Academic literature on the topic 'Attack by observation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack by observation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Attack by observation"

1

Adus, Emilia Hatija, and Yustina Pu'u. "POPULASI DAN TINGKAT SERANGAN HAMA KUTU PUTIH Dysmicoccus brevipes (Hemiptera : Pseudociccidae) PADA TANAMAN JAHE (Zingiber officinalle Rosc) DI DESA NUAMURI KECAMATAN KELIMUTU." AGRICA 14, no. 1 (July 15, 2021): 59–66. http://dx.doi.org/10.37478/agr.v14i1.1037.

Full text
Abstract:
This study aims to determine the population and level of attack of mealybug pests on ginger plants during harvesting in Nuamuri Village, Kelimutu District, Ende Regency. This research was carried out from February 2020 to July 2020, in Detubewa village, Nuamaro village and Nuamuri village. Observations were made by directly counting pests and damaged and attacked rhizomes, using the path method. Data analysis used is data obtained from the location of observations in tabulation based on the results of direct observations in the field. What was observed was the population and attack rate of each affected ginger planting location. The results showed that during the observation, the highest population of mealybugs was found in Detubewa village with 2,645 heads and the lowest value was in Nuamaro village, namely 2,127 heads, the highest pest population after Detubewa village was village Nuamuri with 2,478 individuals. Meanwhile, the attack rate and presentation of very heavy attacks were in Detubewa village by 84%, and heavy attacks in Nuamuri village at 66% and Nuamaro village at 68%.
APA, Harvard, Vancouver, ISO, and other styles
2

Fernandes, Andrian, and Ngatiman . "PATTERNS OF Coptotermes sp. TERMITE ATTACK ON Shorea leprosula Miq IN KHDTK SEBULU, EAST KALIMANTAN." KnE Life Sciences 2, no. 1 (September 20, 2015): 544. http://dx.doi.org/10.18502/kls.v2i1.213.

Full text
Abstract:
<p>Red meranti (Shorea leprosula Miq) as a major commercial timber has been widely planted in Dipterocarp forests. Coptotermes sp. termite often attacks S. leprosula Miq to its death, but the attack patterns are unknown. This research aims to get data on the frequency, intensity, and patterns of Coptotermes sp. attack in KHDTK Sebulu, East Kalimantan. Methods used were observation, recording, and mapping on S. leprosula Miq trees attacked by termites in KHDTK Sebulu. The results showed that the frequency of termite attacks on S. leprosula Miq in KHDTK Sebulu was 6.4-30.5% and termite attacks intensity was 4.7-22.1%. Termite attack patterns tended to spread and were followed by the formation of the nest to produce colonies. </p><p><strong>Keywords</strong> : S. Leprosula Miq plant, Coptotermes sp.,attack frequency, attack intensity, attack pattern.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Kruszewski, Piotr, Carlos Bordini, Alf O. Brubakk, and Ottar Sjaastad. "Cluster Headache: Alterations in Heart Rate, Blood Pressure and Orthostatic Responses During Spontaneous Attacks." Cephalalgia 12, no. 3 (June 1992): 172–77. http://dx.doi.org/10.1046/j.1468-2982.1992.1203172.x.

Full text
Abstract:
Changes in heart rate and blood pressure (BP) have been monitored beat-to-beat in a cluster headache patient with and without attacks using a non-invasive Doppler servo method. Two attacks were monitored and during one of them a tilt test was carried out. The variability of heart rate and BP was greater during the attack than during the interparoxysmal period. A marked bradycardia occurred during attacks. Systolic BP increased slightly. There was no heart rate increase after tilting during the attack, whereas this was present invariably during tests carried out interparoxysmally. BP changes during “attack tilt” were difficult to evaluate because of large variation. This may be the first observation of a baroreflex arc dysfunction during a cluster headache attack.
APA, Harvard, Vancouver, ISO, and other styles
4

Zulaikha, Eva, Arneti Arneti, and Munzir Busniah. "Menguji Tingkat Serangan Wereng Batang Coklat Nilaparvata lugens Stal (Hemiptera: Delphacidae) pada Varietas Padi Asal Pasaman di Rumah Kaca." JPT : JURNAL PROTEKSI TANAMAN (JOURNAL OF PLANT PROTECTION) 5, no. 1 (July 11, 2021): 55. http://dx.doi.org/10.25077/jpt.5.1.55-59.2021.

Full text
Abstract:
Brown planthopper (BPH) is a major pest on rice plants that can cause hopperburn and crop failure. The study aimed to determine the level of BPH attack on several local rice varieties in the Pasaman Regency. This research was conducted in a greenhouse, Faculty of Agriculture, Universitas Andalas, using a completely randomized design (CRD), with five treatments and five replications. The treatments were four different rice varieties from Pasaman and control (Siganteng, Pulau Batu, Mundam Kuning, Mundam Putih, IR 42). BPH was infested when the rice was five days after sowing. Observation parameters were the percentage and the intensity of the attacks. Observations were done until 15 days after infestation; after the IR 42 variety died 90%. The results showed that the attack rate of BPH on rice varieties from Pasaman was moderate. The lowest percentage of attack occurred in the Mundam Putih variety (94%), while the intensity of the attack was not significantly different from other varieties.
APA, Harvard, Vancouver, ISO, and other styles
5

Conti, Gustavo De Conti Teixeira Costa, Henrique De Oliveira Castro Castro, Auros Barreiros Freire Freire, Breno Ferreira Evangelista Evangelista, Gustavo Ferreira Pedrosa Pedrosa, Herbert Ugrinowitsch Ugrinowitsch, and Gibson Moreira Praça Praça. "High level of Brazilian men´s volleyball: characterization and difference of predictive factors of back row attack." Motricidade 14, no. 1 (May 24, 2018): 58. http://dx.doi.org/10.6063/motricidade.12221.

