WorldWideScience

Sample records for angle of attack

  1. High Angle of Attack Aerodynamics

    Science.gov (United States)

    1979-01-01

    strakes were added promises well for the flight tests. At the time of writing the test aircraft had just made its first flight. A photograph taken from...I- : : I 7(71000 MUS I I- UN ILIA I I GAS 1.~W 74LL GOR I L7AP7 07000 Fig.VAIO 11M" ORBITERt CEAP$I’ WN TUNNE MEGR~ Fig." 1LS SV2MDA. IELT

  2. Effect of Angle of Attack on Slope Climbing Performance

    Science.gov (United States)

    Creager, Colin M.; Jones, Lucas; Smith, Lauren M.

    2017-01-01

    Ascending steep slopes is often a very difficult challenge for off-road vehicles, whether on Earth or on extraterrestrial bodies. This challenge is even greater if the surface consists of loose granular soil that does not provide much shear strength. This study investigated how the path at which a vehicle traverses a slope, specifically the angle that it is commanded to drive relative to the base of the hill (the angle of attack), can affect its performance. A vehicle was driven in loose sand at slope angles up to 15 degrees and angles of attack ranging from 10 to 90 degrees. A novel photogrammetry technique was implemented to both track vehicle motion and create a three-dimensional profile of the terrain. This allowed for true wheel sinkage measurements. The study showed that though low angles of attack result in lower wheel slip and sinkage, the efficiency of the vehicles uphill motion increased at higher angles of attack. For slopes up to 15 degrees, a 90 degree angle of attack provided the greatest likelihood of successful ascent.

  3. Effect of attack angle on flow characteristic of centrifugal fan

    Science.gov (United States)

    Wu, Y.; Dou, H. S.; Wei, Y. K.; Chen, X. P.; Chen, Y. N.; Cao, W. B.

    2016-05-01

    In this paper, numerical simulation is performed for the performance and internal flow of a centrifugal fan with different operating conditions using steady three-dimensional incompressible Navier-Stokes equations coupled with the RNG k-e turbulent model. The performance curves, the contours of static pressure, total pressure, radial velocity, relative streamlines and turbulence intensity at different attack angles are obtained. The distributions of static pressure and velocity on suction surface and pressure surface in the same impeller channel are compared for various attack angles. The research shows that the efficiency of the centrifugal fan is the highest when the attack angle is 8 degree. The main reason is that the vortex flow in the impeller is reduced, and the jet-wake pattern is weakened at the impeller outlet. The pressure difference between pressure side and suction side is smooth and the amplitude of the total pressure fluctuation is low along the circumferential direction. These phenomena may cause the loss reduced for the attack angle of about 8 degree.

  4. High angle of attack aerodynamics subsonic, transonic, and supersonic flows

    CERN Document Server

    Rom, Josef

    1992-01-01

    The aerodynamics of aircraft at high angles of attack is a subject which is being pursued diligently, because the modern agile fighter aircraft and many of the current generation of missiles must perform well at very high incidence, near and beyond stall. However, a comprehensive presentation of the methods and results applicable to the studies of the complex aerodynamics at high angle of attack has not been covered in monographs or textbooks. This book is not the usual textbook in that it goes beyond just presenting the basic theoretical and experimental know-how, since it contains reference material to practical calculation methods and technical and experimental results which can be useful to the practicing aerospace engineers and scientists. It can certainly be used as a text and reference book for graduate courses on subjects related to high angles of attack aerodynamics and for topics related to three-dimensional separation in viscous flow courses. In addition, the book is addressed to the aerodynamicist...

  5. Determination of the angle of attack on rotor blades

    DEFF Research Database (Denmark)

    Shen, Wen Zhong; Hansen, Martin Otto Laver; Sørensen, Jens Nørkær

    2009-01-01

    Two simple methods for determining the angle of attack (AOA) on a section of a rotor blade are proposed. Both techniques consist of employing the Biot-Savart integral to determine the influence of the bound vorticity on the velocity field. In the first technique, the force distribution along...... the blade and the velocity at a monitor point in the vicinity of the blade are assumed to be known from experiments or CFD computations. The AOA is determined by subtracting the velocity induced by the bound circulation, determined from the loading, from the velocity at the monitor point. In the second...... to be located closer to the blade, and thus to determine the AOA with higher accuracy. Data from CFD computations for flows past the Tellus 95 kW wind turbine at different wind speeds are used to test both techniques. Comparisons show that the proposed methods are in good agreement with existing techniques...

  6. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    Science.gov (United States)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  7. Numerical simulation of the effects of variation of angle of attack and sweep angle on vortex breakdown over delta wings

    Science.gov (United States)

    Ekaterinaris, J. A.; Schiff, Lewis B.

    1990-01-01

    In the present investigation of the vortical flowfield structure over delta wings at high angles of attack, three-dimensional Navier-Stokes numerical simulations were conducted to predict the complex leeward flowfield characteristics; these encompass leading-edge separation, secondary separation, and vortex breakdown. Attention is given to the effect on solution accuracy of circumferential grid-resolution variations in the vicinity of the wing leading edge, and well as to the effect of turbulence modeling on the solutions. When a critical angle-of-attack was reached, bubble-type vortex breakdown was found. With further angle-of-attack increase, a change from bubble-type to spiral-type vortex breakdown was predicted by the numerical solution.

  8. Characterization and Control of Vortex Breakdown over a Delta Wing at High Angles of Attack

    National Research Council Canada - National Science Library

    Mitchell, Anthony

    2000-01-01

    .... The goal of this research is the control of leading-edge vortex breakdown by open-loop, along-the-core blowing near the apex of a delta wing to improve lift and maneuverability at high angles of attack...

  9. Development of an engineering level prediction method for high angle of attack aerodynamics

    Science.gov (United States)

    Reisenthel, Patrick H.; Rodman, Laura C.; Nixon, David

    1993-01-01

    The present work is concerned with predicting the unsteady flow considered to be the cause of the structural failure of twin vertical tail aircraft. An engineering tool has been produced for high angle of attack aerodynamics using the simplest physical models. The main innovation behind this work is its emphasis on the modeling of two key aspects of the dominant physics associated with high angle-of-attack airflows, namely unsteady separation and vortex breakdown.

  10. EFFECT OF SWEEP ANGLE ON THE VORTICAL FLOW OVER DELTA WINGS AT AN ANGLE OF ATTACK OF 10°

    Directory of Open Access Journals (Sweden)

    JAMES BRETT

    2014-12-01

    Full Text Available CFD simulations have been used to analyse the vortical flows over sharp edged delta wings with differing sweep angles under subsonic conditions at an angle of attack of 10°. RANS simulations were validated against experimental data for a 65° sweep wing, with a flat cross-section, and the steadiness of the flow field was assessed by comparing the results against unsteady URANS and DES simulations. To assess the effect of sweep angle on the flow field, a range of sweep angles from 65° to 43° were simulated. For moderate sweep wings the primary vortex was observed to detach from the leading edge, undergoing vortex breakdown, and a weaker, replacement, "shadow" vortex was formed. The shadow vortex was observed for sweep angles of 50° and less, and resulted in reduced lift production near the wing tips loss of the stronger primary vortex.

  11. Magnus effects at high angles of attack and critical Reynolds numbers

    Science.gov (United States)

    Seginer, A.; Ringel, M.

    1983-01-01

    The Magnus force and moment experienced by a yawed, spinning cylinder were studied experimentally in low speed and subsonic flows at high angles of attack and critical Reynolds numbers. Flow-field visualization aided in describing a flow model that divides the Magnus phenomenon into a subcritical region, where reverse Magnus loads are experienced, and a supercritical region where these loads are not encountered. The roles of the spin rate, angle of attack, and crossflow Reynolds number in determining the boundaries of the subcritical region and the variations of the Magnus loads were studied.

  12. Experimental Flight Characterization of Spin Stabilized Projectiles at High Angle of Attack

    Science.gov (United States)

    2017-08-07

    impact point prediction for applications such as high-arcing, spin-stabilized munitions. 15. SUBJECT TERMS aerodynamics, spark range, spin...angles of attack increase the delivery error due to poor fire-control solutions (i.e., understanding the relationship between the gun pointing angle and...of downrange travel ) is also evident in the horizontal data. Fig. 3 Center-of-gravity motion The rolling motion is captured in Fig. 4. These

  13. Prediction of Flows about Forebodies at High-Angle-of-Attack Dynamic Conditions

    National Research Council Canada - National Science Library

    van

    2003-01-01

    .... This paper focuses on the steady-state flow problem. In the mid-1990s, rotary balance experiments were conducted on square and circular ogive forebodies at angles of attack of 60 and 90 degrees over a range of Reynolds numbers...

  14. A hybrid system approach to airspeed, angle of attack and sideslip estimation in Unmanned Aerial Vehicles

    KAUST Repository

    Shaqura, Mohammad; Claudel, Christian

    2015-01-01

    , low power autopilots in real-time. The computational method is based on a hybrid decomposition of the modes of operation of the UAV. A Bayesian approach is considered for estimation, in which the estimated airspeed, angle of attack and sideslip

  15. Stability Analysis of Hypersonic Boundary Layer over a Cone at Small Angle of Attack

    Directory of Open Access Journals (Sweden)

    Feng Ji

    2014-04-01

    Full Text Available An investigation on the stability of hypersonic boundary layer over a cone at small angle of attack has been performed. After obtaining the steady base flow, linear stability theory (LST analysis has been made with local parallel assumption. The growth rates of the first mode and second mode waves at different streamwise locations and different azimuthal angles are obtained. The results show that the boundary layer stability was greatly influenced by small angles of attack. The maximum growth rate of the most unstable wave on the leeward is larger than that on the windward. Moreover, dominating second mode wave starts earlier on the leeward than that on the windward. The LST result also shows that there is a “valley” region around 120°~150° meridian in the maximum growth rates curve.

  16. Wind-tunnel investigation of the flow correction for a model-mounted angle of attack sensor at angles of attack from -10 deg to 110 deg. [Langley 12-foot low speed wind tunnel test

    Science.gov (United States)

    Moul, T. M.

    1979-01-01

    A preliminary wind tunnel investigation was undertaken to determine the flow correction for a vane angle of attack sensor over an angle of attack range from -10 deg to 110 deg. The sensor was mounted ahead of the wing on a 1/5 scale model of a general aviation airplane. It was shown that the flow correction was substantial, reaching about 15 deg at an angle of attack of 90 deg. The flow correction was found to increase as the sensor was moved closer to the wing or closer to the fuselage. The experimentally determined slope of the flow correction versus the measured angle of attack below the stall angle of attack agreed closely with the slope of flight data from a similar full scale airplane.

  17. The use of new facility by means internal balance with sting support for wide range Angle of Attack aircraft

    Science.gov (United States)

    Subagyo; Daryanto, Yanto; Risnawan, Novan

    2018-04-01

    The development of facilities for the testing of wide range angle of attack aircraft in the wind tunnel at subsonic regime has done and implemented. Development required to meet the test at an angle of attack from -20 ° to 40 °. Testing the wide range angle of attack aircraft with a wide variation of the angle of attack become important needs. This can be done simply by using the sting support-equipped by internal balance to measure the forces and moments component aerodynamics. The results of development and use on the wide range angle of attack aircraft testing are aerodynamics characteristics in the form of the coefficient three components forces and the three components of the moment. A series of test aircraft was successfully carried out and the results are shown in the form of graphs of characteristic of aerodynamics at wind speed 70 m/s.

  18. Analysis of Windward Side Hypersonic Boundary Layer Transition on Blunted Cones at Angle of Attack

    Science.gov (United States)

    2017-01-09

    correlated with PSE/LST N-Factors. 15. SUBJECT TERMS boundary layer transition, hypersonic, ground test 16. SECURITY CLASSIFICATION OF: 17. LIMITATION ...Maccoll) solution e condition at boundary layer edge w condition at wall, viscous ∞ condition in freestream Conventions LST Linear Stability Theory PSE...STATES AIR FORCE AFRL-RQ-WP-TP-2017-0169 ANALYSIS OF WINDWARD SIDE HYPERSONIC BOUNDARY LAYER TRANSITION ON BLUNTED CONES AT ANGLE OF ATTACK Roger

  19. Simulation of flow around a slender body at high angles of attack

    Directory of Open Access Journals (Sweden)

    Obeid Osama

    2017-01-01

    Full Text Available LES of the flow around an ogive-cylinder body at high angles of attack were carried out to investigate the possibility of the development of asymmetric wake-vortex without the introduction of artificial perturbations. The study investigated the effect of grid resolution and scheme bias on the solution. The numerical solution was found to be sensitive to the bias in the numerical scheme. The simulation was carried for angles of attack α = 30°, 40°, 50°, 55°, and 60°. The simulation at α = 30° − 40° produced symmetric wake-vortex. At α = 50°, the wake-vortex is also symmetric but with vortex separation. At α = 60°, the wake-vortex becomes asymmetric. At 60°, the wake-vortex is highly asymmetric with vortex separation and breakdown. It was concluded that asymmetric flow around slender bodies at high angles of attack can be simulated in the absence geometrical or flow perturbations.

  20. Robust, nonlinear, high angle-of-attack control design for a supermaneuverable vehicle

    Science.gov (United States)

    Adams, Richard J.

    1993-01-01

    High angle-of-attack flight control laws are developed for a supermaneuverable fighter aircraft. The methods of dynamic inversion and structured singular value synthesis are combined into an approach which addresses both the nonlinearity and robustness problems of flight at extreme operating conditions. The primary purpose of the dynamic inversion control elements is to linearize the vehicle response across the flight envelope. Structured singular value synthesis is used to design a dynamic controller which provides robust tracking to pilot commands. The resulting control system achieves desired flying qualities and guarantees a large margin of robustness to uncertainties for high angle-of-attack flight conditions. The results of linear simulation and structured singular value stability analysis are presented to demonstrate satisfaction of the design criteria. High fidelity nonlinear simulation results show that the combined dynamics inversion/structured singular value synthesis control law achieves a high level of performance in a realistic environment.

  1. Study on Fluid-Induced Vibration Power Harvesting of Square Columns under Different Attack Angles

    Directory of Open Access Journals (Sweden)

    Meng Zhang

    2017-01-01

    Full Text Available A model of the flow-vibration-electrical circuit multiphysical coupling system for solving square column vortex-induced vibration piezoelectric energy harvesting (VIVPEH is proposed in this paper. The quasi steady state theory is adopted to describe the fluid solid coupling process of vortex-induced vibration based on the finite volume method coupled Gauss equation. The vibrational response and the quasi steady state form of the output voltage are solved by means of the matrix coefficient method and interactive computing. The results show that attack angles play an important role in the performance of square column VIVPEH, of which α=45° is a relatively ideal attack angle of square column VIVPEH.

  2. Pitch control margin at high angle of attack - Quantitative requirements (flight test correlation with simulation predictions)

    Science.gov (United States)

    Lackey, J.; Hadfield, C.

    1992-01-01

    Recent mishaps and incidents on Class IV aircraft have shown a need for establishing quantitative longitudinal high angle of attack (AOA) pitch control margin design guidelines for future aircraft. NASA Langley Research Center has conducted a series of simulation tests to define these design guidelines. Flight test results have confirmed the simulation studies in that pilot rating of high AOA nose-down recoveries were based on the short-term response interval in the forms of pitch acceleration and rate.

  3. An evaluation of several methods of determining the local angle of attack on wind turbine blades

    DEFF Research Database (Denmark)

    Guntur, Srinivas; Sørensen, Niels N.

    2014-01-01

    Several methods of determining the angles of attack (AOAs) on wind turbine blades are discussed in this paper. A brief survey of the methods that have been used in the past are presented, and the advantages of each method are discussed relative to their application in the BEM theory. Data from...... existing as well as new full rotor CFD computations of the MEXICO rotor are used in this analysis. A more accurate estimation of the AOA is possible from 3D full rotor CFD computations, but when working with experimental data, pressure measurements and sectional forces are often the only data available...

  4. Fluid-structure interaction of a rolling restrained body of revolution at high angles of attack

    Science.gov (United States)

    Degani, D.; Ishay, M.; Gottlieb, O.

    2017-03-01

    The current work investigates numerically rolling instabilities of a free-to-roll slender rigid-body of revolution placed in a wind tunnel at a high angle of attack. The resistance to the roll moment is represented by a linear torsion spring and equivalent linear damping representing friction in the bearings of a simulated wind tunnel model. The body is subjected to a three-dimensional, compressible, laminar flow. The full Navier-Stokes equations are solved using the second-order implicit finite difference Beam-Warming scheme, adapted to a curvilinear coordinate system, whereas the coupled structural second order equation of motion for roll is solved by a fourth-order Runge-Kutta method. The body consists of a 3.5-diameter tangent ogive forebody with a 7.0-diameter long cylindrical afterbody extending aft of the nose-body junction to x/D = 10.5. We describe in detail the investigation of three angles of attack 20°, 40°, and 65°, at a Reynolds number of 30 000 (based on body diameter) and a Mach number of 0.2. Three distinct configurations are investigated as follows: a fixed body, a free-to-roll body with a weak torsion spring, and a free-to-roll body with a strong torsion spring. For each angle of attack the free-to-roll configuration portrays a distinct and different behavior pattern, including bi-stable limit-cycle oscillations. The bifurcation structure incorporates both large and small amplitude periodic roll oscillations where the latter lose their periodicity with increasing stiffness of the restraining spring culminating with distinct quasiperiodic oscillations. We note that removal of an applied upstream disturbance for a restrained body does not change the magnitude or complexity of the oscillations or of the flow patterns along the body. Depending on structure characteristics and flow conditions even a small rolling moment coefficient at the relatively low angle of attack of 20° may lead to large amplitude resonant roll oscillations.

  5. A CFD Database for Airfoils and Wings at Post-Stall Angles of Attack

    Science.gov (United States)

    Petrilli, Justin; Paul, Ryan; Gopalarathnam, Ashok; Frink, Neal T.

    2013-01-01

    This paper presents selected results from an ongoing effort to develop an aerodynamic database from Reynolds-Averaged Navier-Stokes (RANS) computational analysis of airfoils and wings at stall and post-stall angles of attack. The data obtained from this effort will be used for validation and refinement of a low-order post-stall prediction method developed at NCSU, and to fill existing gaps in high angle of attack data in the literature. Such data could have potential applications in post-stall flight dynamics, helicopter aerodynamics and wind turbine aerodynamics. An overview of the NASA TetrUSS CFD package used for the RANS computational approach is presented. Detailed results for three airfoils are presented to compare their stall and post-stall behavior. The results for finite wings at stall and post-stall conditions focus on the effects of taper-ratio and sweep angle, with particular attention to whether the sectional flows can be approximated using two-dimensional flow over a stalled airfoil. While this approximation seems reasonable for unswept wings even at post-stall conditions, significant spanwise flow on stalled swept wings preclude the use of two-dimensional data to model sectional flows on swept wings. Thus, further effort is needed in low-order aerodynamic modeling of swept wings at stalled conditions.

  6. Applications of low lift to drag ratio aerobrakes using angle of attack variation for control

    Science.gov (United States)

    Mulqueen, J. A.

    1991-01-01

    Several applications of low lift to drag ratio aerobrakes are investigated which use angle of attack variation for control. The applications are: return from geosynchronous or lunar orbit to low Earth orbit; and planetary aerocapture at Earth and Mars. A number of aerobrake design considerations are reviewed. It was found that the flow impingement behind the aerobrake and the aerodynamic heating loads are the primary factors that control the sizing of an aerobrake. The heating loads and other loads, such as maximum acceleration, are determined by the vehicle ballistic coefficient, the atmosphere entry conditions, and the trajectory design. Several formulations for defining an optimum trajectory are reviewed, and the various performance indices that can be used are evaluated. The 'nearly grazing' optimal trajectory was found to provide the best compromise between the often conflicting goals of minimizing the vehicle propulsive requirements and minimizing vehicle loads. The relationship between vehicle and trajectory design is investigated further using the results of numerical simulations of trajectories for each aerobrake application. The data show the sensitivity of the trajectories to several vehicle parameters and atmospheric density variations. The results of the trajectory analysis show that low lift to drag ratio aerobrakes, which use angle of attack variation for control, can potentially be used for a wide range of aerobrake applications.

  7. Unsteady aerodynamic modeling at high angles of attack using support vector machines

    Directory of Open Access Journals (Sweden)

    Wang Qing

    2015-06-01

    Full Text Available Accurate aerodynamic models are the basis of flight simulation and control law design. Mathematically modeling unsteady aerodynamics at high angles of attack bears great difficulties in model structure determination and parameter estimation due to little understanding of the flow mechanism. Support vector machines (SVMs based on statistical learning theory provide a novel tool for nonlinear system modeling. The work presented here examines the feasibility of applying SVMs to high angle-of-attack unsteady aerodynamic modeling field. Mainly, after a review of SVMs, several issues associated with unsteady aerodynamic modeling by use of SVMs are discussed in detail, such as selection of input variables, selection of output variables and determination of SVM parameters. The least squares SVM (LS-SVM models are set up from certain dynamic wind tunnel test data of a delta wing and an aircraft configuration, and then used to predict the aerodynamic responses in other tests. The predictions are in good agreement with the test data, which indicates the satisfying learning and generalization performance of LS-SVMs.

  8. An evaluation of several methods of determining the local angle of attack on wind turbine blades

    International Nuclear Information System (INIS)

    Guntur, S; Sørensen, N N

    2014-01-01

    Several methods of determining the angles of attack (AOAs) on wind turbine blades are discussed in this paper. A brief survey of the methods that have been used in the past are presented, and the advantages of each method are discussed relative to their application in the BEM theory. Data from existing as well as new full rotor CFD computations of the MEXICO rotor are used in this analysis. A more accurate estimation of the AOA is possible from 3D full rotor CFD computations, but when working with experimental data, pressure measurements and sectional forces are often the only data available. The aim of this work is to analyse the reliability of some of the simpler methods of estimating the 3D effective AOA compared some of the more rigorous CFD based methods

  9. Application of dynamical systems theory to the high angle of attack dynamics of the F-14

    Science.gov (United States)

    Jahnke, Craig C.; Culick, Fred E. C.

    1990-01-01

    Dynamical systems theory has been used to study the nonlinear dynamics of the F-14. An eight degree of freedom model that does not include the control system present in operational F-14s has been analyzed. The aerodynamic model, supplied by NASA, includes nonlinearities as functions of the angles of attack and sideslip, the rotation rate, and the elevator deflection. A continuation method has been used to calculate the steady states of the F-14 as continuous functions of the control surface deflections. Bifurcations of these steady states have been used to predict the onset of wing rock, spiral divergence, and jump phenomena which cause the aircraft to enter a spin. A simple feedback control system was designed to eliminate the wing rock and spiral divergence instabilities. The predictions were verified with numerical simulations.

  10. Simulating Effects of High Angle of Attack on Turbofan Engine Performance

    Science.gov (United States)

    Liu, Yuan; Claus, Russell W.; Litt, Jonathan S.; Guo, Ten-Huei

    2013-01-01

    A method of investigating the effects of high angle of attack (AOA) flight on turbofan engine performance is presented. The methodology involves combining a suite of diverse simulation tools. Three-dimensional, steady-state computational fluid dynamics (CFD) software is used to model the change in performance of a commercial aircraft-type inlet and fan geometry due to various levels of AOA. Parallel compressor theory is then applied to assimilate the CFD data with a zero-dimensional, nonlinear, dynamic turbofan engine model. The combined model shows that high AOA operation degrades fan performance and, thus, negatively impacts compressor stability margins and engine thrust. In addition, the engine response to high AOA conditions is shown to be highly dependent upon the type of control system employed.

  11. High angle of attack position sensing for the Southampton University magnetic suspension and balance system

    Science.gov (United States)

    Parker, David H.

    1987-01-01

    An all digital five channel position detection system is to be installed in the Southampton University Magnetic Suspension and Balance System (SUMSBS). The system is intended to monitor a much larger range of model pitch attitudes than has been possible hitherto, up to a maximum of a 90 degree angle of attack. It is based on the use of self-scanning photodiode arrays and illuminating laser light beams, together with purpose built processing electronics. The principles behind the design of the system are discussed, together with the results of testing one channel of the system which was used to control the axial position of a magnetically suspended model in SUMSBS. The removal of optically coupled heave position information from the axial position sensing channel is described.

  12. Bifurcation analysis and stability design for aircraft longitudinal motion with high angle of attack

    Directory of Open Access Journals (Sweden)

    Xin Qi

    2015-02-01

    Full Text Available Bifurcation analysis and stability design for aircraft longitudinal motion are investigated when the nonlinearity in flight dynamics takes place severely at high angle of attack regime. To predict the special nonlinear flight phenomena, bifurcation theory and continuation method are employed to systematically analyze the nonlinear motions. With the refinement of the flight dynamics for F-8 Crusader longitudinal motion, a framework is derived to identify the stationary bifurcation and dynamic bifurcation for high-dimensional system. Case study shows that the F-8 longitudinal motion undergoes saddle node bifurcation, Hopf bifurcation, Zero-Hopf bifurcation and branch point bifurcation under certain conditions. Moreover, the Hopf bifurcation renders series of multiple frequency pitch oscillation phenomena, which deteriorate the flight control stability severely. To relieve the adverse effects of these phenomena, a stabilization control based on gain scheduling and polynomial fitting for F-8 longitudinal motion is presented to enlarge the flight envelope. Simulation results validate the effectiveness of the proposed scheme.

  13. Component build-up method for engineering analysis of missiles at low-to-high angles of attack

    Science.gov (United States)

    Hemsch, Michael J.

    1992-01-01

    Methods are presented for estimating the component build-up terms, with the exception of zero-lift drag, for missile airframes in steady flow and at arbitrary angles of attack and bank. The underlying and unifying bases of all these efforts are slender-body theory and its nonlinear extensions through the equivalent angle-of-attack concept. Emphasis is placed on the forces and moments which act on each of the fins, so that control cross-coupling effects as well as longitudinal and lateral-directional effects can be determined.

  14. Investigation of Load Prediction on the Mexico Rotor Using the Technique of Determination of the Angle of Attack

    DEFF Research Database (Denmark)

    Yang, Hua; Shen, Wen Zhong; Sørensen, Jens Nørkær

    2012-01-01

    Blade element moment (BEM) is a widely used technique for prediction of wind turbine aerodynamics performance, the reliability of airfoil data is an important factor to improve the prediction accuracy of aerodynamic loads and power using a BEM code. The method of determination of angle of attack ...

  15. Identification of variations of angle of attack and lift coefficient for a large horizontal-axis wind turbine

    DEFF Research Database (Denmark)

    Rezaeiha, Abdolrahim; Arjomandi, Maziar; Kotsonis, Marios

    2015-01-01

    and the aggregate effect of elements on variations of mean value and standard deviation of the angle of attack and lift coefficient in order to distinguish the major contributing factors. The results of the current study is of paramount importance in the design of active load control systems for wind turbine....

  16. Determination of 2D equivalent angles of attack for a non-rotating wind turbine rotor blade

    Energy Technology Data Exchange (ETDEWEB)

    Maassen, W.H.

    1993-11-01

    For the investigation into models to compute the title subject use has been made of the Lanchester-Prandtl lifting line model. The inflow conditions are given by a uniform inflow velocity and the geometrical angles of attack at every spanwise position. A model using pressure measurements at the instrumented sections and a model using 2-dimensional C{sub L}-{alpha} data at certain spanwise positions were investigated. In section two the experimental setups of the experiments at ECN (Netherlands Energy Research Foundation) and FFA (the Aeronautical Research Institute of Sweden) are presented. In section three the theoretical background and the different methods to compute the 2D equivalent angles of attack are outlined. In section four the results of the computations of the downwash and the 2D equivalent angles of attack for the considered FFA wind tunnel experiment is presented. Finally, in section five the most important conclusions are summarized and a recommendation for the computation of the 2D equivalent angles of attack for the non-rotating blade experiments at ECN is formulated. 59 figs., 2 tabs., 3 appendices, 30 refs.

  17. Steady Aerodynamic Characteristics of Two-Dimensional NACA0012 Airfoil for One Revolution Angle of Attack

    Science.gov (United States)

    Park, Byung Ho; Han, Yong Oun

    2018-04-01

    Steady variations in aerodynamic forces and flow behaviors of two-dimensional NACA0012 airfoil were investigated using a numerical method for One Revolution Angle of Attack (AOA) at Reynolds number of 105 . The profiles of lift coefficients, drag coefficients, and pressure coefficients were compared with those of the experimental data. The AERODAS model was used to analyze the profiles of lift and drag coefficients. Wake characteristics were given along with the deficit profiles of incoming velocity components. Both the characteristics of normal and reverse airfoil models were compared with the basic aerodynamic data for the same range of AOA. The results show that two peaks of the lift coefficients appeared at 11.5{°} and 42{°} and are in good agreement with the pre-stall and post-stall models, respectively. Counter-rotating vortex flows originated from the leading and trailing edges at a high AOA, which formed an impermeable zone over the suction surface and made reattachments in the wake. Moreover, the acceleration of inflow along the boundary of the vortex wrap appeared in the profile of the wake velocity. The drag profile was found to be independent of the airfoil mode, but the lift profile was quite sensitive to the airfoil mode.

  18. Tonal noise of a controlled-diffusion airfoil at low angle of attack and Reynolds number.

    Science.gov (United States)

    Padois, Thomas; Laffay, Paul; Idier, Alexandre; Moreau, Stéphane

    2016-07-01

    The acoustic signature of a controlled-diffusion airfoil immersed in a flow is experimentally characterized. Acoustic measurements have been carried out in an anechoic open-jet-wind-tunnel for low Reynolds numbers (from 5 × 10(4) to 4.3 × 10(5)) and several angles of attack. As with the NACA0012, the acoustic spectrum is dominated by discrete tones. These tonal behaviors are divided into three different regimes. The first one is characterized by a dominant primary tone which is steady over time, surrounded by secondary peaks. The second consists of two unsteady primary tones associated with secondary peaks and the third consists of a hump dominated by several small peaks. A wavelet study allows one to identify an amplitude modulation of the acoustic signal mainly for the unsteady tonal regime. This amplitude modulation is equal to the frequency interval between two successive tones. Finally, a bispectral analysis explains the presence of tones at higher frequencies.

  19. Investigation on asymmetric flow over a blunt-nose slender body at high angle of attack

    Science.gov (United States)

    Zhongyang, Qi; Yankui, Wang; Lei, Wang; Qian, Li

    2017-12-01

    The asymmetric vortices over a blunt-nose slender body are investigated experimentally and numerically at a high angle of attack (AoA, α = 50°) and a Reynolds number of Re D = 1.54 × 105 on the basis of an incoming free-stream velocity and diameter (D) of the model. A micro-perturbation in the form of a hemispherical protrusion with a radius of r = 0.012D is introduced and attached on the nose of the slender body to control the behavior of the asymmetric vortices. Given the predominant role of micro perturbation in the asymmetric vortex pattern, a square wave, which is singly periodic, is observed for side-force variation by setting the circumferential angle (θ) of the micro perturbation from 0° to 360°. The asymmetric vortex pattern and the corresponding side force are manageable and highly dependent on the location of perturbation. The flow structure over the blunt-nose slender body is clarified by building a physical model of asymmetric vortex flow structure in a regular state at a high AoA (α = 50°). This model is divided into several regions by flow structure development along the model body-axis, i.e., inception region at x/D ≤ 3.0, triple-vortex region at 3.0 ≤ x/D ≤ 6.0, four-vortex region at 6.0 ≤ x/D ≤ 8.5, and five-vortex region at 8.5 ≤ x/D ≤ 12. The model reveals a complicated multi-vortex system. The associated pressure distributions and flow characteristics are discussed in detail.

  20. Technical Evaluation Report, Part A - Vortex Flow and High Angle of Attack

    Science.gov (United States)

    Luckring, James M.

    2003-01-01

    A symposium entitled Vortex Flow and High Angle of Attack was held in Loen, Norway, from May 7 through May 11, 2001. The Applied Vehicle Technology (AVT) panel, under the auspices of the Research and Technology Organization (RTO), sponsored this symposium. Forty-eight papers, organized into nine sessions, addressed computational and experimental studies of vortex flows pertinent to both aircraft and maritime applications. The studies also ranged from fundamental fluids investigations to flight test results, and significant results were contributed from a broad range of countries. The principal emphasis of this symposium was on "the understanding and prediction of separation-induced vortex flows and their effects on military vehicle performance, stability, control, and structural design loads." It was further observed by the program committee that "separation- induced vortex flows are an important part of the design and off-design performance of conventional fighter aircraft and new conventional or unconventional manned or unmanned advanced vehicle designs (UAVs, manned aircraft, missiles, space planes, ground-based vehicles, and ships)." The nine sessions addressed the following topics: vortical flows on wings and bodies, experimental techniques for vortical flows, numerical simulations of vortical flows, vortex stability and breakdown, vortex flows in maritime applications, vortex interactions and control, vortex dynamics, flight testing, and vehicle design. The purpose of this paper is to provide brief reviews of these papers along with some synthesizing perspectives toward future vortex flow research opportunities. The paper includes the symposium program. (15 refs.)

  1. A hybrid system approach to airspeed, angle of attack and sideslip estimation in Unmanned Aerial Vehicles

    KAUST Repository

    Shaqura, Mohammad

    2015-06-01

    Fixed wing Unmanned Aerial Vehicles (UAVs) are an increasingly common sensing platform, owing to their key advantages: speed, endurance and ability to explore remote areas. While these platforms are highly efficient, they cannot easily be equipped with air data sensors commonly found on their larger scale manned counterparts. Indeed, such sensors are bulky, expensive and severely reduce the payload capability of the UAVs. In consequence, UAV controllers (humans or autopilots) have little information on the actual mode of operation of the wing (normal, stalled, spin) which can cause catastrophic losses of control when flying in turbulent weather conditions. In this article, we propose a real-time air parameter estimation scheme that can run on commercial, low power autopilots in real-time. The computational method is based on a hybrid decomposition of the modes of operation of the UAV. A Bayesian approach is considered for estimation, in which the estimated airspeed, angle of attack and sideslip are described statistically. An implementation on a UAV is presented, and the performance and computational efficiency of this method are validated using hardware in the loop (HIL) simulation and experimental flight data and compared with classical Extended Kalman Filter estimation. Our benchmark tests shows that this method is faster than EKF by up to two orders of magnitude. © 2015 IEEE.

  2. Investigation of Strouhal numbers of iced cable models of cable-supported bridges with respect to angle of wind attack

    Czech Academy of Sciences Publication Activity Database

    Górski, P.; Tatara, M.; Pospíšil, Stanislav; Kuznetsov, Sergeii; Marušić, A.

    2015-01-01

    Roč. 112, 2-B (2015), s. 417-432 ISSN 1897-628X R&D Projects: GA MŠk(CZ) LO1219; GA MPO(CZ) FR-TI3/654 Keywords : bridge cable * ice accretion * Strouhal number * angle of attack * vortex shedding frequency Subject RIV: JN - Civil Engineering http://suw.biblos.pk.edu.pl/resources/i5/i6/i6/i8/i4/r56684/GorskiP_InvestigationsStrouhal.pdf

  3. Simulator study of the effectiveness of an automatic control system designed to improve the high-angle-of-attack characteristics of a fighter airplane

    Science.gov (United States)

    Gilbert, W. P.; Nguyen, L. T.; Vangunst, R. W.

    1976-01-01

    A piloted, fixed-base simulation was conducted to study the effectiveness of some automatic control system features designed to improve the stability and control characteristics of fighter airplanes at high angles of attack. These features include an angle-of-attack limiter, a normal-acceleration limiter, an aileron-rudder interconnect, and a stability-axis yaw damper. The study was based on a current lightweight fighter prototype. The aerodynamic data used in the simulation were measured on a 0.15-scale model at low Reynolds number and low subsonic Mach number. The simulation was conducted on the Langley differential maneuvering simulator, and the evaluation involved representative combat maneuvering. Results of the investigation show the fully augmented airplane to be quite stable and maneuverable throughout the operational angle-of-attack range. The angle-of-attack/normal-acceleration limiting feature of the pitch control system is found to be a necessity to avoid angle-of-attack excursions at high angles of attack. The aileron-rudder interconnect system is shown to be very effective in making the airplane departure resistant while the stability-axis yaw damper provided improved high-angle-of-attack roll performance with a minimum of sideslip excursions.

  4. High angle-of-attack aerodynamics of a strake-canard-wing V/STOL fighter configuration

    Science.gov (United States)

    Durston, D. A.; Schreiner, J. A.

    1983-01-01

    High angle-of-attack aerodynamic data are analyzed for a strake-canard-wing V/STOL fighter configuration. The configuration represents a twin-engine supersonic V/STOL fighter aircraft which uses four longitudinal thrust-augmenting ejectors to provide vertical lift. The data were obtained in tests of a 9.39 percent scale model of the configuration in the NASA Ames 12-Foot Pressure Wind Tunnel, at a Mach number of 0.2. Trimmed aerodynamic characteristics, longitudinal control power, longitudinal and lateral/directional stability, and effects of alternate strake and canard configurations are analyzed. The configuration could not be trimmed (power-off) above 12 deg angle of attack because of the limited pitch control power and the high degree of longitudinal instability (28 percent) at this Mach number. Aerodynamic center location was found to be controllable by varying strake size and canard location without significantly affecting lift and drag. These configuration variations had relatively little effect on the lateral/directional stability up to 10 deg angle of attack.

  5. Assessing Uncertainties in Boundary Layer Transition Predictions for HIFiRE-1 at Non-zero Angles of Attack

    Science.gov (United States)

    Marek, Lindsay C.

    2011-01-01

    Boundary layer stability was analyzed for the HIFiRE-1 flight vehicle geometry for ground tests conducted at the CUBRC LENS I hypersonic shock test facility and the Langley Research Center (LaRC) 20- inch Mach 6 Tunnel. Boundary layer stability results were compared to transition onset location obtained from discrete heat transfer measurements from thin film gauges during the CUBRC test and spatially continuous heat transfer measurements from thermal phosphor paint data during the LaRC test. The focus of this analysis was on conditions at non-zero angles of attack as stability analysis has already been performed at zero degrees angle of attack. Also, the transition onset data obtained during flight testing was at nonzero angles of attack, so this analysis could be expanded in the future to include the results of the flight test data. Stability analysis was performed using the 2D parabolized stability software suite STABL (Stability and Transition Analysis for Hypersonic Boundary Layers) developed at the University of Minnesota and the mean flow solutions were computed using the DPLR finite volume Navier-Stokes computational fluid dynamics (CFD) solver. A center line slice of the 3D mean flow solution was used for the stability analysis to incorporate the angle of attack effects while still taking advantage of the 2D STABL software suite. The N-factors at transition onset and the value of Re(sub theta)/M(sub e), commonly used to predict boundary layer transition onset, were compared for all conditions analyzed. Ground test data was analyzed at Mach 7.2 and Mach 6.0 and angles of attack of 1deg, 3deg and 5deg. At these conditions, the flow was found to be second mode dominant for the HIFiRE-1 slender cone geometry. On the leeward side of the vehicle, a strong trend of transition onset location with angle of attack was observed as the boundary layer on the leeward side of the vehicle developed inflection points at streamwise positions on the vehicle that correlated to

  6. Computational Fluid Dynamics Investigation of Vortex Breakdown for a Delta Wing at High Angle of Attack

    National Research Council Canada - National Science Library

    Freeman, Jacob

    2003-01-01

    ... (a) in preparation for investigation of active control of vortex breakdown using steady, along- core blowing A flat delta-shaped half-wing with sharp leading edge and sweep angle of 600 was modeled...

