976 resultados para Cube attack


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aerodynamic shape optimisation is being increasingly utilised as a design tool in the aerospace industry. In order to provide accurate results, design optimisation methods rely on the accuracy of the underlying CFD methods applied to obtain aerodynamic forces for a given configuration. Previous studies of the authors have highlighted that the variation of the order of accuracy of the CFD solver with a fixed turbulence model affects the resulting optimised airfoil shape for a single element airfoil. The accuracy of the underlying CFD model is even more relevant in the context of high-lift configurations where an accurate prediction of flow is challenging due to the complex flow physics involving transition and flow separation phenomena. This paper explores the effect of the fidelity of CFD results for a range of turbulence models within the context of the computational design of aircraft configurations. The NLR7301 multi-element airfoil (main wing and flap) is selected as the baseline configuration, because of the wealth of experimental an computational results available for this configuration. An initial validation study is conducted in order to establish optimal mesh parameters. A bi-objective shape optimisation problem is then formulated, by trying to reveal the trade-off between lift and drag coefficients at high angles of attack. Optimisation of the airfoil shape is performed with Spalart-Allmaras, k - ω SST and k - ε realisable models. The results indicate that there is consistent and complementary impact to the optimum level achieved from all the three different turbulence models considered in the presented case study. Without identifying particular superiority of any of the turbu- lence models, we can say though that each of them expressed favourable influence towards different optimality routes. These observations lead to the exploration of new avenues for future research. © 2012 by the authors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, it has been shown that improved wireless communication coverage can be achieved by employing distributed antenna system (DAS). The DAS RFID system is based on a novel technique whereby two or more spatially separated transmit and receive antennas are used to enable greatly enhanced tag detection performance over longer distances using antenna diversity combined with frequency and phase hopping. In this paper, we present a detection reliability evaluation of the DAS RFID in a typical lab environment. We conduct an extensive experimental analysis of passive RFID tag detection with different locations and orientations. The tag received signal strengths corresponding to various tag locations on one of the six different sides of a cube, and for different reader transmit power are collected and analyzed in this study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract A theoretical model is developed for the sound scattered when a sound wave is incident on a cambered aerofoil at non-zero angle of attack. The model is based on the linearization of the Euler equations about a steady subsonic flow, and is an adaptation of previous work which considered incident vortical disturbances. Only high-frequency sound waves are considered. The aerofoil thickness, camber and angle of attack are restricted such that the steady flow past the aerofoil is a small perturbation to a uniform flow. The singular perturbation analysis identifies asymptotic regions around the aerofoil; local 'inner' regions, which scale on the incident wavelength, at the leading and trailing edges of the aerofoil; Fresnel regions emanating from the leading and trailing edges of the aerofoil due to the coalescence of singularities and points of stationary phase; a wake transition region downstream of the aerofoil leading and trailing edge; and an outer region far from the aerofoil and wake. An acoustic boundary layer on the aerofoil surface and within the transition region accounts for the effects of curvature. The final result is a uniformly-valid solution for the far-field sound; the effects of angle of attack, camber and thickness are investigated. © 2013 Cambridge University Press.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper addresses a new way for handling distributed design know as the Macro concept. It is based round the assumption that future design teams will become more distributed in nature as industry exploits the Internet and other integrated communication and data exchange systems. The paper notes that this concept is part of an attack on the problems associated with the total process of Distribute Multi-Disciplinary design and Optimisation. The concepts rely on the creation of distributed self-building and self-organising teams made up from members who are globally distributed. The paper describes both the approach adopted and its implementation in a prototype software system operating over the Internet. In essence the work presented is describing a novel method for implementing a distributed design process which is far from complete but which is producing challenging ideas. © 2000 by Cranfield University.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Complement-mediated killing of pathogens through lytic pathway is an important effector mechanism of innate immune response. C9 is the ninth member of complement components, creating the membrane attack complex (MAC). In the present study, a putative cDNA sequence encoding the 650 amino acids of C9 and its genomic organization were identified in grass carp Ctenopharyngodon idella. The deduced amino acid sequence of grass carp C9 (gcC9) showed 48% and 38.5% identity to Japanese flounder and human C9, respectively. Domain search revealed that gcC9 contains a LDL receptor domain, an EGF precursor domain, a MACPF domain and two TSP domain located in the N-terminal and C-terminal, respectively. Phylogenetic analysis demonstrated that gcC9 is clustered in a same clade with Japanese flounder, pufferfish and rainbow trout C9. The gcC9 gene consists of 11 exons with 10 introns, spacing over approximately 7 kb of genomic sequence. Analysis of gcC9 promoter region revealed the presence of a TATA box and some putative transcription factor such as C/EBP, HSF, NF-AT, CHOP-C, HNF-3B, GATA-2, IK-2, EVI- 1, AP-1, CP2 and OCT-1 binding sites. The first intron region contains C/EBPb, HFH-1 and Oct-1 binding sites. RT-PCR and Western blotting analysis demonstrated that the mRNA and protein of gcC9 gene have similar expression patterns, being constitutively expressed in all organs examined of healthy fish, with the highest level in hepatopancreas. By real-time quantitative RT-PCR analysis, gcC9 transcripts were significantly up-regulated in head kidney, spleen, hepatopancreas and down-regulated in intestine from inactivated fish bacterial pathogen Flavobacterium columnare-stimulated fish, demonstrating the role of C9 in immune response. (c) 2007 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In human and animal running spring-like leg behavior is found, and similar concepts have been demonstrated by various robotic systems in the past. In general, a spring-mass model provides self-stabilizing characteristics against external perturbations originated in leg-ground interactions and motor control. Although most of these systems made use of linear spring-like legs. The question addressed in this paper is the influence of leg segmentation (i.e. the use of rotational joint and two limb-segments) to the self-stability of running, as it appears to be a common design principle in nature. This paper shows that, with the leg segmentation, the system is able to perform self-stable running behavior in significantly broader ranges of running speed and control parameters (e.g. control of angle of attack at touchdown, and adjustment of spring stiffness) by exploiting a nonlinear relationship between leg force and leg compression. The concept is investigated by using a two-segment leg model and a robotic platform, which demonstrate the plausibility in the real world. ©2008 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using classical constant-pressure molecular dynamics simulations and the force constants model, radial breathing mode (RBM) transition of single-wall carbon nanotubes under hydrostatic pressure is reported. With the pressure increased, the RBM shifts linearly toward higher frequency, and the RBM transition occurs at the same critical pressure as the structural transition. The group theory indicates that the RBMs are all Raman-active; however, due to the effect of the frequency transition and the electronic structure change for tube radial deformation, the Raman intensity of the modes becomes so weak as not to be experimentally detected, which is in agreement with a recent experiment by S. Lebedkin [Phys. Rev. B 73, 094109 (2006)]. Furthermore, the calculated RBM transition pressure is well fitted to the cube of diameter (similar to 1/d(3)).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is a study on a certain group theoretic property of the set of encryption functions of a block cipher. We have shown how to construct a subset which has this property in a given symmetric group by a computer algebra software GAP4.2 (Groups, Algorithms, and Programming, Version 4.2). These observations on group structures of block ciphers suggest us that we may be able to set a trapdoor based on meet-in-the-middle attack on block ciphers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper studies the security of the block ciphers ARIA and Camellia against impossible differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of ARIA and Camellia known so far. The designers of ARIA expected no impossible differentials exist for 4-round ARIA. However, we found some nontrivial 4-round impossible differentials, which may lead to a possible attack on 6-round ARIA. Moreover, we found some nontrivial 8-round impossible differentials for Camellia, whereas only 7-round impossible differentials were previously known. By using the 8-round impossible differentials, we presented an attack on 12-round Camellia without FL/FL 1 layers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Kerberos是一个成熟的产品,广泛应用于金融、邮电、保险等行业.但仍存在一些隐患,例如:重放攻击、密码猜测、会话中选择明文攻击等等.该文针对Kerberos系统登录时可能遭到密码猜测,即所谓的离线字典攻击(Off line Dictionary Attack)的问题,提出一种基于椭圆曲线的零知识证明方法对系统进行改进,并给出相应的协议.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

