1,613 research outputs found

    Application of a Knowledge-Based Optimization Method for Aerodynamic Design

    Get PDF
    The current research is investigating the application of an optimization technique to an existing knowledge-based design tool. The optimization method, referred to as CODISC, helps improve the results from a knowledge-based design by eliminating the required advanced design knowledge, or help fine-tune a well-performing vehicle. Three CODISC designs are presented using a generic transonic transport, the Common Research Model (CRM). One design optimizes the baseline CRM to demonstrate the ability to improve a well-performing vehicle. Another design is performed from the CRM with camber and twist removed, which highlights the ability to use CODISC in the conceptual design phase. The final design implements laminar flow on the CRM, showing how CODISC can optimize the extent of laminar flow to find the best aerodynamic performance. All three CODISC designs reduced the vehicle drag compared to the baseline CRM, and highlight the new optimization techniques versatility in the aircraft design industry

    GEANT4 : a simulation toolkit

    Get PDF
    Abstract Geant4 is a toolkit for simulating the passage of particles through matter. It includes a complete range of functionality including tracking, geometry, physics models and hits. The physics processes offered cover a comprehensive range, including electromagnetic, hadronic and optical processes, a large set of long-lived particles, materials and elements, over a wide energy range starting, in some cases, from 250 eV and extending in others to the TeV energy range. It has been designed and constructed to expose the physics models utilised, to handle complex geometries, and to enable its easy adaptation for optimal use in different sets of applications. The toolkit is the result of a worldwide collaboration of physicists and software engineers. It has been created exploiting software engineering and object-oriented technology and implemented in the C++ programming language. It has been used in applications in particle physics, nuclear physics, accelerator design, space engineering and medical physics. PACS: 07.05.Tp; 13; 2

    Absolute stability analysis of attitude control systems for large boosters

    Get PDF
    Absolute stability analysis of attitude control systems for large launch vehicle

    A Knowledge-Based Optimization Method for Aerodynamic Design

    Get PDF
    A new aerodynamic design method, CODISC, has been developed that combines a legacy knowledge-based design method, CDISC, with a simple optimization module known as SOUP. The primary goal of this new design system is to improve the performance gains obtained using CDISC without adding significant computational time. An additional objective of this approach is to reduce the need for a priori knowledge of good initial input variable values, as well as for subsequent manual revisions of those values as the design progresses. Several test cases illustrate the development of the process to date and some of the options available at transonic and supersonic speeds for turbulent flow designs. The test cases generally start from good baseline configurations and, in all cases, were able to improve the performance. Several new guidelines for good initial values for the design variables, as well as new design rules within CDISC itself, were developed from these cases

    A Macro-econometric Model for Ireland

    Get PDF
    The Bank’s Macro-Econometric model has recently been revised. This paper outlines the context within which the model was initially built and the reasons for the revision and re-estimation. Compilation of the data used was a key component of the revision and this is described. The general structure of the model is outlined. Key equations are described and estimation issues noted. A discussion on simulating the model is provided along with results from sample simulations. The paper concludes with a discussion of how future work on the model might evolve.

    SIDH hybrid schemes with a classical component based on the discrete logarithm problem over finite field extension

    Get PDF
    The concept of a hybrid scheme with connection of SIDH and ECDH is nowadays very popular. In hardware implementations it is convenient to use a classical key exchange algorithm, which is based on the same finite field as SIDH. Most frequently used hybrid scheme is SIDH-ECDH. On the other hand, using the same field as in SIDH, one can construct schemes over \Fpn, like Diffie-Hellman or XTR scheme, whose security is based on the discrete logarithm problem. In this paper, idea of such schemes will be presented. The security of schemes, which are based on the discrete logarithm problem over fields \Fp, \Fpd, \Fpc, \Fps and \Fpo, for primes pp used in SIDH, will be analyzed. At the end, the propositions of practical applications of these schemes will be presented

    An integrated security Protocol communication scheme for Internet of Things using the Locator/ID Separation Protocol Network

