886 resultados para Pearl Harbor (Hawaii), Attack on, 1941


Relevância:

30.00% 30.00%

Publicador:

Resumo:


Lip separation is one of the primary sources of inlet distortion, which can result in a loss in fan stability. High angles of incidence are one of several critical causes of lip separation. There have been many studies into inlet performance at high incidence, including the resulting distortion levels when lip separation occurs. However, the vast majority of these investigations have been carried out experimentally, with little in the way of computational results for inlet performance at high incidence. The flow topology within an inlet when lip separation has occurred is also not well understood. This work aims to demonstrate a suitable model for the prediction of inlet flows at high incidence using ANSYS CFX, looking at both the performance of the inlet and the separated flow topology within the inlet. The attenuating effect of the fan is also investigated, with particular emphasis on the flow redistribution ahead of the fan. The results show that the model used is suitable for predicting inlet performance in adverse operating conditions, showing good agreement with experimental results. In addition, the attenuation of the distortion by the fan is also captured by the numerical model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Side-channel attacks (SCA) threaten electronic cryptographic devices and can be carried out by monitoring the physical characteristics of security circuits. Differential Power Analysis (DPA) is one the most widely studied side-channel attacks. Numerous countermeasure techniques, such as Random Delay Insertion (RDI), have been proposed to reduce the risk of DPA attacks against cryptographic devices. The RDI technique was first proposed for microprocessors but it was shown to be unsuccessful when implemented on smartcards as it was vulnerable to a variant of the DPA attack known as the Sliding-Window DPA attack.Previous research by the authors investigated the use of the RDI countermeasure for Field Programmable Gate Array (FPGA) based cryptographic devices. A split-RDI technique wasproposed to improve the security of the RDI countermeasure. A set of critical parameters wasalso proposed that could be utilized in the design stage to optimize a security algorithm designwith RDI in terms of area, speed and power. The authors also showed that RDI is an efficientcountermeasure technique on FPGA in comparison to other countermeasures.In this article, a new RDI logic design is proposed that can be used to cost-efficiently implementRDI on FPGA devices. Sliding-Window DPA and realignment attacks, which were shown to beeffective against RDI implemented on smartcard devices, are performed on the improved RDIFPGA implementation. We demonstrate that these attacks are unsuccessful and we also proposea realignment technique that can be used to demonstrate the weakness of RDI implementations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In order to conserve the freshwater pearl mussel in Ireland, populations that have a high risk of extinction must he identified and given priority for conservation. Growth of freshwater pearl mussels has been found to vary among populations on a wide geographic scale as well as on a local scale. Populations having a high growth constant (k), because of the small size of individuals and their shorter life-span and thus lower reproductive output, may be more likely to become extinct than those which have a low k and hence larger size and greater reproductive output. This study attempts to estimate the growth constant (k) in rivers in Donegal and Northern Ireland based on measuring lire largest shell in each population. Large differences in values of k were found among rivers and these are discussed in relation to catchment bedrock types and the identification of conservation priorities. Appropriate conservation strategies are recommended for Margaritifera margaritifera populations in the north of Ireland.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study attempts to identify the habitat requirements of the pearl mussel Margaritifea margaritifera in County Donegal, in north west Ireland, an area with little urban, industrial or intensive agricultural development. No mussels occur in rivers where calcium and conductivity levels are high or where the substratum is predominantly bedrock or fine sediment but it was not possible to distinguish clearly between mussel and non-mussel sites on the basis of ordination analysis. However, rivers which still support mussels and rivers with historical records of mussels are loosely grouped. Rivers which formerly supported mussels but lack living M. margaritifera appear to have suitable habitat for mussels; pearl fishing is the most likely reason for the extinction of these mussel populations. Where population densities are high, for example in locations on the rivers Eske, Clady and Owenea, conservation may necessitate the establishment of reserves. The prospect for the successful reintroduction of mussels into former mussel rivers such as the Finn and Eany Water, where suitable habitat exists and water quality is high, is very good.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

