2,778 research outputs found
Generic Methodology for Field Calibration of Nacelle-Based Wind Lidars
Nacelle-based Doppler wind lidars have shown promising capabilities to assess power performance, detect yaw misalignment or perform feed-forward control. The power curve application requires uncertainty assessment. Traceable measurements and uncertainties of nacelle-based wind lidars can be obtained through a methodology applicable to any type of existing and upcoming nacelle lidar technology. The generic methodology consists in calibrating all the inputs of the wind field reconstruction algorithms of a lidar. These inputs are the line-of-sight velocity and the beam position, provided by the geometry of the scanning trajectory and the lidar inclination. The line-of-sight velocity is calibrated in atmospheric conditions by comparing it to a reference quantity based on classic instrumentation such as cup anemometers and wind vanes. The generic methodology was tested on two commercially developed lidars, one continuous wave and one pulsed systems, and provides consistent calibration results: linear regressions show a difference of ∼0.5% between the lidar-measured and reference line-of-sight velocities. A comprehensive uncertainty procedure propagates the reference uncertainty to the lidar measurements. At a coverage factor of two, the estimated line-of-sight velocity uncertainty ranges from 3.2% at 3 m · s − 1 to 1.9% at 16 m · s − 1 . Most of the line-of-sight velocity uncertainty originates from the reference: the cup anemometer uncertainty accounts for ∼90% of the total uncertainty. The propagation of uncertainties to lidar-reconstructed wind characteristics can use analytical methods in simple cases, which we demonstrate through the example of a two-beam system. The newly developed calibration methodology allows robust evaluation of a nacelle lidar’s performance and uncertainties to be established. Calibrated nacelle lidars may consequently be further used for various wind turbine applications in confidence
Wind Field Reconstruction from Nacelle-Mounted Lidars Short Range Measurements
Profiling nacelle lidars probe the wind at several heights and several
distances upstream of the rotor. The development of such lidar systems is
relatively recent, and it is still unclear how to condense the lidar raw
measurements into useful wind field characteristics such as speed, direction,
vertical and longitudinal gradients (wind shear). In this paper, we
demonstrate an innovative method to estimate wind field characteristics using
nacelle lidar measurements taken within the induction zone. Model-fitting
wind field reconstruction techniques are applied to nacelle lidar
measurements taken at multiple distances close to the rotor, where a wind
model is combined with a simple induction model. The method allows robust
determination of free-stream wind characteristics. The method was applied to
experimental data obtained with two different types of nacelle lidar
(five-beam Demonstrator and ZephIR Dual Mode). The reconstructed wind speed
was within 0.5 % of the wind speed measured with a mast-top-mounted cup
anemometer at 2.5 rotor diameters upstream of the turbine. The technique
described in this paper overcomes measurement range limitations of the
currently available nacelle lidar technology
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
The increasing interconnection of industrial networks exposes them to an
ever-growing risk of cyber attacks. To reveal such attacks early and prevent
any damage, industrial intrusion detection searches for anomalies in otherwise
predictable communication or process behavior. However, current efforts mostly
focus on specific domains and protocols, leading to a research landscape broken
up into isolated silos. Thus, existing approaches cannot be applied to other
industries that would equally benefit from powerful detection. To better
understand this issue, we survey 53 detection systems and find no fundamental
reason for their narrow focus. Although they are often coupled to specific
industrial protocols in practice, many approaches could generalize to new
industrial scenarios in theory. To unlock this potential, we propose IPAL, our
industrial protocol abstraction layer, to decouple intrusion detection from
domain-specific industrial protocols. After proving IPAL's correctness in a
reproducibility study of related work, we showcase its unique benefits by
studying the generalizability of existing approaches to new datasets and
conclude that they are indeed not restricted to specific domains or protocols
and can perform outside their restricted silos
Recommended from our members
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
The increasing interconnection of industrial networks exposes them to an
ever-growing risk of cyber attacks. To reveal such attacks early and prevent
any damage, industrial intrusion detection searches for anomalies in otherwise
predictable communication or process behavior. However, current efforts mostly
focus on specific domains and protocols, leading to a research landscape broken
up into isolated silos. Thus, existing approaches cannot be applied to other
industries that would equally benefit from powerful detection. To better
understand this issue, we survey 53 detection systems and find no fundamental
reason for their narrow focus. Although they are often coupled to specific
industrial protocols in practice, many approaches could generalize to new
industrial scenarios in theory. To unlock this potential, we propose IPAL, our
industrial protocol abstraction layer, to decouple intrusion detection from
domain-specific industrial protocols. After proving IPAL's correctness in a
reproducibility study of related work, we showcase its unique benefits by
studying the generalizability of existing approaches to new datasets and
conclude that they are indeed not restricted to specific domains or protocols
and can perform outside their restricted silos
Kleptographic Attacks against Implicit Rejection
Given its integral role in modern encryption systems such as CRYSTALS-Kyber, the Fujisaki-Okamoto (FO) transform will soon be at the center of our secure communications infrastructure. An enduring debate surrounding the FO transform is whether to use explicit or implicit rejection when decapsulation fails. Presently, implicit rejection, as implemented in CRYSTALS-Kyber, is supported by a strong set of arguments. Therefore, understanding its security implications in different attacker models is essential.
In this work, we study implicit rejection through a novel lens, namely, from the perspective of kleptography. Concretely, we consider an attacker model in which the attacker can subvert the user\u27s code to compromise security while remaining undetectable. In this scenario, we present three attacks that significantly reduce the security level of the FO transform with implicit rejection. Notably, our attacks apply to CRYSTALS-Kyber
Migrantes haitianos na educação de jovens e adultos no Brasil
Trata-se de uma pesquisa qualitativa que tem por objetivo analisar as intenções e expectativas dos migrantes haitianos na modalidade de Educação de Jovens e Adultos (EJA) no Brasil, municÃpio de Cambé, Paraná. Os dados evidenciam que as motivações iniciais dos educandos para ingresso na EJA são: a proficiência da lÃngua portuguesa, ter um diploma internacional e estudar numa escola gratuita. Identificam-se dois perfis desses educandos na EJA: os recém-chegados ao Brasil, que buscam a aprendizagem da lÃngua portuguesa, e os que vivem há mais tempo neste paÃs e aspiram a concluir o ensino médio para ingresso na universidade, objetivando uma ascensão social
- …