948 resultados para flash crowd attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Imagen tomada de noche, con luz de flash, donde se puede apreciar la textura de una reja de color blanco, que permite ver a través de ella algunas bicicletas colgadas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three-dimensional direct numerical simulations (DNS) have been performed on a finite-size hemispherecylinder model at angle of attack AoA = 20◦ and Reynolds numbers Re = 350 and 1000. Under these conditions, massive separation exists on the nose and lee-side of the cylinder, and at both Reynolds numbers the flow is found to be unsteady. Proper orthogonal decomposition (POD) and dynamic mode decomposition (DMD) are employed in order to study the primary instability that triggers unsteadiness at Re = 350. The dominant coherent flow structures identified at the lower Reynolds number are also found to exist at Re = 1000; the question is then posed whether the flow oscillations and structures found at the two Reynolds numbers are related. POD and DMD computations are performed using different subdomains of the DNS computational domain. Besides reducing the computational cost of the analyses, this also permits to isolate spatially localized oscillatory structures from other, more energetic structures present in the flow. It is found that POD and DMD are in general sensitive to domain truncation and noneducated choices of the subdomain may lead to inconsistent results. Analyses at Re = 350 show that the primary instability is related to the counter rotating vortex pair conforming the three-dimensional afterbody wake, and characterized by the frequency St ≈ 0.11, in line with results in the literature. At Re = 1000, vortex-shedding is present in the wake with an associated broadband spectrum centered around the same frequency. The horn/leeward vortices at the cylinder lee-side, upstream of the cylinder base, also present finite amplitude oscillations at the higher Reynolds number. The spatial structure of these oscillations, described by the POD modes, is easily differentiated from that of the wake oscillations. Additionally, the frequency spectra associated with the lee-side vortices presents well defined peaks, corresponding to St ≈ 0.11 and its few harmonics, as opposed to the broadband spectrum found at the wake.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three-dimensional Direct Numerical Simulations combined with Particle Image Velocimetry experiments have been performed on a hemisphere-cylinder at Reynolds number 1000 and angle of attack 20◦. At these flow conditions, a pair of vortices, so-called “horn” vortices, are found to be associated with flow separation. In order to understand the highly complex phenomena associated with this fully threedimensional massively separated flow, different structural analysis techniques have been employed: Proper Orthogonal and Dynamic Mode Decompositions, POD and DMD, respectively, as well as criticalpoint theory. A single dominant frequency associated with the von Karman vortex shedding has been identified in both the experimental and the numerical results. POD and DMD modes associated with this frequency were recovered in the analysis. Flow separation was also found to be intrinsically linked to the observed modes. On the other hand, critical-point theory has been applied in order to highlight possible links of the topology patterns over the surface of the body with the computed modes. Critical points and separation lines on the body surface show in detail the presence of different flow patterns in the base flow: a three-dimensional separation bubble and two pairs of unsteady vortices systems, the horn vortices, mentioned before, and the so-called “leeward” vortices. The horn vortices emerge perpendicularly from the body surface at the separation region. On the other hand, the leeward vortices are originated downstream of the separation bubble, as a result of the boundary layer separation. The frequencies associated with these vortical structures have been quantified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been a growing interest in sharing and mining social network data for a wide variety of applications. In this paper, we address the problem of privacy disclosure risks that arise from publishing social network data. Specifically, we look at the vertex re-identification attack that aims to link specific vertex in social network data to specific individual in the real world. We show that even when identifiable attributes such as names are removed from released social network data, re-identification attack is still possible by manipulating abstract information. We present a new type of vertex re-identification attack model called neighbourhood-pair attack. This attack utilizes the information about the local communities of two connected vertices to identify the target individual. We show both theoretically and empirically that the proposed attack provides higher re-identification rate compared with the existing re-identification attacks that also manipulate network structure properties. The experiments conducted also show that the proposed attack is still possible even on anonymised social network data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Big Data technologies are exciting cutting-edge technologies that generate, collect, store and analyse tremendous amount of data. Like any other IT revolution, Big Data technologies also have big challenges that are obstructing it to be adopted by wider community or perhaps impeding to extract value from Big Data with pace and accuracy it is promising. In this paper we first offer an alternative view of «Big Data Cloud» with the main aim to make this complex technology easy to understand for new researchers and identify gaps efficiently. In our lab experiment, we have successfully implemented cyber-attacks on Apache Hadoop's management interface «Ambari». On our thought about «attackers only need one way in», we have attacked the Apache Hadoop's management interface, successfully turned down all communication between Ambari and Hadoop's ecosystem and collected performance data from Ambari Virtual Machine (VM) and Big Data Cloud hypervisor. We have also detected these cyber-attacks with 94.0187% accurateness using modern machine learning algorithms. From the existing researchs, no one has ever attempted similar experimentation in detection of cyber-attacks on Hadoop using performance data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Analysis of crowd behaviour in public places is an indispensable tool for video surveillance. Automated detection of anomalous crowd behaviour is a critical problem with the increase in human population. Anomalous events may include a person loitering about a place for unusual amounts of time; people running and causing panic; the size of a group of people growing over time etc. In this work, to detect anomalous events and objects, two types of feature coding has been proposed: spatial features and spatio-temporal