290 research outputs found

    Dispatcher3 – Machine learning for efficient flight planning - Approach and challenges for data-driven prototypes in air transport

    Get PDF
    Machine learning techniques to support decision making processes are in trend. These are particularly relevant in the context of flight management where large datasets of planned and realised operations are available. Current operations experience discrepancies between planned and executed flight plan, these might be due to external factors (e.g. weather, congestion) and might lead to sub-optimal decisions (e.g. recovering delay (burning extra fuel) when no holding is expected at arrival and therefore it was no needed). Dispatcher3 produces a set of machine learning models to support flight crew pre-departure, with estimations on expected holding at arrival, runway in use and fuel usage, and the airline’s duty manager on pre-tactical actions, with models trained with a larger look ahead time for ATFM and reactionary delay estimations. This paper describes the prototype architecture and approach of Dispatcher3 with particular focus on the challenges faced by this type of data-driven machine learning models in the field of air transport ranging: from technical aspects such as data leakage to operational requirements such as the consideration and estimation of uncertainty. These considerations should be relevant for projects which try to use machine learning in the field of aviation in general

    Dispatcher3 – Machine learning to support flight planning processes

    Get PDF
    This poster will present the final results of the Clean Sky 2 project Dispatcher3. Dispatcher3 focuses on the use of machine learning techniques to support flight operations prior departure with holding predictions, runway at arrival estimation and fuel deviations pre-departure to support the flight crew, and ATFM and reactionary delays on D-1 to support the duty manage

    Chip and Skim: cloning EMV cards with the pre-play attack

    Get PDF
    EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. We have discovered two serious problems: a widespread implementation flaw and a deeper, more difficult to fix flaw with the EMV protocol itself. The first flaw is that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this nonce. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically. Card cloning is the very type of fraud that EMV was supposed to prevent. We describe how we detected the vulnerability, a survey methodology we developed to chart the scope of the weakness, evidence from ATM and terminal experiments in the field, and our implementation of proof-of-concept attacks. We found flaws in widely-used ATMs from the largest manufacturers. We can now explain at least some of the increasing number of frauds in which victims are refused refunds by banks which claim that EMV cards cannot be cloned and that a customer involved in a dispute must therefore be mistaken or complicit. The second problem was exposed by the above work. Independent of the random number quality, there is a protocol failure: the actual random number generated by the terminal can simply be replaced by one the attacker used earlier when capturing an authentication code from the card. This variant of the pre-play attack may be carried out by malware in an ATM or POS terminal, or by a man-in-the-middle between the terminal and the acquirer. We explore the design and.

    Impact of indentor sliding velocity and loading repetition factor on shear strain and structure dispersion in nanostructuring burnishing

    Full text link
    The article probes into a relationship of the shear strain intensity and the shear strain rate in the surface layer and the sliding velocity of a spherical indentor and its loading repetition factor. It brings forward an experimental procedure to evaluate the shear strain intensity and rate by analyzing the geometrical parameters of the bulge of plastically edged metal and the thickness of the shifted layer relative to different sliding velocities and feed rates. © 2019 by University of Niš, Serbia

    Impact of Friction Stir Processing Parameters on Forming the Structure and Properties in AISI 420 Steel Surface Layer

    Get PDF
    Research has been done into the influence of friction thermomechanical treatment parameters on forming the structure and properties in a surface layer of 20X13 steel. The paper presents a theoretical approach towards controlling the process variables. A hardened layer with a thickness of 1,7 mm was obtained after 20X13 steel had been subjected to the process. The thickness of the layer that had a microhardness of ≥600HV0,05 turned out to be about 0,75mm while the microstructure of the hardened layer was martensitic, martensitic and perlitic with dispersed inclusions of carbides. It was established that the feed has the biggest influence on the thickness of the hardened layer.     Keywords: friction stir processing, rotation speed, tool feed, normal force, microhardness, microstructure

    Chip and Skim: cloning EMV cards with the pre-play attack

    Get PDF
    EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. We have discovered two serious problems: a widespread implementation flaw and a deeper, more difficult to fix flaw with the EMV protocol itself. The first flaw is that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this nonce. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically. Card cloning is the very type of fraud that EMV was supposed to prevent. We describe how we detected the vulnerability, a survey methodology we developed to chart the scope of the weakness, evidence from ATM and terminal experiments in the field, and our implementation of proof-of-concept attacks. We found flaws in widely-used ATMs from the largest manufacturers. We can now explain at least some of the increasing number of frauds in which victims are refused refunds by banks which claim that EMV cards cannot be cloned and that a customer involved in a dispute must therefore be mistaken or complicit. The second problem was exposed by the above work. Independent of the random number quality, there is a protocol failure: the actual random number generated by the terminal can simply be replaced by one the attacker used earlier when capturing an authentication code from the card. This variant of the pre-play attack may be carried out by malware in an ATM or POS terminal, or by a man-in-the-middle between the terminal and the acquirer. We explore the design and.

    Research into Dry Turning of Welded Surface by Replaceable Cutting Insert with Closed Loop Heat Removal

    Full text link
    A special tool has been devised incorporating a closed loop system based on Peltier thermoelectric couples to cool replaceable hard alloy inserts. Experimental research has been done into dry turning of a X20Cr13 steel welded surface with a SECO cubic boron nitride circular plate at the cutting speed increasing from 100 to 300 m/min. It has been determined that Ra surface roughness decreases by 22% while Rz surface roughness goes down by 26%; in addition, the wear flat of tool tips diminishes by 17%. © 2018 Published under licence by IOP Publishing Ltd.The work was supported by Ministry of Education and Science of the Russian Federation, contract № 02.G25.31.0148 with Sverdlovsk Instrumental Plant within the framework of Research and Development Project No Н979.210.007/15, July 28, 2015 for the federal autonomous educational institution of higher education “Ural Federal University”
    corecore