  7. Plasma Control of Separated Flows on Delta Wings at High Angles of Attack

    Science.gov (United States)

    2009-03-18

    of Attack 5a. CONTRACT NUMBER ISTC Registration No: 3646 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Dr. Anatoly Alexandrovich...NUMBER(S) ISTC 06-7002 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution is unlimited. 13. SUPPLEMENTARY...This work is supported financially by EOARD and performed under the agreement with the International Science and Technology Center ( ISTC ), Moscow

  8. Apparatus for Changing the Attack Angle of a Cavitator on a Supercavatating Underwater Research Model

    Science.gov (United States)

    2005-07-18

    the Invention 14 The present invention generally relates to an apparatus 15 for changing the attack of a cavitator on a supercavitating 16 underwater...research model. 17 2. Description of the Prior Art 18 Supercavitating underwater vehicles and projectiles are 19 known in the art. One such... supercavitating underwater 20 projectile is described in Harkins et al., U.S. Patent No. 21 5,955,698. This projectile uses a supercavitating nose 22 section that

  9. Aerodynamic characteristics of wind turbine blade airfoils at high angles-of-attack

    NARCIS (Netherlands)

    Timmer, W.A.

    2010-01-01

    Airfoil characteristics at deep stall angles were investigated. It appeared that the maximum drag coefficient as a function of the airfoil upwind y/c ordinate at x/c=0.0125 can be approximated by a straight line. The lift-drag ratios in deep stall of a number of airfoils with moderate lower surface

  10. Extraction of the wake induction and angle of attack on rotating wind turbine blades from PIV and CFD results

    Directory of Open Access Journals (Sweden)

    I. Herráez

    2018-01-01

    Full Text Available The analysis of wind turbine aerodynamics requires accurate information about the axial and tangential wake induction as well as the local angle of attack along the blades. In this work we present a new method for obtaining them conveniently from the velocity field. We apply the method to the New Mexico particle image velocimetry (PIV data set and to computational fluid dynamics (CFD simulations of the same turbine. This allows the comparison of experimental and numerical results of the mentioned quantities on a rotating wind turbine. The presented results open up new possibilities for the validation of numerical rotor models.

  11. Study on variable pitch strategy in H-type wind turbine considering effect of small angle of attack

    DEFF Research Database (Denmark)

    Zhao, Zhenzhou; Qian, Siyuan; Shen, Wenzhong

    2017-01-01

    Variable-pitch (VP) technology is an effective approach to upgrade the aerodynamics of the blade of an H-type vertical-axis wind turbine (VAWT). At present, most of the research efforts are focused on the performance improvement of the azimuth angle owing to the large angle of attack (Ao...... distribution in the swept area of turbine changes from an arched shape of the FP-VAWT into a rectangular shape of the VP-VAWT. At last, an 18.9% growth in power efficiency is achieved. All of the above results confirm that the new VP-technology can effectively improve VAWT performance and also widens...... the highest performance tip speed ratio zone which makes the turbines capable of running with high efficiency in wider zones....

  12. Model Deformation and Optical Angle of Attack Measurement System in the NASA Ames Unitary Plan Wind Tunnel

    Science.gov (United States)

    Kushner, Laura K.; Drain, Bethany A.; Schairer, Edward T.; Heineck, James T.; Bell, James H.

    2017-01-01

    Both AoA and MDM measurements can be made using an optical system that relies on photogrammetry. Optical measurements are being requested by customers in wind tunnels with increasing frequency due to their non-intrusive nature and recent hardware and software advances that allow measurements to become near real time. The NASA Ames Research Center Unitary Plan Wind Tunnel is currently developing a system based on photogrammetry to measure model deformation and model angle of attack. This paper describes the new system, its development, its use on recent tests and plans to further develop the system.

  13. Nose micro-blowing for asymmetric vortices control on blunt-nose slender body at high angle of attack

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-11-01

    Full Text Available The asymmetric vortices over blunt-nose slender body at high angles of attack result in random side force. In this paper, a nose micro-blowing technology is used to control the asymmetric flow. Pressure measurement and particle image velocimetry (PIV experiments are conducted in a low-speed wind tunnel to research effects of jet flow rate on asymmetric vortices over blunt-nose slender body. The angle of attack of the model is fixed at 50° and the Reynolds number for the experiments is 1.6×10 5 based on diameter of aftbody. A blow hole (5 mm in diameter on the nose is processed at circumferential angle θb= 90° and meridian angle γb= 20° with jet momentum ratio Cμ ranging from 5.30×10-7 to 1.19×10−4. Tests are made under two kinds of perturbations. One is called single perturbation with only blow hole and the other is called combined perturbation consists of blow hole and additional granules set on nose. The results show that whether the model has the single perturbation or the combined one, the sectional side force of x/D = 3 varies in the same direction with the increasement of Cμ and remains stable when Cμ is greater than 3.29×10−6. But the stable force values are different according to various perturbations. The fact proves that the size and direction of the side force of blunt-nose slender body can be controlled by the nose micro-blowing.

  14. Vortex-induced vibrations of a DU96-W-180 airfoil at 90° angle of attack

    DEFF Research Database (Denmark)

    Skrzypinski, Witold Robert; Gaunaa, Mac; Sørensen, Niels N.

    2014-01-01

    This work presents an analysis of vortex-induced vibrations of a DU96-W-180 airfoil in deep stall at a 90 degrees angle of attack, based on 2D and 3D Reynolds Averaged Navier Stokes and 3D Detached Eddy Simulation unsteady Computational Fluid Dynamics computations with non-moving, prescribed motion...... and elastically mounted airfoil suspensions. Stationary vortex-shedding frequencies computed in 2D and 3D Computational Fluid Dynamics differed. In the prescribed motion computations, the airfoil oscillated in the direction of the chord line. Negative aerodynamic damping, found in both 2D and 3D Computational...... Fluid Dynamics computations with moving airfoil, showed in the vicinity of the stationary vortex-shedding frequency computed by 2D Computational Fluid Dynamics. A shorter time series was sufficient to verify the sign of the aerodynamic damping in the case of the elastic computations than the prescribed...

  15. Experimental investigation of the effect of a passive porous coating on a hypersonic boundary layer stability on a sharp cone at an angle of attack

    Science.gov (United States)

    Lukashevich, S. V.; Morozov, S. O.; Shiplyuk, A. N.

    2018-03-01

    Experimental investigations are performed to determine the effect of the passive porous coating on the stability of the hypersonic boundary layer on the cone at small angles of attack. Measurements of the pressure disturbances on the cone surface showed that, the increase of the angle of attack leads to decrease of the second-mode amplitude, when the smooth cone side is the windward side. On the leeward side the amplitude of the disturbances increase with the angle of attack until the boundary layer is laminar. It was found that the ultrasonically absorptive coating leads to the energy decrease of the second-mode disturbances on both leeward and windward side of the sharp cone.

  16. Vortex flow structures and interactions for the optimum thrust efficiency of a heaving airfoil at different mean angles of attack

    Energy Technology Data Exchange (ETDEWEB)

    Martín-Alcántara, A.; Fernandez-Feria, R. [Universidad de Málaga, Andalucía Tech, E. T. S. Ingeniería Industrial, Dr Ortiz Ramos s/n, 29071 Málaga (Spain); Sanmiguel-Rojas, E. [Área de Mecánica de Fluidos, Universidad de Jaén, Campus de las Lagunillas, 23071 Jaén (Spain)

    2015-07-15

    The thrust efficiency of a two-dimensional heaving airfoil is studied computationally for a low Reynolds number using a vortex force decomposition. The auxiliary potentials that separate the total vortex force into lift and drag (or thrust) are obtained analytically by using an elliptic airfoil. With these auxiliary potentials, the added-mass components of the lift and drag (or thrust) coefficients are also obtained analytically for any heaving motion of the airfoil and for any value of the mean angle of attack α. The contributions of the leading- and trailing-edge vortices to the thrust during their down- and up-stroke evolutions are computed quantitatively with this formulation for different dimensionless frequencies and heave amplitudes (St{sub c} and St{sub a}) and for several values of α. Very different types of flows, periodic, quasi-periodic, and chaotic described as St{sub c}, St{sub a}, and α, are varied. The optimum values of these parameters for maximum thrust efficiency are obtained and explained in terms of the interactions between the vortices and the forces exerted by them on the airfoil. As in previous numerical and experimental studies on flapping flight at low Reynolds numbers, the optimum thrust efficiency is reached for intermediate frequencies (St{sub c} slightly smaller than one) and a heave amplitude corresponding to an advance ratio close to unity. The optimal mean angle of attack found is zero. The corresponding flow is periodic, but it becomes chaotic and with smaller average thrust efficiency as |α| becomes slightly different from zero.

  17. AERODYNAMIC CHARACTERISTICS OF “FAN-IN-FIN” SYSTEM IN CONDITION OF FLOWING UNDER ZERO ATTACK ANGLE

    Directory of Open Access Journals (Sweden)

    2016-01-01

    Full Text Available Fan-in-fin system can be used as single-rotor helicopter fenestrons propulsion system of low-speed airplanes and dirigibles as well as vehicles with remote control.The article suggests way to continue the author’s research in the field of fan-in-fin system aerodynamics.It also offers a method of aerodynamic characteristics of “fan-in-fin” (fenestron system with cylindrical diffuser of limited length in flow regime under zero angle of attack calculation. The article gives some formula to calculate the flow velocity through the disk area which decrease with the increase of the defusser and air speed.Correlation between fan thrust power and ring thrust on these regimes and momentum drag are found. Momentum drag is high enough, this fact leads to back deviation of total aerodynamic force system. This angle increases with increase of the diffuser length and at medium speed it can reach 30°.Certainty of suggested algorithms is proved by comparison with experiments for helicopter fenestron and un- manned air vehicle by tests in wind tunnel of MAI.

  18. A New Acute Attack of Angle Closure Glaucoma Animal Model with Healon 5

    Directory of Open Access Journals (Sweden)

    Silvania Y. F. Lau

    2011-05-01

    Full Text Available Acute angle closure glaucoma (AACG is an ocular emergency and sight -threatening disease in which the intraocular ocular pressure (IOP rises suddenly due to blockage of aqueous humor outflow. It can cause permanent loss in visual acuity and visual field. In animal study, the well-established model to study AACG is by fluid infusion and by adjusting the bottle level, a high IOP can be induced in a few seconds. However, there is no blockage of aqueous outflow and the pressure rise is unrealistically fast. To mimic human AACG, we suggest to use Healon 5, an ophthalmic viscosurgical device, which is injected intracamerally to block the aqueous outflow. The IOP is allowed to build up naturally. We found that, with this technique, the IOP elevated at a rate of 0.57 mmHg/min before it hit 40 mmHg, which is considered as AACG in human. The maximum IOP registered was above 70 mmHg. Thinning of retinal nerve fiber layer (RNFL and neural cells lost were seen. Visual function evaluated by ERG showed reduction in a-wave, b-wave, photopic negative response (PhNR and oscillatory potentials (OPs activities. In conclusion, Healon 5 is effective in inducing acute transient rise in IOP which mimics human AACG.

  19. Numerical Simulation of Heat Transfer and Chemistry in the Wake behind a Hypersonic Slender Body at Angle of Attack

    Directory of Open Access Journals (Sweden)

    Matthew J. Satchell

    2018-03-01

    Full Text Available The effect of thermal and chemical boundary conditions on the structure and chemical composition of the wake behind a 3D Mach 7 sphere-cone at an angle of attack of 5 degrees and an altitude of roughly 30,000 m is explored. A special emphasis is placed on determining the number density of chemical species which might lead to detection via the electromagnetic spectrum. The use of non-ablating cold-wall, adiabatic, and radiative equilibrium wall boundary conditions are used to simulate extremes in potential thermal protection system designs. Non-ablating, as well as an ablating boundary condition using the “steady-state ablation” assumption to compute a surface energy balance on the wall are used in order to determine the impacts of ablation on wake composition. On-body thermal boundary conditions downstream of an ablating nose are found to significantly affect wake temperature and composition, while the role of catalysis is found to change the composition only marginally except at very high temperatures on the cone’s surface for the flow regime considered. Ablation is found to drive the extensive production of detectable species otherwise unrelated to ablation, whereas if ablation is not present at all, air-species which would otherwise produce detectable spectra are minimal. Studies of afterbody cooling techniques, as well as shape, are recommended for further analysis.

  20. PIV-based estimation of unsteady loads on a flat plate at high angle of attack using momentum equation approaches

    Science.gov (United States)

    Guissart, A.; Bernal, L. P.; Dimitriadis, G.; Terrapon, V. E.

    2017-05-01

    This work presents, compares and discusses results obtained with two indirect methods for the calculation of aerodynamic forces and pitching moment from 2D Particle Image Velocimetry (PIV) measurements. Both methodologies are based on the formulations of the momentum balance: the integral Navier-Stokes equations and the "flux equation" proposed by Noca et al. (J Fluids Struct 13(5):551-578, 1999), which has been extended to the computation of moments. The indirect methods are applied to spatio-temporal data for different separated flows around a plate with a 16:1 chord-to-thickness ratio. Experimental data are obtained in a water channel for both a plate undergoing a large amplitude imposed pitching motion and a static plate at high angle of attack. In addition to PIV data, direct measurements of aerodynamic loads are carried out to assess the quality of the indirect calculations. It is found that indirect methods are able to compute the mean and the temporal evolution of the loads for two-dimensional flows with a reasonable accuracy. Nonetheless, both methodologies are noise sensitive, and the parameters impacting the computation should thus be chosen carefully. It is also shown that results can be improved through the use of dynamic mode decomposition (DMD) as a pre-processing step.

  1. Extraction of Lateral-Directional Stability and Control Derivatives for the Basic F-18 Aircraft at High Angles of Attack

    Science.gov (United States)

    Iliff, Kenneth W.; Wang, Kon-Sheng Charles

    1997-01-01

    The results of parameter identification to determine the lateral-directional stability and control derivatives of an F-18 research aircraft in its basic hardware and software configuration are presented. The derivatives are estimated from dynamic flight data using a specialized identification program developed at NASA Dryden Flight Research Center. The formulation uses the linearized aircraft equations of motions in their continuous/discrete form and a maximum likelihood estimator that accounts for both state and measurement noise. State noise is used to model the uncommanded forcing function caused by unsteady aerodynamics, such as separated and vortical flows, over the aircraft. The derivatives are plotted as functions of angle of attack between 3 deg and 47 deg and compared with wind-tunnel predictions. The quality of the derivative estimates obtained by parameter identification is somewhat degraded because the maneuvers were flown with the aircraft's control augmentation system engaged, which introduced relatively high correlations between the control variables and response variables as a result of control motions from the feedback control system.

  2. Prediction of Aerodynamic Characteristics of Fighter Wings at High Angles of Attack.

    Science.gov (United States)

    1984-03-01

    potential distribution throughout the network of four points on a body surface great- ly facilitates the flow analysis procedure. Tangential velocity...expensive of computer time. For example, as quoted by McLean, using this coarsest grid network , each 0 surface of the 727-200 wing required 10 minutes of...1980. 19. Le Balleur, J.C. and Neron , M., "Calcul D’Ecoulements3 Visqueux Decolles sur Profils D’Ailes par une Approche de Couplage", AGARn CP-291

  3. Analysis of turbulent separated flows for the NREL airfoil using anisotropic two-equation models at higher angles of attack

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Shijie [Tsinghua University, Beijing (China). School of Architecture; Yuan Xin; Ye Dajun [Tsinghua University, Beijing (China). Dept. of Thermal Engineering

    2001-07-01

    Numerical simulations of the turbulent flow fields at stall conditions are presented for the NREL (National Renewable Energy Laboratory) S809 airfoil. The flow is modelled as compressible, viscous, steady/unsteady and turbulent. Four two-equation turbulence models (isotropic {kappa}-{epsilon} and q-{omega} models, anisotropic {kappa}-{epsilon} and -{omega} models), are applied to close the Reynolds-averaged Navier-Stokes equations, respectively. The governing equations are integrated in time by a new LU-type implicit scheme. To accurately model the convection terms in the mean-flow and turbulence model equations, a modified fourth-order high resolution MUSCL TVD scheme is incorporated. The large-scale separated flow fields and their losses at the stall and post-stall conditions are analyzed for the NREL S809 airfoil at various angles of attack ({alpha}) from 0 to 70 degrees. The numerical results show excellent to fairly good agreement with the experimental data. The feasibility of the present numerical method and the influence of the four turbulence models are also investigated. (author)

  4. Validation of aerodynamic parameters at high angles of attack for RAE high incidence research models

    Science.gov (United States)

    Ross, A. Jean; Edwards, Geraldine F.; Klein, Vladislav; Batterson, James G.

    1987-01-01

    Two series of free-flight tests have been conducted for combat aircraft configuration research models in order to investigate flight behavior near departure conditions as well as to obtain response data from which aerodynamic characteristics can be derived. The structure of the mathematical model and values for the mathematical derivatives have been obtained through an analysis of the first series, using stepwise regression. The results thus obtained are the bases of the design of active control laws. Flight test results for a novel configuration are compared with predicted responses.

  5. Measurements of Crossflow Instability Modes for HIFiRE 5 at Angle of Attack

    Science.gov (United States)

    2017-11-15

    First, the new model accommodated IR heating measurements. The IR method alleviates roughness and steps induced by temperature-sensitive paint, and it...dominated by the strongly inflected boundary layer in this region. This inflection is due to the convergence of flow from the higher-pressure sides of

  6. Parametric approximation of airfoil aerodynamic coefficients at high angles of attack

    DEFF Research Database (Denmark)

    Skrzypinski, Witold Robert; Zahle, Frederik; Bak, Christian

    2014-01-01

    , and the third method, also utilizing trigonometric functions, was developed with the scope on stall-regulated turbines. The method of the even sine and cosine functions was further developed in the present work by using two independent harmonic approximations in the positive and negative α regions...

  7. Evaluation of a flow direction probe and a pitot-static probe on the F-14 airplane at high angles of attack and sideslip

    Science.gov (United States)

    Larson, T. J.

    1984-01-01

    The measurement performance of a hemispherical flow-angularity probe and a fuselage-mounted pitot-static probe was evaluated at high flow angles as part of a test program on an F-14 airplane. These evaluations were performed using a calibrated pitot-static noseboom equipped with vanes for reference flow direction measurements, and another probe incorporating vanes but mounted on a pod under the fuselage nose. Data are presented for angles of attack up to 63, angles of sideslip from -22 deg to 22 deg, and for Mach numbers from approximately 0.3 to 1.3. During maneuvering flight, the hemispherical flow-angularity probe exhibited flow angle errors that exceeded 2 deg. Pressure measurements with the pitot-static probe resulted in very inaccurate data above a Mach number of 0.87 and exhibited large sensitivities with flow angle.

  8. Drag prediction for blades at high angle of attack using CFD

    DEFF Research Database (Denmark)

    Sørensen, Niels N.; Michelsen, J.A.

    2004-01-01

    In the present paper it is first demonstrated that state of the art 3D CFD codes are. capable of predicting the correct dependency of the integrated drag of a flat plate placed perpendicular to the flow. This is in strong contrast to previous 2D investigations of infinite plates, where computations...... are known to severely overpredict drag. We then demonstrate that the computed drag distribution along the plate span deviate from the general expectation of 2D behavior at the central part of the plate, an important finding in connection with the theoretical estimation of drag behavior on wind turbine...... blades. The computations additionally indicate that a tip effect is present that produces increased drag near the end of the plate, which is opposite of the assumptions generally used in drag estimation for blades. Following this several wind turbine blades are analyzed, ranging from older blades...

  9. Wing-Alone Aerodynamic Characteristics to High Angles of Attack at Subsonic and Transonic Speeds.

    Science.gov (United States)

    1982-11-01

    support subsystems, the test- ing of these models consumes a disproportionate amount of model construction effort and wind-tunnel testing time compared...constant taper ratio with the exception of the aspect ratio 4, taper ratio 0.5 wing at subsonic speeds; the anomalous behavior of this wing is likely...0000000 ...... 0 0 0i 010... 0.. .......... .. .............. tt.. 4t t * PS4 Oft* .. MM.~0o004.0 s.t~o.4

  10. BiGlobal linear stability analysis on low-Re flow past an airfoil at high angle of attack

    KAUST Repository

    Zhang, Wei

    2016-04-04

    We perform BiGlobal linear stability analysis on flow past a NACA0012 airfoil at 16° angle of attack and Reynolds number ranging from 400 to 1000. The steady-state two-dimensional base flows are computed using a well-tested finite difference code in combination with the selective frequency damping method. The base flow is characterized by two asymmetric recirculation bubbles downstream of the airfoil whose streamwise extent and the maximum reverse flow velocity increase with the Reynolds number. The stability analysis of the flow past the airfoil is carried out under very small spanwise wavenumber β = 10−4 to approximate the two-dimensional perturbation, and medium and large spanwise wavenumbers (β = 1–8) to account for the three-dimensional perturbation. Numerical results reveal that under small spanwise wavenumber, there are at most two oscillatory unstable modes corresponding to the near wake and far wake instabilities; the growth rate and frequency of the perturbation agree well with the two-dimensional direct numerical simulation results under all Reynolds numbers. For a larger spanwise wavenumber β = 1, there is only one oscillatory unstable mode associated with the wake instability at Re = 400 and 600, while at Re = 800 and 1000 there are two oscillatory unstable modes for the near wake and far wake instabilities, and one stationary unstable mode for the monotonically growing perturbation within the recirculation bubble via the centrifugal instability mechanism. All the unstable modes are weakened or even suppressed as the spanwise wavenumber further increases, among which the stationary mode persists until β = 4.

  11. BiGlobal linear stability analysis on low-Re flow past an airfoil at high angle of attack

    KAUST Repository

    Zhang, Wei; Samtaney, Ravi

    2016-01-01

    We perform BiGlobal linear stability analysis on flow past a NACA0012 airfoil at 16° angle of attack and Reynolds number ranging from 400 to 1000. The steady-state two-dimensional base flows are computed using a well-tested finite difference code in combination with the selective frequency damping method. The base flow is characterized by two asymmetric recirculation bubbles downstream of the airfoil whose streamwise extent and the maximum reverse flow velocity increase with the Reynolds number. The stability analysis of the flow past the airfoil is carried out under very small spanwise wavenumber β = 10−4 to approximate the two-dimensional perturbation, and medium and large spanwise wavenumbers (β = 1–8) to account for the three-dimensional perturbation. Numerical results reveal that under small spanwise wavenumber, there are at most two oscillatory unstable modes corresponding to the near wake and far wake instabilities; the growth rate and frequency of the perturbation agree well with the two-dimensional direct numerical simulation results under all Reynolds numbers. For a larger spanwise wavenumber β = 1, there is only one oscillatory unstable mode associated with the wake instability at Re = 400 and 600, while at Re = 800 and 1000 there are two oscillatory unstable modes for the near wake and far wake instabilities, and one stationary unstable mode for the monotonically growing perturbation within the recirculation bubble via the centrifugal instability mechanism. All the unstable modes are weakened or even suppressed as the spanwise wavenumber further increases, among which the stationary mode persists until β = 4.

  12. Experimental investigation of effect of flow attack angle on thermohydraulic performance of air flow in a rectangular channel with discrete V-pattern baffle on the heated plate

    Directory of Open Access Journals (Sweden)

    Raj Kumar

    2016-05-01

    Full Text Available In this work, the effect of angle of attack ( α a of the discrete V-pattern baffle on thermohydraulic performance of rectangular channel has been studied experimentally. The baffle wall was constantly heated and the other three walls of the channel were kept insulated. The experimentations were conducted to collect the data on Nusselt number ( N u b and friction factor ( f b by varying the Reynolds number (Re = 3000–21,000 and angle of attack ( α a from 30° to 70°, for the kept values of relative baffle height ( H b / H = 0 . 50 , relative pitch ratio ( P b / H = 1 . 0 , relative discrete width ( g w / H b = 1 . 5 and relative discrete distance ( D d / L v = 0 . 67 . As compared to the smooth wall, the V-pattern baffle roughened channel enhances the Nusselt number ( N u b and friction factor ( f b by 4.2 and 5.9 times, respectively. The present discrete V-pattern baffle shapes with angle of attack ( α a of 60° equivalent to flow Reynolds number of 3000 yields the greatest thermohydraulic performance. Discrete V-pattern baffle has improved thermal performance as compared to other baffle shapes’ rectangular channel.

  13. Rotary balance data for a single-engine trainer design for an angle-of-attack range of 8 deg to 90 deg. [conducted in langely spin tunnel

    Science.gov (United States)

    Pantason, P.; Dickens, W.

    1979-01-01

    Aerodynamic characteristics obtained in a rotational flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/6 scale, single engine trainer airplane model. The configurations tested included the basic airplane, various wing leading edge devices, elevator, aileron and rudder control settings as well as airplane components. Data are presented without analysis for an angle of attack range of 8 to 90 degrees and clockwise and counter-clockwise rotations.

  14. Methods for root effects, tip effects and extending the angle of attack range to {+-} 180 deg., with application to aerodynamics for blades on wind turbines and propellers

    Energy Technology Data Exchange (ETDEWEB)

    Montgomerie, Bjoern

    2004-06-01

    For wind turbine and propeller performance calculations aerodynamic data, valid for several radial stations along the blade, are used. For wind turbines the data must be valid for the 360 degree angle of attack range. The reason is that all kinds of abnormal conditions must be analysed especially during the design of the turbine. Frequently aerodynamic data are available from wind tunnel tests where the angle of attack range is from say -5 to +20 degrees. This report describes a method to extend such data to be valid for {+-} 180 degrees. Previously the extension of data has been very approximate following the whim of the moment with the analyst. Furthermore, the Himmelskamp effect at the root and tip effects are treated in the complete method.

  15. Flight-Determined Subsonic Longitudinal Stability and Control Derivatives of the F-18 High Angle of Attack Research Vehicle (HARV) with Thrust Vectoring

    Science.gov (United States)

    Iliff, Kenneth W.; Wang, Kon-Sheng Charles

    1997-01-01

    The subsonic longitudinal stability and control derivatives of the F-18 High Angle of Attack Research Vehicle (HARV) are extracted from dynamic flight data using a maximum likelihood parameter identification technique. The technique uses the linearized aircraft equations of motion in their continuous/discrete form and accounts for state and measurement noise as well as thrust-vectoring effects. State noise is used to model the uncommanded forcing function caused by unsteady aerodynamics over the aircraft, particularly at high angles of attack. Thrust vectoring was implemented using electrohydraulically-actuated nozzle postexit vanes and a specialized research flight control system. During maneuvers, a control system feature provided independent aerodynamic control surface inputs and independent thrust-vectoring vane inputs, thereby eliminating correlations between the aircraft states and controls. Substantial variations in control excitation and dynamic response were exhibited for maneuvers conducted at different angles of attack. Opposing vane interactions caused most thrust-vectoring inputs to experience some exhaust plume interference and thus reduced effectiveness. The estimated stability and control derivatives are plotted, and a discussion relates them to predicted values and maneuver quality.

  16. Flight and wind-tunnel calibrations of a flush airdata sensor at high angles of attack and sideslip and at supersonic Mach numbers

    Science.gov (United States)

    Moes, Timothy R.; Whitmore, Stephen A.; Jordan, Frank L., Jr.

    1993-01-01

    A nonintrusive airdata-sensing system was calibrated in flight and wind-tunnel experiments to an angle of attack of 70 deg and to angles of sideslip of +/- 15 deg. Flight-calibration data have also been obtained to Mach 1.2. The sensor, known as the flush airdata sensor, was installed on the nosecap of an F-18 aircraft for flight tests and on a full-scale F-18 forebody for wind-tunnel tests. Flight tests occurred at the NASA Dryden Flight Research Facility, Edwards, California, using the F-18 High Alpha Research Vehicle. Wind-tunnel tests were conducted in the 30- by 60-ft wind tunnel at the NASA LaRC, Hampton, Virginia. The sensor consisted of 23 flush-mounted pressure ports arranged in concentric circles and located within 1.75 in. of the tip of the nosecap. An overdetermined mathematical model was used to relate the pressure measurements to the local airdata quantities. The mathematical model was based on potential flow over a sphere and was empirically adjusted based on flight and wind-tunnel data. For quasi-steady maneuvering, the mathematical model worked well throughout the subsonic, transonic, and low supersonic flight regimes. The model also worked well throughout the angle-of-attack and sideslip regions studied.

  17. Large-eddy simulation of flow separation on an airfoil at a high angle of attack and re=10{sup 5} using Cartesian grids

    Energy Technology Data Exchange (ETDEWEB)

    Eisenbach, Sven; Friedrich, Rainer [Fachgebiet Stroemungsmechanik, Technische Universitaet Muenchen, Garching (Germany)

    2008-05-15

    Incompressible flow separating from the upper surface of an airfoil at an 18 angle of attack and a Reynolds number of Re=10{sup 5}, based on the freestream velocity and chord length c, is studied by the means of large-eddy simulation (LES). The numerical method is based on second-order central spatial discretization on a Cartesian grid using an immersed boundary technique. The results are compared with an LES using body-fitted nonorthogonal grids and with experimental data. (orig.)

  18. Flowfield computations over the Space Shuttle Orbiter with a proposed canard at a Mach number of 5.8 and 50 degrees angle of attack

    Science.gov (United States)

    Reuter, William H.; Buning, Pieter G.; Hobson, Garth V.

    1993-01-01

    An effective control canard design to provide enhanced controllability throughout the flight regime is described which uses a 3D, Navier-Stokes computational solution. The use of canard by the Space Shuttle Orbiter in both hypersonic and subsonic flight regimes can enhance its usefullness by expanding its payload carrying capability and improving its static stability. The canard produces an additional nose-up pitching moment to relax center-of-gravity constraint and alleviates the need for large, lift-destroying elevon deflections required to maintain the high angles of attack for effective hypersonic flight.

  19. Rotary balance data for a single-engine agricultural airplane configuration for an angle-of-attack range of 8 deg to 90 deg

    Science.gov (United States)

    Mulcay, W. J.; Chu, J.

    1980-01-01

    Aerodynamic characteristics obtained in a helical flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/10 scale single engine agricultural airplane model. The configurations tested include the basic airplane, various wing leading edge and wing tip devices, elevator, aileron, and rudder control settings, and other modifications. Data are presented without analysis for an angle of attack range of 8 deg to 90 deg, and clockwise and counter-clockwise rotations covering a spin coefficient range from 0 to .9.

  20. Evaluation of different methods for determining the angle of attack on wind turbine blades with CFD results under axial inflow conditions

    DEFF Research Database (Denmark)

    Rahimi, Vajiheh; Schepers, J.G.; Shen, Wen Zhong

    2018-01-01

    as shortcomings, are presented. The investigations are performed for two 10 MW reference wind turbines under axial inflow conditions, namely the turbines designed in the EU AVATAR and INNWIND.EU projects. The results show that the evaluated methods are in good agreement with each other at the mid-span, though......This work presents an investigation on different methods for the calculation of the angle of attack and the underlying induced velocity on wind turbine blades using data obtained from three-dimensional Computational Fluid Dynamics (CFD). Several methods are examined and their advantages, as well...

  1. Controlling the Flow past a Semicircular Airfoil at Zero Angle of Attack Using Slot Suction in One or Two Vortex Cells for Attaining Extremal Lift

    Science.gov (United States)

    Isaev, S. A.; Baranov, P. A.; Sudakov, A. G.; Popov, I. A.; Usachov, A. E.

    2017-12-01

    Calculations using multiblock computational technologies and a model of shear-stress transport modified with allowance for the curvature of streamlines in turbulent airflow were performed at a zero angle of attack for a semicircular airfoil containing one or two surface vortex cells with slot suction. The results showed evidence of stabilization of a nearly undetached flow and attainment of an extremal lift of C y = 5.2 and a lift-to-drag ratio of K = 24 with allowance for energy losses for suction in the vortex cells.

  2. Effect of the angle of attack of a rectangular wing on the heat transfer enhancement in channel flow at low Reynolds number

    Science.gov (United States)

    Khanjian, Assadour; Habchi, Charbel; Russeil, Serge; Bougeard, Daniel; Lemenand, Thierry

    2018-05-01

    Convective heat transfer enhancement can be achieved by generating secondary flow structures that are added to the main flow to intensify the fluid exchange between hot and cold regions. One method involves the use of vortex generators to produce streamwise and transverse vortices superimposed to the main flow. This study presents numerical computation results of laminar convection heat transfer in a rectangular channel whose bottom wall is equipped with one row of rectangular wing vortex generators. The governing equations are solved using finite volume method by considering steady state, laminar regime and incompressible flow. Three-dimensional numerical simulations are performed to study the effect of the angle of attack α of the wing on heat transfer and pressure drop. Different values are taken into consideration within the range 0° heat transfer enhancement, Nusselt number and the friction factor are studied on both local and global perspectives. Also, the location of the generated vortices within the channel is studied, as well as their effect on the heat transfer enhancement throughout the channel for all α values . Based on both local and global analysis, our results show that the angle of attack α has a direct impact on the heat transfer enhancement. By increasing its value, it leads to better enhancement until an optimal value is reached, beyond which the thermal performances decrease.

  3. Experimental investigation into wing span and angle-of-attack effects on sub-scale race car wing/wheel interaction aerodynamics

    Energy Technology Data Exchange (ETDEWEB)

    Diasinos, S. [Toyota F1, Koeln (Germany); Gatto, A. [Brunel University, Department of Mechanical Engineering, School of Engineering and Design, Uxbridge (United Kingdom)

    2008-09-15

    This paper details a quantitative 3D investigation using LDA into the interaction aerodynamics on a sub-scale open wheel race car inverted front wing and wheel. Of primary importance to this study was the influence of changing wing angle of attack and span on the resulting near-field and far-field flow characteristics. Results obtained showed that both variables do have a significant influence on the resultant flow-field, particularly on wing vortex and wheel wake development and propagation. (orig.)

  4. Experimental investigation into wing span and angle-of-attack effects on sub-scale race car wing/wheel interaction aerodynamics

    Science.gov (United States)

    Diasinos, S.; Gatto, A.

    2008-09-01

    This paper details a quantitative 3D investigation using LDA into the interaction aerodynamics on a sub-scale open wheel race car inverted front wing and wheel. Of primary importance to this study was the influence of changing wing angle of attack and span on the resulting near-field and far-field flow characteristics. Results obtained showed that both variables do have a significant influence on the resultant flow-field, particularly on wing vortex and wheel wake development and propagation.

  5. The effects of pressure sensor acoustics on airdata derived from a High-angle-of-attack Flush Airdata Sensing (HI-FADS) system

    Science.gov (United States)

    Whitmore, Stephen A.; Moes, Timothy R.

    1991-01-01

    The accuracy of a nonintrusive high angle-of-attack flush airdata sensing (HI-FADS) system was verified for quasi-steady flight conditions up to 55 deg angle of attack during the F-18 High Alpha Research Vehicle (HARV) Program. The system is a matrix of nine pressure ports arranged in annular rings on the aircraft nose. The complete airdata set is estimated using nonlinear regression. Satisfactory frequency response was verified to the system Nyquist frequency (12.5 Hz). The effects of acoustical distortions within the individual pressure sensors of the nonintrusive pressure matrix on overall system performance are addressed. To quantify these effects, a frequency-response model describing the dynamics of acoustical distortion is developed and simple design criteria are derived. The model adjusts measured HI-FADS pressure data for the acoustical distortion and quantifies the effects of internal sensor geometries on system performance. Analysis results indicate that sensor frequency response characteristics very greatly with altitude, thus it is difficult to select satisfactory sensor geometry for all altitudes. The solution used presample filtering to eliminate resonance effects, and short pneumatic tubing sections to reduce lag effects. Without presample signal conditioning the system designer must use the pneumatic transmission line to attenuate the resonances and accept the resulting altitude variability.

  6. A modification to linearized theory for prediction of pressure loadings on lifting surfaces at high supersonic Mach numbers and large angles of attack

    Science.gov (United States)

    Carlson, H. W.

    1979-01-01

    A new linearized-theory pressure-coefficient formulation was studied. The new formulation is intended to provide more accurate estimates of detailed pressure loadings for improved stability analysis and for analysis of critical structural design conditions. The approach is based on the use of oblique-shock and Prandtl-Meyer expansion relationships for accurate representation of the variation of pressures with surface slopes in two-dimensional flow and linearized-theory perturbation velocities for evaluation of local three-dimensional aerodynamic interference effects. The applicability and limitations of the modification to linearized theory are illustrated through comparisons with experimental pressure distributions for delta wings covering a Mach number range from 1.45 to 4.60 and angles of attack from 0 to 25 degrees.

  7. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 20 to 90 deg. 3: Influence of control deflection on predicted model D spin modes

    Science.gov (United States)

    Ralston, J. N.; Barnhart, B. P.

    1984-01-01

    The influence of control deflections on the rotational flow aerodynamics and on predicted spin modes is discussed for a 1/6-scale general aviation airplane model. The model was tested for various control settings at both zero and ten degree sideslip angles. Data were measured, using a rotary balance, over an angle-of-attack range of 30 deg to 90 deg, and for clockwise and counter-clockwise rotations covering an omegab/2V range of 0 to 0.5.

  8. Simulation model of the F/A-18 high angle-of-attack research vehicle utilized for the design of advanced control laws

    Science.gov (United States)

    Strickland, Mark E.; Bundick, W. Thomas; Messina, Michael D.; Hoffler, Keith D.; Carzoo, Susan W.; Yeager, Jessie C.; Beissner, Fred L., Jr.

    1996-01-01

    The 'f18harv' six degree-of-freedom nonlinear batch simulation used to support research in advanced control laws and flight dynamics issues as part of NASA's High Alpha Technology Program is described in this report. This simulation models an F/A-18 airplane modified to incorporate a multi-axis thrust-vectoring system for augmented pitch and yaw control power and actuated forebody strakes for enhanced aerodynamic yaw control power. The modified configuration is known as the High Alpha Research Vehicle (HARV). The 'f18harv' simulation was an outgrowth of the 'f18bas' simulation which modeled the basic F/A-18 with a preliminary version of a thrust-vectoring system designed for the HARV. The preliminary version consisted of two thrust-vectoring vanes per engine nozzle compared with the three vanes per engine actually employed on the F/A-18 HARV. The modeled flight envelope is extensive in that the aerodynamic database covers an angle-of-attack range of -10 degrees to +90 degrees, sideslip range of -20 degrees to +20 degrees, a Mach Number range between 0.0 and 2.0, and an altitude range between 0 and 60,000 feet.

  9. Fluctuations of angle of attack and lift coefficient and the resultant fatigue loads for a large horizontal axis wind turbine

    NARCIS (Netherlands)

    Rezaeiha, A.; Pereira, R.; Kotsonis, M.

    2017-01-01

    Unsteady loads are a major limiting factor for further upscaling of HAWTs considering the high costs associated to strict structural requirements. Alleviation of these unsteady loads on HAWT blades, e.g. using active flow control (AFC), is of high importance. In order to devise effective AFC

  10. Aerodynamic Characteristics of NACA 0012 Airfoil Section at Angles of Attack From 0 deg to 180 deg

    National Research Council Canada - National Science Library

    Critzos, Chris

    1955-01-01

    .... Data were obtained at a Reynolds number of 1.8 x 10(exp 6) with the airfoil surfaces smooth and with roughness applied at the leading and trailing edges and at a Reynolds number of 0.5 x 10(exp 6...

  11. Static and Dynamic Flow Visualization Studies of Two Double-Delta Wing Models at High Angles of Attack

    Science.gov (United States)

    1992-03-01

    body, ft U.= free-stream velocity, ft/sec In the case of a wing pitching about its mid-chord location, it can be interpreted as the ratio of the...Over Moderately Swept Delta Wings," HTP -5 Workshop On Vortical Flow Breakdown and Structural Interactions, NASA Langley Research Center, August 15-16...January 6- 9,1992/Reno,Nevada. 18. User’s Manual , Flow Visualization Water Tunnel Operation for Model 1520, Eidelic International, Inc., Torrance

  12. Investigation of normal force and moment coefficients for an AUV at nonlinear angle of attack and sideslip range

    Digital Repository Service at National Institute of Oceanography (India)

    Barros, E.A. de; Dantas, J.L.D.; Pascoal, A.M.; Desa, E.S.

    -dimensional axi-symmetric body,” in Proc. 6th ISOPE Conf., Los Angeles, CA, 1996, vol. II, pp. 256–264. [8] D. Humphreys, “Correlation and validation of a CFD based hydrody- namic & dynamic model for a towed underwater vehicle,” in Proc. MTS/IEEE OCEANS Conf...

