Search results for: geometrical attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1011

Search results for: geometrical attack

591 Numerical Investigation Including Mobility Model for the Performances of Piezoresistive Sensors

Authors: Abdelaziz Beddiaf

Abstract:

In this work, we present an analysis based on the study of mobility which is a very important electrical parameter of a piezoresistor and which is directly bound to the piezoresistivity effect in piezoresistive pressure sensors. We determine how the temperature affects mobility when the electric potential is applied. For this, a theoretical approach based on mobility in a p-type Silicon piezoresistor with that of a finite difference model for self-heating is developed. So, the evolution of mobility has been established versus time for different doping levels and with temperature rise provoked by self-heating using a numerical model combined with that of mobility. Furthermore, it has been calculated for some geometrical parameters of the sensor, such as membrane side length and thickness. Also, it is computed as a function of bias voltage. It was observed that mobility is strongly affected by the temperature rise induced by the applied potential when the sensor is actuated for a prolonged time as a consequence of drifting in the output response of the sensor. Finally, this work makes it possible to predict their temperature behavior due to self-heating and to improve this effect by optimizing the geometric properties of the device and by reducing the voltage source applied to the bridge.

Keywords: Sensors, Piezoresistivity, Mobility, Bias voltage

Procedia PDF Downloads 74
590 Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce

Authors: Wenjie Qin, Kewei Lv

Abstract:

In 1996, Boneh and Venkatesan proposed the Hidden Number Problem (HNP) and proved the most significant bits (MSB) of computational Diffie-Hellman key exchange scheme and related schemes are unpredictable bits. They also gave a method which is a lattice rounding technique to solve HNP in non-uniform model. In this paper, we put forward a new concept that is Schnorr-MSB-HNP. We also reduce the problem of solving Schnorr signature private key with a few consecutive most significant bits of random nonce (used at each signature generation) to Schnorr-MSB-HNP, then we use the rounding technique to solve the Schnorr-MSB-HNP. We have come to the conclusion that if there is a ‘miraculous box’ which inputs the random nonce and outputs 2loglogq (q is a prime number) most significant bits of nonce, the signature private key will be obtained by choosing 2logq signature messages randomly. Thus we get an attack on the Schnorr signature private key.

Keywords: rounding technique, most significant bits, Schnorr signature algorithm, nonce, Schnorr-MSB-HNP

Procedia PDF Downloads 213
589 Quantifying Parallelism of Vectors Is the Quantification of Distributed N-Party Entanglement

Authors: Shreya Banerjee, Prasanta K. Panigrahi

Abstract:

The three-way distributive entanglement is shown to be related to the parallelism of vectors. Using a measurement-based approach a set of 2−dimensional vectors is formed, representing the post-measurement states of one of the parties. These vectors originate at the same point and have an angular distance between them. The area spanned by a pair of such vectors is a measure of the entanglement of formation. This leads to a geometrical manifestation of the 3−tangle in 2−dimensions, from inequality in the area which generalizes for n− qubits to reveal that the n− tangle also has a planar structure. Quantifying the genuine n−party entanglement in every 1|(n − 1) bi-partition it is shown that the genuine n−way entanglement does not manifest in n− tangle. A new quantity geometrically similar to 3−tangle is then introduced that represents the genuine n− way entanglement. Extending the formalism to 3− qutrits, the nonlocality without entanglement can be seen to arise from a condition under which the post-measurement state vectors of a separable state show parallelism. A connection to nontrivial sum uncertainty relation analogous to Maccone and Pati uncertainty relation is then presented using decomposition of post-measurement state vectors along parallel and perpendicular direction of the pre-measurement state vectors. This study opens a novel way to understand multiparty entanglement in qubit and qudit systems.

