67 resultados para DDoS attack traceback


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Uranium-Plutonium mixed carbide with a Pu/(U+Pu) ratio of 0.55 is to be used as the fuel in the Fast Breeder Test Reaotor - (PBTRj at Kalpakkam, India. carbur ization of the stainlese steel clad by this fuel is determined by its carbon potential. - i. Because the carbon potential of this fuel composition is not 1 available in the literature, it was meadured by the methanehydrogen gas equilibration technique. The sample was equilibrated with purified hydrogen and the equilibrium methane-tohydrogen ratio in the gas phase was measured with a flame ionization detector. The carbon potential of the ThC-ThCz as well as Mo-Mo2C system,whiah is an important binary in the aotinide-fission product-carbon systems, were also measured by this technique, in the temperature range 973 K to 1173 K. The data for ! the Mo-MozC system are in agreement with values reported in the literature. The results for the ThC-ThC2 system are different from estimated values with large unaertainty limits given in the literature. The data on (U,Pu) mixed carbide indicates possibility of stainlesss steel clad attack under isothermal equilibrium conditions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A multiple UAV search and attack mission in a battlefield involves allocating UAVs to different target tasks efficiently. This task allocation becomes difficult when there is no communication among the UAVs and the UAVs sensors have limited range to detect the targets and neighbouring UAVs, and assess target status. In this paper, we propose a team theoretic approach to efficiently allocate UAVs to the targets with the constraint that UAVs do not communicate among themselves and have limited sensor range. We study the performance of team theoretic approach for task allocation on a battle field scenario. The performance obtained through team theory is compared with two other methods, namely, limited sensor range but with communication among all the UAVs, and greedy strategy with limited sensor range and no communication. It is found that the team theoretic strategy performs the best even though it assumes limited sensor range and no communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most bacterial genomes harbor restriction-modification systems, encoding a REase and its cognate MTase. On attack by a foreign DNA, the REase recognizes it as nonself and subjects it to restriction. Should REases be highly specific for targeting the invading foreign DNA? It is often considered to be the case. However, when bacteria harboring a promiscuous or high-fidelity variant of the REase were challenged with bacteriophages, fitness was maximal under conditions of catalytic promiscuity. We also delineate possible mechanisms by which the REase recognizes the chromosome as self at the noncanonical sites, thereby preventing lethal dsDNA breaks. This study provides a fundamental understanding of how bacteria exploit an existing defense system to gain fitness advantage during a host-parasite coevolutionary ``arms race.''

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the present work, we experimentally study and demarcate the stall flutter boundaries of a NACA 0012 airfoil at low Reynolds numbers (Re similar to 10(4)) by measuring the forces and flow fields around the airfoil when it is forced to oscillate. The airfoil is placed at large mean angle of attack (alpha(m)), and is forced to undergo small amplitude pitch oscillations, the amplitude (Delta alpha) and frequency (f) of which are systematically varied. The unsteady loads on the oscillating airfoil are directly measured, and are used to calculate the energy transfer to the airfoil from the flow. These measurements indicate that for large mean angles of attack of the airfoil (alpha(m)), there is positive energy transfer to the airfoil over a range of reduced frequencies (k=pi fc/U), indicating that there is a possibility of airfoil excitation or stall flutter even at these low Re (c=chord length). Outside this range of reduced frequencies, the energy transfer is negative and under these conditions the oscillations would be damped. Particle Image Velocimetry (PIV) measurements of the flow around the oscillating airfoil show that the shear layer separates from the leading edge and forms a leading edge vortex, although it is not very clear and distinct due to the low oscillation amplitudes. On the other hand, the shear layer formed after separation is found to clearly move periodically away from the airfoil suction surface and towards it with a phase lag to the airfoil oscillations. The phase of the shear layer motion with respect to the airfoil motions shows a clear difference between the exciting and the damping case.