976 resultados para Cube attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A detailed study on arsenical creosote with reference to leaching, corrosion and anti-borer properties was carried out. Results showed that aging had very little effect on the preservative which suggested better fixation of the preservative into the wood. Corrosion of mild steel, galvanised iron, aluminium-magnesium alloy (M57S) and copper panels in the preservative was found to be negligible. Normal creosote and low temperature creosote of Regional Research Laboratory, Hyderabad, both fortified with arsenic trioxide resisted borer damage on wooden panels for a period of over five months in the port of Cochin. The performance of low temperature creosote fortified with arsenic was found to be equally satisfactory when compared to normal creosote fortified in the same manner. A loading of 208.6 Kgs/ml³ for Haldu (Adina cordifolia) and 138 Kgs/m³ for Mango (Mangifera indica) in the case of normal creosote and 177 Kgs/m³ for Mango the case of RRL creosote were found to be sufficient for treating the wood.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An infinite series of twofold, two-way weavings of the cube, corresponding to 'wrappings', or double covers of the cube, is described with the aid of the two-parameter Goldberg- Coxeter construction. The strands of all such wrappings correspond to the central circuits (CCs) of octahedrites (four-regular polyhedral graphs with square and triangular faces), which for the cube necessarily have octahedral symmetry. Removing the symmetry constraint leads to wrappings of other eight-vertex convex polyhedra. Moreover, wrappings of convex polyhedra with fewer vertices can be generated by generalizing from octahedrites to i-hedrites, which additionally include digonal faces. When the strands of a wrapping correspond to the CCs of a four-regular graph that includes faces of size greater than 4, non-convex 'crinkled' wrappings are generated. The various generalizations have implications for activities as diverse as the construction of woven-closed baskets and the manufacture of advanced composite components of complex geometry. © 2012 The Royal Society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Due to their potential for significant fuel consumption savings, Counter-Rotating Open Rotors (CRORs) are currently being considered as an alternative to high-bypass turbofans. When CRORs are mounted on an aircraft, several 'installation effects' arise which are not present when the engine is operated in isolation. This paper investigates how flow features arising from one such effect - The angle-of-attack of the engine centre-line relative to the oncoming flow - can influence the design of CROR engines. Three-dimensional full-annulus unsteady CFD simulations are used to predict the time-varying flow field experienced by each rotor and emphasis is put on the interaction of the frontrotor wake and tip vortex with the rear-rotor. A parametric study is presented that quantifies the rotorrotor interaction as a function of the angle-of-attack. It is shown that angle-of-attack operation significantly changes the flow field and the unsteady lift on both rotors. In particular, a frequency analysis shows that the unsteady lift exhibits sidebands around the rotor-rotor interaction frequencies. Further, a non-linear increase in the total rear-rotor tip unsteadiness is observed for moderate and high angles-of-attack. The results presented in this paper demonstrate that common techniques used to mitigate CROR noise, such as modifying the rotor-rotor axial spacing and rear-rotor crop, can not be applied correctly unless angle-of-attack effects are taken into account. Copyright © 2012 by ASME.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IEEE Computer Society

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel type of moving-corner-cube-pair interferometer is presented, and its principle and properties are studied. It consists of two moving corner cubes fixed together back to back as a single moving part (the moving-corner-cube-pair), four fixed plane mirrors and one beamsplitter. The optical path difference (OPD) is created by the straight reciprocating motion of the moving-corner-cube-pair, and the OPD value is eight times the physical shift value of the moving-corner-cube-pair. This novel type of interferometer has no tilt and shearing problems. It is almost ideal for the very-high-resolution infrared spectrometers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the cube-corner indenter, an approximate linear relationship between the ratio of hardness (H) to reduced modulus (E-r) and the ratio of unloading work (W-u) to total loading work (W-t) is confirmed by finite-element calculations and by experiments. Based on this relationship a convenient method to determine the fracture toughness (K-IC) of brittle materials, especially for those at small scale, using cube-corner indentations is proposed. Finally, the method is calibrated by indentation experiments on a set of brittle materials. (C) 2009 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Good blood pressure (BP) control reduces the risk of recurrence of stroke/transient ischaemic attack (TIA). Although there is strong evidence that BP telemonitoring helps achieve good control, none of the major trials have considered the effectiveness in stroke/TIA survivors. We therefore conducted a feasibility study for a trial of BP telemonitoring for stroke/ TIA survivors with uncontrolled BP in primary care. Method Phase 1 was a pilot trial involving 55 patients stratified by stroke/TIA randomised 3:1 to BP telemonitoring for 6 months or usual care. Phase 2 was a qualitative evaluation and comprised semi-structured interviews with 16 trial participants who received telemonitoring and 3 focus groups with 23 members of stroke support groups and 7 carers. Results Overall, 125 patients (60 stroke patients, 65 TIA patients) were approached and 55 (44%) patients were randomised including 27 stroke patients and 28 TIA patients. Fifty-two participants (95%) attended the 6-month follow-up appointment, but one declined the second daytime ambulatory blood pressure monitoring (ABPM) measurement resulting in a 93% completion rate for ABPM − the proposed primary outcome measure for a full trial. Adherence to telemonitoring was good; of the 40 participants who were telemonitoring, 38 continued to provide readings throughout the 6 months. There was a mean reduction of 10.1 mmHg in systolic ABPM in the telemonitoring group compared with 3.8 mmHg in the control group, which suggested the potential for a substantial effect from telemonitoring. Our qualitative analysis found that many stroke patients were concerned about their BP and telemonitoring increased their engagement, was easy, convenient and reassuring Conclusions A full-scale trial is feasible, likely to recruit well and have good rates of compliance and follow-up.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these services. Denial of Service (DoS) attacks are one of the most significant web threats and generally their aim is to waste the resources of the target machine (Mirkovic & Reiher, 2004). Dis-tributed Denial of Service (DDoS) attacks are typically executed from many sources and can result in large traf-fic flows. During last year 11% of DDoS attacks were over 60 Gbps (Prolexic, 2013a). The DDoS attacks are usually performed from the large botnets, which are networks of remotely controlled computers. There is an increasing effort by governments and companies to shut down the botnets (Dittrich, 2012), which has lead the attackers to look for alternative DDoS attack methods. One of the techniques to which attackers are returning to is DDoS amplification attacks. Amplification attacks use intermediate devices called amplifiers in order to amplify the attacker's traffic. This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Proto-col (TFTP). This attack could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks. This could be a substantial issue globally, due to the fact this protocol is used in approximately 599,600 publicly open TFTP servers. Mitigation methods to this threat have also been consid-ered and a variety of countermeasures are proposed. Effects of this attack on both amplifier and target were analysed based on the proposed metrics. While it has been reported that the breaching of TFTP would be possible (Schultz, 2013), this paper provides a complete methodology for the setup of the attack, and its verification.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research on the construction of logical overlay networks has gained significance in recent times. This is partly due to work on peer-to-peer (P2P) systems for locating and retrieving distributed data objects, and also scalable content distribution using end-system multicast techniques. However, there are emerging applications that require the real-time transport of data from various sources to potentially many thousands of subscribers, each having their own quality-of-service (QoS) constraints. This paper primarily focuses on the properties of two popular topologies found in interconnection networks, namely k-ary n-cubes and de Bruijn graphs. The regular structure of these graph topologies makes them easier to analyze and determine possible routes for real-time data than complete or irregular graphs. We show how these overlay topologies compare in their ability to deliver data according to the QoS constraints of many subscribers, each receiving data from specific publishing hosts. Comparisons are drawn on the ability of each topology to route data in the presence of dynamic system effects, due to end-hosts joining and departing the system. Finally, experimental results show the service guarantees and physical link stress resulting from efficient multicast trees constructed over both kinds of overlay networks.