996 resultados para differential fault attack
Resumo:
Patients with a number of psychiatric and neuropathological conditions demonstrate problems in recognising facial expressions of emotion. Research indicating that patients with schizophrenia perform more poorly in the recognition of negative valence facial stimuli than positive valence stimuli has been interpreted as evidence of a negative emotion specific deficit. An alternate explanation rests in the psychometric properties of the stimulus materials. This model suggests that the pattern of impairment observed in schizophrenia may reflect initial discrepancies in task difficulty between stimulus categories, which are not apparent in healthy subjects because of ceiling effects. This hypothesis is tested, by examining the performance of healthy subjects in a facial emotion categorisation task with three levels of stimulus resolution. Results confirm the predictions of the model, showing that performance degrades differentially across emotion categories, with the greatest deterioration to negative valence stimuli. In the light of these results, a possible methodology for detecting emotion specific deficits in clinical samples is discussed.
Resumo:
SIMON is a family of 10 lightweight block ciphers published by Beaulieu et al. from the United States National Security Agency (NSA). A cipher in this family with K -bit key and N -bit block is called SIMON N/K . We present several linear characteristics for reduced-round SIMON32/64 that can be used for a key-recovery attack and extend them further to attack other variants of SIMON. Moreover, we provide results of key recovery analysis using several impossible differential characteristics starting from 14 out of 32 rounds for SIMON32/64 to 22 out of 72 rounds for SIMON128/256. In some cases the presented observations do not directly yield an attack, but provide a basis for further analysis for the specific SIMON variant. Finally, we exploit a connection between linear and differential characteristics for SIMON to construct linear characteristics for different variants of reduced-round SIMON. Our attacks extend to all variants of SIMON covering more rounds compared to any known results using linear cryptanalysis. We present a key recovery attack against SIMON128/256 which covers 35 out of 72 rounds with data complexity 2123 . We have implemented our attacks for small scale variants of SIMON and our experiments confirm the theoretical bias presented in this work.
Resumo:
Bearing faults are the most common cause of wind turbine failures. Unavailability and maintenance cost of wind turbines are becoming critically important, with their fast growing in electric networks. Early fault detection can reduce outage time and costs. This paper proposes Anomaly Detection (AD) machine learning algorithms for fault diagnosis of wind turbine bearings. The application of this method on a real data set was conducted and is presented in this paper. For validation and comparison purposes, a set of baseline results are produced using the popular one-class SVM methods to examine the ability of the proposed technique in detecting incipient faults.
Resumo:
A modularized battery system with Double Star Chopper Cell (DSCC) based modular multilevel converter is proposed for a battery operated electric vehicle (EV). A design concept for the modularized battery micro-packs for DSCC is described. Multidimensional pulse width modulation (MD-PWM) with integrated inter-module SoC balancing and fault tolerant control is proposed and explained. The DSCC can be operated either as an inverter to drive the EV motor or as a synchronous rectifier connected to external three phase power supply equipment for charging the battery micro-packs. The methods of operation as inverter and synchronous rectifier with integrated inter-module SoC balancing and fault tolerant control are discussed. The proposed system operation as inverter and synchronous rectifier are verified through simulations and the results are presented.
Resumo:
The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.
Resumo:
The maximum principle for the space and time–space fractional partial differential equations is still an open problem. In this paper, we consider a multi-term time–space Riesz–Caputo fractional differential equations over an open bounded domain. A maximum principle for the equation is proved. The uniqueness and continuous dependence of the solution are derived. Using a fractional predictor–corrector method combining the L1 and L2 discrete schemes, we present a numerical method for the specified equation. Two examples are given to illustrate the obtained results.
