918 resultados para collision attack
Resumo:
The gain and loss integrals in the Boltzmann equation for a rigid sphere gas are evaluated in closed form for a distribution which can be expressed as a linear combination of Maxwellians. Application to the Mott-Smith bimodal distribution shows that the gain is also bimodal, but the two modes in the gain are less pronounced than in the distribution. Implications of these results for simple collision models in non-equilibrium flow are discussed.
Resumo:
We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.
Resumo:
The problem of collision prediction in dynamic environments appears in several diverse fields, which include robotics, air vehicles, underwater vehicles, and computer animation. In this paper, collision prediction of objects that move in 3-D environments is considered. Most work on collision prediction assumes objects to be modeled as spheres. However, there are many instances of object shapes where an ellipsoidal or a hyperboloid-like bounding box would be more appropriate. In this paper, a collision cone approach is used to determine collision between objects whose shapes can be modeled by general quadric surfaces. Exact collision conditions for such quadric surfaces are obtained in the form of analytical expressions in the relative velocity space. For objects of arbitrary shapes, exact representations of planar sections of the 3-D collision cone are obtained.
Resumo:
Distinctions between isobaric residues have been a major challenge in mass spectrometric peptide sequencing. Here, we propose a methodology for distinction among isobaric leucine, isoleucine, and hydroxyproline, a commonly found post-translationally modified amino acid with a nominal mass of 113 Da, through a combined electron transfer dissociation-collision-induced dissociation approach. While the absence of c and z(center dot) ions, corresponding to the Yyy-Xxx (Xxx = Leu, Ile, or Hyp) segment, is indicative of the presence of hydroxyproline, loss of isopropyl (Delta m = 43 Da) or ethyl radicals (Delta m = 29 Da), through collisional activation of z(center dot) radical ions, are characteristic of leucine or isoleucine, respectively. Radical migration processes permit distinctions even in cases where the specific e ions, corresponding to the Yyy-Leu or -Ile segments, are absent or of low intensity. This tandem mass spectrometric (MSn) method has been successfully implemented in a liquid chromatography MSn platform to determine the identity of 23 different isobaric residues from a mixture of five different peptides. The approach is convenient for distinction of isobaric residues from any crude peptide mixture, typically encountered in natural peptide libraries or proteomic analysis.
Resumo:
Avoidance of collision between moving objects in a 3-D environment is fundamental to the problem of planning safe trajectories in dynamic environments. This problem appears in several diverse fields including robotics, air vehicles, underwater vehicles and computer animation. Most of the existing literature on collision prediction assumes objects to be modelled as spheres. While the conservative spherical bounding box is valid in many cases, in many other cases, where objects operate in close proximity, a less conservative approach, that allows objects to be modelled using analytic surfaces that closely mimic the shape of the object, is more desirable. In this paper, a collision cone approach (previously developed only for objects moving on a plane) is used to determine collision between objects, moving in 3-D space, whose shapes can be modelled by general quadric surfaces. Exact collision conditions for such quadric surfaces are obtained and used to derive dynamic inversion based avoidance strategies.
Resumo:
Grouping and coordination tactics for ground attack missions by a heterogeneous mix of reconnaissance, enemy suppression, and attack unmanned aerial vehicles (UAVs) is presented. Dubins' paths are used to determine the optimal number of attack UAVs and their positional and heading freedoms, as functions of weapon seeker range and field of view. A generic battlefield scenario with layered defense is created and the tactics are evaluated on a Group Flyer simulation platform for both nominal and off-nominal conditions.
Resumo:
Droplet collision occurs frequently in regions where the droplet number density is high. Even for Lean Premixed and Pre-vaporized (LPP) liquid sprays, the collision effects can be very high on the droplet size distributions, which will in turn affect the droplet vaporization process. Hence, in conjunction with vaporization modeling, collision modeling for such spray systems is also essential. The standard O'Rourke's collision model, usually implemented in CFD codes, tends to generate unphysical numerical artifact when simulations are performed on Cartesian grid and the results are not grid independent. Thus, a new collision modeling approach based on no-time-counter method (NTC) proposed by Schmidt and Rutland is implemented to replace O'Rourke's collision algorithm to solve a spray injection problem in a cylindrical coflow premixer. The so called ``four-leaf clover'' numerical artifacts are eliminated by the new collision algorithm and results from a diesel spray show very good grid independence. Next, the dispersion and vaporization processes for liquid fuel sprays are simulated in a coflow premixer. Two liquid fuels under investigation are jet-A and Rapeseed Methyl Esters (RME). Results show very good grid independence in terms of SMD distribution, droplet number distribution and fuel vapor mass flow rate. A baseline test is first established with a spray cone angle of 90 degrees and injection velocity of 3 m/s and jet-A achieves much better vaporization performance than RME due to its higher vapor pressure. To improve the vaporization performance for both fuels, a series of simulations have been done at several different combinations of spray cone angle and injection velocity. At relatively low spray cone angle and injection velocity, the collision effect on the average droplet size and the vaporization performance are very high due to relatively high coalescence rate induced by droplet collisions. Thus, at higher spray cone angle and injection velocity, the results expectedly show improvement in fuel vaporization performance since smaller droplet has a higher vaporization rate. The vaporization performance and the level of homogeneity of fuel-air mixture can be significantly improved when the dispersion level is high, which can be achieved by increasing the spray cone angle and injection velocity. (C) 2012 Elsevier Ltd. All rights reserved.
Resumo:
This paper addresses the problem of multiple unmanned aerial vehicle (UAV) rendezvous when the UAVs have to perform maneuvers to avoid collisions with other UAVs. The proposed solution consists of using velocity control and a wandering maneuver, if needed, of the UAVs based on a consensus among them on the estimated time of arrival at the point of the rendezvous. This algorithm, with a slight modification is shown to be useful in tracking stationary or slowly moving targets with a standoff distance. The proposed algorithm is simple and computationally efficient. The simulation results demonstrate the efficacy of the proposed approach. DOI: 10.1061/(ASCE)AS.1943-5525.0000145. (C) 2012 American Society of Civil Engineers.
Resumo:
Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.
Resumo:
The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.
Resumo:
A Monte Carlo simulation is performed to study the dependence of collision frequency on interparticle distance for a system composed of two hard-sphere particles. The simulation quantitatively shows that the collision frequency drops down sharply as the distance between two particles increases. This characteristic provides a useful evidence for the collision-reaction dynamics of aggregation process for the two-particle system described in the other reference.
Resumo:
The following points are argued: (i) there are two independent kinds of interaction on interfaces, i.e. the interaction between phases and the collision interaction, and the jump relations on interfaces can accordingly be resolved; (ii) the stress in a particle can also be divided into background stress and collision stress corresponding to the two kinds of interaction on interfaces respectively; (iii) the collision stress, in fact, has no jump on interface, so the averaged value of its derivative is equal to the derivative of its averaged value; (iv) the stress of solid phase in the basic equations for two\|phase flow should include the collision stress, while the stress in the expression of the inter\|phase force contains the background one only. Based on the arguments, the strict method for deriving the equations for two\|phase flow developed by Drew, Ishii et al. is generalized to the dense two\|phase flow, which involves the effect of collision stress.