66 resultados para Counterfeiting Attack

em Indian Institute of Science - Bangalore - Índia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grouping and coordination tactics for ground attack missions by a heterogeneous mix of reconnaissance, enemy suppression, and attack unmanned aerial vehicles (UAVs) is presented. Dubins' paths are used to determine the optimal number of attack UAVs and their positional and heading freedoms, as functions of weapon seeker range and field of view. A generic battlefield scenario with layered defense is created and the tactics are evaluated on a Group Flyer simulation platform for both nominal and off-nominal conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Glycodelin A (GdA), is a lipocalin with an immunomodulatory role, secreted by the endometrium under progesterone regulation and proposed to play a role in protecting the fetus from maternal immune attack. Glycodelin A has an inhibitory effect on the proliferation of T cells and B cells and also on the activity of natural killer cells. We have earlier demonstrated that the inhibitory effect of glycodelin A on T cell proliferation is due to apoptosis induced in these cells through the caspase-dependent intrinsic mitochondrial pathway. Studies reported until now have shown that glycodelin modulates the adaptive immune responses. We, therefore, decided to look at its effect, if any, on the innate immune system. The effect of glycodelin on monocytes was studied using human monocytic cell lines, THP1 and U937, and primary human monocytes as model systems. We demonstrated that glycodelin inhibited the proliferation of THP1 and U937 and induced apoptosis in these cells as well as in primary monocytes. We found that this signaling was caspase-independent but followed the intrinsic mitochondrial pathway of apoptosis. No effect of glycodelin was seen on the phagocytic ability of monocytes post-differentiation into macrophages. These observations suggest that, at the fetomaternal interface, glycodelin plays a protective role by deleting the monocytes that could become pro-inflammatory. Importantly, leaving the macrophages untouched to carry on with efficient clearance of the apoptotic cells.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The reactions of terminal borylene complexes of the type [CpFe(CO)(2)(BNR2)](+) (R = `Pr, Cy) with heteroallenes have been investigated by quantum-chemical methods, in an attempt to explain the experimentally observed product distributions. Reaction with dicyclohexylcarbodiimide (CyNCNCy) gives a bis-insertion product, in which 1 equiv of carbodiimide is assimilated into each of the Fe=B and B=N double bonds to form a spirocyclic boronium system. In contrast, isocyanates (R'NCO, R' = Ph, 2,6-wXy1, CY; XYl = C6H3Me2) react to give isonitrile complexes of the type [CpFe(CO)(2)(CNR')]+, via a net oxygen abstraction (or formal metathesis) process. Both carbodiimide and socyanate substrates are shown to prefer initial attack at the Fe=B bond rather than the B=N bond of the borylene complex. Further mechanistic studies reveal that the carbodiimide reaction ultimately leads to the bis-insertion compounds [CpFe(CO)(2)C(NCy)(2)B(NCY)(2)CNR2](+), rather than to the isonitrile system [CpFe(CO)(2)(CNCy)](+), on the basis of both thermodynamic (product stability) and kinetic considerations (barrier heights). The mechanism of the initial carbodiimide insertion process is unusual in that it involves coordination of the substrate at the (borylene) ligand followed by migration of the metal fragment, rather than a more conventional process: i.e., coordination of the unsaturated substrate at the metal followed by ligand migration. In the case of isocyanate substrates, metathesis products are competitive with those from the insertion pathway. Direct, single-step metathesis reactivity to give products containing a coordinated isonitrile ligand (i.e. [CpFe(CO)(2)(CNR')](+)) is facile if initial coordination of the isocyanate at boron occurs via the oxygen donor (which is kinetically favored); insertion chemistry is feasible when the isocyanate attacks initially via the nitrogen atom. However, even in the latter case, further reaction of the monoinsertion product so formed with excess isocyanate offers a number of facile (low energetic barrier) routes which also generate ['CpFe(CO)(2)(CNR')](+), rather than the bis-insertion product [CpFe(CO)(2)C(NR')(O)B(NR')(O)CNR2](+) (i.e., the direct analogue of the observed products in the carbodiimide reaction).