50 resultados para collision attack

em Deakin Research Online - Australia


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper uses the H1 tracking ideas in the missile guidance problem. The controller performs as a Precision guidance controller for small desired attack angles although theoretically the formulas are valid (when intercepting a maneuvering target in a precision guidance point of view) only for the case of head on collision. The controller essentially navigates the missile in a unique relative arc that is de ned by the missile and target location and the desired attack angle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many terrorist attacks are accomplished by bringing explosive devices hidden in ordinary-looking objects to public places. In such case, it is almost impossible to distinguish a terrorist from ordinary people just from the isolated appearance. However, valuable clues might be discovered through analyzing a series of actions of the same person. Abnormal behaviors of object fetching, deposit, or exchange in public places might indicate potential attacks. Based on the widely equipped CCTV surveillance systems at the entrance of many public places, this paper proposes an algorithm to detect such abnormal behaviors for early warning of terrorist attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The promise of cancer immunotherapy is that it will not only eradicate primary tumors but will generate systemic antitumor immunity capable of destroying distant metastases. A major problem that must first be surmounted relates to the immune resistance of large tumors. Here we reveal that immune resistance can be overcome by combining immunotherapy with a concerted attack on the tumor vasculature. The functionally related antitumor drugs 5,6-dimethylxanthenone-4-acetic acid (DMXAA) and flavone acetic acid (FAA), which cause tumor vasculature collapse and tumor necrosis, were used to attack the tumor vasculature, whereas the T-cell costimulator B7.1 (CD80), which costimulates T-cell proliferation via the CD28 pathway, was used to stimulate antitumor immunity. The injection of cDNA (60–180 µg) encoding B7.1 into large EL-4 tumors (0.8 cm in diameter) established in C57BL/6 mice, followed 24 h later by i.p. administration of either DMXAA (25 mg/kg) or FAA (300 mg/kg), resulted in complete tumor eradication within 2–6 weeks. In contrast, monotherapies were ineffective. Both vascular attack and B7.1 immunotherapy led to up-regulation of heat shock protein 70 on stressed and dying tumor cells, potentially augmenting immunotherapy. Remarkably, large tumors took on the appearance of a wound that rapidly ameliorated, leaving perfectly healed skin. Combined therapy was mediated by CD8+ T cells and natural killer cells, accompanied by heightened and prolonged antitumor cytolytic activity (P < 0.001), and by a marked increase in tumor cell apoptosis. Cured animals completely rejected a challenge of 1 x 107 parental EL-4 tumor cells but not a challenge of 1 x 104 Lewis lung carcinoma cells, demonstrating that antitumor immunity was tumor specific. Adoptive transfer of 2 x 108 splenocytes from treated mice into recipients bearing established (0.8 cm in diameter) tumors resulted in rapid and complete tumor rejection within 3 weeks. Although DMXAA and B7.1 monotherapies are complicated by a narrow range of effective doses, combined therapy was less dosage dependent. Thus, a broad range of amounts of B7.1 cDNA were effective in combination with 25 mg/kg DMXAA. In contrast, DMXAA, which has a very narrow range of high active doses, was effective at a low dose (18 mg/kg) when administered with a large amount (180 µg) of B7.1 cDNA. Importantly, combinational therapy generated heightened antitumor immunity, such that gene transfer of B7.1 into one tumor, followed by systemic DMXAA treatment, led to the complete rejection of multiple untreated tumor nodules established in the opposing flank. These findings have important implications for the future direction and utility of cancer immunotherapies aimed at harnessing patients’ immune responses to their own tumors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper furthers the research of Rollo, Luther and Atkinson 1999, and Rollo, Honey, Atkinson and Luther 2003, regarding the way in which building shape appears to contribute to the collection of fire-brand debris subject to ember attack. The paper will present a range of 2D fluid-mapping and 3D wind tunnel studies (Melaragno 1982) which have been correlated with the transportation characteristics of an ember laden air-field (Cheney and Sullivan 1997). Working with a range of generic building types the paper also introduces simple spatial modelling techniques which are being developed to illustrate the relationship between ember capture and changes in wind speed and air pressure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IP spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. It causes serious security problem in the cyber world, and is currently exploited widely in the information warfare. This paper at first introduces the IP spoofing attack through examples, technical issues and attacking types. Later its countermeasures are analysed in detail, which include authentication and encription, filtering and IP traceback. In particular, an IP traceback mechanism, Flexible Deterministic Packet Marking (FDPM) is presented. Since the IP spoofing problem can not be solved only by technology, but it also needs social regulation, the legal issues and economic impact are discussed in the later part.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As increased work demands and longer working hours become the reality for many employees, the concept of work-life balance has received increasing attention. This paper presents findings from an exploratory study of Australian middle managers, which investigated the impact of middle managers’ daily organisational experiences on their lives both in and beyond the workplace. We focus on respondents’ concerns for the encroachment of work on their personal lives, both through the advent of new technologies and the introduction of flexibility initiatives in the workplace. The unwelcome effects of frustration, stress and fatigue highlight the need for organisations to gain a better understanding of employees’ experiences related to work-life balance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information is the glue in any organization. It is needed for policy, decision-making, control, and co-ordination. If an organisation's information systems are disrupted or destroyed, then damage to the whole inevitably follows. This paper uses a proven systemic, analytic framework the Viable System Model (VSM) - in a functionalist mode, to analyse the vulnerabilities of an organisation's information resources to this form of aggression. It examines the tactics available, and where they can be used to effectively attack an organisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Observers judged TTC with computer-generated displays simulating an approaching object in three familiar-size conditions:

(i) Real-size (smaller, larger objects depicted as tennis, soccer balls respectively).
(ii) Off-size (smaller, larger objects depicted as soccer, tennis balls respectively).
(iii) Ambiguous-size (smaller, larger objects depicted as texture-less black balls of different size).

Displays simulated objects approaching observersí viewpoint from 24.96 m, and disappearing at 5.76 m. Manipulation of approach velocities (4.8-19.2 msec-1) produced viewing times from 1.0 to 4.0 sec, and delays between object disappearance and tau-based TTC ranging from 0.3 to 1.2 sec. Motion characteristics of smaller and larger objects in the three familiar-size conditions simulated those of approaching real-sized tennis and soccer balls respectively; that is, for each approach velocity, tau‚-based TTC was the same across the three conditions for smaller and larger objects.

Results showed that, consistent with the proposition of tau-determined TTC, TTC estimates in the real-size condition were uninfluenced by object size. This is contrary to previous reports that TTC for larger objects is underestimated relative to TTC for smaller objects. However, such size-dependent TTC differences were found in the ambiguous-size condition, with even larger differences in the off-size condition; TTCs for the ëlargerí tennis ball were much less than TTCs to the ësmallerí soccer ball compared to corresponding TTCs in the ambiguous-size condition. These results are problematic for the proposition that tau solely determines TTC. We discuss the role of perceptual learning in resolving this problem.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous work, in the area of defense systems has focused on developing a firewall like structure, in order to protect applications from attacks. The major drawback for implementing security in general, is that it affects the performance of the application they are trying to protect. In fact, most developers avoid implementing security at all. With the coming of new multicore systems, we might at last be able to minimize the performance issues that security places on applications. In our bodyguard framework we propose a new kind of defense that acts alongside, not in front, of applications. This means that performance issues that effect system applications are kept to a minimum, but at the same time still provide high grade security. Our experimental results demonstrate that a ten to fifteen percent speedup in performance is possible, with the potential of greater speedup.