119 resultados para Cube attack


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The current study describes the evolution of microstructure and texture in an Al-Zn-Mg-Cu-Zr-based 7010 aluminum alloy during different modes of hot cross-rolling. Processing of materials involves three different types of cross-rolling. The development of texture in the one-step cross-rolled specimen can be described by a typical beta-fiber having the maximum intensity near Copper (Cu) component. However, for the multi-step cross-rolled specimens, the as-rolled texture is mainly characterized by a strong rotated-Brass (Bs) component and a very weak rotated-cube component. Subsequent heat treatment leads to sharpening of the major texture component (i.e., rotated-Bs). Furthermore, the main texture components in all the specimens appear to be significantly rotated in a complex manner away from their ideal positions because of non-symmetric deformations in the two rolling directions. Detailed microstructural study indicates that dynamic recovery is the dominant restoration mechanism operating during the hot rolling. During subsequent heat treatment, static recovery dominates, while a combination of particle-stimulated nucleation (PSN) and strain-induced grain boundary migration (SIBM) causes partial recrystallization of the grain structure. The aforementioned restoration mechanisms play an important role in the development of texture components. The textural development in the current study could be attributed to the combined effects of (a) cross-rolling and inter-pass annealing that reduce the intensity of Cu component after each successive pass, (b) recrystallization resistance of Bs-oriented grains, (c) stability of Bs texture under cross-rolling, and (d) Zener pinning by Al3Zr dispersoids.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the stiffness and mass per unit length distributions of a rotating beam, which is isospectral to a given uniform axially loaded nonrotating beam, are determined analytically. The Barcilon-Gottlieb transformation is extended so that it transforms the governing equation of a rotating beam into the governing equation of a uniform, axially loaded nonrotating beam. Analysis is limited to a certain class of Euler-Bernoulli cantilever beams, where the product between the stiffness and the cube of mass per unit length is a constant. The derived mass and stiffness distributions of the rotating beam are used in a finite element analysis to confirm the frequency equivalence of the given and derived beams. Examples of physically realizable beams that have a rectangular cross section are shown as a practical application of the analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Cu-Cu multilayer processed by accumulative roll bonding was deformed to large strains and further annealed. The texture of the deformed Cu-Cu multilayer differs from the conventional fcc rolling textures in terms of higher fractions of Bs and RD-rotated cube components, compared with the volume fraction of Cu component. The elongated grain shape significantly affects the deformation characteristics. Characteristic microstructural features of both continuous dynamic recrystallization and discontinuous dynamic recrystallization were observed in the microtexture measurements. X-ray texture measurements of annealing of heavily deformed multilayer demonstrate constrained recrystallization and resulted in a bimodal grain size distribution in the annealed material at higher strains. The presence of cube- and BR-oriented grains in the deformed material confirms the oriented nucleation as the major influence on texture change during recrystallization. Persistence of cube component throughout the deformation is attributed to dynamic recrystallization. Evolution of RD-rotated cube is attributed to the deformation of cube components that evolve from dynamic recrystallization. The relaxation of strain components leads to Bs at larger strains. Further, the Bs component is found to recover rather than recrystallize during deformation. The presence of predominantly Cu and Bs orientations surrounding the interface layer suggests constrained annealing behavior.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the present work, we experimentally study and demarcate the stall flutter boundaries of a NACA 0012 airfoil at low Reynolds numbers (Re similar to 10(4)) by measuring the forces and flow fields around the airfoil when it is forced to oscillate. The airfoil is placed at large mean angle of attack (alpha(m)), and is forced to undergo small amplitude pitch oscillations, the amplitude (Delta alpha) and frequency (f) of which are systematically varied. The unsteady loads on the oscillating airfoil are directly measured, and are used to calculate the energy transfer to the airfoil from the flow. These measurements indicate that for large mean angles of attack of the airfoil (alpha(m)), there is positive energy transfer to the airfoil over a range of reduced frequencies (k=pi fc/U), indicating that there is a possibility of airfoil excitation or stall flutter even at these low Re (c=chord length). Outside this range of reduced frequencies, the energy transfer is negative and under these conditions the oscillations would be damped. Particle Image Velocimetry (PIV) measurements of the flow around the oscillating airfoil show that the shear layer separates from the leading edge and forms a leading edge vortex, although it is not very clear and distinct due to the low oscillation amplitudes. On the other hand, the shear layer formed after separation is found to clearly move periodically away from the airfoil suction surface and towards it with a phase lag to the airfoil oscillations. The phase of the shear layer motion with respect to the airfoil motions shows a clear difference between the exciting and the damping case.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The design of modulation schemes for the physical layer network-coded three-way wireless relaying scenario is considered. The protocol employs two phases: Multiple Access (MA) phase and Broadcast (BC) phase with each phase utilizing one channel use. For the two-way relaying scenario, it was observed by Koike-Akino et al. [4], that adaptively changing the network coding map used at the relay according to the channel conditions greatly reduces the impact of multiple access interference which occurs at the relay during the MA phase and all these network coding maps should satisfy a requirement called exclusive law. This paper does the equivalent for the three-way relaying scenario. We show that when the three users transmit points from the same 4-PSK constellation, every such network coding map that satisfies the exclusive law can be represented by a Latin Cube of Second Order. The network code map used by the relay for the BC phase is explicitly obtained and is aimed at reducing the effect of interference at the MA stage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Heat transfer rates measured in front and to the side of a protrusion on an aluminum flat plate subjected to hypersonic flow at zero angle of attack are presented for two flow enthalpies of approximately 2 MJ/kg and 4.5 MJ/kg. Experiments were conducted in the hypersonic shock tunnel (HST2) and free piston driven HST3 at a freestream Mach number of 8. Heat transfer data was obtained for different geometries of the protrusion of a height of 4 mm, which is approximately the local boundary layer thickness. Comparatively high rates of heat transfer were obtained at regions of flow circulation in the separated region, with the hottest spot generally appearing in front of the protuberance. Experimental values showed moderate agreement with existing empirical correlations at higher enthalpy but not at all for the lower enthalpy condition, although the correlations were coined at enthalpy values nearer to the lower value. Schlieren visualization was also done to investigate the flow structures qualitatively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the sliding mode control based guidance laws to intercept stationary targets at a desired impact time are proposed. Then, it is extended to constant velocity targets using the notion of predicted interception. The desired impact time is achieved by selecting the interceptor's lateral acceleration to enforce a sliding mode on a switching surface designed using non-linear engagement dynamics. Numerical simulation results are presented to validate the proposed guidance law for different initial engagement geometries, impact times and salvo attack scenarios

