Search results for: transient ischaemic attack
722 Simulation of Surge Protection for a Direct Current Circuit
Authors: Pedro Luis Ferrer Penalver, Edmundo da Silva Braga
Abstract:
In this paper, the performance of a simple surge protection for a direct current circuit was simulated. The protection circuit was developed from modified electric macro models of a gas discharge tube and a transient voltage suppressor diode. Moreover, a combination wave generator circuit was used as source of energy surges. The simulations showed that the circuit presented ensures immunity corresponding with test level IV of the IEC 61000-4-5:2014 international standard. The developed circuit can be modified to meet the requirements of any other equipment to be protected. Similarly, the parameters of the combination wave generator can be changed to provide different surge amplitudes.Keywords: combination wave generator, IEC 61000-4-5, Pspice simulation, surge protection
Procedia PDF Downloads 327721 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast
Authors: Ayubi Wirara, Ardya Suryadinata
Abstract:
Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem
Procedia PDF Downloads 341720 A CM-Based Model for 802.11 Networks Security Policies Enforcement
Authors: Karl Mabiala Dondia, Jing Ma
Abstract:
In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy
Procedia PDF Downloads 380719 Starting Torque Study of Darrieus Wind Turbine
Authors: M. Douak, Z. Aouachria
Abstract:
The aim of our study is to project an optimized wind turbine of Darrieus type. This type of wind turbine is characterized by a low starting torque in comparison with the Savonius rotor allowing them to operate for a period greater than wind speed. This led us to reconsider the Darrieus rotor to optimize a design which will increase its starting torque. The study of a system of monitoring and control of the angle of attack of blade profile, which allows an auto start to wind speeds as low as possible is presented for the straight blade of Darrieus turbine. The study continues to extend to other configurations namely those of parabolic type.Keywords: Darrieus turbine, pitch angle, self stating, wind energy
Procedia PDF Downloads 348718 The Existence of Beauveria bassiana in the Third Generation of Corn Seedling
Authors: Itji Diana Daud, Nuniek Widiayani
Abstract:
The fungus Beauveria bassiana can be endophytic in maize. The fungus was recovered in culture from stems, leaves and roots after a month planting. This phenomenon was shown until the third generation of the corn. The result from laboratory shows that B. bassiana appear in F1, F2 and F3 in order 70, 80 and 90% in the roots, 80% in the stems in all generation, 90, 80 and 70% in leaves. In CFU’s ml-1 of B. bassiana in corn seed, show F1 was 8.9 x 106, F2 was 8.1 x 106 and F3 was 7.8 x 106. The research showed that B. Bassiana as endophyte still remain to the third generation. Innovation to the corn seed which is endophyte seed is essential to protect from the attack of corn borer and to avoid the usage of insecticide.Keywords: endophytic, recovered, third generation, Beauveria bassiana
Procedia PDF Downloads 283717 Design of Chaos Algorithm Based Optimal PID Controller for SVC
Authors: Saeid Jalilzadeh
Abstract:
SVC is one of the most significant devices in FACTS technology which is used in parallel compensation, enhancing the transient stability, limiting the low frequency oscillations and etc. designing a proper controller is effective in operation of svc. In this paper the equations that describe the proposed system have been linearized and then the optimum PID controller has been designed for svc which its optimal coefficients have been earned by chaos algorithm. Quick damping of oscillations of generator is the aim of designing of optimum PID controller for svc whether the input power of generator has been changed suddenly. The system with proposed controller has been simulated for a special disturbance and the dynamic responses of generator have been presented. The simulation results showed that a system composed with proposed controller has suitable operation in fast damping of oscillations of generator.Keywords: chaos, PID controller, SVC, frequency oscillation
Procedia PDF Downloads 441716 Modeling SET Effect on Charge Pump Phase Locked Loop
Authors: Varsha Prasad, S. Sandya
Abstract:
