249 research outputs found

    Impact of wave whitecapping on land falling tropical cyclones

    Get PDF
    Predicting tropical cyclone structure and evolution remains challenging. Particularly, the surface wave interactions with the continental shelf and their impact on tropical cyclones have received very little attention. Through a series of state-of-the-art high-resolution, fully-coupled ocean-wave and atmosphere-ocean-wave experiments, we show here, for the first time, that in presence of continental shelf waves can cause substantial cooling of the sea surface. Through whitecapping there is a transfer of momentum from the surface which drives deeper vertical mixing. It is the waves and not just the wind which become the major driver of stratified coastal ocean ahead-of-cyclone cooling. In the fully-coupled atmosphere-ocean-wave model a negative feedback is found. The maximum wind speed is weaker and the damaging footprint area of hurricane-force winds is reduced by up to 50% due to the strong wave induced ocean cooling ahead. Including wave-ocean coupling is important to improve land falling tropical cyclone intensity predictions for the highly populated and vulnerable coasts

    Estimation of global coastal sea level extremes using neural networks

    Get PDF
    Accurately predicting total sea-level including tides and storm surges is key to protecting and managing our coastal environment. However, dynamically forecasting sea level extremes is computationally expensive. Here a novel alternative based on ensembles of artificial neural networks independently trained at over 600 tide gauges around the world, is used to predict the total sea-level based on tidal harmonics and atmospheric conditions at each site. The results show globally-consistent high skill of the neural networks (NNs) to capture the sea variability at gauges around the globe. While the main atmosphere-driven dynamics can be captured with multivariate linear regressions, atmospheric-driven intensification, tide-surge and tide-tide non-linearities in complex coastal environments are only predicted with the NNs. In addition, the non-linear NN approach provides a simple and consistent framework to assess the uncertainty through a probabilistic forecast. These new and cheap methods are relatively easy to setup and could be a valuable tool combined with more expensive dynamical model in order to improve local resilience

    Synthèse totale de l'isofugomycine, la (S)-désoxyfugomycine et du (S)-fugomycine

    Get PDF
    Il existe un grand nombre de composés naturels très actifs biologiquement qui possèdent une partie 3-alkyl-2(5H)-furanone. Dans le but de préparer aisément quelques-uns de ces composés, des conditions douces de couplage ont été élaborées. Dans un premier temps, un protocole efficace et rapide pour effectuer un couplage croisé C(sp²)-C(sp) de Sonogashira à partir du 5-alkyl-3-bromo-2(5H)-furanone a été développé. Par la suite, son application a été présentée lors des synthèses de l'isofugomycine 1, de la (S)-désoxyfugomycine 19 et de la fugomycine 23. Dans le cadre d'une étude préliminaire sur la lithiation latérale, la première synthèse du diméthylfuranolate 32 a été réalisée. Celle-ci nous a amené à déterminer que la lithiation latérale n'est pas possible chez les furanolates. Dans le cadre d'une étude préliminaire sur la biomimétique des γ-pyrone, la synthèse du (E)-diol 36 a été réalisée. Celui-ci a été époxydé dans des conditions douces pour ensuite subir une oxydation où des traces de γ-pyrone ont été observées par RMN ¹H. Ainsi, des résultats prometteurs ont été obtenus et des études plus poussées sont à prévoir

    ON THE GROUND STATE ENERGY OF THE LAPLACIAN WITH A MAGNETIC FIELD CREATED BY A RECTILINEAR CURRENT

    Get PDF
    ABSTRACT. We consider the three-dimensional Laplacian with a magnetic field created by an infinite rectilinear current bearing a constant current. The spectrum of the associated Hamiltonian is the positive half-axis as the range of an infinity of band functions all decreasing toward 0. We make a precise asymptotics of the band functions near the ground state energy and we exhibit a semi-classical behavior. We perturb the Hamiltonian by an electric potential. Helped by the analysis of the band functions, we show that for slow decaying potential an infinite number of negative eigenvalues are created whereas only finite number of eigenvalues appears for fast decaying potential. The criterion about finiteness depends essentially on the decay rate of the potential with respect to the distance to the wire

    Publisher correction: Impact of wave whitecapping on land falling tropical cyclones

    Get PDF
    Correction to: Scientific Reports https://doi.org/10.1038/s41598-017-19012-3, published online 12 January 2018. This Article contains errors in References 8, 9, 10, 17 and 48, which were incorrectly given