Keywords: Geometry of quantum entanglement, Multipartite and distributive entanglement, Parallelism of vectors , Tangle

Procedia PDF Downloads 134
588 Quantum Modelling of AgHMoO4, CsHMoO4 and AgCsMoO4 Chemistry in the Field of Nuclear Power Plant Safety

Authors: Mohamad Saab, Sidi Souvi

Abstract:

In a major nuclear accident, the released fission products (FPs) and the structural materials are likely to influence the transport of iodine in the reactor coolant system (RCS) of a pressurized water reactor (PWR). So far, the thermodynamic data on cesium and silver species used to estimate the magnitude of FP release show some discrepancies, data are scarce and not reliable. For this reason, it is crucial to review the thermodynamic values related to cesium and silver materials. To this end, we have used state-of-the-art quantum chemical methods to compute the formation enthalpies and entropies of AgHMoO₄, CsHMoO₄, and AgCsMoO₄ in the gas phase. Different quantum chemical methods have been investigated (DFT and CCSD(T)) in order to predict the geometrical parameters and the energetics including the correlation energy. The geometries were optimized with TPSSh-5%HF method, followed by a single point calculation of the total electronic energies using the CCSD(T) wave function method. We thus propose with a final uncertainty of about 2 kJmol⁻¹ standard enthalpies of formation of AgHMoO₄, CsHMoO₄, and AgCsMoO₄.

Keywords: nuclear accident, ASTEC code, thermochemical database, quantum chemical methods

Procedia PDF Downloads 174
587 Heat Transfer and Friction Factor Study for Triangular Duct Solar Air Heater Having Discrete V-Shaped Ribs

Authors: Varun Goel

Abstract:

Solar energy is a good option among renewable energy resources due to its easy availability and abundance. The simplest and most efficient way to utilize solar energy is to convert it into thermal energy and this can be done with the help of solar collectors. The thermal performance of such collectors is poor due to less heat transfer from the collector surface to air. In this work, experimental investigations of single pass solar air heater having triangular duct and provided with roughness element on the underside of the absorber plate. V-shaped ribs are used for investigation having three different values of relative roughness pitch (p/e) ranges from 4-16 for a fixed value of angle of attack (α), relative roughness height (e/Dh) and a relative gap distance (d/x) values are 60°, 0.044 and 0.60 respectively. Result shows that considerable augmentation in heat transfer has been obtained by providing roughness.

Keywords: artificial roughness, solar air heater, triangular duct, V-shaped ribs

Procedia PDF Downloads 437
586 3D Simulation of the Twin-Aperture IRON Superconducting Quadrupole for Charm-Tau Factory

Authors: K. K. Riabchenko, T. V Rybitskaya, A. A. Starostenko

Abstract:

Sper Charm-Tau Factory is a double ring e+e- collider to be operated in the center-of-mass energy range from 2 to 6 GeV, with a peak luminosity of about 1035 cm-2s-1 (Crab Waist collision) and with longitudinally polarized electrons at the IP (interaction point). One of the important elements of the cτ-factory is the superconducting two-aperture quadrupole of the final focus. It was decided to make a full-scale prototype quadrupole. The main objectives of our study included: 1) 3D modeling of the quadrupole in the Opera program, 2) Optimization of the geometry of the quadrupole lens, 3) Study of the influence of magnetic properties and geometry of a quadrupole on integral harmonics. In addition to this, the ways of producing unwanted harmonics have been studied. In the course of this work, a 3D model of a two-aperture iron superconducting quadrupole lens was created. A three-dimensional simulation of the magnetic field was performed, and the geometrical parameters of the lens were selected. Calculations helped to find sources of possible errors and methods for correcting unwanted harmonics. In addition to this, calculations show that there are no obstacles to the production of a prototype lens.

Keywords: super cτ-factory, final focus, twin aperture quadrupole lens, integral harmonics

Procedia PDF Downloads 109
585 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation

Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal

Abstract:

We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).

Keywords: authentication, edge computing, industrial IoT, post-quantum resistance

Procedia PDF Downloads 183
584 Capability Prediction of Machining Processes Based on Uncertainty Analysis

Authors: Hamed Afrasiab, Saeed Khodaygan

Abstract:

Prediction of machining process capability in the design stage plays a key role to reach the precision design and manufacturing of mechanical products. Inaccuracies in machining process lead to errors in position and orientation of machined features on the part, and strongly affect the process capability in the final quality of the product. In this paper, an efficient systematic approach is given to investigate the machining errors to predict the manufacturing errors of the parts and capability prediction of corresponding machining processes. A mathematical formulation of fixture locators modeling is presented to establish the relationship between the part errors and the related sources. Based on this method, the final machining errors of the part can be accurately estimated by relating them to the combined dimensional and geometric tolerances of the workpiece – fixture system. This method is developed for uncertainty analysis based on the Worst Case and statistical approaches. The application of the presented method is illustrated through presenting an example and the computational results are compared with the Monte Carlo simulation results.