Full text
Abstract:
This study aimed to identify the predictive factors of attacks, performed from positions 1 and 6 according to the effect of reception in high level Brazilian male volleyball and to find the predictive factors that differentiate the game practiced from these positions. The sample consisted in the observation of 142 games of the Brazilian Men's Super League, totalling 2969 actions of reception, setting and attack from positions 1 and 6. The significance value adopted was 5% (p ≤ 0.05). The analysis of the predictive factors of the game performed by the attacker of position 1 showed greater chances to score after an excellent (odds ratio adjusted – ORA = 1.48) and moderate effect of reception (ORA = 1.31), the second attack tempo (ORA = 1.32), the powerful attack in parallel (ORA = 1.91) and in diagonal (ORA =3.44). The attacker of position 6 showed higher chances of scoring after a high effect of reception (ORA = 3.39) and powerful attack in the parallel (ORA = 1.53). In conclusion, regardless the effect of reception, the use of the back-row attackers is recommended to increase the uncertainty on the opposing team and the chances to score.
APA, Harvard, Vancouver, ISO, and other styles
6

Utami, Sri, and Agus Ismanto. "SERANGAN HAMA DEFOLIATOR PADA BIBIT TANAMAN KEHUTANAN." JURNAL HUTAN PULAU-PULAU KECIL 1, no. 2 (December 1, 2016): 97. http://dx.doi.org/10.30598/jhppk.2016.1.2.97.

Full text
Abstract:
One of the efforts to support the success of forest plantation development is the availability of quality seeds (free from pests and diseases and have the ability to grow good). Defoliator pests is one of the problems frequently encountered pest attack seedlings in the nursery. Defoliator pest attacks will result in the failure of seedlings. The study was conducted at Modern Nursery located in the Sukamoro Village, Banyuasin, South Sumatra Province from February to May 2013. The purpose of the study was to analize the pest which attacks some seedlings e.g. Jabon (Anthocephalus cadamba), kayu bawang (Dysoxylum molissimum) and tembesu (Fagraea fragans) respectively 1 month old. The results showed that Arthroschista hilaralis is defoliator pests that attack several seedlings. A. hilaralis pest attacks Jabon begin observation two week with the percentage and intensity of attack by 40% and 30,39% respectively. The pest attacks continue to rise to observations in fourth week with a severity of 100%. The percentage and intensity of pests on kayu bawang seedling 68,72% and 40,66% respectively. On the seedlings tembesu, percentages and intensity of pest attacks 5,83% and 3,88% respectively, which is found in the observation of the 4th week. This showed that A. hilaralis is one of the pests that have a preference to eat in addition to its main host plant Jabon. Therefore, the presence of pests defoliator A. hilaralis on a scale nurseries should be anticipated. Management required appropriate controls in preventing these pests so that forestry plant breeding activities are carried out within the framework of the provision of seeds for planting in a broader scale having success.
APA, Harvard, Vancouver, ISO, and other styles
7

Conti, Gustavo, Auro Freire, Breno Evangelista, Gustavo Pedrosa, Herbert Ugrinowitsch, and Henrique Castro. "Brazilian high-level men’s volleyball." Kinesiology 50, no. 2 (2018): 211–17. http://dx.doi.org/10.26582/k.50.2.4.

Full text
Abstract:
The present study aimed to characterize and differentiate between the predictive factors of the attacks performed by the opposite player from positions 1 and 2. The sample consisted of the observation records of 142 volleyball games of the Brazilian Men’s Super-League season 2014/2015, totaling 8,010 actions of reception, setting and attack, with 5,965 actions from position 2 and 2,045 from position 1. The analysis of the predictive factors of the opposite player’s attack, according to the position of the attack, showed that the attacks from position 2 are more likely to occur after reception B (OR:1.317), in either diagonal (OR:1.302) or parallel (OR: 1.548), and to result in blocking of the attack (OR:1.496). On the other hand, attacks performed from position 1 are more likely to occur after receiving A (OR:0.458) resulting in a point (OR:0.709). Thus, situational constraints influenced the predictive factors of the opposite player’s attack, according to the attacking position
APA, Harvard, Vancouver, ISO, and other styles
8

He, Gao Feng, Tao Zhang, Yuan Yuan Ma, and Jia Xuan Fei. "Protecting User’s Privacy from Browser-Based Attacks." Applied Mechanics and Materials 631-632 (September 2014): 941–45. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.941.

Full text
Abstract:
Recently there has been a new kind of attacks, browser-based attacks, against anonymous communication systems, such as Tor. This kind of attacks exploits JavaScript in the browser or the HTML meta refresh to generate some predefined signals to correlate users and their visited websites. A novel and efficient defense against such attacks is proposed in this paper. Our main observation is that the attacker must generate enough signals from the client site (the browser) to correlate the user and the website while we can detect the attack at the client site. More specifically, when a user is browsing a specific website and a browser-based attack is in progress, the number of outgoing flows and the total byte counts generated by the browser should be much larger compared with the normal browsing behavior. So we can set up fingerprints (number of outgoing flows and total byte counts) for normal browsing of web pages for a period of time and utilize these fingerprints to detect browser-based attacks. We have also found that some JavaScript codes must be executed many times if the attacker uses JavaScript to communicate. We have modified the Mozilla Firefox JavaScript engine to audit execution times of JavaScript code to defend these attacks, including browser-based attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Costa, Gustavo De Conti Teixeira, Breno Ferreira de Britto Evangelista, Mariana Pereira Maia, Juliana Sampaio Ceccato, Auro Barreiros Freire, Michel Milistetd, José Cícero Moraes, and Herbert Ugrinowitsch. "Voleibol: análise do ataque realizado a partir do fundo da quadra na Superliga Masculina Brasileira." Brazilian Journal of Kinanthropometry and Human Performance 19, no. 2 (May 28, 2017): 233. http://dx.doi.org/10.5007/1980-0037.2017v19n2p233.

