246 resultados para Attack helicopters


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Discussion of censorship and media freedom in the context of The Interview. A few weeks before the murderous attack by Islamic extremists on the satirical journal Charlie Hebdo, the Hollywood dream factory had its own encounter with would-be censors. The Interview (Evan Goldberg and Seth Rogen, 2014), as everyone with an interest in culture and current affairs cannot fail to be aware of by now, is a comedy in the “grossout” tradition exemplified by commercially successful movies such as Ted (Seth MacFarlane, 2012) and Bridesmaids (Paul Feig, 2011). Their humour is a combination of slapstick, physical comedy, and scatological jokes involving body fluids and the like— hence the “gross”. The best of them have been very funny, as well as bordering on the offensive (see Ted’s scene involving prostitutes, a foul-mouthed teddy bear and the entertainment value of someone taking a dump on the living room floor). They have often been controversial, as in the Farrelly brothers’ Me, Myself and Irene (2000), starring Jim Carrey as a schizophrenic police officer. At their most outrageous they have pushed the boundaries of political correctness to the limit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. Under nominal conditions (that is, when there are no attacks), the system always stays inside its safety envelope. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside the safety envelope. We synthesize safety envelopes using a modified machine learning procedure applied on data collected from the system when it is not under attack. We present experimental results that show effectiveness of our approach, and also validate the several novel features that we introduced in our learning procedure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Details the developments to date of an unmanned air vehicle (UAV) based on a standard size 60 model helicopter. The design goal is to have the helicopter achieve stable hover with the aid of an INS and stereo vision. The focus of the paper is on the development of an artificial neural network (ANN) that makes use of only the INS data to generate hover commands, which are used to directly manipulate the flight servos. Current results show that networks incorporating some form of recurrency (state history) offer little advantage over those without. At this stage, the ANN has partially maintained periods of hover even with misaligned sensors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the 21st century city, public space for a range of users, but especially children and young people, has come under threat. Watson proposed that “public space itself has come under attack from several directions-thematisation, enclosure into malls and other controlled spaces, and privatisation, or from urban planning and design interventions to erase its uniqueness”. Largely as a result of these trends, Scott observed that “young urbanites form a marginalised age class movement is restricted, out of fear and distrust, within aims to protect, monitored by city surveillance methods within the security-obsessed fabric”. The use of public space by children and young people is a contentious issue in a number of countries and a range of measures deployed to control public space curtail the rights of children and young people to claim the space for their use through curfews, oppressive camera surveillance and at times, the unwarranted attentions of police and private security personnel.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We provide the first evidence for interspecific warfare in bees, a spectacular natural phenomenon that involves a series of aerial battles and leads to thousands of fatalities from both attacking and defending colonies. Molecular analysis of fights at a hive of the Australian stingless bee Tetragonula carbonaria revealed that the attack was launched by a related species, Tetragonula hockingsi, which has only recently extended its habitat into southeastern Queensland. Following a succession of attacks by the same T. hockingsi colony over a 4-month period, the defending T. carbonaria colony was defeated and the hive usurped, with the invading colony installing a new queen. We complemented our direct observations with a 5-year study of more than 260 Tetragonula hives and found interspecific hive changes, which were likely to be usurpation events, occurring in 46 hives over this period. We discuss how fighting swarms and hive usurpation fit with theoretical predictions on the evolution of fatal fighting and highlight the many unexplained features of these battles that warrant further study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The phosphatidylinositol-3-kinase (PI3K)/Akt/mTOR pathway is one of the most frequently activated signaling pathways in prostate cancer cells, and loss of the tumor suppressor PTEN and amplification of PIK3CA are the two most commonly detected mechanisms for the activation of these pathways. Aberrant activation of PI3K/Akt/mTOR has been implicated not only in the survival and metastasis of prostate cancer cells but also in the development of drug resistance. As such, selective inactivation of this pathway may provide opportunities to attack prostate cancer from all fronts. However, while preclinical studies examining specific inhibitors of PI3K or mTOR have yielded promising results, the evidence from clinical trials is less convincing. Emerging evidence from the analyses of some solid tumors suggests that a class of dual PI3K/mTOR inhibitors, which bind to and inactivate both PI3K and mTOR, may achieve better anti-cancer outcomes. In this review, we will summarize the mechanisms of action of these inhibitors, their effectiveness when used alone or in combination with other chemotherapeutic compounds, and their potential to serve as the next generation therapies for prostate cancer patients, particularly those who are resistant to the frontline chemotherapeutic drugs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we analyse two variants of SIMON family of light-weight block ciphers against variants of linear cryptanalysis and present the best linear cryptanalytic results on these variants of reduced-round SIMON to date. We propose a time-memory trade-off method that finds differential/linear trails for any permutation allowing low Hamming weight differential/linear trails. Our method combines low Hamming weight trails found by the correlation matrix representing the target permutation with heavy Hamming weight trails found using a Mixed Integer Programming model representing the target differential/linear trail. Our method enables us to find a 17-round linear approximation for SIMON-48 which is the best current linear approximation for SIMON-48. Using only the correlation matrix method, we are able to find a 14-round linear approximation for SIMON-32 which is also the current best linear approximation for SIMON-32. The presented linear approximations allow us to mount a 23-round key recovery attack on SIMON-32 and a 24-round Key recovery attack on SIMON-48/96 which are the current best results on SIMON-32 and SIMON-48. In addition we have an attack on 24 rounds of SIMON-32 with marginal complexity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Two symposia on “cardiovascular diseases and vulnerable plaques” Cardiovascular