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Helical propulsion is at the heart of locomotion strategies utilized by various natural and artificial swimmers. We used experimental observations and a numerical model to study the various fluctuation mechanisms that determine the performance of an externally driven helical propeller as the size of the helix is reduced. From causality analysis, an overwhelming effect of orientational noise at low length scales is observed, which strongly affects the average velocity and direction of motion of a propeller. For length scales smaller than a few micrometers in aqueous media, the operational frequency for the propulsion system would have to increase as the inverse cube of the size, which can be the limiting factor for a helical propeller to achieve locomotion in the desired direction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Experiments were conducted to measure the heat flux in the vicinity of a three-dimensional protuberance placed on a flat plate facing a hypersonic flow at zero angle of attack. The effects of flow enthalpy and height of the protuberance on the interference heating in its vicinity were studied. Evidence of disturbed flow with highly three-dimensional characteristics and heightened vorticity was observed near the protrusion. A parametric study by changing the deflection angle of the protuberance was also made. Correlations exist in the open literature for enthalpy values lower than 2  MJ/kg. This effort has yielded a new correlation that is valid for enthalpies up to 6  MJ/kg. The Z-type schlieren technique was used to visualize the flow features qualitatively for one of the flow conditions studied.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

n this paper, three-axis autopilot of a tactical flight vehicle has been designed for surface to air application. Both nonlinear and linear design synthesis and analysis have been carried out pertaining to present flight vehicle. Lateral autopilot performance has been compared by tracking lateral acceleration components along yaw and pitch plane at higher angles of attack in presence of side force and aerodynamic nonlinearity. The nonlinear lateral autopilot design is based on dynamic inversion and time scale separation principle. The linear lateral autopilot design is based on three-loop topology. Roll autopilot robustness performance has been enhanced against unmodeled roll disturbances by backstepping technique. Complete performance comparison results of both nonlinear and linear controller based on six degrees of freedom simulation along with stability and robustness studies with respect to plant parameter variation have been discussed in the paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the approach for assigning cooperative communication of Uninhabited Aerial Vehicles (UAV) to perform multiple tasks on multiple targets is posed as a combinatorial optimization problem. The multiple task such as classification, attack and verification of target using UAV is employed using nature inspired techniques such as Artificial Immune System (AIS), Particle Swarm Optimization (PSO) and Virtual Bee Algorithm (VBA). The nature inspired techniques have an advantage over classical combinatorial optimization methods like prohibitive computational complexity to solve this NP-hard problem. Using the algorithms we find the best sequence in which to attack and destroy the targets while minimizing the total distance traveled or the maximum distance traveled by an UAV. The performance analysis of the UAV to classify, attack and verify the target is evaluated using AIS, PSO and VBA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A robust suboptimal reentry guidance scheme is presented for a reusable launch vehicle using the recently developed, computationally efficient model predictive static programming. The formulation uses the nonlinear vehicle dynamics with a spherical and rotating Earth, hard constraints for desired terminal conditions, and an innovative cost function having several components with associated weighting factors that can account for path and control constraints in a soft constraint manner, thereby leading to smooth solutions of the guidance parameters. The proposed guidance essentially shapes the trajectory of the vehicle by computing the necessary angle of attack and bank angle that the vehicle should execute. The path constraints are the structural load constraint, thermal load constraint, bounds on the angle of attack, and bounds on the bank angle. In addition, the terminal constraints include the three-dimensional position and velocity vector components at the end of the reentry. Whereas the angle-of-attack command is generated directly, the bank angle command is generated by first generating the required heading angle history and then using it in a dynamic inversion loop considering the heading angle dynamics. Such a two-loop synthesis of bank angle leads to better management of the vehicle trajectory and avoids mathematical complexity as well. Moreover, all bank angle maneuvers have been confined to the middle of the trajectory and the vehicle ends the reentry segment with near-zero bank angle, which is quite desirable. It has also been demonstrated that the proposed guidance has sufficient robustness for state perturbations as well as parametric uncertainties in the model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The recrystallization behaviour of cold-rolled nanocrystalline (nc) nickel has been studied at temperatures between 573 and 1273 K using bulk texture measurements and electron back-scattered diffraction. The texture in nc nickel is different from that of its microcrystalline counterpart, consisting of a strong Goss (G) and rotated Goss (RG) components at 773 K instead of the typical cube component. The texture evolution in nc Ni has been attributed to the prior deformation textures and nucleation advantage of G and RG grains.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a multipartite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the information between them. We propose here a tripartite counterfactual quantum protocol for the task of certificate authorization. Here a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. The protocol is counterfactual with respect to either Bob or Charlie. We prove its security against a general incoherent attack, where Eve attacks single particles.