Keywords: process capability, machining error, dimensional and geometrical tolerances, uncertainty analysis

Procedia PDF Downloads 296
583 3D Modelling of Fluid Flow in Tunnel Kilns

Authors: Jaber H. Almutairi, Hosny Z. Abou-Ziyan, Issa F. Almesri, Mosab A. Alrahmani

Abstract:

The present work investigates the behavior of fluid flow inside tunnel kilns using 3D-CFD (Computational Fluid Dynamics) simulations. The CFD simulations are carried out with the FLUENT software and validated against experimental results on fluid flow and heat transfer in tunnel kilns. A grid dependency study is conducted in the current work to improve the accuracy of the results. Three turbulence models k–ω, standard k–ε, and RNG k–ε are tested where k–ω model gives the best results in comparison with the experiment. The numerical results reveal an intriguing phenomenon where a long flow separation zone behind the setting is observed under different geometric and operation conditions. It was found that the uniformity of flow distribution can be substantially improved by rearranging the geometrical parameters of brick setting relative to kiln/setting. This improvement of flow distribution plays a critical role to enhance the quality and quantity of the production. It can be concluded that a better design and operation of tunnel kilns in terms of productivity and energy consumption can be obtained by taking into consideration the flow uniformity inside the tunnel kilns using CFD modelling.

Keywords: tunnel kilns, flow separation, flow uniformity, computational fluid dynamics

Procedia PDF Downloads 317
582 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: attack modelling, crime commission process, crime script, situational crime prevention

Procedia PDF Downloads 115
581 Aerodynamics of Nature Inspired Turbine Blade Using Computational Simulation

Authors: Seung Ki Lee, Richard Kyung

Abstract:

In the airfoil analysis, as the camber is greater, the minimal angle of attack causing the stall and maximum lift force increases. The shape of the turbine blades is similar to the shape of the wings of planes. After major wars, many remarkable blade shapes are made through researches about optimal blade shape. The blade shapes developed by National Advisory Committee for Aeronautics, NACA, is well known. In this paper, using computational and numerical analysis, the NACA airfoils are analyzed. This research shows that the blades vary with their thickness, which thinner blades are expected to be better. There is no significant difference of coefficient of lift due to the difference in thickness, but the coefficient of drag increases as the thickness increases.

Keywords: blades, drag force, national advisory committee for aeronautics airfoils, turbine

Procedia PDF Downloads 212
580 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 417
579 Effect of Gaseous Imperfections on the Supersonic Flow Parameters for Air in Nozzles

Authors: Merouane Salhi, Toufik Zebbiche

Abstract:

When the stagnation pressure of perfect gas increases, the specific heat and their ratio do not remain constant anymore and start to vary with this pressure. The gas doesn’t remain perfect. Its state equation change and it becomes for a real gas. In this case, the effects of molecular size and intermolecular attraction forces intervene to correct the state equation. The aim of this work is to show and discuss the effect of stagnation pressure on supersonic thermodynamical, physical and geometrical flow parameters, to find a general case for real gas. With the assumptions that Berthelot’s state equation accounts for the molecular size and intermolecular force effects, expressions are developed for analyzing supersonic flow for thermally and calorically imperfect gas lower than the dissociation molecules threshold. The designs parameters for supersonic nozzle like thrust coefficient depend directly on stagnation parameters of the combustion chamber. The application is for air. A computation of error is made in this case to give a limit of perfect gas model compared to real gas model.

Keywords: supersonic flow, real gas model, Berthelot’s state equation, Simpson’s method, condensation function, stagnation pressure

Procedia PDF Downloads 436
578 A Retrospective Cohort Study on an Outbreak of Gastroenteritis Linked to a Buffet Lunch Served during a Conference in Accra

Authors: Benjamin Osei Tutu, Sharon Annison

Abstract:

On 21st November, 2016, an outbreak of foodborne illness occurred after a buffet lunch served during a stakeholders’ consultation meeting held in Accra. An investigation was conducted to characterise the affected people, determine the etiologic food, the source of contamination and the etiologic agent and to implement appropriate public health measures to prevent future occurrences. A retrospective cohort study was conducted via telephone interviews, using a structured questionnaire developed from the buffet menu. A case was defined as any person suffering from symptoms of foodborne illness e.g. diarrhoea and/or abdominal cramps after eating food served during the stakeholder consultation meeting in Accra on 21st November, 2016. The exposure status of all the members of the cohort was assessed by taking the food history of each respondent during the telephone interview. The data obtained was analysed using Epi Info 7. An environmental risk assessment was conducted to ascertain the source of the food contamination. Risks of foodborne infection from the foods eaten were determined using attack rates and odds ratios. Data was obtained from 54 people who consumed food served during the stakeholders’ meeting. Out of this population, 44 people reported with symptoms of food poisoning representing 81.45% (overall attack rate). The peak incubation period was seven hours with a minimum and maximum incubation periods of four and 17 hours, respectively. The commonly reported symptoms were diarrhoea (97.73%, 43/44), vomiting (84.09%, 37/44) and abdominal cramps (75.00%, 33/44). From the incubation period, duration of illness and the symptoms, toxin-mediated food poisoning was suspected. The environmental risk assessment of the implicated catering facility indicated a lack of time/temperature control, inadequate knowledge on food safety among workers and sanitation issues. Limited number of food samples was received for microbiological analysis. Multivariate analysis indicated that illness was significantly associated with the consumption of the snacks served (OR 14.78, P < 0.001). No stool and blood or samples of etiologic food were available for organism isolation; however, the suspected etiologic agent was Staphylococcus aureus or Clostridium perfringens. The outbreak could probably be due to the consumption of unwholesome snack (tuna sandwich or chicken. The contamination and/or growth of the etiologic agent in the snack may be due to the breakdown in cleanliness, time/temperature control and good food handling practices. Training of food handlers in basic food hygiene and safety is recommended.

Keywords: Accra, buffet, conference, C. perfringens, cohort study, food poisoning, gastroenteritis, office workers, Staphylococcus aureus

Procedia PDF Downloads 211
577 Two-Dimensional Dynamics Motion Simulations of F1 Rare Wing-Flap

Authors: Chaitanya H. Acharya, Pavan Kumar P., Gopalakrishna Narayana

Abstract:

In the realm of aerodynamics, numerous vehicles incorporate moving components to enhance their performance. For instance, airliners deploy hydraulically operated flaps and ailerons during take-off and landing, while Formula 1 racing cars utilize hydraulic tubes and actuators for various components, including the Drag Reduction System (DRS). The DRS, consisting of a rear wing and adjustable flaps, plays a crucial role in overtaking manoeuvres. The DRS has two positions: the default position with the flaps down, providing high downforce, and the lifted position, which reduces drag, allowing for increased speed and aiding in overtaking. Swift deployment of the DRS during races is essential for overtaking competitors. The fluid flow over the rear wing flap becomes intricate during deployment, involving flow reversal and operational changes, leading to unsteady flow physics that significantly influence aerodynamic characteristics. Understanding the drag and downforce during DRS deployment is crucial for determining race outcomes. While experiments can yield accurate aerodynamic data, they can be expensive and challenging to conduct across varying speeds. Computational Fluid Dynamics (CFD) emerges as a cost-effective solution to predict drag and downforce across a range of speeds, especially with the rapid deployment of the DRS. This study employs the finite volume-based solver Ansys Fluent, incorporating dynamic mesh motions and a turbulent model to capture the complex flow phenomena associated with the moving rear wing flap. A dedicated section for the rare wing-flap is considered in the present simulations, and the aerodynamics of these sections closely resemble S1223 aerofoils. Before delving into the simulations of the rare wing-flap aerofoil, numerical results undergo validation using experimental data from an NLR flap aerofoil case, encompassing different flap angles at two distinct angles of attack was carried out. The increase in flap angle as increase in lift and drag is observed for a given angle of attack. The simulation methodology for the rare-wing-flap aerofoil case involves specific time durations before lifting the flap. During this period, drag and downforce values are determined as 330 N and 1800N, respectively. Following the flap lift, a noteworthy reduction in drag to 55 % and a decrease in downforce to 17 % are observed. This understanding is critical for making instantaneous decisions regarding the deployment of the Drag Reduction System (DRS) at specific speeds, thereby influencing the overall performance of the Formula 1 racing car. Hence, this work emphasizes the utilization of dynamic mesh motion methodology to predict the aerodynamic characteristics during the deployment of the DRS in a Formula 1 racing car.