Cosmic Ray effects in microelectronics such as single event effect (SET) and total dose ionization (TID) have been of major concern in space electronics since 1970. Advanced CMOS technologies have demonstrated reduced sensitivity to TID effect. However, charge pump Phase Locked Loop is very much vulnerable to single event transient effect. This paper presents an SET analysis model, where the SET is modeled as a double exponential pulse. The time domain analysis reveals that the settling time of the voltage controlled oscillator (VCO) depends on the SET pulse strength, setting the time constant and the damping factor. The analysis of the proposed SET analysis model is confirmed by the simulation results.Keywords: charge pump, phase locked loop, SET, VCO
Procedia PDF Downloads 433715 Secure Watermarking not at the Cost of Low Robustness
Authors: Jian Cao
Abstract:
This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)
Procedia PDF Downloads 385714 Investigations on the Influence of Optimized Charge Air Cooling for a Diesel Passenger Car
Authors: Christian Doppler, Gernot Hirschl, Gerhard Zsiga
Abstract:
Starting from 2020, an EU-wide CO2-limitation of 95g/km is scheduled for the average of an OEMs passenger car fleet. Considering that, further measures of optimization on the diesel cycle will be necessary in order to reduce fuel consumption and emissions while keeping performance values adequate at the least. The present article deals with charge air cooling (CAC) on the basis of a diesel passenger car model in a 0D/1D-working process calculation environment. The considered engine is a 2.4 litre EURO VI diesel engine with variable geometry turbocharger (VGT) and low-pressure exhaust gas recirculation (LP EGR). The object of study was the impact of charge air cooling on the engine working process at constant boundary conditions which could have been conducted with an available and validated engine model in AVL BOOST. Part load was realized with constant power and NOx-emissions, whereas full load was accomplished with a lambda control in order to obtain maximum engine performance. The informative results were used to implement a simulation model in Matlab/Simulink which is further integrated into a full vehicle simulation environment via coupling with ICOS (Independent Co-Simulation Platform). Next, the dynamic engine behavior was validated and modified with load steps taken from the engine test bed. Due to the modular setup in the Co-Simulation, different CAC-models have been simulated quickly with their different influences on the working process. In doing so, a new cooler variation isn’t needed to be reproduced and implemented into the primary simulation model environment, but is implemented quickly and easily as an independent component into the simulation entity. By means of the association of the engine model, longitudinal dynamics vehicle model and different CAC models (air/air & water/air variants) in both steady state and transient operational modes, statements are gained regarding fuel consumption, NOx-emissions and power behavior. The fact that there is no more need of a complex engine model is very advantageous for the overall simulation volume. Beside of the simulation with the mentioned demonstrator engine, there have also been conducted several experimental investigations on the engine test bench. Here the comparison of a standard CAC with an intake-manifold-integrated CAC was executed in particular. Simulative as well as experimental tests showed benefits for the water/air CAC variant (on test bed especially the intake manifold integrated variant). The benefits are illustrated by a reduced pressure loss and a gain in air efficiency and CAC efficiency, those who all lead to minimized emission and fuel consumption for stationary and transient operation.Keywords: air/water-charge air cooler, co-simulation, diesel working process, EURO VI fuel consumption
Procedia PDF Downloads 269713 The Use of Secondary Crystallization in Cement-Based Composites
Authors: Nikol Žižková, Šárka Keprdová, Rostislav Drochytka
Abstract:
The paper focuses on the study of the properties of cement-based composites produced using secondary crystallization (crystalline additive). In this study, cement mortar made with secondary crystallization was exposed to an aggressive environment and the influence of secondary crystallization on the degradation of the cementitious composite was investigated. The results indicate that the crystalline additive contributed to increasing the resistance of the cement-based composite to the attack of the selected environments (sodium sulphate solution and ammonium chloride solution).Keywords: secondary crystallization, cement-based composites, durability, degradation of the cementitious composite
Procedia PDF Downloads 399712 Characterization of Volatiles Botrytis cinerea in Blueberry Using Solid Phase Micro Extraction, Gas Chromatography Mass Spectrometry