Full text
Abstract:
DOI: http://dx.doi.org/10.5007/1980-0037.2017v19n2p233 The aim of this study was to identify the effect of attacks from positions 1 and 6 in high-level Brazilian Men’s Volleyball in order to understand the offensive structure of the game. The sample was composed of the observation of 142 2014-2015 Men’s Superleague games, totaling 2969 reception, set and attack actions from positions 1 and 6. The results showed association between place of attack, attack tempo, type of attack and effect of attack (p<0.001). The results showed that the point of attack, when it is performed from position 6, is associated with parallel attack, while, when analyzing position 1, the point of attack is associated with potent diagonal attack. Furthermore, placed attack was associated with game continuity, as well as with low-quality receptions (b and c). In this context, it was concluded the attacking position influences the attack efficacy, according to time and type of attack.
APA, Harvard, Vancouver, ISO, and other styles
10

Lemos, Walkymário Paulo, José Cola Zanuncio, and José Eduardo Serrão. "Attack behavior of Podisus rostralis (Heteroptera: Pentatomidade) adults on caterpillars of Bombyx mori (Lepidoptera: Bombycidae)." Brazilian Archives of Biology and Technology 48, no. 6 (November 2005): 975–81. http://dx.doi.org/10.1590/s1516-89132005000800014.

Full text
Abstract:
Attack behavior of the predator Podisus rostralis (Stäl) (Heteroptera: Pentatomidae) adults on fourth instar Bombyx mori L. (Lepidoptera: Bombycidae) caterpillars was studied in laboratory conditions. Ten 24 hours old adults of this predator were observed during two hours with the following attack behavior: (1) Predator: prey finding; prey observation; touching prey with antenna; attack behavior; prey paralysis; predator retreat after attack; attack cessation; successive attacks; and (2) Prey: defense. The predator P. rostralis found its prey before attacking and it approached it with slow circular movements. The attack was usually made in the posterior part of the prey to reduce defense reaction. Larger size of prey in relation to the predator resulted difficult prey paralysis but it occurred in less than two hours.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Attack by observation"

1

Hurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.

Full text
Abstract:
Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing and government services. In recent years, critical infrastructures have become increasingly dependent on ICT; more interconnected and are often, as a result, linked to the Internet. Consequently, this makes these systems more vulnerable and increases the threat of cyber-attack. In addition, the growing use of wireless networks means that infrastructures can be more susceptible to a direct digital attack than ever before. Traditionally, protecting against environmental threats was the main focus of critical infrastructure preservation. Now, however, with the emergence of cyber-attacks, the focus has changed and infrastructures are facing a different danger with potentially debilitating consequences. Current security techniques are struggling to keep up to date with the sheer volume of innovative and emerging attacks; therefore, considering fresh and adaptive solutions to existing computer security approaches is crucial. The research presented in this thesis, details the use of behavioural observation for critical infrastructure security support. Our observer system monitors an infrastructure’s behaviour and detects abnormalities, which are the result of a cyber-attack taking place. By observing subtle changes in system behaviours, an additional level of support for critical infrastructure security is provided through a plug-in device, which operates autonomously and has no negative impact on data flow. Behaviour is evaluated using mathematical classifications to assess the data and detect changes. The subsequent results achieved during the data classification process were high and successful. Our observer approach was able to accurately classify 98.138 % of the normal and abnormal system behaviours produced by a simulation of a critical infrastructure, using nine data classifiers.
APA, Harvard, Vancouver, ISO, and other styles
2

Chabrier, Thomas. "Arithmetic recodings for ECC cryptoprocessors with protections against side-channel attacks." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00910879.

Full text
Abstract:
This PhD thesis focuses on the study, the hardware design, the theoretical and practical validation, and eventually the comparison of different arithmetic operators for cryptosystems based on elliptic curves (ECC). Provided solutions must be robust against some side-channel attacks, and efficient at a hardware level (execution speed and area). In the case of ECC, we want to protect the secret key, a large integer, used in the scalar multiplication. Our protection methods use representations of numbers, and behaviour of algorithms to make more difficult some attacks. For instance, we randomly change some representations of manipulated numbers while ensuring that computed values are correct. Redundant representations like signed-digit representation, the double- (DBNS) and multi-base number system (MBNS) have been studied. A proposed method provides an on-the-fly MBNS recoding which operates in parallel to curve-level operations and at very high speed. All recoding techniques have been theoretically validated, simulated extensively in software, and finally implemented in hardware (FPGA and ASIC). A side-channel attack called template attack is also carried out to evaluate the robustness of a cryptosystem using a redundant number representation. Eventually, a study is conducted at the hardware level to provide an ECC cryptosystem with a regular behaviour of computed operations during the scalar multiplication so as to protect against some side-channel attacks.
APA, Harvard, Vancouver, ISO, and other styles
3

Lucas, Audrey. "Support logiciel robuste aux attaques passives et actives pour l'arithmétique de la cryptographie asymétrique sur des (très) petits coeurs de calcul." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S070.

Full text
Abstract:
Cette thèse porte sur le développement et l'évaluation de protections contrant simultanément des attaques par perturbation (FA) et des attaques par observation (SCA) dans le contexte de la cryptographie basée sur les courbes elliptiques (ECC). Deux protections ont été proposées pour la multiplication scalaire (SM), l'opération principale d'ECC. La première, nommée vérification de point (PV), permet une uniformisation de la SM grâce à une vérification de l'appartenance du point courant à la courbe. La SM ainsi obtenue est uniforme et donc résistante aux SPA mais aussi résistante à certaines FA. La seconde, nommée compteur d'itérations (IC), protège le scalaire contre certaines FA, tout en ayant un comportement uniforme et avec un très faible surcoût. Ces deux protections ont été implantées sur un microcontrôleur Cortex M0 pour les courbes de Weierstrass et de Montgomery, et ce pour différents types de coordonnées. Le surcoût de ces méthodes varie entre 48 % et 62 % dans le pire des cas (lorsque la PV est réalisée à chaque itération de la SM). Cela est moindre que celui des protections de bases habituelles contre les SCA. Un simulateur d'activité théorique au niveau arithmétique est également proposé. Il reproduit l'architecture d'un microcontrôleur 32 bits très simple. L'activité théorique est modélisée grâce à la variation du poids de Hamming des données manipulées lors de l'exécution. Grâce à ce simulateur, l'impact des opérandes sur l'activité des unités arithmétiques a pu être illustré. De plus, des attaques SPA et DPA furent réalisées pour évaluer les protections précédentes. Nos protections montrent une amélioration de la sécurité
This thesis deals with protection development and evaluation against fault attacks (FA) and side channel attacks (SCA) simultaneously. These protections have been developed for elliptic curves cryptography (ECC) and its main operation, the scalar multiplication (MS). Two protections have been proposed. The first is point verification (PV) checking that the current point is effectively on the curve, with a uniformization behavior. Thus, this new SM with PV is robust against some FAs and also SPA, since it is uniform. The second one is called counter iteration (IC). ICC protects the scalar against major FAs with a uniform behavior. Its overhead is very small. Our protections have been implemented on Cortex M0 microcontroller for Weiertrass and Montgomery curves and for different types of coordinates. The overhead is between 48 % and 62 %, in the worst case (when the PV is made at each SM iteration). This overhead is smaller than overhead of usual basic protections against SPA. A theorical activity simulator has also been developed. It reproduces the architecture of a simple 32-bit microcontroller. Theoric activity is modeled by the Hamming weigh variations of manipulated data during execution. Thanks to the simulator, the impact of operands is illustrated for arithmetic units. Moreover, SPA and DPA attacks were made for evaluating our protections. Our protections show some security improvements
APA, Harvard, Vancouver, ISO, and other styles
4

