920 resultados para mimicking attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grouping and coordination tactics for ground attack missions by a heterogeneous mix of reconnaissance, enemy suppression, and attack unmanned aerial vehicles (UAVs) is presented. Dubins' paths are used to determine the optimal number of attack UAVs and their positional and heading freedoms, as functions of weapon seeker range and field of view. A generic battlefield scenario with layered defense is created and the tactics are evaluated on a Group Flyer simulation platform for both nominal and off-nominal conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report addresses the assessment of variation in elastic property of soft biological tissues non-invasively using laser speckle contrast measurement. The experimental as well as the numerical (Monte-Carlo simulation) studies are carried out. In this an intense acoustic burst of ultrasound (an acoustic pulse with high power within standard safety limits), instead of continuous wave, is employed to induce large modulation of the tissue materials in the ultrasound insonified region of interest (ROI) and it results to enhance the strength of the ultrasound modulated optical signal in ultrasound modulated optical tomography (UMOT) system. The intensity fluctuation of speckle patterns formed by interference of light scattered (while traversing through tissue medium) is characterized by the motion of scattering sites. The displacement of scattering particles is inversely related to the elastic property of the tissue. We study the feasibility of laser speckle contrast analysis (LSCA) technique to reconstruct a map of the elastic property of a soft tissue-mimicking phantom. We employ source synchronized parallel speckle detection scheme to (experimentally) measure the speckle contrast from the light traversing through ultrasound (US) insonified tissue-mimicking phantom. The measured relative image contrast (the ratio of the difference of the maximum and the minimum values to the maximum value) for intense acoustic burst is 86.44 % in comparison to 67.28 % for continuous wave excitation of ultrasound. We also present 1-D and 2-D image of speckle contrast which is the representative of elastic property distribution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identifying the structures of membrane bound proteins is critical to understanding their function in healthy and diseased states. We introduce a surface enhanced Raman spectroscopy technique which can determine the conformation of membrane-bound proteins, at low micromolar concentrations, and also in the presence of a substantial membrane-free fraction. Unlike conventional surface enhanced Raman spectroscopy, our approach does not require immobilization of molecules, as it uses spontaneous binding of proteins to lipid bilayer-encapsulated Ag nanoparticles. We apply this technique to probe membrane-attached oligomers of Amyloid-beta(40) (A beta(40)), whose conformation is keenly sought in the context of Alzheimer's disease. Isotope-shifts in the Raman spectra help us obtain secondary structure information at the level of individual residues. Our results show the presence of a beta-turn, flanked by two beta-sheet regions. We use solid-state NMR data to confirm the presence of the beta-sheets in these regions. In the membrane-attached oligomer, we find a strongly contrasting and near-orthogonal orientation of the backbone H-bonds compared to what is found in the mature, less-toxic A beta fibrils. Significantly, this allows a ``porin'' like beta-barrel structure, providing a structural basis for proposed mechanisms of A beta oligomer toxicity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [Li et al., AIAA J. 46, 2899(2008)], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 0° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves VLFWs� are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [ Li et al., AIAA J. 46, 2899 (2008) ], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 20° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves (VLFWs) are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several insectivorous bats have included fish in their diet, yet little is known about the processes underlying this trophic shift. We performed three field experiments with wild fishing bats to address how they manage to discern fish from insects and adapt their hunting technique to capture fish. We show that bats react only to targets protruding above the water and discern fish from insects based on prey disappearance patterns. Stationary fish trigger short and shallow dips and a terminal echolocation pattern with an important component of the narrowband and low frequency calls. When the fish disappears during the attack process, bats regulate their attack increasing the number of broadband and high frequency calls in the last phase of the echolocation as well as by lengthening and deepening their dips. These adjustments may allow bats to obtain more valuable sensorial information and to perform dips adjusted to the level of uncertainty on the location of the submerged prey. The observed ultrafast regulation may be essential for enabling fishing to become cost-effective in bats, and demonstrates the ability of bats to rapidly modify and synchronise their sensorial and motor features as a response to last minute stimulus variations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A detailed study on arsenical creosote with reference to leaching, corrosion and anti-borer properties was carried out. Results showed that aging had very little effect on the preservative which suggested better fixation of the preservative into the wood. Corrosion of mild steel, galvanised iron, aluminium-magnesium alloy (M57S) and copper panels in the preservative was found to be negligible. Normal creosote and low temperature creosote of Regional Research Laboratory, Hyderabad, both fortified with arsenic trioxide resisted borer damage on wooden panels for a period of over five months in the port of Cochin. The performance of low temperature creosote fortified with arsenic was found to be equally satisfactory when compared to normal creosote fortified in the same manner. A loading of 208.6 Kgs/ml³ for Haldu (Adina cordifolia) and 138 Kgs/m³ for Mango (Mangifera indica) in the case of normal creosote and 177 Kgs/m³ for Mango the case of RRL creosote were found to be sufficient for treating the wood.