Authors: Ahmed Auda, Manjree Agarwala, Giles Hardya, Yonglin Rena
Abstract:
Botrytis cinerea is a major pest for many plants. It can attack a wide range of plant parts. It can attack buds, flowers, and leaves, stems, and fruit. However, B. cinerea can be mixed with other diseases that cause the same damage. There are many species of botrytis and more than one different strains of each. Botrytis might infect the foliage of nursery stock stored through winter in damp conditions. There are no known resistant plants. Botrytis must have nutrients or food source before it infests the plant. Nutrients leaking from wounded plant parts or dying tissue like old flower petals give the required nutrients. From this food, the fungus becomes more attackers and invades healthy tissue. Dark to light brown rot forms in the ill tissue. High humidity conditions support the growth of this fungus. However, we suppose that selection pressure can act on the morphological and neurophysiologic filter properties of the receiver and on both the biochemical and the physiological regulation of the signal. Communication is implied when signal and receiver evolves toward more and more specific matching, culminating. In other hand, receivers respond to portions of a body odor bouquet which is released to the environment not as an (intentional) signal but as an unavoidable consequence of metabolic activity or tissue damage. Each year Botrytis species can cause considerable economic losses to plant crops. Even with the application of strict quarantine and control measures, these fungi can still find their way into crops and cause the imposition of onerous restrictions on exports. Blueberry fruit mould caused by a fungal infection usually results in major losses during post-harvest storage. Therefore, the management of infection in early stages of disease development is necessary to minimize losses. The overall purpose of this study will develop sensitive, cheap, quick and robust diagnostic techniques for the detection of B. cinerea in blueberry. The specific aim was designed to investigate the performance of volatile organic compounds (VOCs) in the detection and discrimination of blueberry fruits infected by fungal pathogens with an emphasis on Botrytis in the early storage stage of post-harvest.Keywords: botrytis cinerea, blueberry, GC/MS, VOCs
Procedia PDF Downloads 241711 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks
Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad
Abstract:
In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.Keywords: network security, intrusion detection, honeypot, snort, nmap
Procedia PDF Downloads 567710 Automatic Intelligent Analysis of Malware Behaviour
Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato
Abstract:
In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.Keywords: malware behaviour, modelling, parsing, search, pattern matching
Procedia PDF Downloads 332709 Thermal Conductivity of Al2O3/Water-Based Nanofluids: Revisiting the Influences of pH and Surfactant
Authors: Nizar Bouguerra, Ahmed Khabou, Sébastien Poncet, Saïd Elkoun
Abstract:
The present work focuses on the preparation and the stabilization of Al2O3-water based nanofluids. Though they have been widely considered in the past, to the best of our knowledge, there is no clear consensus about a proper way to prepare and stabilize them by the appropriate surfactant. In this paper, a careful experimental investigation is performed to quantify the combined influence of pH and the surfactant on the stability of Al2O3-water based nanofluids. Two volume concentrations of nanoparticles and three nanoparticle sizes have been considered. The good preparation and stability of these nanofluids are evaluated through thermal conductivity measurements. The results show that the optimum value for the thermal conductivity is obtained mainly by controlling the pH of the mixture and surfactants are not necessary to stabilize the solution.Keywords: nanofluid, thermal conductivity, pH, transient hot wire, surfactant, Al2O3, stability, dispersion, preparation
Procedia PDF Downloads 356708 Design a Network for Implementation a Hospital Information System
Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇
Abstract:
A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network
Procedia PDF Downloads 440707 Study of Transport in Electronic Devices with Stochastic Monte Carlo Method: Modeling and Simulation along with Submicron Gate (Lg=0.5um)
Authors: N. Massoum, B. Bouazza
Abstract:
