Mahamadd Marrdonny and Mohammad Mobed
The purpose of this paper is to propose a new guidance algorithm for launching a satellite using an expendable rocket from an equatorial site to an equatorial low‐Earth orbit.
Abstract
Purpose
The purpose of this paper is to propose a new guidance algorithm for launching a satellite using an expendable rocket from an equatorial site to an equatorial low‐Earth orbit.
Design/methodology/approach
Guidance during endoatmospheric portion is based on a nominal trajectory computed prior to take‐off. A set of updating computations begins anew at the time instant tg of transition from endoatmosphere to exoatmosphere. The updating computations determine a guidance trajectory and an associated control law for the remainder of path by taking into account the rocket state at time tg. Thus, the overall guidance involves both initial and midcourse operations, and it has both open‐ and closed‐loop aspects.
Findings
Viability and performance in terms of speed, precision, and effectiveness of the proposed scheme is demonstrated through three‐dimensional simulations and comparisons to other methods.
Originality/value
The updating computations and the fashion in which they are incorporated into the entire guidance process constitute the novel features of the proposed algorithm.
Details
Keywords
Nisha TN and Mugdha Shailendra Kulkarni
The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information…
Abstract
Purpose
The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information system faces. Banking and other financial services are always top among the most attractive targets for cyber attackers. Blind phishing or spear phishing is still one of the major contributors to all malicious activities in the e-banking sector. All the counter mechanisms, therefore, revolve around the concept of how security-aware the customers are. To fool these mechanisms, attacks are becoming smarter and are searching for methods where the human involvement is diminishing to zero. Zero click attacks are one big leap that attackers are taking that removes the requirement of human involvement in initiating attacks and are moving toward an era of unassisted attacks. Even though the standard procedure and protocols are built into the banking system, they fail to detect this attack resulting in significant losses.
Design/methodology/approach
This paper follows a conceptual review of the upcoming concept in security and its implication in e-banking sector. The methodology adopted in this paper uses review papers, articles and white papers to conclude a theoretical model. A detailed analysis of unassisted attacks is considered from 2010 onwards till 2022.
Findings
This research deliberates on the methodologies of zero click attacks and gives a detailed analysis of attack vectors and their exploits. This research also identifies the likely attacks on e-banking that these vulnerabilities can trigger.
Originality/value
The key contribution is toward the early detection of zero click attacks, suggesting countermeasure, reducing the likelihood of these attacks and the financial impact.