Resumo:
The output of a differential scanning fluorimetry (DSF) assay is a series of melt curves, which need to be interpreted to get value from the assay. An application that translates raw thermal melt curve data into more easily assimilated knowledge is described. This program, called “Meltdown,” conducts four main activities—control checks, curve normalization, outlier rejection, and melt temperature (Tm) estimation—and performs optimally in the presence of triplicate (or higher) sample data. The final output is a report that summarizes the results of a DSF experiment. The goal of Meltdown is not to replace human analysis of the raw fluorescence data but to provide a meaningful and comprehensive interpretation of the data to make this useful experimental technique accessible to inexperienced users, as well as providing a starting point for detailed analyses by more experienced users.
Resumo:
Objective This study seeks establish whether meaningful subgroups exist within a 14-16 year old adolescent population and if these segments respond differently to the Game On: Know Alcohol (GOKA) intervention, a school-based alcohol social marketing program. Methodology This study is part of a larger cluster randomized controlled evaluation of the Game On: Know Alcohol (GOKA) program implemented in 14 schools in 2013/2014. TwoStep cluster analysis was conducted to segment 2114 high school adolescents (14-16 years old) on the basis of 22 demographic, behavioral and psychographic variables. Program effects on knowledge, attitudes, behavioral intentions, social norms, expectancies and refusal self-efficacy of identified segments was subsequently examined. Results Three segments were identified: (1) Abstainers (2) Bingers (3) Moderate Drinkers. Program effects varied significantly across segments. The strongest positive change effects post participation were observed for the Bingers, while mixed effects were evident for Moderate Drinkers and Abstainers. Conclusions These findings provide preliminary empirical evidence supporting application of social marketing segmentation in alcohol education programs. Development of targeted programs that meet the unique needs of each of the three identified segments is indicated to extend the social marketing footprint in alcohol education.
Resumo:
Wind energy, being the fastest growing renewable energy source in the present world, requires a large number of wind turbines to transform wind energy into electricity. One factor driving the cost of this energy is the reliable operation of these turbines. Therefore, it is a growing requirement within the wind farm community, to monitor the operation of the wind turbines on a continuous basis so that a possible fault can be detected ahead of time. As the wind turbine operates in an environment of constantly changing wind speed, it is a challenging task to design a fault detection technique which can accommodate the stochastic operational behavior of the turbines. Addressing this issue, this paper proposes a novel fault detection criterion which is robust against operational uncertainty, as well as having the ability to quantify severity level specifically of the drivetrain abnormality within an operating wind turbine. A benchmark model of wind turbine has been utilized to simulate drivetrain fault condition and effectiveness of the proposed technique has been tested accordingly. From the simulation result it can be concluded that the proposed criterion exhibits consistent performance for drivetrain faults for varying wind speed and has linear relationship with the fault severity level.
Resumo:
In this paper, we propose a highly reliable fault diagnosis scheme for incipient low-speed rolling element bearing failures. The scheme consists of fault feature calculation, discriminative fault feature analysis, and fault classification. The proposed approach first computes wavelet-based fault features, including the respective relative wavelet packet node energy and entropy, by applying a wavelet packet transform to an incoming acoustic emission signal. The most discriminative fault features are then filtered from the originally produced feature vector by using discriminative fault feature analysis based on a binary bat algorithm (BBA). Finally, the proposed approach employs one-against-all multiclass support vector machines to identify multiple low-speed rolling element bearing defects. This study compares the proposed BBA-based dimensionality reduction scheme with four other dimensionality reduction methodologies in terms of classification performance. Experimental results show that the proposed methodology is superior to other dimensionality reduction approaches, yielding an average classification accuracy of 94.9%, 95.8%, and 98.4% under bearing rotational speeds at 20 revolutions-per-minute (RPM), 80 RPM, and 140 RPM, respectively.
Resumo:
In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and integrity checks change and the target address will not be computed correctly. In this paper, we present an attack based on tracking stack pointer modifications to break the scheme and provide implementation details. The key element of the attack is to remove the fingerprint and integrity check generating code from the program after disassociating the target address from the fingerprint and integrity value. Using the debugging tools that give vast control to the attacker to track stack pointer operations, we perform both subtractive and watermark replacement attacks. The major steps in the attack are automated resulting in a fast and low-cost attack.
