VM2D is an open-source software being developed by the authors for two-dimensional incompressible flows simulations around airfoils. VM2D is based on meshless Lagrangian vortex methods. The main operations of the algo...
详细信息
Due to the development of Wind Energy and construction of new wind farms in the Russian Federation and Europe there is a need for solution of application-oriented problems and development of effective methods for nume...
详细信息
This paper studies the performance and working aspects of SMT solvers on processing formulas acquired during path-sensitive static analysis and dynamic symbolic execution. We review some general patterns of building S...
详细信息
Cryptographic protocols are utilized for establishing a secure session between “honest” agents which communicate strictly according to the protocol rules as well as for ensuring the authenticated and confidential tr...
详细信息
ISBN:
(数字)9781728190884
ISBN:
(纸本)9781728190891
Cryptographic protocols are utilized for establishing a secure session between “honest” agents which communicate strictly according to the protocol rules as well as for ensuring the authenticated and confidential transmission of messages. The specification of a cryptographic protocol is usually presented as a set of requirements for the sequences of transmitted messages including the format of such messages. Note that protocol can describe several execution scenarios. All these requirements lead to a huge formal specification for a real cryptographic protocol and therefore, it is difficult to verify the security of the whole cryptographic protocol at once. In this paper, to overcome this problem, we suggest verifying the protocol security for its fragments. Namely, we verify the security properties for a special set of so-called traces of the cryptographic protocol. Intuitively, a trace of the cryptographic protocol is a sequence of computations, value checks, and transmissions on the sides of “honest” agents permitted by the protocol. In order to choose such set of traces, we introduce an Adversary model and the notion of a similarity relation for traces. We then verify the security properties of selected traces with Tamarin Prover. Experimental results for the EAP and Noise protocols clearly show that this approach can be promising for automatic verification of large protocols.
Personalized Federated Learning (PFL) has witnessed remarkable advancements, enabling the development of innovative machine learning applications that preserve the privacy of training data. However, existing theoretic...
详细信息
The paper attempts to apply the Proper Orthogonal Decomposition (POD) and Dynamic Mode Decomposition (DMD) to the ducted propeller wake analysis. The ducted propeller produces a complex wake flow field with multifrequ...
详细信息
ISBN:
(数字)9781665412919
ISBN:
(纸本)9781665448215
The paper attempts to apply the Proper Orthogonal Decomposition (POD) and Dynamic Mode Decomposition (DMD) to the ducted propeller wake analysis. The ducted propeller produces a complex wake flow field with multifrequency vortex structure coupling under the influence between blades and nozzle. Traditional analysis methods such as time-averaged flow, phase-averaged flow are only displaying the coupling results. In contrast, data mining technologies such as POD and DMD can extract independent flow patterns from the massive data obtained from physical experiments and numerical simulations. The paper focuses on the influence of computational subdomain (based on the OpenFOAM), snapshot sampling interval and data coverage revolutions on the modal convergence in the data preprocessing before employing POD and DMD. Taking a single ducted propeller wake data with the advance coefficient of J=0.4 as an example, it is found that the sampling interval of snapshots are independent of modal convergence after reaching a certain level and only affect the frequency range of the captured modes. The scope of the computational subdomain and the revolutions of data covered by snapshot matrix are vital factors to affect the modal convergence. At last, under the premise of modal convergence, the paper reconstructs the ducted propeller wake flow field by POD and DMD respectively, where errors between the original data can be ignored.
Cloud computing is used in many areas and by many specialists to ease application distribution and deployment. Cloud providers basically aim at providing resources varying from others. So it becomes very difficult to ...
详细信息
ISBN:
(数字)9781665412919
ISBN:
(纸本)9781665448215
Cloud computing is used in many areas and by many specialists to ease application distribution and deployment. Cloud providers basically aim at providing resources varying from others. So it becomes very difficult to deploy multicloud applications or move to the cloud from own hardware clusters. TOSCA standard offers cloud resources model that unifies many cloud providers. In this paper we propose TOSCA orchestrator Clouni. Clouni takes TOSCA templates from the user and generates Ansible playbooks. Ansible is then used as a configuration tool for deployment automation. Clouni makes it easy for cloud users to deploy complex topologies.
The security development lifecycle (SDL) is becoming an industry standard. Dynamic symbolic execution (DSE) has enormous amount of applications in computer security (fuzzing, vulnerability discovery, reverse-engineeri...
详细信息
Adversarial training is considered the most powerful approach for robustness against attacks on deep neural networks involving adversarial examples. However, recent works have shown that the similar robustness level c...
详细信息
ISBN:
(纸本)9781665423281
Adversarial training is considered the most powerful approach for robustness against attacks on deep neural networks involving adversarial examples. However, recent works have shown that the similar robustness level can be achieved by other means, namely interpretability-based regularization. We evaluate these interpretability-based approaches on real-world ResNet models trained on CIFAR-10 and ImageNet datasets. Our results show that interpretability can marginally improve robustness when combined with adversarial training, however, they bring additional computational complexity making these approaches questionable for such models and datasets.
Creating an effective pump that is able to maintain blood circulation in a heart with appropriate medical indications is undoubtedly a crucial task. First versions of such devices are currently being created and teste...
详细信息
暂无评论