  13. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 degrees to 35 degrees, 3. Effect of wing leading-edge modifications, model A

    Science.gov (United States)

    Bihrle, W., Jr.; Mulcay, W.

    1979-01-01

    Aerodynamic characteristics obtained in a rotational flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/5 scale, single-engine, low-wing, general aviation airplane model. The configurations tested included the basic airplane, sixteen wing leading-edge modifications and lateral-directional control settings. Data are presented for all configurations without analysis for an angle of attack range of 8 deg to 35 deg and clockwise and counter-clockwise rotations covering an Omega b/2v range from 0 to 0.85. Also, data are presented above 35 deg of attack for some configurations.

  14. Flight-Determined, Subsonic, Lateral-Directional Stability and Control Derivatives of the Thrust-Vectoring F-18 High Angle of Attack Research Vehicle (HARV), and Comparisons to the Basic F-18 and Predicted Derivatives

    Science.gov (United States)

    Iliff, Kenneth W.; Wang, Kon-Sheng Charles

    1999-01-01

    The subsonic, lateral-directional, stability and control derivatives of the thrust-vectoring F-1 8 High Angle of Attack Research Vehicle (HARV) are extracted from flight data using a maximum likelihood parameter identification technique. State noise is accounted for in the identification formulation and is used to model the uncommanded forcing functions caused by unsteady aerodynamics. Preprogrammed maneuvers provided independent control surface inputs, eliminating problems of identifiability related to correlations between the aircraft controls and states. The HARV derivatives are plotted as functions of angles of attack between 10deg and 70deg and compared to flight estimates from the basic F-18 aircraft and to predictions from ground and wind tunnel tests. Unlike maneuvers of the basic F-18 aircraft, the HARV maneuvers were very precise and repeatable, resulting in tightly clustered estimates with small uncertainty levels. Significant differences were found between flight and prediction; however, some of these differences may be attributed to differences in the range of sideslip or input amplitude over which a given derivative was evaluated, and to differences between the HARV external configuration and that of the basic F-18 aircraft, upon which most of the prediction was based. Some HARV derivative fairings have been adjusted using basic F-18 derivatives (with low uncertainties) to help account for differences in variable ranges and the lack of HARV maneuvers at certain angles of attack.

  15. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 deg to 90 deg. 1: Influence of airplane components for model D. [Langley spin tunnel tests

    Science.gov (United States)

    Ralston, J.

    1983-01-01

    The influence of airplane components, as well as wing location and tail length, on the rotational flow aerodynamics is discussed for a 1/6 scale general aviation airplane model. The airplane was tested in a built-up fashion (i.e., body, body-wing, body-wing-vertical, etc.) in the presence of two wing locations and two body lengths. Data were measured, using a rotary balance, over an angle-of-attack range of 8 deg to 90 deg, and for clockwise and counter-clockwise rotations covering an omega b/2V range of 0 to 0.9.

  16. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 deg to 90 deg. 2: Influence of horizontal tail location for Model D

    Science.gov (United States)

    Barnhart, B.

    1982-01-01

    The influence of horizontal tail location on the rotational flow aerodynamics is discussed for a 1/6-scale general aviation airplane model. The model was tested using various horizontal tail positions, with both a high and a low-wing location and for each of two body lengths. Data were measured, using a rotary balance, over an angle-of-attack range of 8 to 90 deg, and for clockwise and counter-clockwise rotations covering an Omega b/2V range of 0 to 0.9.

  17. Rotary balance data for a typical single-engine general aviation design for an angle of attack range of 8 deg to 90 deg. 1: Low wing model C. [wind tunnel tests

    Science.gov (United States)

    Mulcay, W. J.; Rose, R. A.

    1980-01-01

    Aerodynamic characteristics obtained in a helical flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/6 scale, single engine, low wing, general aviation model (model C). The configurations tested included the basic airplane and control deflections, wing leading edge and fuselage modification devices, tail designs and airplane components. Data are presented without analysis for an angle of attack range of 8 deg to 90 deg and clockwise and counter clockwise rotations covering an omega b/2v range from 0 to .9.

  18. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 deg to 90 deg. 2: High-wing model C

    Science.gov (United States)

    Hultberg, R. S.; Chu, J.

    1980-01-01

    Aerodynamic characteristics obtained in a helical flow environment utilizing a rotary balance located in the Langley spin g tunnel are presented in plotted form for a 1/6 scale, single engine, high wing, general aviation model. The configurations tested included the basic airplane and control deflections, wing leading edge devices, tail designs, and airplane components. Data are presented without analysis for an angle of attack range of 8 deg to 90 deg and clockwise and counter clockwise rotations covering a spin coefficient range from 0 to 0.9.

  19. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 deg to 90 deg. 2: High-wing model A

    Science.gov (United States)

    Mulcay, W.; Rose, R.

    1979-01-01

    Aerodynamic characteristics obtained in a rotational flow environment utilizing a rotary balance located in the Langley spin tunnel are presented in plotted form for a 1/5-scale, single-engine, high-wing, general aviation airplane model. The configurations tested included various tail designs and fuselage shapes. Data are presented without analysis for an angle of attack range of 8 to 90 degrees and clockwise and counter-clockwise rotations covering an Omega b/2 v range from 0 to 0.85.

  20. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 deg to 90 deg. 2: Low-wing model B

    Science.gov (United States)

    Bihrle, W., Jr.; Hultberg, R. S.

    1979-01-01

    Aerodynamic characteristics obtained in a rotational flow environment utilizing a rotary balance located in the spin tunnel are presented in plotted form for a 1/6.5 scale, single engine, low wing, general aviation airplane model. The configurations tested included the basic airplane, various wing leading-edge devices, tail designs, and rudder control settings as well as airplane components. Data are presented without analysis for an angle-of-attack range of 8 deg to 90 deg and clockwise and counter-clockwise rotations covering an (omega)(b)/2V range from 0 to 0.85.

  1. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 deg to 90 deg. 1: High-wing model B

    Science.gov (United States)

    Bihrle, W., Jr.; Hultberg, R. S.

    1979-01-01

    Aerodynamic characteristics obtained in a rotational flow environment utilizing a rotary balance located in a spin tunnel are presented in plotted form for a 1/6.5 scale, single engine, high wing, general aviation airplane model. The configurations tested included the basic airplane, various wing leading-edge devices, tail designs, and rudder control settings as well as airplane components. Data are presented without analysis for an angle of attack range of 8 deg to 90 deg and clockwise and counter-clockwise rotations covering an omega b/2V range from 0 to 0.85.

  2. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  3. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  4. Rotary balance data for a typical single-engine low-wing general aviation design for an angle-of-attack range of 30 deg to 90 deg

    Science.gov (United States)

    Bihrle, W., Jr.; Hultberg, R. S.; Mulcay, W.

    1978-01-01

    Aerodynamic characteristics obtained in a spinning flow environment utilizing a rotary balance located spin tunnel are presented in plotted form for a 1/5 scale single-engine low-wing general aviation airplane model. The configurations tested include the basic airplane, various airfoil shapes, tail designs, fuselage strakes and modifications as well as airplane components. Data are presented for pitch and roll angle ranges of 30 to 90 degrees and 10 to -10 degrees, respectively, and clockwise and counter-clockwise rotations covering an Omega b/2V range from 0 to .9. The data are presented without analysis.

  5. Local heat transfer around a wall-mounted cube. Case of the attack angle of 45 deg.; Rippotai tokki mawari no kyokusho netsu dentatsu. Katamukikaku 45 degrees no baai

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, H.; Igarashi, T.; Tsutsui, T. [National Defense Academy, Kanagawa (Japan)

    1999-11-25

    An experimental study was performed to investigate the local heat transfer around a cube mounted on the wall. The cube lied in the turbulent boundary layer. The flow angle of attack to the cube was 15 degree. The Reynolds number ranged from 4.2 x 10{sup 3} to 3.3 x 10{sup 4}. The surface temperature distributions around time cube were measured with thermocouples tinder the condition of a constant heat flux. The local h eat transfer is very high near the front corner on the top face of the cube. This high heat transfer region extends from the front corner to downstream along both edges. This is caused by the formation of lamb horn vortex. The local heat transfer is also high in time region of horseshoe vortex formed a round the cube. On the wall behind the cube, there is a pair of minimum heat transfer region. The average Nusselt number on each face of the cube is given as a function of Reynolds number. The overall Nusselt number of time cube is expressed by Nu{sub m}=0.43Re{sup 0.58}. (author)

  6. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  7. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  8. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  9. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  10. Free-Flight Tests of 0.11-Scale North American F-100 Airplane Wings to Investigate the Possibility of Flutter in Transonic Speed Range at Varying Angles of Attack

    Science.gov (United States)

    O'Kelly, Burke R.

    1954-01-01

    Free-flight tests in the transonic speed range utilizing rocketpropelled models have been made on three pairs of 0.11-scale North American F-100 airplane wings having an aspect ratio of 3.47, a taper ratio of 0.308, 45 degree sweepback at the quarter-chord line, and thickness ratios of 31 and 5 percent to investigate the possibility of flutte r. Data from tests of two other rocket-propelled models which accidentally fluttered during a drag investigation of the North American F-100 airplane are also presented. The first set of wings (5 percent thick) was tested on a model which was disturbed in pitch by a moving tail and reached a maximum Mach number of 0.85. The wings encountered mild oscillations near the first - bending frequency at high lift coefficients. The second set of wings 9 percent thick was tested up to a maximum Mach number of 0.95 at (2) angles of attack provided by small rocket motors installed in the nose of the model. No oscillations resembling flutter were encountered during the coasting flight between separation from the booster and sustainer firing (Mach numbers from 0.86 to 0.82) or during the sustainer firing at accelerations of about 8g up to the maximum Mach number of the test (0.95). The third set of wings was similar to the first set and was tested up to a maximum Mach number of 1.24. A mild flutter at frequencies near the first-bending frequency of the wings was encountered between a Mach number of 1.15 and a Mach number of 1.06 during both accelerating and coasting flight. The two drag models, which were 0.ll-scale models of the North American F-100 airplane configuration, reached a maximum Mach number of 1.77. The wings of these models had bending and torsional frequencies which were 40 and 89 percent, respectively, of the calculated scaled frequencies of the full-scale 7-percent-thick wing. Both models experienced flutter of the same type as that experienced-by the third set of wings.

  11. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  12. Rotary balance data for a typical single-engine general aviation design for an angle-of-attack range of 8 deg to 90 deg. 1: Low-wing model A. [fluid flow and vortices data for general aviation aircraft to determine aerodynamic characteristics for various designs

    Science.gov (United States)

    Hultberg, R. S.; Mulcay, W.

    1980-01-01

    Aerodynamic characteristics obtained in a rotational flow environment utilizing a rotary balance are presented in plotted form for a 1/5 scale, single engine, low-wing, general aviation airplane model. The configuration tested included the basic airplane, various control deflections, tail designs, fuselage shapes, and wing leading edges. Data are presented without analysis for an angle of attack range of 8 to 90 deg and clockwise and counterclockwise rotations covering a range from 0 to 0.85.

  13. Flight Investigation at Low Angles of Attack to Determine the Longitudinal Stability and Control Characteristics of a Cruciform Canard Missile Configuration with a Low-Aspect-Ratio Wing and Blunt Nose at Mach Numbers from 1.2 to 2.1

    Science.gov (United States)

    Brown, Clarence A , Jr

    1957-01-01

    A full- scale rocket-powered model of a cruciform canard missile configuration with a low- aspect - ratio wing and blunt nose has been flight tested by the Langley Pilotless Aircraft Research Division. Static and dynamic longitudinal stability and control derivatives of this interdigitated canard-wing missile configuration were determined by using the pulsed- control technique at low angles of attack and for a Mach number range of 1.2 to 2.1. The lift - curve slope showed only small nonlinearities with changes in control deflection or angle of attack but indicated a difference in lift- .curve slope of approximately 7 percent for the two control deflections of delta = 3.0 deg and delta= -0.3 deg . The large tail length of the missile tested was effective in producing damping in pitch throughout the Mach number range tested. The aerodynamic- center location was nearly constant with Mach number for the two control deflections but was shown to be less stable with the larger control deflection. The increment of lift produced by the controls was small and positive throughout the Mach number range tested, whereas the pitching moment produced by the controls exhibited a normal trend of reduced effectiveness with increasing Mach number.The effectiveness of the controls in producing angle of attack, lift, and pitching moment was good at all Mach numbers tested.

  14. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  15. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  16. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  17. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  18. Cavitating flow control through continuous tangential mass injection on a 2D hydrofoil at a small attack angle

    Directory of Open Access Journals (Sweden)

    Timoshevskiy Mikhail V.

    2016-01-01

    Full Text Available We studied cavitating flow over the suction side of a symmetric 2D foil – a scaled-down model of high-pressure hydroturbine guide vanes (GV – in different cavitation regimes at the attack angle of 3°. High-speed imaging was used to analyze spatial patterns and time dynamics of the gas-vapour cavities. A hydroacoustic pressure transducer was employed to register time-spectra of pressure fluctuations nearby the hydrofoil. A PIV technique was applied to measure the velocity fields and its fluctuations. The active flow control was implemented by means of a continuous liquid supply with different flow rates through a slot channel located in the GV surface. It was found that the active mass injection does not influence the primary flow upstream of the slot channel position. For the cavitation-free and cavitation inception cases, the injection was shown to make the turbulent wake past the GV section more intense. However, at the developed cavitation regimes the active flow management made it possible to reduce substantially the amplitude or even totally suppress the periodic cavity length oscillations and pressure pulsations associated with them.

  19. Determination of solid angle

    International Nuclear Information System (INIS)

    Qiu, S.; Amano, H.; Kasai, A.

    1988-01-01

    The solid angle in extended alpha source measurement for a series of counting geometries has been obtained by two methods: (1) calculated by means of the Nelson Blachmen series; (2) interpolated from the data table given by Gardner. A particular consequence of the application of the Nelson Blachmen series was deduced which was different from that given by the original author. The applicability of these two methods, as well as an experimentally measured method, is also evaluated. (author)

  20. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  1. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  2. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  3. Spontaneous, late, in-the-bag intraocular lens subluxation in a patient with a previous acute angle-closure glaucoma attack.

    Science.gov (United States)

    Su, Wei-Wen; Chang, Shirley H L

    2004-08-01

    Cataract surgery was performed in a 49-year-old woman 16 months after an acute angle-closure glaucoma attack. Zonular dialysis was observed during surgery, but the intraocular lens (IOL) was implanted in the capsular bag uneventfully. At 4 1/2 months, 1 IOL loop wrapped in the bag herniated into the anterior chamber. The patient had no history of trauma. The IOL loop remained in the anterior chamber for 9 months, until the subluxated IOL spontaneously returned to its original position. Six months later, the IOL again dislocated into the anterior chamber.

  4. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  5. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  6. The influence of flip angle on the magic angle effect

    International Nuclear Information System (INIS)

    Zurlo, J.V.; Blacksin, M.F.; Karimi, S.

    2000-01-01

    Objective. To assess the impact of flip angle with gradient sequences on the ''magic angle effect''. We characterized the magic angle effect in various gradient echo sequences and compared the signal- to-noise ratios present on these sequences with the signal-to-noise ratios of spin echo sequences.Design. Ten normal healthy volunteers were positioned such that the flexor hallucis longus tendon remained at approximately at 55 to the main magnetic field (the magic angle). The tendon was imaged by a conventional spin echo T1- and T2-weighted techniques and by a series of gradient techniques. Gradient sequences were altered by both TE and flip angle. Signal-to-noise measurements were obtained at segments of the flexor hallucis longus tendon demonstrating the magic angle effect to quantify the artifact. Signal-to-noise measurements were compared and statistical analysis performed. Similar measurements were taken of the anterior tibialis tendon as an internal control.Results and conclusions. We demonstrated the magic angle effect on all the gradient sequences. The intensity of the artifact was affected by both the TE and flip angle. Low TE values and a high flip angle demonstrated the greatest magic angle effect. At TE values less than 30 ms, a high flip angle will markedly increase the magic angle effect. (orig.)

  7. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  8. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  9. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  10. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  11. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  12. Measurement of the angle gamma

    International Nuclear Information System (INIS)

    Aleksan, R.; Sphicas, P.; Massachusetts Inst. of Tech., Cambridge, MA

    1993-12-01

    The angle γ as defined in the Wolfenstein approximation is not completely out of reach of current or proposed dedicated B experiments. This work represents but a first step in the direction of extracting the third angle of the unitarity triangle by study the feasibility of using new decay modes in a hadronic machine. (A.B.). 11 refs., 1 fig., 7 tabs

  13. Nucleation of small angle boundaries

    CSIR Research Space (South Africa)

    Nabarro, FRN

    1996-12-01

    Full Text Available The internal stresses induced by the strain gradients in an array of lattice cells delineated by low-angle dislocation boundaries are partially relieved by the creation of new low-angle boundaries. This is shown to be a first-order transition...

  14. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  15. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  16. Automated analysis of angle closure from anterior chamber angle images.

    Science.gov (United States)

    Baskaran, Mani; Cheng, Jun; Perera, Shamira A; Tun, Tin A; Liu, Jiang; Aung, Tin

    2014-10-21

    To evaluate a novel software capable of automatically grading angle closure on EyeCam angle images in comparison with manual grading of images, with gonioscopy as the reference standard. In this hospital-based, prospective study, subjects underwent gonioscopy by a single observer, and EyeCam imaging by a different operator. The anterior chamber angle in a quadrant was classified as closed if the posterior trabecular meshwork could not be seen. An eye was classified as having angle closure if there were two or more quadrants of closure. Automated grading of the angle images was performed using customized software. Agreement between the methods was ascertained by κ statistic and comparison of area under receiver operating characteristic curves (AUC). One hundred forty subjects (140 eyes) were included, most of whom were Chinese (102/140, 72.9%) and women (72/140, 51.5%). Angle closure was detected in 61 eyes (43.6%) with gonioscopy in comparison with 59 eyes (42.1%, P = 0.73) using manual grading, and 67 eyes (47.9%, P = 0.24) with automated grading of EyeCam images. The agreement for angle closure diagnosis between gonioscopy and both manual (κ = 0.88; 95% confidence interval [CI), 0.81-0.96) and automated grading of EyeCam images was good (κ = 0.74; 95% CI, 0.63-0.85). The AUC for detecting eyes with gonioscopic angle closure was comparable for manual and automated grading (AUC 0.974 vs. 0.954, P = 0.31) of EyeCam images. Customized software for automated grading of EyeCam angle images was found to have good agreement with gonioscopy. Human observation of the EyeCam images may still be needed to avoid gross misclassification, especially in eyes with extensive angle closure. Copyright 2014 The Association for Research in Vision and Ophthalmology, Inc.

  17. Relationship between the Angle of Repose and Angle of Internal ...

    African Journals Online (AJOL)

    ). The angle of internal friction ... compression chambers. Lorenzen, 1957 (quoted by Mohsenin,. 1986), reported that the design of deep ... tiongiven for lateral pressure in deep bins as presented by Mohsenin. (1986). The presence of moisture ...

  18. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  19. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  20. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  1. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  2. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  3. Prospective case series on trabecular-iris angle status after an acute episode of phacomorphic angle closure

    Directory of Open Access Journals (Sweden)

    Jacky Lee

    2013-02-01

    Full Text Available AIM:To investigate the trabecular-iris angle with ultrasound biomicroscopy (UBM post cataract extraction after an acute attack of phacomorphic angle closure.METHODS: This prospective study involved 10 cases of phacomorphic angle closure that underwent cataract extraction and intraocular lens insertion after intraocular pressure (IOP lowering. Apart from visual acuity and IOP, the trabecular-iris angle was measured by gonioscopy and UBM at 3 months post attack.RESULTS: In 10 consecutive cases of acute phacomorphic angle closure from December 2009 to December 2010, gonioscopic findings showed peripheral anterior synechiae (PAS ≤ 90° in 30% of phacomorphic patients and a mean Shaffer grading of (3.1±1.0. UBM showed a mean angle of (37.1°±4.5° in the phacomorphic eye with the temporal quadrant being the most opened and (37.1°±8.0° in the contralateral uninvolved eye. The mean time from consultation to cataract extraction was (1.4±0.7 days and the mean total duration of phacomorphic angle closure was (3.6±2.8 days but there was no correlation to the degree of angle closure on UBM (Spearman correlation P=0.7. The presenting mean IOP was (50.5±7.4 mmHg and the mean IOP at 3 months was (10.5±3.4 mmHg but there were no correlations with the degree of angle closure (Spearman correlations P=0.9.CONCLUSION:An open trabecular-iris angle and normal IOP can be achieved after an acute attack of phacomorphic angle closure if cataract extraction is performed within 1 day - 2 days after IOP control. Gonioscopic findings were in agreement with UBM, which provided a more specific and object angle measurement. The superior angle is relatively more narrowed compared to the other quadrants. All contralateral eyes in this series had open angles.

  4. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  5. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  6. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    from SCOPUS [38] all papers published during the time period 2002-2011 in conferences and journals that contain "security" in their title and that...obama-ordered-wave-of-cyberattacks-against-iran.html?ref=stuxnet, June2012. [38] SCOPUS . www. scopus . com. Last accessed: October 2012. [39] F

  7. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  8. Temperature dependence of Brewster's angle.

    Science.gov (United States)

    Guo, Wei

    2018-01-01

    In this work, a dielectric at a finite temperature is modeled as an ensemble of identical atoms moving randomly around where they are trapped. Light reflection from the dielectric is then discussed in terms of atomic radiation. Specific calculation demonstrates that because of the atoms' thermal motion, Brewster's angle is, in principle, temperature-dependent, and the dependence is weak in the low-temperature limit. What is also found is that the Brewster's angle is nothing but a result of destructive superposition of electromagnetic radiation from the atoms.

  9. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  10. Flight and full-scale wind-tunnel comparison of pressure distributions from an F-18 aircraft at high angles of attack. [Conducted in NASA Ames Research Center's 80 by 120 ft wind tunnel

    Science.gov (United States)

    Fisher, David F.; Lanser, Wendy R.

    1994-01-01

    Pressure distributions were obtained at nearly identical fuselage stations and wing chord butt lines in flight on the F-18 HARV at NASA Dryden Flight Research Center and in the NASA Ames Research Center's 80 by 120 ft wind tunnel on a full-scale F/A-18 aircraft. The static pressures were measured at the identical five stations on the forebody, three stations on the left and right leading-edge extensions, and three spanwise stations on the wing. Comparisons of the flight and wind-tunnel pressure distributions were made at alpha = 30 deg, 45 deg, and 60 deg/59 deg. In general, very good agreement was found. Minor differences were noted at the forebody at alpha = 45 deg and 60 deg in the magnitude of the vortex footprints and a Mach number effect was noted at the leading-edge extension at alpha = 30 deg. The inboard leading edge flap data from the wind tunnel at alpha = 59 deg showed a suction peak that did not appear in the flight data. This was the result of a vortex from the corner of the leading edge flap whose path was altered by the lack of an engine simulation in the wind tunnel.

  11. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  12. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  13. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  14. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  15. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  16. Disorders of the cerebellopontine angle

    International Nuclear Information System (INIS)

    Block, F.

    2006-01-01

    Disorders of the cerebellopontine angle may present by symptoms like vertigo, hearing problems, affection of the trigeminal or facial nerve. Ipsilateral ataxia and contralateral hemiparesis develop in case of a rather large tumor in this region and display an involvement of the cerebellum and/or brainstem. However, some of these typical symptoms are not recognized by the patient. Thus, in case of a suspicion of a disorder of the cerebellopontine angle the relevant functions have to be tested clinically. In addition, electrophysiology can confirm dysfunction of these cranial nerves. Mainstay of the therapy should be the treatment of the underlying cause. Nevertheless, not seldom it is necessary to treat symptoms like vertigo or facial pain. (orig.) [de

  17. Measurement of the angle gamma

    International Nuclear Information System (INIS)

    Aleksan, R.; Kayser, B.; Sphicas, P.

    1993-01-01

    The angle γ at least as defined in the Wolfenstein approximation is not completely out of reach of current or proposed dedicated B experiments. This conclusion certainly depends crucially on the assumed trigger and tagging efficiencies and also on the expected backgrounds. The work summarized here represents but a first step in the direction of extracting the third angle of the unitarity triangle. The theoretical developments during the workshop have resulted in a clearer understanding of the quantities studied. On the experimental side, new decay modes (i.e. in addition to the traditional ρK s decay) have resulted in expections for observing CP violation in B s decays which are not unreasonable. It is conceivable that a dedicated B experiment can probe a fundamental aspect of the Standard Model, the CKM matrix, in multiple ways. In the process, new physics can appear anywhere along the line

  18. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  19. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  20. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  1. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  2. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  3. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  4. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  5. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  6. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  7. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  8. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  9. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    . CONCLUSION: These findings are consistent with variable involvement of different brain regions during a migraine attack. The variable occurrence of nausea, and phonophobia in conjunction with photophobia, both defining features of migraine, may be an important consideration in designing clinical studies......BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  10. Robustness against attacks of dual polarization encryption using the Stokes–Mueller formalism

    International Nuclear Information System (INIS)

    Dubreuil, Matthieu; Alfalou, Ayman; Brosseau, Christian

    2012-01-01

    The security of our recently proposed dual polarization encryption scheme of images is evaluated by numerical simulations. This consists of testing the resistance of the scheme against brute force, known-plaintext, chosen-plaintext and video sequence attacks. While some attacks are ineffective (brute force, video sequence) others are effective (known-plaintext, chosen-plaintext), but only under certain assumptions. An optimization of the setup, which is based on a regular rotation of polarization optics angles (polarizers, wave plates), is proposed associating the use of a high dynamic range for the key image, or the use of a phase-only spatial light modulator in the target and in the key image channel. The possibility of the attacker decrypting an unknown image is thus strongly reduced. The precision required for optical specifications is also evaluated, in order to ensure a good decryption for an authorized user. (paper)

  11. Robustness against attacks of dual polarization encryption using the Stokes-Mueller formalism

    Science.gov (United States)

    Dubreuil, Matthieu; Alfalou, Ayman; Brosseau, Christian

    2012-09-01

    The security of our recently proposed dual polarization encryption scheme of images is evaluated by numerical simulations. This consists of testing the resistance of the scheme against brute force, known-plaintext, chosen-plaintext and video sequence attacks. While some attacks are ineffective (brute force, video sequence) others are effective (known-plaintext, chosen-plaintext), but only under certain assumptions. An optimization of the setup, which is based on a regular rotation of polarization optics angles (polarizers, wave plates), is proposed associating the use of a high dynamic range for the key image, or the use of a phase-only spatial light modulator in the target and in the key image channel. The possibility of the attacker decrypting an unknown image is thus strongly reduced. The precision required for optical specifications is also evaluated, in order to ensure a good decryption for an authorized user.

  12. Vulnerability of complex networks under intentional attack with incomplete information

    International Nuclear Information System (INIS)

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  13. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  14. Treatment of HAE Attacks in the Icatibant Outcome Survey

    DEFF Research Database (Denmark)

    Hernández Fernandez de Rojas, Dolores; Ibañez, Ethel; Longhurst, Hilary

    2015-01-01

    BACKGROUND: Icatibant, a selective bradykinin B2 receptor antagonist for the treatment of acute hereditary angio-oedema (HAE) attacks in adults, can be administered by health care professionals (HCPs) or self-administered. This analysis compared characteristics and outcomes of acute HAE attacks t...

  15. Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

    NARCIS (Netherlands)

    van Wieren, Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab‿ cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats‿ on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the

  16. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  17. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  18. A Survey of Man in the Middle Attacks

    DEFF Research Database (Denmark)

    Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor

    2016-01-01

    extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based...

  19. Evaluation of blotchy pigments in the anterior chamber angle as a sign of angle closure

    Directory of Open Access Journals (Sweden)

    Harsha L Rao

    2012-01-01

    Full Text Available Background: Blotchy pigments in the anterior chamber (AC angle are considered diagnostic of primary angle closure (PAC. But there are no reports either on the prevalence of blotchy pigments in AC angles or the validity of this sign. Aims: To determine the prevalence of blotchy pigments in AC angles and to evaluate their relationship with glaucomatous optic neuropathy (GON in eyes with occludable angles. Setting and Design: Cross-sectional, comparative study. Materials and Methods: Gonioscopy was performed in 1001 eyes of 526 subjects (245 eyes of 148 consecutive, occludable angle subjects and 756 eyes of 378 non-consecutive, open angle subjects, above 35 years of age. Quadrant-wise location of blotchy pigments was documented. Statistical Analysis: Odds of blotchy pigments in occludable angles against that in open angles were evaluated. Relationship of GON with blotchy pigments in occludable angle eyes was evaluated using a multivariate model. Results: Prevalence of blotchy pigments in occludable angles was 28.6% (95% CI, 22.9-34.3 and in open angles was 4.7% (95% CI, 3.2-6.3. Blotchy pigments were more frequently seen in inferior (16% and superior quadrants (15% of occludable angles, and inferior quadrant of open angles (4%. Odds of superior quadrant blotchy pigments in occludable angles were 33 times that in open angles. GON was seen in 107 occludable angle eyes. Blotchy pigments were not significantly associated with GON (odds ratio = 0.5; P = 0.1. Conclusions: Blotchy pigments were seen in 28.6% of occludable angle eyes and 4.7% of open angles eyes. Presence of blotchy pigments in the superior quadrant is more common in occludable angles. Presence of GON in occludable angle eyes was not associated with blotchy pigments.

  20. Evaluation of blotchy pigments in the anterior chamber angle as a sign of angle closure

    Science.gov (United States)

    Rao, Harsha L; Mungale, Sachin C; Kumbar, Tukaram; Parikh, Rajul S; Garudadri, Chandra S

    2012-01-01

    Background: Blotchy pigments in the anterior chamber (AC) angle are considered diagnostic of primary angle closure (PAC). But there are no reports either on the prevalence of blotchy pigments in AC angles or the validity of this sign. Aims: To determine the prevalence of blotchy pigments in AC angles and to evaluate their relationship with glaucomatous optic neuropathy (GON) in eyes with occludable angles. Setting and Design: Cross-sectional, comparative study. Materials and Methods: Gonioscopy was performed in 1001 eyes of 526 subjects (245 eyes of 148 consecutive, occludable angle subjects and 756 eyes of 378 non-consecutive, open angle subjects), above 35 years of age. Quadrant-wise location of blotchy pigments was documented. Statistical Analysis: Odds of blotchy pigments in occludable angles against that in open angles were evaluated. Relationship of GON with blotchy pigments in occludable angle eyes was evaluated using a multivariate model. Results: Prevalence of blotchy pigments in occludable angles was 28.6% (95% CI, 22.9-34.3) and in open angles was 4.7% (95% CI, 3.2-6.3). Blotchy pigments were more frequently seen in inferior (16%) and superior quadrants (15%) of occludable angles, and inferior quadrant of open angles (4%). Odds of superior quadrant blotchy pigments in occludable angles were 33 times that in open angles. GON was seen in 107 occludable angle eyes. Blotchy pigments were not significantly associated with GON (odds ratio = 0.5; P = 0.1). Conclusions: Blotchy pigments were seen in 28.6% of occludable angle eyes and 4.7% of open angles eyes. Presence of blotchy pigments in the superior quadrant is more common in occludable angles. Presence of GON in occludable angle eyes was not associated with blotchy pigments. PMID:23202393

  1. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  2. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  3. Robotic exoskeleton assessment of transient ischemic attack.

    Directory of Open Access Journals (Sweden)

    Leif Simmatis

    Full Text Available We used a robotic exoskeleton to quantify specific patterns of abnormal upper limb motor behaviour in people who have had transient ischemic attack (TIA. A cohort of people with TIA was recruited within two weeks of symptom onset. All individuals completed a robotic-based assessment of 8 behavioural tasks related to upper limb motor and proprioceptive function, as well as cognitive function. Robotic task performance was compared to a large cohort of controls without neurological impairments corrected for the influence of age. Impairment in people with TIA was defined as performance below the 5th percentile of controls. Participants with TIA were also assessed with the National Institutes of Health Stroke Scale (NIHSS score, Chedoke-McMaster Stroke Assessment (CMSA of the arm, the Behavioural Inattention Test (BIT, the Purdue pegboard test (PPB, and the Montreal Cognitive Assessment (MoCA. Age-related white matter change (ARWMC, prior infarction and cella-media index (CMI were assessed from baseline CT scan that was performed within 24 hours of TIA. Acute infarction was assessed from diffusion-weighted imaging in a subset of people with TIA. Twenty-two people with TIA were assessed. Robotic assessment showed impaired upper limb motor function in 7/22 people with TIA patients and upper limb sensory impairment in 4/22 individuals. Cognitive tasks involving robotic assessment of the upper limb were completed in 13 participants, of whom 8 (61.5% showed significant impairment. Abnormal performance in the CMSA arm inventory was present in 12/22 (54.5% participants. ARWMC was 11.8 ± 6.4 and CMI was 5.4 ± 1.5. DWI was positive in 0 participants. Quantitative robotic assessment showed that people who have had a TIA display a spectrum of upper limb motor and sensory performance deficits as well as cognitive function deficits despite resolution of symptoms and no evidence of tissue infarction.

  4. Robotic exoskeleton assessment of transient ischemic attack.

    Science.gov (United States)

    Simmatis, Leif; Krett, Jonathan; Scott, Stephen H; Jin, Albert Y

    2017-01-01

    We used a robotic exoskeleton to quantify specific patterns of abnormal upper limb motor behaviour in people who have had transient ischemic attack (TIA). A cohort of people with TIA was recruited within two weeks of symptom onset. All individuals completed a robotic-based assessment of 8 behavioural tasks related to upper limb motor and proprioceptive function, as well as cognitive function. Robotic task performance was compared to a large cohort of controls without neurological impairments corrected for the influence of age. Impairment in people with TIA was defined as performance below the 5th percentile of controls. Participants with TIA were also assessed with the National Institutes of Health Stroke Scale (NIHSS) score, Chedoke-McMaster Stroke Assessment (CMSA) of the arm, the Behavioural Inattention Test (BIT), the Purdue pegboard test (PPB), and the Montreal Cognitive Assessment (MoCA). Age-related white matter change (ARWMC), prior infarction and cella-media index (CMI) were assessed from baseline CT scan that was performed within 24 hours of TIA. Acute infarction was assessed from diffusion-weighted imaging in a subset of people with TIA. Twenty-two people with TIA were assessed. Robotic assessment showed impaired upper limb motor function in 7/22 people with TIA patients and upper limb sensory impairment in 4/22 individuals. Cognitive tasks involving robotic assessment of the upper limb were completed in 13 participants, of whom 8 (61.5%) showed significant impairment. Abnormal performance in the CMSA arm inventory was present in 12/22 (54.5%) participants. ARWMC was 11.8 ± 6.4 and CMI was 5.4 ± 1.5. DWI was positive in 0 participants. Quantitative robotic assessment showed that people who have had a TIA display a spectrum of upper limb motor and sensory performance deficits as well as cognitive function deficits despite resolution of symptoms and no evidence of tissue infarction.

  5. Construction of a Cyber Attack Model for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    2017-05-01

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.

  6. Personality characteristics of victims of illegal attacks on the Internet

    Directory of Open Access Journals (Sweden)

    Safuanov F.S.

    2016-01-01

    Full Text Available The article examines the personality characteristics of victims of illegal attacks on the Internet. We used methods as follow: 16 factors Cattell personality questionnaire, subjective control level, life-style index, Buss-Perry questionnaire, Spielberger State-Trait Anxiety Inventory, a COPE inventory. 78 internet users were divided into two groups of 38 persons: the main group included people falling victim to illegal attacks on the Internet, the control group participants were not attacked on the internet. We identified specific aggregated symptoms of individual psychological characteristics of internet attack victims and show that victims of "non-forced" and "forced" offenses have different levels of situational and personal anxiety, aggression and locus of control.

  7. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  8. Cascading Denial of Service Attacks on Wi-Fi Networks

    OpenAIRE

    Xin, Liangxiao; Starobinski, David; Noubir, Guevara

    2016-01-01

    We unveil the existence of a vulnerability in Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. We demonstrate the feasibility of such attacks through experiments with real Wi-Fi cards, extensive ns-3 simulations, and theoretical analysis....

  9. A thermodynamic model of contact angle hysteresis.

    Science.gov (United States)

    Makkonen, Lasse

    2017-08-14

    When a three-phase contact line moves along a solid surface, the contact angle no longer corresponds to the static equilibrium angle but is larger when the liquid is advancing and smaller when the liquid is receding. The difference between the advancing and receding contact angles, i.e., the contact angle hysteresis, is of paramount importance in wetting and capillarity. For example, it determines the magnitude of the external force that is required to make a drop slide on a solid surface. Until now, fundamental origin of the contact angle hysteresis has been controversial. Here, this origin is revealed and a quantitative theory is derived. The theory is corroborated by the available experimental data for a large number of solid-liquid combinations. The theory is applied in modelling the contact angle hysteresis on a textured surface, and these results are also in quantitative agreement with the experimental data.

  10. The qualitative criterion of transient angle stability

    DEFF Research Database (Denmark)

    Lyu, R.; Xue, Y.; Xue, F.

    2015-01-01

    In almost all the literatures, the qualitative assessment of transient angle stability extracts the angle information of generators based on the swing curve. As the angle (or angle difference) of concern and the threshold value rely strongly on the engineering experience, the validity and robust...... of these criterions are weak. Based on the stability mechanism from the extended equal area criterion (EEAC) theory and combining with abundant simulations of real system, this paper analyzes the criterions in most literatures and finds that the results could be too conservative or too optimistic. It is concluded...

  11. Behavior of Tilted Angle Shear Connectors

    Science.gov (United States)

    Khorramian, Koosha; Maleki, Shervin; Shariati, Mahdi; Ramli Sulong, N. H.

    2015-01-01

    According to recent researches, angle shear connectors are appropriate to transfer longitudinal shear forces across the steel-concrete interface. Angle steel profile has been used in different positions as L-shaped or C-shaped shear connectors. The application of angle shear connectors in tilted positions is of interest in this study. This study investigates the behaviour of tilted-shaped angle shear connectors under monotonic loading using experimental push out tests. Eight push-out specimens are tested to investigate the effects of different angle parameters on the ultimate load capacity of connectors. Two different tilted angles of 112.5 and 135 degrees between the angle leg and steel beam are considered. In addition, angle sizes and lengths are varied. Two different failure modes were observed consisting of concrete crushing-splitting and connector fracture. By increasing the size of connector, the maximum load increased for most cases. In general, the 135 degrees tilted angle shear connectors have a higher strength and stiffness than the 112.5 degrees type. PMID:26642193

  12. Behavior of Tilted Angle Shear Connectors.

    Directory of Open Access Journals (Sweden)

    Koosha Khorramian

    Full Text Available According to recent researches, angle shear connectors are appropriate to transfer longitudinal shear forces across the steel-concrete interface. Angle steel profile has been used in different positions as L-shaped or C-shaped shear connectors. The application of angle shear connectors in tilted positions is of interest in this study. This study investigates the behaviour of tilted-shaped angle shear connectors under monotonic loading using experimental push out tests. Eight push-out specimens are tested to investigate the effects of different angle parameters on the ultimate load capacity of connectors. Two different tilted angles of 112.5 and 135 degrees between the angle leg and steel beam are considered. In addition, angle sizes and lengths are varied. Two different failure modes were observed consisting of concrete crushing-splitting and connector fracture. By increasing the size of connector, the maximum load increased for most cases. In general, the 135 degrees tilted angle shear connectors have a higher strength and stiffness than the 112.5 degrees type.

  13. The paediatric Bohler's angle and crucial angle of Gissane: a case series

    Directory of Open Access Journals (Sweden)

    Crawford Haemish A

    2011-01-01

    Full Text Available Abstract Background Bohler's angle and the crucial angle of Gissane can be used to assess calcaneal fractures. While the normal adult values of these angles are widely known, the normal paediatric values have not yet been established. Our aim is to investigate Bohler's angle and the crucial angle of Gissane in a paediatric population and establish normal paediatric reference values. Method We measured Bohler's angle and the crucial angle of Gissane using normal plain ankle radiographs of 763 patients from birth to 14 years of age completed over a five year period from July 2003 to June 2008. Results In our paediatric study group, the mean Bohler's angle was 35.2 degrees and the mean crucial angle of Gissane was 111.3 degrees. In an adult comparison group, the mean Bohler's angle was 39.2 degrees and the mean crucial angle of Gissane was 113.8 degrees. The differences in Bohler's angle and the crucial angle of Gissane between these two groups were statistically significant. Conclusion We have presented the normal values of Bohler's angle and the crucial angle of Gissane in a paediatric population. These values may provide a useful comparison to assist with the management of the paediatric calcaneal fracture.

