• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.033 seconds

Optimization of Angled Ribs for Heat Transfer Enhancement in a Square Channel with Bleed Flow (유출유동을 가진 정사각유로 내 열전달 향상을 위한 경사진 요철 최적설계)

  • Lee, Hyun;Kim, Kyung-Min;Lee, Dong-Hyun;Cho, Hyung-Hee
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.32 no.4
    • /
    • pp.300-306
    • /
    • 2008
  • In the present study, the second order response surface method (RSM) is carried out to get optimum thermal design for enhancing heat transfer in a square channel with bleed flow. The RSM is used as an optimization technique. To calculate the heat transfer, RNG k-epsilon model and enhanced wall function are used. To design optimum rib turbulators, two design variables such as attack angle of rib $({\alpha})$ and rib pitch-to-rib height ratio (p/e) are optimized. In these analyses, the channel inlet Reynolds number was fixed at 10,000 in both non-bleeding and bleeding cases. The response surfaces of two design variables are constructed in cases with and without bleed flow. As a result, the optimum (or highest) heat transfer values are almost the same in ranges of two cases with and without bleed flow. However, the friction losses in the case with bleed flow are lower than those without bleed flow.

Stock Market Response to Terrorist Attacks: An Event Study Approach

  • TAHIR, Safdar Husain;TAHIR, Furqan;SYED, Nausheen;AHMAD, Gulzar;ULLAH, Muhammad Rizwan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.31-37
    • /
    • 2020
  • The purpose of this research study is to examine the stock market's response to terrorist attacks. The study uses data of terrorist attacks in different parts of the country (Pakistan) from June 1, 2014 to May 31, 2017. The event window procedure applies to a 16-day window in which 5 days before and 10 days after the attack. In addition, several event windows have been built to test the response of the Pakistan Stock Exchange. KSE-100 index is taken as proxy of response. The total terrorist attacks are classified into four categories: attacks on law enforcement agencies, attacks on civilians, attacks on special places and attacks on politicians, government employees and bureaucrats. The standard market model is used to estimate the abnormal return of the Pakistan Stock Exchange, which takes 252 business days each year. Furthermore, BMP test is used to check statistical significance of cumulative abnormal rate of return (CAAR). The results of this study reveal that total number of terrorist attacks and attacks on law enforcement agencies show long-term effects on Pakistan stock exchange. However, attacks on civilians, attacks on special places and attacks on politicians, government employees and bureaucrats have little effect on the Pakistan Stock Exchange.

A Digital Watermarking of 3D Geometric Model STL for Rapid Prototyping System (쾌속조형 시스템을 위한 3차원 기하학적 형상인 STL의 디지털 워터마킹)

  • 김기석;천인국
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.5
    • /
    • pp.552-561
    • /
    • 2002
  • In this paper, a new watermarking algorithm for STL files which contains 3D geometric information as triangular facets is proposed. STL files are widely used in rapid prototyping industry as a standard interchange format. The proposed algorithm inserts multi-bit watermark information into the surface normal vector and vertex description area of STL file without distorting the original 3D geometric information. According to the watermark bits, the position of normal vector and the direction of vertex sequence are modulated. The proposed algorithm is robust to the attack of changing the order of the triangular meshes. In addition, the invisibility requirement is also satisfied. Experiment results show that the proposed algorithm can encode and decode watermark bits into the various STL files without any distortion of 3D shape.

  • PDF

Differential Fault Analysis on Lightweight Block Cipher LBlock (경량 블록 암호 LBlock에 대한 차분 오류 공격)

  • Jeong, Ki-Tae;Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.871-878
    • /
    • 2012
  • LBlock is a 64-bit ultra-light block cipher suitable for the constrained environments such as wireless sensor network environments. In this paper, we propose a differential fault analysis on LBlock. Based on a random nibble fault model, our attack can recover the secret key of LBlock by using the exhaustive search of $2^{25}$ and five random nibble fault injection on average. It can be simulated on a general PC within a few seconds. This result is superior to known differential fault analytic result on LBlock.

Guidance Law of Missiles for Control Impact-Time-and-Angle by Flight Path Angle in Three Dimensional Space (3차원 공간에서의 비행 경로각을 이용한 비행시간 및 충돌각 제어 유도법칙)

  • Jin, Sheng-Hao;Lee, Chun-Gi;Yang, Bin;Hwan, Chung-Won;Park, Seung-Yub
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.8-15
    • /
    • 2012
  • This paper on the assumption that the target is stationary and the velocity of missile is fixed value. In three dimensional space. Using flight path angle to simultaneous control impact-time-and-angle base on a homing guidance law. The independent variable in the nonlinear engagement model is the flight path angle of the missile. The propose homing guidance law can see the controllability of impact-time-and-angle. And also can see the processing of the missile arrive at the target. It is applied to several salvo attack scenarios. The performance of the proposed guidance law is verified by simulations.