    Get PDF
    Internet of Things communication is mainly based on a machine-to-machine pattern, where devices are globally addressed and identified. However, as the number of connected devices increase, the burdens on the network infrastructure increase as well. The major challenges are the size of the routing tables and the efficiency of the current routing protocols in the Internet backbone. To address these problems, an Internet Engineering Task Force (IETF) working group, along with the research group at Cisco, are still working on the Locator/ID Separation Protocol as a routing architecture that can provide new semantics for the IP addressing, to simplify routing operations and improve scalability in the future of the Internet such as the Internet of Things. Nonetheless, The Locator/ID Separation Protocol is still at an early stage of implementation and the security Protocol e.g. Internet Protocol Security (IPSec), in particular, is still in its infancy. Based on this, three scenarios were considered: Firstly, in the initial stage, each Locator/ID Separation Protocol-capable router needs to register with a Map-Server. This is known as the Registration Stage. Nevertheless, this stage is vulnerable to masquerading and content poisoning attacks. Secondly, the addresses resolving stage, in the Locator/ID Separation Protocol the Map Server (MS) accepts Map-Request from Ingress Tunnel Routers and Egress Tunnel Routers. These routers in trun look up the database and return the requested mapping to the endpoint user. However, this stage lacks data confidentiality and mutual authentication. Furthermore, the Locator/ID Separation Protocol limits the efficiency of the security protocol which works against redirecting the data or acting as fake routers. Thirdly, As a result of the vast increase in the different Internet of Things devices, the interconnected links between these devices increase vastly as well. Thus, the communication between the devices can be easily exposed to disclosures by attackers such as Man in the Middle Attacks (MitM) and Denial of Service Attack (DoS). This research provided a comprehensive study for Communication and Mobility in the Internet of Things as well as the taxonomy of different security protocols. It went on to investigate the security threats and vulnerabilities of Locator/ID Separation Protocol using X.805 framework standard. Then three Security protocols were provided to secure the exchanged transitions of communication in Locator/ID Separation Protocol. The first security protocol had been implemented to secure the Registration stage of Locator/ID separation using ID/Based cryptography method. The second security protocol was implemented to address the Resolving stage in the Locator/ID Separation Protocol between the Ingress Tunnel Router and Egress Tunnel Router using Challenge-Response authentication and Key Agreement technique. Where, the third security protocol had been proposed, analysed and evaluated for the Internet of Things communication devices. This protocol was based on the authentication and the group key agreement via using the El-Gamal concept. The developed protocols set an interface between each level of the phase to achieve security refinement architecture to Internet of Things based on Locator/ID Separation Protocol. These protocols were verified using Automated Validation Internet Security Protocol and Applications (AVISPA) which is a push button tool for the automated validation of security protocols and achieved results demonstrating that they do not have any security flaws. Finally, a performance analysis of security refinement protocol analysis and an evaluation were conducted using Contiki and Cooja simulation tool. The results of the performance analysis showed that the security refinement was highly scalable and the memory was quite efficient as it needed only 72 bytes of memory to store the keys in the Wireless Sensor Network (WSN) device

    SIDH hybrid schemes with a classical component based on the discrete logarithm problem over finite field extension

    Get PDF
    The concept of a hybrid scheme with connection of SIDH and ECDH is nowadays very popular. In hardware implementations it is convenient to use a classical key exchange algorithm, which is based on the same finite field as SIDH. Most frequently used hybrid scheme is SIDH-ECDH. On the other hand, using the same field as in SIDH, one can construct schemes over \Fpn, like Diffie-Hellman or XTR scheme, whose security is based on the discrete logarithm problem. In this paper, idea of such schemes will be presented. The security of schemes, which are based on the discrete logarithm problem over fields \Fp, \Fpd, \Fpc, \Fps and \Fpo, for primes pp used in SIDH, will be analyzed. At the end, the propositions of practical applications of these schemes will be presented
    • 

    corecore