1.Margaritifera margaritifera populations are declining throughout its range, including Ireland, despite legislation designed to protect freshwater pearl mussels and their habitat. A survey of freshwater 2. pearl mussels was carried out on rivers in County Donegal, north-west Ireland, to determine the current distribution, size and density of M. margaritifera populations, as well as to identify potential threats to mussels there. 3. The survey revealed the freshwater pearl mussel to be widespread, particularly in the western half of the county. However, densities of mussels at most sites are low, with just two sites having mussel densities of over 5?m-2. Furthermore, the species appears to be absent from a number of sites from which it had been previously recorded. 4. According to the literature, there is a long history of pearl fishing in Co. Donegal and neighbouring counties. Evidence from heaps of shells found on the river bed and banks at several sites and recent anecdotal reports from local people suggest pearl fishing is being practised on all rivers investigated during the present study. The main conservation requirements for 5. M. margaritifera populations in Donegal are to maintain water quality at its present high standard and, as pearl fishing appears to be a widespread and immediate threat to the remaining mussel populations, to enforce existing legislation designed to protect M. margaritifera.

Relevância:

30.00% 30.00%

Publicador:

Resumo:


Objectives


This study examined the role of shame coping styles and state shame in predicting the therapeutic alliance and intimate relationship functioning in individuals with mental health problems.


Method


A sample of 50 treatment-receiving adults aged 21 to 67 years with a mix of common mental health difficulties was recruited from a clinical psychology service. Participants were given questionnaire measures of shame states, shame coping styles, intimate relationship functioning, and the therapeutic alliance.


Results


Regression analyses indicated that the shame coping strategy of physical and psychological withdrawal was the primary risk factor for development of a less effective therapeutic alliance. Both withdrawal and attack self coping styles were significant predictors of impaired intimate relationship functioning.


Conclusions


These findings have implications for the theoretical role of shame in mental health presentations as well as the potential for internalizing shame coping styles (i.e., withdrawal, attack self) to act as a barrier to successful therapy and interpersonal relationships. The inclusion of shame-focused assessments and interventions in the initial stages of treatment with clients exhibiting these strategies could improve prognosis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study evaluates the implementation of Menter's gamma-Re-theta Transition Model within the CFX12 solver for turbulent transition prediction on a natural laminar flow nacelle. Some challenges associated with this type of modeling have been identified. The computational fluid dynamics transitional flow simulation results are presented for a series of cruise cases with freestream Mach numbers ranging from 0.8 to 0.88, angles of attack from 2 to 0 degrees, and mass flow ratios from 0.60 to 0.75. These were validated with a series of wind-tunnel tests on the nacelle by comparing the predicted and experimental surface pressure distributions and transition locations. A selection of the validation cases are presented in this paper. In all cases, computational fluid dynamics simulations agreed reasonably well with the experiments. The results indicate that Menter's gamma-Re-theta Transition Model is capable of predicting laminar boundary-layer transition to turbulence on a nacelle. Nonetheless, some limitations exist in both the Menter's gamma-Re-theta Transition Model and in the implementation of the computational fluid dynamics model. The implementation of a more comprehensive experimental correlation in Menter's gamma-Re-theta Transition Model, preferably the ones from nacelle experiments, including the effects of compressibility and streamline curvature, is necessary for an accurate transitional flow simulation on a nacelle. In addition, improvements to the computational fluid dynamics model are also suggested, including the consideration of varying distributed surface roughness and an appropriate empirical correction derived from nacelle experimental transition location data.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

