Search results for: secure information flow
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15575

Search results for: secure information flow

15155 Heat Transfer of an Impinging Jet on a Plane Surface

Authors: Jian-Jun Shu

Abstract:

A cold, thin film of liquid impinging on an isothermal hot, horizontal surface has been investigated. An approximate solution for the velocity and temperature distributions in the flow along the horizontal surface is developed, which exploits the hydrodynamic similarity solution for thin film flow. The approximate solution may provide a valuable basis for assessing flow and heat transfer in more complex settings.

Keywords: flux, free impinging jet, solid-surface, uniform wall temperature

Procedia PDF Downloads 478
15154 Applying a Noise Reduction Method to Reveal Chaos in the River Flow Time Series

Authors: Mohammad H. Fattahi

Abstract:

Chaotic analysis has been performed on the river flow time series before and after applying the wavelet based de-noising techniques in order to investigate the noise content effects on chaotic nature of flow series. In this study, 38 years of monthly runoff data of three gauging stations were used. Gauging stations were located in Ghar-e-Aghaj river basin, Fars province, Iran. The noise level of time series was estimated with the aid of Gaussian kernel algorithm. This step was found to be crucial in preventing removal of the vital data such as memory, correlation and trend from the time series in addition to the noise during de-noising process.

Keywords: chaotic behavior, wavelet, noise reduction, river flow

Procedia PDF Downloads 468
15153 Use of Personal Rhythm to Authenticate Encrypted Messages

Authors: Carlos Gonzalez

Abstract:

When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).

Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption

Procedia PDF Downloads 304
15152 Quantifying Freeway Capacity Reductions by Rainfall Intensities Based on Stochastic Nature of Flow Breakdown

Authors: Hoyoung Lee, Dong-Kyu Kim, Seung-Young Kho, R. Eddie Wilson

Abstract:

This study quantifies a decrement in freeway capacity during rainfall. Traffic and rainfall data were gathered from Highway Agencies and Wunderground weather service. Three inter-urban freeway sections and its nearest weather stations were selected as experimental sites. Capacity analysis found reductions of maximum and mean pre-breakdown flow rates due to rainfall. The Kruskal-Wallis test also provided some evidence to suggest that the variance in the pre-breakdown flow rate is statistically insignificant. Potential application of this study lies in the operation of real time traffic management schemes such as Variable Speed Limits (VSL), Hard Shoulder Running (HSR), and Ramp Metering System (RMS), where speed or flow limits could be set based on a number of factors, including rainfall events and their intensities.

Keywords: capacity randomness, flow breakdown, freeway capacity, rainfall

Procedia PDF Downloads 381
15151 Effects of Viscous Dissipation on Free Convection Boundary Layer Flow towards a Horizontal Circular Cylinder

Authors: Muhammad Khairul Anuar Mohamed, Mohd Zuki Salleh, Anuar Ishak, Nor Aida Zuraimi Md Noar

Abstract:

In this study, the numerical investigation of viscous dissipation on convective boundary layer flow towards a horizontal circular cylinder with constant wall temperature is considered. The transformed partial differential equations are solved numerically by using an implicit finite-difference scheme known as the Keller-box method. Numerical solutions are obtained for the reduced Nusselt number and the skin friction coefficient as well as the velocity and temperature profiles. The features of the flow and heat transfer characteristics for various values of the Prandtl number and Eckert number are analyzed and discussed. The results in this paper is original and important for the researchers working in the area of boundary layer flow and this can be used as reference and also as complement comparison purpose in future.

Keywords: free convection, horizontal circular cylinder, viscous dissipation, convective boundary layer flow

Procedia PDF Downloads 439
15150 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 128
15149 Visualized Flow Patterns around and inside a Two-Sided Wind-Catcher in the Presence of Upstream Structures

Authors: M. Afshin, A. Sohankar, M. Dehghan Manshadi, M. R. Daneshgar, G. R. Dehghan Kamaragi

Abstract:

In this paper, the influence of an upstream structure on the flow pattern within and around the wind-catcher is experimentally investigated by smoke flow visualization techniques. Wind-catchers are an important part of natural ventilation in residential buildings or public places such as shopping centers, libraries, etc. Wind-catchers might be also used in places of high urban densities; hence their potential to provide natural ventilation in this case is dependent on the presence of upstream objects. In this study, the two-sided wind-catcher model was based on a real wind-catcher observed in the city of Yazd, Iran. The present study focuses on the flow patterns inside and outside the isolated two-sided wind-catcher, and on a two-sided wind-catcher in the presence of an upstream structure. The results show that the presence of an upstream structure influences the airflow pattern force and direction. Placing a high upstream object reverses the airflow direction inside the wind-catcher.