Linge, Yanis. "Etudes cryptographiques et statistiques de signaux compromettants." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM037/document.

Full text
Abstract:
Cette thèse porte sur les attaques par observations. Ces attaques étudient les variations d'émanation d'un composant pour retrouver une clé secrète. Ces émanations peuvent être multiples, par exemple, la consommation de courant électrique, le rayonnement électromagnétique, etc. Généralement, ces attaques font appel à des méthodes statistiques pour examiner la relation entre les émanations du composant et des modèles de consommation imaginés par l'attaquant. Trois axes sont développés dans cette thèse. Dans un premier temps, nous avons implémenté différentes attaques par observations sur des cartes graphiques en utilisant l'API OpenCL. Ces implémentations sont plus performantes que les implémentations classiques, ce qui permet à un attaquant de pouvoir traiter plus de données. Dans un second temps, nous avons proposé l'utilisation du MIC dans le cadre des attaques par observations. L'avantage du MIC, par rapport à l'information mutuelle, est sa facilité de calcul, ne dépendant pas de choix de noyau ou de taille de fenêtre. Son utilisation dans une attaque par observations est donc aisée, même si, la complexité des calculs à effectuer est souvent très importante. Enfin, nous avons introduit une nouvelle attaque, basée sur la distribution jointe de l'entrée et de la sortie de fonction cryptographique. Si cette distribution varie en fonction de la valeur de la clé impliquée par la fonction, on est capable de retrouver la clé secrète utilisée par le composant. Cette nouvelle attaque a la particularité de ne nécessiter ni la connaissance du texte clair, ni la connaissance du texte chiffré, ce qui lui permet d'être efficace même en présence de certaines contre-mesures
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the variation of device emanations to retrieve a secret key. These emanations can be the power consumption, the electromagnetic radiation, etc. Most of the time, those attacks use statistical methods to examine the relationship between the emanations and some leakage models supposed by the attacker. Three main axis are developed here. First, we have implemented many side channel attacks on GPGPU using the API OpenCL. These implementations are more effective than the classical ones, so an attacker can exploit more data. Then, in order to provide a new side channel attack, we have suggested the use of a new dependency measurement proposed by Reshef et al., the MIC. The MIC is more advantageous than the mutual information, because its computation does not depend of a kernel choice nor a windows size. So, its use in side channel analysis is simple, even if the time complexity is large. Finally, we have introduced a new attack based on the join distribution of the input and the output of a cryptographic sub-function. If the distribution depends on the key used in the function, we can retrieve the secret key. This attack can be efficient even in presence of some countermeasures because it does not required the knowledge of both plain text or cipher text
APA, Harvard, Vancouver, ISO, and other styles
5

Pelletier, Heather L. "An Exploration of the Relationship Between Vicarious Learning Experiences and Panic Attacks." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1310070759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Taylor, Matthew H. "Defining a Model for Tool Consumption Rate on Asphalt Reclamation Machines." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1293.

Full text
Abstract:
Asphalt and concrete reclamation machines are used to cut roadways when a repair is required. The performance of these machines can affect the quality of road repairs, and cost/profitability for both contractors and governments. We believe that several performance characteristics in reclamation machines are governed by the placement and pattern of cutting picks on the cutter head. Previous studies, focused on mining and excavation applications, have shown strong correlation between placement and wear. The following study employs a screening experiment (observational study) to find significant contributors to tool wear, in applications of asphalt milling or reclamation. We have found that picks fail by two primary modes: tip breakage, and body abrasive wear. Results indicate that the circumferential spacing of a bit, relative to neighboring bits, has the strongest effect on tip breakage. We have also shown that bit skew angle has a large positive effect on body abrasive wear.
APA, Harvard, Vancouver, ISO, and other styles
7

Alberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.

Full text
Abstract:
Notre thèse stipule qu'au vu de l'ampleur des agissements malveillants dans l'Internet, les logiciels d'extrémité doivent être surveillés. Pour limiter le nombre de points de surveillance, nous proposons de surveiller les logiciels depuis un point d'interconnexion. Nous avons dans ce but conçu Luth, un outil permettant de composer et de paralléliser un ensemble d'inspecteurs de points d'interconnexion (appelés MI) qui implémentent des mini IDS, IPS ou pare-feux, tout en vérifiant la correction et l'optimalité de ces derniers, à l'aide d'un langage de configuration et des algorithmes associés. Nous utilisons ensuite cet outil pour surveiller des logiciels d'extrémité permettant l'observation de trafic malveillant. Premièrement, après avoir démontré la nécessité de surveiller des pots de miels collecteurs de logiciels malveillants en concevant une attaque originale, nous montrons comment nous configurons Luth pour bloquer les attaques précédemment créées tout en laissant passer les attaques émulées par le pot de miel. Dans un second temps, nous utilisons Luth pour implémenter un bac-à-sable permettant d'analyser dynamiquement et aussi sûrement que voulu, les communications réseaux des logiciels malveillants. Nous montrons comment les informations obtenues par cette analyse permettent de regrouper ces logiciels et ainsi de limiter le nombre de binaires à analyser manuellement. Ensuite nous montrons comment nous générons automatiquement des signatures permettant la détection de ces virus depuis un point d'interconnexion
Our Ph.D states that given the magnitude of malicious behavior in the Internet, end-host software must be monitored. To limit the number of monitoring points, we propose to monitor the software from an interconnection point, i.e. a midpoint. We have designed for this purpose Luth, a tool to compose and parallelize a set of midpoint inspectors (MI) that implement mini IDS, IPS or firewall-s, while checking the correction and optimality of the resulting inspection tree, using a configuration language, its interpreter and associated algorithms. We then configure this tool to monitor some end-host software used to observe malicious traffic. First, we demonstrate why malware downloading honeypots must be monitored by designing an original attack. Then, we show how we configure Luth to block these attacks while accepting the intrusions emulated by the honeypot. In a second step, we use Luth to implement a sandbox that analyzes dynamically and as safely as wanted malware's network communications. We show how the information obtained by this analysis enables us to cluster the analyzed malware and therefore limit the number of malware to analyze manually. Finally, we show how we automatically generate signatures from this analysis to detect those malware from a midpoint device
APA, Harvard, Vancouver, ISO, and other styles
8

Branlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Edwards, Timothy Robin. "A prospective observational study to investigate the effect of prehospital airway management strategies on mortality and morbidity of patients who experience return of spontaneous circulation post cardiac arrest and are transferred directly to regional Heart Attack Centres by the Ambulance Service." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/19508.

Full text
Abstract:
Introduction: The most appropriate airway management technique for use by paramedics in out-of-hospital cardiac arrest is yet to be determined and evidence relating to the influence of airway management strategy on outcome remains equivocal. In cases where return of spontaneous circulation (ROSC) occurs following out-of-hospital cardiac arrest, patients may undergo direct transfer to a specialist heart attack centre (HAC) where the post resuscitation 12 lead ECG demonstrates evidence of ST elevation myocardial infarction. To date, no studies have investigated the role of airway management strategy on outcomes in this sub-set of patients. The AMICABLE (Airway Management In Cardiac Arrest, Basic, Laryngeal mask airway, Endotracheal intubation) study therefore sought to investigate the influence of prehospital airway management strategy on outcomes in patients transferred by the ambulance service directly to a HAC post ROSC. Methods: Adults with ROSC post out-of-hospital cardiac arrest who met local criteria for transfer to a HAC were identified prospectively. Ambulance records were reviewed to determine prehospital airway management approach and collect physiological and demographic data. HAC notes were obtained to determine in-hospital course and quantify neurological outcome via the Cerebral Performance Category (CPC) scale. Neurologically intact survivors were contacted post discharge to assess quality of life via the SF-36 health survey. Statistical analyses were performed via Chi-square, Mann Whitney U test, odds ratios, and binomial logistic regression. Results: A total of 220 patients were recruited between August 2013 and August 2014, with complete outcome data available for 209. The age of patients ranged from 22-96 years and 71.3% were male (n=149). Airway management was undertaken using a supraglottic airway (SGA) in 72.7% of cases (n=152) with the remainder undergoing endotracheal intubation (ETI). There was no significant difference in the proportion of patients with good neurological outcome (CPC 1&2) between the SGA and ETI groups (p=.286). Similarly, binomial logistic regression incorporating factors known to influence outcome demonstrated no significant difference between the SGA and ETI groups (Adjusted OR 0.725, 95% CI 0.337-1.561). Clinical and demographic variables associated with good neurological outcome included the presence of a shockable rhythm (p < .001), exposure to angiography (p < .001), younger age (p < .001) and shorter time to ROSC (p < .001). Due to an inadequate response rate (25.4%, n=15) analysis of SF36 data was limited to descriptive statistics. Limitations: The study only included patients who achieved ROSC and met the criteria for direct transfer to a HAC. Results are therefore not generalisable to more heterogenous resuscitation populations. Accuracy of clinical decision making and ECG interpretation were not assessed and therefore some patients included in the study may have been inappropriately transferred to a HAC. The low SF-36 survey response rate limited the level of neurological outcome analysis that could be undertaken. Conclusion: In this study, there was no significant difference in the proportion of good neurological outcomes in patients managed with SGA versus ETI during cardiac arrest. Further research incorporating randomised controlled trials is required to provide more definitive evidence in relation to the optimal airway management strategy in out-of-hospital cardiac arrest.
APA, Harvard, Vancouver, ISO, and other styles
10

Le, Bouder Hélène. "UN FORMALISME UNIFIANT LES ATTAQUES PHYSIQUES SUR CIRCUITS CRYTOGRAPHIQUES ET SON EXPLOITATION AFIN DE COMPARER ET RECHERCHER DE NOUVELLES ATTAQUES." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0759/document.

Full text
Abstract:
Cette thèse se situe dans la cryptanalyse physique des algorithmes de chiffrement par blocs. Un algorithme cryptographique est conçu pour être mathématiquement robuste. Cependant, une fois implémenté dans un circuit, il est possible d'attaquer les failles de ce dernier. Par opposition à la cryptanalyse classique, on parle alors d'attaques physiques. Celles-ci ne permettent pas d'attaquer l'algorithme en soi, mais son implémentation matérielle. Il existe deux grandes familles d'attaques physiques différentes : les attaques par observation du circuit durant le chiffrement, et les attaques par injections de fautes, qui analysent l'effet d'une perturbation intentionnelle sur le fonctionnement du circuit. Les attaques physiques ont deux types d'objectifs : rechercher la clé ou faire de la rétro-conception (retrouver une partie d'un algorithme de chiffrement privé, ex : s-boxes modifiées). Bien que leurs principes semblent distincts, cette thèse présente un formalisme qui permet d'unifier toutes ces attaques. L'idée est de décrire les attaques physiques de façon similaire, afin de pouvoir les comparer. De plus, ce formalisme a permis de mettre en évidence de nouvelles attaques. Des travaux novateurs ayant pour objet de retrouver la clé de chiffrement d'un AES, uniquement avec la consommation de courant ont été menés. Une nouvelle attaque de type FIRE (Fault Injection for Reverse Engineering) pour retrouver les s-boxes d'un pseudo DES est également présentée dans la thèse. Ce travail a abouti sur une réflexion plus générale, sur les attaques par injections de fautes dans les schémas de Feistel classiques et généralisés
The main subject of this work is the physical cryptanalysis of blocks ciphers. Even if cryptographic algorithms are properly designed mathematically, they may be vulnerable to physical attacks. Physical attacks are mainly divided in two families: the side channel attacks which are based on the observation of the circuit behaviour during the computation, and the fault injection attacks which consist in disturbing the computation in order to alter the correct progress of the algorithm. These attacks are used to target the cipher key or to reverse engineer the algorithm. A formalism is proposed in order to describe the two families in a unified way. Unifying the different attacks under a same formalism allows to deal with them with common mathematical tools. Additionally, it allows a comparison between different attacks. Using this framework, a generic method to assess the vulnerabilities of generalized Feistel networks to differential fault analysis is presented. This work is furthermore extended to improve a FIRE attack on DES-like cryptosystems with customized s-boxes
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Attack by observation"