  14. Controlling sulfate attack in Mississippi Department of Transportation structures.

    Science.gov (United States)

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with specif...

  15. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.; Shamma, Jeff S.; Stuber, Gordon L.

    2014-01-01

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart

  16. Controlling sulfate attack in Mississippi Department of Transportation structures

    Science.gov (United States)

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with sp...

  17. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  18. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  19. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  20. AMC Model for Denial of Sleep Attack Detection

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sens...

  1. An Annotated Review of Past Papers on Attack Graphs

    National Research Council Canada - National Science Library

    Lippmann, Richard; Ingols, K. W

    2005-01-01

    This report reviews past research papers that describe how to construct attack graphs, how to use them to improve security of computer networks, and how to use them to analyze alerts from intrusion detection systems...

  2. Computing angle of arrival of radio signals

    Science.gov (United States)

    Borchardt, John J.; Steele, David K.

    2017-11-07

    Various technologies pertaining to computing angle of arrival of radio signals are described. A system that is configured for computing the angle of arrival of a radio signal includes a cylindrical sheath wrapped around a cylindrical object, where the cylindrical sheath acts as a ground plane. The system further includes a plurality of antennas that are positioned about an exterior surface of the cylindrical sheath, and receivers respectively coupled to the antennas. The receivers output measurements pertaining to the radio signal. A processing circuit receives the measurements and computes the angle of arrival of the radio signal based upon the measurements.

  3. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  4. Impact modeling and prediction of attacks on cyber targets

    Science.gov (United States)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  5. Practical evaluation of action-angle variables

    International Nuclear Information System (INIS)

    Boozer, A.H.

    1984-02-01

    A practical method is described for establishing action-angle variables for a Hamiltonian system. That is, a given nearly integrable Hamiltonian is divided into an exactly integrable system plus a perturbation in action-angle form. The transformation of variables, which is carried out using a few short trajectory integrations, permits a rapid determination of trajectory properties throughout a phase space volume

  6. Investigation of impingement attack mechanism of copper alloy condenser tubes

    Energy Technology Data Exchange (ETDEWEB)

    Fukumura, Takuya; Nakajima, Nobuo; Arioka, Koji; Totsuka, Nobuo; Nakagawa, Tomokazu [Institute of Nuclear Safety System Inc., Mihama, Fukui (Japan)

    2001-09-01

    In order to investigate generation and growth mechanisms of impingement attacks of sea water against copper alloy condenser tubes used in condensers of nuclear power plants, we took out condenser tubes from actual condensers, cut them into several pieces and carried out several material tests mainly for impinged spots. In addition water flow inside of a pit was analyzed. From the results of the investigation, it was found that all of impingement attacks were found in the marks left by sessile organisms and none were found in downstream of the marks as frequently proposed so far. At the pits generated inside the marks, iron coating was striped and zinc content was deficient in some cases. Combining these data and the result of flow analysis, we considered the following mechanism of the impingement attacks: sessile organisms clinging to the surface of the condenser tube and growth, occlusion of the tube, extinction and decomposition of sessile organisms, pollution corrosion under the organisms and cavity formation, occlusion removal by the cleaning, generation of impingement attacks by flow collision inside the cavity, growth of the impingement attacks. (author)

  7. Experimental study of crossing angle collision

    International Nuclear Information System (INIS)

    Chen, T.; Rice, D.; Rubin, D.; Sagan, D.; Tigner, M.

    1993-01-01

    The non-linear coupling due to the beam-beam interaction with crossing angle has been studied. The major effect of a small (∼12mrad) crossing angle is to excite 5Q x ±Q s =integer coupling resonance family on large amplitude particles, which results in bad lifetime. On the CESR, a small crossing angle (∼2.4mr) was created at the IP and a reasonable beam-beam tune-shift was achieved. The decay rate of the beam is measured as a function of horizontal tune with and without crossing angle. The theoretical analysis, simulation and experimental measurements have a good agreement. The resonance strength as a function of crossing angle is also measured

  8. Longitudinal changes of angle configuration in primary angle-closure suspects: the Zhongshan Angle-Closure Prevention Trial.

    Science.gov (United States)

    Jiang, Yuzhen; Chang, Dolly S; Zhu, Haogang; Khawaja, Anthony P; Aung, Tin; Huang, Shengsong; Chen, Qianyun; Munoz, Beatriz; Grossi, Carlota M; He, Mingguang; Friedman, David S; Foster, Paul J

    2014-09-01

    To determine longitudinal changes in angle configuration in the eyes of primary angle-closure suspects (PACS) treated by laser peripheral iridotomy (LPI) and in untreated fellow eyes. Longitudinal cohort study. Primary angle-closure suspects aged 50 to 70 years were enrolled in a randomized, controlled clinical trial. Each participant was treated by LPI in 1 randomly selected eye, with the fellow eye serving as a control. Angle width was assessed in a masked fashion using gonioscopy and anterior segment optical coherence tomography (AS-OCT) before and at 2 weeks, 6 months, and 18 months after LPI. Angle width in degrees was calculated from Shaffer grades assessed under static gonioscopy. Angle configuration was also evaluated using angle opening distance (AOD250, AOD500, AOD750), trabecular-iris space area (TISA500, TISA750), and angle recess area (ARA) measured in AS-OCT images. No significant difference was found in baseline measures of angle configuration between treated and untreated eyes. At 2 weeks after LPI, the drainage angle on gonioscopy widened from a mean of 13.5° at baseline to a mean of 25.7° in treated eyes, which was also confirmed by significant increases in all AS-OCT angle width measures (Pgonioscopy (P = 0.18), AOD250 (P = 0.167) and ARA (P = 0.83). In untreated eyes, angle width consistently decreased across all follow-up visits after LPI, with a more rapid longitudinal decrease compared with treated eyes (P values for all variables ≤0.003). The annual rate of change in angle width was equivalent to 1.2°/year (95% confidence interval [CI], 0.8-1.6) in treated eyes and 1.6°/year (95% CI, 1.3-2.0) in untreated eyes (P<0.001). Angle width of treated eyes increased markedly after LPI, remained stable for 6 months, and then decreased significantly by 18 months after LPI. Untreated eyes experienced a more consistent and rapid decrease in angle width over the same time period. Copyright © 2014 American Academy of Ophthalmology. Published by

  9. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  10. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  11. The radiographic diagnosis of early attacking congenital syphilis of bone

    International Nuclear Information System (INIS)

    Ji Yaping; Zhuge Moyi

    2005-01-01

    Objective: To explore the method of radiological diagnosis of early attacking congenital syphilis. Methods: Seven cases of early attacking congenital syphilis of bone were retrospectively analyzed, diagnosed serologically, and were taken X-rays of the long bones. Results: Bone radiographs abnormalities were identified in 6 of 7 cases. Five cases suffered periotities, six cases metaphysitis, and three cases combined with diaphysitis. Seven cases had swollen soft tissue. The vertebraes, craniums and epiphysitis were not found abnormal in 7 cases. Diffusion, multiple and symmetric metaphysitis, periosteitis and osteitis were the radiological characters of congenital syphilis of bone. Conclusion: Radiography can affirm the diagnose of early attacking congenital syphilis and definite the arrange and depth. Radiographs of the extremities should be routinely taken in suspected infants. (authors)

  12. Attacks, applications, and evaluation of known watermarking algorithms with Checkmark

    Science.gov (United States)

    Meerwald, Peter; Pereira, Shelby

    2002-04-01

    The Checkmark benchmarking tool was introduced to provide a framework for application-oriented evaluation of watermarking schemes. In this article we introduce new attacks and applications into the existing Checkmark framework. In addition to describing new attacks and applications, we also compare the performance of some well-known watermarking algorithms (proposed by Bruyndonckx,Cox, Fridrich, Dugad, Kim, Wang, Xia, Xie, Zhu and Pereira) with respect to the Checkmark benchmark. In particular, we consider the non-geometric application which contains tests that do not change the geometry of image. This attack constraint is artificial, but yet important for research purposes since a number of algorithms may be interesting, but would score poorly with respect to specific applications simply because geometric compensation has not been incorporated. We note, however, that with the help of image registration, even research algorithms that do not have counter-measures against geometric distortion -- such as a template or reference watermark -- can be evaluated. In the first version of the Checkmark benchmarking program, application-oriented evaluation was introduced, along with many new attacks not already considered in the literature. A second goal of this paper is to introduce new attacks and new applications into the Checkmark framework. In particular, we introduce the following new applications: video frame watermarking, medical imaging and watermarking of logos. Video frame watermarking includes low compression attacks and distortions which warp the edges of the video as well as general projective transformations which may result from someone filming the screen at a cinema. With respect to medical imaging, only small distortions are considered and furthermore it is essential that no distortions are present at embedding. Finally for logos, we consider images of small sizes and particularly compression, scaling, aspect ratio and other small distortions. The challenge

  13. A lattice determination of gA and left angle x right angle from overlap fermions

    International Nuclear Information System (INIS)

    Guertler, M.; Schiller, A.; Streuer, T.; Freie Univ. Berlin

    2004-10-01

    We present results for the nucleon's axial charge g A and the first moment left angle x right angle of the unpolarized parton distribution function from a simulation of quenched overlap fermions. (orig.)

  14. Sharper angle, higher risk? The effect of cutting angle on knee mechanics in invasion sport athletes.

    Science.gov (United States)

    Schreurs, Mervin J; Benjaminse, Anne; Lemmink, Koen A P M

    2017-10-03

    Cutting is an important skill in team-sports, but unfortunately is also related to non-contact ACL injuries. The purpose was to examine knee kinetics and kinematics at different cutting angles. 13 males and 16 females performed cuts at different angles (45°, 90°, 135° and 180°) at maximum speed. 3D kinematics and kinetics were collected. To determine differences across cutting angles (45°, 90°, 135° and 180°) and sex (female, male), a 4×2 repeated measures ANOVA was conducted followed by post hoc comparisons (Bonferroni) with alpha level set at α≤0.05a priori. At all cutting angles, males showed greater knee flexion angles than females (pcutting angles with no differences in the amount of knee flexion -42.53°±8.95°, females decreased their knee flexion angle from -40.6°±7.2° when cutting at 45° to -36.81°±9.10° when cutting at 90°, 135° and 180° (pcutting towards sharper angles (pcutting angles and then stabilized compared to the 45° cutting angle (pcutting to sharper angles (pcutting angles demand different knee kinematics and kinetics. Sharper cutting angles place the knee more at risk. However, females and males handle this differently, which has implications for injury prevention. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Interval forecasting of cyber-attacks on industrial control systems

    Science.gov (United States)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  16. Prediction of unsteady airfoil flows at large angles of incidence

    Science.gov (United States)

    Cebeci, Tuncer; Jang, H. M.; Chen, H. H.

    1992-01-01

    The effect of the unsteady motion of an airfoil on its stall behavior is of considerable interest to many practical applications including the blades of helicopter rotors and of axial compressors and turbines. Experiments with oscillating airfoils, for example, have shown that the flow can remain attached for angles of attack greater than those which would cause stall to occur in a stationary system. This result appears to stem from the formation of a vortex close to the surface of the airfoil which continues to provide lift. It is also evident that the onset of dynamic stall depends strongly on the airfoil section, and as a result, great care is required in the development of a calculation method which will accurately predict this behavior.

  17. Automatic analysis of attack data from distributed honeypot network

    Science.gov (United States)

    Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel

    2013-05-01

    There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.

  18. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  19. Increase of rotation angle of soil layers during plow operation

    Science.gov (United States)

    Vasilenko, VV; Afonichev, D. N.; Vasilenko, S. V.; Khakhulin, A. N.

    2018-03-01

    One of the advantages of plowing is the ability of the plow to hide the weed seeds deep into the soil. The depth of the embankment exceeds 10-12 cm, from there the weeds can not rise to the surface of the soil. They perish halfway. But for this, it is necessary to wrap the soil layers at an angle close to 180 °. Modern ploughs can not turn the layers of soil at an angle of more than 135 °, therefore the plow is required to be equipped with additional working elements. The aim of the study is to create an adaptation to the plow to expand the furrow before laying the next soil layer. In a wide furrow, the formation will completely tip, the previous layer will not interfere with it. The device is a set of vertical shields. Each shield is fixed behind the working body of the plow. It is installed with an angle of attack of 20-25 ° to move the previous layer to expand the furrow by 10-12 cm. The model and industrial samples of the plow have shown improved agrotechnical indicators. The average angle of the formation rotation was 177 °, the burial of plant residues in the soil increased from 61 to 99%. The field surface with blocks more than 5 cm decreased from 36.3 to 13.4%, the height of the ridges decreased from 7 to 4 cm. The force of soil pressure on the shield was measured by a strain gage. It is 130-330 N depending on the depth of processing and the speed of movement. The increase in power costs for the four-hull plow was 190-750 W. The coulters on the plow are unnecessary, and this saves energy more than its increase for shields.

  20. Survival and Growth of Cottonwood Clones After Angle Planting and Base Angle Treatments

    Science.gov (United States)

    W.K. Randall; Harvey E. Kennedy

    1976-01-01

    Presently, commercial cottonwood plantations in the lower Mississippi Valley are established using vertically planted, unrooted cuttings with a flat (90°) base. Neither survival nor first-year growth of a group of six Stoneville clones was improved by angle planting or cutting base angles diagonally. For one clone, survival was significantly better when base angle was...

  1. Radiodiagnosis of Cerebellopontine-angle tumors

    International Nuclear Information System (INIS)

    Weyer, K.H. van de

    1979-01-01

    The most important radiodiagnostic signs of cerebellopontine-angle tumors are demonstrated. The value of plain films and special projections is discussed. The use of recent diagnostic procedures like scintography, CT and cisternography with oily contrast medium is critically analyzed. The advantage and disadvantages of these procedures are discussed according to their usefullness in evaluating size, route of spread and localisation of cerebellopontine-angle tumors. (orig.) [de

  2. Creation of the {pi} angle standard for the flat angle measurements

    Energy Technology Data Exchange (ETDEWEB)

    Giniotis, V; Rybokas, M, E-mail: gi@ap.vtu.l, E-mail: MRybokas@gama.l [Department of Information Technologies, Vilnius Gediminas Technical University, Sauletekio al. 11, 10223 Vilnius-40 (Lithuania)

    2010-07-01

    Angle measurements are based mainly on multiangle prisms - polygons with autocollimators, rotary encoders for high accuracy and circular scales as the standards of the flat angle. Traceability of angle measurements is based on the standard of the plane angle - prism (polygon) calibrated at an appropriate accuracy. Some metrological institutions have established their special test benches (comparators) equipped with circular scales or rotary encoders of high accuracy and polygons with autocollimators for angle calibration purposes. Nevertheless, the standard (etalon) of plane angle - polygon has many restrictions for the transfer of angle unit - radian (rad) and other units of angle. It depends on the number of angles formed by the flat sides of the polygon that is restricted by technological and metrological difficulties related to the production and accuracy determination of the polygon. A possibility to create the standard of the angle equal to {pi} rad or half the circle or the full angle is proposed. It can be created by the circular scale with the rotation axis of very high accuracy and two precision reading instruments, usually, photoelectric microscopes (PM), placed on the opposite sides of the circular scale using the special alignment steps. A great variety of angle units and values can be measured and its traceability ensured by applying the third PM on the scale. Calibration of the circular scale itself and other scale or rotary encoder as well is possible using the proposed method with an implementation of {pi} rad as the primary standard angle. The method proposed enables to assure a traceability of angle measurements at every laboratory having appropriate environment and reading instruments of appropriate accuracy together with a rotary table with the rotation axis of high accuracy - rotation trajectory (runout) being in the range of 0.05 {mu}m. Short information about the multipurpose angle measurement test bench developed is presented.

  3. Experimental investigation of piercing of high-strength steels within a critical range of slant angle

    Science.gov (United States)

    Senn, S.; Liewald, M.

    2017-09-01

    Deep drawn parts often do have complex designs and, therefore, must be trimmed or punched subsequently in a second stage. Due to the complex part geometry, most punching areas do reveal critical slant angle (angle between part surface and ram movement direction) different to perpendicular direction. Piercing within a critical range of slant angle may lead to severe damage of the cutting tool. Consequently, expensive cam units are required to transform the ram moving direction in order to perform the piercing process perpendicularly to the local part surface. For modern sheet metals, however, the described critical angle of attack has not been investigated adequately until now. Therefore, cam units are used in cases in which regular piercing with high slant angle wouldn’t be possible. Purpose of this study is to investigate influencing factors and their effect on punch damage during piercing of high strength steels with slant angles. Therefore, a modular shearing tool was designed, which allows to simply switch die parts to vary cutting clearance and cutting angle. The target size of the study is to measure the lateral deviation of the punch which is monitored by an eddy current sensor. The sensor is located in the downholder and measures the lateral punch deviation in-line during manufacturing. The deviation is mainly influenced by slant angle of workpiece surface. In relation to slang angle and sheet thickness the clearance has a small influence on the measured punch deflection.

  4. Detection of network attacks based on adaptive resonance theory

    Science.gov (United States)

    Bukhanov, D. G.; Polyakov, V. M.

    2018-05-01

    The paper considers an approach to intrusion detection systems using a neural network of adaptive resonant theory. It suggests the structure of an intrusion detection system consisting of two types of program modules. The first module manages connections of user applications by preventing the undesirable ones. The second analyzes the incoming network traffic parameters to check potential network attacks. After attack detection, it notifies the required stations using a secure transmission channel. The paper describes the experiment on the detection and recognition of network attacks using the test selection. It also compares the obtained results with similar experiments carried out by other authors. It gives findings and conclusions on the sufficiency of the proposed approach. The obtained information confirms the sufficiency of applying the neural networks of adaptive resonant theory to analyze network traffic within the intrusion detection system.

  5. A Case Of Transient Ischemic Attack Presenting As Hemichroea

    Directory of Open Access Journals (Sweden)

    Hasan Hüseyin Özdemir

    2013-12-01

    Full Text Available Chorea is defined as; involuntary movements of the distal parts of limbs which have arrhythmic, rapid, bouncing or smooth, simple or complex properties. Choreiform movements occur when putamen, globus pallidus and subthalamic nucleus are affected. Chorea can be observed during the course of metabolic and vascular diseases, neurodegenerative or hereditary diseases. Chorea may be a rare symptom of cerebral hypoperfusion. Transient ischemic attack is an event that occurs in short term characterized by a temporary ischemia of brain. A wide variety of symptoms can be seen depending on the localization of cerebral hypoperfusion. Hemichorea is a very rare finding observed during transient ischemic attacks. In this article hemichorea in a case of symptomatic transient ischemic attack is discussed with relevant literature.

  6. On the potential of IPv6 open resolvers for DDoS attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; de Oliveira Schmidt, Ricardo; van Rijswijk-Deij, Roland; Pras, Aiko; Kaafar, Mohamed Ali; Uhlig, Steve; Amann, Johanna

    2017-01-01

    Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelm- ing online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used

  7. Hydrogen attack evaluation of boiler tube using ultrasonic wave

    International Nuclear Information System (INIS)

    Won, Soon Ho; Hyun, Yang Ki; Lee, Jong O; Cho, Kyung Shik; Lee, Jae Do

    2001-01-01

    The presence of hydrogen in industrial plants is a source of damage. Hydrogen attack is one such form of degradation and often causing large tube ruptures that necessitate an immediate shutdown. Hydrogen attack may reduce the fracture toughness as well as the strength of steels. This reduction is caused partially by the presence of cavities and microcracks at the grain boundaries. In the past several techniques have been used with limited results. This paper describes the application of an ultrasonic velocity, attenuation and backscatter techniques for detecting the presence of hydrogen damage in utility boiler tubes. Ultrasonic tests showed a decrease in wave velocity and an increase in attenuation. Such results demonstrate the potential for ultrasonic nondestructive testing to quantify damage. Based on this study, recommendations are that both velocity and attenuation be used to detect hydrogen attack in steels.

  8. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  9. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    Science.gov (United States)

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  10. Depletion-of-Battery Attack: Specificity, Modelling and Analysis

    Directory of Open Access Journals (Sweden)

    Vladimir Shakhov

    2018-06-01

    Full Text Available The emerging Internet of Things (IoT has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  11. Implementation of an attack scheme on a practical QKD system

    Science.gov (United States)

    Lamas-Linares, Antia; Liu, Qin; Gerhardt, Ilja; Makarov, Vadim; Kurtsiefer, Christian

    2010-03-01

    We report on an experimental implementation of an attack of a practical quantum key distribution system [1], based on a vulnerability of single photon detectors [2]. An intercept/resend-like attack has been carried out which revealed 100% of the raw key generated between the legitimate communication partners. No increase of the error ratio was observed, which is usually considered a reliable witness for any eavesdropping attempt. We also present an experiment which shows that this attack is not revealed by key distribution protocols probing for eavesdroppers by testing a Bell inequality [3], and discuss implications for practical quantum key distribution.[4pt] [1] I. Marcikic, A. Lamas-Linares, C. Kurtsiefer, Appl. Phys. Lett. 89, 101122 (2006); [2] V. Makarov, New J. Phys. 11, 065003 (2009); [3] A. Ling et al., Phys. Rev. A 78, 020301(R), (2008)

  12. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  13. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  14. Efficacy of nebulized furosemide in children with moderate attack of ...

    African Journals Online (AJOL)

    Efficacy of nebulized furosemide in children with moderate attack of asthma. M Alshehri, T Almegamesi, A Alfrayh. Abstract. No Abstract. West African Journal of Medicine Vol. 24(3) 2005: 246-251. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  15. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  16. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  17. Circadian and seasonal variation of migraine attacks in children.

    Science.gov (United States)

    Soriani, Stefano; Fiumana, Elisa; Manfredini, Roberto; Boari, Benedetta; Battistella, Pier Antonio; Canetta, Elisabetta; Pedretti, Stefania; Borgna-Pignatti, Caterina

    2006-01-01

    To investigate the rhythmicity of migraine episodes without aura in a pediatric population. Time of occurrence of 2517 migraine attacks in 115 children was recorded, by means of a diary, both by hourly and monthly intervals. A significant circadian variation, characterized by a peak in the afternoon (P < .001) and one in the early morning (P= .002) was found. A seasonal peak was also observed between November and January, while a nadir was observed in July. The clustering of attacks in the morning and midday and in autumn-winter, with a minimum frequency in July, suggests that school activities may represent an important cause of migraine.

  18. Computing Preferred Extensions for Argumentation Systems with Sets of Attacking

    DEFF Research Database (Denmark)

    Nielsen, Søren Holbech; Parsons, Simon

    2006-01-01

    The hitherto most abstract, and hence general, argumentation system, is the one described by Dung in a paper from 1995. This framework does not allow for joint attacks on arguments, but in a recent paper we adapted it to support such attacks, and proved that this adapted framework enjoyed the same...... formal properties as that of Dung. One problem posed by Dung's original framework, which was neglected for some time, is how to compute preferred extensions of the argumentation systems. However, in 2001, in a paper by Doutre and Mengin, a procedure was given for enumerating preferred extensions...... for these systems. In this paper we propose a method for enumerating preferred extensions of the potentially more complex systems, where joint attacks are allowed. The method is inspired by the one given by Doutre and Mengin....

  19. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    Science.gov (United States)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  20. Possibility of spoof attack against robustness of multibiometric authentication systems

    Science.gov (United States)

    Hariri, Mahdi; Shokouhi, Shahriar Baradaran

    2011-07-01

    Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.

  1. Enumeration and estimation of insect attack fruits of some cultivars ...

    African Journals Online (AJOL)

    In this study, five cultivars of Punica granatum identified (two of which are endemic, while the other three are new) were grown in certain farms at Al-Taif, Saudi Arabia. Enumeration to the insects attack its' fruits illustrated that, there are three insects, namely, Virchola livia, Ectomyelois ceratonia and Pseudococcus maitimus ...

  2. Attacks to Cryptography Protocols of Wireless Industrial Communication Systems

    Directory of Open Access Journals (Sweden)

    Tomas Ondrasina

    2010-01-01

    Full Text Available The paper deals with problems of safety and security principles within wireless industrial communication systems. First safety requirements to wireless industrial communication system, summarisation of attack methods and the available measures for risks elimination are described with orientation to safety critical applications. The mainly part is oriented to identification of risks and summarisation of defensive methods of wireless communication based on cryptographic techniques. Practical part the cryptoanalytic’s attacks to COTS (Commercial Off-The-Shelf wireless communications are mentioned based on the IEEE 802.11 standards.

  3. A Model of Biological Attacks on a Realistic Population

    Science.gov (United States)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  4. Solar cell angle of incidence corrections

    Science.gov (United States)

    Burger, Dale R.; Mueller, Robert L.

    1995-01-01

    Literature on solar array angle of incidence corrections was found to be sparse and contained no tabular data for support. This lack along with recent data on 27 GaAs/Ge 4 cm by 4 cm cells initiated the analysis presented in this paper. The literature cites seven possible contributors to angle of incidence effects: cosine, optical front surface, edge, shadowing, UV degradation, particulate soiling, and background color. Only the first three are covered in this paper due to lack of sufficient data. The cosine correction is commonly used but is not sufficient when the incident angle is large. Fresnel reflection calculations require knowledge of the index of refraction of the coverglass front surface. The absolute index of refraction for the coverglass front surface was not known nor was it measured due to lack of funds. However, a value for the index of refraction was obtained by examining how the prediction errors varied with different assumed indices and selecting the best fit to the set of measured values. Corrections using front surface Fresnel reflection along with the cosine correction give very good predictive results when compared to measured data, except there is a definite trend away from predicted values at the larger incident angles. This trend could be related to edge effects and is illustrated by a use of a box plot of the errors and by plotting the deviation of the mean against incidence angle. The trend is for larger deviations at larger incidence angles and there may be a fourth order effect involved in the trend. A chi-squared test was used to determine if the measurement errors were normally distributed. At 10 degrees the chi-squared test failed, probably due to the very small numbers involved or a bias from the measurement procedure. All other angles showed a good fit to the normal distribution with increasing goodness-of-fit as the angles increased which reinforces the very small numbers hypothesis. The contributed data only went to 65 degrees

  5. Classification of etiologic subtypes for transient ischemic attacks. Clinical significance of lacunar transient ischemic attack

    International Nuclear Information System (INIS)

    Ohara, Tomoyuki; Yamamoto, Yasumasa; Nagakane, Yoshinari; Tanaka, Eijiro; Morii, Fukiko; Koizumi, Takashi

    2011-01-01

    Lacunar transient ischemic attack (lacunar TIA) may have been underestimated because of diagnostic difficulties. The aim of our study was to classify TIAs by etiologic subtypes, especially using defined criteria for diagnosis of lacunar TIA and clarify clinical characteristics of lacunar TIA.105 TIA patients out of consecutive 1,244 patients with acute ischemic stroke admitted to our hospital between January 2007 and June 2010 were enrolled in the present study. TIA was defined as an acute focal neurological deficit lasting less than 24 hours, suspected to be of cerebrovascular origin regardless of ischemic lesions on MRI. TIAs were classified to 5 etiologic subtypes; cardioembolic TIA, atherothrombotic TIA, lacunar TIA, other etiologies, and undetermined etiology and clinical characteristics in each subtype and the incidence of recurrent stroke after TIA were investigated. Lacunar TIA was diagnosed if the following criteria were fulfilled; presence of lacunar infarct on MRI and/or the presence of unilateral dysfunction of at least two of three body parts (face, arm, leg) in the absence of cortical dysfunction presumed due to subcortical ischemia. Absence of cardiac sources of embolism and large artery atherosclerosis. In 105 patients with TIA, lacunar TIA was the most frequent etiology (31%) followed by cardioembolic TIA (27%), atherothrombotic TIA (19%), undetermined etiology (18%), and other etiologies (6%). In patients with lacunar TIA, history of repeated TIA was more frequent and systolic blood pressure on admission was higher significantly than in cardioembolic TIA. Six of 105 patients had experienced recurrent stroke after TIA during admission. Among these 6 patients, 3 patients were diagnosed as lacunar infarctions. Lacunar TIA was most common TIA subtype in the present study. It is critical to identify lacunar TIA on admission because some patients with lacunar TIAs experience early recurrent stroke. (author)

  6. Cyber attacks, countermeasures, and protection schemes — A state of the art survey

    OpenAIRE

    Shabut, Antesar M.; Lwin, K.T.; Hossain, M.A.

    2017-01-01

    Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than befo...

  7. Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model

    Directory of Open Access Journals (Sweden)

    Chunming Zhang

    2018-01-01

    Full Text Available The advanced persistent distributed denial-of-service (APDDoS attack is a fairly significant threat to cybersecurity. Formulating a mathematical model for accurate prediction of APDDoS attack is important. However, the dynamical model of APDDoS attack has barely been reported. This paper first proposes a novel dynamical model of APDDoS attack to understand the mechanisms of APDDoS attack. Then, the attacked threshold of this model is calculated. The global stability of attack-free and attacked equilibrium are both proved. The influences of the model’s parameters on attacked equilibrium are discussed. Eventually, the main conclusions of the theoretical analysis are examined through computer simulations.

  8. Design and Pitch Angle Optimisation of Horizontal Axis Hydrokinetic Turbine with Constant Tip Speed Ratio

    Directory of Open Access Journals (Sweden)

    Nigam Suyash

    2017-01-01

    Full Text Available Booming population and associated energy demands, looming threat of exhaustion of conventional sources of energy and the severe environmental repercussions of the same call for alternate sources of clean energy. Hydrokinetic turbine is one such developing technology which harnesses zero-head free flow of water and affects hydrological ecology minimally. This paper discusses the optimisation of Horizontal Axis Hydrokinetic Turbine (HAHkT blade chord length and twist angle using blade element momentum (BEM theory to achieve a constant optimal angle of attack (AoA, thus maximising the power output. To achieve this while maintaining robustness at the hub end and eliminate cavitation, two different hydrofoils (S832 and E817 are selected. S832 is simulated using ANSYS 14.0 at low (00 and high (150 angles of attack and compared against more widely used NACA 4412 to study flow separation characteristics. This is followed by calculating angles of relative flow, ratios of chord length and subsequently twist angles for each blade element using MATLAB simulations. A blade model is thus developed for visualisation using computer aided designing after obtaining optimal chord lengths and pitch angles.

  9. ATTACK ON WATER BY CARBON OF SOLID FUEL

    Directory of Open Access Journals (Sweden)

    N. S. Nazarov

    2008-01-01

    Full Text Available The paper considers a continuous method for attack of high temperature water steam by carbon of solid fuel (coke. Design of water-coal gas generator and experimental stand, methodology for  measurements of parameters of water-coal gasification are described in the paper.

  10. Impact of Acid Attack on the Shear Behaviour of a Carbonate Rock Joint

    Science.gov (United States)

    Nouailletas, O.; Perlot, C.; Rivard, P.; Ballivy, G.; La Borderie, C.

    2017-06-01

    The mechanical behaviour of structural discontinuities in rock mass is a key element of the stability analysis in civil engineering, petroleum engineering and mining engineering. In this paper, the mechanical analysis is coupled with the acidic attack of a rock joint associated with leakage of CO2 through a geological fault in the context of carbon sequestration. Experiments were conducted at the laboratory scale to assess the shear behaviour of degraded joint: direct shear tests were performed on rock joints that have been previously immersed into water or into an acidic solution (pH 0.2). The shear behaviour of joints is governed by the roughness of its walls: the parameters Z2, Z3, Z4 and RL characterize the rough surfaces. They are calculated from the scans of joint surfaces after and before immersion. Their comparison pointed out a slight impact of the acidic attack. However, the results of the direct shear tests show significant modifications in the shear behaviour for the degraded joints: the tangential stress peak disappears, the tangential stiffness decreases in the stress/displacement curve, and the contraction increases, the dilation angle decreases in the dilation curve. Acid attack has a greater impact on the mechanical properties of the asperities than their geometric characteristics. The results of this study will be used to improve chemo-mechanical modelling to better simulate with higher accuracy the fault stability in different cases of civil engineering, petroleum engineering and mining engineering.

  11. Contact angle of unset elastomeric impression materials.

    Science.gov (United States)

    Menees, Timothy S; Radhakrishnan, Rashmi; Ramp, Lance C; Burgess, John O; Lawson, Nathaniel C

    2015-10-01

    Some elastomeric impression materials are hydrophobic, and it is often necessary to take definitive impressions of teeth coated with some saliva. New hydrophilic materials have been developed. The purpose of this in vitro study was to compare contact angles of water and saliva on 7 unset elastomeric impression materials at 5 time points from the start of mixing. Two traditional polyvinyl siloxane (PVS) (Aquasil, Take 1), 2 modified PVS (Imprint 4, Panasil), a polyether (Impregum), and 2 hybrid (Identium, EXA'lence) materials were compared. Each material was flattened to 2 mm and a 5 μL drop of distilled water or saliva was dropped on the surface at 25 seconds (t0) after the start of mix. Contact angle measurements were made with a digital microscope at initial contact (t0), t1=2 seconds, t2=5 seconds, t3=50% working time, and t4=95% working time. Data were analyzed with a generalized linear mixed model analysis, and individual 1-way ANOVA and Tukey HSD post hoc tests (α=.05). For water, materials grouped into 3 categories at all time-points: the modified PVS and one hybrid material (Identium) produced the lowest contact angles, the polyether material was intermediate, and the traditional PVS materials and the other hybrid (EXA'lence) produced the highest contact angles. For saliva, Identium, Impregum, and Imprint 4 were in the group with the lowest contact angle at most time points. Modified PVS materials and one of the hybrid materials are more hydrophilic than traditional PVS materials when measured with water. Saliva behaves differently than water in contact angle measurement on unset impression material and produces a lower contact angle on polyether based materials. Copyright © 2015 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.

  12. First Attack of Acute Urticaria in Pediatric Emergency Department

    Directory of Open Access Journals (Sweden)

    Tzu-Hsuan Liu

    2008-06-01

    Conclusion: Detailed etiologies of first-attack urticaria in children in central Taiwan were analyzed. Most importantly, we found that there was a decrease in the prevalence of various infections as causative factors as the age of the children increased. The etiologies of foods and medications were more prevalent in adolescents than in younger children.

  13. The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Rechberger, Christian

    2014-01-01

    We show how to produce a forged (ciphertext, tag) pair for the scheme ALE with data and time complexity of 2102 ALE encryptions of short messages and the same number of authentication attempts. We use a differential attack based on a local collision, which exploits the availability of extracted...

  14. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  15. Undetected angle closure in patients with a diagnosis of open-angle glaucoma.

    Science.gov (United States)

    Varma, Devesh K; Simpson, Sarah M; Rai, Amandeep S; Ahmed, Iqbal Ike K

    2017-08-01

    The aim of this study was to identify the proportion of patients referred to a tertiary glaucoma centre with a diagnosis of open-angle glaucoma (OAG) who were found to have angle closure glaucoma. Retrospective chart review. Consecutive new patients referred for glaucoma management to a tertiary centre between July 2010 and December 2011 were reviewed. Patients whose referrals for glaucoma assessment specified angle status as "open" were included. The data collected included glaucoma specialist's angle assessment, diagnosis, and glaucoma severity. The status of those with 180 degrees or more Shaffer angle grading of 0 was classified as "closed." From 1234 glaucoma referrals, 179 cases were specified to have a diagnosis of OAG or when angles were known to be open. Of these, 16 (8.9%) were found on examination by the glaucoma specialist to have angle closure. Pseudoexfoliation was present in 4 of 16 patients (25%) in the missed angle-closure glaucoma (ACG) group and 22 of 108 patients (13.5%) in the remaining OAG group. There was no difference found in demographic or ocular biometric parameters between those with confirmed OAG versus those with missed ACG. Almost 1 in 11 patients referred by ophthalmologists to a tertiary glaucoma centre with a diagnosis of OAG were in fact found to have angle closure. Given the different treatment approaches for ACG versus OAG, this study suggests a need to strengthen angle evaluations. Copyright © 2017 Canadian Ophthalmological Society. Published by Elsevier Inc. All rights reserved.

  16. Personality and Fear of Terrorist attacks in Ghana: The mediating ...

    African Journals Online (AJOL)

    The study aimed at determining whether or not neuroticism would account for more variance in predicting risk perception and fear of terrorist attack in Ghana compared to conscientiousness. Moreover, it sought to examine the mediating effect of risk perception on the relationship between neuroticism and fear of terrorist ...

  17. The characteristics of radiological cloud caused by 'dirty bomb' attack

    International Nuclear Information System (INIS)

    Wang Qingbo; Wang Bairong

    2006-01-01

    This paper discusses the characteristics of the radiological cloud after the RDD explosion, including the initial cloud size, material's distribution and the rate of particle or aerosol sedimentation. For there are limited papers in involved this topic publicly, only empirical formulas are given. However, it would be helpful when evaluating the consequences of the RDD terrorism attacks. (authors)

  18. Nursery Pest Management of Phytolyma lata Walker (Scott) Attack ...

    African Journals Online (AJOL)

    The establishment of plantations of Milicia excelsa has been constrained by the gall-forming psyllid Phytolyma lata Walker (Scott) that causes extensive damage to young plants. We present findings of an experiment aimed at preventing Phytolyma attack on Milicia seedlings in the nursery using chemical control and ...

  19. Optimality of Gaussian attacks in continuous-variable quantum cryptography.

    Science.gov (United States)

    Navascués, Miguel; Grosshans, Frédéric; Acín, Antonio

    2006-11-10

    We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.

  20. Reliably determining data leakage in the presence of strong attackers

    NARCIS (Netherlands)

    Bortolameotti, R.; Peter, A.; Everts, M.H.; Jonker, W.; Hartel, P.

    2016-01-01

    We address the problem of determining what data has been leaked from a system after its recovery from a successful attack. This is a forensic process which is relevant to give a better understanding of the impact of a data breach, but more importantly it is becoming mandatory according to the recent

  1. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.; Shamma, Jeff S.; Stuber, Gordon L.

    2015-01-01

    communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel

  2. Evolution of Army Attack Aviation: A Chaotic Coupled Pendulums Analogy

    Science.gov (United States)

    2013-05-23

    forward of the FLOT for 36 minutes.32 Ground Campaign: 4-229 AVN Deep Attack, 26-27 February With the commencement of the ground campaign on 24......battalions worth of tanks and armored personnel carriers while receiving no damage to 4-229 AVN aircraft.34 Prior planning, training, and command

  3. Vulnerabilities in GSM technology and feasibility of selected attacks

    Science.gov (United States)

    Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.

    2015-05-01

    Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.

  4. The confused world of sulfate attack on concrete

    International Nuclear Information System (INIS)

    Neville, Adam

    2004-01-01

    External sulfate attack is not completely understood. Part I identifies the issues involved, pointing out disagreements, and distinguishes between the mere occurrence of chemical reactions of sulfates with hydrated cement paste and the damage or deterioration of concrete; only the latter are taken to represent sulfate attack. Furthermore, sulfate attack is defined as deleterious action involving sulfate ions; if the reaction is physical, then, it is physical sulfate attack that takes place. The discussion of the two forms of sulfate attack leads to a recommendation for distinct nomenclature. Sulfate attack on concrete structures in service is not widespread, and the amount of laboratory-based research seems to be disproportionately large. The mechanisms of attack by different sulfates--sodium, calcium, and magnesium--are discussed, including the issue of topochemical and through-solution reactions. The specific aspects of the action of magnesium sulfate are discussed, and the differences between laboratory conditions and field exposure are pointed out. Part II discusses the progress of sulfate attack and its manifestations. This is followed by a discussion of making sulfate-resisting concrete. One of the measures is to use Type V cement, and this topic is extensively discussed. Likewise, the influence of w/c on sulfate resistance is considered. The two parameters are not independent of one another. Moreover, the cation in the sulfate salt has a strong bearing on the efficiency of the Type V cement. Recent interpretations of the Bureau of Reclamation tests, both long term and accelerated, are evaluated, and it appears that they need reworking. Part III reviews the standards and guides for the classification of the severity of exposure of structures to sulfates and points out the lack of calibration of the various classes of exposure. A particular problem is the classification of soils because much depends on the extraction ratio of sulfate in the soil: there is a

  5. Pitfalls in management of acute gouty attack, a qualitative research ...

    African Journals Online (AJOL)

    Objective: To probe doctors' attitudes and reveal wrong perception in the management of acute gouty attacks. Design: A descriptive study using a designed questionnaire that was completed through face to face interviews in hospitals, health units and polyclinics in the Makah Region. Method: This is a qualitative study of ...

