887 research outputs found

    Modeling and flight testing of differential thrust and thrust vectoring on a small UAV

    Get PDF
    The primary objectives of this research are to mathematically model the propulsion forces applied to the aircraft during nominal, differential thrust, and thrust vectored flight configurations, and verify this modeling through simulation and flight testing experiments. This thesis outlines the modeling process, simulator development, design, and implementation of a propulsion assisted control system for the WVU Flight Control Systems Lab (FCSL) research aircraft. Differential thrust and thrust vectoring introduce additional propulsive terms in the aircraft force equations that are not present when the thrust line passes through the center of gravity. These additional forces were modeled and incorporated into a simulator of the research aircraft. The effects from differential thrust were small and difficult to quantify. The thrust vectoring effects were also found to be small with the elevator having significantly more pitch control over the vectored motors at the simulated flight conditions.;Differential thrust was implemented using the on-board computer to command a different thrust level to each motor. The desired thrust differential was programed into a flight scheme based on simulation data, and activated during flight via a control switch on the transmitter. The thrust vectoring mechanism was designed using SolidWorksRTM, built and tested outside of the aircraft, and finally incorporated into the aircraft. A high torque servo was used to rotate the motor mounting bar and vector the motors to a desired deflection. Utilizing this mechanism, the thrust vectoring was flight tested, mimicking scenarios tested in simulation. The signal to noise ratio was very low, making it difficult to identify the small changes in the aircraft parameters caused by the vectored thrust

    The Zagreb (Croatia) M5.5 Earthquake on 22 March 2020

    Get PDF
    On 22 March 2020, Zagreb was struck by an M5.5 earthquake that had been expected for more than 100 years and revealed all the failures in the construction of residential buildings in the Croatian capital, especially those built in the first half of the 20th century. Because of that, extensive seismological, geological, geodetic and structural engineering surveys were conducted immediately after the main shock. This study provides descriptions of damage, specifying the building performances and their correlation with the local soil characteristics, i.e., seismic motion amplification. Co-seismic vertical ground displacement was estimated, and the most affected area is identified according to Sentinel-1 interferometric wide-swath data. Finally, preliminary 3D structural modeling of the earthquake sequence was performed, and two major faults were modeled using inverse distance weight (IDW) interpolation of the grouped hypocenters. The first-order assessment of seismic amplification (due to site conditions) in the Zagreb area for the M5.5 earthquake shows that ground motions of approximately 0.16–0.19 g were amplified at least twice. The observed co-seismic deformation (based on Sentinel-1A IW SLC images) implies an approximately 3 cm uplift of the epicentral area that covers approximately 20 km2. Based on the preliminary spatial and temporal analyses of the Zagreb 2020 earthquake sequence, the main shock and the first aftershocks evidently occurred in the subsurface of the Medvednica Mountains along a deep-seated southeast-dipping thrust fault, recognized as the primary (master) fault. The co-seismic rupture propagated along the thrust towards northwest during the first half-hour of the earthquake sequence, which can be clearly seen from the time-lapse visualization. The preliminary results strongly support one of the debated models of the active tectonic setting of the Medvednica Mountains and will contribute to a better assessment of the seismic hazard for the wider Zagreb area

    An Improved Differential Fault Attack on Camellia

    Get PDF
    The S-box lookup is one of the most important operations in cipher algorithm design, and also is the most effective part to prevent traditional linear and differential attacks, however, when the physical implementation of the algorithm is considered, it becomes the weakest part of cryptosystems. This paper studies an active fault based implementation attack on block ciphers with S-box. Firstly, it proposes the basic DFA model and then presents two DFA models for Feistel and SPN structure block ciphers. Secondly, based on the Feistel DFA model, it presents several improved attacks on Camellia encryption and proposes new attacks on Camellia key schedule. By injecting one byte random fault into the r-1th round left register or the the r-1th round key, after solving 8 equations to recover 5 or 6 propagated differential fault of the rth round left register, 5 or 6 bytes of the rth equivalent subkey can be recovered at one time. Simulation experiments demonstrate that about 16 faulty ciphertexts are enough to obtain Camellia-128 key, and about 32, 24 ciphertexts are required to obtain both Camellia-192/256 key with and without FL/FL-1 layer respectively. Compared with the previous study by ZHOU Yongbin et. al. by injecting one byte fault into the rth round left register to recover 1 equivalent subkey byte and obtaining Camellia-128 and Camellia-192/256 with 64 and 96 faulty ciphertexts respectively, our attacks not only extend the fault location, but also improve the fault injection efficiency and decrease the faulty ciphertexts number, besides, our DFA model on Camellia encryption can be easily extended to DFA on Camellia key schedule case, while ZHOU’s can not. The attack model proposed in this paper can be adapted into most of the block ciphers with S-boxes. Finally, the contradictions between traditional cryptography and implementation attacks are analyzed, the state of the art and future directions of the DFA on Block ciphers with S-boxes are discussed