Keywords: DRS, CFD, drag, downforce, dynamics mesh motion

Procedia PDF Downloads 79
576 Countering Terrorism through Social Media: Case Study in Indonesia

Authors: Mauly Budiyanti, Aisyah M. Anggiana

Abstract:

Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.

Keywords: Indonesia, national security, social media, terrorism.

Procedia PDF Downloads 208
575 Technology Impact on the Challenge between Human Rights and Cyber Terrorism

Authors: Abanoub Zare Zakaria Herzalla

Abstract:

The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 27
574 Numerical Study on the Ultimate Load of Offshore Two-Planar Tubular KK-Joints at Fire-Induced Elevated Temperatures

Authors: Hamid Ahmadi, Neda Azari-Dodaran

Abstract:

A total of 270 nonlinear steady-state finite element (FE) analyses were performed on 54 FE models of two-planar circular hollow section (CHS) KK-joints subjected to axial loading at five different temperatures (20 ºC, 200 ºC, 400 ºC, 550 ºC, and 700 ºC). The primary goal was to investigate the effects of temperature and geometrical characteristics on the ultimate strength, modes of failure, and initial stiffness of the KK-joints. Results indicated that on an average basis, the ultimate load of a two-planar tubular KK-joint at 200 ºC, 400 ºC, 550 ºC, and 700 ºC is 90%, 75%, 45%, and 16% of the joint’s ultimate load at ambient temperature, respectively. Outcomes of the parametric study showed that replacing the yield stress at ambient temperature with the corresponding value at elevated temperature to apply the EN 1993-1-8 equations for the calculation of the joint’s ultimate load at elevated temperatures may lead to highly unconservative results that might endanger the safety of the structure. Results of the parametric study were then used to develop a set of design formulas, through nonlinear regression analyses, to calculate the ultimate load of two-planar tubular KK-joints subjected to axial loading at elevated temperatures.

Keywords: ultimate load, two-planar tubular KK-joint, axial loading, elevated temperature, parametric equation

Procedia PDF Downloads 137
573 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia

Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana

Abstract:

Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.

Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom

Procedia PDF Downloads 434
572 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution

Authors: Shenouda Farag Aziz Ibrahim

Abstract:

The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 15
571 A POX Controller Module to Prepare a List of Flow Header Information Extracted from SDN Traffic

Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin

Abstract:

Software Defined Networking (SDN) is a paradigm designed to facilitate the way of controlling the network dynamically and with more agility. Network traffic is a set of flows, each of which contains a set of packets. In SDN, a matching process is performed on every packet coming to the network in the SDN switch. Only the headers of the new packets will be forwarded to the SDN controller. In terminology, the flow header fields are called tuples. Basically, these tuples are 5-tuple: the source and destination IP addresses, source and destination ports, and protocol number. This flow information is used to provide an overview of the network traffic. Our module is meant to extract this 5-tuple with the packets and flows numbers and show them as a list. Therefore, this list can be used as a first step in the way of detecting the DDoS attack. Thus, this module can be considered as the beginning stage of any flow-based DDoS detection method.

Keywords: matching, OpenFlow tables, POX controller, SDN, table-miss

Procedia PDF Downloads 182
570 Numerical Simulation of the Flow around Wing-In-Ground Effect (WIG) Craft

Authors: A. Elbatran, Y. Ahmed, A. Radwan, M. Ishak

Abstract:

The use of WIG craft is representing an ambitious technology that will support in reducing time, effort, and money of the conventional marine transportation in the future. This paper investigates the aerodynamic characteristic of compound wing-in-ground effect (WIG) craft model. Drag coefficient, lift coefficient and Lift and drag ratio were studied numerically with respect to the ground clearance and the wing angle of attack. The modifications of the wing has been done in order to investigate the most suitable wing configuration that can increase the wing lift-to-drag ratio at low ground clearance. A numerical investigation was carried out in this research work using finite volume Reynolds-Averaged Navier-Stokes Equations (RANSE) code ANSYS CFX, Validation was carried out by using experiments. The experimental and the numerical results concluded that the lift to drag ratio decreased with the increasing of the ground clearance.

