77 resultados para Cube attack

em Chinese Academy of Sciences Institutional Repositories Grid Portal


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [Li et al., AIAA J. 46, 2899(2008)], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 0° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves VLFWs� are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [ Li et al., AIAA J. 46, 2899 (2008) ], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 20° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves (VLFWs) are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A method for the design of an all-dielectric nonpolarizing prism beam splitter utilizing the principle of frustrated total internal reflection is reported. The nonpolarizing condition for a prism beam splitter is discussed, and some single layer design examples are elaborated. The concept can be applied to a wide range of wavelengths and arbitrary transmittance values, and with the help of a computer design program examples of 400-700 nm, T-p = T-p = 0.5 +/- 0.01, with incident angles of 45 degrees and 62 degrees are given. In addition, the sensitivity and application of the design are also discussed. (c) 2006 Optical Society of America.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IEEE Computer Society

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel type of moving-corner-cube-pair interferometer is presented, and its principle and properties are studied. It consists of two moving corner cubes fixed together back to back as a single moving part (the moving-corner-cube-pair), four fixed plane mirrors and one beamsplitter. The optical path difference (OPD) is created by the straight reciprocating motion of the moving-corner-cube-pair, and the OPD value is eight times the physical shift value of the moving-corner-cube-pair. This novel type of interferometer has no tilt and shearing problems. It is almost ideal for the very-high-resolution infrared spectrometers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the cube-corner indenter, an approximate linear relationship between the ratio of hardness (H) to reduced modulus (E-r) and the ratio of unloading work (W-u) to total loading work (W-t) is confirmed by finite-element calculations and by experiments. Based on this relationship a convenient method to determine the fracture toughness (K-IC) of brittle materials, especially for those at small scale, using cube-corner indentations is proposed. Finally, the method is calibrated by indentation experiments on a set of brittle materials. (C) 2009 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The suppression method of vortex shedding from a circular cylinder has been studied experimentally in the Reynolds number range from 300 to 1600. The test is performed in a water channel. The model cylinder is 1 cm in diameter and 38 cm in length. A row of small rods of 0.18 cm in diameter and 1.5 cm in length are perpendicularly connected to the surface of the model cylinder and distributed along the meridian, The distance between the neighboring rods and the angle of attack of the rods can be changed so that the suppression effect on vortex shedding can be adjusted. The results show that vortex shedding can be suppressed effectively if the distance between the neighboring rods is smaller than 3 times and the cylinder diameter and the angle of attack is in the range of 30degreesless than or equal tobeta<90&DEG;.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Three kinds of forebody model of hypersonic vehicles were studied with numerical simulation method. It shows that the two- order compressive ramp model is the best selection among the three for its good evaluative parameters value at the cowl of the inlet . This model can provide higher value of flux coefficient and total pressure recovery coefficient and lower average Mach number compared with those of the other two models . Simultaneously different compressive angles may have different effects . The configuration which the firstorder of compressive angle is 4°and the second 5°is the optimum combination. Furthermore factors such as attack angle were concerned. Better result may be obtained with a range of attack angles . Based on the work above the integrated design for forebodyPinlet of a hypersonic vehicle was performed. The numerical result shows that this integrated model provides good flow field quality for inlet and engine work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Instrumented nanoindentation was employed to study the depth dependence of nanohardness in a CuAlNi single crystal shape memory alloy that exhibits shape memory effect (SME). A Berkovich indenter and a cube comer indenter were used in this study, and the

Relevância:

10.00% 10.00%

Publicador:

Resumo:

旋成弹体在大攻角超声速流动中其迎风面上有时会出现一种迎风激波.采用非定常雷诺平均的Navier-Stokes方程以及两方程kω-sst和代数B-L湍流模型成功地模拟了该现象,验证了该迎风激波是由于流场主旋涡导致超声速流动偏移造成的涡诱导激波的一部分的结论.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The performance of 23 kinds of waveriders, derived from different conical flowfields, is analyzed by the numerical computation under the conditions of fight speed of Mach 6, attack angle of 0° and flight altitude of 30 km. These results indicate that the performance is influenced by the shapes and the width to height ratios (W/H ) of generating cones. The geometrical parameter and the lift coefficient are proportional to W/H, while the drag coefficient and the lift to drag ratio (L/D ) have extreme values. Considering the base drag and the computation errors, the waverider with the highest L/D is cut from the elliptical cone’s flowfield (W/H = 1.5―1.618), and the configuration with the lowest drag can also be obtained at W/H = 1:1.5. Accordingly, good suggestions are proposed for practical design based on these computational results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bulk single crystals of GaN and AlN can be grown from supercritical fluids using the ammonothermal method, which utilizes ammonia as fluid rather than water as in the hydrothermal process. In this process, a mineralizer such as amide, imide or nitride is used to attack a bulk nitride feedstock at temperatures from 200°C to 500°C and pressures from 1 to 4 kbar. Ammonothermal systems have been modeled here using fluid dynamics, thermodynamics and heat transfer models. The nutrient is considered as a porous media bed and the fluid flow is simulated using the Darcy-Brinkman-Forchheimer model. The resulting governing equations are solved using the finite volume method. The effects of particle size on flow pattern and temperature distribution in an autoclave are analyzed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A narrow strip is used to control mean and fluctuating forces on a circular cylinder at Reynolds numbers from 2.0 x 10(4) to 1.0 x 10(5). The axes of the strip and cylinder are parallel. The control parameters are strip width ratio and strip position characterized by angle of attack and distance from the cylinder. Wind tunnel tests show that the vortex shedding from both sides of the cylinder can be suppressed, and mean drag and fluctuating lift on the cylinder can be reduced if the strip is installed in an effective zone downstream of the cylinder. A phenomenon of mono-side vortex shedding is found. The strip-induced local changes of velocity profiles in the near wake of the cylinder are measured, and the relation between base suction and peak value in the power spectrum of fluctuating lift is studied. The control mechanism is then discussed from different points of view.