38 resultados para Distinguishing Attack
em Chinese Academy of Sciences Institutional Repositories Grid Portal
Resumo:
The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [Li et al., AIAA J. 46, 2899(2008)], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 0° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves VLFWs� are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [ Li et al., AIAA J. 46, 2899 (2008) ], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 20° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves (VLFWs) are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.
Resumo:
To distinguish the cytoplasm of Danio rerio from that of Gobiocypris rarus, we cloned G. rarus COXI and constructed cytoplasmic molecular markers at the high identity domains of COXI by mutated primer PCR (MP-PCR for short). Then Sybr Green I was used to detect the single amplicon. As a result, we succeeded in getting the cytoplasmic molecular markers, G.M COXI and Z.M COXI, by MP-PCR strategy. They were used to detect the sperm-derived mtDNA in the sexual hybrid embryos (D. rerio female x G. rarus male) before the sphere stage. In the present study, all results demonstrate that MP-PCR approach and Sybr Green I detection are feasible to construct the molecular markers to identify genes that shared high identity.
Resumo:
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Resumo:
IEEE Computer Society
Resumo:
IEECAS SKLLQG
Resumo:
The increasing worldwide demand for carbon nanotubes (CNTs) and increasing concern regarding how to safely develop and use CNTs are requiring a low-cost, simple, and highly sensitive CNT detection assay for toxicological evaluation and environmental monitoring. However, this goal is still far from being achieved. All the current CNT detection techniques are not,applicable for automation and field analysis because they are dependent on highly expensive special instruments and complicated sample preparation. On the basis of the capability of single-walled carbon nanotubes (SWNTs) to specifically induce human telomeric i-motif formation, we design an electrochemical DNA (E-DNA) sensor that can distinguish single- and multiwalled carbon nanotubes both in buffer and in cell extracts. The E-DNA sensor can selectively detect SWNTs; with a direct detection limit of 0.2 ppm and has been demonstrated in cancer cell extracts. To the best of our knowledge, this is the first demonstration of a biosensing technique that can distinguish different types of nanotubes. Our work will provide new insights into how to design a biosensor for detection of carbon nanotubes.
Resumo:
Ephedrine and isoephedrine were first distingshed by electrospy ionization mass spectrometry and in-sourice collision-induced dissociation technique. Based on this observation, a unkown sample was identified for ephedrine.
Resumo:
Sediment samples were collected from the lower channel of the Yangtze River and the Yellow River and the contents of rare earth elements (REEs) were measured. In addition, some historical REEs data were collected from published literatures. Based on the delta Eu-N-I REEs pound plot, a clear boundary was found between the sediments from the two rivers. The boundary can be described as an orthogonal polynomial equation by ordinary linear regression with sediments from the Yangtze River located above the curve and sediments from the Yellow River located below the curve. To validate this method, the REEs contents of sediments collected from the estuaries of the Yangtze River and the Yellow River were measured. In addition, the REEs data of sediment Core 255 from the Yangtze River and Core YA01 from the Yellow River were collected. Results show that the samples from the Yangtze River estuary and Core 255 almost are above the curve and most samples from the Yellow River estuary and Core YA01 are below the curve in the delta Eu-N-I REEs pound plot. The plot and the regression equation can be used to distinguish sediments from the Yangtze River and the Yellow River intuitively and quantitatively, and to trace the sediment provenance of the eastern seas of China. The difference between the sediments from two rivers in the delta Eu-N-I REEs pound plot is caused by different mineral compositions and regional climate patterns of the source areas. The relationship between delta Eu-N and I REEs pound is changed little during the transport from the source area to the river, and from river to the sea. Thus the original information on mineral compositions and climate of the source area was preserved.