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Photo-oxidation of α,β-unsaturated thiones yields the corresponding ketones as the only product. Studies carried out on three systems, namely thioketones, α,β-unsaturated thiones and thioketenes, have revealed that there exists a similarity in their mechanism of oxidation. It has been suggested that the thiocarbonyl chromophore is the site of attack by singlet oxygen in α,β-unsaturated thiones and that the adjacent C-C double bond is inert under these conditions. Absence of sulphine during the oxidation of α,β-unsaturated thiones is attributed to the electronic factors operating on the zwitterionic/diradical intermediate. While α,β-unsaturated ketones are poorly reactive, α,β-unsaturated thiones are highly reactive toward singlet oxygen.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A blunt-nosed hypersonic missile mounted with a forward-facing cavity is a good alternative to reduce the stagnation heating rates. The effects of a forward-racing cavity on heat transfer and aerodynamic coefficients are addressed in this paper. Tests were carried out in hypersonic shock tunnel HST2, at a hypersonic Mach number of 8 using a 41 deg apex-angle blunt cone. The aerodynamic forces on the test model with and without a forward-facing cavity at various angles of attack are measured by using an internally mountable accelerometer force balance system. Heat flux measurements have been carried out on the test model with and without a forward-facing cavity of the entire surface at zero degree angle of attack with platinum sensors. A numerical simulation was also carried out using the computational fluid dynamics code (CFX-Ansys 5.7). An important result of this study is that the smaller cavity diameter has the highest lift-to-drag ratio, whereas the medium cavity has the highest heat flux reduction. Theshock structure around the test model has also been visualized using the Schlieren flow visualization technique. The visualized shock structure and the measured aerodynamic forces on the missile-shaped body with cavity configurations agree well with the axisymmetric numerical simulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Interaction of nickel(I1) and copper(I1) complexes of 4,9-dimethy1-5,8-diazadodeca-4,8diene-2,1 ldione, Ni(baen) and 4,6,9-trimethyl-5, 8diazadodeca-4,8-diene-2,ll-dione, Ni(bapn), with arene diazonium chlorides in buffered solutions of methanol yielded metal derivatives of glyoxaliminearylhydrazones. This typical electrophilic addition at the 3-carbon of the complex occurs owing to the pseudo aromatic behaviour of the chelate ring. A mechanism which predicts the attack of the diazonium cation through the coordination shell of the metal is well documented from the available experimental evidences. The chemical reactivity of a few complexes with a single residual non-substituted y-carbon is reasonably manifested by their reaction with phenyl isocyanate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Experimental investigations are carried out in the IISc hypersonic shock tunnel on film cooling effectiveness of a single jet (diameter 2 mm and 0.9 mm), and an array forward facing of micro-jets (diameter 300 mu m each) of same effective area (corresponding to the respective single jet). The single jet and the corresponding micro-jets are injected from the stagnation zone of a blunt cone model (58, apex angle and nose radius of 35 mm). Nitrogen and Helium are injected as coolant gases. Experiments are performed at freestream Mach number 5.9, at 0 degrees angle of attack, with a stagnation enthalpy of 1.84 MJ/kg, with and without injections. The ratios of the jet stagnation pressure to the freestream pitot pressure used in the present study are 1.2 and 1.45. Up to 50% reduction in surface heat transfer rate was observed with the array of micro-jets, compared to that of the respective single jet with nitrogen as the coolant, while the corresponding eduction was up to 37% for helium injection, with the schlieren flow visualizations showing no major change in the shock standoff distance, and thus no major changes in other aerodynamic aspects such as drag.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Various intrusion detection systems (IDSs) reported in the literature have shown distinct preferences for detecting a certain class of attack with improved accuracy, while performing moderately on the other classes. In view of the enormous computing power available in the present-day processors, deploying multiple IDSs in the same network to obtain best-of-breed solutions has been attempted earlier. The paper presented here addresses the problem of optimizing the performance of IDSs using sensor fusion with multiple sensors. The trade-off between the detection rate and false alarms with multiple sensors is highlighted. It is illustrated that the performance of the detector is better when the fusion threshold is determined according to the Chebyshev inequality. In the proposed data-dependent decision ( DD) fusion method, the performance optimization of ndividual IDSs is first addressed. A neural network supervised learner has been designed to determine