996 resultados para differential fault attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bushfires are regular occurrences in the Australian landscape which can, under adverse weather conditions, give rise to losses of life, property, infrastructure, environmental and cultural values. Where property loss is involved, historical surveys of house losses have focussed on ember, radiant heat and flame contact as key bushfire attack mechanisms. Although often noted, little work has been done to quantify the impact of fire generated or fire enhanced wind and pyro-convective events on house loss and to improve construction practice within Australia. It is well known that strong winds are always associated with bushfire events. It is less well known, although increasingly shown through anecdotal evidence, that bushfires are not a passive companion of wind, but indeed they interact with winds and can together cause significant damages to exposed buildings and ecological structures. Previous studies have revealed the effects of wind, fire and structure interactions with the result of increased pressure coefficient distributions on the windward side of a building downstream of a fire front. This paper presents a further analysis of the result in relations to the relevant standards and fire weather conditions. A review of wind code and bushfire code was conducted. Based on the result of the current study, the authors believe it is necessary to consider wind as an attack mechanism in bushfire events. The results of the study will also have implications on bushfire emergency management, design of emergency shelters, perception of danger, emergency evacuation and on risk assessment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

NLS is a stream cipher which was submitted to the eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called Crossword Puzzle (CP) attack. NLSv2 is a tweak version of NLS which aims mainly at avoiding the CP attack. In this paper, a new distinguishing attack against NLSv2 is presented. The attack exploits high correlation amongst neighboring bits of the cipher. The paper first shows that the modular addition preserves pairwise correlations as demonstrated by existence of linear approximations with large biases. Next, it shows how to combine these results with the existence of high correlation between bits 29 and 30 of the S-box to obtain a distinguisher whose bias is around 2^−37. Consequently, we claim that NLSv2 is distinguishable from a random cipher after observing around 2^74 keystream words.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel gray-box neural network model (GBNNM), including multi-layer perception (MLP) neural network (NN) and integrators, is proposed for a model identification and fault estimation (MIFE) scheme. With the GBNNM, both the nonlinearity and dynamics of a class of nonlinear dynamic systems can be approximated. Unlike previous NN-based model identification methods, the GBNNM directly inherits system dynamics and separately models system nonlinearities. This model corresponds well with the object system and is easy to build. The GBNNM is embedded online as a normal model reference to obtain the quantitative residual between the object system output and the GBNNM output. This residual can accurately indicate the fault offset value, so it is suitable for differing fault severities. To further estimate the fault parameters (FPs), an improved extended state observer (ESO) using the same NNs (IESONN) from the GBNNM is proposed to avoid requiring the knowledge of ESO nonlinearity. Then, the proposed MIFE scheme is applied for reaction wheels (RW) in a satellite attitude control system (SACS). The scheme using the GBNNM is compared with other NNs in the same fault scenario, and several partial loss of effect (LOE) faults with different severities are considered to validate the effectiveness of the FP estimation and its superiority.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Cancer metastasis is the main contributor to breast cancer fatalities as women with the metastatic disease have poorer survival outcomes than women with localised breast cancers. There is an urgent need to develop appropriate prognostic methods to stratify patients based on the propensities of their cancers to metastasise. The insulin-like growth factor (IGF)-I:IGF binding protein (IGFBP):vitronectin complexes have been shown to stimulate changes in gene expression favouring increased breast cancer cell survival and a migratory phenotype. We therefore investigated the prognostic potential of these IGF- and extracellular matrix (ECM) interaction-induced proteins in the early identification of breast cancers with a propensity to metastasise using patient-derived tissue microarrays. Methods: Semiquantitative immunohistochemistry analyses were performed to compare the extracellular and subcellular distribution of IGF- and ECM-induced signalling proteins among matched normal, primary cancer and metastatic cancer formalin-fixed paraffin-embedded breast tissue samples. Results: The IGF- and ECM-induced signalling proteins were differentially expressed between subcellular and extracellular localisations. Vitronectin and IGFBP-5 immunoreactivity was lower while β1 integrin immunoreactivity was higher in the stroma surrounding