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The problem of designing good Space-Time Block Codes (STBCs) with low maximum-likelihood (ML) decoding complexity has gathered much attention in the literature. All the known low ML decoding complexity techniques utilize the same approach of exploiting either the multigroup decodable or the fast-decodable (conditionally multigroup decodable) structure of a code. We refer to this well known technique of decoding STBCs as Conditional ML (CML) decoding. In [1], we introduced a framework to construct ML decoders for STBCs based on the Generalized Distributive Law (GDL) and the Factor-graph based Sum-Product Algorithm, and showed that for two specific families of STBCs, the Toepltiz codes and the Overlapped Alamouti Codes (OACs), the GDL based ML decoders have strictly less complexity than the CML decoders. In this paper, we introduce a `traceback' step to the GDL decoding algorithm of STBCs, which enables roughly 4 times reduction in the complexity of the GDL decoders proposed in [1]. Utilizing this complexity reduction from `traceback', we then show that for any STBC (not just the Toeplitz and Overlapped Alamouti Codes), the GDL decoding complexity is strictly less than the CML decoding complexity. For instance, for any STBC obtained from Cyclic Division Algebras that is not multigroup or conditionally multigroup decodable, the GDL decoder provides approximately 12 times reduction in complexity compared to the CML decoder. Similarly, for the Golden code, which is conditionally multigroup decodable, the GDL decoder is only about half as complex as the CML decoder.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Heat transfer rates measured in front and to the side of a protrusion on an aluminum flat plate subjected to hypersonic flow at zero angle of attack are presented for two flow enthalpies of approximately 2 MJ/kg and 4.5 MJ/kg. Experiments were conducted in the hypersonic shock tunnel (HST2) and free piston driven HST3 at a freestream Mach number of 8. Heat transfer data was obtained for different geometries of the protrusion of a height of 4 mm, which is approximately the local boundary layer thickness. Comparatively high rates of heat transfer were obtained at regions of flow circulation in the separated region, with the hottest spot generally appearing in front of the protuberance. Experimental values showed moderate agreement with existing empirical correlations at higher enthalpy but not at all for the lower enthalpy condition, although the correlations were coined at enthalpy values nearer to the lower value. Schlieren visualization was also done to investigate the flow structures qualitatively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the sliding mode control based guidance laws to intercept stationary targets at a desired impact time are proposed. Then, it is extended to constant velocity targets using the notion of predicted interception. The desired impact time is achieved by selecting the interceptor's lateral acceleration to enforce a sliding mode on a switching surface designed using non-linear engagement dynamics. Numerical simulation results are presented to validate the proposed guidance law for different initial engagement geometries, impact times and salvo attack scenarios

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Experiments were conducted to measure the heat flux in the vicinity of a three-dimensional protuberance placed on a flat plate facing a hypersonic flow at zero angle of attack. The effects of flow enthalpy and height of the protuberance on the interference heating in its vicinity were studied. Evidence of disturbed flow with highly three-dimensional characteristics and heightened vorticity was observed near the protrusion. A parametric study by changing the deflection angle of the protuberance was also made. Correlations exist in the open literature for enthalpy values lower than 2  MJ/kg. This effort has yielded a new correlation that is valid for enthalpies up to 6  MJ/kg. The Z-type schlieren technique was used to visualize the flow features qualitatively for one of the flow conditions studied.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

n this paper, three-axis autopilot of a tactical flight vehicle has been designed for surface to air application. Both nonlinear and linear design synthesis and analysis have been carried out pertaining to present flight vehicle. Lateral autopilot performance has been compared by tracking lateral acceleration components along yaw and pitch plane at higher angles of attack in presence of side force and aerodynamic nonlinearity. The nonlinear lateral autopilot design is based on dynamic inversion and time scale separation principle. The linear lateral autopilot design is based on three-loop topology. Roll autopilot robustness performance has been enhanced against unmodeled roll disturbances by backstepping technique. Complete performance comparison results of both nonlinear and linear controller based on six degrees of freedom simulation along with stability and robustness studies with respect to plant parameter variation have been discussed in the paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the approach for assigning cooperative communication of Uninhabited Aerial Vehicles (UAV) to perform multiple tasks on multiple targets