Allegany Ballistics Lab: sensor test target system

2011 ◽  
Author(s):  
Deran S. Eaton
Keyword(s):  
Author(s):  
Yogi Kristiyanto ◽  
Ernastuti E

The research aims to know the level of security of WiFi connectivity against deauthentication attacks on Internet of Things (IoT)-based devices. It is done through testing using an external penetration test method. The external penetration test simulates a real external attack without information about the target system and network given. The process starts from accessing the device through Internet or WiFi by the test target. At the same time, the attacker performs Denial-of-Service (DoS) attacks onWiFi. The attacker uses Arduino ESP8266 NodeMCU WiFi with Lua programming. To record WiFi activities, the researchers use CommView for WiFi V. 7.0, and the target is Internet Protocol (IP) camera device. The result shows that the communication of the test target with the gateway is lost, but the Media Access Control (MAC) of the test target is still registered at the gateway. Deauthentication attacks cause communication paralysis, and several changes occur, such as an increase in data rate, and change in frequency channel, Distribution System (DS) status, retry bits in frame management, and the sequence number.


1977 ◽  
Vol 16 (03) ◽  
pp. 125-130 ◽  
Author(s):  
P. L. Reichertz

Data processing has become an important tool in theoretical and clinical medicine. The main categories of applications are : information analysis, (bio)signal processing and the field of information logistics (information systems).The problems encountered lie in the discrepancy of the basic methods of a formal approach to an empirical science, the complexity of the target system and the system ecology, i.e. the involvement of the user and the system environment during system construction and utilization.Possible solutions to these problems are the application of system techniques, inductive planning, development of medical methodology, development of methods and techniques for user involvement and assessment of motivation and education and educational planning.The necessary general strategy in the development in medical informatics is seen in the continuing systematization of the theoretical and practical approach. It is estimated that this will eventually contribute to the systematization of medical science and practice.


2020 ◽  
Vol 67 (1) ◽  
pp. 35-41
Author(s):  
Igor’ P. Popov

The work is actual due to the increased role of electrostatic energy in connection with the beginning of mass production of ionistors used in the power supply system of electric vehicles, and the need for the development of theoretical support. (Research purpose) The research purpose is in increasing the correctness of electrostatic calculations that exclude the possibility of obtaining unreliable results in the form of infinite electrostatic energy. (Materials and methods) Authors have used methods of mathematical modeling and analysis, studied the mathematical model as the equivalent of an object that reflects in mathematical form its most important properties, such as the laws that it obeys, and the relationships inherent in its constituent parts. (Results and discussion) Authors have studied the electrostatic field created by a system of two charges of the same name or different names. The article presents calculations for charges located in bodies that have the shape of balls. It was found that the results could be generalized to any form of charged objects. They gave three definitions: first, the total stored energy is the energy of the system or object, equal to the maximum work that the system or object can do if it is given such an opportunity. Second, the conditional realized stored energy is a part of the total stored energy of the system or object, equal to the work that the system or object can produce, limited by a condition that excludes the possibility of the system or object performing the maximum work that the system or object can hypothetically perform. The third is a conditional impossible reserved energy as a part of a complete stored energy system or an object that is equal to the work system or object can do and limited by the condition, which excludes the possibility of making a system or object maximum work that target system or object could hypothetically do. Five theorems were proved. (Conclusions) It was found that the main drawback of the actual potential energy formula is an infinitely large increase in energy at radius tending to 0. The obtained formulas for stored electrostatic energy are devoid of this drawback.


2000 ◽  
Vol 42 (11) ◽  
pp. 838-841 ◽  
Author(s):  
G. A. Krombach ◽  
T. Schmitz-Rode ◽  
B. B. Wein ◽  
J. Meyer ◽  
J. E. Wildberger ◽  
...  

2006 ◽  
Vol 23 (3-4) ◽  
pp. 503-507 ◽  
Author(s):  
I.J. MURRAY ◽  
N.R.A. PARRY ◽  
D.J. McKEEFRY

Changes of color perception in the peripheral field are measured using an asymmetric simultaneous matching paradigm. The data confirm previous observations in that saturation changes can be neutralized if the test target is increased in size. However, this compensation does not apply to hue shifts. We show that some hues remain unchanged with eccentricity whereas others exhibit substantial changes. Here the color shifts are plotted in terms of a second-stage cone opponent model. The data suggest that the S-L+M channel is more robust to increasing eccentricity than the L-M channel. Observations are interpreted in terms of the known underlying morphological and physiological differences in these channels.


2015 ◽  
Vol 2015 ◽  
pp. 1-7 ◽  
Author(s):  
Liu Xiaojian ◽  
Yuan Yuyu

We analyze the distributed network attack-defense game scenarios, and we find that attackers and defenders have different information acquisition abilities since the ownership of the target system. Correspondingly, they will have different initiative and reaction in the game. Based on that, we propose a novel dynamic game method for distributed network attack-defense game. The method takes advantage of defenders’ information superiority and attackers’ imitation behaviors and induces attackers’ reaction evolutionary process in the game to gain more defense payoffs. Experiments show that our method can achieve relatively more average defense payoffs than previous work.


Sign in / Sign up

Export Citation Format

Share Document