8 resultados para collision attack

em Aston University Research Archive


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fluidized bed spray granulators (FBMG) are widely used in the process industry for particle size growth; a desirable feature in many products, such as granulated food and medical tablets. In this paper, the first in a series of four discussing the rate of various microscopic events occurring in FBMG, theoretical analysis coupled with CFD simulations have been used to predict granule–granule and droplet–granule collision time scales. The granule–granule collision time scale was derived from principles of kinetic theory of granular flow (KTGF). For the droplet–granule collisions, two limiting models were derived; one is for the case of fast droplet velocity, where the granule velocity is considerable lower than that of the droplet (ballistic model) and another for the case where the droplet is traveling with a velocity similar to the velocity of the granules. The hydrodynamic parameters used in the solution of the above models were obtained from the CFD predictions for a typical spray fluidized bed system. The granule–granule collision rate within an identified spray zone was found to fall approximately within the range of 10-2–10-3 s, while the droplet–granule collision was found to be much faster, however, slowing rapidly (exponentially) when moving away from the spray nozzle tip. Such information, together with the time scale analysis of droplet solidification and spreading, discussed in part II and III of this study, are useful for probability analysis of the various event occurring during a granulation process, which then lead to be better qualitative and, in part IV, quantitative prediction of the aggregation rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The heightened threat of terrorism has caused governments worldwide to plan for responding to large-scale catastrophic incidents. In England the New Dimension Programme supplies equipment, procedures and training to the Fire and Rescue Service to ensure the country's preparedness to respond to a range of major critical incidents. The Fire and Rescue Service is involved partly by virtue of being able to very quickly mobilize a large skilled workforce and specialist equipment. This paper discusses the use of discrete event simulation modeling to understand how a fire and rescue service might position its resources before an incident takes place, to best respond to a combination of different incidents at different locations if they happen. Two models are built for this purpose. The first model deals with mass decontamination of a population following a release of a hazardous substance—aiming to study resource requirements (vehicles, equipment and manpower) necessary to meet performance targets. The second model deals with the allocation of resources across regions—aiming to study cover level and response times, analyzing different allocations of resources, both centralized and decentralized. Contributions to theory and practice in other contexts (e.g. the aftermath of natural disasters such as earthquakes) are outlined.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

OBJECTIVE: The discipline of clinical neuropsychiatry currently provides specialised services for a number of conditions that cross the traditional boundaries of neurology and psychiatry, including non-epileptic attack disorder. Neurophysiological investigations have an important role within neuropsychiatry services, with video-electroencephalography (EEG) telemetry being the gold standard investigation for the differential diagnosis between epileptic seizures and non-epileptic attacks. This article reviews existing evidence on best practices for neurophysiology investigations, with focus on safety measures for video-EEG telemetry. METHODS: We conducted a systematic literature review using the PubMed database in order to identify the scientific literature on the best practices when using neurophysiological investigations in patients with suspected epileptic seizures or non-epileptic attacks. RESULTS: Specific measures need to be implemented for video-EEG telemetry to be safely and effectively carried out by neuropsychiatry services. A confirmed diagnosis of non-epileptic attack disorder following video-EEG telemetry carried out within neuropsychiatry units has the inherent advantage of allowing diagnosis communication and implementation of treatment strategies in a timely fashion, potentially improving clinical outcomes and cost-effectiveness significantly. CONCLUSION: The identified recommendations set the stage for the development of standardised guidelines to enable neuropsychiatry services to implement streamlined and evidence-based care pathways.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report for the first time, rogue waves generation in a mode-locked fiber laser that worked in multiple-soliton state in which hundreds of solitons occupied the whole laser cavity. Using real-time spatio-temporal intensity dynamics measurements, it is unveiled that nonlinear soliton collision accounts for the formation of rogue waves in this laser state. The nature of interactions between solitons are also discussed. Our observation may suggest similar formation mechanisms of rogue waves in other systems.