    Multi-Variate High-Order Attacks of Shuffled Tables Recomputation

    Get PDF
    Masking schemes based on tables recomputation are classical countermeasures against high-order side-channel attacks. Still, they are known to be attackable at order dd in the case the masking involves dd shares. In this work, we mathematically show that an attack of order strictly greater than dd can be more successful than an attack at order dd. To do so, we leverage the idea presented by Tunstall, Whitnall and Oswald at FSE 2013: we exhibit attacks which exploit the multiple leakages linked to one mask during the recomputation of tables. Specifically, regarding first-order table recomputation, improved by a shuffled execution, we show that there is a window of opportunity, in terms of noise variance, where a novel highly multivariate third-order attack is more efficient than a classical bivariate second-order attack. Moreover, we show on the example of the high-order secure table computation presented by Coron at EUROCRYPT 2014 that the window of opportunity enlarges linearly with the security order dd

    Biomimetic bluff body drag reduction by self-adaptive porous flaps

    Get PDF
    The performances of an original passive control system based on a biomimetic approach are assessed by investigating the flow over a bluff-body. This control device consists in a couple of flaps made from the combination of a rigid plastic skeleton coated with a porous fabric mimicking the shaft and the vane of the bird's feathers, respectively. The sides of a square cylinder have been fitted with this system so as to enable the flaps to freely rotate around their leading edge. This feature allows the movable flaps to self-adapt to the flow conditions. Comparing both the uncontrolled and the controlled flow, a significant drag reduction (up to 22%) has been obtained over a broad range of Reynolds number. The investigation of the mean flow reveals a noticeable modification of the flow topology at large scale in the vicinity of the controlled cylinder accounting for the increase of the pressure base in comparison with the natural flow. Meanwhile, the study of the relative motion of both flaps points out that their dynamics is sensitive to the Reynolds number. Furthermore, the comparative study of the flow dynamics at large scale suggest a lock-in coupling of the flap motion and the vortex shedding.Comment: 19 pages, 17 figures, submitted to Comptes-Rendus de l' Acad\'emie des Sciences (M\'ecanique

    Boosting Higher-Order Correlation Attacks by Dimensionality Reduction

    Get PDF
    Multi-variate side-channel attacks allow to break higher-order masking protections by combining several leakage samples. But how to optimally extract all the information contained in all possible dd-tuples of points? In this article, we introduce preprocessing tools that answer this question. We first show that maximizing the higher-order CPA coefficient is equivalent to finding the maximum of the covariance. We apply this equivalence to the problem of trace dimensionality reduction by linear combination of its samples. Then we establish the link between this problem and the Principal Component Analysis. In a second step we present the optimal solution for the problem of maximizing the covariance. We also theoretically and empirically compare these methods. We finally apply them on real measurements, publicly available under the DPA Contest v4, to evaluate how the proposed techniques improve the second-order CPA (2O-CPA)

    Security evaluation against side-channel analysis at compilation time

    Get PDF
    Masking countermeasure is implemented to thwart side-channel attacks. The maturity of high-order masking schemes has reached the level where the concepts are sound and proven. For instance, Rivain and Prouff proposed a full-fledged AES at CHES 2010. Some non-trivial fixes regarding refresh functions were needed though. Now, industry is adopting such solutions, and for the sake of both quality and certification requirements, masked cryptographic code shall be checked for correctness using the same model as that of the the theoretical protection rationale (for instance the probing leakage model). Seminal work has been initiated by Barthe et al. at EUROCRYPT 2015 for automated verification at higher orders on concrete implementations. In this paper, we build on this work to actually perform verification from within a compiler, so as to enable timely feedback to the developer. Precisely, our methodology enables to provide the actual security order of the code at the intermediate representation (IR) level, thereby identifying possible flaws (owing either to source code errors or to compiler optimizations). Second, our methodology allows for an exploitability analysis of the analysed IR code. In this respect, we formally handle all the symbolic expressions in the static single assignment (SSA) representation to build the optimal distinguisher function. This enables to evaluate the most powerful attack, which is not only function of the masking order dd, but also on the number of leaking samples and of the expressions (e.g., linear vs non-linear leakages). This scheme allows to evaluate the correctness of a masked cryptographic code, and also its actual security in terms of number of traces in a given deployment context (characterized by a leakage model of the target CPU and the signal-to-noise ratio of the platform)
    corecore