  6. A video-polygraphic analysis of the cataplectic attack

    DEFF Research Database (Denmark)

    Rubboli, G; d'Orsi, G; Zaniboni, A

    2000-01-01

    OBJECTIVES AND METHODS: To perform a video-polygraphic analysis of 11 cataplectic attacks in a 39-year-old narcoleptic patient, correlating clinical manifestations with polygraphic findings. Polygraphic recordings monitored EEG, EMG activity from several cranial, trunk, upper and lower limbs musc...... of REM sleep and neural structures subserving postural control....

  7. Plasma Exchange in Severe Attacks of Neuromyelitis Optica

    Directory of Open Access Journals (Sweden)

    Mickael Bonnan

    2012-01-01

    Full Text Available Background. Neuromyelitis optica (NMO attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation with the physiology of NMO, the main technical aspects, and the available studies. Results. PLEX in severe attacks from myelitis or optic neuritis are associated with a better outcome, depending on PLEX delay (“time is cord and eyes”. NMO-IgG status has no influence. Finally, we build up an original concept linking the inner dynamic of the lesion, the timing of PLEX onset and the expected clinical results. Conclusion. PLEX is a safe and efficient add-on therapy in NMO, in synergy with steroids. Large therapeutic trials are required to definitely assess the procedure and define the time opportunity window.

  8. The effect of netting solidity ratio and inclined angle on the hydrodynamic characteristics of knotless polyethylene netting

    Science.gov (United States)

    Tang, Hao; Hu, Fuxiang; Xu, Liuxiong; Dong, Shuchuang; Zhou, Cheng; Wang, Xuefang

    2017-10-01

    Knotless polyethylene (PE) netting has been widely used in aquaculture cages and fishing gears, especially in Japan. In this study, the hydrodynamic coefficient of six knotless PE netting panels with different solidity ratios were assessed in a flume tank under various attack angles of netting from 0° (parallel to flow) to 90° (perpendicular to flow) and current speeds from 40 cm s-1 to 130 cm s-1. It was found that the drag coefficient was related to Reynolds number, solidity ratio and attack angle of netting. The solidity ratio was positively related with drag coefficient for netting panel perpendicular to flow, whereas when setting the netting panel parallel to the flow the opposite result was obtained. For netting panels placed at an angle to the flow, the lift coefficient reached the maximum at an attack angle of 50° and then decreased as the attack angle further increased. The solidity ratio had a dual influence on drag coefficient of inclined netting panels. Compared to result in the literature, the normal drag coefficient of knotless PE netting measured in this study is larger than that of nylon netting or Dyneema netting.

  9. Polar bear attacks on humans: Implications of a changing climate

    Science.gov (United States)

    Wilder, James; Vongraven, Dag; Atwood, Todd C.; Hansen, Bob; Jessen, Amalie; Kochnev, Anatoly A.; York, Geoff; Vallender, Rachel; Hedman, Daryll; Gibbons, Melissa

    2017-01-01

    Understanding causes of polar bear (Ursus maritimus) attacks on humans is critical to ensuring both human safety and polar bear conservation. Although considerable attention has been focused on understanding black (U. americanus) and grizzly (U. arctos) bear conflicts with humans, there have been few attempts to systematically collect, analyze, and interpret available information on human-polar bear conflicts across their range. To help fill this knowledge gap, a database was developed (Polar Bear-Human Information Management System [PBHIMS]) to facilitate the range-wide collection and analysis of human-polar bear conflict data. We populated the PBHIMS with data collected throughout the polar bear range, analyzed polar bear attacks on people, and found that reported attacks have been extremely rare. From 1870–2014, we documented 73 attacks by wild polar bears, distributed among the 5 polar bear Range States (Canada, Greenland, Norway, Russia, and United States), which resulted in 20 human fatalities and 63 human injuries. We found that nutritionally stressed adult male polar bears were the most likely to pose threats to human safety. Attacks by adult females were rare, and most were attributed to defense of cubs. We judged that bears acted as a predator in most attacks, and that nearly all attacks involved ≤2 people. Increased concern for both human and bear safety is warranted in light of predictions of increased numbers of nutritionally stressed bears spending longer amounts of time on land near people because of the loss of their sea ice habitat. Improved conflict investigation is needed to collect accurate and relevant data and communicate accurate bear safety messages and mitigation strategies to the public. With better information, people can take proactive measures in polar bear habitat to ensure their safety and prevent conflicts with polar bears. This work represents an important first step towards improving our understanding of factors influencing

  10. Pitfalls in management of acute gouty attack, a qualitative research ...

    African Journals Online (AJOL)

    Hamid Mustafa

    2014-05-17

    May 17, 2014 ... Abstract Objective: To probe doctors' attitudes and reveal wrong perception in the management of acute gouty attacks. Design: A descriptive study using a designed questionnaire that was completed through face to face interviews in hospitals, health units and polyclinics in the Makah Region. Method: This ...

  11. On the Estimation of the k-RSA Attack

    Directory of Open Access Journals (Sweden)

    Anatoliy Sergeyevich Makeyev

    2016-03-01

    Full Text Available In this paper, we discuss the attack on the RSA cryptosystem with  modules (≥2. We also provide estimation of the attacks’s complexity. Finally, we give the experimental results for different modules and open exponents.

  12. Detection and isolation of routing attacks through sensor watermarking

    NARCIS (Netherlands)

    Ferrari, R.; Herdeiro Teixeira, A.M.; Sun, J; Jiang, Z-P

    2017-01-01

    In networked control systems, leveraging the peculiarities of the cyber-physical domains and their interactions may lead to novel detection and defense mechanisms against malicious cyber-attacks. In this paper, we propose a multiplicative sensor watermarking scheme, where each sensor's output is

  13. Flocking and invariance of velocity angles.

    Science.gov (United States)

    Liu, Le; Huang, Lihong; Wu, Jianhong

    2016-04-01

    Motsch and Tadmor considered an extended Cucker-Smale model to investigate the flocking behavior of self-organized systems of interacting species. In this extended model, a cone of the vision was introduced so that outside the cone the influence of one agent on the other is lost and hence the corresponding influence function takes the value zero. This creates a problem to apply the Motsch-Tadmor and Cucker-Smale method to prove the flocking property of the system. Here, we examine the variation of the velocity angles between two arbitrary agents, and obtain a monotonicity property for the maximum cone of velocity angles. This monotonicity permits us to utilize existing arguments to show the flocking property of the system under consideration, when the initial velocity angles satisfy some minor technical constraints.

  14. Evaluation of corrosion attack of chimney liners

    Directory of Open Access Journals (Sweden)

    Blahetová M.

    2016-06-01

    Full Text Available The case study of chimney liner corrosion addresses three specific cases of damage of chimney systems from of stainless steels. These systems were used for flue of gas arising from the combustion of brown coal in small automatic boilers, which are used for heating. Detailed analyzes implied that the cause of devastating corrosion of the steel AISI 316 and 304 steel (CSN 17349, 17241 was particularly high content of halides (chlorides and fluorides, which caused a severe pitting corrosion, which led up to the perforation of the liner material. Simultaneous reduction of the thickness of the used sheets was due to by the general corrosion, which was caused by the sulfur in the solid fuel. The condensation then led to acid environment and therefore the corrosion below the dew point of the sulfuric acid has occurred. All is documented by metallographic analysis and microanalysis of the corrosion products.

  15. Prevalence of eating disorders and eating attacks in narcolepsy

    Directory of Open Access Journals (Sweden)

    Norbert Dahmen

    2008-03-01

    Full Text Available Norbert Dahmen, Julia Becht, Alice Engel, Monika Thommes, Peter TonnPsychiatry Department, University of Mainz, GermanyAbstract: Narcoleptic patients suffer frequently from obesity and type II diabetes. Most patients show a deficit in the energy balance regulating orexinergic system. Nevertheless, it is not known, why narcoleptic patients tend to be obese. We examined 116 narcoleptic patients and 80 controls with the structured interview for anorectic and bulimic eating disorders (SIAB to test the hypothesis that typical or atypical eating attacks or eating disorders may be more frequent in narcoleptic patients. No difference in the current prevalence of eating disorders bulimia nervosa, binge eating disorder, or anorexia nervosa was found, nor was the frequency of eating attacks higher in the narcolepsy group. We conclude that present eating disorders and eating attacks as defined in DSM IV are not the reason for the observed differences in body composition. Additional factors, such as basal metabolic rates and lifestyle factors need to be considered.Keywords: narcolepsy, eating disorder, SIAB, bulimia, anorexia, eating attack

  16. Precision measurements of the CKM angle gamma

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The level of CP-violation permitted within the Standard Model cannot account for the matter dominated universe in which we live. Within the Standard Model the CKM matrix, which describes the quark couplings, is expected to be unitary. By making precise measurements of the CKM matrix parameters new physics models can be constrained, or with sufficient precision the effects of physics beyond the standard model might become apparent. The CKM angle gamma is the least well known angle of the unitarity triangle. It is the only angle easily accessible at tree-level, and furthermore has almost no theoretical uncertainties. Therefore it provides an invaluable Standard Model benchmark against which other new physics sensitive tests of the CP-violation can be made. I will discuss recent measurements of gamma using the the Run 1 LHCb dataset, which improve our knowledge of this key parameter.

  17. Aftermath of bustamante attack on genomic beacon service.

    Science.gov (United States)

    Aziz, Md Momin Al; Ghasemi, Reza; Waliullah, Md; Mohammed, Noman

    2017-07-26

    With the enormous need for federated eco-system for holding global genomic and clinical data, Global Alliance for Genomic and Health (GA4GH) has created an international website called beacon service which allows a researcher to find out whether a specific dataset can be utilized to his or her research beforehand. This simple webservice is quite useful as it allows queries like whether a certain position of a target chromosome has a specific nucleotide. However, the increased integration of individuals genomic data into clinical practice and research raised serious privacy concern. Though the answer of such queries are yes or no in Bacon network, it results in serious privacy implication as demonstrated in a recent work from Shringarpure and Bustamante. In their attack model, the authors demonstrated that with a limited number of queries, presence of an individual in any dataset can be determined. We propose two lightweight algorithms (based on randomized response) which captures the efficacy while preserving the privacy of the participants in a genomic beacon service. We also elaborate the strength and weakness of the attack by explaining some of their statistical and mathematical models using real world genomic database. We extend their experimental simulations for different adversarial assumptions and parameters. We experimentally evaluated the solutions on the original attack model with different parameters for better understanding of the privacy and utility tradeoffs provided by these two methods. Also, the statistical analysis further elaborates the different aspects of the prior attack which leads to a better risk management for the participants in a beacon service. The differentially private and lightweight solutions discussed here will make the attack much difficult to succeed while maintaining the fundamental motivation of beacon database network.

  18. Effects of slant angle and illumination angle on MTF estimations

    CSIR Research Space (South Africa)

    Vhengani, LM

    2012-07-01

    Full Text Available Modulation Transfer Function (MTF) is a measure of the spatial resolution of an optical imaging system. For Earth Observation (EO) imaging systems in space, continuous MTF assessment is crucial for data quality. Several techniques of measuring MTF...

  19. Technique of experimental evaluation of cloud environment attacks detection accuracy

    Directory of Open Access Journals (Sweden)

    Sergey A. Klimachev

    2018-05-01

    Full Text Available The article is devoted to research of efficiency evaluation of IDS used for dynamic and complex organizational and technical structure computing platform guard. The components of the platform have a set of heterogeneous parameters. Analysis of existing IDS evaluation technique revealed shortcomings in justification of quantitative metrics that describe the efficiency and reliability IDS resolving. This makes if difficult to prove IDS evaluation technique. The purpose of the study is to increase IDS evaluation objectivity. To achive the purpose it is necessary to develop the correct technique, tools, experimental stand. The article proposes the results of development and approbation of the technique of IDS efficiency evaluation and software for it. The technique is based on defining of optimal set of attack detection accuracy scores. The technique and the software allow solving problems of comparative analysis of IDS that have similar functionality. As a result of the research, a number of task have been solved, including the selection of universal quantitative metrics for attack detection accuracy evaluation, the defining of summarised attack detection accuracy evaluation metric based on defining of pareto-optimal set of scores that ensure the confidentiality, integrity and accessibility of cloud environment information and information resources,  the development of a functional model,  a functional scheme and a software for cloud environment IDS research.

  20. Radon - an angle of view

    International Nuclear Information System (INIS)

    Palecek, S.

    1996-01-01

    Apart from its radiation effects on living organism, radon induces the formation of atmospheric ions which are beneficial to man: some asthmatics can breathe more easily in an environment with elevated ion levels, the blood pH increases, the fraction of albumins is higher while the serotonin level is lower, sedimentation decreases and the leukocyte counts in peripherals diminish. The blood pressure, particularly in people suffering from hypertension, drops appreciably. The production of pituitary hormones as well as the overall sexual activity is stimulated by ions in air. Exposure to negative ions affects circulation through the skin, reduces skin temperature and improves overall resistance of the organism to infection. Negative ions also have a stimulating effect on mental activity and help against insomnia. Sites where radon is present in not too high concentrations are often famous as climatic spas. So, antiradon provisions, if exercised too thoroughly, may have adverse rather than positive consequences. All pros and cons should always be taken into account when deciding on antiradon steps. (P.A.)

  1. The sources of primary data for the development potentially dangerous patterns of cyber-attacks

    OpenAIRE

    Грищук, Руслан Валентинович; Житомирський військовий інститут імені С. П. Корольова; Охрімчук, Володимир Васильович; Житомирський військовий інститут імені С. П. Корольова; Ахтирцева, Влада Сергіївна; в/ч А1912

    2016-01-01

    It was established fact that the efficiency of modern systems of information and cyber security essentially de-pends on correct and timely development by vendors of antivirus software patterns of the detected cyber-attacks and timely update databases pattern of attacks these users of security. However, the constant improvement of the technological complexity of cyber-attacks requires from vendors constant improvement of mechanisms of development patterns of cyber-attacks. One of the promising...

  2. Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments

    Directory of Open Access Journals (Sweden)

    So Ryoung Park

    2018-01-01

    Full Text Available An electronic warfare (EW simulator is presented to investigate and evaluate the tracking performance of radar system under the electronic attack situations. The EW simulator has the input section in which the characteristic parameters of radar threat, radar warning receiver, jammer, electromagnetic wave propagation, and simulation scenario can be set up. During the process of simulation, the simulator displays the situations of simulation such as the received signal and its spectrum, radar scope, and angle tracking scope and also calculates the transient and root-mean-squared tracking errors of the range and angle tracking system of radar. Using the proposed EW simulator, we analyze the effect of concealment according to the noise and signal powers under the noise jamming and also analyze the effect of deception by calculating errors between the desired value and the estimated one under the deceptive jamming. Furthermore, the proposed EW simulator can be used to figure out the feature of radar threats based on the information collected from the EW receiver and also used to carry out the electronic attacks efficiently in electronic warfare.

  3. Representing of Information Attacks in the Conditions of a Reference Model OSE/RM

    Directory of Open Access Journals (Sweden)

    Vladimir Sergeevich Kuznetsov

    2013-02-01

    Full Text Available Graphic representation of attacks to open systems within the conceptual OSE/RM model is considered in the paper. Attacks are classified according to level of their action in the 7th level OSI model.

  4. Incidence angle normalization of radar backscatter data

    Science.gov (United States)

    NASA’s Soil Moisture Passive Active (SMAP) satellite (~2014) will include a radar system that will provide L-band multi-polarization backscatter at a constant incidence angle of 40º. During the pre-launch phase of the project there is a need for observations that will support the radar-based soil mo...

  5. Experimental Validation of the Invariance of Electrowetting Contact Angle Saturation

    NARCIS (Netherlands)

    Chevalliot, S.; Dhindsa, M.; Kuiper, S.; Heikenfeld, J.

    2011-01-01

    Basic electrowetting theory predicts that a continued increase in applied voltage will allow contact angle modulation to zero degrees. In practice, the effect of contact angle saturation has always been observed to limit the contact angle modulation, often only down to a contact angle of 60 to 70°.

  6. A retrospective analysis of practice patterns in the management of acute asthma attack across Turkey.

    Science.gov (United States)

    Türktaş, Haluk; Bavbek, Sevim; Misirligil, Zeynep; Gemicioğlu, Bilun; Mungan, Dilşad

    2010-12-01

    To evaluate patient characteristics and practice patterns in the management of acute asthma attack at tertiary care centers across Turkey. A total of 294 patients (mean age: 50.4 ± 15.1 years; females: 80.3%) diagnosed with persistent asthma were included in this retrospective study upon their admission to the hospital with an acute asthma attack. Patient demographics, asthma control level, asthma attack severity and the management of the attack were evaluated. There was no influence of gender on asthma control and attack severity. In 57.5% of the patients, asthma attack was moderate. Most patients (78.9%) were hospitalized with longer duration evident in the severe attack. Spirometry and chest X-Ray were the most frequent tests (85.4%), while steroids (72.0% parenteral; 29.0% oral) and short-acting beta-agonists (SABA) + anticholinergics (45.5%) were the main drugs of choice in the attack management. Attack severity and pre-attack asthma control level was significantly correlated (p attack asthma was uncontrolled in 42.6% of the patients with severe attack. Most of the patients were on combination of more than one (two in 38.7% and 3-4 in 31.2%) controller drugs before the attack. Providing country specific data on practice patterns in the management of acute asthma attack in a representative cohort in Turkey, prescription of steroids and SABA + anticholinergics as the main drugs of choice was in line with guidelines while the significant relation of pre-attack asthma control to risk/severity of asthma attack and rate/duration of hospitalization seem to be the leading results of the present study. Copyright © 2010 Elsevier Ltd. All rights reserved.

  7. Experimental technique of small angle neutron scattering

    International Nuclear Information System (INIS)

    Xia Qingzhong; Chen Bo

    2006-03-01

    The main parts of Small Angle Neutron Scattering (SANS) spectrometer, and their function and different parameters are introduced from experimental aspect. Detailed information is also introduced for SANS spectrometer 'Membrana-2'. Based on practical experiments, the fundamental requirements and working condition for SANS experiments, including sample preparation, detector calibration, standard sample selection and data preliminary process are described. (authors)

  8. Measurement of the angle alpha at BABAR

    International Nuclear Information System (INIS)

    Perez, A.

    2009-01-01

    The authors present recent measurements of the CKM angle α using data collected by the BABAR detector at the PEP-II asymmetric-energy e + e - collider at the SLAC National Accelerator Laboratory, operating at the Υ(4S) resonance. They present constraints on α from B → ππ, B → ρρ and B → ρπ decays.

  9. STUDY OF PRIVILEGE ESCALATION ATTACK ON ANDROID AND ITS COUNTERMEASURES

    OpenAIRE

    REJO MATHEW

    2012-01-01

    Android is most commonly used platform for smartphones today which boasts of an advanced security model having MAC and sandboxing. These features allow developers and users to restrict the execution of anapplication to the privileges assigned. The exploitation of vulnerabilities of the program is confined within the privilege boundaries of an applications sandbox. Privilege escalation attacks have grown manifold as the use of android systems have increased. Different kinds of mechanisms have ...

  10. Longitudinal Changes of Angle Configuration in Primary Angle-Closure Suspects

    Science.gov (United States)

    Jiang, Yuzhen; Chang, Dolly S.; Zhu, Haogang; Khawaja, Anthony P.; Aung, Tin; Huang, Shengsong; Chen, Qianyun; Munoz, Beatriz; Grossi, Carlota M.

    2015-01-01

    Objective To determine longitudinal changes in angle configuration in the eyes of primary angle-closure suspects (PACS) treated by laser peripheral iridotomy (LPI) and in untreated fellow eyes. Design Longitudinal cohort study. Participants Primary angle-closure suspects aged 50 to 70 years were enrolled in a randomized, controlled clinical trial. Methods Each participant was treated by LPI in 1 randomly selected eye, with the fellow eye serving as a control. Angle width was assessed in a masked fashion using gonioscopy and anterior segment optical coherence tomography (AS-OCT) before and at 2 weeks, 6 months, and 18 months after LPI. Main Outcome Measures Angle width in degrees was calculated from Shaffer grades assessed under static gonioscopy. Angle configuration was also evaluated using angle opening distance (AOD250, AOD500, AOD750), trabecular-iris space area (TISA500, TISA750), and angle recess area (ARA) measured in AS-OCT images. Results No significant difference was found in baseline measures of angle configuration between treated and untreated eyes. At 2 weeks after LPI, the drainage angle on gonioscopy widened from a mean of 13.5° at baseline to a mean of 25.7° in treated eyes, which was also confirmed by significant increases in all AS-OCT angle width measures (Pgonioscopy (P = 0.18), AOD250 (P = 0.167) and ARA (P = 0.83). In untreated eyes, angle width consistently decreased across all follow-up visits after LPI, with a more rapid longitudinal decrease compared with treated eyes (P values for all variables ≤0.003). The annual rate of change in angle width was equivalent to 1.2°/year (95% confidence interval [CI], 0.8–1.6) in treated eyes and 1.6°/year (95% CI, 1.3–2.0) in untreated eyes (P<0.001). Conclusions Angle width of treated eyes increased markedly after LPI, remained stable for 6 months, and then decreased significantly by 18 months after LPI. Untreated eyes experienced a more consistent and rapid decrease in angle width over the

  11. Evaluation of a Multi-Agent System for Simulation and Analysis of Distributed Denial-of-Service Attacks

    National Research Council Canada - National Science Library

    Huu, Tee

    2003-01-01

    DDoS attack is evolving at a rapid and alarming rate; an effective solution must be formulated using an adaptive approach Most of the simulations are performed at the attack phase of the DDoS attack...

  12. Meningioma of Foramen Magnum Causing Drop Attacks

    Directory of Open Access Journals (Sweden)

    Amit Mahore

    2015-01-01

    Full Text Available A 52-year-old female presented with frequent episodes of falls without loss of consciousness. These episodes lasted for brief period followed by full neurological recovery. Magnetic resonance imaging (MRI of the brain showed foramen magnum meningioma encasing left vertebral artery. The patient had dramatic improvement after excision of the tumor.

  13. The pathophysiology of the migraine attack

    NARCIS (Netherlands)

    E.L.H. Spierings

    1980-01-01

    textabstractMigraine, a word of French origin, is a mediaeval corruption of the Greek hemicrania". Its etymological meaning, half-headache, indicates two important features of the disorder, the headache and its onesidedness. In classical migraine, the headache is preceded by an 'aura' of

  14. DEF: As a form of sulfate attack

    OpenAIRE

    Skalny, J.; Johansen, V.; Thaulow, N.; Palomo, A.

    1996-01-01

    Delayed ettringite formation (DEF) is the term used to describe expansion of some heat cured portland cement concretes. Although meaningful progress has been made, the exact mechanism of the expansion itself is not entirely understood. The ettringite reformation is enabled, primarily, by thermal decomposition of ettringite formed prior to or during the cement paste setting as a result of excessive/improper heat curing. Observance in mature concrete of crystalline ettringite in air voids, crac...

  15. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  16. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... not as great as men's. Heredity (Including Race) Children of parents with heart disease are more likely to develop it themselves. African Americans have more severe high blood pressure than Caucasians and a higher risk of heart ...

  17. Attack robustness and centrality of complex networks.

    Directory of Open Access Journals (Sweden)

    Swami Iyer

    Full Text Available Many complex systems can be described by networks, in which the constituent components are represented by vertices and the connections between the components are represented by edges between the corresponding vertices. A fundamental issue concerning complex networked systems is the robustness of the overall system to the failure of its constituent parts. Since the degree to which a networked system continues to function, as its component parts are degraded, typically depends on the integrity of the underlying network, the question of system robustness can be addressed by analyzing how the network structure changes as vertices are removed. Previous work has considered how the structure of complex networks change as vertices are removed uniformly at random, in decreasing order of their degree, or in decreasing order of their betweenness centrality. Here we extend these studies by investigating the effect on network structure of targeting vertices for removal based on a wider range of non-local measures of potential importance than simply degree or betweenness. We consider the effect of such targeted vertex removal on model networks with different degree distributions, clustering coefficients and assortativity coefficients, and for a variety of empirical networks.

  18. A Serious Cause of Panic Attack

    Science.gov (United States)

    O'Connell, Michael; Bernard, Aaron

    2012-01-01

    We report on a case of a patient with atrial fibrillation in the setting of Wolff-Parkinson-White syndrome. The patient underwent synchronized electrical cardioversion, typically considered safe and effective, which resulted in a dangerous complication for the patient (degeneration into ventricular fibrillation). Discussion of common rhythm disturbances in WPW and management strategies are reviewed. PMID:23326712

  19. A Serious Cause of Panic Attack

    Directory of Open Access Journals (Sweden)

    Michael O'Connell

    2012-01-01

    Full Text Available We report on a case of a patient with atrial fibrillation in the setting of Wolff-Parkinson-White syndrome. The patient underwent synchronized electrical cardioversion, typically considered safe and effective, which resulted in a dangerous complication for the patient (degeneration into ventricular fibrillation. Discussion of common rhythm disturbances in WPW and management strategies are reviewed.

  20. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  1. Study of attack in college volleyball

    Directory of Open Access Journals (Sweden)

    Yordan Portela Pozo

    2014-03-01

    This work is done in order to analyze the positive and negative aspects that affected the performance of the auction action in volleyball players performing this action (in this case male in the Provincial University Games in 2012 in Havana , for which I take as a case study to the players of the University of Information Sciences and its opponents in those games, completing a total of 268 shares auctions in 7 games with a total of 15 September analyzed taking account of changes in the sport of Volleyball university in Cuba, data recorded by an observation sheet previously completed by the authors. The main results in this paper show that the greatest amount of shots that were done in these games were diagonal and a good percentage of positive linear auctions however were few and with very poor results. The primary role of the auction for the game's success is fully confirmed in this work because this action is achieved through many points in the game of volleyball and thus leads to a better result.

  2. Case studies of attacks on communication networks

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Sin Bok; Han, Eon Suk [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1996-06-15

    Recently, as the computer hardware and communications are developed, the data exchange through inter-networking has been highlighted and the data is being recognized as a great asset. Most of the organizations, businesses and enterprises are open to the external world-computer communication networks, attention must be focused on the securities of the information infrastructure. A government organization has been developing 'Circuits Analyzers', and 'Hacker-Tracking Program' and is struggling to track down sneakers. In this report, we analyze the contents of the cases where the communication network has been invaded, from the past up until now in Korea. This report also contains the result of a study on E-mail security, for the protection of KAERI Integrated Management Information System under which utilizes the CALS concepts and web services. (Author)

  3. Case studies of attacks on communication networks

    International Nuclear Information System (INIS)

    Kang, Sin Bok; Han, Eon Suk

    1996-06-01

    Recently, as the computer hardware and communications are developed, the data exchange through inter-networking has been highlighted and the data is being recognized as a great asset. Most of the organizations, businesses and enterprises are open to the external world-computer communication networks, attention must be focused on the securities of the information infrastructure. A government organization has been developing 'Circuits Analyzers', and 'Hacker-Tracking Program' and is struggling to track down sneakers. In this report, we analyze the contents of the cases where the communication network has been invaded, from the past up until now in Korea. This report also contains the result of a study on E-mail security, for the protection of KAERI Integrated Management Information System under which utilizes the CALS concepts and web services. (Author)

  4. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.

    2015-12-03

    LTE/LTE-A networks have been successfully providing advanced broadband services to millions of users worldwide. Lately, it has been suggested to use LTE networks for mission-critical applications like public safety, smart grid and military communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel, SINR estimation in frequency domain and computation of utilities based on observable parameters under the framework of single-shot and repeated games with asymmetric information. In a single-shot game formulation, network utility is severely compromised at its solutions, i.e. at the Nash Equilibria (NE). We propose evolved repeated-game strategy algorithms to combat smart jamming attacks that can be implemented in existing deployments using current technology. © 2015 IEEE.

  5. [Chronic pancreatitis diagnosed after the first attack of acute pancreatitis].

    Science.gov (United States)

    Bojková, Martina; Dítě, Petr; Uvírová, Magdalena; Dvořáčková, Nina; Kianička, Bohuslav; Kupka, Tomáš; Svoboda, Pavel; Klvaňa, Pavel; Martínek, Arnošt

    2016-02-01

    One of the diseases involving a potential risk of developing chronic pancreatitis is acute pancreatitis. Of the overall number of 231 individuals followed with a diagnosis of chronic pancreatitis, 56 patients were initially treated for acute pancreatitis (24.2 %). Within an interval of 12- 24 months from the first attack of acute pancreatitis, their condition gradually progressed to reached the picture of chronic pancreatitis. The individuals included in the study abstained (from alcohol) following the first attack of acute pancreatitis and no relapse of acute pancreatitis was proven during the period of their monitoring. The etiology of acute pancreatitis identified alcohol as the predominant cause (55.3 %), biliary etiology was proven in 35.7 %. According to the revised Atlanta classification, severe pancreatitis was established in 69.6 % of the patients, the others met the criterion for intermediate form, those with the light form were not included. Significant risk factors present among the patients were smoking, obesity and 18 %, resp. 25.8 % had pancreatogenous diabetes mellitus identified. 88.1 % of the patients with acute pancreatitis were smokers. The majority of individuals with chronic pancreatitis following an attack of acute pancreatitis were of a productive age from 25 to 50 years. It is not only acute alcoholic pancreatitis which evolves into chronic pancreatitis, we have also identified this transition for pancreatitis of biliary etiology.

  6. Effect of metakaolin on external sulfate attack

    Energy Technology Data Exchange (ETDEWEB)

    Ramlochan, T.; Thomas, M. [Toronto Univ., Dept. of Civil Engineering, ON (Canada)

    2000-07-01

    The effect of high reactivity metakaolin (HRM) on the sulfate resistance of mortars was studied. Mortar bars with three cements of varying C{sub 3}A content were used for the experiment. After a six month exposure to a 5 per cent solution of sodium sulfate, mortar bars incorporating any level of HRM as a partial replacement for a high-C{sub 3}A was considered 'moderately sulfate resistant'; mortar bars with HRM and a moderate or low C{sub 3}A content as 'high sulfate resistant'. It was also determined that for long term sulfate resistance 15 per cent HRM or more may be required, depending on the C{sub 3}A content. The performance of HRM was found to be significantly influenced by the water-cementitious material ratio, and in turn, by permeability, suggesting that HRM might increase sulfate resistance more by lowering the permeability of the concrete than by any chemical action. 7 refs., 4 tabs., 7 figs.

  7. Improvement of Hungarian Joint Terminal Attack Program

    Science.gov (United States)

    2013-06-13

    LST Laser Spot Tracker NVG Night Vision Goggle ROMAD Radio Operator Maintainer and Driver ROVER Remotely Operated Video Enhanced Receiver TACP...visual target designation. The other component consists of a laser spot tracker (LST), which identifies targets by tracking laser energy reflecting...capability for every type of night time missions, laser spot tracker for laser spot search missions, remotely operated video enhanced receiver

  8. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.

    2014-12-08

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers, who may employ simple narrowband jamming techniques to attack without any need to hack the network or its users. We modeled the utilities of jamming and anti-jamming actions played by the jammer and the network under the framework of single-shot and repeated Bayesian games. In a single-shot game formulation the only Nash Equilibria (NE) are pure strategy equilibria at which network utility is severely compromised. We propose a repeated-game learning and strategy algorithm for the network that outperforms single-shot games by a significant margin. Furthermore, all of our proposed actions and algorithms can be implemented with current technology.

  9. DEF: As a form of sulfate attack

    Directory of Open Access Journals (Sweden)

    Skalny, J.

    1996-12-01

    Full Text Available Delayed ettringite formation (DEF is the term used to describe expansion of some heat cured portland cement concretes. Although meaningful progress has been made, the exact mechanism of the expansion itself is not entirely understood. The ettringite reformation is enabled, primarily, by thermal decomposition of ettringite formed prior to or during the cement paste setting as a result of excessive/improper heat curing. Observance in mature concrete of crystalline ettringite in air voids, cracks, and gaps around the aggregate is not in itself an evidence for DEF, but is the consequence of natural recrystallization of ettringite into available larger spaces. Occurance of DEF is dependent on materials, curing, and environmental conditions, and can easily be distinguished from ASR and other deterioration mechanisms by optical and electron-optical methods.

    DEF es el término habitualmente usado para describir la expansión que sufren algunos hormigones de cemento Portland que han sido curados con la ayuda de un tratamiento térmico. DEF es la abreviatura de la expresión inglesa "Delayed Ettringite Formation" que en español se podría traducir como "Formación de Etringita Retrasada". Aunque en los últimos tiempos se ha progresado significativamente, aún hoy día no se entiende completamente el mecanismo exacto de la expansión en sí misma. La formación de una etringita tardía es, en principio, consecuencia de la descomposición térmica de la etringita formada con anterioridad o durante el fraguado de la pasta de cemento, por un exceso de calor o inadecuado proceso de curado térmico. La observación, en el hormigón maduro, de etringita cristalina en poros, fisuras y en las interfases pasta-áridos no es en sí una evidencia de la DEF, pero sí es una consecuencia de la natural recristalización de la etringita en espacios disponibles. El fenómeno de la DEF depende de los materiales, del curado y de las condiciones ambientales, y puede

  10. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pages 281–289, 2003. [9] Adam Barth, Collin Jackson, and John C. Mitchell. Robust...Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP ’14, pages 605–620, Washington, DC, USA, 2014. IEEE Computer Society. [42] Trevor Jim

  11. Crow Ressurection: The Future of Airborne Electronic Attack

    Science.gov (United States)

    2013-06-01

    strike assets by attempting to gain and maintain control of the electromagnetic spectrum. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...receiving his commission through Officer Training School in 2000, Major Howard served as an RC-135V/W RIVET JOINT EWO at Offutt AFB, Nebraska...significant Airborne Electronic Attack challenges in protecting strike assets by attempting to gain and maintain control of the electromagnetic spectrum

  12. A Review of Virtual Machine Attack Based on Xen

    Directory of Open Access Journals (Sweden)

    Ren xun-yi

    2016-01-01

    Full Text Available Virtualization technology as the foundation of cloud computing gets more and more attention because the cloud computing has been widely used. Analyzing the threat with the security of virtual machine and summarizing attack about virtual machine based on XEN to predict visible security hidden recently. Base on this paper can provide a reference for the further research on the security of virtual machine.

  13. Civilian casualties of Iraqi ballistic missile attack to

    Directory of Open Access Journals (Sweden)

    Khaji Ali

    2012-06-01

    Full Text Available 【Abstract】Objective: To determine the pattern of causalities of Iraqi ballistic missile attacks on Tehran, the capital of Iran, during Iraq-Iran war. Methods: Data were extracted from the Army Staff Headquarters based on daily reports of Iranian army units during the war. Results: During 52 days, Tehran was stroked by 118 Al-Hussein missiles (a modified version of Scud missile. Eighty-six missiles landed in populated areas. During Iraqi missile attacks, 422 civilians died and 1 579 injured (4.9 deaths and 18.3 injuries per missile. During 52 days, 8.1 of the civilians died and 30.4 injured daily. Of the cases that died, 101 persons (24% were excluded due to the lack of information. Among the remainders, 179 (55.8% were male and 142 (44.2% were female. The mean age of the victims was 25.3 years±19.9 years. Our results show that the high accuracy of modified Scud missiles landed in crowded ar-eas is the major cause of high mortality in Tehran. The pres-ence of suitable warning system and shelters could reduce civilian casualties. Conclusion: The awareness and readiness of civilian defense forces, rescue services and all medical facilities for dealing with mass casualties caused by ballistic missile at-tacks are necessary. Key words: Mortality; War; Mass casualty incidents; Wounds and injuries

  14. Robustness of networks against propagating attacks under vaccination strategies

    International Nuclear Information System (INIS)

    Hasegawa, Takehisa; Masuda, Naoki

    2011-01-01

    We study the effect of vaccination on the robustness of networks against propagating attacks that obey the susceptible–infected–removed model. By extending the generating function formalism developed by Newman (2005 Phys. Rev. Lett. 95 108701), we analytically determine the robustness of networks that depends on the vaccination parameters. We consider the random defense where nodes are vaccinated randomly and the degree-based defense where hubs are preferentially vaccinated. We show that, when vaccines are inefficient, the random graph is more robust against propagating attacks than the scale-free network. When vaccines are relatively efficient, the scale-free network with the degree-based defense is more robust than the random graph with the random defense and the scale-free network with the random defense

  15. Does the Angle of the Nail Matter for Pertrochanteric Fracture Reduction? Matching Nail Angle and Native Neck-Shaft Angle.

    Science.gov (United States)

    Parry, Joshua A; Barrett, Ian; Schoch, Bradley; Yuan, Brandon; Cass, Joseph; Cross, William

    2018-04-01

    To determine whether fixation of pertrochanteric hip fractures with cephalomedullary nails (CMNs) with a neck-shaft angle (NSA) less than the native NSA affects reduction and lag screw cutout. Retrospective comparative study. Level I trauma center. Patients treated with a CMN for unstable pertrochanteric femur fractures (OTA/AO 31-A2.2 and 31-A2.3) between 2005 and 2014. CMN fixation. NSA reduction and lag screw cutout. Patients fixed with a nail angle less than their native NSA were less likely to have good reductions [17% vs. 60%, 95% confidence interval (CI), -63% to -18%; P = 0.0005], secondary to more varus reductions (41% vs. 10%, 95% CI, 9%-46%; P = 0.01) and more fractures with ≥4 mm of displacement (63% vs. 35%, 95% CI, 3%-49%; P = 0.03). The cutout was not associated with the use of a nail angle less than the native NSA (60% vs. 76%, 95% CI, -56% to 18%; P = 0.5), varus reductions (60% vs. 32%, 95% CI, -13% to 62%; P = 0.3), or poor reductions (20% vs. 17%, 95% CI, -24% to 44%; P = 1.0). The fixation of unstable pertrochanteric hip fractures with a nail angle less than the native NSA was associated with more varus reductions and fracture displacement but did not affect the lag screw cutout. Therapeutic Level III. See Instructions for Authors for a complete description of levels of evidence.

  16. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  17. [Clinical pathway for management of patients with acute asthma attack].

    Science.gov (United States)

    Azuma, Naoto; Katada, Yoshinori; Kobayashi, Masaaki; Kojima, Makiko; Nakajima, Yumi; Shibano, Miyo; Tomita, Hitomi; Yamanaka, Takao; Harada, Yoshinori; Ishii, Taeko; Saeki, Yukihiko

    2008-11-01

    There have been few reports of clinical pathway (CP) for treatment of asthma attack, because patients with asthma always admit emergently and the severity varies. We introduced CP so that standard asthma treatment can be widely used, and investigated its clinical usefulness. We designed a new CP for treating asthma attack according to the guideline (Japanese guideline (JGL) and Global Initiative for Asthma (GINA)). 136 patients who admitted to our hospital due to asthma attack from January 1999 to November 2006, were enrolled our study. Excluding cases complicated with pneumonia, COPD or cardiac failure, we evaluated 46 cases treated with the CP comparing with 19 cases treated without the CP. The clinical evaluations include systemic and inhaled steroid use, FEV1.0%, history of asthma, and the duration of asthma attack. Furthermore, we investigated difference between cases with and without prolonged admission. While the rates of systemic and inhaled steroid use in cases without the CP were 57.9% and 52.6% respectively, those in cases with the CP were approximately 100%. Employing the CP, FEV 1.0% at discharge time was elevated from 71.7% to 76.3% and the duration of hospitalization was shortened from 14.2 days to 11.5 days. Mean age of the cases with prolonged admission was higher than the rest. The asthma CP is an effective way for the standard treatment according to the guideline to be used widely even by doctors who are not familiar with asthma treatment. It improves the efficacy of in-hospital treatment.