1

Ground attack-- Vietnam: The Marines who controlled the skies. New York: Ivy Books, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Raybould, Philip John Charles. Some observations of sulphate and acid attack on concrete cores taken from precast shell piles: A short term study. [London]: Queen Mary College, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Office, General Accounting. Operation Desert Shield/Desert Storm: Observations on the performance of the Army's Hellfire missile : report to the Secretary of the Army. Washington, D.C: U.S. General Accounting Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jenkins, Brian, Henry Willis, and Bing Han. Do Significant Terrorist Attacks Increase the Risk of Further Attacks? Initial Observations from a Statistical Analysis of Terrorist Attacks in the United States and Europe from 1970 to 2013. RAND Corporation, 2016. http://dx.doi.org/10.7249/pe173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Powell, Roger A., Stephen Ellwood, Roland Kays, and Tiit Maran. Stink or swim: techniques to meet the challenges for the study and conservation of small critters that hide, swim, or climb, and may otherwise make themselves unpleasant. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198759805.003.0008.

Full text
Abstract:
The study of musteloids requires different perspectives and techniques than those needed for most mammals. Musteloids are generally small yet travel long distances and many live or forage underground or under water, limiting the use of telemetry and direct observation. Some are arboreal and nocturnal, facilitating telemetry but limiting observation, trapping, and many non-invasive techniques. Large sexual size dimorphism arguably doubles sample sizes for many research questions. Many musteloids defend themselves by expelling noxious chemicals. This obscure group does not attract funding, even when endangered, further reducing rate of knowledge gain. Nonetheless, passive and active radio frequency identification tags, magnetic-inductance tracking, accelerometers, mini-biologgers and some GPS tags are tiny enough for use with small musteloids. Environmental DNA can document presence of animals rarely seen. These technologies, coupled with creative research design that is well-grounded on the scientific method, form a multi-dimensional approach for advancing our understanding of these charismatic minifauna.
APA, Harvard, Vancouver, ISO, and other styles
6

Yona, Sergio. Epicurean Economic and Social Undertones of Satires 1.1–3. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198786559.003.0003.

Full text
Abstract:
In this chapter, the philosophical observations of Philodemus concerning the nature of imparting ethical advice are connected more fully to Horace’s three introductory satires, in which he explores and criticizes Roman society for its many foibles, including its obsession with wealth acquisition, unhealthy sexual affairs, and lack of mutual forbearance in friendships. It attempts to show how some of Philodemus’ works, especially treatises like On Property Management, On Wealth, On Choices and Avoidances, and On Anger, as well as his poetic treatment of sex in the Epigrams, contribute to the philosophical and ethical coherence of Horace’s attacks on the vices prevalent in Rome in his day and age.
APA, Harvard, Vancouver, ISO, and other styles
7

Yona, Sergio. Deficient Wealth, Excessive Frankness. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198786559.003.0006.

Full text
Abstract:
The final chapter involves Horace’s description of the contrast between Epicurean moderation and Stoic excess through a series of portraits. The first is that of a rustic farmer, whose advice on meager fare and contentment even in the face of a financial crisis is the perfect embodiment of Epicurean teachings on the loss of wealth and the acceptance of poverty, as explained by Epicurus and Philodemus. The farmer’s sermon on how to deal with the vicissitudes of life with equanimity is followed by a humorous, long-winded, and ultimately ineffectual criticism from a lightweight Stoic, whose advice nevertheless connects in various ways with Epicurean ethics. The final consideration is a similar attack by yet another lightweight Stoic, who, as in the previous satire, employs frankness ineffectually. In the end both portrayals serve to legitimize Horace’s more gentle and compassionate approach to criticism, which owes much to Philodemus’ observations in On Frankness.
APA, Harvard, Vancouver, ISO, and other styles
8

Weightman, Gavin. The Great Inoculator. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300241440.001.0001.

Full text
Abstract:
Smallpox was the scourge of the eighteenth century: it showed no mercy, almost wiping out whole societies. Young and old, poor and royalty were equally at risk — unless they had survived a previous attack. Daniel Sutton, a young surgeon from Suffolk, used this knowledge to pioneer a simple and effective inoculation method to counter the disease. His technique paved the way for Edward Jenner's discovery of vaccination — but, while Jenner is revered, Sutton has been vilified for not widely revealing his methods until later in life. This book reclaims Sutton's importance, showing how the clinician's practical and observational discoveries advanced understanding of the nature of disease. The book explores Sutton's personal and professional development, and the wider world of eighteenth-century health in which he practised inoculation. Sutton's brilliant and exacting mind had a significant impact on medicine — the effects of which can still be seen today.
APA, Harvard, Vancouver, ISO, and other styles
9

Therese, McAllister, Corley Gene, United States. Federal Insurance and Mitigation Administration., United States. Federal Emergency Management Agency. Region II., and Greenhorne & O'Mara., eds. World Trade Center building performance study: Data collection, preliminary observations, and recommendations. Washington, D.C: Federal Emergency Management Agency, Federal Insurance and Mitigation Administration, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