In this paper, we have developed a numerical simulation model to describe the electrical properties of GaInP MESFET with submicron gate (Lg = 0.5 µm). This model takes into account the three-dimensional (3D) distribution of the load in the short channel and the law effect of mobility as a function of electric field. Simulation software based on a stochastic method such as Monte Carlo has been established. The results are discussed and compared with those of the experiment. The result suggests experimentally that, in a very small gate length in our devices (smaller than 40 nm), short-channel tunneling explains the degradation of transistor performance, which was previously enhanced by velocity overshoot.Keywords: Monte Carlo simulation, transient electron transport, MESFET device, simulation software
Procedia PDF Downloads 513706 The SBO/LOCA Analysis of TRACE/SNAP for Kuosheng Nuclear Power Plant
Authors: J. R. Wang, H. T. Lin, Y. Chiang, H. C. Chen, C. Shih
Abstract:
Kuosheng Nuclear Power Plant (NPP) is located on the northern coast of Taiwan. Its nuclear steam supply system is a type of BWR/6 designed and built by General Electric on a twin unit concept. First, the methodology of Kuosheng NPP SPU (Stretch Power Uprate) safety analysis TRACE/SNAP model was developed in this research. Then, in order to estimate the safety of Kuosheng NPP under the more severe condition, the SBO (Station Blackout) + LOCA (Loss-of-Coolant Accident) transient analysis of Kuosheng NPP SPU TRACE/SNAP model was performed. Besides, the animation model of Kuosheng NPP was presented using the animation function of SNAP with TRACE/SNAP analysis results.Keywords: TRACE, safety analysis, BWR/6, severe accident
Procedia PDF Downloads 714705 Three-Dimensional Numerical Model of an Earth Air Heat Exchanger under a Constrained Urban Environment in India: Modeling and Validation
Authors: V. Rangarajan, Priyanka Kaushal
Abstract:
This study investigates the effectiveness of a typical Earth Air Heat Exchanger (EATHE) for energy efficient space cooling in an urban environment typified by space and soil-related constraints that preclude an optimal design. It involves the development of a three-dimensional numerical transient model that is validated by measurements at a live site in India. It is found that the model accurately predicts the soil temperatures at various depths as well as the EATHE outlet air temperature. The study shows that such an EATHE, even when designed under constraints, does provide effective space cooling especially during the hot months of the year.Keywords: earth air heat exchanger (EATHE), India, MATLAB, model, simulation
Procedia PDF Downloads 322704 A Rare Case of Prolonged Pressure Rise Following Selective Laser Trabeculoplasty
Authors: Aneesha Fonseca, Arij Daas, Muhammed Abdulkader
Abstract:
Transient intraocular pressure (IOP) rise is a common occurrence after glaucoma laser procedures. However, this pressure spike usually lasts only a few days. We describe a case of a 60-year-old Caucasian gentleman who underwent selective laser trabeculoplasty (SLT) in both eyes for ocular hypertension previously treated with Bimatoprost and Timolol and developed a sustained raised IOP. His IOP rose from 34 and 33 mmHg pre-laser to 48 and 42 mmHg after SLT in the right and left eye, respectively. Even after maximum medical therapy (Bimatoprost, Timolol, Brinzolamide Apraclonidine, and oral Acetozolamide), his IOP remained at 32 and 28mmHg. A provisional diagnosis of trabeculitis was made, and topical Ketorolac was commenced in addition to the IOP-lowering medications. Within a week, his IOP came down to 21 and 18mmHg in the right and left eye, respectively.Keywords: complications, selective laser trabeculoplasty, sustained pressure rise, trabeculitis
Procedia PDF Downloads 100703 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 268702 Pioneer Synthesis and Characterization of Boron Containing Hard Materials
Authors: Gülşah Çelik Gül, Figen Kurtuluş
Abstract:
The first laboratory synthesis of hard materials such as diamond proceeded to attack of developing materials with high hardness to compete diamond. Boron rich solids are good candidates owing to their short interatomic bond lengths and strong covalent character. Boron containing hard material was synthesized by modified-microwave method under nitrogen atmosphere by using a fuel (glycine or urea), amorphous boron and/or boric acid in appropriate molar ratio. Characterizations were done by x-ray diffraction (XRD), fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy/energy dispersive analyze (SEM/EDS), thermo gravimetric/differantial thermal analysis (TG/DTA).Keywords: boron containing materials, hard materials, microwave synthesis, powder X-ray diffraction
Procedia PDF Downloads 593701 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey
Authors: Maleh Yassine, Ezzati Abdellah
Abstract:
Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS
Procedia PDF Downloads 385700 Identification of Information War in Lithuania
Authors: Vitalijus Leibenka
Abstract:
After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia
Procedia PDF Downloads 62699 Ziegler Nichols Based Integral Proportional Controller for Superheated Steam Temperature Control System
Authors: Amil Daraz, Suheel Abdullah Malik, Tahir Saleem, Sajid Ali Bhati
Abstract:
In this paper, Integral Proportional (I-P) controller is employed for superheated steam temperature control system. The Ziegler-Nichols (Z-N) method is used for the tuning of I-P controller. The performance analysis of Z-N based I-P controller is assessed on superheated steam system of 500-MW boiler. The comparison of transient response parameters such as rise time, settling time, and overshoot is made with Z-N based Proportional Integral (PI) controller. It is observed from the results that Z-N based I-P controller completely eliminates the overshoot in the output response.Keywords: superheated steam, process reaction curve, PI and I-P controller, Ziegler-Nichols Tuning
Procedia PDF Downloads 331698 The Analysis of TRACE/PARCS in the Simulation of Ultimate Response Guideline for Lungmen ABWR
Authors: J. R. Wang, W. Y. Li, H. T. Lin, B. H. Lee, C. Shih, S. W. Chen
Abstract:
In this research, the TRACE/PARCS model of Lungmen ABWR has been developed for verification of ultimate response guideline (URG) efficiency. This ultimate measure was named as DIVing plan, abbreviated from system depressurization, water injection and containment venting. The simulation initial condition is 100% rated power/100% rated core flow. This research focuses on the estimation of the time when the fuel might be damaged with no water injection by using TRACE/PARCS first. Then, the effect of the reactor core isolation system (RCIC), control depressurization and ac-independent water addition system (ACIWA), which can provide the injection with 950 gpm are also estimated for the station blackout (SBO) transient.Keywords: ABWR, TRACE, safety analysis, PARCS
Procedia PDF Downloads 455697 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection
Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi
Abstract:
In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection
Procedia PDF Downloads 228696 Methods for Mitigating Corrosion Caused by Biogenic Sulfuric Acid in Sewerage Systems: State of the Art Review
Authors: M. Cortés, E. Vera, M. Avella
Abstract:
Corrosion is an imminent process in nature, which affects all types of materials. In sewerage systems, the corrosion process caused by microorganisms, also known as biogenic sulfuric acid attack, has been studied. This affects the structural integrity of the concrete drainage pipes and the sewage treatment plants. This article is a review of research which focuses on the study of how to reduce the production of hydrogen sulfide, how to improve the resistance of concrete through the use of additives and the implementation of antimicrobial techniques to reduce bacterial growth.Keywords: bactericides, biogenic sulfuric acid, corrosion, concrete, hydrogen sulphide, nano materials, zeolites
Procedia PDF Downloads 444695 Phone Number Spoofing Attack in VoLTE 4G
Authors: Joo-Hyung Oh
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 432694 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform
Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy
Abstract:
In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack
Procedia PDF Downloads 394693 Numerical Analysis of Water Hammer in a Viscoelastic Pipe System Considering Fluid Structure Interaction
Authors: N. Tavakoli Shirazi
Abstract:
This study investigates the effects of pipe-wall viscoelasticity on water hammer pressures. Tests have been conducted in a reservoir-pipe-valve system configured of a main viscoelastic pipeline and two short steel pipes placed upstream and downstream of the main pipe. Rapid closure of a manually operated valve at the downstream end generates water hammer. Experimental measurements at several positions along the pipeline have been collected from the papers. Computer simulations of the experiment have been performed and the results of runs with various options affecting the water hammer are provided and discussed. It is shown that the incorporation of viscoelastic pipe wall mechanical behavior in the hydraulic transient model contributes to a favorable fitting between numerical results and observed data.Keywords: pipe system, PVC pipe, viscoelasticity, water hammer
Procedia PDF Downloads 466