  18. Animal attack: an unusual case of multiple trauma in childhood.

    LENUS (Irish Health Repository)

    O'Grady, E

    2014-11-01

    A 2½ year old girl attended our facility following attack by a tapir at a city zoo. She sustained multiple injuries including a forearm laceration and multiple perforating wounds to her abdominal wall. She had several procedures, including bowel resection, performed under the care of the General Paediatric Surgery and Plastic Surgery teams and was treated with a course of IV antibiotics. She recovered well and to date has suffered no long-term adverse outcome.

  19. Integrated Guidance and Control Based Air-to-Air Autonomous Attack Occupation of UCAV

    Directory of Open Access Journals (Sweden)

    Chang Luo

    2016-01-01

    Full Text Available An approach of air-to-air autonomous attack occupation for Unmanned Combat Aerial Vehicles (UCAVs is proposed to improve attack precision and combat effectiveness. According to the shortage of UCAV in the task of attack occupation, kinematic and dynamic models of UCAV and missile loaded on it are formed. Then, attack zone and no-escape zone are calculated by pattern search algorithm, and the optimum attack position is indicated. To arrive at the optimum attack position accurately with restriction of gesture, a novel adaptive sliding mode control method is suggested to design the integrated guidance and control system of UCAV in the process of autonomous attack occupation. Key parameters of the control system are adaptively regulated, which further economize control energy at the same time. The simulation results show that compared with traditional methods our approach can guide the UCAV to the optimum attack position with stable gesture and economize nearly 25% control energy.

  20. Protecting Dynamic Mobile Agent against Denial of Service Attacks

    Science.gov (United States)

    Aggarwal, Mayank; Nipur, Pallavi

    2010-11-01

    Mobile Agents are softwares migrating from one node to another to fulfill the task of its owner. The introduction of mobile agents has reduced network latency, network traffic a lot but at the same time it has increased the vulnerability for attacks by malicious hosts. One such attack is `Denial of Service', once the agent is launched it is free to roam without any control of its owner, this on one hand decreases the cost of agent—owner interaction and on the other hand increases the chances of `Denial Of Service'. In Denial Of Service attack the malicious host may deny resources required by the agent and kill the agent, thus the result computed so far is lost and this may happen every time the agent visits any malicious host. In this paper we continued the work done in [10] in which the authors proposed techniques by which owner can detect the malicious host for `Denial Of Service' but they did not covered technique for dynamic routes i.e. where the host or agent initiate migrations to hosts which were not contained in the route composed by the owner. We introduced an algorithm and a model which can be useful for the above purpose.

  1. Review and expectations of terror attack emergency rescue

    Directory of Open Access Journals (Sweden)

    De-wen WANG

    2012-03-01

    Full Text Available Ten years of anti-terror struggle since the 9/11 event has indicated adequately that terrorism is a global problem and international danger. Likewise, anti-terror emergency rescue is also an important task which will influence the safety and benefit of every country all over the world. This paper reviews the main progress and result of international anti-terror struggle in the last ten years, and also introduces the new characteristic of the international anti-terror activity. Besides that, this paper also brings forward the further consideration about the anti-terror emergency medical rescue and the researches remaining to be carried out. The latter includes: (1 to further perfect the high-efficient medical rescue command organization; (2 to further perfect the emergency medical rescue prearranged scheme; (3 to further perfect the construction of rescue system and rescue base after various types of terror attack; (4 to further promote the anti-terror consciousness in the public, and pay more attention to the prevention and investigation of the psychological disaster; (5 to further carry out the basic investigation on emergency medical rescue after various terror attack injuries (for example the types and characteristics of new injuries, pathophysiology and prevention and treatment of stress-psychological effect induced by terror attack, new high-efficient medical rescue measure and equipments, and so on.

  2. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  3. Comparison of artificial intelligence classifiers for SIP attack data

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2016-05-01

    Honeypot application is a source of valuable data about attacks on the network. We run several SIP honeypots in various computer networks, which are separated geographically and logically. Each honeypot runs on public IP address and uses standard SIP PBX ports. All information gathered via honeypot is periodically sent to the centralized server. This server classifies all attack data by neural network algorithm. The paper describes optimizations of a neural network classifier, which lower the classification error. The article contains the comparison of two neural network algorithm used for the classification of validation data. The first is the original implementation of the neural network described in recent work; the second neural network uses further optimizations like input normalization or cross-entropy cost function. We also use other implementations of neural networks and machine learning classification algorithms. The comparison test their capabilities on validation data to find the optimal classifier. The article result shows promise for further development of an accurate SIP attack classification engine.

  4. Moth tails divert bat attack: evolution of acoustic deflection.

    Science.gov (United States)

    Barber, Jesse R; Leavell, Brian C; Keener, Adam L; Breinholt, Jesse W; Chadwell, Brad A; McClure, Christopher J W; Hill, Geena M; Kawahara, Akito Y

    2015-03-03

    Adaptations to divert the attacks of visually guided predators have evolved repeatedly in animals. Using high-speed infrared videography, we show that luna moths (Actias luna) generate an acoustic diversion with spinning hindwing tails to deflect echolocating bat attacks away from their body and toward these nonessential appendages. We pit luna moths against big brown bats (Eptesicus fuscus) and demonstrate a survival advantage of ∼ 47% for moths with tails versus those that had their tails removed. The benefit of hindwing tails is equivalent to the advantage conferred to moths by bat-detecting ears. Moth tails lured bat attacks to these wing regions during 55% of interactions between bats and intact luna moths. We analyzed flight kinematics of moths with and without hindwing tails and suggest that tails have a minimal role in flight performance. Using a robust phylogeny, we find that long spatulate tails have independently evolved four times in saturniid moths, further supporting the selective advantage of this anti-bat strategy. Diversionary tactics are perhaps more common than appreciated in predator-prey interactions. Our finding suggests that focusing on the sensory ecologies of key predators will reveal such countermeasures in prey.

  5. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example

    OpenAIRE

    Natoli, Christopher; Gramoli, Vincent

    2016-01-01

    In this paper, we identify a new form of attack, called the Balance attack, against proof-of-work blockchain systems. The novelty of this attack consists of delaying network communications between multiple subgroups of nodes with balanced mining power. Our theoretical analysis captures the precise tradeoff between the network delay and the mining power of the attacker needed to double spend in Ethereum with high probability. We quantify our probabilistic analysis with statistics taken from th...

  6. Speculative Attacks with Multiple Sources of Public Information

    OpenAIRE

    Cornand, Camille; Heinemann, Frank

    2005-01-01

    We propose a speculative attack model in which agents receive multiple public signals. It is characterised by its focus on an informational structure, which sets free from the strict separation between public information and private information. Diverse pieces of public information can be taken into account differently by players and are likely to lead to different appreciations ex post. This process defines players’ private value. The main result is to show that equilibrium uniqueness depend...

  7. A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

    OpenAIRE

    Li Qiang; Yang Ze-Ming; Liu Bao-Xu; Jiang Zheng-Wei

    2016-01-01

    With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain a...

  8. Vulnerability of advanced encryption standard algorithm to differential power analysis attacks implemented on ATmega-128 microcontroller

    CSIR Research Space (South Africa)

    Mpalane, Kealeboga

    2016-09-01

    Full Text Available A wide variety of cryptographic embedded devices including smartcards, ASICs and FPGAs must be secure against breaking in. However, these devices are vulnerable to side channel attacks. A side channel attack uses physical attributes...

  9. Didactical Design Enrichment of Angle in Geometry

    Science.gov (United States)

    Setiadi, D. R.; Suryadi, D.; Mulyana, E.

    2017-09-01

    The underlying problem of this research is the lack of student’s competencies in understanding the concept of angle in geometry as the results of the teaching and learning pattern that only to receive the topic rather than to construct the topic and has not paid attention to the learning trajectory. The purpose of this research is to develop the didactical design of angle in space learning activity. The used research method is a method of qualitative research in the form of a didactical design research through three phases of analysis i.e. didactical situation analysis, metapedadidactical analysis, and retrospective analysis, which conducted in students from 10th grade at one of private schools in Bandung. Based on the results of research and discussion, the didactical design that has been made, is capable to change student’s learning habit and quite capable to develop student’s competencies although not optimal.

  10. Analysing the Impact of a DDoS Attack Announcement on Victim Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud A.M.G.; Nieuwenhuis, Lambertus Johannes Maria

    2017-01-01

    DDoS attacks are increasingly used by 'hackers' and 'hacktivists' for various purposes. A number of on-line tools are available to launch an attack of significant intensity. These attacks lead to a variety of losses at the victim's end. We analyse the impact of Distributed Denial-of-Service (DDoS)

  11. A taxonomy and discussion of software attack technologies

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research

  12. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

    2017-01-01

    Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex

  13. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl

    DEFF Research Database (Denmark)

    Mendel, Florian; Rechberger, Christian; Schläffer, Martin

    2009-01-01

    of an inbound phase with a match-in-the-middle part to exploit the available degrees of freedom, and a subsequent probabilistic outbound phase. Especially on AES based hash functions, the rebound attack leads to new attacks for a surprisingly high number of rounds. We use the rebound attack to construct...

  14. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  15. On accurate determination of contact angle

    Science.gov (United States)

    Concus, P.; Finn, R.

    1992-01-01

    Methods are proposed that exploit a microgravity environment to obtain highly accurate measurement of contact angle. These methods, which are based on our earlier mathematical results, do not require detailed measurement of a liquid free-surface, as they incorporate discontinuous or nearly-discontinuous behavior of the liquid bulk in certain container geometries. Physical testing is planned in the forthcoming IML-2 space flight and in related preparatory ground-based experiments.

  16. Effect of impact angle on vaporization

    Science.gov (United States)

    Schultz, Peter H.

    1996-09-01

    Impacts into easily vaporized targets such as dry ice and carbonates generate a rapidly expanding vapor cloud. Laboratory experiments performed in a tenuous atmosphere allow deriving the internal energy of this cloud through well-established and tested theoretical descriptions. A second set of experiments under near-vacuum conditions provides a second measure of energy as the internal energy converts to kinetic energy of expansion. The resulting data allow deriving the vaporized mass as a function of impact angle and velocity. Although peak shock pressures decrease with decreasing impact angle (referenced to horizontal), the amount of impact-generated vapor is found to increase and is derived from the upper surface. Moreover, the temperature of the vapor cloud appears to decrease with decreasing angle. These unexpected results are proposed to reflect the increasing roles of shear heating and downrange hypervelocity ricochet impacts created during oblique impacts. The shallow provenance, low temperature, and trajectory of such vapor have implications for larger-scale events, including enhancement of atmospheric and biospheric stress by oblique terrestrial impacts and impact recycling of the early atmosphere of Mars.

  17. Security of differential-phase-shift quantum key distribution against individual attacks

    International Nuclear Information System (INIS)

    Waks, Edo; Takesue, Hiroki; Yamamoto, Yoshihisa

    2006-01-01

    We derive a proof of security for the differential-phase-shift quantum key distribution protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful

  18. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  19. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  20. Internal Friction Angle of Metal Powders

    Directory of Open Access Journals (Sweden)

    Jiri Zegzulka

    2018-04-01

    Full Text Available Metal powders are components with multidisciplinary usage as their application is very broad. Their consistent characterization across all disciplines is important for ensuring repeatable and trouble-free processes. Ten metal powders were tested in the study. In all cases, the particle size distribution and morphology (scanning electron microscope—SEM photos were determined. The aim of this work was to inspect the flow behavior of metal powders through another measured characteristic, namely the angle of internal friction. The measured values of the effective internal friction angle in the range 28.6–32.9°, together with the spherical particle shape and the particle size distribution, revealed the likely dominant mode of the metal particle transfer mechanism for stainless steel 316L, zinc and aluminum powder. This third piston flow mechanism is described and illustrated in detail. The angle of internal friction is mentioned as another suitable parameter for the characterization of metal powders, not only for the relative simplicity of the determination but also for gaining insight into the method of the movement of individual particles during the flow.

  1. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  2. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    Science.gov (United States)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  3. An Analysis of Media’s Role: Case Study of Army Public School (APS Peshawar Attack

    Directory of Open Access Journals (Sweden)

    Qureshi Rameesha

    2016-12-01

    Full Text Available The study aimed at analyzing the role of media during and after terrorist attacks by examining the media handling of APS Peshawar attack. The sample consisted of males and females selected on convenience basis from universities of Rawalpindi and Islamabad. It was hypothesized that (1 Extensive media coverage of terrorist attacks leads to greater publicity/recognition of terrorist groups (2 Media coverage of APS Peshawar attack increased fear and anxiety in public (3 Positive media handling/coverage of APS Peshawar attack led to public solidarity and peace. The results indicate that i Media coverage of terrorist attacks does help terrorist groups to gain publicity and recognition amongst public ii Media coverage of Aps Peshawar attack did not increase fear/anxiety in fact it directed the Pakistani nation towards public solidarity and peace.

  4. Human perception of the measurement of a network attack taxonomy in near real-time

    CSIR Research Space (South Africa)

    van Heerden, R

    2014-07-01

    Full Text Available apparent long after an attack and even then it is sometimes only speculation. For example, the Aggressor can not be determined in a near real-time environment and for some attacks the real power behind the attack is never determined or proven. 2.1 Actor...- tigating the accuracy of various assessment methods. We classify each class as either defined, high, low or not quantifiable. For example, it may not be possi- ble to determine the instigator of an attack (Aggressor), but only that the attack has been...

  5. New efficient utility upper bounds for the fully adaptive model of attack trees

    NARCIS (Netherlands)

    Buldas, Ahto; Lenin, Aleksandr

    2013-01-01

    We present a new fully adaptive computational model for attack trees that allows attackers to repeat atomic attacks if they fail and to play on if they are caught and have to pay penalties. The new model allows safer conclusions about the security of real-life systems and is somewhat

  6. On the security of Y-00 under fast correlation and other attacks on the key

    Science.gov (United States)

    Yuen, Horace P.; Nair, Ranjith

    2007-04-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization.

  7. On the security of Y-00 under fast correlation and other attacks on the key

    International Nuclear Information System (INIS)

    Yuen, Horace P.; Nair, Ranjith

    2007-01-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization

  8. Implant Angle Monitor System of MC3-II

    International Nuclear Information System (INIS)

    Sato, Fumiaki; Sano, Makoto; Nakaoka, Hiroaki; Fujii, Yoshito; Kudo, Tetuya; Nakanishi, Makoto; Koike, Masazumi; Fujino, Yasushi

    2008-01-01

    Precise implant angle control is required for the latest generation of ion implanters to meet further shrink semiconductor device requirements. Especially, the highest angle accuracy is required for Halo implant process of Logic devices. The Halo implant angle affects the device performance, because slight differences of beam divergence change the overlap profile towards the extension. Additionally, twist angle accuracy is demanded in case of channeling angle implant. Therefore monitoring beam angles and wafer twist angles is important. A new monitoring system for the MC3-II, SEN Corp.'s single wafer type medium current implanter has been developed. This paper describes the angle control performance and monitoring system of the MC3-II. For the twist angle control, we developed a wafer notch angle monitor. The system monitors the wafer notch image on the platen. And the notch angle variation is calculated by using image processing method. It is also able to adjust the notch angle according to the angle error. For the tilt angle control, we developed a vertical beam profile monitor. The monitor system can detect beam profile of vertical directions with horizontally scanning beam. It also measures beam angles of a tilt direction to a wafer. The system configuration and sample beam data are presented.

  9. 'Cryptogenic Drop Attacks' revisited: evidence of overlap with functional neurological disorder.

    Science.gov (United States)

    Hoeritzauer, Ingrid; Carson, Alan J; Stone, Jon

    2018-02-07

    In their 1973 BMJ paper 'Cryptogenic Drop Attacks', Stevens and Matthews described 40, mostly middle-aged, female patients with drop attacks of unknown cause. Although clinically common, there has been little on this topic since. We aimed to determine clinical features, comorbidity and outcome of patients with drop attacks. We carried out a retrospective review of patients with cryptogenic drop attacks seen consecutively by one clinician (JS) between 2006 and 2016. Demographics, phenomenology, duration and frequency of attacks, attack description and comorbid diagnoses were recorded. Patients were followed up with a notes review. 83 patients with cryptogenic drop attacks were predominantly female (89%, n=79), mean age 44  years. The majority (93%, n=77) could not remember the fall itself and almost half (43%, n=36) experienced prodromal dissociative symptoms. Mechanical trips or syncope preceded drop attacks, historically, in 24% (n=20) of cases. Persistent fatigue (73%, n=61), chronic pain (40%, n=33), functional limb weakness (31%,n=26) and dissociative (non-epileptic) attacks 28% (n=23) were common, with the latter usually preceding or emerging from drop attacks. At follow-up (88%, mean 38 months), 28% (n=23) had resolution of their drop attacks. Predisposing (but non-causative) disease comorbidity was found at baseline (n=12) and follow-up (n=5). Cryptogenic drop attacks are associated with high frequency of comorbid functional somatic and functional neurological disorders. Patients commonly have prodromal dissociative symptoms and in some there was a clear relationship with prior or subsequent dissociative (non-epileptic) attacks. Some cryptogenic drop attacks may be best understood as phenomena on the spectrum of dissociative attacks. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  10. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  11. Incidence and impact of dog attacks on guide dogs in the UK.

    Science.gov (United States)

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  12. Nonlinear analysis of NPP safety against the aircraft attack

    International Nuclear Information System (INIS)

    Králik, Juraj; Králik, Juraj

    2016-01-01

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  13. Nonlinear analysis of NPP safety against the aircraft attack

    Energy Technology Data Exchange (ETDEWEB)

    Králik, Juraj, E-mail: juraj.kralik@stuba.sk [Faculty of Civil Engineering, STU in Bratislava, Radlinského 11, 813 68 Bratislava (Slovakia); Králik, Juraj, E-mail: kralik@fa.stuba.sk [Faculty of Architecture, STU in Bratislava, Námestie Slobody 19, 812 45 Bratislava (Slovakia)

    2016-06-08

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  14. Performance of diamond and point attack coal cutter picks

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Y. [CSIRO, Brisbane, Qld. (Australia). Division of Exploration and Mining

    1996-12-31

    This paper presents results of laboratory experiments and field trials of PDC (Polycrystalline Diamond Compact) and PA (Point Attack) coal cutter picks. Laboratory cutting tests included linear rock and coal cutting and turning rock cutting. The following parameters were measured to assess performance of PDC and PA cutter picks: cutting force, normal force, specific energy consumption, yield, dust generation and ignitional characteristics (temperature rise). Field trials were conducted on a longwall shearer. Performance of both types of pick interims of pick life and dust generation were assessed. 3 refs., 18 figs., 3 tabs.

  15. Research on recognition of ramp angle based on transducer

    Directory of Open Access Journals (Sweden)

    Wenhao GU

    2015-12-01

    Full Text Available Focusing on the recognition of ramp angle, the relationship between the signal of vehicle transducer and real ramp angle is studied. The force change of vehicle on the ramp, and the relationship between the body tilt angle and front and rear suspension scale is discussed. According to the suspension and tire deformation, error angle of the ramp angle is deduced. A mathematical model is established with Matlab/Simulink and used for simulation to generate error curve of ramp angle. The results show that the error angle increases with the increasing of the ramp angle, and the limit value can reach 6.5%, while the identification method can effectively eliminate this error, and enhance the accuracy of ramp angle recognition.

  16. Error function attack of chaos synchronization based encryption schemes.

    Science.gov (United States)

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.

  17. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  18. Angle of arrival estimation using spectral interferometry

    International Nuclear Information System (INIS)

    Barber, Z.W.; Harrington, C.; Thiel, C.W.; Babbitt, W.R.; Krishna Mohan, R.

    2010-01-01

    We have developed a correlative signal processing concept based on a Mach-Zehnder interferometer and spatial-spectral (S2) materials that enables direct mapping of RF spectral phase as well as power spectral recording. This configuration can be used for precise frequency resolved time delay estimation between signals received by a phased antenna array system that in turn could be utilized to estimate the angle of arrival. We present an analytical theoretical model and a proof-of-principle demonstration of the concept of time difference of arrival estimation with a cryogenically cooled Tm:YAG crystal that operates on microwave signals modulated onto a stabilized optical carrier at 793 nm.

  19. Angle of arrival estimation using spectral interferometry

    Energy Technology Data Exchange (ETDEWEB)

    Barber, Z.W.; Harrington, C.; Thiel, C.W.; Babbitt, W.R. [Spectrum Lab, Montana State University, Bozeman, MT 59717 (United States); Krishna Mohan, R., E-mail: krishna@spectrum.montana.ed [Spectrum Lab, Montana State University, Bozeman, MT 59717 (United States)

    2010-09-15

    We have developed a correlative signal processing concept based on a Mach-Zehnder interferometer and spatial-spectral (S2) materials that enables direct mapping of RF spectral phase as well as power spectral recording. This configuration can be used for precise frequency resolved time delay estimation between signals received by a phased antenna array system that in turn could be utilized to estimate the angle of arrival. We present an analytical theoretical model and a proof-of-principle demonstration of the concept of time difference of arrival estimation with a cryogenically cooled Tm:YAG crystal that operates on microwave signals modulated onto a stabilized optical carrier at 793 nm.

  20. The art of survival after an atomic attack

    International Nuclear Information System (INIS)

    Haarland, C.M.; Chester, C.V.; Wigner, E.P.

    1978-01-01

    Carsten M. Haarland, Conrad V. Chester and Eugene P. Wigner have been appointed by the American civil protection service to look into the question of how one may protect the providently evacuated population and supply the latter with food, water and other essential goods after a nuclear attack on military and industrial targets, as well as on living areas. The report of the three US scientists is over 200 pages long. Extracts from the concluding chapter are given here whose translation first appeared in the information leaflet Nr. 268/77 of the International Organisation for Civil Defence, Geneva. (orig.) [de

  1. Malaria parasite evasion of classical complement pathway attack

    DEFF Research Database (Denmark)

    Larsen, Mads Delbo; Ditlev, Sisse; Olmos, Rafael Bayarri

    2017-01-01

    of the protective antibodies that are gradually acquired in response to P. falciparum-IEs. Although this response is dominated by IgG1 and IgG3, complement-mediated attack following activation of the classical pathway does not appear to be a major effector mechanism. We hypothesized that this is related to the knob...... is that the knob-restricted expression of PfEMP1 on the IE surface may serve as a hitherto unappreciated immune evasion mechanism employed by P. falciparum parasites....

  2. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  3. Development of Cyber-attack Risk Assessment Model for Nuclear Power Plants

    International Nuclear Information System (INIS)

    Park, Jong Woo; Lee, Seung Jun

    2017-01-01

    In this work, a risk evaluation method to identify significant cyber-attack scenarios and important components which should be defensed was proposed based on the probabilistic safety assessment (PSA) method which is widely used for evaluating risk of NPPs. NPPs adopting digital systems have been facing the risk of cyber-attacks. To develop efficient and reasonable defense strategy, it is required to identify significant cyber-attack scenarios and important components because there are huge number of critical digital assets in an NPP. By evaluating the risk of cyber-attack, the risk-informed defense strategies against cyber-attack could be suggested. In this work, the method to identify important cyber-attack scenarios and to evaluate the quantitative risk caused by cyber-attacks was proposed. For a future study, more feasible scenarios will be analyzed and additional modifications will be made in the model if necessary.

  4. Simulating effectiveness of helicopter evasive manoeuvres to RPG attack

    Science.gov (United States)

    Anderson, D.; Thomson, D. G.

    2010-04-01

    The survivability of helicopters under attack by ground troops using rocket propelled grenades has been amply illustrated over the past decade. Given that an RPG is unguided and it is infeasible to cover helicopters in thick armour, existing optical countermeasures are ineffective - the solution is to compute an evasive manoeuvre. In this paper, an RPG/helicopter engagement model is presented. Manoeuvre profiles are defined in the missile approach warning sensor camera image plane using a local maximum acceleration vector. Required control inputs are then computed using inverse simulation techniques. Assessments of platform survivability to several engagement scenarios are presented.

  5. Effect of laser peripheral iridotomy on anterior chamber angle anatomy in primary angle closure spectrum eyes

    Science.gov (United States)

    Kansara, Seema; Blieden, Lauren S.; Chuang, Alice Z.; Baker, Laura A.; Bell, Nicholas P.; Mankiewicz, Kimberly A.; Feldman, Robert M.

    2015-01-01

    Purpose To evaluate the change in trabecular-iris circumference volume (TICV) after laser peripheral iridotomy (LPI) in primary angle closure (PAC) spectrum eyes Patients and Methods Forty-two chronic PAC spectrum eyes from 24 patients were enrolled. Eyes with anterior chamber abnormalities affecting angle measurement were excluded. Intraocular pressure, slit lamp exam, and gonioscopy were recorded at each visit. Anterior segment optical coherence tomography (ASOCT) with 3D mode angle analysis scans were taken with the CASIA SS-1000 (Tomey Corp., Nagoya, Japan) before and after LPI. Forty-two pre-LPI ASOCT scans and 34 post-LPI ASOCT scans were analyzed using the Anterior Chamber Analysis and Interpretation (ACAI, Houston, TX) software. A mixed-effect model analysis was used to compare the trabecular-iris space area (TISA) changes among 4 quadrants, as well as to identify potential factors affecting TICV. Results There was a significant increase in all average angle parameters after LPI (TISA500, TISA750, TICV500, and TICV750). The magnitude of change in TISA500 in the superior angle was significantly less than the other angles. The changes in TICV500 and TICV750 were not associated with any demographic or ocular characteristics. Conclusion TICV is a useful parameter to quantitatively measure the effectiveness of LPI in the treatment of eyes with PAC spectrum disease. PMID:26066504

  6. Two consistent calculations of the Weinberg angle

    International Nuclear Information System (INIS)

    Fairlie, D.B.

    1979-01-01

    The Weinberg-Salam theory is reformulated as a pure Yang-Mills theory in a six-dimensional space, the Higgs field being interpreted as gauge potentials in the additional dimensions. Viewed in this way, the condition that the Higgs field transforms as a U(1) representation of charge one is equivalent to requiring a value of 30 0 C for the Weinberg angle. A second consistent determination comes from the idea borrowed from monopole theory that the electromagnetic field is in the direction of the Higgs field. (Author)

  7. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  8. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  9. Risks of cyber attacks on financial audit activity

    Directory of Open Access Journals (Sweden)

    Gheorghe N. Popescu

    2018-02-01

    Full Text Available Simultaneously with increasing the speed and precision of data processing, multiple connectivity, fast transmission over long distances, and their results, the development and generalization of automatic processing, brought many new vulnerabilities and deficiencies, otherwise inevitable, the basis of new risk categories. The risks of cyber attacks on financial auditing involve the risk management of information systems security. Identifying, mitigating or eliminating the effects are mandatory requirements without which a high-quality financial audit can not be achieved in a highly computerized environment. To substantiate specific risk management actions on information systems security, in this study we analyzed the main types and techniques used in cyber attacks by making their radiography, identifying the strengths and weaknesses of new technologies and systems that are or not favoring security systems. At the same time, we analyzed the security system of an information system, organized it in layers, and revealed the specific areas for the security evaluation of the Mehari method. Finally, some of the results of a survey based on a questionnaire made with the support of master students of the "Information Systems Audit and Control" course were revealed, with three of the most common weaknesses identified for each security domain.

  10. Joining by plating: optimization of occluded angle

    International Nuclear Information System (INIS)

    Dini, J.W.; Johnson, H.R.; Kan, Y.R.

    1978-11-01

    An empirical method has been developed for predicting the minimum angle required for maximum joint strength for materials joined by plating. This is done through a proposed power law failure function, whose coefficients are taken from ring shear and conical head tensile data for plating/substrate combinations and whose exponent is determined from one set of plated-joint data. Experimental results are presented for Al-Ni-Al (7075-T6) and AM363-Ni-AM363 joints, and the failure function is used to predict joint strengths for Al-Ni-Al (2024-T6), UTi-Ni-UTi, and Be-Ti-Be

  11. Contact angles of liquid metals on quasicrystals

    International Nuclear Information System (INIS)

    Bergman, Claire; Girardeaux, Christophe; Perrin-Pellegrino, Carine; Gas, Patrick; Dubois, Jean-Marie; Rivier, Nicolas

    2008-01-01

    Wetting with μm-sized Pb droplets on thin polycrystalline films of decagonal Al 13 Co 4 is reported. The films were prepared under high vacuum conditions in order to have Pb droplets lying on a clean surface. The method used is sequential deposition and annealing of specific stackings of Al and Co layers of nanometric thicknesses. A 300 nm thick Pb slab was then deposited on top of the films and dewetting experiments were followed in situ in a scanning Auger microprobe. The contact angle between the Pb droplet and the surface of the film is measured to be 49 deg. ± 7 deg. Further investigation performed by cross section transmission electron microscopy allows us to better characterize the interface. Taking into account the rugosity of the film, it is concluded that there is partial wetting of the film, which corresponds to a smaller contact angle. The comparison with other results obtained either with pure metals or with a cubic AlCo compound leads to the conclusion that the wetting behaviour of Pb on the surface of a decagonal compound is close to that of a metal with a high melting point and not significantly different from that of a crystalline compound with a small unit cell

  12. Robustness of Dengue Complex Network under Targeted versus Random Attack

    Directory of Open Access Journals (Sweden)

    Hafiz Abid Mahmood Malik

    2017-01-01

    Full Text Available Dengue virus infection is one of those epidemic diseases that require much consideration in order to save the humankind from its unsafe impacts. According to the World Health Organization (WHO, 3.6 billion individuals are at risk because of the dengue virus sickness. Researchers are striving to comprehend the dengue threat. This study is a little commitment to those endeavors. To observe the robustness of the dengue network, we uprooted the links between nodes randomly and targeted by utilizing different centrality measures. The outcomes demonstrated that 5% targeted attack is equivalent to the result of 65% random assault, which showed the topology of this complex network validated a scale-free network instead of random network. Four centrality measures (Degree, Closeness, Betweenness, and Eigenvector have been ascertained to look for focal hubs. It has been observed through the results in this study that robustness of a node and links depends on topology of the network. The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. Moreover, representation of this network has been projected, and hub removal impact has been shown on the real map of Gombak (Malaysia.

  13. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    Science.gov (United States)

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  14. NORMAL AXIAL ANGLES OF THE KNEE JOINT IN ADULT ...

    African Journals Online (AJOL)

    hi-tech

    2003-08-01

    Aug 1, 2003 ... Conclusion: Our study has demonstrated comparative variations in means and ranges of normal axial angles .... population was significantly different from the mean ... case, however, the angle also exhibits racial variations.

  15. Root deformation reduces tolerance of lodgepole pine to attack by Warren root collar weevil.

    Science.gov (United States)

    Robert, Jeanne A; Lindgren, B Staffan

    2010-04-01

    Surveys were conducted on regenerating stands of lodgepole pine to determine the relationship between root deformation and susceptibility to attack by the Warren root collar weevil, Hylobius warreni Wood. The total number of trees attacked by H. warreni did not differ between planted and natural trees. A matched case-control logistic regression suggested that root cross-sectional area was more important in predicting weevil attack for naturally regenerated trees than for planted trees, but weevils were associated with a larger reduction in height-to-diameter ratios for trees with planted root characteristics than for trees with natural root form. Neither the stability of attacked versus unattacked trees differed significantly and there was no significant interaction of weevil attack and tree type, but weevil-killed trees had different root characteristics than alive, attacked trees. Lateral distribution and root cross-sectional area were significant predictors of alive attacked trees versus weevil-killed trees, suggesting that trees with poor lateral spread or poor root cross-sectional area are more likely to die from weevil attack. We conclude that root deformation does not necessarily increase susceptibility to attack but may increase the likelihood of mortality. Thus, measures to facilitate good root form are needed when planting pine in areas with high risk of Warren root collar weevil attack.

  16. Measuring the effectiveness of SDN mitigations against cyber attacks

    NARCIS (Netherlands)

    Koning, R.; de Graaff, B.; Meijer, R.; de Laat, C.; Grosso, P.

    2017-01-01

    To address increasing problems caused by cyber attacks, we leverage Software Defined networks and Network Function Virtualisation governed by a SARNET-agent to enable autonomous response and attack mitigation. A Secure Autonomous Response Network (SARNET) uses a control loop to constantly assess the

  17. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  18. The impact of inlet angle and outlet angle of guide vane on pump in reversal based hydraulic turbine performance

    International Nuclear Information System (INIS)

    Shi, F X; Yang, J H; Wang, X H; Zhang, R H; Li, C E

    2012-01-01

    In this paper, in order to research the impact of inlet angle and outlet angle of guide vane on hydraulic turbine performance, a centrifugal pump in reversal is adopted as turbine. A numerical simulation method is adopted for researching outer performance and flow field of turbine. The results show: inlet angle has a crucial role to turbine, to the same flow, there is a noticeable decline for the efficiency and head of turbine with the inlet angle increases. At the best efficiency point(EFP),to a same inlet angle, when the inlet angle greater than inlet angle, velocity circulation in guide vane outlet decreases, which lead the efficiency of turbine to reduce, Contrarily, the efficiency rises. With the increase of inlet angle and outlet angle, the EFP moves to the big flow area and the uniformity of pressure distribution becomes worse. The paper indicates that the inlet angle and outlet angle have great impact on the turbine performance, and the best combination exists for the inlet angle and outlet angle of the guide vane.

  19. Measurement of Angle Kappa Using Ultrasound Biomicroscopy and Corneal Topography.

    Science.gov (United States)

    Yeo, Joon Hyung; Moon, Nam Ju; Lee, Jeong Kyu

    2017-06-01

    To introduce a new convenient and accurate method to measure the angle kappa using ultrasound biomicroscopy (UBM) and corneal topography. Data from 42 eyes (13 males and 29 females) were analyzed in this study. The angle kappa was measured using Orbscan II and calculated with UBM and corneal topography. The angle kappa of the dominant eye was compared with measurements by Orbscan II. The mean patient age was 36.4 ± 13.8 years. The average angle kappa measured by Orbscan II was 3.98° ± 1.12°, while the average angle kappa calculated with UBM and corneal topography was 3.19° ± 1.15°. The difference in angle kappa measured by the two methods was statistically significant (p topography to calculate the angle kappa. This method is convenient to use and allows for measurement of the angle kappa without an expensive device. © 2017 The Korean Ophthalmological Society

  20. Angle-independent structural colors of silicon

    DEFF Research Database (Denmark)

    Højlund-Nielsen, Emil; Weirich, Johannes; Nørregaard, Jesper

    2014-01-01

    Structural colors are optical phenomena of physical origin, where microscale and nanoscale structures determine the reflected spectrum of light. Artificial structural colors have been realized within recent years. However, multilayer structures require substantial fabrication. Instead we considered...... one-layer surface textures of silicon.We explored four patterns of square structures in a square lattice with periods of 500, 400, 300, and 200 nm. The reflectivity and daylight-colors were measured and compared with simulations based on rigorously coupledwave analysis with excellent agreement. Based...... on the 200-nm periodic pattern, it was found that angle-independent specular colors up to 60 deg of incidence may be provided. The underlying mechanisms include (1) the suppression of diffraction and (2) a strong coupling of light to localized surface states. The strong coupling yields absorption anomalies...

  1. Vascular anomalies of the cerebellopontine angle

    International Nuclear Information System (INIS)

    Papanagiotou, P.; Grunwald, I.Q.; Politi, M.; Struffert, T.; Ahlhelm, F.; Reith, W.

    2006-01-01

    Vascular anomalies of the cerebellopontine angle are rare compared to tumors in this area. Irritation of the trigeminal, facial, or vestibulocochlear nerve may cause trigeminal neuralgia, hemifacial spasm and vertigo, or tinnitus accordingly. Vessel loops in the cerebellopontine cisterns may cause compression at the root entry or exit zone of the cranial nerves V, VII, and VIII, a phenomenon which is called ''vascular loop syndrome.'' Megadolichobasilar artery and aneurysms of the vertebrobasilar system can also lead to dislocation and compression of the cranial nerves and brain stem. Three-dimensional CISS MR imaging and MR angiography are useful in the detection of neurovascular compression. Microvascular decompression is an effective surgical procedure in the management of compression syndromes of the cranial nerves V, VII, and VIII. (orig.) [de

  2. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  3. Angle parameter changes of phacoemulsification and combined phacotrabeculectomy for acute primary angle closure

    Directory of Open Access Journals (Sweden)

    Shi-Wei Li

    2015-08-01

    Full Text Available AIM: To evaluate the difference in angle parameters and clinical outcome following phacoemulsification and combined phacotrabeculectomy in patients with acute primary angle closure (APAC using ultrasound biomicroscopy (UBM.METHODS: Patients (n=23, 31 eyes were randomized to receive phacoemulsification or combined phacotrabeculectomy (n=24, 31 eyes. Best-corrected visual acuity (BCVA, intraocular pressure (IOP, the main complications following surgery, and indentation gonioscopy and angle parameters measured using UBM were documented preoperatively and postoperatively.RESULTS:The improvement in BCVA in the phacoemulsification group was significantly greater than in the combined group (P<0.05. IOP in the phacoemulsification group was slightly higher than in the combined group following 1wk of follow-up (P<0.05, whereas there was no significant difference between the two groups at the latter follow-up (P>0.05. Phacoemulsification alone resulted in a slight increase in the trabecular ciliary processes distance compared with the combined surgery (P<0.05, whereas the other angle parameters showed no significant difference between the groups. Complications in combined group were greater than phacoemulsification only group.CONCLUSION:Both surgeries effectively opened the drainage angle and deepened the anterior chamber, and IOP was well controlled postoperatively. However, phacoemulsification showed better efficacy in improving visual function and showed reduced complications following surgery.

  4. A study on the mechanism of speculative attack and the defence strategy of the central bank.

    Directory of Open Access Journals (Sweden)

    Chang-Hyun Yun

    1999-09-01

    Full Text Available We first analyze the concrete mechanism of speculative attack on the foreign exchange market which became very prevalent phenomena during the foreign exchange crisis. When the central bank of the domestic country tries to defend the attack by increasing the interest rate, some problems can arise in that the speculative attacks through foreign exchange options market and/or index futures markets can be very successful due to that policy. So the central bank should pay much attention to the microstructure of the financial markets when the defence strategy against speculative attack is determined.

  5. Detection and Modeling of Cyber Attacks with Petri Nets

    Directory of Open Access Journals (Sweden)

    Bartosz Jasiul

    2014-12-01

    Full Text Available The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process can be performed either by matching their digital signatures or analyzing their behavioral models. As the obfuscation techniques make the malware almost undetectable, the classic signature-based anti-virus tools must be supported with behavioral analysis. The proposed approach to modeling of malware behavior is based on colored Petri nets. This article is addressed to cyber defense researchers, security architects and developers solving up-to-date problems regarding the detection and prevention of advanced persistent threats.

  6. DoS attacks targeting SIP server and improvements of robustness

    OpenAIRE

    Vozňák, Miroslav; Šafařík, Jakub

    2012-01-01

    The paper describes the vulnerability of SIP servers to DoS attacks and methods for server protection. For each attack, this paper describes their impact on a SIP server, evaluation of the threat and the way in which they are executed. Attacks are described in detail, and a security precaution is made to prevent each of them. The proposed solution of the protection is based on a specific topology of an intrusion protection systems components consisting of a combination of...

  7. Estimates of md-mu and left-angle bar dd right-angle -left-angle bar uu right-angle from QCD sum rules for D and D* isospin mass differences

    International Nuclear Information System (INIS)

    Eletsky, V.L.; Ioffe, B.L.