the weights of individual IDSs depending on their reliability in detecting a certain attack. The final stage of this DD fusion architecture is a sensor fusion unit which does the weighted aggregation in order to make an appropriate decision. This paper theoretically models the fusion of IDSs for the purpose of demonstrating the improvement in performance, supplemented with the empirical evaluation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Drag reduction studies are conducted using a flat disc tipped aerospike for a 120-degree apex angle blunt cone model in high enthalpy flows. Accelerometer based force balance is used for the drag force measurement in the newly established free piston driven shock tunnel, HST3. Drag reduction upto about 58 percent has been achieved for Mach 8 flow of 5 MJ/kg specific enthalpy at zero degree angle of attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. (1) The relative abilities of the various cell fractions of rat and chicken liver to oxidize and reduce retinal and 8'- and 12'-apo-β-carotenal were investigated and it has been shown that, while retinal is exclusively oxidized by the soluble fraction, the apocarotenals are mostly oxidized by the particulate fractions of the homogenate. 2. (2) Addition of NAD+ or NADP+ markedly activated the oxidation of the apocarotenals, but not of retinal by the particulate fractions. 3. (3) Considerable amounts of retinal and 8'-, 10'- and 12'-apo-β-carotenal were isolated from the intestine of chickens fed β-carotene and these apocarotenoids were conclusively identified. 4. (4) Significant amounts of 8'-, 10'- and 12'-apo-β-carotenoic acids were isolated from the intestine of rats given 8'-apo-β-carotenal and these apocarotenoic acids were also conclusively identified. 5. (5) In the light of these observations it is suggested that during conversion to vitamin A, the β-carotene molecule is simultaneously attacked by the dioxygenase at several double bonds, the primary attack being at the central double bond and a tentative scheme for the mechanism of conversion is proposed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Protocatechuate-3,4-dioxygenase from the leaves of Tecoma stans was purified to near homogeneity and some of its properties studied. It was optimally active at pH 5.2 and at 40°C. Its molecular weight of approx. 150 000 was determined by gel filtration on a Sephadex G-150 column. The Km value for protocatechuate was found to be 330 μM and for ferrous sulfate, 40 μM. The enzyme was highly specific for protocatechuate and did not attack any of the substrate analogues. None of the substrate analogues tested inhibited the enzyme activity. Sulfhydryl reagents inhibited the enzyme activity which could be partially reversed by sulfhydryl compounds. The dioxygenase activity was not associated with polyphenol oxidase activity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An adaptive drug delivery design is presented in this paper using neural networks for effective treatment of infectious diseases. The generic mathematical model used describes the coupled evolution of concentration of pathogens, plasma cells, antibodies and a numerical value that indicates the relative characteristic of a damaged organ due to the disease under the influence of external drugs. From a system theoretic point of view, the external drugs can be interpreted as control inputs, which can be designed based on control theoretic concepts. In this study, assuming a set of nominal parameters in the mathematical model, first a nonlinear controller (drug administration) is designed based on the principle of dynamic inversion. This nominal drug administration plan was found to be effective in curing "nominal model patients" (patients whose immunological dynamics conform to the mathematical model used for the control design exactly. However, it was found to be ineffective in curing "realistic model patients" (patients whose immunological dynamics may have off-nominal parameter values and possibly unwanted inputs) in general. Hence, to make the drug delivery dosage design more effective for realistic model patients, a model-following adaptive control design is carried out next by taking the help of neural networks, that are trained online. Simulation studies indicate that the adaptive controller proposed in this paper holds promise in killing the invading pathogens and healing the damaged organ even in the presence of parameter uncertainties and continued pathogen attack. Note that the computational requirements for computing the control are very minimal and all associated computations (including the training of neural networks) can be carried out online. However it assumes that the required diagnosis process can be carried out at a sufficient faster rate so that all the states are available for control computation.