What are the methods used to determine relationship or correlation of hydrological variables?4 answersVarious methods are employed to determine the relationship or correlation of hydrological variables. These include the Moving Correlation Coefficient Analysis (MCCA) method for identifying periodicities in hydrological time series, correlation analysis focusing on linear associations between variables through techniques like Pearson correlation coefficient and regression analysis, Copula entropy method for assessing dependence between hydrological variables, trend identification methods such as least squares linear regression and Mann-Kendall non-parametric test, and the use of partial correlation functions (PCF) in karst hydrology studies to resolve ambiguities and provide additional information. These diverse approaches offer insights into the complex relationships and interactions among hydrological variables.
How qif can be used to estimate side channel leakage?4 answersQIF (Quantitative Information Flow) can be used to estimate side channel leakage by providing quantitative tools for leakage certification. Previous works in this area were qualitative, but this research provides the first quantitative approach. The estimation of Mutual Information (MI), which measures the leakage amount, is challenging due to the unknown true leakage distribution. However, this research proposes using easy-to-compute information theoretic quantities, such as Perceived Information and Hypothetical Information, to bound the MI. By considering the side channel as a communication channel, the channel capacity can also be used as a new information theoretic metric to estimate the leakage amount. This approach offers a black box method for estimating side channel leakage without the need for profiling the leakage model.
What are the different side channel configurations that can be used to improve hydraulic efficiency?5 answersDifferent side channel configurations can be used to improve hydraulic efficiency. One method involves opening an inlet hole with a parallelogram section in the inlet cover plate, which generates a longitudinal vortex or trend in the same direction as the vortex generated by the fluid flowing through the first blade. Another method is to open an outlet hole with a parallelogram section in the outlet cover plate, which also generates a longitudinal vortex or trend in the same direction as the vortex generated by the fluid flowing through the blade to reach the outlet. Additionally, variations in the geometrical parameters of the side channel pump greatly affect its hydraulic performance. Computational modeling techniques can be enhanced to further improve the efficiency of the pump.
Are there any side-channel attacks using quantum computers?5 answersSide-channel attacks using quantum computers have been explored in the literature. Bell and Trügler present experimental evidence of a side-channel attack on superconducting cloud-based quantum computers, demonstrating that information about an interim circuit can be acquired before and after its execution. Tanaka et al. propose a side-channel-assisted key recovery attack on post-quantum key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto transformation, achieving a key recovery with significantly fewer attack traces. De Feo et al. identify side-channel attacks on SIKE, an isogeny-based candidate in the NIST PQC competition, showing that coordinate randomization alone is not sufficient to protect against these attacks. Pitalúa-García et al. identify new types of attacks on practical implementations of mistrustful quantum cryptographic schemes, highlighting the vulnerability of countermeasures previously believed to ensure security. Bozzio et al. discuss multi-photon attacks in practical quantum implementations and analyze countermeasures based on selective reporting, proving them inadequate.
How can these correlations be evaluated to improve fluid modeling?3 answersCatalytic fixed-bed reactors in the chemical industry are commonly modeled using pseudo-homogeneous continuum models, which assume constant fluid properties. However, considering the non-uniformity of fluid properties due to chemical reactions can improve the predictive performance of heat transfer correlations. The impact of different approaches to fluid properties on heat transfer correlations was evaluated, and it was found that accounting for radial and axial variations of fluid properties improved the predictive performance of all correlations. In the study of unsteady fluid flows, nonlinear correlations in temporal POD coefficients can be used to identify the underlying attractor and reduce the dimensionality of the model. This approach can stabilize POD-Galerkin models and be used for data-driven model identification. Impedance spectroscopy (IS) measurements and data analysis can be used to determine IS parameters for fluid formulations and establish correlations between these parameters and fluid properties. This information can then be used to develop modified or new fluid formulations. The surface tension of common fluids can be accurately predicted using a correlation model, with slight improvements made for some fluids. A stochastic model for liquids can be extended to evaluate the dynamic pair correlation function by generalizing the width function.
How to detect timing side channel attack in NoCs?5 answersTiming side channel attacks in Network-on-Chips (NoCs) can be detected using various techniques. One approach is to use non-interference based adaptive routing to separate network traffic and prevent information leakage. Another method involves monitoring the NoC traffic and dynamically configuring the router memory space to make the attacker oblivious to sensitive traffic, thus avoiding timing attacks. Additionally, a security component can determine if an application is carrying out a timing side-channel attack by inspecting program instructions and taking action to mitigate the attack, such as modifying instructions or page mapping. Furthermore, a method has been proposed to detect side channel attacks in enclaves without additional hardware by analyzing data in the state save area and detecting asynchronous enclave exits. Finally, hardware counter anomaly detection circuitry can be used to detect side-channel attacks by selecting a subset of High-Performance Counters (HPCs) demonstrating anomalous behavior.