    1993-01-01

    The recent experimental data on D +- D0 and D *+- D*0 mass differences are used as inputs in the QCD sum rules to obtain new estimates on the mass difference of light quarks and on the difference of their condensates: m d -m u =3±1 MeV, left-angle bar dd right-angle -left-angle bar uu right-angle=-(2.5±1)x10 -3 left-angle bar uu right-angle (at a standard normalization point, μ=0.5 GeV)

  8. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  9. Diffusion Weighted Imaging in Acute Attacks of Multiple Sclerosis

    International Nuclear Information System (INIS)

    Davoudi, Yasmin; Foroughipour, Mohsen; Torabi, Reza; Layegh, Parvaneh; Matin, Nassim; Shoeibi, Ali

    2016-01-01

    Multiple sclerosis (MS) is one of the most common autoimmune disorders of the central nervous system. In spite of various imaging modalities, the definitive diagnosis of MS remains challenging. This study was designed to evaluate the usefulness of diffusion weighted imaging (DWI) in the diagnosis of acute MS attack and to compare its results with contrast enhanced MRI (CE-MRI). In this cross sectional study, seventy patients with definite diagnosis of relapsing-remitting MS were included. CE-MRI using 0.1 mmol/kg gadolinium as well as DWI sequences were performed for all patients. The percentage of patients with positive DWI was compared with the results of CE-MRI and the consistency between the two imaging modalities was evaluated. Moreover, the relationship between the time of onset of patient’s symptoms and test results for both methods were investigated. CE-MRI yielded positive results for 61 (87%) patients and DWI yielded positive for 53 (76%) patients. In fifty patients (71.42%), both tests were positive and in six cases (8.57%), both were negative. The test results of three patients turned out to be positive in DWI, while they tested negative in CE-MRI. There was no significant relationship between the results of CE-MRI as well as DWI and the time of imaging from the onset of symptoms. These data indicate that while CE-MRI will depict more positive results, there are cases in which DWI will show a positive result while CE-MRI is negative. We suggest that the combination of these two imaging modalities might yield more positive results in diagnosing acute MS attack giving rise to a more accurate diagnosis

  10. September 11th, an attack at the limits of thought.

    Science.gov (United States)

    Patalano, Roberta

    2017-10-01

    The paper deals with imagination and its failures from a psychoanalytic perspective. We offer a definition of imagination failures and suggest how they can be interpreted as an opportunity to learn from experience. In order to show that the topic has a concrete and not only speculative significance we consider the public report on September 11 as a case study. The report was published by the National Commission on Terrorist Attacks Upon the United States after a long investigation of the facts and circumstances relating to the September 11 attacks. The document has been the object of strong criticisms, as we argue in the paper. Both the document and some of the critiques that it received focus, however, on significant aspects of the debate about imagination, such us the fragility of imaginative thought, its dependence on unconscious desires and its plurality of outcomes: a plethora of imaginaries can in fact be developed at any time, from the same set of information about reality. We comment on these aspects and reinterpret them from a Bionian perspective. The concepts of 'unthinkability', 'imagination failure' and 'depressive position' are used to inform the necessity of dealing with an evolving and conflictual geopolitical scenario. Particular attention is paid to the proposal of 'routinizing, even bureaucratizing, the exercise of imagination' within the institutions that deal with National Defense. This possibility is discussed in depth in order to suggest how it may be concretely implemented. In conclusion, a strong case is made for the usefulness of psychoanalytic reflection in the arena of relationships among countries, with particular emphasis on the new terrorist challenges. Copyright © 2016 Institute of Psychoanalysis.

  11. Army Attack Aviation Returning to the Close Fight: Impact of the MOUT Environment

    National Research Council Canada - National Science Library

    Tate, Frank

    2001-01-01

    .... attack helicopters and their employment, an analysis of the modern threat environment which indicates a strong likelihood of fighting in urban environments, a review of existing aviation doctrine...

  12. RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy

    OpenAIRE

    Li, Peng; Xu, Chao; Chen, Long; Wang, Ruchuan

    2015-01-01

    Evaluation of security risks in radio frequency identification (RFID) systems is a challenging problem in Internet of Things (IoT). This paper proposes an extended attack tree (EAT) model to identify RFID system’s flaws and vulnerabilities. A corresponding formal description of the model is described which adds a probability SAND node together with the probability attribute of the node attack. In addition, we model the process of an RFID data privacy attack based on EAT, taking a sensitive in...

  13. Protection of Microkernel Environment L4Re from Stack-smashed Attacks

    OpenAIRE

    Vasily Andreevich Sartakov; Alexander Sergeevich Tarasikov

    2014-01-01

    Microkernel-based operating systems provide high level of protection due to the strong isolation of components, small size of Trusted Computing Base and execution of drivers in user space. At the same time, such systems are vulnerable to a stack overflow attacks, because these attacks exploit the hardware features of the platform, such as shared memory space for data and code. Modern architectures, such as AMD64 and ARM, provide opportunities to counteract attacks at the hardware level by dis...

  14. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  15. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  16. Oxidative Attack of Carbon/Carbon Substrates through Coating Pinholes

    Science.gov (United States)

    Jacobson, Nathan S.; Leonhardt, Todd; Curry, Donald; Rapp, Robert A.

    1998-01-01

    A critical issue with oxidation protected carbon/carbon composites used for spacecraft thermal protection is the formation of coating pinholes. In laboratory experiments, artificial pinholes were drilled through SiC-coatings on a carbon/carbon material and the material was oxidized at 600, 1000, and 1400 C at reduced pressures of air. The attack of the carbon/carbon was quantified by both weight loss and a novel cross-sectioning technique. A two-zone, one dimensional diffusion control model was adapted to analyze this problem. Agreement of the model with experiment was reasonable at 1000 and 1400 C; however results at lower temperatures show clear deviations from the theory suggesting that surface reaction control plays a role.

  17. Ten helical twist angles of B-DNA

    Energy Technology Data Exchange (ETDEWEB)

    Kabsch, W; Sander, C; Trifonov, E N

    1982-01-01

    On the assumption that the twist angles between adjacent base-pairs in the DNA molecule are additive a linear system of 40 equations was derived from experimental measurements of the total twist angles for different pieces of DNA of known sequences. This system of equations is found to be statistically consistent providing a solution for all ten possible twist angles of B-DNA by a least squares fitting procedure. Four of the calculated twist angles were not known before. The other six twist angles calculated are very close to the experimentally measured ones. The data used were obtained by the electrophoretic band-shift method, crystallography and nuclease digestion of DNA adsorbed to mica or Ca-phosphate surface. The validity of the principle of additivity of the twist angles implies that the angle between any particular two base-pairs is a function of only these base-pairs, independent of nearest neighbors.

  18. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  19. Evaluation of Seizure Attacks in Patients with Cerebrovascular Accident

    Directory of Open Access Journals (Sweden)

    Ebrahim Koochaki

    2013-04-01

    Full Text Available Background: The most common reason for seizure in elderly duration is the stroke. This study was conducted aiming to assess the frequency of seizure attack occurrence in those patients. Materials and Methods: This investigation was carried out through a cross-sectional method for one year on 330 patients admitted to the neurology ward as diagnosed with stroke. The required data was collected through the researcher-made questionnaire from the patients suffering from stoke which was diagnosed based on clinical findings, CT-Scan and MRI as required. Results: Among 330 patient suffering from stroke (162 men and 168 women, 48 cases (14.5% were suffering from seizure. Six percent of the patients had early seizure and another 8.5% had late seizure. Among 162 men suffering from the stroke, 32 ones were without seizures and 30 men were suffering the seizure. A number of 150 women out of total 168 ones suffering from the stroke, had no seizure and 18 others had seizures; frequency of seizure occurrence was more in male samples (p=0.044. In the people under 60 year, there were mostly early types of seizure (45% and in the age range above 60 year, it was mostly late type (89.3%. A 68.5% of the patients suffering from the seizure had experienced ischemic stroke. However, the frequency of seizure occurrence in the patients with hemorrhagic stroke was statistically greater (p=0.003. Conclusion: This examination showed that occurrence of seizure attacks in the people with stroke is 14.5% and it is seen more in the hemorrhagic strokes than ischemic ones. The frontoparietal area is the most common location involved and tonic clonic was the most common seizure in the patients suffering from it who have experienced the stroke

  20. Random Access Performance of Distributed Sensors Attacked by Unknown Jammers

    Directory of Open Access Journals (Sweden)

    Dae-Kyo Jeong

    2017-11-01

    Full Text Available In this paper, we model and investigate the random access (RA performance of sensor nodes (SN in a wireless sensor network (WSN. In the WSN, a central head sensor (HS collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if they are friendly jammers generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS and simply induces denial of service (DoS without any need to hack HS or SNs. On the other hand, code jammers mimic legitimate SNs by sending fake signals and thus need to know certain system parameters that are used by the legitimate SNs. As a result of code jamming, HS falsely allocates radio resources to SNs. The code jamming hence increases the failure probability in sending the information messages, as well as misleads the usage of radio resources. In this paper, we present the probabilities of successful preamble transmission with power ramping according to the jammer types and provide the resulting throughput and delay of information transmission by SNs, respectively. The effect of two jamming attacks on the RA performances is compared with numerical investigation. The results show that, compared to RA without jammers, power and code jamming degrade the throughput by up to 30.3% and 40.5%, respectively, while the delay performance by up to 40.1% and 65.6%, respectively.

  1. Investigating the effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant

    OpenAIRE

    GENGE BELA; SIATERLIS CHRISTOS

    2011-01-01

    The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of these systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we use our previously developed framework to study the effects of coordinated cyber attacks against NICS. Coordinated attacks rely on several infected hosts to disrupt the ...

  2. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    Science.gov (United States)

    Moxon, R; Whiteside, H; England, G C W

    2016-04-09

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being. British Veterinary Association.

  3. Investigation of digestion Kinetics in commercial starches using in-situ small-angle neutron scattering

    International Nuclear Information System (INIS)

    Blazek, Jaroslav; Gilbert, Elliot Paul

    2009-01-01

    Full text: The digestion of starch has been the subject of many investigations, mostly involving in vitro measurement of the susceptibility of starches to attack by different enzymes, rather than measuring actual digestibility in vivo. The rate and extent of amylolytic hydrolysis of granular starches is known to vary according to botanical origin. Granule characteristics considered to influence susceptibility to attack by alpha-amylase include crystallinity, granule size and available specific surface, amylose content, porosity, structural inhomogeneities and degree of integrity. Most in-vitro studies of granular starch digestion have been limited to samples for which aliquots have been removed from the reaction mixture at various time intervals and freeze-dried to be subsequently characterized using a range of techniques. It remains unclear whether sample preparation creates artefacts in the samples. In this study, we have studied the kinetics of starch digestion of several commercial granular starches by time-resolved small-angle neutron scattering using an in-situ digestion chamber allowing, for the first time, to follow structural changes of starch in the course of digestion directly in the digestion mixture. Additionally, samples before and after digestion were studied by x-ray diffraction, small-angle x-ray scattering, differential scanning calorimetry and microscopy. Microscopy revealed that studied starches, which varied in their amylose content and digestion kinetics, followed different modes of attack The multidisciplinary approach allowed the nanostructural changes detected by small-angle scattering in the course of enzymic breakdown to be correlated with changes in crystallinity and functional properties.

  4. Study of DSR and AODV under Sinkhole Attack and Its Proposed Prevention Technique

    OpenAIRE

    Winnie Main; Narendra M. Shekokar

    2014-01-01

    Mobile Ad-hoc Networks (MANET) are wireless mobile nodes that communicate without any predefined infrastructure. This allows MANETs to be easily setup in geographical and terrestrial constraints. To achieve this kind of communication MANET routing protocols play an important role. Two routing protocols, DSR and AODV are studied in detail. This basic trait of a MANET makes its routing protocols very vulnerable to security attacks. One such attack is the ‘Sinkhole’ attack which ...

  5. Dilemma of gonial angle measurement: Panoramic radiograph or lateral cephalogram

    Energy Technology Data Exchange (ETDEWEB)

    Radhakrishnan, Pillai Devu; Varma, Nilambur Kovilakam Sapna; Ajith, Vallikat Velath [Dept. of Orthodontics, Amrita School of Dentistry, Kochi (India)

    2017-06-15

    The purpose of this study was to evaluate the accuracy of panoramic imaging in measuring the right and left gonial angles by comparing the measured angles with the angles determined using a lateral cephalogram of adult patients with class I malocclusion. The gonial angles of 50 class I malocclusion patients (25 males and 25 females; mean age: 23 years) were measured using both a lateral cephalogram and a panoramic radiograph. In the lateral cephalograms, the gonial angle was measured at the point of intersection of the ramus plane and the mandibular plane. In the panoramic radiographs, the gonial angle was measured by drawing a line tangent to the lower border of the mandible and another line tangent to the distal border of the ascending ramus and the condyle on both sides. The data obtained from both radiographs were statistically compared. No statistically significant difference was observed between the gonial angle measured using the lateral cephalograms and that determined using the panoramic radiographs. Further, there was no statistically significant difference in the measured gonial angle with respect to gender. The results also showed a statistically insignificant difference in the mean of the right and the left gonial angles measured using the panoramic radiographs. As the gonial angle measurements using panoramic radiographs and lateral cephalograms showed no statistically significant difference, panoramic radiography can be considered in orthodontics for measuring the gonial angle without any interference due to superimposed images.

  6. The Effect of Suture Anchor Insertion Angle on Calcaneus Pullout Strength: Challenging the Deadman's Angle.

    Science.gov (United States)

    Weiss, William M; Saucedo, Ramon P; Robinson, John D; Lo, Chung-Chieh Jason; Morris, Randal P; Panchbhavi, Vinod K

    2017-10-01

    Refractory cases of Achilles tendinopathy amenable to surgery may include reattachment of the tendon using suture anchors. However, there is paucity of information describing the optimal insertion angle to maximize the tendon footprint and anchor stability in the calcaneus. The purpose of this investigation is to compare the fixation strength of suture anchors inserted at 90° and 45° (the Deadman's angle) relative to the primary compressive trabeculae of the calcaneus. A total of 12 matched pairs of adult cadaveric calcanei were excised and potted to approximate their alignment in vivo. Each pair was implanted with 5.5-mm bioabsorbable suture anchors placed either perpendicular (90°) or oblique (45°) to the primary compressive trabeculae. A tensile load was applied until failure of anchor fixation. Differences in failure load and stiffness between anchor fixation angles were determined by paired t-tests. No significant differences were detected between perpendicular and oblique suture anchor insertion relative to primary compressive trabeculae in terms of load to failure or stiffness. This investigation suggests that the fixation strength of suture anchors inserted perpendicular to the primary compression trabeculae and at the Deadman's angle are possibly comparable. Biomechanical comparison study.

  7. A comparison of two approaches to managing acute primary angle closure in Asian eyes

    Directory of Open Access Journals (Sweden)

    Ho H

    2013-06-01

    Full Text Available Henrietta Ho,1 Paul T Chew,2 Chelvin Sng,1,2 Huiqi Huang,1 Tin Aung,1,2 Shamira A Perera1,21Singapore Eye Research Institute, Singapore National Eye Centre, Singapore; 2Yong Loo Lin School of Medicine, National University of Singapore and National University Health System, SingaporePurpose: To review the management regimes of acute primary angle closure (APAC in two hospitals in Singapore, and to identify the incidence of and risk factors for progression to glaucomatous optic neuropathy.Methods: We conducted a retrospective review of 40 patients from National University Hospital (NUH and 52 patients from Singapore National Eye Centre (SNEC who were diagnosed with APAC. Patients were treated with similar protocols of intensive medical therapy until laser peripheral iridotomy could be performed. In the event of failed medical treatment, patients at NUH only underwent laser iridoplasty. The 1-year outcomes were reviewed.Results: The demographic features of patients and presenting intraocular pressures (IOP were similar in both centers. More patients from NUH presented within 3 days of symptom onset, compared to those from SNEC (90.0% versus 71.2%, respectively (P = 0.037. The mean ± standard deviation time to break the attack was 18.2 ± 32.9 hours at SNEC and 9.80 ± 10.6 hours at NUH (P = 0.11. The mean follow up duration was 18.8 ± 14.0 months. Nineteen patients (36.5% from SNEC and six patients (22.5% from NUH developed raised IOP (P = 0.032 within 1-year of the attack. Of these, glaucomatous optic neuropathy developed in thirteen patients (68.4% from SNEC and all six patients (100% from NUH. At final review, the mean IOP of the APAC eye was 14.8 ± 4.3 mmHg from SNEC and 13.4 ± 3.0 mmHg from NUH. There was no significant difference in final visual acuity or IOP between both groups.Conclusion: Treatment strategies in both centers were effective in aborting an APAC attack. The development of raised IOP appears to be associated with a longer

  8. Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard

    DEFF Research Database (Denmark)

    Wen, Long; Wang, Meiqin; Bogdanov, Andrey

    2014-01-01

    results on HIGHT, its security evaluation against the recent zero-correlation linear attacks is still lacking. At the same time, the Feistel-type structure of HIGHT suggests that it might be susceptible to this type of cryptanalysis. In this paper, we aim to bridge this gap. We identify zero......-correlation linear approximations over 16 rounds of HIGHT. Based upon those, we attack 27-round HIGHT (round 4 to round 30) with improved time complexity and practical memory requirements. This attack of ours is the best result on HIGHT to date in the classical single-key setting. We also provide the first attack...

  9. A simple coherent attack and practical security of differential phase shift quantum cryptography

    International Nuclear Information System (INIS)

    Kronberg, D A

    2014-01-01

    The differential phase shift quantum key distribution protocol reveals good security against such powerful attacks as unambiguous state discrimination and beam splitting attacks. Its complete security analysis is complex due to high dimensions of the supposed spaces and density operators. In this paper, we consider a particular and conceptually simple coherent attack, available in practical implementations. The main condition for this attack is the length of used coherent state tuples of order 8–12. We show that under this condition, no high level of practical distance between legitimate users can be achieved. (paper)

  10. Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks

    International Nuclear Information System (INIS)

    Ouyang, Min

    2016-01-01

    Infrastructure systems are usually spatially distributed in a wide area and are subject to many types of hazards. For each type of hazards, modeling their direct impact on infrastructure components and analyzing their induced system-level vulnerability are important for identifying mitigation strategies. This paper mainly studies spatially localized attacks that a set of infrastructure components located within or crossing a circle shaped spatially localized area is subject to damage while other components do not directly fail. For this type of attacks, taking interdependent power and gas systems in Harris County, Texas, USA as an example, this paper proposes an approach to exactly identify critical locations in interdependent infrastructure systems and make pertinent vulnerability analysis. Results show that (a) infrastructure interdependencies and attack radius largely affect the position of critical locations; (b) spatially localized attacks cause less vulnerability than equivalent random failures; (c) in most values of attack radius critical locations identified by considering only node failures do not change when considering both node and edge failures in the attack area; (d) for many values of attack radius critical locations identified by topology-based model are also critical from the flow-based perspective. - Highlights: • We propose a method to identify critical locations in interdependent infrastructures. • Geographical interdependencies and attack radius largely affect critical locations. • Localized attacks cause less vulnerability than equivalent random failures. • Whether considering both node and edge failures affects critical locations. • Topology-based critical locations are also critical from flow-based perspective.

  11. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  12. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  13. Intact blood-brain barrier during spontaneous attacks of migraine without aura

    DEFF Research Database (Denmark)

    Amin, F M; Hougaard, A; Cramer, S P

    2017-01-01

    BACKGROUND AND PURPOSE: The integrity of the blood-brain barrier (BBB) has been questioned in migraine, but BBB permeability has never been investigated during spontaneous migraine attacks. In the present study, BBB permeability during spontaneous attacks of migraine without aura was investigated......, brain stem, posterior pons and whole brain. The paired samples t test was used to compare Ki (permeability) values between the attack and headache-free days. RESULTS: Nineteen patients completed the study. Median time from onset of migraine attack to scan was 6.5 h (range 4.0-15.5 h). No change...

  14. Reducing an attack surface of an operating system

    OpenAIRE

    VALKONEN, VILLE

    2012-01-01

    Certain security choices done on the operating system level can mitigate harm done by an malicious attacker or a program. The main focus in the thesis is on open source operating systems. Asiasanat: software security, operating system security

  15. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    Science.gov (United States)

    ... for Heart.org CPR & ECC for Heart.org Shop for Heart.org Causes for Heart.org Advocate ... SIGNS may include breaking out in a cold sweat, nausea or lightheadedness. Learn more about heart attack ...

  16. Defense Against Rocket Attacks in the Presence of False Cues

    National Research Council Canada - National Science Library

    Harari, Lior

    2008-01-01

    Rocket attacks on civilian and military targets, from both Hezbollah (South Lebanon) and Hamas (Gaza strip) have been causing a major operational problem for the Israeli Defense Force for over two decades...

  17. Clinical characteristics of disabling attacks at onset in patients with neuromyelitis optica spectrum disorder.

    Science.gov (United States)

    Seok, Jin Myoung; Cho, Eun Bin; Lee, Hye Lim; Cho, Hye-Jin; Min, Ju-Hong; Lee, Kwang Ho; Kim, Byoung Joon

    2016-09-15

    Individual attacks of neuromyelitis optica (NMO) are generally severe enough to cause disability even after the onset attack. We aimed to elucidate the clinical characteristics of disabling attacks at the onset of NMO. We investigated the clinical characteristics at onset and at first relapse in patients with NMO or NMO spectrum disorder with seropositive for the anti-aquaporin-4 antibody. A disabling attack at onset (DAO) was defined as an onset attack in which, at best recovery (allowing up to one year), patients were unable to walk without assistance or were left functionally blind in at least one affected eye. Fifty-seven patients were enrolled (53 females; onset age, 41.9±14.8years). Ten patients (17.5%) had a DAO; four had become unable to walk without assistance following myelitis, and six had severe visual impairment following optic neuritis despite rescue treatments. Attack severity at nadir was the only clinical factor predicting a DAO (odds ratio, 2.120; 95% CI, 1.162-3.869; P=0.014). The use of immunosuppressants delayed the interval to the first relapse (P=0.003). Our study showed characteristics of NMO onset attacks that caused severe disability. However, no clinically modifiable factors predicted disabling attacks, except attack severity. Copyright © 2016 Elsevier B.V. All rights reserved.

  18. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    Science.gov (United States)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  19. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.

    Science.gov (United States)

    Pirandola, Stefano; Braunstein, Samuel L; Lloyd, Seth

    2008-11-14

    We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

  20. Steering Angle Function Algorithm of Morphing of Residential Area

    Directory of Open Access Journals (Sweden)

    XIE Tian

    2015-07-01

    Full Text Available A residential area feature morphing method based on steering angle function is presented. To residential area with the same representation under two different scales,transforming the representation of the residential area polygon from vector coordinates to steering angle function,then using the steering angle function to match,and finding out the similarity and the differences between the residential areas under different scale to get the steering angle function of the the residential areas under any middle scale,the final,transforming the middle scale steering angle function to vector coordinates form,and get the middle shape interpolation of the the residential area polygon.Experimental results show:the residential area morphing method by using steering angle function presented can realize the continuous multi-scale representation under the premise of keeping in shape for the residential area with the rectangular boundary features.

  1. Evaluation of current state of amplification-based DDoS attacks

    NARCIS (Netherlands)

    Bohte, Edgar; Stamatogiannakis, Manolis; Bos, Herbert

    2018-01-01

    Amplification-based DDoS attacks are still a big threat to the availability of the internet. In quite some time there is no new paper published that gave an update on the current state of amplification DDoS attacks, taken into consideration it was a huge problem a few years ago. We performed

  2. Mapping of low flip angles in magnetic resonance

    International Nuclear Information System (INIS)

    Balezeau, Fabien; Saint-Jalmes, Herve; Eliat, Pierre-Antoine; Cayamo, Alejandro Bordelois

    2011-01-01

    Errors in the flip angle have to be corrected in many magnetic resonance imaging applications, especially for T1 quantification. However, the existing methods of B1 mapping fail to measure lower values of the flip angle despite the fact that these are extensively used in dynamic acquisition and 3D imaging. In this study, the nonlinearity of the radiofrequency (RF) transmit chain, especially for very low flip angles, is investigated and a simple method is proposed to accurately determine both the gain of the RF transmitter and the B1 field map for low flip angles. The method makes use of the spoiled gradient echo sequence with long repetition time (TR), such as applied in the double-angle method. It uses an image acquired with a flip angle of 90 0 as a reference image that is robust to B1 inhomogeneity. The ratio of the image at flip angle alpha to the image at a flip angle of 90 0 enables us to calculate the actual value of alpha. This study was carried out at 1.5 and 4.7 T, showing that the linearity of the RF supply system is highly dependent on the hardware. The method proposed here allows us to measure the flip angle from 1 0 to 60 0 with a maximal uncertainty of 10% and to correct T1 maps based on the variable flip angle method.

  3. Open-label, multicenter study of self-administered icatibant for attacks of hereditary angioedema

    DEFF Research Database (Denmark)

    Aberer, W; Maurer, M; Reshef, A

    2014-01-01

    Historically, treatment for hereditary angioedema (HAE) attacks has been administered by healthcare professionals (HCPs). Patient self-administration could reduce delays between symptom onset and treatment, and attack burden. The primary objective was to assess the safety of self-administered ica...

  4. Using the cumulative sum algorithm against distributed denial of service attacks in Internet of Things

    CSIR Research Space (South Africa)

    Machaka, Pheeha

    2015-11-01

    Full Text Available The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS attack...

  5. Dosimetric Comparison of Manual and Beam Angle Optimization of Gantry Angles in IMRT

    International Nuclear Information System (INIS)

    Srivastava, Shiv P.; Das, Indra J.; Kumar, Arvind; Johnstone, Peter A.S.

    2011-01-01

    Dosimetric comparison of manual beam angle selection (MBS) and beam angle optimization (BAO) for IMRT plans is investigated retrospectively for 15 head and neck and prostate patients. The head and neck and prostate had planning target volumes (PTVs) ranging between 96.0 and 319.9 cm 3 and 153.6 and 321.3 cm 3 , whereas OAR ranged between 8.3 and 47.8 cm 3 and 68.3 and 469.2 cm 3 , respectively. In MBS, a standard coplanar 7-9 fields equally spaced gantry angles were used. In BAO, the selection of gantry angle was optimized by the algorithm for the same number of beams. The optimization and dose-volume constraints were kept the same for both techniques. Treatment planning was performed on the Eclipse treatment planning system. Our results showed that the dose-volume histogram for PTV are nearly identical in both techniques but BAO provided superior sparing of the organs at risk compared with the MBS. Also, MBS produced statistically significant higher monitor units (MU) and segments than the BAO; 13.1 ± 6.6% (p = 0.012) and 10.4 ± 13.6% (p = 0.140), and 14.6 ± 5.6% (p = 1.003E-5) and 12.6 ± 7.4% (p = 0.76E-3) for head and neck and prostate cases, respectively. The reduction in MU translates into the reduction in total body and integral dose. It is concluded that BAO provides advantage over MBS for most intenisty-modulated radiation therapy cases.

  6. Grounded running in quails: simulations indicate benefits of observed fixed aperture angle between legs before touch-down.

    Science.gov (United States)

    Andrada, Emanuel; Rode, Christian; Blickhan, Reinhard

    2013-10-21

    Many birds use grounded running (running without aerial phases) in a wide range of speeds. Contrary to walking and running, numerical investigations of this gait based on the BSLIP (bipedal spring loaded inverted pendulum) template are rare. To obtain template related parameters of quails (e.g. leg stiffness) we used x-ray cinematography combined with ground reaction force measurements of quail grounded running. Interestingly, with speed the quails did not adjust the swing leg's angle of attack with respect to the ground but adapted the angle between legs (which we termed aperture angle), and fixed it about 30ms before touchdown. In simulations with the BSLIP we compared this swing leg alignment policy with the fixed angle of attack with respect to the ground typically used in the literature. We found symmetric periodic grounded running in a simply connected subset comprising one third of the investigated parameter space. The fixed aperture angle strategy revealed improved local stability and surprising tolerance with respect to large perturbations. Starting with the periodic solutions, after step-down step-up or step-up step-down perturbations of 10% leg rest length, in the vast majority of cases the bipedal SLIP could accomplish at least 50 steps to fall. The fixed angle of attack strategy was not feasible. We propose that, in small animals in particular, grounded running may be a common gait that allows highly compliant systems to exploit energy storage without the necessity of quick changes in the locomotor program when facing perturbations. © 2013 Elsevier Ltd. All rights reserved.

  7. Salt Attack on Rocks and Expansion of Soils on Mars

    Science.gov (United States)

    Vaniman, D. T.; Bish, D. L.; Chipera, S. J.; Carey, J. W.

    2004-12-01

    Salt-rich sediments observed by the MER rover Opportunity at Meridiani Planum show that brines have been present on Mars in the past, but a role for groundwater in widespread rock weathering and soil formation is uncertain. Experiments by several groups suggest instead the action of acid fog over long time spans, with episodic input of volcanic gases, as a more significant agent of Mars weathering. Salt minerals formed in these acid weathering experiments consistently include gypsum and alunogen, with epsomite or hexahydrite forming where olivine provides a source of Mg. Analogous to the martian acid fog scenario are terrestrial acid rain or acid fog attacks on building and monument stone by chemical action and mechanical wedging through growth of gypsum, anhydrite, epsomite, hexahydrite, kieserite, and other sulfate minerals. Physical effects can be aggressive, operating by both primary salt growth and hydration of anhydrous or less-hydrous primary salts. In contrast, soils evolve to states where chemical attack is lessened and salt mineral growth leads to expansion with cementation; in this situation the process becomes constructive rather than destructive. We have made synthetic salt-cemented soils (duricrusts) from clays, zeolites, palagonites and other media mixed with ultrapure Mg-sulfate solutions. Although near-neutral in pH, these solutions still exchange or leach Ca from the solids to form cements containing gypsum as well as hexahydrite. At low total P (1 torr) and low RH (duricrust expands by formation of a complex mixture of Mg-sulfate phases with various hydration states. The expanded form is retained even if the duricrust is again dehydrated, suggesting that soil porosity thus formed is difficult to destroy. These processes can be considered in the context of Viking, Pathfinder, and MER evidence for differing salt components in the weathered surfaces of rocks versus duricrust-like materials in soils. The divergent chemical trends indicate that soil

  8. Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks

    NARCIS (Netherlands)

    Skoric, B.; Mosk, Allard; Pinkse, Pepijn Willemszoon Harry

    2013-01-01

    The concept of quantum-secure readout of Physical Unclonable Functions (PUFs) has recently been realized experimentally in an optical PUF system. We analyze the security of this system under the strongest type of classical attack: the challenge estimation attack. The adversary performs a measurement

  9. Attack or attacked: The sensory and fluid mechanical constraints of copepods’ predator–prey interactions

    DEFF Research Database (Denmark)

    Kiørboe, Thomas

    2013-01-01

    , and mechanisms for mobility of the parties involved. Here, I describe the mechanisms of sensing, escaping predators, and capturing prey in marine pelagic copepods. I demonstrate that feeding tradeoffs vary with feeding mode, and I describe simple fluid mechanical models that are used to quantify these tradeoffs......Many animals are predator and prey at the same time. This dual position represents a fundamental dilemma because gathering food often leads to increased exposure to predators. The optimization of the tradeoff between eating and not being eaten depends strongly on the sensing, feeding...

  10. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  11. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Chu, Tsong L.

    2016-11-06

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance, in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.

  12. Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack

    Directory of Open Access Journals (Sweden)

    Ming Li

    2008-01-01

    Full Text Available The aim of distributed denial-of-service (DDOS flood attacks is to overwhelm the attacked site or to make its service performance deterioration considerably by sending flood packets to the target from the machines distributed all over the world. This is a kind of local behavior of traffic at the protected site because the attacked site can be recovered to its normal service state sooner or later even though it is in reality overwhelmed during attack. From a view of mathematics, it can be taken as a kind of short-range phenomenon in computer networks. In this paper, we use the Hurst parameter (H to measure the local irregularity or self-similarity of traffic under DDOS flood attack provided that fractional Gaussian noise (fGn is used as the traffic model. As flood attack packets of DDOS make the H value of arrival traffic vary significantly away from that of traffic normally arriving at the protected site, we discuss a method to statistically detect signs of DDOS flood attacks with predetermined detection probability and false alarm probability.

  13. Reachable Sets of Hidden CPS Sensor Attacks : Analysis and Synthesis Tools

    NARCIS (Netherlands)

    Murguia, Carlos; van de Wouw, N.; Ruths, Justin; Dochain, Denis; Henrion, Didier; Peaucelle, Dimitri

    2017-01-01

    For given system dynamics, control structure, and fault/attack detection procedure, we provide mathematical tools–in terms of Linear Matrix Inequalities (LMIs)–for characterizing and minimizing the set of states that sensor attacks can induce in the system while keeping the alarm rate of the

  14. Denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Lu, Bao-Liang; Zhang, Liqing; Kwok, James

    2011-01-01

    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order

  15. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    Science.gov (United States)

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  16. Evolution of Swarming Behavior Is Shaped by How Predators Attack.

    Science.gov (United States)

    Olson, Randal S; Knoester, David B; Adami, Christoph

    2016-01-01

    Animal grouping behaviors have been widely studied due to their implications for understanding social intelligence, collective cognition, and potential applications in engineering, artificial intelligence, and robotics. An important biological aspect of these studies is discerning which selection pressures favor the evolution of grouping behavior. In the past decade, researchers have begun using evolutionary computation to study the evolutionary effects of these selection pressures in predator-prey models. The selfish herd hypothesis states that concentrated groups arise because prey selfishly attempt to place their conspecifics between themselves and the predator, thus causing an endless cycle of movement toward the center of the group. Using an evolutionary model of a predator-prey system, we show that how predators attack is critical to the evolution of the selfish herd. Following this discovery, we show that density-dependent predation provides an abstraction of Hamilton's original formulation of domains of danger. Finally, we verify that density-dependent predation provides a sufficient selective advantage for prey to evolve the selfish herd in response to predation by coevolving predators. Thus, our work corroborates Hamilton's selfish herd hypothesis in a digital evolutionary model, refines the assumptions of the selfish herd hypothesis, and generalizes the domain of danger concept to density-dependent predation.

  17. Perturbative estimates of lepton mixing angles in unified models

    International Nuclear Information System (INIS)

    Antusch, Stefan; King, Stephen F.; Malinsky, Michal

    2009-01-01

    Many unified models predict two large neutrino mixing angles, with the charged lepton mixing angles being small and quark-like, and the neutrino masses being hierarchical. Assuming this, we present simple approximate analytic formulae giving the lepton mixing angles in terms of the underlying high energy neutrino mixing angles together with small perturbations due to both charged lepton corrections and renormalisation group (RG) effects, including also the effects of third family canonical normalization (CN). We apply the perturbative formulae to the ubiquitous case of tri-bimaximal neutrino mixing at the unification scale, in order to predict the theoretical corrections to mixing angle predictions and sum rule relations, and give a general discussion of all limiting cases. We also discuss the implications for the sum rule relations of the measurement of a non-zero reactor angle, as hinted at by recent experimental measurements.

  18. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  19. A study of images of Projective Angles of pulmonary veins

    Energy Technology Data Exchange (ETDEWEB)

    Wang Jue [Beijing Anzhen Hospital, Beijing (China); Zhaoqi, Zhang [Beijing Anzhen Hospital, Beijing (China)], E-mail: zhaoqi5000@vip.sohu.com; Yu Wei; Miao Cuilian; Yan Zixu; Zhao Yike [Beijing Anzhen Hospital, Beijing (China)

    2009-09-15

    Aims: In images of magnetic resonance and computed tomography (CT) there are visible angles between pulmonary veins and the coronary, transversal or sagittal section of body. In this study these angles are measured and defined as Projective Angles of pulmonary veins. Several possible influential factors and characters of distribution are studied and analyzed for a better understanding of this imaging anatomic character of pulmonary veins. And it could be the anatomic base of adjusting correctly the angle of the central X-ray of the angiography of pulmonary veins undergoing the catheter ablation of atrial fibrillation (AF). Method: Images of contrast enhanced magnetic resonance angiography (CEMRA) and contrast enhanced computer tomography (CECT) of the left atrium and pulmonary veins of 137 health objects and patients with atrial fibrillation (AF) are processed with the technique of post-processing, and Projective Angles to the coronary and transversal sections are measured and analyzed statistically. Result: Project Angles of pulmonary veins are one of real and steady imaging anatomic characteristics of pulmonary veins. The statistical distribution of variables is relatively concentrated, with a fairly good representation of average value. It is possible to improve the angle of the central X-ray according to the average value in the selective angiography of pulmonary veins undergoing the catheter ablation of AF.

  20. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system.

    Science.gov (United States)

    2012-03-01

    This report presents 16 case studies of attacks planned or carried out against Israeli bus targets, along with statistical data on the number, frequency, and lethality of attacks against bus targets that have taken place in Israel since 1970 and duri...

  1. Nonstructural carbohydrate dynamics of lodgepole pine dying from mountain pine beetle attack.

    Science.gov (United States)

    Wiley, Erin; Rogers, Bruce J; Hodgkinson, Robert; Landhäusser, Simon M

    2016-01-01

    Bark beetle outbreaks are an important cause of tree death, but the process by which trees die remains poorly understood. The effect of beetle attack on whole-tree nonstructural carbohydrate (NSC) dynamics is particularly unclear, despite the potential role of carbohydrates in plant defense and survival. We monitored NSC dynamics of all organs in attacked and protected lodgepole pines (Pinus contorta) during a mountain pine beetle (Dendroctonus ponderosae) outbreak in British Columbia, starting before beetle flight in June 2011 through October 2012, when most attacked trees had died. Following attack, NSC concentrations were first reduced in the attacked region of the bole. The first NSC reduction in a distant organ appeared in the needles at the end of 2011, while branch and root NSC did not decline until much later in 2012. Attacked trees that were still alive in October 2012 had less beetle damage, which was negatively correlated with initial bark sugar concentrations in the attack region. The NSC dynamics of dying trees indicate that trees were killed by a loss of water conduction and not girdling. Further, our results identify locally reduced carbohydrate availability as an important mechanism by which stressors like drought may increase tree susceptibility to biotic attack. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  2. Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities

    Science.gov (United States)

    Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia

    2007-01-01

    The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…

  3. A system for denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping

    Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS

  4. The ATPG Attack for Reverse Engineering of Combinational Hybrid Custom-Programmable Circuits

    Science.gov (United States)

    2017-03-23

    Introduction The widely practiced horizontal integrated circuit supply chain exposes a design to various types of attacks including the reverse engineering ...STT_CMOS designs for reverse- engineering prevention, DAC 2016. [5] M. E. Massad and et. al. Integrated circuit (IC) decamouflaging: reverse...The ATPG Attack for Reverse Engineering of Combinational Hybrid Custom-Programmable Circuits Raza Shafiq Hamid Mahmoodi Houman Homayoun Hassan

  5. Resistance of borax–copper treated wood in aboveground exposure to attack by Formosan subterranean termites

    Science.gov (United States)

    Stan Lebow; Bessie Woodward; Douglas Crawford; William Abbott

    2005-01-01

    The spread of Formosan subterranean termites (FSTs) in the southern United States has increased public interest in finding a preservative treatment to protect framing lumber from termite attack. This study evaluated the use of a borax-based preservative to protect wood from FST attack. Southern Pine and Douglas-fir specimens were pressure-treated with three...

  6. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  7. Non-contact measurement of rotation angle with solo camera

    Science.gov (United States)

    Gan, Xiaochuan; Sun, Anbin; Ye, Xin; Ma, Liqun

    2015-02-01

    For the purpose to measure a rotation angle around the axis of an object, a non-contact rotation angle measurement method based on solo camera was promoted. The intrinsic parameters of camera were calibrated using chessboard on principle of plane calibration theory. The translation matrix and rotation matrix between the object coordinate and the camera coordinate were calculated according to the relationship between the corners' position on object and their coordinates on image. Then the rotation angle between the measured object and the camera could be resolved from the rotation matrix. A precise angle dividing table (PADT) was chosen as the reference to verify the angle measurement error of this method. Test results indicated that the rotation angle measurement error of this method did not exceed +/- 0.01 degree.

