563 research outputs found
On Modeling the Costs of Censorship
We argue that the evaluation of censorship evasion tools should depend upon
economic models of censorship. We illustrate our position with a simple model
of the costs of censorship. We show how this model makes suggestions for how to
evade censorship. In particular, from it, we develop evaluation criteria. We
examine how our criteria compare to the traditional methods of evaluation
employed in prior works
A numerical model for dynamic wave rotor analysis
A numerical model has been developed which can predict the dynamic (and steady state) performance of a wave rotor, given the geometry and time dependent boundary conditions. The one-dimensional, perfect gas, CFD based code tracks the gasdynamics in each of the wave rotor passages as they rotate past the various ducts. The model can operate both on and off-design, allowing dynamic behavior to be studied throughout the operating range of the wave rotor. The model accounts for several major loss mechanisms including finite passage opening time, fluid friction, heat transfer to and from the passage walls, and leakage to and from the passage ends. In addition, it can calculate the amount of work transferred to and from the fluid when the flow in the ducts is not aligned with the passages such as occurs in off-design operation. Since it is one-dimensional, the model runs reasonably fast on a typical workstation. This paper will describe the model and present the results of some transient calculations for a conceptual four port wave rotor designed as a topping cycle for a small gas turbine engine
The Good Old Jackson Car
https://digitalcommons.library.umaine.edu/mmb-vp/1535/thumbnail.jp
The Good Old Jackson Car
https://digitalcommons.library.umaine.edu/mmb-vp/1536/thumbnail.jp
Detecting and characterizing lateral phishing at scale
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefit-ting from both the implicit trust and the information in the hijacked user's account. We develop a classifier that finds hundreds of real-world lateral phishing emails, while generating under four false positives per every one-million employee-sent emails. Drawing on the attacks we detect, as well as a corpus of user-reported incidents, we quantify the scale of lateral phishing, identify several thematic content and recipient targeting strategies that attackers follow, illuminate two types of sophisticated behaviors that attackers exhibit, and estimate the success rate of these attacks. Collectively, these results expand our mental models of the 'enterprise attacker' and shed light on the current state of enterprise phishing attacks
A Simplified Model for the Investigation of Acoustically Driven Combustion Instabilities
A simplified one-dimensional model of reactive flow is presented which captures features of aeropropulsion systems, including acoustically driven combustion instabilities. Although the resulting partial differential equations are one dimensional, they qualitatively describe observed phenomena, including, resonant frequencies and the admission of both steady and unsteady behavior. A number of simulations are shown which exhibit both steady and unsteady behavior, including flame migration and thermo acoustic instabilities. Finally, we present examples of unsteady flow resulting from fuel modulation
Numerical Assessment of Four-Port Through-Flow Wave Rotor Cycles with Passage Height Variation
The potential for improved performance of wave rotor cycles through the use of passage height variation is examined. A Quasi-one-dimensional CFD code with experimentally validated loss models is used to determine the flowfield in the wave rotor passages. Results indicate that a carefully chosen passage height profile can produce substantial performance gains. Numerical performance data are presented for a specific profile, in a four-port, through-flow cycle design which yielded a computed 4.6% increase in design point pressure ratio over a comparably sized rotor with constant passage height. In a small gas turbine topping cycle application, this increased pressure ratio would reduce specific fuel consumption to 22% below the un-topped engine; a significant improvement over the already impressive 18% reductions predicted for the constant passage height rotor. The simulation code is briefly described. The method used to obtain rotor passage height profiles with enhanced performance is presented. Design and off-design results are shown using two different computational techniques. The paper concludes with some recommendations for further work
Exact results for the Barabasi model of human dynamics
Human activity patterns display a bursty dynamics, with interevent times
following a heavy tailed distribution. This behavior has been recently shown to
be rooted in the fact that humans assign their active tasks different
priorities, a process that can be modeled as a priority queueing system [A.-L.
Barabasi, Nature 435, 207 (2005)]. In this work we obtain exact results for the
Barabasi model with two tasks, calculating the priority and waiting time
distribution of active tasks. We demonstrate that the model has a singular
behavior in the extremal dynamics limit, when the highest priority task is
selected first. We find that independently of the selection protocol, the
average waiting time is smaller or equal to the number of active tasks, and
discuss the asymptotic behavior of the waiting time distribution. These results
have important implications for understanding complex systems with extremal
dynamics.Comment: 4 pages, 4 figures, revte
- …