May, John. Few Observations on the Mode of Attack And Employment of the Heavy Artillery at Ciudad Rodrigo And Badajoz in 1812 And St. Sebastian in 1813. Naval & Military Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Attack by observation"

1

Apiecionek, Łukasz. "Fuzzy Observation of DDoS Attack." In Theory and Applications of Ordered Fuzzy Numbers, 239–52. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59614-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Apiecionek, Łukasz, Jacek M. Czerniak, Wojciech T. Dobrosielski, and Dawid Ewald. "New Proposal of Fuzzy Observation of DDoS Attack." In Uncertainty and Imprecision in Decision Making and Decision Support: Cross-Fertilization, New Models and Applications, 240–50. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65545-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Prashant, and Manisha J. Nene. "An Observation on Social Media Content to Analyze Cyberpsycho Attack." In Smart Computing and Informatics, 507–14. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5547-8_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zarzycki, Hubert, Łukasz Apiecionek, Jacek M. Czerniak, and Dawid Ewald. "The Proposal of Fuzzy Observation and Detection of Massive Data DDOS Attack Threat." In Advances in Intelligent Systems and Computing, 363–78. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47024-1_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nuida, Koji. "Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory." In International Symposium on Mathematics, Quantum Theory, and Cryptography, 57–78. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_8.

Full text
Abstract:
Abstract In CRYPTO 2008, 1 year earlier than Gentry’s pioneering “bootstrapping” technique for the first fully homomorphic encryption (FHE) scheme, Ostrovsky and Skeith III had suggested a completely different approach towards achieving FHE. They showed that the $$\mathsf {NAND}$$ operator can be realized in some non-commutative groups; consequently, homomorphically encrypting the elements of the group will yield an FHE scheme, without ciphertext noise to be bootstrapped. However, no observations on how to homomorphically encrypt the group elements were presented in their paper, and there have been no follow-up studies in the literature. The aim of this paper is to exhibit more clearly what is sufficient and what seems to be effective for constructing FHE schemes based on their approach. First, we prove that it is sufficient to find a surjective homomorphism $$\pi :\widetilde{G} \rightarrow G$$ between finite groups for which bit operators are realized in G and the elements of the kernel of $$\pi $$ are indistinguishable from the general elements of $$\widetilde{G}$$. Secondly, we propose new methodologies to realize bit operators in some groups G. Thirdly, we give an observation that a naive approach using matrix groups would never yield secure FHE due to an attack utilizing the “linearity” of the construction. Then we propose an idea to avoid such “linearity” by using combinatorial group theory. Concretely realizing FHE schemes based on our proposed framework is left as a future research topic.
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Sensor Observations: A Gaussian Source Estimator." In Malicious Attack Propagation and Source Identification, 89–93. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator." In Malicious Attack Propagation and Source Identification, 69–77. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Baringoltz, Sara. "Some Clinical Observations on Patients with “Panic Attack” Diagnosis." In Cognitive Psychotherapy Toward a New Millennium, 303–6. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0567-9_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McEvoy, Thomas Richard, and Stephen D. Wolthusen. "Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation." In Lecture Notes in Computer Science, 70–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41476-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Siddhanti, Akhilesh Anilkumar, Subhamoy Maitra, and Nishant Sinha. "Certain Observations on ACORN v3 and the Implications to TMDTO Attacks." In Security, Privacy, and Applied Cryptography Engineering, 264–80. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71501-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Attack by observation"

1

Bolonkin, Alexander, and James Cloutier. "Some Optimal Problems in Search, Observation, and Attack." In AIAA Atmospheric Flight Mechanics Conference and Exhibit. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2005. http://dx.doi.org/10.2514/6.2005-6232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Mengchen, Bo An, Wei Gao, and Teng Zhang. "Efficient Label Contamination Attacks Against Black-Box Learning Models." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/551.

Full text
Abstract:
Label contamination attack (LCA) is an important type of data poisoning attack where an attacker manipulates the labels of training data to make the learned model beneficial to him. Existing work on LCA assumes that the attacker has full knowledge of the victim learning model, whereas the victim model is usually a black-box to the attacker. In this paper, we develop a Projected Gradient Ascent (PGA) algorithm to compute LCAs on a family of empirical risk minimizations and show that an attack on one victim model can also be effective on other victim models. This makes it possible that the attacker designs an attack against a substitute model and transfers it to a black-box victim model. Based on the observation of the transferability, we develop a defense algorithm to identify the data points that are most likely to be attacked. Empirical studies show that PGA significantly outperforms existing baselines and linear learning models are better substitute models than nonlinear ones.
APA, Harvard, Vancouver, ISO, and other styles
3

Harrison, W. S., A. W. Krings, and N. Hanebutte. "Optimizing the observation windows size for kernel attack signatures." In 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the. IEEE, 2004. http://dx.doi.org/10.1109/hicss.2004.1265450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Huijun, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. "Adversarial Examples for Graph Data: Deep Insights into Attack and Defense." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/669.

Full text
Abstract:
Graph deep learning models, such as graph convolutional networks (GCN) achieve state-of-the-art performance for tasks on graph data. However, similar to other deep learning models, graph deep learning models are susceptible to adversarial attacks. However, compared with non-graph data the discrete nature of the graph connections and features provide unique challenges and opportunities for adversarial attacks and defenses. In this paper, we propose techniques for both an adversarial attack and a defense against adversarial attacks. Firstly, we show that the problem of discrete graph connections and the discrete features of common datasets can be handled by using the integrated gradient technique that accurately determines the effect of changing selected features or edges while still benefiting from parallel computations. In addition, we show that an adversarially manipulated graph using a targeted attack statistically differs from un-manipulated graphs. Based on this observation, we propose a defense approach which can detect and recover a potential adversarial perturbation. Our experiments on a number of datasets show the effectiveness of the proposed techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Lun, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, and Dawn Song. "BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/509.

