Sök:

Sökresultat:

179 Uppsatser om Intrusion detection - Sida 1 av 12

Use of dogs as odour detectors : a review of the scientific literture

A lot of various substances can be detected by dogs, as oestrous in cows, endangered species or non-biological substances like accelerants, narcotics, explosives, mines and pollutions and biological substances like identity (suspects), cancer (breast, lung, colorectal and bladder cancer), human remains (cadaver), bacteria and mould in buildings. The dogs are trained using non-scientific methods and not much research in detection training exists. This is a review of different types of dog detection, with focus on new research..

Ersättning för markåtkomst avseende tredimensionellt (tunnel) intrång i fastighet

Chapter 1. 1 § jordabalken (1970:994) defines property as land that includes area, which is divided into properties.A three-dimensional property must be firm with a closed volume where top and bottom are specified. The property boundaries are described clearly according to Chapter 4. § 27 fastighetsbildningslagen. A three-dimensional property can undermine a traditional property, as well as a three-dimensional property.

Detektering av sprickor i vägytor med hjälp av Datorseende

This thesis describes new methods for automatic crack detection in pavements. Cracks in pavements can be used as an early indication for the need of reparation.Automatic crack detection is preferable compared to manual inventory; the repeatability can be better, the inventory can be done at a higher speed and can be done without interruption of the traffic.The automatic and semi-automatic crack detection systems that exist today use Image Analysis methods. There are today powerful methods available in the area of Computer Vision. These methods work in higher dimensions with greater complexity and generate measures of local signal properties, while Image Analyses methods for crack detection use morphological operations on binary images.Methods for digitalizing video data on VHS-cassettes and stitching images from nearby frames have been developed.Four methods for crack detection have been evaluated, and two of them have been used to form a crack detection and classification program implemented in the calculation program Matlab.One image set was used during the implementation and another image set was used for validation. The crack detection system did perform correct detection on 99.2 percent when analysing the images which were used during implementation.

Saltvattenpåverkan i enskilda brunnar i kustnära områden : En undersökning av grundvattenförhållandena och riskerna för saltvattenpåverkan i S:t Annas skärgård, Östergötland

Coastal areas are popular for housing, both for permanent living and holiday houses. At the same time, thin sediments and small storage capacity in the bedrock makes the ground water resources limited. The limited ground water resources combined with too large withdrawals of ground water makes salt water intrusion a problem in many coastal areas. This study examine the risk of salt water intrusion in drinking water supplying wells on the island Södra Finnö in S:t Anna archipelago, Östergötland, Sweden. A calculation of the relation between ground water recharge and withdrawal is obtained to analyze the ground water balance in the area.

Objektdetektering i SAR- och IR-bilder

This report treats detection in IR-pictures taken from airplanes over the ground. The detection is divided in two parts. First there is a detection with filterkernels with the task to point on targets and objects that look like targets. The second part is a discriminator that demands more calculations and has the task to sort out the false alarms from the discriminator. Both the detector and the discriminator contain thresholds thats been trained from trainingsets of data.

Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup

Konfigurationsprotokollet Wi-Fi protected setup (WPS) har vissa brister idess design gällande hur autentiseringen av den PIN-kod som används för attansluta en enhet till ett trådlöst nätverk är implementerad. Dessa brister kanutnyttjas av en attackerare för att utföra en bruteforce-attack som på enrelativt kort tid kan identifiera den korrekta koden. Detta arbete har tagit frammetoder för att motverka eller fördröja attacker mot WPS-protokollet sommed relativt enkla medel kan implementeras i befintliga nätverk. Genomutförda praktiska experiment där en fristående server upptäckt en attack ochgenomfört olika försvarsmetoder har de mekanismer som presenterats utvärderats.Slutsatsen är att den effektivaste metoden för att avbryta en bruteforce-attackmot protokollet är att automatiskt byta ut PIN-koden då en attack upptäcks..

Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems

Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet.I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar av att upptäcka och blockera attacker utförs två experiment där ett mindre nätverk attackeras på olika sätt. I det första experimentet skyddas infrastrukturen av en brandvägg och klienterna är utrustade med antivirusprogram. I det andra experimentet genomförs samma attacker igen fast med ett Snort IPS implementerat i nätverket.Resultatet av de genomförda experimenten visar att en IPS klarar att blockera ca 87% av attackerna, men nätverksprestandan påverkas negativt.