网络脆弱性分析是近年来国内外研究的热点问题之一.基于攻击能力增长的网络安全性分析模型以攻击者的能力增长为主导,参考网络环境配置,模拟黑客攻击自动生成攻击图.使用攻击能力增长表示攻击者的最终目标使得攻击图的表示更为准确.最小攻击代价分析第1次考虑了相似攻击对攻击代价的影响,以便对各条路径的攻击代价进行计算;最小环境改变分析考虑入侵检测的因素对最可能的攻击路径进行分析,对于入侵检测系统的处理更加科学合理;两种分析都为改善网络配置提供了依据.与已有成果相比,模型提出的算法和方法更为实际可行.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SERPENT和SAFER是AES的两个候选算法 ,本文使用能量攻击方法对它们进行了深入分析 ,结果表明 :对于 2 5 6、192和 12 8比特密钥的SERPENT算法 ,能量攻击平均需分别进行 2 159、2 119和 2 79次试验 .虽然所需的试验次数实际没法达到 ,但是此攻击方法大大地降低了SERPENT的密钥规模 ,并且发现对于能量攻击 ,SERPENT有许多弱密钥 .经过深入分析和穷尽搜索可知 :能量攻击可以获取SAFER的种子密钥 .文中还给出了两种抵抗能量攻击的SER PENT的改进密钥方案以及设计密钥方案时需注意的问题 .

Relevância:

10.00% 10.00%

Publicador: