912 resultados para Missile Attacks
Resumo:
Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness against rotation, scaling, and translation, but few are resistant to cropping, nonisotropic scaling, random bending attacks (RBAs), and affine transformations. Seo and Yoo present a geometrically invariant image watermarking based on affine covariant regions (ACRs) that provide a certain degree of robustness. To further enhance the robustness, we propose a new image watermarking scheme on the basis of Seo's work, which is insensitive to geometric distortions as well as common image processing operations. Our scheme is mainly composed of three components: 1) feature selection procedure based on graph theoretical clustering algorithm is applied to obtain a set of stable and nonoverlapped ACRs; 2) for each chosen ACR, local normalization, and orientation alignment are performed to generate a geometrically invariant region, which can obviously improve the robustness of the proposed watermarking scheme; and 3) in order to prevent the degradation in image quality caused by the normalization and inverse normalization, indirect inverse normalization is adopted to achieve a good compromise between the imperceptibility and robustness. Experiments are carried out on an image set of 100 images collected from Internet, and the preliminary results demonstrate that the developed method improves the performance over some representative image watermarking approaches in terms of robustness.
Resumo:
Rare earths are a series of minerals with special properties that make them essential for applications including miniaturized electronics, computer hard disks, display panels, missile guidance, pollution controlling catalysts, H-2-storage and other advanced materials. The use of thermal barrier coatings (TBCs) has the potential to extend the working temperature and the life of a gas turbine by providing a layer of thermal insulation between the metallic substrate and the hot gas. Yttria (Y2O3), as one of the most important rare earth oxides, has already been used in the typical TBC material YSZ (yttria stabilized zirconia). In the development of the TBC materials, especially in the latest ten years, rare earths have been found to be more and more important. All the new candidates of TBC materials contain a large quantity of rare earths, such as R2Zr2O7 (R=La, Ce, Nd, Gd), CeO2-YSZ, RMeAl11O19 (R=La, Nd; Me=Mg, Ca, Sr) and LaPO4. The concept of double-ceramic-layer coatings based on the rare earth materials and YSZ is effective for the improvement of the thermal shock life of TBCs at high temperature.
Resumo:
Hot dip Zn-Al alloy coating performs better than hot dip galvanized coating and 55% Al-Zn-Si coating as well with regard to general seawater corrosion protection. A characterization of the corrosion products on Zn-Al alloy coating immersed in dynamic aerated seawater has been performed mainly based on transmission electron microscopy (TEM) for morphological analysis and X-ray diffraction (XRD) technique for crystalline phase identification. The XRD and TEM analyses showed that the corrosion products mainly were typical nanometer Zn4CO3(OH)(6).H2O, Zn-5(OH)(8)Cl-2 and Zn6Al2CO3(OH)(16). 4H(2)O microcrystals. This probably is connected to the co-precipitation of Zn2+ and Al3+ ions caused by adsorption. Zn-Al alloy coating being suffered seawater attacks, AI(OH)(3) gel was first produced on the coating surface. Zn and Al hydroxides would co-precipitate and form double-hydroxide when the concentration of adsorbed Zn2+ ions by the newly produced gel exceeded the critical degree of supersaturation of the interphase nucleation. However, because the growth of the crystals was too low to keep in step with the nucleation, a layer of nano-crystalline corrosion products were produced on the surface of the coating finally. (C) 2001 Elsevier Science Ltd. All rights reserved.
Resumo:
文中研究的相关跟踪技术主要应用于飞航导弹的末制导。现阶段,激光制导技术、GPS制导技术、合成孔径雷达(SAR)制导技术在我国的实际应用还不成熟,传统的电视、红外制导技术仍然具有很强的生命力,因而,基于可见光的视频相关跟踪技术具有重要的研究价值。本文主要论述的两种相关算法是:多灰度点相关(MPC)、区域模板相关(RTC)。其中多点相关(MPC)算法的跟踪灵敏度高,定位精度好,硬件实现比较方便,实时性能好;区域模板相关算法(RTC),在图像的匹配过程中,不仅考虑了目标区域的灰度特征,而且兼顾了区域里多灰度层次的位置特征、面积特征,算法具有很好的鲁棒性。文中深入研究了两种相关跟踪算法,并针对它们在实际应用中的不足,提出了有效的改善措施。最后,本文对两种相关跟踪算法进行了初步融合,一是:通过粗匹配、精匹配过程来选取目标跟踪点;二是:提出了一种度量模板更新的能量准则函数。大量的仿真实验结果表明:改进后的两种相关跟踪技术可以较好地完成一些复杂背景下的目标跟踪任务,两种算法的有效结合又进一步提高了目标跟踪的稳定性能和可靠性能。本文研究的一些相关跟踪技术已经运用到实际工程项目中。
Resumo:
提出了求解某武器系统导弹弹道轨迹的两种方法:计算机仿真和系统辨识方法.详细介绍了导弹系统的计算机仿真模型,并利用控制理论和数值分析的方法对仿真模型求解;根据系统辨识理论,将整个系统看作“黑箱”,建立与输入、输出数据等价的模型,引入折息因子对模型进行辨识.最后分别给出了计算机仿真试验曲线和系统辨识试验曲线,证明了两种求解方法的有效性。
Resumo:
Expert systems are too slow. This work attacks that problem by speeding up a useful system component that remembers facts and tracks down simple consequences. The redesigned component can assimilate new facts more quickly because it uses a compact, grammar-based internal representation to deal with whole classes of equivalent expressions at once. It can support faster hypothetical reasoning because it remembers the consequences of several assumption sets at once. The new design is targeted for situations in which many of the stored facts are equalities. The deductive machinery considered here supplements stored premises with simple new conclusions. The stored premises include permanently asserted facts and temporarily adopted assumptions. The new conclusions are derived by substituting equals for equals and using the properties of the logical connectives AND, Or, and NOT. The deductive system provides supporting premises for its derived conclusions. Reasoning that involves quantifiers is beyond the scope of its limited and automatic operation. The expert system of which the reasoning system is a component is expected to be responsible for overall control of reasoning.