  8. Shooting Alone: The Pre-Attack Experiences and Behaviors of U.S. Solo Mass Murderers.

    Science.gov (United States)

    Gill, Paul; Silver, James; Horgan, John; Corner, Emily

    2017-05-01

    This paper outlines the sociodemographic, developmental, antecedent attack, attack preparation, and commission properties of 115 mass murderers between 1990 and 2014. The results indicate that mass murderer attacks are usually the culmination of a complex mix of personal, political, and social drivers that crystalize at the same time to drive the individual down the path of violent action. We specifically focus upon areas related to prior criminal engagement, leakage, and attack location familiarity. Whether the violence comes to fruition is usually a combination of the availability and vulnerability of suitable targets that suit the heady mix of personal and political grievances and the individual's capability to engage in an attack from both a psychological and technical capability standpoint. Many individual cases share a mixture of unfortunate personal life circumstances coupled with an intensification of beliefs/grievances that later developed into the idea to engage in violence. © 2016 American Academy of Forensic Sciences.

  9. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  10. Endophagy of biting midges attacking cavity-nesting birds.

    Science.gov (United States)

    Votýpka, J; Synek, P; Svobodová, M

    2009-09-01

    Feeding behaviour, host preferences and the spectrum of available hosts determine the role of vectors in pathogen transmission. Feeding preferences of blood-feeding Diptera depend on, among others factors, the willingness of flies to attack their hosts either in the open (exophagy) or in enclosed places (endophagy). As far as ornithophilic blood-feeding Diptera are concerned, the biting midges (Diptera: Ceratopogonidae) and blackflies (Diptera: Simuliidae) are generally considered to be strictly exophagous. We determined which blood-sucking Diptera enter nest cavities and feed on birds by placing sticky foil traps inside artificial nest boxes. A total of 667 females of eight species of biting midges of the genus Culicoides (Latreille, 1809) were captured on traps during 2006-2007, with Culicoides truncorum (Edwards, 1939) being the dominant species. DNA blood analyses of blood-engorged females proved that midges actually fed on birds nesting in the boxes. Three species were identified as endophagous: Culicoides truncorum, Culicoides pictipennis (Staeger, 1839), and Culicoides minutissimus (Zetterstedt, 1855). Our study represents the first evidence that ornithophilic biting midges are endophagous. The fact that we caught no blackflies in the bird boxes supports the exophagy of blackflies. We believe that our findings are important for surveillance programmes focusing on Diptera that transmit various bird pathogens.

  11. Development of an accelerated test for Internal Sulfate Attack study

    Directory of Open Access Journals (Sweden)

    Khelil Nacim

    2014-04-01

    Full Text Available Internal Sulfate Attack (ISA is a pathology that occurs under certain conditions in concrete having undergone heating above 70 °C at early age (through heating in pre-casting industry or due to hydration in large concrete parts. This reaction deemed very slow, numerous methods to speed up reactions leading to delayed ettringite formation have been developed. These methods are all based on the material damage. Another type of test is currently under development. It is based on rehabilitation techniques such as electrochemical chloride extraction (ECE in order to accelerate the leaching of alkalis that could be one of the triggers of the pathology. The study presented in this paper focused on concrete specimens prepared from cement (CEM I 52.5 N enriched with Na2SO4. These concretes have undergone a heat treatment typical of those used in precast plants (up to 24 hours with a maximum temperature of 80 °C. Various paths were explored for the development of the accelerated test. The first results showed that it was necessary to use a removable titanium anode ruthenium anode instead of stainless steel embedded in the concrete. Then tests with de-ionized water as the solute to the cathode did not accelerate the onset of expansions. The experiment has been modified and potassium carbonate was added to the solution. This modification didn’t show any significant improvement, and other experiments are being carried out to explain this result.

  12. Usefulness of chest radiographs in first asthma attacks

    International Nuclear Information System (INIS)

    Gershel, J.C.; Goldman, H.S.; Stein, R.E.K.; Shelov, S.P.; Ziprkowski, M.

    1983-01-01

    To assess the value of routine chest radiography during acute first attacks of asthma, we studied 371 consecutive children over one year of age who presented with an initial episode of wheezing. Three hundred fifty children (94.3%) had radiographic findings that were compatible with uncomplicated asthma and were considered negative. Twenty-one (5.7%) had positive findings: atelectasis and pneumonia were noted in seven, segmental atelectasis in six, pneumonia in five, multiple areas of subsegmental atelectasis in two, and pneumomediastinum in one. The patients with positive films were more likely to have a respiratory rate above 60 or a pulse rate above 160 (P < 0.001), localized rales or localized decreased breath sounds before treatment (P < 0.01), and localized rales (P < 0.005) and localized wheezing (P < 0.02) after treatment; also, these patients were admitted to the hospital more often (P < 0.001). Ninety-five percent (20 of 21) of the children with positive films could be identified before treatment on the basis of a combination of tachypnea, tachycardia, fever, and localized rales or localized decreased breath sounds. Most first-time wheezers will not have positive radiographs; careful clinical evaluation should reveal which patients will have abnormal radiographs and will therefore benefit from the procedure. 20 references, 3 tables

  13. Acidic Attack Resistance of Cement Mortar Treated with Alkaline

    Directory of Open Access Journals (Sweden)

    Nadia Nazhat Sabeeh

    2017-12-01

    Full Text Available The negative effect of acidic attack on the properties of concrete and cement mortar is a topic of increasing significance in the recent years. Many attempts has occurred to mitigate this negative impact by improving the properties of concrete and increase resistance to acids by using additives. The present study includes treatment of sand by alkaline material and examine the effect of treatment on cement mortar resistance towards hydrochloric and sulfuric acid. Results show that sand treatment by alkaline material significantly enhance mortar ability to resist acids. In terms of loss weight, the maximum weight rate gain was 25.54% for specimens immersed in Hydrochloric acid with water cement ratio 40%. For specimens immersed in HCl, the average gain in compressive strength is (20.15-19.433% for w/c (40-45% respectively. The average gain in modulus of rupture toward the influence of H2SO4 is (18.37–17.99% for w/c (40-45%, respectively.

  14. ASSESSMENT OF LENS THICKNESS IN ANGLE CLOSURE DISEASE

    Directory of Open Access Journals (Sweden)

    Nishat Sultana Khayoom

    2016-08-01

    Full Text Available BACKGROUND Anterior chamber depth and lens thickness have been considered as important biometric determinants in primary angle-closure glaucoma. Patients with primary narrow angle may be classified as a primary angle closure suspect (PACS, or as having primary angle closure (PAC or primary angle closure glaucoma (PACG. 23.9% of patients with primary angle closure disease are in India, which highlights the importance of understanding the disease, its natural history, and its underlying pathophysiology, so that we may try to establish effective methods of treatment and preventative measures to delay, or even arrest, disease progression, thereby reducing visual morbidity. AIM To determine the lens thickness using A-scan biometry and its significance in various stages of angle closure disease. MATERIALS AND METHODS Patients attending outpatient department at Minto Ophthalmic Hospital between October 2013 to May 2015 were screened for angle closure disease and subsequently evaluated at glaucoma department. In our study, lens thickness showed a direct correlation with shallowing of the anterior chamber by determining the LT/ ACD ratio. A decrease in anterior chamber depth is proportional to the narrowing of the angle which contributes to the progression of the angle closure disease from just apposition to occlusion enhancing the risk for optic nerve damage and visual field loss. Hence, if the lens thickness values are assessed earlier in the disease process, appropriate intervention can be planned. CONCLUSION Determination of lens changes along with anterior chamber depth and axial length morphometrically can aid in early detection of angle closure. The role of lens extraction for PACG is a subject of increased interest. Lens extraction promotes the benefits of anatomical opening of the angle, IOP reduction and improved vision. This potential intervention may be one among the armamentarium of approaches for PACG. Among the current treatment modalities

  15. Predictors of Stroke After Transient Ischemic Attack in Children.

    Science.gov (United States)

    Lehman, Laura L; Watson, Christopher G; Kapur, Kush; Danehy, Amy R; Rivkin, Michael J

    2016-01-01

    Transient ischemic attack (TIA) in children has received far less attention compared with TIA in adults. The risk factors of stroke after TIA in children are relatively unknown. We aimed to determine the percentage of children who have stroke after TIA and the risk factors associated with stroke after TIA. We searched the medical records at Boston Children's Hospital for the year 2010 to find children who were evaluated for TIA to determine associated risk factors of stroke after TIA. We included children who were evaluated in 2009 through 2010 for TIA and had magnetic resonance imaging. We examined follow-up imaging through August 2014 for subsequent stroke. Logistic regression was used to calculate odds ratios for factors in our cohort who are associated with stroke after presentation with TIA. We identified 63 children who experienced a TIA. The mean time of imaging follow-up was 4.5 years after TIA presentation. Of the 63 children, 10 (16%) developed radiological evidence of ischemic cerebral injury within the follow-up period. Four of the 10 (6%) demonstrated diffusion abnormalities on magnetic resonance imaging at TIA presentation, whereas 8 (13%) had a stroke after their TIA. Arteriopathy, female sex, and autoimmune disorders were significantly associated with stroke after TIA. In our cohort of children, stroke occurred after TIA at a rate similar to that seen in adults, but the risk factors for stroke after TIA in children are different. © 2015 American Heart Association, Inc.

  16. Glancing angle x-ray studies of oxide films

    International Nuclear Information System (INIS)

    Davenport, A.J.; Isaacs, H.S.

    1989-01-01

    High brightness synchrotron radiation incident at glancing angles has been used to study inhibiting species present in low concentrations in oxide films on aluminum. Glancing incident angle fluorescence measurements give surface-sensitive information on the valence state of elements from the shape of the x-ray absorption edge. Angle-resolved measurements show the depth distribution of the species present. 15 refs., 4 figs

  17. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  18. Method for prejudging intention of warship to attack air target

    Directory of Open Access Journals (Sweden)

    ZHAO Handong

    2018-02-01

    Full Text Available [Objectives] This paper proposes a heterogeneous integrated learner to solve the problem of fuzzy uncertainty classification in order to judge the target intention of air attack in a short time. [Methods] First, a limit learning machine, decision tree, Skohonen neural network and LVQ neural network are selected to construct the heterogeneous integrated learner using the integrated learning strategy. Next, the training program is trained 100 times using the integrated learner to obtain the classification experiment average accuracy and calculation time. In order to improve the accuracy, integrated pruning is carried out to eliminate the "poor quality" LVQ neural network, and a more efficient heterogeneous integrated learner is reconstructed. The experimental results are extremely accurate but the calculation is time-consuming. In this paper, the Skohonen neural network sub-classifier is proposed as an "offline training and online call". [Results] Simulation experiments show that the time consumed from detecting the air targets to prejudging the intention of each incoming target is 4.972 s with an accuracy of 99.93%, which is excellent for meeting accuracy and real-time requirements. [Conclusions] This study provides a new and effective method for air defense decision-making. The method used in this paper also provides a better way of realizing the classification problem of small samples.

  19. Review of attacks on health care facilities in six conflicts of the past three decades.

    Science.gov (United States)

    Briody, Carolyn; Rubenstein, Leonard; Roberts, Les; Penney, Eamon; Keenan, William; Horbar, Jeffrey

    2018-01-01

    In the ongoing conflicts of Syria and Yemen, there have been widespread reports of attacks on health care facilities and personnel. Tabulated evidence does suggest hospital bombings in Syria and Yemen are far higher than reported in other conflicts but it is unclear if this is a reporting artefact. This article examines attacks on health care facilities in conflicts in six middle- to high- income countries that have occurred over the past three decades to try and determine if attacks have become more common, and to assess the different methods used to collect data on attacks. The six conflicts reviewed are Yemen (2015-Present), Syria (2011- Present), Iraq (2003-2011), Chechnya (1999-2000), Kosovo (1998-1999), and Bosnia and Herzegovina (1992-1995). We attempted to get the highest quality source(s) with summary data of the number of facilities attacked for each of the conflicts. The only conflict that did not have summary data was the conflict in Iraq. In this case, we tallied individual reported events of attacks on health care. Physicians for Human Rights (PHR) reported attacks on 315 facilities (4.38 per month) in Syria over a 7-year period, while the Monitoring Violence against Health Care (MVH) tool launched later by the World Health Organization (WHO) Turkey Health Cluster reported attacks on 135 facilities (9.64 per month) over a 14-month period. Yemen had a reported 93 attacks (4.65 per month), Iraq 12 (0.12 per month), Chechnya > 24 (2.4 per month), Kosovo > 100 (6.67 per month), and Bosnia 21 (0.41 per month). Methodologies to collect data, and definitions of both facilities and attacks varied widely across sources. The number of reported facilities attacked is by far the greatest in Syria, suggesting that this phenomenon has increased compared to earlier conflicts. However, data on attacks of facilities was incomplete for all of the conflicts examined, methodologies varied widely, and in some cases, attacks were not defined at all. A global

  20. Tales from the crypt : Fingerprinting attacks on encrypted channels by way of retainting

    NARCIS (Netherlands)

    Valkering, Michael; Slowinska, Asia; Bos, Herbert

    2009-01-01

    Paradoxically, encryption makes it hard to detect, fingerprint and stop exploits. We describe Hassle, a honeypot capable of detecting and fingerprinting monomorphic and polymorphic attacks on encrypted channels. It uses dynamic taint analysis in an emulator to detect attacks, and it tags each

  1. Social engineering attacks: an augmentation of the socio-technical systems framework

    CSIR Research Space (South Africa)

    Shozi, A

    2015-03-01

    Full Text Available or organisation’s information. We analyse social engineering attacks as a Socio-technical System because it recognises the interaction between people and technology in a work environment. In the case of social engineering attacks, the social subsystem would...

  2. Identifying Risk of Future Asthma Attacks Using UK Medical Record Data : A Respiratory Effectiveness Group Initiative

    NARCIS (Netherlands)

    Blakey, John D.; Price, David B.; Pizzichini, Emilio; Popov, Todor A.; Dimitrov, Borislav D.; Postma, Dirkje S.; Josephs, Lynn K.; Kaplan, Alan; Papi, Alberto; Kerkhof, Marjan; Hillyer, Elizabeth V.; Chisholm, Alison; Thomas, Mike

    BACKGROUND: Asthma attacks are common, serious, and costly. Individual factors associated with attacks, such as poor symptom control, are not robust predictors. OBJECTIVE: We investigated whether the rich data available in UK electronic medical records could identify patients at risk of recurrent

  3. Migraine Trainers as Models: the effectiveness of Lay trainerswith migraine for behavioural attack prevention

    NARCIS (Netherlands)

    S.Y.M. Mérelle (Saskia)

    2008-01-01

    textabstractMigraine is a chronic brain disorder, characterized by attacks of severe headache accompanied by nausea, vomiting and sensitivity to light, sound and smell. Attacks can be preceded by premonitory symptoms such as fatigue, muscular stiff ness or negative aff ect. It has been shown that

  4. Thumb rule of visual angle: a new confirmation.

    Science.gov (United States)

    Groot, C; Ortega, F; Beltran, F S

    1994-02-01

    The classical thumb rule of visual angle was reexamined. Hence, the visual angle was measured as a function of a thumb's width and the distance between eye and thumb. The measurement of a thumb's width when held at arm's length was taken on 67 second-year students of psychology. The visual angle was about 2 degrees as R. P. O'Shea confirmed in 1991. Also, we confirmed a linear relationship between the size of a thumb's width at arm's length and the visual angle.

  5. Analyzing the installation angle error of a SAW torque sensor

    International Nuclear Information System (INIS)

    Fan, Yanping; Ji, Xiaojun; Cai, Ping

    2014-01-01

    When a torque is applied to a shaft, normal strain oriented at ±45° direction to the shaft axis is at its maximum, which requires two one-port SAW resonators to be bonded to the shaft at ±45° to the shaft axis. In order to make the SAW torque sensitivity high enough, the installation angle error of two SAW resonators must be confined within ±5° according to our design requirement. However, there are few studies devoted to the installation angle analysis of a SAW torque sensor presently and the angle error was usually obtained by a manual method. Hence, we propose an approximation method to analyze the angle error. First, according to the sensitive mechanism of the SAW device to torque, the SAW torque sensitivity is deduced based on the linear piezoelectric constitutive equation and the perturbation theory. Then, when a torque is applied to the tested shaft, the stress condition of two SAW resonators mounted with an angle deviating from ±45° to the shaft axis, is analyzed. The angle error is obtained by means of the torque sensitivities of two orthogonal SAW resonators. Finally, the torque measurement system is constructed and the loading and unloading experiments are performed twice. The torque sensitivities of two SAW resonators are obtained by applying average and least square method to the experimental results. Based on the derived angle error estimation function, the angle error is estimated about 3.447°, which is close to the actual angle error 2.915°. The difference between the estimated angle and the actual angle is discussed. The validity of the proposed angle error analysis method is testified to by the experimental results. (technical design note)

  6. Contact angle distribution of particles at fluid interfaces.

    Science.gov (United States)

    Snoeyink, Craig; Barman, Sourav; Christopher, Gordon F

    2015-01-27

    Recent measurements have implied a distribution of interfacially adsorbed particles' contact angles; however, it has been impossible to measure statistically significant numbers for these contact angles noninvasively in situ. Using a new microscopy method that allows nanometer-scale resolution of particle's 3D positions on an interface, we have measured the contact angles for thousands of latex particles at an oil/water interface. Furthermore, these measurements are dynamic, allowing the observation of the particle contact angle with high temporal resolution, resulting in hundreds of thousands of individual contact angle measurements. The contact angle has been found to fit a normal distribution with a standard deviation of 19.3°, which is much larger than previously recorded. Furthermore, the technique used allows the effect of measurement error, constrained interfacial diffusion, and particle property variation on the contact angle distribution to be individually evaluated. Because of the ability to measure the contact angle noninvasively, the results provide previously unobtainable, unique data on the dynamics and distribution of the adsorbed particles' contact angle.

  7. Pathogenesis of transient ischemic attacks within the vertebrobasilar arterial system

    International Nuclear Information System (INIS)

    Naritomi, H.; Sakai, F.; Meyer, J.S.

    1979-01-01

    Regional cerebral blood flow (rCBF) was measured by xenon 133 inhalation in 36 patients with vertebrobasilar arterial insufficiency (VBI), three patients with brain stem infarction, and 15 age-matched normal controls before and after inducing postural hypotension. Probes mounted over the suboccipital area by means of a helmet were used to measure rCBF over the brain stem and cerebellar regions. When lying flat, rCBF values measured over both cerebral hemispheres and the brain stem-cerebellar regions in patients with VBI were not significantly different from normal controls. Unlike carotid transient ischemic attacks, regional flow reduction rarely persisted for three weeks after transient ischemic symptoms in patients with VBI. When postural hypotension was induced, rCBF became significantly reduced in patients with VBI whether or not they were treated with papaverine. Dysautoregulation was restricted to vertebral, basilar, and posterior cerebral arterial distribution in patients with VBI of 1 to 12 months' duration, but was more widespread and involved both cerebral hemispheres in long-standing VBI. Hemodynamic factors and dysautoregulation appear to play a part in the pathogenesis of symptoms of VBI

  8. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  9. Effect of Helicobacter Pylori Treatment on the Number and Intensity of Migraine Attacks

    Directory of Open Access Journals (Sweden)

    Alireza Bakhshipour

    2012-06-01

    Full Text Available Background: Migraine is a common headache with an unknown cause. Migraine is about three times more common in women (18.2% than in men (6.2%. The recent studies have posed the possible relationship between the Helicobacter pylori infection and migraine headache. This study tries to analyze the effect of treating H. pylori infection on number and severity of migraine attacks.Materials and Methods: In this clinical pilot study, a number of 60 patients with migraine were examined in terms of infecting with H. pylori. Patients with the infections were treated by H. pylori eradication treatment standard triple regimen and the frequency and severity of their migraine attacks were measured for three months and finally the average of frequency and severity of attacks before and after treatment were compared. Results: The average frequency of the migraine attacks in patients with the H.pylori infection who have been treated was 7.1 before treatment and 2.7 after treatment (p=0.001. Likewise, the severity rate of such attacks in such patients was 9 which decreased to 4.5 after treatment (p=0.002. Conclusion: According to our study, patients with migraine attacks are preferred to be examined tested in terms of infecting with H. pylori. Thus, and eradication of this infection can be effective in decreasing of the migraine attacks.

  10. Identification and Ranking of Critical Assets within an Electrical Grid under Threat of Cyber Attack

    Science.gov (United States)

    Boyer, Blake R.

    This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack.1 Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations will change the importance of each asset in the delivery of bulk power. As opposed to classic stability studies where risk can be shown to be greatest during high load periods, the zero hour exploit-cyber-risk assumes that vulnerabilities will be attacked as soon as they are discovered. The probability of attacks is made uniform over time to include any and all possible attacks. Examining the impact of an attack and how the grid reacts immediately following an attack will identify and determine the criticality of each asset. This work endeavors to fulfill the NERC Critical Infrastructure Protection Requirements CIP-001-1 through CIP-009-2, cyber security requirements for the reliable supply of bulk power to customers throughout North America. 1Critical assets will here refer to facilities, systems, and equipment, which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System, NERC Glossary of Terms Used in Reliability Standards, 2009

  11. Effect of clustering on attack vulnerability of interdependent scale-free networks

    International Nuclear Information System (INIS)

    Li, Rui-qi; Sun, Shi-wen; Ma, Yi-lin; Wang, Li; Xia, Cheng-yi

    2015-01-01

    In order to deeply understand the complex interdependent systems, it is of great concern to take clustering coefficient, which is an important feature of many real-world systems, into account. Previous study mainly focused on the impact of clustering on interdependent networks under random attacks, while we extend the study to the case of the more realistic attacking strategy, targeted attack. A system composed of two interdependent scale-free networks with tunable clustering is provided. The effects of coupling strength and coupling preference on attack vulnerability are explored. Numerical simulation results demonstrate that interdependent links between two networks make the entire system much more fragile to attacks. Also, it is found that clustering significantly increases the vulnerability of interdependent scale-free networks. Moreover, for fully coupled network, disassortative coupling is found to be most vulnerable to random attacks, while the random and assortative coupling have little difference. Additionally, enhancing coupling strength can greatly enhance the fragility of interdependent networks against targeted attacks. These results can not only improve the deep understanding of structural complexity of complex systems, but also provide insights into the guidance of designing resilient infrastructures.

  12. Design of Virtual Crank Angle Sensor based on Torque Estimation

    OpenAIRE

    Roswall, Tobias

    2016-01-01

    The topic of thesis is estimation of the crank angle based on pulse signals from an induction sensor placed on the flywheel. The engine management system performs many calculations in the crank angle domain which means that a good accuracy is needed for this measurement. To estimate the crank angle degree the torque balance on the crankshaft based on Newtons 2nd law is used. The resulting acceleration is integrated to give engine speed and crank angle. This approach is made for two crankshaft ...

  13. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

    DEFF Research Database (Denmark)

    Jiang, Lijun; Meng, Weizhi; Wang, Michael Yu

    2017-01-01

    ) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector...... that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500...... participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging...

  14. Ocular Biometrics of Myopic Eyes With Narrow Angles.

    Science.gov (United States)

    Chong, Gabriel T; Wen, Joanne C; Su, Daniel Hsien-Wen; Stinnett, Sandra; Asrani, Sanjay

    2016-02-01

    The purpose of this study was to compare the ocular biometrics between myopic patients with and without narrow angles. Patients with a stable myopic refraction (myopia worse than -1.00 D spherical equivalent) were prospectively recruited. Angle status was assessed using gonioscopy and biometric measurements were performed using an anterior segment optical coherence tomography and an IOLMaster. A total of 29 patients (58 eyes) were enrolled with 13 patients (26 eyes) classified as having narrow angles and 16 patients (32 eyes) classified as having open angles. Baseline demographics of age, sex, and ethnicity did not differ significantly between the 2 groups. The patients with narrow angles were on average older than those with open angles but the difference did not reach statistical significance (P=0.12). The central anterior chamber depth was significantly less in the eyes with narrow angles (P=0.05). However, the average lens thickness, although greater in the eyes with narrow angles, did not reach statistical significance (P=0.10). Refractive error, axial lengths, and iris thicknesses did not differ significantly between the 2 groups (P=0.32, 0.47, 0.15). Narrow angles can occur in myopic eyes. Routine gonioscopy is therefore recommended for all patients regardless of refractive error.

  15. RESILIENT SCHEME AGAINST REDUCTION OF QUALITY (ROQ DISTRIBUTED DENIAL OF SERVICE ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    S.A. Arunmozhi

    2011-09-01

    Full Text Available Defending against denial-of-service attacks (DoS in a mobile ad hoc network (MANET is challenging because of the dynamic network topology. Security primitives must be dynamically adjusted to cope with the network. The Reduction-of-Quality (RoQ Distributed Denial of Service (DDoS attack is one which throttles the tcp throughput heavily and reduces the quality-of-service (QoS to end systems gradually rather than refusing the clients from the services completely. Supporting QoS in MANET is a challenging task, particularly in the presence of malicious users. In this paper, we propose a DoS resilient technique that uses a flow table to detect the attackers. The proposed defense mechanism identifies the attackers based on the congestion bit notification and asks the sending node to reduce the sending rate. Once the attackers are identified, all the packets from those nodes will be blocked. The throughput and delay performance of TCP or UDP flows are very sensitive to such RoQ attacks. Through extensive ns2 network simulations, we demonstrate the achievement of high throughput and low delay for a network under the RoQ attack.

  16. Survival of the relocated population of the U. S. after a nuclear attack. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Haaland, C.M.; Chester, C.V.; Wigner, E.P.

    1976-06-01

    The feasibility of continued survival after a hypothetical nuclear attack is evaluated for people relocated from high-risk areas during the crisis period before the attack. The attack consists of 6559 MT, of which 5951 MT are ground bursts on military, industrial, and urban targets. Relocated people are assumed to be adequately protected from fallout radiation by shelters of various kinds. The major problems in the postattack situation will be the control of exposure to fallout radiation, and prevention of severe food shortages to several tens of millions of people.

  17. Internet of Things Security: Layered classification of attacks and possible Countermeasures

    Directory of Open Access Journals (Sweden)

    Otmane El Mouaatamid

    2016-12-01

    Full Text Available Nowadays, the internet of things (IoT presents a strong focus of research with various initiatives working on the application, and usage of Internet standards in the IoT. But the big challenge of the internet of things is security. In this paper a layered classification and a goal based comparison of attacks in the IoT are presented so that a better understanding of IoT attacks can be achieved and subsequently more efficient and effective techniques and procedures to combat these attacks may be developed

  18. A Defender-Attacker Optimization of Port Radar Surveillance

    Science.gov (United States)

    2011-01-01

    security; optimization; attacker-defender “And thence discover how with most advantage They may vex us with shot, or with assault.” Shakespeare , KingHenryVI...1. INTRODUCTION We introduce a new planning tool for locating shore radars and mobile picket boats with radar to maximize the probabil- ity that one

  19. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    .... Such attacks are particularly problematic because they take place in a "virtual cyber world" that lacks the social, economic, legal, and physical barriers and protections that control and limit crime in the material world. Research outcomes include basic theory, a modeling framework for Internet worms and email viruses, a sensor for user profiling, and a simple protocol for enhancing wireless security.

  20. Guideline on management of the acute asthma attack in children by Italian Society of Pediatrics.

    Science.gov (United States)

    Indinnimeo, Luciana; Chiappini, Elena; Miraglia Del Giudice, Michele

    2018-04-06

    Acute asthma attack is a frequent condition in children. It is one of the most common reasons for emergency department (ED) visit and hospitalization. Appropriate care is fundamental, considering both the high prevalence of asthma in children, and its life-threatening risks. Italian Society of Pediatrics recently issued a guideline on the management of acute asthma attack in children over age 2, in ambulatory and emergency department settings. The Grading of Recommendations Assessment, Development, and Evaluation (GRADE) methodology was adopted. A literature search was performed using the Cochrane Library and Medline/PubMed databases, retrieving studies in English or Italian and including children over age 2 year. Inhaled ß 2 agonists are the first line drugs for acute asthma attack in children. Ipratropium bromide should be added in moderate/severe attacks. Early use of systemic steroids is associated with reduced risk of ED visits and hospitalization. High doses of inhaled steroids should not replace systemic steroids. Aminophylline use should be avoided in mild/moderate attacks. Weak evidence supports its use in life-threatening attacks. Epinephrine should not be used in the treatment of acute asthma for its lower cost / benefit ratio, compared to β 2 agonists. Intravenous magnesium solphate could be used in children with severe attacks and/or forced expiratory volume1 (FEV1) lower than 60% predicted, unresponsive to initial inhaled therapy. Heliox could be administered in life-threatening attacks. Leukotriene receptor antagonists are not recommended. This Guideline is expected to be a useful resource in managing acute asthma attacks in children over age 2.

  1. Determination of the angle of attack on the mexico rotor using experimental data

    DEFF Research Database (Denmark)

    Yang, Hua; Shen, Wen Zhong; Sørensen, Jens Nørkær

    2010-01-01

    characteristics from experimental data on the MEXICO (Model Experiments in controlled Conditions) rotor. Detailed surface pressure and Particle Image Velocimetry (PIV) flow field at different rotor azimuth positions were examined for determining the sectional airfoil data. It is worthwhile noting that the present...

  2. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  3. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  4. Diffusion weighted MR imaging of transient ischemic attacks

    International Nuclear Information System (INIS)

    Chung, Jin Il; Kim, Dong Ik; Lee, Seung Ik; Yoon, Pyung Ho; Heo, Ji Hoe; Lee, Byung In

    2000-01-01

    To investigate the findings of diffusion-weighted MR imaging in patients with transient ischemic attacks (TIA). Between August 1996 and June 1999, 41 TIA patients (M:F =3D 28:13, mean age 57 (range, 27-75) years) with neurologic symptoms lasting less than 24 hours underwent diffusion-weighted MR imaging. The time interval between the onset of symptoms and MR examination was less than one week in 29 patients, from one week to one month in eight, and undetermined in four. Conventional MR and DWI were compared in terms of location of infarction and lesion size (less than 1 cm, 1-3 cm, greater than 3 cm), and we also determined the anatomical vascular territory of acute stroke lesions and possible etiologic mechanisms. The findings of DWI were normal in 24/41 patients (58.5%), while 15 (36.6%) showed acute ischemic lesions. The other two showed old lacunar infarcts. All acute and old DWI lesions were revealed by conventional MR imaging. Among the 15 acute stroke patients, seven had small vessel lacunar disease. In three patients, the infarction was less than 1 cm in size. Six patients showed large vessel infarction in the territory of the MCA, PCA, and PICA; the size of this was less than 1 cm in three patients, 1-3 cm in two, and more than 3 cm in one. In two patients, embolic infarction of cardiac origin in the territory of the MCA and AICA was diagnosed. The possible mechanism of TIA is still undetermined, but acute lesions revealed by DWI in TIA patients tend, in any case, to be small and multiple. (author)

  5. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  6. Complete 360° circumferential SSOCT gonioscopy of the iridocorneal angle

    Science.gov (United States)

    McNabb, Ryan P.; Kuo, Anthony N.; Izatt, Joseph A.

    2014-02-01

    The ocular iridocorneal angle is generally an optically inaccessible area when viewed directly through the cornea due to the high angle of incidence required and the large index of refraction difference between air and cornea (nair = 1.000 and ncornea = 1.376) resulting in total internal reflection. Gonioscopy allows for viewing of the angle by removing the aircornea interface through the use of a special contact lens on the eye. Gonioscopy is used clinically to visualize the angle directly but only en face. Optical coherence tomography (OCT) has been used to image the angle and deeper structures via an external approach. Typically, this imaging technique is performed by utilizing a conventional anterior segment OCT scanning system. However, instead of imaging the apex of the cornea, either the scanner or the subject is tilted such that the corneoscleral limbus is orthogonal to the optical axis of the scanner requiring multiple volumes to obtain complete circumferential coverage of the ocular angle. We developed a novel gonioscopic OCT (GOCT) system that images the entire ocular angle within a single volume via an "internal" approach through the use of a custom radially symmetric gonioscopic contact lens. We present, to our knowledge, the first complete 360° circumferential volumes of the iridocorneal angle from a direct, internal approach.

  7. Before Using Aspirin to Lower Your Risk of Heart Attack or Stroke, Here Is What You Should Know

    Science.gov (United States)

    ... Medicines Safe Daily Use of Aspirin Before Using Aspirin to Lower Your Risk of Heart Attack or ... care provider can determine whether regular use of aspirin will help to prevent a heart attack or ...

  8. Dysfunction of Right Heart in Attack Period of Bronchial Asthma in Children

    Directory of Open Access Journals (Sweden)

    V.А. Kondratiev

    2015-11-01

    Full Text Available There were performed Doppler echocardiography investigations of functional state of the right heart in 42 children aged 5–17 years old in attack period of bronchial asthma of moderate to severe degree. Changes of intra-cardiac hemodynamics of the right heart in children in attack period of bronchial asthma were characterized by disturbance of systolic and diastolic function of the right ventricle and right atrium. Combined systolic-diastolic variant of the right ventricle dysfunction was typical for attack period of bronchial asthma in children and developed in 95.5 % of cases. Elevation of pressure in pulmonary artery was typical and significantly more often occurred in severe asthma attack, herewith pulmonary hypertension of the second degree predominated.

  9. Contact angle hysteresis: a review of fundamentals and applications

    NARCIS (Netherlands)

    Eral, Burak; 't Mannetje, Dieter; Oh, J.M.

    2013-01-01

    Contact angle hysteresis is an important physical phenomenon. It is omnipresent in nature and also plays a crucial role in various industrial processes. Despite its relevance, there is a lack of consensus on how to incorporate a description of contact angle hysteresis into physical models. To

  10. Y Is for Yacht Race: A Game of Angles.

    Science.gov (United States)

    Butzow, John W.

    1986-01-01

    Describes an activity approach for teaching upper elementary school students the concept of angles. In the interdisciplinary activity, students practice reading and drawing angles from 0 to 360 degrees as they simulate the behaviors used to navigate a sailboat. Includes list of equipment needed and procedures used. (JN)

  11. Physiological response to angling of Africa's premier freshwater ...

    African Journals Online (AJOL)

    Blood plasma was analysed for glucose, cortisol and lactate concentrations to assess the effects of angling duration, fish size and fish condition. Larger fish were angled for a longer duration. Plasma glucose concentrations decreased with greater lactate concentrations, an indication of the aerobic and anaerobic work done ...

  12. 47 CFR 25.205 - Minimum angle of antenna elevation.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Minimum angle of antenna elevation. 25.205 Section 25.205 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25.205 Minimum angle of antenna elevation. (a) Earth station...

  13. Presentation of Primary Open Angle Glaucoma (POAG) at Lions ...

    African Journals Online (AJOL)

    Objective Primary open angle glaucoma (POAG) is the most common type of glaucoma in Africa. We carried out a study to determine the clinical presentation pattern of patients with primary open angle glaucoma (POAG) at a tertiary hospital in Malawi. Design A cross-sectional study. Setting Lions Sight First Eye Hospital—a ...

  14. The distinguishing motor features of cataplexy: a study from video-recorded attacks.

    Science.gov (United States)

    Pizza, Fabio; Antelmi, Elena; Vandi, Stefano; Meletti, Stefano; Erro, Roberto; Baumann, Christian R; Bhatia, Kailash P; Dauvilliers, Yves; Edwards, Mark J; Iranzo, Alex; Overeem, Sebastiaan; Tinazzi, Michele; Liguori, Rocco; Plazzi, Giuseppe

    2018-05-01

    To describe the motor pattern of cataplexy and to determine its phenomenological differences from pseudocataplexy in the differential diagnosis of episodic falls. We selected 30 video-recorded cataplexy and 21 pseudocataplexy attacks in 17 and 10 patients evaluated for suspected narcolepsy and with final diagnosis of narcolepsy type 1 and conversion disorder, respectively, together with self-reported attacks features, and asked expert neurologists to blindly evaluate the motor features of the attacks. Video documented and self-reported attack features of cataplexy and pseudocataplexy were contrasted. Video-recorded cataplexy can be positively differentiated from pseudocataplexy by the occurrence of facial hypotonia (ptosis, mouth opening, tongue protrusion) intermingled by jerks and grimaces abruptly interrupting laughter behavior (i.e. smile, facial expression) and postural control (head drops, trunk fall) under clear emotional trigger. Facial involvement is present in both partial and generalized cataplexy. Conversely, generalized pseudocataplexy is associated with persistence of deep tendon reflexes during the attack. Self-reported features confirmed the important role of positive emotions (laughter, telling a joke) in triggering the attacks, as well as the more frequent occurrence of partial body involvement in cataplexy compared with pseudocataplexy. Cataplexy is characterized by abrupt facial involvement during laughter behavior. Video recording of suspected cataplexy attacks allows the identification of positive clinical signs useful for diagnosis and, possibly in the future, for severity assessment.

  15. An efficient algorithm for the detection of exposed and hidden wormhole attack

    International Nuclear Information System (INIS)

    Khan, Z.A.; Rehman, S.U.; Islam, M.H.

    2016-01-01

    MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time) and RSSI (Received Signal Strength Indicator) for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead. (author)

  16. Effects of Sweep Angle on the Boundary-Layer Stability Characteristics of an Untapered Wing at Low Speeds

    Science.gov (United States)

    Boltz, Frederick W.; Kenyon, George C.; Allen, Clyde Q.

    1960-01-01

    An investigation was conducted in the Ames 12-Foot Low-Turbulence Pressure Tunnel to determine the effects of sweep on the boundary-layer stability characteristics of an untapered variable-sweep wing having an NACA 64(2)A015 section normal to the leading edge. Pressure distribution and transition were measured on the wing at low speeds at sweep angles of 0, 10, 20, 30, 40, and 50 deg. and at angles of attack from -3 to 3 deg. The investigation also included flow-visualization studies on the surface at sweep angles from 0 to 50 deg. and total pressure surveys in the boundary layer at a sweep angle of 30 deg. for angles of attack from -12 to 0 deg. It was found that sweep caused premature transition on the wing under certain conditions. This effect resulted from the formation of vortices in the boundary layer when a critical combination of sweep angle, pressure gradient, and stream Reynolds number was attained. A useful parameter in indicating the combined effect of these flow variables on vortex formation and on beginning transition is the crossflow Reynolds number. The critical values of crossflow Reynolds number for vortex formation found in this investigation range from about 135 to 190 and are in good agreement with those reported in previous investigations. The values of crossflow Reynolds number for beginning transitions were found to be between 190 and 260. For each condition (i.e., development of vortices and initiation of transition at a given location) the lower values in the specified ranges were obtained with a light coating of flow-visualization material on the surface. A method is presented for the rapid computation of crossflow Reynolds number on any swept surface for which the pressure distribution is known. From calculations based on this method, it was found that the maximum values of crossflow Reynolds number are attained under conditions of a strong pressure gradient and at a sweep angle of about 50 deg. Due to the primary dependence on pressure

  17. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system [research brief].

    Science.gov (United States)

    2012-03-01

    Government regulators and transportation operators of public bus systems are concerned about terrorist attacks. Bus attacks in Israel between late September 2000 and the end of 2006, a period known as the Second Intifada, are particularly well known....

  18. Surface pressure model for simple delta wings at high angles of attack

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    polynomial function approach, splines with limited support and neural network models are ... for thin streamlined bodies, the normal force and pitching moment .... eter, a simple point vortex over an infinite plate is used to derive some results.

  19. High Angle of Attack Missile Aerodynamics at Mach Numbers 0.30 to 1.5

    Science.gov (United States)

    1980-11-01

    I AFWAL-TR-80-3070 I 45~//1° 4. N3B2 Cn 3d . 35 10 -2 36 30 37 50 2- S Cy ’ -1I __- 40 0 45 CAh ------ 50 -555 70- * 6C 50 504 40 ZS 8 9 LO R*N a 4. 5...Continued) 36. Drescher, H., "Messung Der Auf Querange-Sti"mte Zylinder Ausgeubten Zeitlich Verabderten Druck ," Z.F. Flugwss, Vol. 4, No. 1/2, 1956

  20. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    Science.gov (United States)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.