disease (CVD) is the leading cause of death worldwide. Huge effort has been made in many disciplines including medical imaging, computational modeling, bio- mechanics, bioengineering, medical devices, animal and clinical studies, population studies as well as genomic, molecular, cellular and organ-level studies seeking improved methods for early detection, diagnosis, prevention and treatment of these diseases [1-14]. However, the mechanisms governing the initiation, progression and the occurrence of final acute clinical CVD events are still poorly understood. A large number of victims of these dis- eases who are apparently healthy die suddenly without prior symptoms. Available screening and diagnostic methods are insufficient to identify the victims before the event occurs [8,9]. Most cardiovascular diseases are associated with vulnerable plaques. A grand challenge here is to develop new imaging techniques, predictive methods and patient screening tools to identify vulnerable plaques and patients who are more vulnerable to plaque rupture and associated clinical events such as stroke and heart attack, and recommend proper treatment plans to prevent those clinical events from happening. Articles in this special issue came from two symposia held recently focusing on “Cardio-vascular Diseases and Vulnerable Plaques: Data, Modeling, Predictions and Clinical Applications.” One was held at Worcester Polytechnic Institute (WPI), Worcester, MA, USA, July 13-14, 2014, right after the 7th World Congress of Biomechanics. This symposium was endorsed by the World Council of Biomechanics, and partially supported by a grant from NIH-National Institute of Biomedical Image and Bioengineering. The other was held at Southeast University (SEU), Nanjing, China, April 18-20, 2014.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rupture of atheromatous plaque is the major cause of stroke or heart attack. Considering that the cardiovascular system is a classic fatigue environment, plaque rupture was treated as a chronic fatigue crack growth process in this study. Fracture mechanics theory was introduced to describe the stress status at the crack tip and Paris' law was used to calculate the crack growth rate. The effect of anatomical variation of an idealized plaque cross-section model was investigated. The crack initiation was considered to be either at the maximum circumferential stress location or at any other possible locations around the lumen. Although the crack automatically initialized at the maximum circumferential stress location usually propagated faster than others, it was not necessarily the most critical location where the fatigue life reached its minimum. We found that the fatigue life was minimum for cracks initialized in the following three regions: the midcap zone, the shoulder zone, and the backside zone. The anatomical variation has a significant influence on the fatigue life. Either a decrease in cap thickness or an increase in lipid pool size resulted in a significant decrease in fatigue life. Comparing to the previously used stress analysis, this fatigue model provides some possible explanations of plaque rupture at a low stress level in a pulsatile cardiovascular environment, and the method proposed here may be useful for further investigation of the mechanism of plaque rupture based on in vivo patient data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rupture of vulnerable atheromatous plaque in the carotid and coronary arteries often leads to stroke and heart attack respectively. The mechanism of blood flow and plaque rupture in stenotic arteries is still not fully understood. A three dimensional rigid wall model was solved under steady state conditions and unsteady conditions by assuming a time-varying inlet velocity profile to investigate the relative importance of axial forces and pressure drops in arteries with asymmetric stenosis. Flow-structure interactions were investigated for the same geometry and the results were compared with those retrieved with the corresponding 2D cross-section structural models. The Navier-Stokes equations were used as the governing equations for the fluid. The tube wall was assumed hyperelastic, homogeneous, isotropic and incompressible. The analysis showed that the three dimensional behavior of velocity, pressure and wall shear stress is in general very different from that predicted by cross-section models. Pressure drop across the stenosis was found to be much higher than shear stress. Therefore, pressure may be the more important mechanical trigger for plaque rupture other than shear stress, although shear stress is closely related to plaque formation and progression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Rupture of vulnerable atheromatous plaque in the carotid and coronary arteries often leads to stroke and heart attack respectively. The role of calcium deposition and its contribution to plaque stability is controversial. This study uses both an idealized and a patient-specific model to evaluate the effect of a calcium deposit on the stress distribution within an atheromatous plaque. Methods: Using a finite-element method, structural analysis was performed on an idealized plaque model and the location of a calcium deposit within it was varied. In addition to the idealized model, in vivo high-resolution MR imaging was performed on 3 patients with carotid atheroma and stress distributions were generated. The individual plaques were chosen as they had calcium at varying locations with respect to the lumen and the fibrous cap. Results: The predicted maximum stress was increased by 47.5% when the calcium deposit was located in the thin fibrous cap in the model when compared with that in a model without a deposit. The result of adding a calcium deposit either to the lipid core or remote from the lumen resulted in almost no increase in maximal stress. Conclusion: Calcification at the thin fibrous cap may result in high stress concentrations, ultimately increasing the risk of plaque rupture. Assessing the location of calcification may, in the future, aid in the risk stratification of patients with carotid stenosis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: The serotonergic system is thought to play an important role for mediating susceptibility to migraine and depression, which is frequently found comorbid in migraine. The functional polymorphism in the serotonin transporter gene linked polymorphic region (5-HTTLPR/SLC6A4) was previously associated with attack frequency and, thus, possibly with chronification. OBJECTIVE: We hypothesized that patients with the "s" allele have higher attack frequency and, paralleling results in depression research, higher scores of depression. METHODS: Genetic analysis of the SLC6A4 44 bp insertion/deletion polymorphism (5-HTTLPR) was performed in 293 patients with migraine with and without aura. Self-rating questionnaires were used for assessment of depression. RESULTS: Multinomial logistic regression analysis found no evidence for association of the 5-HTTLPR polymorphism with either depression or migraine attack frequency. CONCLUSION: We were not able to demonstrate any influence of the serotonin transporter 5-HTTLPR polymorphism on migraine phenomenology (attack frequency or comorbid depression), thereby excluding this variant to be a common genetic denominator for chronic migraine and depression.