Further daemon detection experiments

نویسنده

  • E. M. Drobyshevski
چکیده

The experiments on detection of daemons captured into geocentric orbits, which are based on the postulated fast decay of daemon-containing nuclei, have been continued. By properly varying the experimental parameters, it has become possible to reveal and formulate some relations governing the interaction of daemons with matter. Among them are, for instance, the emission of energetic Auger-type electrons in the capture of an atomic nucleus, the possibility of charge exchange involving the capture of a heavier nucleus etc. The decay time of a daemon-containing proton has been measured to be ∆τex ≈ 2μs. The daemon flux at the Earth’s surface is f⊕ ∼ 10 −7 cms. One should point out, on the one hand, the reproducibility of the main results, and on the other, the desirability of building up larger statistics and employing more sophisticated experimental methods to reveal finer details in the daemon interaction with matter.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effective Anomaly Detection with Scarce Training Data

Learning-based anomaly detection has proven to be an effective black-box technique for detecting unknown attacks. However, the effectiveness of this technique crucially depends upon both the quality and the completeness of the training data. Unfortunately, in most cases, the traffic to the system (e.g., a web application or daemon process) protected by an anomaly detector is not uniformly distr...

متن کامل

Dynamic Authorization and Intrusion Response in Distributed Systems

This paper presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabilities. The framework intercepts and analyzes access requests and dynamically adjusts security policies to prevent attackers from exploiting application level vulnerabilities. We present a practical, flexible implementation o...

متن کامل

Cfetool: A General Purpose Tool for Anomaly Detection in Periodic Data

Cfengine’s environment daemon “cfenv” has a limited and fixed set of metrics it measures on a computer. The data is assumed to be periodic in nature and cfenvd reports any data points that fall too far out of the pattern it has learned from past measurements. This is used to detect “anomalies” on computers. We introduce a new standalone tool, “cfetool”, that allows arbitrary periodic data to be...

متن کامل

Disconnected Components Detection and Rooted Shortest-Path Tree Maintenance in Networks

Many articles deal with the problem of maintaining a rooted shortest-path tree However, after some edge deletions, some nodes can be disconnected from the connected component Vr of distinguished node r. In this case, an additional objective is to ensure the detection of the disconnection by the nodes that no longer belong to Vr. Without any assumption on the asynchronous model (unfair daemon), ...

متن کامل

A closer look on Intrusion Detection System for web applications

Intrusion Detection System (IDS) is one of the security measures being used as an additional defence mechanism to prevent the security breaches on web. It has been well known methodology for detecting network-based attacks but still immature in the domain of securing web application. The objective of the paper is to thoroughly understand the design methodology of the detection system in respect...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000