features. Spatial features comprises of contrast, correlation, energy and homogeneity, which are derived from Gray Level Co-occurrence Matrix (GLCM). Spatio-temporal feature includes the time spent by an object at different locations in the scene. Hyperspherical clustering has been employed to detect the anomalies. Spatial features revealed the anomalous frames by using contrast and homogeneity measures. Loitering behaviour of the people were detected as anomalous objects using the spatio-temporal coding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Google Android is popular for mobile devices in recent years. The openness and popularity of Android make it a primary target for malware. Even though Android's security mechanisms could defend most malware, its permission model is vulnerable to transitive permission attack, a type of privilege escalation attacks. Many approaches have been proposed to detect this attack by modifying the Android OS. However, the Android's fragmentation problem and requiring rooting Android device hinder those approaches large-scale adoption. In this paper, we present an instrumentation framework, called SEAPP, for Android applications (or “apps”) to detect the transitive permission attack on unmodified Android. SEAPP automatically rewrites an app without requiring its source codes and produces a security-harden app. At runtime, call-chains are built among these apps and detection process is executed before a privileged API is invoked. Our experimental results show that SEAPP could work on a large number of benign apps from the official Android market and malicious apps, with a repackaged success rate of over 99.8%. We also show that our framework effectively tracks call-chains among apps and detects known transitive permission attack with low overhead. Copyright © 2016 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Flood inundation is a common natural disaster and a growing development challenge for many cities and thousands of small towns around the world. Soil features have frequently altered with the rapid development of urbanised regions, which has led to more frequent and longer duration of flooding in urban flood-prone regions. Thus, this paper presents a geographic information system (GIS)-based methodology for measuring and visualising the effects on urban flash floods generated by land-use changes over time. The measurement is formulated with a time series in order to perform a dynamic analysis. A catchment mesh is introduced into a hydrological model for reflecting the spatial layouts of infrastructure and structures over different construction periods. The Geelong Waurn Ponds campus of Deakin University is then selected as a case study. Based on GIS simulation and mapping technologies, this research illustrates the evolutionary process of flash floods. The paper then describes flood inundation for different built environments and presents a comparison by quantifying the flooding extents for infrastructure and structures. The results reveal that the GIS-based estimation model can examine urban flash floods in different development phases and identify the change of flooding extents in terms of land-use planning. This study will bring benefits to urban planners in raising awareness of flood impact and the approach proposed here could be used for flood mitigation through future urban planning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: The rapid and ongoing expansion of urbanised impervious areas could lead to more frequent flood inundation in urban flood-prone regions. Nowadays, urban flood inundation induced by rainstorm is an expensive natural disaster in many countries. In order to reduce the flooding risk, eco-roof systems (or green roof systems) could be considered as an effective mechanism of mitigating flooding disasters through their rainwater retention capability. However, there is still a lack of examining the stormwater management tool. The purpose of this paper is to evaluate the effects on flooding disaster from extensive green roofs. Design/methodology/approach: Based on geographical information system (GIS) simulation, this research presents a frame of assessing eco-roof impacts on urban flash floods. The approach addresses both urban rainfall-runoff and underground hydrologic models for traditional impervious and green roofs. Deakin University’s Geelong Waurn Ponds campus is chosen as a study case. GIS technologies are then utilised to visualise and analyse the effects on flood inundation from surface properties of building roofs. Findings: The results reveal that the eco-roof systems generate varying degrees of mitigation of urban flood inundation with different return period storms. Originality/value: Although the eco-roof technology is considered as an effective stormwater management tool, it is not commonly adopted and examined in urban floods. This study will bring benefits to urban planners for raising awareness of hazard impacts and to construction technicians for considering disaster mitigation via roof technologies. The approach proposed here could be used for the disaster mitigation in future urban planning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Developing a watermarking method that is robust to cropping attack is a challenging task in image watermarking. The moment-based watermarking schemes show good robustness to common signal processing attacks and some geometric attacks but are sensitive to cropping attack. In this paper, we modify the moment-based approach to deal with cropping attack. Firstly, we find the probability density function (PDF) of the pixel value distribution from the original image. Secondly, we reshape and normalize the pdf of the pixel value distribution (PPVD) to form a two dimensional image. Then, the moment invariants are calculated from the PPVD image. Since PPVD is insensitive to cropping, the proposed method is robust to cropping attack. Besides, it also has high robustness against other common attacks. Theoretical analysis and experimental results demonstrate the effectiveness of the proposed method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This periodical tells about all the activities going on at the Sandhill Farmers Market and other markets in the Columbia area. Many things are hot linked to the market flash including recipes, planting tips, Clemson University and the South Carolina Farmer's Market.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This periodical tells about all the activities going on at the Sandhill Farmers Market and other markets in the Columbia area. Many things are hot linked to the market flash including recipes, planting tips, Clemson University and the South Carolina Farmer's Market.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This periodical tells about all the activities going on at the Sandhill Farmers Market and other markets in the Columbia area. Many things are hot linked to the market flash including recipes, planting tips, Clemson University and the South Carolina Farmer's Market.