Resumo:
Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.
Resumo:
Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these services. Denial of Service (DoS) attacks are one of the most significant web threats and generally their aim is to waste the resources of the target machine (Mirkovic & Reiher, 2004). Dis-tributed Denial of Service (DDoS) attacks are typically executed from many sources and can result in large traf-fic flows. During last year 11% of DDoS attacks were over 60 Gbps (Prolexic, 2013a). The DDoS attacks are usually performed from the large botnets, which are networks of remotely controlled computers. There is an increasing effort by governments and companies to shut down the botnets (Dittrich, 2012), which has lead the attackers to look for alternative DDoS attack methods. One of the techniques to which attackers are returning to is DDoS amplification attacks. Amplification attacks use intermediate devices called amplifiers in order to amplify the attacker's traffic. This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Proto-col (TFTP). This attack could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks. This could be a substantial issue globally, due to the fact this protocol is used in approximately 599,600 publicly open TFTP servers. Mitigation methods to this threat have also been consid-ered and a variety of countermeasures are proposed. Effects of this attack on both amplifier and target were analysed based on the proposed metrics. While it has been reported that the breaching of TFTP would be possible (Schultz, 2013), this paper provides a complete methodology for the setup of the attack, and its verification.
Resumo:
Gunning, Jeroen. 'Terrorism, Charities and Diasporas: Contrasting the fundraising practices of Hamas and al Qaeda among Muslims in Europe', In: Countering the Financing of Terrorism (New York: Routledge, 2007), pp.93-125 RAE2008
Resumo:
Wheeler, Nicholas, 'Dying for `Enduring Freedom': Accepting Responsibility for Civilian Casualties in the War against Terrorism', International Relations (2002) 16(2) pp.205-225 RAE2008
Resumo:
McInnes, C., 'A different kind of war? 11 September and the United States' Afghan war'. Review of International Studies, 29 (2), 165-184. RAE2008
Resumo:
Hughes, R. (2002). 'We are not Seeking Strength for its Own Sake': The British Labour Party, West Germany and the Cold War, 1951-64. Cold War History. 3(1) pp.67-94 RAE2008
Resumo:
Gunning, Jeroen. Hizballah and the logic of political participation, In: 'Terror, Insurgency and the State: Ending Protracted Conflicts', Heiberg, Marianne, O'Leary, Brendan & Tirman, John (Philadelphia: University of Pennsylvania Press), p.157-188, 2007. RAE2008
Resumo:
Obwód Kaliningradzki Federacji Rosyjskiej (FR) odgrywa istotną rolę dla bezpieczeństwa Polski, Litwy oraz państw regionu Morza Bałtyckiego. Ten najbardziej na zachód wysunięty obszar Rosji otoczony jest państwami UE i NATO i nie posiada bezpośredniej styczności z FR. Na obszarze obwodu zgromadzone są pokaźne siły zbrojne, w tym wyrzutnie rakiet średniego i dalekiego zasięgu, które mogą być uzbrojone w głowice atomowe. Władze w Moskwie traktują potencjał wojskowy zgromadzony w obwodzie jako element nacisku na opinię publiczną, tak by zniechęcić władze RP do budowy na terytorium Polski amerykańskiej tarczy antyrakietowej.
Resumo:
Unstable arterial plaque is likely the key component of atherosclerosis, a disease which is responsible for two-thirds of heart attacks and strokes, leading to approximately 1 million deaths in the United States. Ultrasound imaging is able to detect plaque but as of yet is not able to distinguish unstable plaque from stable plaque. In this work a scanning acoustic microscope (SAM) was implemented and validated as tool to measure the acoustic properties of a sample. The goal for the SAM is to be able to provide quantitative measurements of the acoustic properties of different plaque types, to understand the physical basis by which plaque may be identified acoustically. The SAM consists of a spherically focused transducer which operates in pulse-echo mode and is scanned in a 2D raster pattern over a sample. A plane wave analysis is presented which allows the impedance, attenuation and phase velocity of a sample to be de- termined from measurements of the echoes from the front and back of the sample. After the measurements, the attenuation and phase velocity were analysed to ensure that they were consistent with causality. The backscatter coefficient of the samples was obtained using the technique outlined by Chen et al [8]. The transducer used here was able to determine acoustic properties from 10-40 MHz. The results for the impedance, attenuation and phase velocity were validated for high and low-density polyethylene against published results. The plane wave approximation was validated by measuring the properties throughout the focal region and throughout a range of incidence angles from the transducer. The SAM was used to characterize a set of recipes for tissue-mimicking phantoms which demonstrate indepen- dent control over the impedance, attenuation, phase velocity and backscatter coefficient. An initial feasibility study on a human artery was performed.