1. Freshwater unionoids are one of the most threatened animal groups worldwide and the freshwater pearl mussel Margaritifera margaritifera is currently listed as critically endangered in Europe. The ‘EC Habitats & Species Directive’ requires that EU member states monitor the distribution and abundance of this species and report regularly on its conservation status.
2. The pearl mussel meta-population in Northern Ireland was surveyed to assess temporal population trends in Special Areas of Conservation (SACs) and mussel reproduction throughout its range.
3. Mussels occurred in six rivers and numbers within three SAC designated sites remained stable between 2004-07 and 2011. The discovery of >8,000 previously unknown individuals in the Owenreagh River contributed to an overall increase (+56.8%) in the total known population. All populations actively reproduced during 2010 with approximately half of all individuals gravid. Moreover, suitable salmonid hosts occurred at all sites with 10.7% of salmon and 22.8% of trout carrying encysted glochidia. Populations were composed entirely of aged individuals with little evidence of recent recruitment.
4. We infer that the break in the life cycle must occur during the juvenile stage when glochidia metamorphose and settle into the interstitial spaces within the substrate. Water quality parameters, most notably levels of suspended solids, exceeded the recommended maximum thresholds in all rivers.
5. We posit that the deposition of silt may be the main cause of juvenile mortality contributing to a lack of recruitment. Consequently, all populations were judged to be in ‘unfavourable’ conservation status. Catchment-level management plans are urgently needed to reduce siltation with the aim of improving recruitment. Our results have implications for the success of ex-situ conservation programmes; specifically, the size at which captive bred juveniles are released into the wild. Further research is required to assess the vulnerabilities of early life stages of M. margaritifera to siltation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security devices are vulnerable to Differential Power Analysis (DPA) that reveals the key by monitoring the power consumption of the circuits. In this paper, we present the first DPA attack against an FPGA implementation of the Camellia encryption algorithm with all key sizes and evaluate the DPA resistance of the algorithm. The Camellia cryptographic algorithm involves several different key-dependent intermediate operations including S-Box operations. In previous research, it was believed that the Camellia is stronger than AES due to the additional Whitening phase protecting the S-Box operation. However, we propose an attack that bypasses the Whitening phase and targets the S-Box. In this paper, we also discuss a lowcost countermeasure strategy to protect the Pre-whitening / Post-whitening and FL function of Camellia using Dual-rail Precharged Logic and to protect against attacks of the S-Box using Random Delay Insertion. © 2009 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In hypersonic flight, the prediction of aerodynamic heating and the construction of a proper thermal protection system (TPS) are significantly important. In this study, the method of a film cooling technique, which is already the state of the art in cooling of gas turbine engines, is proposed for a fully reusable and active TPS. Effectiveness of the film cooling scheme to reduce convective heating rates for a blunt-nosed spacecraft flying at Mach number 6.56 and 40 deg angle of attack is investigated numerically. The inflow boundary conditions used the standard values at an altitude of 30 km. The computational domain consists of infinite rows of film cooling holes on the bottom of a blunt-nosed slab. Laminar and several turbulent calculations have been performed and compared. The influence of blowing ratios on the film cooling effectiveness is investigated. The results exhibit that the film cooling technique could be an effective method for an active cooling of blunt-nosed bodies in hypersonic flows.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In hypersonic flights, the prediction of aerodynamic heating and the construction of a proper thermal protection system (TPS) are significantly important. In this study, the method of a film cooling technique, which is already the state of the art in cooling gas turbine engine, is proposed for a fully reusable and active TPS. Effectiveness of the film cooling scheme to reduce convective heating rates for a blunt nosed spacecraft flying at Mach number 6.56 and 40 degree angle of attack is investigated numerically. The inflow boundary conditions used the standard values at an altitude of 30 km. Computational domain consists of infinite rows of film cooling holes on the bottom of a blunt-nosed slab. Laminar and several turbulent calculations have been performed and compared each other. The influence of blowing ratios on the film cooling effectiveness is investigated. The results exhibit that the film cooling technique could be an effective method for an active cooling of blunt-nosed bodies in hypersonic flows.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that, over a sequence of rounds, an adversary either inserts a node with arbitrary connections or deletes an arbitrary node from the network. The network responds to each such change by quick “repairs,” which consist of adding or deleting a small number of edges. These repairs essentially preserve closeness of nodes after adversarial deletions, without increasing node degrees by too much, in the following sense. At any point in the algorithm, nodes v and w whose distance would have been l in the graph formed by considering only the adversarial insertions (not the adversarial deletions), will be at distance at most l log n in the actual graph, where n is the total number of vertices seen so far. Similarly, at any point, a node v whose degree would have been d in the graph with adversarial insertions only, will have degree at most 3d in the actual graph. Our distributed data structure, which we call the Forgiving Graph, has low latency and bandwidth requirements. The Forgiving Graph improves on the Forgiving Tree distributed data structure from Hayes et al. (2008) in the following ways: 1) it ensures low stretch over all pairs of nodes, while the Forgiving Tree only ensures low diameter increase; 2) it handles both node insertions and deletions, while the Forgiving Tree only handles deletions; 3) it requires only a very simple and minimal initialization phase, while the Forgiving Tree initially requires construction of a spanning tree of the network.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.