10 research outputs found

    Analytical comparison of hypersonic flight and wind tunnel viscous/inviscid flow fields

    Get PDF
    Flow fields were computed about blunted, 0.524 and 0.698 radians, cone configurations to assess the effects of nonequilibrium chemistry on the flow field geometry, boundary layer edge conditions, boundary layer profiles, and heat transfer and skin friction. Analyses were conducted at typical space shuttle entry conditions for both laminar and turbulent boundary layer flow. In these calculations, a wall temperature of 1365 K (2000 F) was assumed. The viscous computer program used in this investigation was a modification of the Blottner non-similar viscous code which incorporated a turbulent eddy viscosity model after Cebeci. The results were compared with equivalent calculations for similar (scaled) configurations at typical wind tunnel conditions. Wind tunnel test gases included air, nitrogen, CF4 and helium. The viscous computer program used for wind tunnel conditions was the Cebeci turbulent non-similar computer code

    Botnet detection techniques: review, future trends, and issues

    No full text
    NoIn recent years, the Internet has enabled access to widespread remote services in the distributed computing environment; however, integrity of data transmission in the distributed computing platform is hindered by a number of security issues. For instance, the botnet phenomenon is a prominent threat to Internet security, including the threat of malicious codes. The botnet phenomenon supports a wide range of criminal activities, including distributed denial of service (DDoS) attacks, click fraud, phishing, malware distribution, spam emails, and building machines for illegitimate exchange of information/materials. Therefore, it is imperative to design and develop a robust mechanism for improving the botnet detection, analysis, and removal process. Currently, botnet detection techniques have been reviewed in different ways; however, such studies are limited in scope and lack discussions on the latest botnet detection techniques. This paper presents a comprehensive review of the latest state-of-the-art techniques for botnet detection and figures out the trends of previous and current research. It provides a thematic taxonomy for the classification of botnet detection techniques and highlights the implications and critical aspects by qualitatively analyzing such techniques. Related to our comprehensive review, we highlight future directions for improving the schemes that broadly span the entire botnet detection research field and identify the persistent and prominent research challenges that remain open.University of Malaya, Malaysia (No. FP034-2012A
    corecore