Keywords: natural ventilation, smoke flow visualization, two-sided wind-catcher, flow patterns

Procedia PDF Downloads 573
15148 Experimental Study of Heat Transfer in Pulsation Mist Flow in Rectanglar Duct Partially Filled with a Porous Medium

Authors: Hosein Shokoohmand, Mohamad Esmaeil Jomeh

Abstract:

The present thesis studies the effect of different factors such as frequency of oscillatory flow, change in constant wall heat flux and two-phase current state, on heat transfer in a pipe in presence of porous medium. In this experimental study is conducted for Reynolds numbers in a range of Re=850 to Re=10000 and oscillatory frequencies of 5, 20, 10, 30 and 40 Hz with constant heat flux of 585 w/m2 and 819 w/m2. The results indicate that increase in oscillation frequency in higher frequencies for heat flux of 585 w/m2 leads to an increase in heat transfer; however, in the rest of tests it results in a heat transfer decrease. Increasing Reynolds number in a pulsation mist flow causes an increase in average Nusselt number values. The effect of oscillation frequencies in a pulsation mist flow for different Reynolds numbers has revealed different results, in a way that for some Reynolds numbers an increase of frequency has led to a heat transfer decrease.

Keywords: Reynolds numbers, frequency of oscillatory flow, constant heat flux, mist flow

Procedia PDF Downloads 494
15147 Analysis of Slip Flow Heat Transfer between Asymmetrically Heated Parallel Plates

Authors: Hari Mohan Kushwaha, Santosh Kumar Sahu

Abstract:

In the present study, analysis of heat transfer is carried out in the slip flow region for the fluid flowing between two parallel plates by employing the asymmetric heat fluxes at surface of the plates. The flow is assumed to be hydrodynamically and thermally fully developed for the analysis. The second order velocity slip and viscous dissipation effects are considered for the analysis. Closed form expressions are obtained for the Nusselt number as a function of Knudsen number and modified Brinkman number. The limiting condition of the present prediction for Kn = 0, Kn2 = 0, and Brq1 = 0 is considered and found to agree well with other analytical results.

Keywords: Knudsen number, modified Brinkman number, slip flow, velocity slip

Procedia PDF Downloads 386
15146 The Effect of Swirl on the Flow Distribution in Automotive Exhaust Catalysts

Authors: Piotr J. Skusiewicz, Johnathan Saul, Ijhar Rusli, Svetlana Aleksandrova, Stephen. F. Benjamin, Miroslaw Gall, Steve Pierson, Carol A. Roberts

Abstract:

The application of turbocharging in automotive engines leads to swirling flow entering the catalyst. The behaviour of this type of flow within the catalyst has yet to be adequately documented. This work discusses the effect of swirling flow on the flow distribution in automotive exhaust catalysts. Compressed air supplied to a moving-block swirl generator allowed for swirling flow with variable intensities to be generated. Swirl intensities were measured at the swirl generator outlet using single-sensor hot-wire probes. The swirling flow was fed into diffusers with total angles of 10°, 30° and 180°. Downstream of the diffusers, a wash-coated diesel oxidation catalyst (DOC) of length 143.8 mm, diameter 76.2 mm and nominal cell density of 400 cpsi was fitted. Velocity profiles were measured at the outlet sleeve about 30 mm downstream of the monolith outlet using single-sensor hot-wire probes. Wall static pressure was recorded using a multi-tube manometer connected to pressure taps positioned along the diffuser walls. The results show that as swirl is increased, more of the flow is directed towards the diffuser walls. The velocity decreases around the centre-line and maximum velocities are observed close to the outer radius of the monolith for all flow rates. At the maximum swirl intensity, reversed flow was recorded near the centre of the monolith. Wall static pressure measurements in the 180° diffuser indicated no pressure recovery as the flow enters the diffuser. This is indicative of flow separation at the inlet to the diffuser. To gain insight into the flow structure, CFD simulations have been performed for the 180° diffuser for a flow rate of 63 g/s. The geometry of the model consists of the complete assembly from the upstream swirl generator to the outlet sleeve. Modelling of the flow in the monolith was achieved using the porous medium approach, where the monolith with parallel flow channels is modelled as a porous medium that resists the flow. A reasonably good agreement was achieved between the experimental and CFD results downstream of the monolith. The CFD simulations allowed visualisation of the separation zones and central toroidal recirculation zones that occur within the expansion region at certain swirl intensities which are highlighted.