Keywords: drag Coefficient, ground clearance, navier-stokes, WIG

Procedia PDF Downloads 363
569 Scouring Rate Pattern/Monitoring at Coastal and Offshore Structures

Authors: Ahmad Saifullah Mazlan, Hossein Basser, Shatirah Akib

Abstract:

Scouring pattern evaluation and measuring its depth around coastal and offshore structures is very essential issue to assure the safety of the structures as well as providing needed design parameters. Scouring is known as one of the important phenomena which threatens the safety of infrastructures. Several countermeasures have been developed to control scouring by protecting the structures against water flow attack directly or indirectly by changing the water flow pattern. Recently, monitoring methods for estimating water flow pattern and scour depth are studied to track the safety of structures. Since most of studies regarding scouring is related to monitoring scouring around piers in rivers therefore it is necessary to develop researches investigating scouring around piers in coastal and offshore areas. This paper describes a review of monitoring methods may be used for detecting scour depth around piers in coastal and offshore structures.

Keywords: scour, monitoring, pier, coastal, offshore

Procedia PDF Downloads 618
568 Mechanical Behavior of a Pipe Subject to Buckling

Authors: H. Chenine, D. Ouinas, Z. Bennaceur

Abstract:

The thin shell structures like metal are particularly susceptible to buckling or geometric instability. Their sizing is performed by resorting to simplified rules, this approach is generally conservative. Indeed, these structures are very sensitive to the slightest imperfection shape (initial geometrical defects). The design is usually based on the knowledge of the real or perceived initial state. Now this configuration evolves over time, there is usually the addition of new deformities due to operation (accidental loads, creep), but also to loss of material located in the corroded areas. Taking into account these various damage generally led to a loss of bearing capacity. In order to preserve the charge potential of the structure, it is then necessary to find a different material. In our study, we plan to replace the material used for reservoirs found in the company Sonatrach with a composite material made from carbon fiber or glass. 6 to 12 layers of composite are simply stuck. Research is devoted to the study of the buckling of multilayer shells subjected to an imposed displacement, allowed us to identify the key parameters and those whose effect is less. For all results, we find that the carbon epoxy T700E is the strongest, increasing the number of layers increases the strength of the shell.

Keywords: finite element analysis, circular notches, buckling, tank made composite materials

Procedia PDF Downloads 203
567 Buckling a Reservoir Composite Provided with Notches

Authors: H. Chenine, D. Ouinas, Z. Bennaceur

Abstract:

The thin shell structures like metal are particularly susceptible to buckling or geometric instability. Their sizing is performed by resorting to simplified rules, this approach is generally conservative. Indeed, these structures are very sensitive to the slightest imperfection shape (initial geometrical defects). The design is usually based on the knowledge of the real or perceived initial state. Now this configuration evolves over time, there is usually the addition of new deformities due to operation (accidental loads, creep), but also to loss of material located in the corroded areas. Taking into account these various damage generally led to a loss of bearing capacity. In order to preserve the charge potential of the structure, it is then necessary to find a different material. In our study we plan to replace the material used for reservoirs found in the company Sonatrach with a composite material made from carbon fiber or glass. 6 to 12 layers of composite are simply stuck. Research is devoted to the study of the buckling of multilayer shells subjected to an imposed displacement, allowed us to identify the key parameters and those whose effect is less. For all results, we find that the carbon epoxy T700E is the strongest, increasing the number of layers increases the strength of the shell.

Keywords: Finite Element Analysis, circular notches, buckling, tank made composite materials

Procedia PDF Downloads 344
566 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 131
565 Analysis of Moment Rotation Curve for Steel Beam Column Joint

Authors: A. J. Shah, G. R. Vesmawala

Abstract:

Connections perform a fundamental role in the steel structures as global behaviour. In order to evaluate the real influence of the physical and geometrical parameters that control their behaviour, many experimental tests and analysis have been developed but a definitive answer to the problem in question still stands. Here, various configurations of bolts were tried and the resulting moment rotation (M-θ) curves were plotted. The connection configuration is such that two bolts are located above each of the flanges and beside each of the webs. The model considers the combined effects of prying action, the formation of yield lines, and failures due to punching shear and beam section failure. For many types of connections, the stiffness at the service load level falls somewhere in between the fully restrained and simple limits and designers need to account for its behaviour. The (M-θ) curves are generally assumed to be the best characterization of connection behaviour. The moment rotation curves are generally derived from experiments on cantilever type specimens. The moments are calculated directly from the statics of the specimen, while the rotations are measured over a distance typically equal to the point of loading. Thus, this paper establishes the relationship between M-θ behaviour of different types of connections tested and presents the relative strength of various possible arrangements of bolts.