PREDICTION OF AERODYNAMIC PERFORMANCE LOSS OF A WIND TURBINE BLADE SECTION DUE TO CONTAMINANT ACCUMULATION (외부 오염물 증착에 의한 풍력 터빈 날개 단면의 공력 성능 저하 예측)

  • Yang, T.H.;Choi, J.H.;Yu, D.O.;Kwon, O.J.
    • Journal of computational fluids engineering
    • /
    • v.18 no.1
    • /
    • pp.91-97
    • /
    • 2013
  • In the present study, the effects of contaminant accumulation and surface roughness on the aerodynamic performance of wind turbine blade sections were numerically investigated by using a flow solver based on unstructured meshes. The turbulent flow over the rough surface was modeled by a modified ${\kappa}-{\omega}$ SST turbulence model. The calculations were made for the NREL S809 airfoil with varying contaminant sizes and positions at several angles of attack. It was found that as the contaminant size increases, the degradation of the airfoil performance becomes more significant, and this trend is further amplified near the stall condition. When the contaminant is located at the upper surface near the leading edge, the loss in the aerodynamic performance of the blade section becomes more critical. It was also found that the surface roughness leads to a significant reduction of lift, in addition to increased drag.

Metaphor And Thought: Focused on Political Metaphors (은유와 사고: 정치적 은유를 중심으로)

  • Kim, Hyun-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4348-4353
    • /
    • 2011
  • This paper is based on the Cognitive Linguistics point of view on metaphor. Metaphors are not a matter of language use or rhetorics but of a conceptual frame, where thoughts work. The conceptual frames can highlight one aspect affecting our lives while hiding the other aspect of the facts. Politicians use metaphors to persuade people and justify their political decisions. Lakoff argues that the Republicans in the U.S. have their own conceptual framework based on the 'strict father model' of the conservatives, which can be found in important political speeches. Political metaphors supporting this view are found in the 'Attack on Iraq Speech' by G. H. Bush in 1991 and 'Operation Iraqi Freedom Address' by G. W. Bush in 2003.

Numerical Analysis on the Aerodynamic Characteristics of Thin Airfoil with Flapping and Pitching Motion (플래핑 운동 및 키놀이 운동을 하는 얇은 에어포일의 공력특성에 대한 수치 해석)

  • Kim, Woo-Jin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.21 no.1
    • /
    • pp.45-50
    • /
    • 2013
  • In this study, lumped-vortex element method and thin airfoil theory were used to analyze aerodynamic characteristics of airfoils with relative motion that had camber lines of NACA $44{\times}{\times}$ airfoil in 2-dimensional unsteady incompressible potential flow. Velocity disturbance due to airfoil was calculated by lumped-vortex element model and force distribution on airfoil by unsteady Bernoulli's equation. Variables in relative motion were considered the period p, the amplitude of flapping $A_f$ and pitching $A_p$, and the phase difference between flapping and pitching ${\phi}_p$ and the angle of attack ${\alpha}$. Due to movement of an airfoil, dag was induced in 2-dimensional unsteady incompressible potential flow. The numerical results show that the aerodynamic characteristics of the airfoil with flapping and pitching at the same time are illustrated. Especially the mean lift coefficient became smaller, but drag coefficient became larger.

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.

A Framework for measuring query privacy in Location-based Service

  • Zhang, Xuejun;Gui, Xiaolin;Tian, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1717-1732
    • /
    • 2015
  • The widespread use of location-based services (LBSs), which allows untrusted service provider to collect large number of user request records, leads to serious privacy concerns. In response to these issues, a number of LBS privacy protection mechanisms (LPPMs) have been recently proposed. However, the evaluation of these LPPMs usually disregards the background knowledge that the adversary may possess about users' contextual information, which runs the risk of wrongly evaluating users' query privacy. In this paper, we address these issues by proposing a generic formal quantification framework,which comprehensively contemplate the various elements that influence the query privacy of users and explicitly states the knowledge that an adversary might have in the context of query privacy. Moreover, a way to model the adversary's attack on query privacy is proposed, which allows us to show the insufficiency of the existing query privacy metrics, e.g., k-anonymity. Thus we propose two new metrics: entropy anonymity and mutual information anonymity. Lastly, we run a set of experiments on datasets generated by network based generator of moving objects proposed by Thomas Brinkhoff. The results show the effectiveness and efficient of our framework to measure the LPPM.