921 resultados para Auto, organizzazione, sistemi, MAS, design pattern, TuCSoN, respect


Relevância:

40.00% 40.00%

Publicador:

Resumo:

In order to disign an airfoil of which maximum lift coefficient (CL max) is not sensitive to location of forced top boundary layer transition. Taking maximizing mean value of CL max and minimizing standard deviation as biobjective, leading edge radius, manximum thickness and its location, maximum camber and its location as deterministic design variables, location of forced top boundary layer transition as stochastic variable, XFOIL as deterministic CFD solver, non-intrusive polynomial chaos as substitute of Monte Carlo method, we completed a robust airfoil design problem. Results demonstrate performance of initial airfoil is enhanced through reducing standard deviation of CL max. Besides, we also know maximum thickness has the most dominating effect on mean value of CL max, location of maximum thickness has the most dominating effect on standard deviation of CL max, maximum camber has a little effect on both mean value and standard deviation, and maximum camber is the only element of which increase can lead increase of mean value and standard deviation at the same time. Copyright © 2009 by the American Institute of Aeronautics and Astronautics, Inc.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Several options of fuel assembly design are investigated for a BWR core operating in a closed self-sustainable Th-233U fuel cycle. The designs rely on an axially heterogeneous fuel assembly structure consisting of a single axial fissile zone "sandwiched" between two fertile blanket zones, in order to improve fertile to fissile conversion ratio. The main objective of the study was to identify the most promising assembly design parameters, dimensions of fissile and fertile zones, for achieving net breeding of 233U. The design challenge, in this respect, is that the fuel breeding potential is at odds with axial power peaking and the core minimum critical power ratio (CPR), hence limiting the maximum achievable core power rating. Calculations were performed with the BGCore system, which consists of the MCNP code coupled with fuel depletion and thermo-hydraulic feedback modules. A single 3-dimensional fuel assembly having reflective radial boundaries was modeled applying simplified restrictions on the maximum centerline fuel temperature and the CPR. It was found that axially heterogeneous fuel assembly design with a single fissile zone can potentially achieve net breeding, while matching conventional BWR core power rating under certain restrictions to the core loading pattern design. © 2013 Elsevier B.V. All rights reserved.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A 7.8-mu m surface emitting second-order distributed feedback quantum cascade laser (DFB QCL) structure with metallized surface grating is studied. The modal property of this structure is described by utilizing coupled-mode theory where the coupling coefficients are derived from exact Floquet-Bloch solutions of infinite periodic structure. Based on this theory, the influence of waveguide structure and grating topography as well as device length on the laser performance is numerically investigated. The optimized surface emitting second-order DFB QCL structure design exhibits a high surface outcoupling efficiency of 22% and a low threshold gain of 10 cm(-1). Using a pi phase-shift in the centre of the grating, a high-quality single-lobe far-field radiation pattern is obtained.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper we investigate the azimuthal pattern symmetry of an Archimedean spiral antenna which is designed to operate over the frequency range 3-10 GHz. The performance of the spiral in free space is compared with a structure that is backed by a perfect electric conductor with a separation distance of ?/4 at the operating frequencies. The latter arrangement exhibits a higher gain, however it is observed that the radiation patterns are less symmetrical about boresight and this performance degradation increases with frequency. The predicted 3 dB beamwidth difference is shown to vary between 14° (3 GHz) and 51° (10 GHz). An improved antenna design is described which reduces the pattern asymmetry to ˜ 2° at 10 GHz. The reduction in modal contamination is obtained by inserting slots carefully arranged in a radial pattern to disrupt the surface currents that flow on the ground plane of the antenna

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Tese de doutoramento, Belas-Artes (Design de Equipamento), Universidade de Lisboa, Faculdade de Belas-Artes, 2015

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In questo inizio di secolo, la nuova organizzazione sociale del lavoro pone una serie di domande e di sfide ai ricercatori che intendono aiutare le persone a progettare la loro vita lavorativa. Nell'era della globalizzazione anche per quanto riguarda il career counseling, abbiamo deciso di affrontare queste problematiche e di dare delle risposte che si caratterizzassero come innovative attraverso la costituzione di un forum di discussione internazionale. Si è proceduto in questo modo per evitare le difficoltà che generalmente si incontrano quando si mettono a punto dei modelli e dei metodi in un Paese e poi si esportano in altre culture con l'intento di adattarli alle stesse. Questo articolo presenta i primi risultati della collaborazione che si è registrata - un modello e dei metodi per la consulenza di orientamento. Il modello per l'intervento nell'ambito dell'approccio Life Design si caratterizza per cinque presupposti relativi al modo di vedere le persone e la loro vita lavorativa. Essi riguardano le possibilità contestuali, i processi dinamici, i progressi non-lineari, le molteplici prospettive e la presenza di pattern personali. Partendo da questi cinque presupposti abbiamo messo a punto un modello basato sull'epistemologia del costruzionismo sociale, che sostiene che la conoscenza e l'identità di un individuo sono i prodotti dell'interazione sociale e che il significato è costruito attraverso il discorso. Questo approccio fa riferimento anche alla teoria della costruzione di sé di Guichard (2005) e della costruzione della vita professionale di Savickas (2005), che descrivono le azioni utili a facilitare la progettazione del proprio futuro. Particolare attenzione viene data agli interventi nel corso dell'arco di vita, olistici, contestuali e preventivi.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Systems which employ underwater acoustic energy for observation or communication are called sonar systems. The active and passive sonars are the two types of systems used for the detection and localisation of targets in underwater. Active sonar involves the transmission of an acoustic signal which, when reflected from a target, provides the sonar receiver with a basis for the detection and estimation. Passive sonar bases its detection and estimation on sounds which emanate from the target itself--Machinery noise, flow noise, transmission from its own active sonar etc.Electroacoustic transducers are used in sonar systems for the transmission and detection of acoustic energy. The transducer which is used for the transmission of acoustic energy is called projector and the one used for reception is called hydrophone. Since a single transducer is not sufficient enough for long range and directional transmission, a properly distributed array of transducers are to be used [9-11].The need and requirement for spatial processing to generate the most favourable directivity patterns for transducer systems used in underwater applications have already been analysed by several investigators [12-21].The desired directivity pattern can be either generated by the use of suitable focussing techniques or by an array of non-directional sensor elements, whose arrangements, spacing and the mode of excitation provide the required radiation pattern or by the combination of these.While computing that the directivity pattern, it is assumed strength of the elements are unaffected by the the source acoustic pressure at each source. However, in closely packed a r r a y s , the acoustic interaction effects experienced among the elements will modify the behaviour of individual elements and in turn will reduce the acoust ic source leve 1 wi t h respect to the maximum t heoret i cal va 1ue a s well as degrade the beam pa t tern. Th i s ef fect shou 1d be reduced in systems that are intended to generate high acoustic power output and unperturbed beam patterns [2,22-31].The work herein presented includes an approach for designing efficient and well behaved underwater transd~cer arrays, taking into account the acoustic interaction effect experienced among the closely packed multielement arrays.Architectural modifications reducing the interaction effect different radiating apertures.