920 resultados para mimicking attack
Resumo:
Due to their potential for significant fuel consumption savings, Counter-Rotating Open Rotors (CRORs) are currently being considered as an alternative to high-bypass turbofans. When CRORs are mounted on an aircraft, several 'installation effects' arise which are not present when the engine is operated in isolation. This paper investigates how flow features arising from one such effect - The angle-of-attack of the engine centre-line relative to the oncoming flow - can influence the design of CROR engines. Three-dimensional full-annulus unsteady CFD simulations are used to predict the time-varying flow field experienced by each rotor and emphasis is put on the interaction of the frontrotor wake and tip vortex with the rear-rotor. A parametric study is presented that quantifies the rotorrotor interaction as a function of the angle-of-attack. It is shown that angle-of-attack operation significantly changes the flow field and the unsteady lift on both rotors. In particular, a frequency analysis shows that the unsteady lift exhibits sidebands around the rotor-rotor interaction frequencies. Further, a non-linear increase in the total rear-rotor tip unsteadiness is observed for moderate and high angles-of-attack. The results presented in this paper demonstrate that common techniques used to mitigate CROR noise, such as modifying the rotor-rotor axial spacing and rear-rotor crop, can not be applied correctly unless angle-of-attack effects are taken into account. Copyright © 2012 by ASME.
Resumo:
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Resumo:
IEEE Computer Society
Resumo:
Phosphatidylcholine (PC) and six other PC-similar lipids are coated on interdigital electrodes, IEs, as sensitive membranes. Eight alcohols (C-1-C-4) are tested in a flow system at room temperature. It is found that all responses are log(response)-log(concentration) linear relations. These results agree with Steven's law in psychophysics. Moreover, the thresholds of the sensors are coincident with human olfactory thresholds. The authors have analysed the data of the lipid hypothesis suggested by Kurihara et al. We have found that this hypothesis is also in agreement with Steven's law. Lipid microresistors are real mimicking olfactory sensors. A definition of an olfactory sensor is suggested.
Resumo:
By [2 + 2] Schiff base condensation of 5 - bromo - 2 - methoxylbenzene - 1,3 - dicarboxaldehyde with diethylenetriamine, a new hexaaza 24 - membered macrocyclic ligand was obtained,which formed a macrocyclic binuclear copper(I) complex in the presence of [Cu . (CH3CN)(4)]ClO4. When the copper(I) complex was oxidized in air or oxygen, a new macrocyclic binuclear copper( II) complex was obtained. The copper( II.) complex was characterized by several methods and its oxidized products was characterized by H-1 NMR. The results show that during oxidation, a methoxyl group in the ligand ring broke; and the phenoxy - and water - bridged Cu(II) complex formed. In oxidation of monooxygenase such as ligninase, oxidative demethylation also happened. Therefore this work mimicked this process for the first time by using macrocyclic complex. The quantity of absorbed oxygen and the absorption rate of oxygen were determined.
Resumo:
Background Good blood pressure (BP) control reduces the risk of recurrence of stroke/transient ischaemic attack (TIA). Although there is strong evidence that BP telemonitoring helps achieve good control, none of the major trials have considered the effectiveness in stroke/TIA survivors. We therefore conducted a feasibility study for a trial of BP telemonitoring for stroke/ TIA survivors with uncontrolled BP in primary care. Method Phase 1 was a pilot trial involving 55 patients stratified by stroke/TIA randomised 3:1 to BP telemonitoring for 6 months or usual care. Phase 2 was a qualitative evaluation and comprised semi-structured interviews with 16 trial participants who received telemonitoring and 3 focus groups with 23 members of stroke support groups and 7 carers. Results Overall, 125 patients (60 stroke patients, 65 TIA patients) were approached and 55 (44%) patients were randomised including 27 stroke patients and 28 TIA patients. Fifty-two participants (95%) attended the 6-month follow-up appointment, but one declined the second daytime ambulatory blood pressure monitoring (ABPM) measurement resulting in a 93% completion rate for ABPM − the proposed primary outcome measure for a full trial. Adherence to telemonitoring was good; of the 40 participants who were telemonitoring, 38 continued to provide readings throughout the 6 months. There was a mean reduction of 10.1 mmHg in systolic ABPM in the telemonitoring group compared with 3.8 mmHg in the control group, which suggested the potential for a substantial effect from telemonitoring. Our qualitative analysis found that many stroke patients were concerned about their BP and telemonitoring increased their engagement, was easy, convenient and reassuring Conclusions A full-scale trial is feasible, likely to recruit well and have good rates of compliance and follow-up.
Resumo:
Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these services. Denial of Service (DoS) attacks are one of the most significant web threats and generally their aim is to waste the resources of the target machine (Mirkovic & Reiher, 2004). Dis-tributed Denial of Service (DDoS) attacks are typically executed from many sources and can result in large traf-fic flows. During last year 11% of DDoS attacks were over 60 Gbps (Prolexic, 2013a). The DDoS attacks are usually performed from the large botnets, which are networks of remotely controlled computers. There is an increasing effort by governments and companies to shut down the botnets (Dittrich, 2012), which has lead the attackers to look for alternative DDoS attack methods. One of the techniques to which attackers are returning to is DDoS amplification attacks. Amplification attacks use intermediate devices called amplifiers in order to amplify the attacker's traffic. This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Proto-col (TFTP). This attack could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks. This could be a substantial issue globally, due to the fact this protocol is used in approximately 599,600 publicly open TFTP servers. Mitigation methods to this threat have also been consid-ered and a variety of countermeasures are proposed. Effects of this attack on both amplifier and target were analysed based on the proposed metrics. While it has been reported that the breaching of TFTP would be possible (Schultz, 2013), this paper provides a complete methodology for the setup of the attack, and its verification.
Resumo:
The deposition of ultrasonic energy in tissue can cause tissue damage due to local heating. For pressures above a critical threshold, cavitation will occur in tissue and bubbles will be created. These oscillating bubbles can induce a much larger thermal energy deposition in the local region. Traditionally, clinicians and researchers have not exploited this bubble-enhanced heating since cavitation behavior is erratic and very difficult to control. The present work is an attempt to control and utilize this bubble-enhanced heating. First, by applying appropriate bubble dynamic models, limits on the asymptotic bubble size distribution are obtained for different driving pressures at 1 MHz. The size distributions are bounded by two thresholds: the bubble shape instability threshold and the rectified diffusion threshold. The growth rate of bubbles in this region is also given, and the resulting time evolution of the heating in a given insonation scenario is modeled. In addition, some experimental results have been obtained to investigate the bubble-enhanced heating in an agar and graphite based tissue- mimicking material. Heating as a function of dissolved gas concentrations in the tissue phantom is investigated. Bubble-based contrast agents are introduced to investigate the effect on the bubble-enhanced heating, and to control the initial bubble size distribution. The mechanisms of cavitation-related bubble heating are investigated, and a heating model is established using our understanding of the bubble dynamics. By fitting appropriate bubble densities in the ultrasound field, the peak temperature changes are simulated. The results for required bubble density are given. Finally, a simple bubbly liquid model is presented to estimate the shielding effects which may be important even for low void fraction during high intensity focused ultrasound (HIFU) treatment.
THE ROLE OF ACOUSTIC CAVITATION IN ENHANCED ULTRASOUND-INDUCED HEATING IN A TISSUE-MIMICKING PHANTOM
Resumo:
A complete understanding of high-intensity focused ultrasound-induced temperature changes in tissue requires insight into all potential mechanisms for heat deposition. Applications of therapeutic ultrasound often utilize acoustic pressures capable of producing cavitation activity. Recognizing the ability of bubbles to transfer acoustic energy into heat generation, a study of the role bubbles play in tissue hyperthermia becomes necessary. These bubbles are typically less than 50μm. This dissertation examines the contribution of bubbles and their motion to an enhanced heating effect observed in a tissue-mimicking phantom. A series of experiments established a relationship between bubble activity and an enhanced temperature rise in the phantom by simultaneously measuring both the temperature change and acoustic emissions from bubbles. It was found that a strong correlation exists between the onset of the enhanced heating effect and observable cavitation activity. In addition, the likelihood of observing the enhanced heating effect was largely unaffected by the insonation duration for all but the shortest of insonation times, 0.1 seconds. Numerical simulations were used investigate the relative importance of two candidate mechanisms for heat deposition from bubbles as a means to quantify the number of bubbles required to produce the enhanced temperature rise. The energy deposition from viscous dissipation and the absorption of radiated sound from bubbles were considered as a function of the bubble size and the viscosity of the surrounding medium. Although both mechanisms were capable of producing the level of energy required for the enhanced heating effect, it was found that inertial cavitation, associated with high acoustic radiation and low viscous dissipation, coincided with the the nature of the cavitation best detected by the experimental system. The number of bubbles required to account for the enhanced heating effect was determined through the numerical study to be on the order of 150 or less.
Resumo:
Our long-term goal is the detection and characterization of vulnerable plaque in the coronary arteries of the heart using intravascular ultrasound (IVUS) catheters. Vulnerable plaque, characterized by a thin fibrous cap and a soft, lipid-rich necrotic core is a precursor to heart attack and stroke. Early detection of such plaques may potentially alter the course of treatment of the patient to prevent ischemic events. We have previously described the characterization of carotid plaques using external linear arrays operating at 9 MHz. In addition, we previously modified circular array IVUS catheters by short-circuiting several neighboring elements to produce fixed beamwidths for intravascular hyperthermia applications. In this paper, we modified Volcano Visions 8.2 French, 9 MHz catheters and Volcano Platinum 3.5 French, 20 MHz catheters by short-circuiting portions of the array for acoustic radiation force impulse imaging (ARFI) applications. The catheters had an effective transmit aperture size of 2 mm and 1.5 mm, respectively. The catheters were connected to a Verasonics scanner and driven with pushing pulses of 180 V p-p to acquire ARFI data from a soft gel phantom with a Young's modulus of 2.9 kPa. The dynamic response of the tissue-mimicking material demonstrates a typical ARFI motion of 1 to 2 microns as the gel phantom displaces away and recovers back to its normal position. The hardware modifications applied to our IVUS catheters mimic potential beamforming modifications that could be implemented on IVUS scanners. Our results demonstrate that the generation of radiation force from IVUS catheters and the development of intravascular ARFI may be feasible.
Resumo:
Our research was conducted to improve the timeliness, coordination, and communication during the detection, investigation and decision-making phases of the response to an aerosolized anthrax attack in the metropolitan Washington, DC, area with the goal of reducing casualties. Our research gathered information of the current response protocols through an extensive literature review and interviews with relevant officials and experts in order to identify potential problems that may exist in various steps of the detection, investigation, and response. Interviewing officials from private and government sector agencies allowed the development of a set of models of interactions and a communication network to identify discrepancies and redundancies that would elongate the delay time in initiating a public health response. In addition, we created a computer simulation designed to model an aerosol spread using weather patterns and population density to identify an estimated population of infected individuals within a target region depending on the virulence and dimensions of the weaponized spores. We developed conceptual models in order to design recommendations that would be presented to our collaborating contacts and agencies that would use such policy and analysis interventions to improve upon the overall response to an aerosolized anthrax attack, primarily through changes to emergency protocol functions and suggestions of technological detection and monitoring response to an aerosolized anthrax attack.