2,090 research outputs found

    Comparison of two numerical techniques for aerodynamic model identification

    Get PDF
    An algorithm, called the Minimal Residual QR algorithm, is presented to solve subset regression problems. It is shown that this scheme can be used as a numerically reliable implementation of the stepwise regression technique, which is widely used to identify an aerodynamic model from flight test data. This capability as well as the numerical superiority of this scheme over the stepwise regression technique is demonstrated in an experimental simulation study

    A three-node C deg element for analysis of laminated composite sandwich shells

    Get PDF
    A three-node flat shell element with C deg rotation fields has been developed for analysis of arbitrary composite shells. The element may consist of any number of orthotropic layers, each layer having different material properties and angular orientation. The formulation includes coupling between bending and extension, which is essential for analysis of unsymmetric laminates. Shearing deflections are included, since laminated and sandwich construction frequently results in shear stiffness much smaller than bending stiffness. Formulation of the element is straightforward, and calculation of its stiffness matrix is simple and fast. Convergence of solutions with mesh refinement is uniform for both thin and thick shells and is insensitive to element shape, although not as rapid as some other elements that lack one or more capabilities of the newly developed element. An experimental verification of the shall element is reported in the appendix

    Multimodal Game Bot Detection using User Behavioral Characteristics

    Full text link
    As the online service industry has continued to grow, illegal activities in the online world have drastically increased and become more diverse. Most illegal activities occur continuously because cyber assets, such as game items and cyber money in online games, can be monetized into real currency. The aim of this study is to detect game bots in a Massively Multiplayer Online Role Playing Game (MMORPG). We observed the behavioral characteristics of game bots and found that they execute repetitive tasks associated with gold farming and real money trading. We propose a game bot detection methodology based on user behavioral characteristics. The methodology of this paper was applied to real data provided by a major MMORPG company. Detection accuracy rate increased to 96.06% on the banned account list

    Statistical Watermarking for Networked Control Systems

    Full text link
    Watermarking can detect sensor attacks in control systems by injecting a private signal into the control, whereby attacks are identified by checking the statistics of the sensor measurements and private signal. However, past approaches assume full state measurements or a centralized controller, which is not found in networked LTI systems with subcontrollers. Since generally the entire system is neither controllable nor observable by a single subcontroller, communication of sensor measurements is required to ensure closed-loop stability. The possibility of attacking the communication channel has not been explicitly considered by previous watermarking schemes, and requires a new design. In this paper, we derive a statistical watermarking test that can detect both sensor and communication attacks. A unique (compared to the non-networked case) aspect of the implementing this test is the state-feedback controller must be designed so that the closed-loop system is controllable by each sub-controller, and we provide two approaches to design such a controller using Heymann's lemma and a multi-input generalization of Heymann's lemma. The usefulness of our approach is demonstrated with a simulation of detecting attacks in a platoon of autonomous vehicles. Our test allows each vehicle to independently detect attacks on both the communication channel between vehicles and on the sensor measurements

    Toward Open Data Blockchain Analytics: A Bitcoin Perspective

    Full text link
    Bitcoin is the first implementation of what has become known as a 'public permissionless' blockchain. Guaranteeing security and protocol conformity through its elegant combination of cryptographic assurances and game theoretic economic incentives, it permits censorship resistant public read-write access to its append-only blockchain database without the need for any mediating central authority. Not until its advent has such a trusted, transparent, comprehensive and granular data set of digital economic behaviours been available for public network analysis. In this article, by translating the cumbersome binary data structure of the Bitcoin blockchain into a high fidelity graph model, we demonstrate through various analyses the often overlooked social and econometric benefits of employing such a novel open data architecture. Specifically we show (a) how repeated patterns of transaction behaviours can be revealed to link user activity across the blockchain; (b) how newly mined bitcoin can be associated to demonstrate individual accumulations of wealth; (c) through application of the naive quantity theory of money that Bitcoin's disinflationary properties can be revealed and measured; and (d) how the user community can develop coordinated defences against repeated denial of service attacks on the network. All of the aforementioned being exemplary benefits that would be lost with the closed data models of the 'private permissioned' distributed ledger architectures that are dominating enterprise level development due to existing blockchain issues of governance, scalability and confidentiality.Comment: 17 pages, 9 Figure

    Modal element method for scattering of sound by absorbing bodies

    Get PDF
    The modal element method for acoustic scattering from 2-D body is presented. The body may be acoustically soft (absorbing) or hard (reflecting). The infinite computational region is divided into two subdomains - the bounded finite element domain, which is characterized by complicated geometry and/or variable material properties, and the surrounding unbounded homogeneous domain. The acoustic pressure field is represented approximately in the finite element domain by a finite element solution, and is represented analytically by an eigenfunction expansion in the homogeneous domain. The two solutions are coupled by the continuity of pressure and velocity across the interface between the two subdomains. Also, for hard bodies, a compact modal ring grid system is introduced for which computing requirements are drastically reduced. Analysis for 2-D scattering from solid and coated (acoustically treated) bodies is presented, and several simple numerical examples are discussed. In addition, criteria are presented for determining the number of modes to accurately resolve the scattered pressure field from a solid cylinder as a function of the frequency of the incoming wave and the radius of the cylinder