is posed as a combinatorial optimization problem. The multiple task such as classification, attack and verification of target using UAV is employed using nature inspired techniques such as Artificial Immune System (AIS), Particle Swarm Optimization (PSO) and Virtual Bee Algorithm (VBA). The nature inspired techniques have an advantage over classical combinatorial optimization methods like prohibitive computational complexity to solve this NP-hard problem. Using the algorithms we find the best sequence in which to attack and destroy the targets while minimizing the total distance traveled or the maximum distance traveled by an UAV. The performance analysis of the UAV to classify, attack and verify the target is evaluated using AIS, PSO and VBA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A robust suboptimal reentry guidance scheme is presented for a reusable launch vehicle using the recently developed, computationally efficient model predictive static programming. The formulation uses the nonlinear vehicle dynamics with a spherical and rotating Earth, hard constraints for desired terminal conditions, and an innovative cost function having several components with associated weighting factors that can account for path and control constraints in a soft constraint manner, thereby leading to smooth solutions of the guidance parameters. The proposed guidance essentially shapes the trajectory of the vehicle by computing the necessary angle of attack and bank angle that the vehicle should execute. The path constraints are the structural load constraint, thermal load constraint, bounds on the angle of attack, and bounds on the bank angle. In addition, the terminal constraints include the three-dimensional position and velocity vector components at the end of the reentry. Whereas the angle-of-attack command is generated directly, the bank angle command is generated by first generating the required heading angle history and then using it in a dynamic inversion loop considering the heading angle dynamics. Such a two-loop synthesis of bank angle leads to better management of the vehicle trajectory and avoids mathematical complexity as well. Moreover, all bank angle maneuvers have been confined to the middle of the trajectory and the vehicle ends the reentry segment with near-zero bank angle, which is quite desirable. It has also been demonstrated that the proposed guidance has sufficient robustness for state perturbations as well as parametric uncertainties in the model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a multipartite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the information between them. We propose here a tripartite counterfactual quantum protocol for the task of certificate authorization. Here a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. The protocol is counterfactual with respect to either Bob or Charlie. We prove its security against a general incoherent attack, where Eve attacks single particles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thermal decomposition of propargyl alcohol (C3H3OH), a molecule of interest in interstellar chemistry and combustion, was investigated using a single pulse shock tube in the temperature ranging from 953 to 1262 K. The products identified include acetylene, propyne, vinylacetylene, propynal, propenal, and benzene. The experimentally observed overall rate constant for thermal decomposition of propargyl alcohol was found to be k = 10((10.17 +/- 0.36)) exp(-39.70 +/- 1.83)/RT) s(-1) Ab initio theoretical calculations were carried out to understand the potential energy surfaces involved in the primary and secondary steps of propargyl alcohol thermal decomposition. Transition state theory was used to predict the rate constants, which were then used and refined in a kinetic simulation of the product profile. The first step in the decomposition is C-O bond dissociation, leading to the formation of two important radicals in combustion, OH and propargyl. This has been used to study the reverse OH propargyl radical reaction, about which there appears to be no prior work. Depending on the site of attack, this reaction leads to propargyl alcohol or propenal, one of the major products at temperatures below 1200 K. A detailed mechanism has been derived to explain all the observed products.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Decarboxylative thioesterification of isatoic anhydrides mediated by benzyl(triethyl)ammonium tetrathiomolybdate gave the corresponding S-alkyl or S-aryl 2-aminobenzenecarbothioate derivatives at 60 degrees C. At ambient temperature, organic disulfides were reductive cleaved in the presence of tetrathiomolybdate to generate thiolate anions in situ; this was followed by attack on isatoic anhydrides to give the corresponding S-alkyl or S-aryl 2-aminobenzenecarbothioate derivatives. Additionally, it was shown that multistep reactions could be performed with tetrathiomolybdate, starting with an alkyl halide as a precursor of an alkyl disulfide, which, in turn, was used for ring opening of isatoic anhydrides.