Resumo:
Brain cells control everything we do - from speaking to walking to breathing. The brain needs a steady supply of blood and oxygen to function properly. Without this vital steady supply of blood, brain cells don't get enough nutrients and oxygen to do their job, and a stroke or 'brain attack' occurs. The human brain is divided into regions that control various motor (movement) and sensory (the senses) functions. Damage from stroke to a specific region may affect the functions it controls. This causes symptoms such as paralysis (loss of movement), difficulty speaking, or loss of coordination. The left side of the brain controls motor and sensory functions on the right side of the body. The left side is also responsible for scientific functions, understanding written and spoken language, number skills and reasoning. The right side of the brain controls motor and sensory functions on the left side of the body. It also controls artistic functions, such as music, art awareness, and insight. If an artery inside the brain or leading to the brain becomes temporarily blocked, the flow of blood to an area of the brain slows or stops. The lack of blood can cause temporary symptoms such as weakness, numbness, problems with speech, dizziness, or loss of vision.
Resumo:
Before tissue plasminogen activator (tPA) was licensed for use in Canada, in February 1999, the Calgary Regional Stroke Program spearheaded the development and organization of local resources to use thrombolytic therapy in patients who had experienced acute ischemic stroke. In 1996 special permission was obtained from the Calgary Regional Health Authority to use intravenously administered tPA for acute ischemic stroke, and ethical and scientific review boards approved the protocols. After 3 years our efforts have resulted in improved patient outcomes, shorter times from symptom onset to treatment and acceptable adverse event rates. Areas for continued improvement include the door-to-needle time and broader education of the public about the symptoms of acute ischemic stroke.
Resumo:
The stoned locus in Drosophila encodes two proteins StonedA (STNA) and StonedB (STNB), both of which have been suggested to act as adaptins in mediating synaptic vesicle recycling. A combination of immunological, genetic and biochemical studies have shown an interaction of STNA and STNB with the C2B domain of Synaptotagmin-I (SYT-1), an integral synaptic vesicle protein that mediates Ca2+-dependent exocytosis, as well as endocytosis. The C2B domain of SYT-1 contains an AP-2 binding site that controls the size of recycled vesicles, and a C-terminal tryptophan-containing motif that acts as an internalization signal. Investigation of SYT-1 mutations in Drosophila has shown that altering the Ca2+ binding region of the C2B domain, results in a reduction in the rate of vesicle recycling, implicating this region in SYT-I endocytosis. In this poster, we report the molecular dissection of the interactions between the STNA and STNB proteins and the C2B domain of SYT-1. Deletion of the AP-2 binding site decreased the binding of both STNA and STNB. However, C-terminal deletions of the C2B domain significantly increased STNB binding. In contrast, the same C-terminal deletions reduced the affinity of the C2B domain for STNA. The possible interactions of both STNB and STNA with the Ca2+ binding region of SYT-1 will be also investigated.
Resumo:
This article considers the integral role played by patent law in respect of stem cell research. It highlights concerns about commercialization, access to essential medicines and bioethics. The article maintains that there is a fundamental ambiguity in the Patents Act 1990 (Cth) as to whether stem cell research is patentable subject matter. There is a need to revise the legislation in light of the establishment of the National Stem Cell Centre and the passing of the Research Involving Embryos Act 2002 (Cth). The article raises concerns about the strong patent protection secured by the Wisconsin Alumni Research Foundation and Geron Corporation in respect of stem cell research in the United States. It contends that a number of legal reforms could safeguard access to stem cell lines, and resulting drugs and therapies. Finally, this article explores how ethical concerns are addressed within the framework of the European Biotechnology Directive. It examines the decision of the European Patent Office in relation to the so-called Edinburgh patent, and the inquiry of the European Group on Ethics in Science and New Technologies into The Ethical Aspects of Patenting Involving Human Stem Cells.