    Dynamics of Dirac strings and monopole-like excitations in chiral magnets under a current drive

    Full text link
    Skyrmion lines in metallic chiral magnets carry an emergent magnetic field experienced by the conduction electrons. The inflow and outflow of this field across a closed surface is not necessarily equal, thus it allows for the existence of emergent monopoles. One example is a segment of skyrmion line inside a crystal, where a monopole and antimonopole pair is connected by the emergent magnetic flux line. This is a realization of Dirac string-like excitations. Here we study the dynamics of monopoles in chiral magnets under an electric current. We show that in the process of creation of skyrmion lines, skyrmion line segments are first created via the proliferation of monopoles and antimonopoles. Then these line segments join and span the whole system through the annihilation of monopoles. The skyrmion lines are destroyed via the proliferation of monopoles and antimonopoles at high currents, resulting in a chiral liquid phase. We also propose to create the monopoles in a controlled way by applying an inhomogenous current to a crystal. Remarkably, an electric field component in the magnetic field direction proportional to the current squared in the low current region is induced by the motion of distorted skyrmion lines, in addition to the Hall and longitudinal voltage. The existence of monopoles can be inferred from transport or imaging measurements.Comment: 6 pages and 5 figure

    Seamless Data Services for Real Time Communication in a Heterogeneous Networks using Network Tracking and Management

    Full text link
    Heterogeneous Networks is the integration of all existing networks under a single environment with an understanding between the functional operations and also includes the ability to make use of multiple broadband transport technologies and to support generalized mobility. It is a challenging feature for Heterogeneous networks to integrate several IP-based access technologies in a seamless way. The focus of this paper is on the requirements of a mobility management scheme for multimedia real-time communication services - Mobile Video Conferencing. Nowadays, the range of available wireless access network technologies includes cellular or wide-area wireless systems, such as cellular networks (GSM/GPRS/UMTS) or Wi-Max, local area Network or personal area wireless systems, comprising for example, WLAN (802.11 a/b/g) and Bluetooth. As the mobile video conferencing is considered, the more advanced mobile terminals are capable of having more than one interface active at the same time. In addition, the heterogeneity of access technologies and also the seamless flow of information will increase in the future, making the seamless integration of the access network a key challenge for mobility management in a heterogeneous network environment. Services must be provided to the user regardless of the particular access technology and also the type of service provider or the network used.Comment: IEEE Publication format, ISSN 1947 5500, http://sites.google.com/site/ijcsis

    Factors Influencing Saudi Consumers Loyalty Toward B2C E-Commerce

    Get PDF
    Previous research found that e-retailers experience difficulty to maintain customer loyalty despite of the recent rapid growth in Business to Customer e-commerce applications. Developing and managing customer loyalty and customer retention is very important for the long-term growth of a firm. Numerous studies have empirically examined consumer’s loyalty and attitudes in various countries toward the Business to Customer e-commerce. Nevertheless, empirical research on the e-commerce consumer loyalty in the developing Arab countries, are generally limited. Thus, the main objective of this paper is to identify the key factors that influence the extent to which Saudi consumers are loyal towards Business to Customer e-commerce. Next, we draw on extant literatures about hypothesized relationships between e-commerce consumer loyalty and its antecedents to build a conceptual framework on Saudi consumer\u27s loyalty. Then, a survey was conducted among Saudi e-commerce customers in the Eastern Province of Saudi Arabia using a structured selfadministered questionnaire. The study found that amongst other factors, customer trust and satisfaction influence consumer\u27s loyalty towards B2C e-commerce in Saudi Arabia. The findings assist firms to understand what key factors/areas in e-commerce applications they ought to focus on in order to improve customer loyalty thereby improving revenue

    Acoustic intensity calculations for axisymmetrically modeled fluid regions

    Get PDF
    An algorithm for calculating acoustic intensities from a time harmonic pressure field in an axisymmetric fluid region is presented. Acoustic pressures are computed in a mesh of NASTRAN triangular finite elements of revolution (TRIAAX) using an analogy between the scalar wave equation and elasticity equations. Acoustic intensities are then calculated from pressures and pressure derivatives taken over the mesh of TRIAAX elements. Intensities are displayed as vectors indicating the directions and magnitudes of energy flow at all mesh points in the acoustic field. A prolate spheroidal shell is modeled with axisymmetric shell elements (CONEAX) and submerged in a fluid region of TRIAAX elements. The model is analyzed to illustrate the acoustic intensity method and the usefulness of energy flow paths in the understanding of the response of fluid-structure interaction problems. The structural-acoustic analogy used is summarized for completeness. This study uncovered a NASTRAN limitation involving numerical precision issues in the CONEAX stiffness calculation causing large errors in the system matrices for nearly cylindrical cones
    • …
    corecore