov (United States)

    Ballesteros Llompart, Jesús

    2012-01-01

    Throughout history there have been attempts to overcome human limitations by means of technique. The novelty of the 20th century has been to try to extirpate all the faults, the suffering, the disease, and even the death. This power has been attributed successively to machines (the futurism), to the genetic information (the eugenism) and to the electronic information (the posthumanism). In all cases, it's unknown the distinction between inevitable faults, ontological deficiencies, as the reality of death, and avoidable ones, sociological deficiencies, as the deaths due to circumstances as lack of drinkable water, of medicaments, wars or any other type of violence. The due way of confronting the human faults is to try to eradicate their avoidable causes and at the same time to understand the sense of those that cannot be avoided, as occasion of the self-overcoming and the opening to the Transcendence.

  14. Inferring Internet Denial-of-Service Activity

    Science.gov (United States)

    2001-01-01

    observe more than 12,000 attacks against more than 5,000 distinct targets, ranging from well known e- commerce companies such as Amazon and Hotmail to...observe more than 2,000 attacks against more than 5,000 distinct targets, ranging from well known e-commerce companies such as Amazon and Hotmail to small

  15. Climate change denial: heads in the sand

    National Research Council Canada - National Science Library

    Washington, Haydn; Cook, John

    2011-01-01

    ... in the USA and Canada by Earthscan 711 Third Avenue, New York, NY 10017 Earthscan is an imprint of the Taylor & Francis Group, an in forma business ISBN 978-1-84971-335-1 hardback 978-1-84971-336-8 paperback Typeset by FiSH Books, Enfield Cover design by Rogue Four Design, www.roguefour.com A catalogue record for this book is availab...

  16. 78 FR 57289 - Difenzoquat; Denial of Objections

    Science.gov (United States)

    2013-09-18

    ..., additional data--a neurotoxicity battery; an immunotoxicity study; and residue data for barley hay, wheat... food commodities. The neurotoxicity battery and immunotoxicity study were required in accordance with...); immunotoxicity study (OPPTS 870.7800) (Ref. 9); and crop field trials (OPPTS 860.1500) (Ref. 10) for barley hay...

  17. FMCG companies specific distribution channels

    Directory of Open Access Journals (Sweden)

    Ioana Barin

    2009-12-01

    Full Text Available Distribution includes all activities undertaken by the producer, alone or in cooperation, since the end of the final finished products or services until they are in possession of consumers. The distribution consists of the following major components: distribution channels or marketing channels, which together form a distribution network; logistics o rphysical distribution. In order to effective achieve, distribution of goods requires an amount of activities and operational processes related to transit of goods from producer to consumer, the best conditions, using existing distribution channels and logistics system. One of the essential functions of a distribution is performing acts of sale, through which, with the actual movement of goods, their change of ownership takes place, that the successive transfer of ownership from producer to consumer. This is an itinerary in the economic cycle of goods, called the distribution channel.

  18. SYVAC3 parameter distribution package

    Energy Technology Data Exchange (ETDEWEB)

    Andres, T; Skeet, A

    1995-01-01

    SYVAC3 (Systems Variability Analysis Code, generation 3) is a computer program that implements a method called systems variability analysis to analyze the behaviour of a system in the presence of uncertainty. This method is based on simulating the system many times to determine the variation in behaviour it can exhibit. SYVAC3 specializes in systems representing the transport of contaminants, and has several features to simplify the modelling of such systems. It provides a general tool for estimating environmental impacts from the dispersal of contaminants. This report describes a software object type (a generalization of a data type) called Parameter Distribution. This object type is used in SYVAC3, and can also be used independently. Parameter Distribution has the following subtypes: beta distribution; binomial distribution; constant distribution; lognormal distribution; loguniform distribution; normal distribution; piecewise uniform distribution; Triangular distribution; and uniform distribution. Some of these distributions can be altered by correlating two parameter distribution objects. This report provides complete specifications for parameter distributions, and also explains how to use them. It should meet the needs of casual users, reviewers, and programmers who wish to add their own subtypes. (author). 30 refs., 75 tabs., 56 figs.

  19. Differentially Private Distributed Sensing

    Energy Technology Data Exchange (ETDEWEB)

    Fink, Glenn A.

    2016-12-11

    The growth of the Internet of Things (IoT) creates the possibility of decentralized systems of sensing and actuation, potentially on a global scale. IoT devices connected to cloud networks can offer Sensing and Actuation as a Service (SAaaS) enabling networks of sensors to grow to a global scale. But extremely large sensor networks can violate privacy, especially in the case where IoT devices are mobile and connected directly to the behaviors of people. The thesis of this paper is that by adapting differential privacy (adding statistically appropriate noise to query results) to groups of geographically distributed sensors privacy could be maintained without ever sending all values up to a central curator and without compromising the overall accuracy of the data collected. This paper outlines such a scheme and performs an analysis of differential privacy techniques adapted to edge computing in a simulated sensor network where ground truth is known. The positive and negative outcomes of employing differential privacy in distributed networks of devices are discussed and a brief research agenda is presented.

  20. Distributed System Design Checklist

    Science.gov (United States)

    Hall, Brendan; Driscoll, Kevin

    2014-01-01

    This report describes a design checklist targeted to fault-tolerant distributed electronic systems. Many of the questions and discussions in this checklist may be generally applicable to the development of any safety-critical system. However, the primary focus of this report covers the issues relating to distributed electronic system design. The questions that comprise this design checklist were created with the intent to stimulate system designers' thought processes in a way that hopefully helps them to establish a broader perspective from which they can assess the system's dependability and fault-tolerance mechanisms. While best effort was expended to make this checklist as comprehensive as possible, it is not (and cannot be) complete. Instead, we expect that this list of questions and the associated rationale for the questions will continue to evolve as lessons are learned and further knowledge is established. In this regard, it is our intent to post the questions of this checklist on a suitable public web-forum, such as the NASA DASHLink AFCS repository. From there, we hope that it can be updated, extended, and maintained after our initial research has been completed.