metastatic cancer tissues, as compared to normal breast and primary cancer stromal tissues. Similarly, immunoreactive stratifin was found to be increased in the stroma of primary as well as metastatic breast tissues. Immunoreactive fibronectin and β1 integrin was found to be highly expressed at the leading edge of tumours. Based on the immunoreactivity it was apparent that the cell signalling proteins AKT1 and ERK1/2 shuffled from the nucleus to the cytoplasm with tumour progression. Conclusion: This is the first in-depth, compartmentalised analysis of the distribution of IGF- and ECM-induced signalling proteins in metastatic breast cancers. This study has provided insights into the changing pattern of cellular localisation and expression of IGF- and ECM-induced signalling proteins in different stages of breast cancer. The differential distribution of these biomarkers could provide important prognostic and predictive indicators that may assist the clinical management of breast disease, namely in the early identification of cancers with a propensity to metastasise, and/or recur following adjuvant therapy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mandatory reporting laws have been created in many jurisdictions as a way of identifying cases of severe child maltreatment on the basis that cases will otherwise remain hidden. These laws usually apply to all four maltreatment types. Other jurisdictions have narrower approaches supplemented by differential response systems, and others still have chosen not to enact mandatory reporting laws for any type of maltreatment. In scholarly research and normative debates about mandatory reporting laws and their effects, the four major forms of child maltreatment—physical abuse, sexual abuse, emotional abuse, and neglect—are often grouped together as if they are homogenous in nature, cause, and consequence. Yet, the heterogeneity of maltreatment types, and different reporting practices regarding them, must be acknowledged and explored when considering what legal and policy frameworks are best suited to identify and respond to cases. A related question which is often conjectured upon but seldom empirically explored, is whether reporting laws make a difference in case identification. This article first considers different types of child abuse and neglect, before exploring the nature and operation of mandatory reporting laws in different contexts. It then posits a differentiation thesis, arguing that different patterns of reporting between both reporter groups and maltreatment types must be acknowledged and analysed, and should inform discussions and assessments of optimal approaches in law, policy and practice. Finally, to contribute to the evidence base required to inform discussion, this article conducts an empirical cross-jurisdictional comparison of the reporting and identification of child sexual abuse in jurisdictions with and withoutmandatory reporting, and concludes that mandatory reporting laws appear to be associated with better case identification.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Swietenia macrophylla King (Meliaceae: Swietenioideae) provides one of the premier timbers of the world. The mahogany shoot borer Hypsipyla robusta Moore (Lepidoptera: Pyralidae) is an economically important pest of S. macrophylla throughout Asia, Africa and the Pacific. No viable method of controlling this pest is known. Previous observations have suggested that the presence of overhead shade may reduce attack by H. robusta, but this has not been investigated experimentally. This research was therefore designed to assess the influence of light availability on shoot-borer attack on S. macrophylla, by establishing seedlings under three different artificial shade regimes, then using these seedlings to test oviposition preference of adult moths, neonate larval survival and growth and development of shoot borer larvae. Oviposition preference of shoot borer moths was tested on leaves from seedlings grown under artificial shade for 63 weeks. A significant difference in choice was recorded between treatments, with 27.4 ± 1.5 eggs laid under high shade and 87.1 ± 1.8 under low shade. Neonate larval survival on early flushing leaflets of S. macrophylla did not differ significantly between shade treatments. Larval growth rate, estimated by measuring daily frass width, was significantly higher for those larvae fed on seedlings from the high and medium shade treatments (0.1 mm/day), than the low shade treatment (0.06 mm/day). In laboratory-reared larvae, the total mass of frass produced was significantly higher in the high shade treatment (0.4 g) than under the low shade treatment (0.2 g). Longer tunnel lengths were bored by larvae in plants grown under high shade (12.0 ± 2.4 cm) than under low shade (7.07 ± 1.9 cm). However, pupal mass under low shade was 48% higher than that under the high shade treatment, suggesting that plants grown under high shade were of lower nutritional quality for shoot borer larvae. These results indicate that shading of mahogany seedlings may reduce the incidence of shoot borer attack, by influencing both oviposition and larval development. The establishment of mahogany under suitable shade regimes may therefore provide a basis for controlling shoot borer attack using silvicultural approaches.