Keywords: catalyst, computational fluid dynamics, diffuser, hot-wire anemometry, swirling flow

Procedia PDF Downloads 304
15145 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 345
15144 Linear Stability Analysis of a Regularized Two-Fluid Model for Unstable Gas-Liquid Flows in Long Hilly Terrain Pipelines

Authors: David Alejandro Lazo-Vasquez, Jorge Luis Balino

Abstract:

In the petroleum industry, multiphase flow occurs when oil, gas, and water are transported in the same pipe through large pipeline systems. The flow can take different patterns depending on parameters like fluid velocities, pipe diameter, pipe inclination, and fluid properties. Mainly, intermittent flow is produced by the natural propagation of short and long waves, according to the Kelvin-Helmholtz Stability Theory. To model stratified flow and the onset of intermittent flow, it is crucial to have knowledge of short and long waves behavior. The two-fluid model, frequently employed for characterizing multiphase systems, becomes ill-posed for high liquid and gas velocities and large inclination angles, for short waves can develop infinite growth rates. We are interested in focusing attention on long-wave instability, which leads to the production of roll waves that may grow and result in the transition from stratified flow to intermittent flow. In this study, global and local linear stability analyses for dynamic and kinematic stability criteria predict the regions of stability of the flow for different pipe inclinations and fluid velocities in regularized and non-regularized systems, concurrently. It was possible to distinguish when: wave growth rates are absolutely bounded (stable stratified smooth flow), waves have finite growth rates (unstable stratified wavy flow), and when the equation system becomes elliptic and hyperbolization is needed. In order to bound short wave growth rates and regularize the equation system, we incorporated some lower and higher-order terms like interfacial drag and surface tension, respectively.

Keywords: linear stability analysis, multiphase flow, onset of slugging, two-fluid model regularization

Procedia PDF Downloads 135
15143 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 65
15142 Impact of Air Flow Structure on Distinct Shape of Differential Pressure Devices

Authors: A. Bertašienė

Abstract:

Energy harvesting from any structure makes a challenge. Different structure of air/wind flows in industrial, environmental and residential applications emerge the real flow investigation in detail. Many of the application fields are hardly achievable to the detailed description due to the lack of up-to-date statistical data analysis. In situ measurements aim crucial investments thus the simulation methods come to implement structural analysis of the flows. Different configurations of testing environment give an overview how important is the simple structure of field in limited area on efficiency of the system operation and the energy output. Several configurations of modeled working sections in air flow test facility was implemented in CFD ANSYS environment to compare experimentally and numerically air flow development stages and forms that make effects on efficiency of devices and processes. Effective form and amount of these flows under different geometry cases define the manner of instruments/devices that measure fluid flow parameters for effective operation of any system and emission flows to define. Different fluid flow regimes were examined to show the impact of fluctuations on the development of the whole volume of the flow in specific environment. The obtained results rise the discussion on how these simulated flow fields are similar to real application ones. Experimental results have some discrepancies from simulation ones due to the models implemented to fluid flow analysis in initial stage, not developed one and due to the difficulties of models to cover transitional regimes. Recommendations are essential for energy harvesting systems in both, indoor and outdoor cases. Further investigations aim to be shifted to experimental analysis of flow under laboratory conditions using state-of-the-art techniques as flow visualization tool and later on to in situ situations that is complicated, cost and time consuming study.

Keywords: fluid flow, initial region, tube coefficient, distinct shape

Procedia PDF Downloads 337
15141 Unsteady MHD Thin Film Flow of a Third-Grade Fluid with Heat Transfer and Slip Boundary Condition Down an Inclined Plane

Authors: Y. M. Aiyesimi, G. T. Okedayo, O. W. Lawal

Abstract:

An investigation is made for unsteady MHD thin film flow of a third grade fluid down an inclined plane with slip boundary condition. The non-linear partial differential equation governing the flow and heat transfer are evaluated numerically using computer software called Maple to obtain velocity and temperature profile. The effect of slip and other various physical parameter on both velocity and temperature profile obtained are studied through several graphs.