Keywords: bolt, moment, rotation, stiffness, connections

Procedia PDF Downloads 380
564 Taxation, Evidential and Jurisdictional Issues in Electronic Commercial Transactions in Nigeria

Authors: Michael Sunday Afolayan

Abstract:

This research work examined the challenges bedevilling the development of legal framework for electronic commercial transactions (e-commerce) in Nigeria. Nigeria does not have a clear-cut legislation regulating electronic commerce in its jurisdiction despite the geometrical rate of growth and adoption of this method of trade. It specifically posed a great challenge looking at taxation, evidential and jurisdictional issues in e-commerce in Nigeria. The author in a broader research work which is abridged here, traced the origin and development of e-commerce and the attendant laws applicable in Nigeria, examining their sufficiency or otherwise. In carrying out the research work, doctrinal mode of legal research was adopted, examining both primary and secondary sources of legal research materials within their contextual meanings. It was found that the failure to enact a law which has direct regulatory bearing on e-commerce in Nigeria has led to adoption and application of circumstantial laws, rules and common law principles to tackle the problems arising out of electronic commercial transactions, especially in the areas of taxation, evidential and jurisdictional challenges. It was ultimately suggested that there is urgent need to sign into law, the Electronic Transaction Bill which had already been passed by the National Assembly since 2017.

Keywords: e-commerce, legislation, taxation, evidential, jurisdiction

Procedia PDF Downloads 70
563 Algorithmic Generation of Carbon Nanochimneys

Authors: Sorin Muraru

Abstract:

Computational generation of carbon nanostructures is still a very demanding process. This work provides an alternative to manual molecular modeling through an algorithm meant to automate the design of such structures. Specifically, carbon nanochimneys are obtained through the bonding of a carbon nanotube with the smaller edge of an open carbon nanocone. The methods of connection rely on mathematical, geometrical and chemical properties. Non-hexagonal rings are used in order to perform the correct bonding of dangling bonds. Once obtained, they are useful for thermal transport, gas storage or other applications such as gas separation. The carbon nanochimneys are meant to produce a less steep connection between structures such as the carbon nanotube and graphene sheet, as in the pillared graphene, but can also provide functionality on its own. The method relies on connecting dangling bonds at the edges of the two carbon nanostructures, employing the use of two different types of auxiliary structures on a case-by-case basis. The code is implemented in Python 3.7 and generates an output file in the .pdb format containing all the system’s coordinates. Acknowledgment: This work was supported by a grant of the Executive Agency for Higher Education, Research, Development and innovation funding (UEFISCDI), project number PN-III-P1-1.1-TE-2016-24-2, contract TE 122/2018.

Keywords: carbon nanochimneys, computational, carbon nanotube, carbon nanocone, molecular modeling, carbon nanostructures

Procedia PDF Downloads 149
562 Saliency Detection Using a Background Probability Model

Authors: Junling Li, Fang Meng, Yichun Zhang

Abstract:

Image saliency detection has been long studied, while several challenging problems are still unsolved, such as detecting saliency inaccurately in complex scenes or suppressing salient objects in the image borders. In this paper, we propose a new saliency detection algorithm in order to solving these problems. We represent the image as a graph with superixels as nodes. By considering appearance similarity between the boundary and the background, the proposed method chooses non-saliency boundary nodes as background priors to construct the background probability model. The probability that each node belongs to the model is computed, which measures its similarity with backgrounds. Thus we can calculate saliency by the transformed probability as a metric. We compare our algorithm with ten-state-of-the-art salient detection methods on the public database. Experimental results show that our simple and effective approach can attack those challenging problems that had been baffling in image saliency detection.

Keywords: visual saliency, background probability, boundary knowledge, background priors

Procedia PDF Downloads 413