Heuristisk detektering av trojaner

The heuristic methods used by the anti-trojan application TrojanHunter have been evaluated. The evaluation shows that the heuristic scan engine of TrojanHunter has a very good detection ratio and that the detection ratio can be even further improved by implementing the suggested improvements, the most important of which is a white list to avoid misidentifying files that are known not to be trojans..

Mapping of clear-cuts in Swedish forest using satellite images acquired by the radar sensor ALOS PALSAR

This study presents results for observing forest changes in Sweden using multi-temporal L-band satellite data and is a part of the JAXA?s ALOS Kyoto and Carbon Initiative. An extensive dataset of images acquired by the Advanced Land Observing Satellite Phased Array type L-band Synthetic Aperture Radar (ALOS PALSAR) is investigated for clear-cut detection in boreal forests in northern Sweden (Lat. 64°14? N, Long.

Ett flervariabelt feldetekteringssystem för övervakning av bärlagertemperaturen i vattenkraftturbiner

The purpose of this thesis work was to develop an automatic fault detection system for surveillance of bearing temperature in hydropower turbines. The parameters used except the bearing temperature were cooling water temperature and cooling water flow. A simple static model based on data sampled every minute was developed to estimate the bearing temperature. Then a detector for detection of change in bearing temperature based on the CUSUM-algorithm was designed. Since the amount of data was very small the developed model was too uncertain to be used in a working system.The designed fault detection system showed to work well for the available data.

IT-relaterade hot - professionella IT-tjänstemäns farhågor och möjligheter

The objective of this thesis was firstly to examine the possibilities of creating a universal tool for evaluating IT-security. When all the material was gathered we saw that we had strayed away from our subject and that our focus was on IT-threats and IT-professionals apprehensions and possibilities on the subject. The purpose of this thesis was there after to find and identify threats and counter measures in publications and later discuss these with IT-professionals. We found and identified several threats that the professionals encountered in their work. These threats ranged from techniques used by hackers to threats that can arise when the users on the network are poorly educated.

Registrering och avel för brunstvisningsförmåga hos mjölkkor

Dairy farmers using artificial insemination (AI) are dependent on effective oestrus detection. In Sweden, AI is used for a majority of all dairy cows and oestrus synchronisation with hormones is not allowed. There are reports of declining ability to express oestrus with higher levels of milk production. This makes oestrus detection more difficult. Several aids for oestrus detection have been developed, for instance pedometers and mounting detectors.

Blinkbeteendebaserad trötthetsdetektering : metodutveckling och validering

Electrooculogram (EOG) data was used to develop, adjust and validate a method for drowsiness detection in drivers. The drowsiness detection was based on changes in blink behaviour and classification was made on a four graded scale. The purpose was to detect early signs of drowsiness in order to warn a driver. MATLAB was used for implementation. For adjustment and validatation, two different reference measures were used; driver reported ratings of drowsiness and an electroencephalogram (EEG) based scoring scale.

Passive acoustic diver detection

This report discusses a method to detect divers in harbour environments usingpassive acoustic detection. The goal was to achieve as high detection as possiblewithout having too high false alarm rate. A short execution time was also desirable.By using the characteristic of an inhalation a band-pass filter was applied to the signalto improve the signal to noise ratio. After the filtering an energy estimation of thesignal was made. This energy estimation was later used in a frequency analysis, whichcould tell us if there were enough energy in the frequencies that correspond to adivers breathing frequency.

Konfigurering av slutartider för ljusdetekterande mjukvara

This project measures the upper bound of exposure time for laser reflection detection in the software DotDetector. Via measurement of the exposure time for which distortion happens in a room lit with everyday light we conclude that the upper bound for exposure times are 100 milliseconds. This value does not change as long as the lighting in the room is the same. As future work this project proposes variable upper bounds depending on secondary lighting in the room. Also we propose automating the colour masking of the detection algorithm..

1 Nästa sida ->