Keywords: non-Newtonian fluid, MHD flow, third-grade fluid, Maple, slip boundary condition, heat transfer

Procedia PDF Downloads 455
15140 The Development and Evaluation of the Reliability and Validity of the Science Flow Experience Scale

Authors: Wen-Wei Chiang

Abstract:

In this study, the researcher developed a scale for use in measuring the degree to which high school students experience a state of flow. The researcher then verified its reliability and validity in an actual classroom setting. The ultimate objective was to identify feasible methods by which to promote the experience of a flow state among high school students engaged in the study of science. The nine indices identified in this study to assess the engagement of high school students focus primarily on the study of science-related topics; however, the principles on which they are based are applicable to a wide range of learning situations. Teachers must outline the goals of each lesson clearly and provide unambiguous feedback. They must also look for ways to make the lessons more fun and appealing.

Keywords: flow experience, positive psychology, questionnaire, science learning

Procedia PDF Downloads 117
15139 BodeACD: Buffer Overflow Vulnerabilities Detecting Based on Abstract Syntax Tree, Control Flow Graph, and Data Dependency Graph

Authors: Xinghang Lv, Tao Peng, Jia Chen, Junping Liu, Xinrong Hu, Ruhan He, Minghua Jiang, Wenli Cao

Abstract:

As one of the most dangerous vulnerabilities, effective detection of buffer overflow vulnerabilities is extremely necessary. Traditional detection methods are not accurate enough and consume more resources to meet complex and enormous code environment at present. In order to resolve the above problems, we propose the method for Buffer overflow detection based on Abstract syntax tree, Control flow graph, and Data dependency graph (BodeACD) in C/C++ programs with source code. Firstly, BodeACD constructs the function samples of buffer overflow that are available on Github, then represents them as code representation sequences, which fuse control flow, data dependency, and syntax structure of source code to reduce information loss during code representation. Finally, BodeACD learns vulnerability patterns for vulnerability detection through deep learning. The results of the experiments show that BodeACD has increased the precision and recall by 6.3% and 8.5% respectively compared with the latest methods, which can effectively improve vulnerability detection and reduce False-positive rate and False-negative rate.

Keywords: vulnerability detection, abstract syntax tree, control flow graph, data dependency graph, code representation, deep learning

Procedia PDF Downloads 170
15138 Countercurrent Flow Simulation of Gas-Solid System in a Purge Column Using Computational Fluid Dynamics Techniques

Authors: T. J. Jamaleddine

Abstract:

Purge columns or degasser vessels are widely used in the polyolefin process for removing trapped hydrocarbons and in-excess catalyst residues from the polymer particles. A uniform distribution of purged gases coupled with a plug-flow characteristic inside the column system is desirable to obtain optimum desorption characteristics of trapped hydrocarbon and catalyst residues. Computational Fluid Dynamics (CFD) approach is a promising tool for design optimization of these vessels. The success of this approach is profoundly dependent on the solution strategy and the choice of geometrical layout at the vessel outlet. Filling the column with solids and initially solving for the solids flow minimized numerical diffusion substantially. Adopting a cylindrical configuration at the vessel outlet resulted in less numerical instability and resembled the hydrodynamics flow of solids in the hopper segment reasonably well.

Keywords: CFD, degasser vessel, gas-solids flow, gas purging, purge column, species transport

Procedia PDF Downloads 129
15137 Applying Renowned Energy Simulation Engines to Neural Control System of Double Skin Façade

Authors: Zdravko Eškinja, Lovre Miljanić, Ognjen Kuljača

Abstract:

This paper is an overview of simulation tools used to model specific thermal dynamics that occurs while controlling double skin façade. Research has been conducted on simplified construction with single zone where one side is glazed. Heat flow and temperature responses are simulated in three different simulation tools: IDA-ICE, EnergyPlus and HAMBASE. The excitation of observed system, used in all simulations, was a temperature step of exterior environment. Air infiltration, insulation and other disturbances are excluded from this research. Although such isolated behaviour is not possible in reality, experiments are carried out to gain novel information about heat flow transients which are not observable under regular conditions. Results revealed new possibilities for adapting the parameters of the neural network regulator. Along numerical simulations, the same set-up has been also tested in a real-time experiment with a 1:18 scaled model and thermal chamber. The comparison analysis brings out interesting conclusion about simulation accuracy in this particular case.

Keywords: double skin façade, experimental tests, heat control, heat flow, simulated tests, simulation tools

Procedia PDF Downloads 231
15136 Extending the AOP Joinpoint Model for Memory and Type Safety

Authors: Amjad Nusayr

Abstract:

Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.

Keywords: aspect oriented programming, programming languages, software security, memory and type safety

Procedia PDF Downloads 127
15135 Numerical Investigation of Fluid Flow and Temperature Distribution on Power Transformer Windings Using Open Foam

Authors: Saeed Khandan Siar, Stefan Tenbohlen, Christian Breuer, Raphael Lebreton

Abstract:

The goal of this article is to investigate the detailed temperature distribution and the fluid flow of an oil cooled winding of a power transformer by means of computational fluid dynamics (CFD). The experimental setup consists of three passes of a zig-zag cooled disc type winding, in which losses are modeled by heating cartridges in each winding segment. A precise temperature sensor measures the temperature of each turn. The laboratory setup allows the exact control of the boundary conditions, e.g. the oil flow rate and the inlet temperature. Furthermore, a simulation model is solved using the open source computational fluid dynamics solver OpenFOAM and validated with the experimental results. The model utilizes the laminar and turbulent flow for the different mass flow rate of the oil. The good agreement of the simulation results with experimental measurements validates the model.

Keywords: CFD, conjugated heat transfer, power transformers, temperature distribution

Procedia PDF Downloads 422
15134 Braiding Channel Pattern Due to Variation of Discharge

Authors: Satish Kumar, Spandan Sahu, Sarjati Sahoo, K. K. Khatua

Abstract:

An experimental investigation has been carried out in a tilting flume of 2 m wide, 13 m long, and 0.3 m deep to study the effect of flow on the formation of braided channel pattern. Sediment flow is recirculated through the flume, which passes from the headgate to the sediment/water collecting tank through the tailgate. Further, without altering the geometry of the sand bed channel, the discharge is varied to study the effect of the formation of the braided pattern with time. Then the flow rate is varied to study the effect of flow on the formation of the braided pattern. Sediment transport rate is highly variable and was found to be a nonlinear function of flow rate, aspect ratio, longitudinal slope, and time. Total braided intensity (BIT) for each discharge case is found to be more than the active braided intensity (BIA). Both the parameters first increase and then decrease as the time progresses following a similar pattern for all the observed discharge cases. When the flow is increased, the movement of sediment also increases since the active braided intensity is found to adjust quickly. The measurement of velocity and boundary shear helps to study the erosion and sedimentation processes in the channel and formation of small meandering channels and then the braided channel for different discharge conditions of a sediment river. Due to regime properties of rivers, both total braided Intensity and active braided intensity become stable for a given channel and flow conditions. In the present case, the trend of the ratio of BIA to BIT is found to be asymptotic against the time with a value of 0.4. After the particular time elapses off the flow, new small channels are also found to be formed with changes in the sinuosity of the active channels, thus forming the braided network. This is due to the continuous erosion and sedimentation processes occurring for the flow process for the flow and sediment conditions.

Keywords: active braided intensity, bed load, sediment transport, shear stress, total braided intensity

Procedia PDF Downloads 131
15133 Behavior of Droplets in Microfluidic System with T-Junction

Authors: A. Guellati, F-M Lounis, N. Guemras, K. Daoud

Abstract:

Micro droplet formation is considered as a growing emerging area of research due to its wide-range application in chemistry as well as biology. The mechanism of micro droplet formation using two immiscible liquids running through a T-junction has been widely studied. We believe that the flow of these two immiscible phases can be of greater important factor that could have an impact on out-flow hydrodynamic behavior, the droplets generated and the size of the droplets. In this study, the type of the capillary tubes used also represents another important factor that can have an impact on the generation of micro droplets. The tygon capillary tubing with hydrophilic inner surface doesn't allow regular out-flows due to the fact that the continuous phase doesn't adhere to the wall of the capillary inner surface. Teflon capillary tubing, presents better wettability than tygon tubing, and allows to obtain steady and regular regimes of out-flow, and the micro droplets are homogeneoussize. The size of the droplets is directly dependent on the flows of the continuous and dispersed phases. Thus, as increasing the flow of the continuous phase, to flow of the dispersed phase stationary, the size of the drops decreases. Inversely, while increasing the flow of the dispersed phase, to flow of the continuous phase stationary, the size of the droplet increases.

Keywords: microfluidic system, micro droplets generation, t-junction, fluids engineering

Procedia PDF Downloads 342
15132 An Approach for Ensuring Data Flow in Freight Delivery and Management Systems

Authors: Aurelija Burinskienė, Dalė Dzemydienė, Arūnas Miliauskas

Abstract:

This research aims at developing the approach for more effective freight delivery and transportation process management. The road congestions and the identification of causes are important, as well as the context information recognition and management. The measure of many parameters during the transportation period and proper control of driver work became the problem. The number of vehicles per time unit passing at a given time and point for drivers can be evaluated in some situations. The collection of data is mainly used to establish new trips. The flow of the data is more complex in urban areas. Herein, the movement of freight is reported in detail, including the information on street level. When traffic density is extremely high in congestion cases, and the traffic speed is incredibly low, data transmission reaches the peak. Different data sets are generated, which depend on the type of freight delivery network. There are three types of networks: long-distance delivery networks, last-mile delivery networks and mode-based delivery networks; the last one includes different modes, in particular, railways and other networks. When freight delivery is switched from one type of the above-stated network to another, more data could be included for reporting purposes and vice versa. In this case, a significant amount of these data is used for control operations, and the problem requires an integrated methodological approach. The paper presents an approach for providing e-services for drivers by including the assessment of the multi-component infrastructure needed for delivery of freights following the network type. The construction of such a methodology is required to evaluate data flow conditions and overloads, and to minimize the time gaps in data reporting. The results obtained show the possibilities of the proposing methodological approach to support the management and decision-making processes with functionality of incorporating networking specifics, by helping to minimize the overloads in data reporting.

Keywords: transportation networks, freight delivery, data flow, monitoring, e-services

Procedia PDF Downloads 125
15131 Numerical Studies on Thrust Vectoring Using Shock-Induced Self Impinging Secondary Jets

Authors: S. Vignesh, N. Vishnu, S. Vigneshwaran, M. Vishnu Anand, Dinesh Kumar Babu, V. R. Sanal Kumar

Abstract:

The study of the primary flow velocity and the self impinging secondary jet flow mixing is important from both the fundamental research and the application point of view. Real industrial configurations are more complex than simple shear layers present in idealized numerical thrust-vectoring models due to the presence of combustion, swirl and confinement. Predicting the flow features of self impinging secondary jets in a supersonic primary flow is complex owing to the fact that there are a large number of parameters involved. Earlier studies have been highlighted several key features of self impinging jets, but an extensive characterization in terms of jet interaction between supersonic flow and self impinging secondary sonic jets is still an active research topic. In this paper numerical studies have been carried out using a validated two-dimensional k-omega standard turbulence model for the design optimization of a thrust vector control system using shock induced self impinging secondary flow sonic jets using non-reacting flows. Efforts have been taken for examining the flow features of TVC system with various secondary jets at different divergent locations and jet impinging angles with the same inlet jet pressure and mass flow ratio. The results from the parametric studies reveal that in addition to the primary to the secondary mass flow ratio the characteristics of the self impinging secondary jets having bearing on an efficient thrust vectoring. We concluded that the self impinging secondary jet nozzles are better than single jet nozzle with the same secondary mass flow rate owing to the fact fixing of the self impinging secondary jet nozzles with proper jet angle could facilitate better thrust vectoring for any supersonic aerospace vehicle.

Keywords: fluidic thrust vectoring, rocket steering, supersonic to sonic jet interaction, TVC in aerospace vehicles

Procedia PDF Downloads 588
15130 Islamic Research Methodology (I-Restmo): Eight Series Research Module with Islamic Value Concept

Authors: Noraizah Abu Bakar, Norhayati Alais, Nurdiana Azizan, Fatimah Alwi, Muhammad Zaky Razaly

Abstract:

This is a concise research module with the Islamic values concept proposed to a group of researches, potential researchers, PhD and Master Scholars to prepare themselves for their studies. The intention of designing this module is to help and guide Malaysian citizens to undergone their postgraduate’s studies. This is aligned with the 10th Malaysian plan- MyBrain 15. MyBrain 15 is a financial aid to Malaysian citizens to pursue PhD and Master programs. The program becomes one of Ministry of Education Strategic Plan to ensure by year 2013, there will be 60,000 PhD scholars in Malaysia. This module is suitable for the social science researchers; however it can be useful tool for science technology researchers such as Engineering and Information Technology disciplines too. The module consists of eight (8) series that provides a proper flow of information in doing research with the Islamic Value Application provided in each of the series. This module is designed to produce future researchers with a comprehensive knowledge of humankind and the hereafter. The uniqueness about this research module is designed based on Islamic values concept. Researchers were able to understand the proper research process and simultaneously be able to open their minds to understand Islam more closely. Application of Islamic values in each series could trigger a broader idea for researchers to examine in greater depth of knowledge related to humanities.

Keywords: Eight Series Research Module, Islamic Values concept, Teaching Methodology, Flow of Information, Epistemology of research

Procedia PDF Downloads 398
15129 Diabatic Flow of Sub-Cooled R-600a Inside a Capillary Tube: Concentric Configuration

Authors: Ravi Kumar, Santhosh Kumar Dubba

Abstract:

This paper presents an experimental study of a diabatic flow of R-600a through a concentric configured capillary tube suction line heat exchanger. The details of experimental facility for testing the diabatic capillary tube with different inlet sub-cooling degree and pressure are discussed. The effect of coil diameter, capillary length, capillary tube diameter, sub-cooling degree and inlet pressure on mass flow rate are presented. The degree of sub-cooling at the inlet of capillary tube is varied from 3-20°C. The refrigerant mass flow rate is scattered up with rising of pressure. A semi-empirical correlation to predict the mass flow rate of R-600a flowing through a diabatic capillary tube is proposed for sub-cooled inlet conditions. The proposed correlation predicts measured data with an error band of ±20 percent.

Keywords: diabatic, capillary tube, concentric, R-600a

Procedia PDF Downloads 204
15128 Active Power Flow Control Using a TCSC Based Backstepping Controller in Multimachine Power System

Authors: Naimi Abdelhamid, Othmane Abdelkhalek

Abstract:

With the current rise in the demand of electrical energy, present-day power systems which are large and complex, will continue to grow in both size and complexity. Flexible AC Transmission System (FACTS) controllers provide new facilities, both in steady state power flow control and dynamic stability control. Thyristor Controlled Series Capacitor (TCSC) is one of FACTS equipment, which is used for power flow control of active power in electric power system and for increase of capacities of transmission lines. In this paper, a Backstepping Power Flow Controller (BPFC) for TCSC in multimachine power system is developed and tested. The simulation results show that the TCSC proposed controller is capable of controlling the transmitted active power and improving the transient stability when compared with conventional PI Power Flow Controller (PIPFC).

Keywords: FACTS, thyristor controlled series capacitor (TCSC), backstepping, BPFC, PIPFC

Procedia PDF Downloads 529
15127 Oscillatory Electroosmotic Flow in a Microchannel with Slippage at the Walls and Asymmetric Wall Zeta Potentials

Authors: Oscar Bautista, Jose Arcos

Abstract:

In this work, we conduct a theoretical analysis of an oscillatory electroosmotic flow in a parallel-plate microchannel taking into account slippage at the microchannel walls. The governing equations given by the Poisson-Boltzmann (with the Debye-Huckel approximation) and momentum equations are nondimensionalized from which four dimensionless parameters appear; a Reynolds angular number, the ratio between the zeta potentials of the microchannel walls, the electrokinetic parameter and the dimensionless slip length which measures the competition between the Navier slip length and the half height microchannel. The principal results indicate that the slippage has a strong influence on the magnitude of the oscillatory electroosmotic flow increasing the velocity magnitude up to 50% for the numerical values used in this work.

Keywords: electroosmotic flows, oscillatory flow, slippage, microchannel

Procedia PDF Downloads 224
15126 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 320