    Aircraft parameter identification for application within a fault-tolerant flight control system

    Get PDF
    A parameter identification study was conducted to identify a detailed aircraft mathematical model for application within a fault-tolerant flight control system that aims to detect, identify, and accommodate for sensor and actuator failures. Specifically, a mathematical model was identified under nominal conditions for two aircraft platforms, and a model was developed for one platform under actuator failure conditions. These models are to be used in flight control law design and to account for actuator failures on the primary control surfaces for one of the research platforms. In order to accurately model the aircraft behavior following a control surface failure, the effects of an individual surface on the aircraft dynamics was estimated. Since an individual control surface deflection---for example in the event of a locked actuator---causes a coupling between the longitudinal and lateral-directional dynamics, additional terms were identified in the state space and stability and control derivative mathematical models. These models were derived from measured flight data acquired from pilot and automated computer-injected maneuvers under both nominal and failure conditions. From this analysis, the stability and control derivatives were extracted to determine the aerodynamic forces and moments on each aircraft. These aerodynamics were next introduced into a simulation environment to validate the accuracy of the identified mathematical models. A Data Compendium (DATCOM) -- based analysis was conducted in order to provide a means of comparison of the models obtained through the parameter identification study and to provide constraints on parameter optimization. Finally, a confidence interval analysis was conducted to determine the reliability of the estimated values. Several simulation studies were conducted to validate the accuracy of the models for each research platform, focusing on both nominal and primary control surface failure conditions where applicable. The model outputs were compared to the measured flight data from the two respective research platforms to validate the accuracy of the estimated parameters

    Modeling and enhanced control of hybrid full bridge–half bridge MMCs for HVDC grid studies

    Get PDF
    Modular multilevel converters (MMCs) are expected to play an important role in future high voltage direct current (HVDC) grids. Moreover, advanced MMC topologies may include various submodule (SM) types. In this sense, the modeling of MMCs is paramount for HVDC grid studies. Detailed models of MMCs are cumbersome for electromagnetic transient (EMT) programs due to the high number of components and large simulation times. For this reason, simplified models that reduce the computation times while reproducing the dynamics of the MMCs are needed. However, up to now, the models already developed do not consider hybrid MMCs, which consist of different types of SMs. In this paper, a procedure to simulate MMCs having different SM topologies is proposed. First, the structure of hybrid MMCs and the modeling method is presented. Next, an enhanced procedure to compute the number of SMs to be inserted that takes into account the different behavior of full-bridge SMs (FB-SMs) and half-bridge submodules (HB-SMs) is proposed in order to improve the steady-state and dynamic response of hybrid MMCs. Finally, the MMC model and its control are validated by means of detailed PSCAD simulations for both steady-state and transients conditions (AC and DC faults)

    Differential Fault Attack on KASUMI Cipher Used in GSM Telephony

    Get PDF
    The confidentiality of GSM cellular telephony depends on the security of A5 family of cryptosystems. As an algorithm in this family survived from cryptanalysis, A5/3 is based on the block cipher KASUMI. This paper describes a novel differential fault attack on KAUSMI with a 64-bit key. Taking advantage of some mathematical observations on the FL, FO functions, and key schedule, only one 16-bit word fault is required to recover all information of the 64-bit key. The time complexity is only 232 encryptions. We have practically simulated the attack on a PC which takes only a few minutes to recover all the key bits. The simulation also experimentally verifies the correctness and complexity

    Multiple Bytes Differential Fault Analysis on CLEFIA

    Get PDF
    This paper examines the strength of CLEFIA against multiple bytes differential fault attack. Firstly, it presents the principle of CLEFIA algorithm and differential fault analysis; then, according to injecting faults into the rth,r-1th,r-2th CLEFIA round three conditions, proposes three fault models and corresponding analysis methods; finally, all of the fault model and analysis methods above have been verified through software simulation. Experiment results demonstrate that: CLEFIA is vulnerable to differential fault attack due to its Feistel structure and S-box feature, 5-6,6-8,2 faults are needed to recover CLEFIA-128 based on the three fault models in this paper respectively, multiple byte faults model can greatly improve the attack practicality and even the attack efficiency, and the fault analysis methods in this paper can provide some fault analysis ideas on other block ciphers using S-box
    • …
    corecore