Full text
Abstract:
Recent research has confirmed the feasibility of backdoor attacks in deep reinforcement learning (RL) systems. However, the existing attacks require the ability to arbitrarily modify an agent's observation, constraining the application scope to simple RL systems such as Atari games. In this paper, we migrate backdoor attacks to more complex RL systems involving multiple agents and explore the possibility of triggering the backdoor without directly manipulating the agent's observation. As a proof of concept, we demonstrate that an adversary agent can trigger the backdoor of the victim agent with its own action in two-player competitive RL systems. We prototype and evaluate BackdooRL in four competitive environments. The results show that when the backdoor is activated, the winning rate of the victim drops by 17% to 37% compared to when not activated. The videos are hosted at https://github.com/wanglun1996/multi_agent_rl_backdoor_videos.
APA, Harvard, Vancouver, ISO, and other styles
6

Lalou, Mohammed, Hamamache Kheddouci, and Salim Hariri. "Identifying the Cyber Attack Origin with Partial Observation: A Linear Regression Based Approach." In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W). IEEE, 2017. http://dx.doi.org/10.1109/fas-w.2017.168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Luo, Xiaoyuan, Jianjin Li, Zhongping Jiang, and Xinping Guan. "Complete observation against attack vulnerability for cyber-physical systems with application to power grids." In 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT). IEEE, 2015. http://dx.doi.org/10.1109/drpt.2015.7432368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Microscopic Observation of Pattern Attack for Different Chemical Composition of Aluminium Alloy Sacrificial Anode by Aggressive Ions on Finished Surface." In International Conference on Advances in Science, Engineering, Technology and Natural Resources. International Institute of Chemical, Biological & Environmental Engineering, 2015. http://dx.doi.org/10.15242/iicbe.c0815029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fernandes, Antonio Carlos, Sina Mirzaei Sefat, Fabio Moreira Coelho, and Mario Ribeiro. "Towards the Understanding of Manifold Fluttering During Pendulous Installation: Flow Induced Rotation of Flat Plates in Uniform Flow." In ASME 2010 29th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2010. http://dx.doi.org/10.1115/omae2010-20950.

Full text
Abstract:
The pendulous installation method of a manifold has a first phase that can be considered as a free fall in water. Of course, this is not free due to the fluid action. The consequence is that the manifold may oscillate rotationally which characterizes a fluttering behavior. However, the manifold is a complex body with non-uniform shape, several modules, porosity etc. Hence, in order to improve the understanding of the fluttering, this work presents advances in the observation of flow induced rotation on a flat plate in uniform flow. This has been started experimentally and subsequently numerical models yielded a confirmation of quasi-steady observations. The experimental results were obtained at the Laborato´rio de Ondas e Correntes (LOC) [Laboratory of Waves and Current] in COPPE/Federal University of Rio de Janeiro. The drag and lift forces coefficients and the center of pressure have been obtained for angles of attack θ = 0°–90° and for different Reynolds numbers.
APA, Harvard, Vancouver, ISO, and other styles
10

Manohar, Krishpersad, Annil Rampartap, and Rikhi Ramkissoon. "Self-Starting Hybrid ‘H’ Type Wind Turbine." In ASME 2007 Energy Sustainability Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/es2007-36187.

Full text
Abstract:
Wind energy is one of the fastest growing alternative energy resources being taped into worldwide. Vertical axis Darrieus ‘H’ type lift turbines have the potential to compete effectively with the more widely used conventional horizontal axis wind turbines. However, a disadvantage is when the rotor is stationary, no net rotational force arises, even at high wind speed. The rotor must already be spinning to generate torque and the design is normally not self-starting. In this study a hybrid Darrieus ‘H’ type lift turbine was designed to operate as a self-starting drag type turbine at low rotational speed. With increasing rotational velocity the centrifugal force converted the drag type blades to full symmetrical airfoil sections making the turbine lift type. Design calculations, construction and testing of a two-blade prototype with 43 cm long blades, 14 cm wide, which formed a symmetrical airfoil of NACA 0018 profile when closed. The diameter for the turbine was 1.448 m and tests were conducted at six pitch angles with respect to the closed blade section (0°, 15°, 22.5°, 30°, 37.5° and 45°). Test results showed that the wind turbine was self-starting and the shaft speed increased linearly with wind speed at all angles of attack for moderate wind speed up to 10 m/s. However, the rate of change in shaft speed with wind speed showed an increase from 0° angle of attack to a critical 37.5° angle of attack and then decreased at 45° angle of attack. This observation is consistent with airfoil theory that greater drag forces exist at smaller angles of attack. A similar trend was observed for shaft power and turbine efficiency with maximum values of 49.5 W and 24%, respectively, at a wind speed of 8.29 m/s for the 37.5° angle of attack. The tip speed ratio increased from a minimum of 0.83 at 0° to a maximum of 2.66 at 37.5° and then decreased at 45°. This indicated drag type operation (t.s.r. < 1) at small angle of attack and lift type operation (t.s.r. > 1) at higher angle of attack. This trend was consistent with theory as the drag force decreased the aerodynamic lift force increased with increasing attack angle, causing the blade speed to exceed that of the wind speed.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Attack by observation"

1

Bolonkin, Alexander A., and James R. Cloutier. Search, Observation, and Attack Problems. Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada410927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Booker, Lashon B. The Effects of Observation Errors on the Attack Vulnerability of Complex Networks. Fort Belvoir, VA: Defense Technical Information Center, November 2012. http://dx.doi.org/10.21236/ada576235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ross, Robert, John W. Forsman, John R. Erickson, and Allen M. Brackley. Nondestructive Testing Technique to Quantify Deterioration from Marine Borer Attack in Sitka Spruce and Western Hemlock Logs: Observations from a Pilot Test. Madison, WI: U.S. Department of Agriculture, Forest Service, Forest Products Laboratory, 2014. http://dx.doi.org/10.2737/fpl-rn-0333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ross, Robert, John W. Forsman, John R. Erickson, and Allen M. Brackley. Nondestructive Testing Technique to Quantify Deterioration from Marine Borer Attack in Sitka Spruce and Western Hemlock Logs: Observations from a Pilot Test. Madison, WI: U.S. Department of Agriculture, Forest Service, Forest Products Laboratory, 2014. http://dx.doi.org/10.2737/fpl-rn-333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography