Search results for: transient ischemic attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1206

Search results for: transient ischemic attack

666 Solar Architecture of Low-Energy Buildings for Industrial Applications

Authors: P. Brinks, O. Kornadt, R. Oly

Abstract:

This research focuses on the optimization of glazed surfaces and the assessment of possible solar gains in industrial buildings. Existing window rating methods for single windows were evaluated and a new method for a simple analysis of energy gains and losses by single windows was introduced. Furthermore extensive transient building simulations were carried out to appraise the performance of low cost polycarbonate multi-cell sheets in interaction with typical buildings for industrial applications. Mainly, energy-saving potential was determined by optimizing the orientation and area of such glazing systems in dependency on their thermal qualities. Moreover the impact on critical aspects such as summer overheating and daylight illumination was considered to ensure the user comfort and avoid additional energy demand for lighting or cooling. Hereby the simulated heating demand could be reduced by up to 1/3 compared to traditional architecture of industrial halls using mainly skylights.

Keywords: solar architecture, Passive Solar Building Design, glazing, Low-Energy Buildings, industrial buildings

Procedia PDF Downloads 217
665 Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes

Authors: Bruno Vilić Belina, Jadranko Matuško

Abstract:

The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment.

Keywords: control systems, cyber attacks, resiliency, robustness, tube based model predictive control

Procedia PDF Downloads 46
664 Influence of Surface Fault Rupture on Dynamic Behavior of Cantilever Retaining Wall: A Numerical Study

Authors: Partha Sarathi Nayek, Abhiparna Dasgupta, Maheshreddy Gade

Abstract:

Earth retaining structure plays a vital role in stabilizing unstable road cuts and slopes in the mountainous region. The retaining structures located in seismically active regions like the Himalayas may experience moderate to severe earthquakes. An earthquake produces two kinds of ground motion: permanent quasi-static displacement (fault rapture) on the fault rupture plane and transient vibration, traveling a long distance. There has been extensive research work to understand the dynamic behavior of retaining structures subjected to transient ground motions. However, understanding the effect caused by fault rapture phenomena on retaining structures is limited. The presence of shallow crustal active faults and natural slopes in the Himalayan region further highlights the need to study the response of retaining structures subjected to fault rupture phenomena. In this paper, an attempt has been made to understand the dynamic response of the cantilever retaining wall subjected to surface fault rupture. For this purpose, a 2D finite element model consists of a retaining wall, backfill and foundation have been developed using Abaqus 6.14 software. The backfill and foundation material are modeled as per the Mohr-Coulomb failure criterion, and the wall is modeled as linear elastic. In this present study, the interaction between backfill and wall is modeled as ‘surface-surface contact.’ The entire simulation process is divided into three steps, i.e., the initial step, gravity load step, fault rupture step. The interaction property between wall and soil and fixed boundary condition to all the boundary elements are applied in the initial step. In the next step, gravity load is applied, and the boundary elements are allowed to move in the vertical direction to incorporate the settlement of soil due to the gravity load. In the final step, surface fault rupture has been applied to the wall-backfill system. For this purpose, the foundation is divided into two blocks, namely, the hanging wall block and the footwall block. A finite fault rupture displacement is applied to the hanging wall part while the footwall bottom boundary is kept as fixed. Initially, a numerical analysis is performed considering the reverse fault mechanism with a dip angle of 45°. The simulated result is presented in terms of contour maps of permanent displacements of the wall-backfill system. These maps highlighted that surface fault rupture can induce permanent displacement in both horizontal and vertical directions, which can significantly influence the dynamic behavior of the wall-backfill system. Further, the influence of fault mechanism, dip angle, and surface fault rupture position is also investigated in this work.

Keywords: surface fault rupture, retaining wall, dynamic response, finite element analysis

Procedia PDF Downloads 92
663 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 133
662 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution

Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Abstract:

Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.

Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution

Procedia PDF Downloads 129
661 Contribution to the Study of the Use of Pesticides in the Regions of Tizi Ouzou

Authors: Ramdane Gaouir

Abstract:

Farmers in the two regions of Tizi-Ouzou, DBK and Tadmait, face different crop pests, namely, fungal diseases, insect attack as well as different types of deficiencies. To fight against all these threats, they resort to the use of a wide variety of chemicals. Our survey carried out in these two regions, aims to identify the different types of pesticides used, the method of management of the packaging generated by these phytosanitary products as well as the evaluation of the effect of these products on the farmers' health and the environment. The results obtained highlighted the use of two types of pesticides with a very wide application, namely fungicides and insecticides. The two most widely identified chemical families are neonicotoids and organophosphates, which are among the most toxic and persistent pesticides in the environment. The management method of packaging and the application of products by spraying reflect the lack of training and the unawareness of farmers vis-à-vis the impact of pesticides on their health and on the environment.

Keywords: farmers, crops, pesticides, fungicides, neonicotinoids, organochlorines

Procedia PDF Downloads 64
660 Sudden Death in Young Patients: A Study of 312 Autopsy Cases

Authors: N. Haj Salem, M. Belhadj, S. Ben Jomâa, S. Saadi, R. Dhouieb, A. Chadly

Abstract:

Introduction: Sudden death in young is seen as a dramatic phenomenon requiring knowledge of its impact and determining their causes. Aim: We aim to study the epidemiological characteristics of sudden death in young, and to discuss the mechanism and the importance of autopsy in these situations. Material and methods: We performed a retrospective cohort study using autopsy data from the department of forensic medicine at the University Hospital of Fattouma Bourguiba, Monastir-Tunisia. A review of all autopsies performed during 23 years was done. In each case, clinical information and circumstances of death were obtained. We have included all sudden death in persons aged between 1 year and 35 years for the male and from one year to 45 years for female. We collected 312 cases of sudden death during the studied period. The collected data were processed using SPSS 20. The significance level was set at 0.05. Results: Thirty-two cases of cardiac ischemic sudden death have been collected. Myocardial infarction was the second cause of sudden death in young patients. There was a male predominance. The most affected subjects were aged between 25-45 years. The death occurred more frequently at rest. Coronary artery disease has been discovered in twenty-four cases (75%). A severe coronary artery disease was observed in two children with medical history of familial hypercholesterolemia. The myocardial infarction occurred in healthy coronary arteries in eight cases. An anomalous course of coronary arteries, in particular, myocardial bridging, was found in eight cases (25%). Toxicological screening was negative in all cases. Second cause of death was hypertrophic cardiomyopathy. Neurological and respiratory causes of death were implicated respectively in 10% and 15%. Conclusion: Identifying epidemiological characteristics of sudden death in this population is important for guiding approaches to prevention that must be based on dietary hygienic measures and the control of cardiovascular risk factors.

Keywords: autopsy, cardiac death, sudden death, young

Procedia PDF Downloads 219
659 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat

Authors: Basman Elhadidi, Islam Elqatary, Osama Mohamady, Hesham Othman

Abstract:

An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.

Keywords: active slat, flow control, DU96-W180 airfoil, flow streams

Procedia PDF Downloads 355
658 Numerical Investigation of Thermal Energy Storage Panel Using Nanoparticle Enhanced Phase Change Material for Micro-Satellites

Authors: Jelvin Tom Sebastian, Vinod Yeldho Baby

Abstract:

In space, electronic devices are constantly attacked with radiation, which causes certain parts to fail or behave in unpredictable ways. To advance the thermal controllability for microsatellites, we need a new approach and thermal control system that is smaller than that on conventional satellites and that demand no electric power. Heat exchange inside the microsatellites is not that easy as conventional satellites due to the smaller size. With slight mass gain and no electric power, accommodating heat using phase change materials (PCMs) is a strong candidate for solving micro satellites' thermal difficulty. In other words, PCMs can absorb or produce heat in the form of latent heat, changing their phase and minimalizing the temperature fluctuation around the phase change point. The main restriction for these systems is thermal conductivity weakness of common PCMs. As PCM is having low thermal conductivity, it increases the melting and solidification time, which is not suitable for specific application like electronic cooling. In order to increase the thermal conductivity nanoparticles are introduced. Adding the nanoparticles in base PCM increases the thermal conductivity. Increase in weight concentration increases the thermal conductivity. This paper numerically investigates the thermal energy storage panel with nanoparticle enhanced phase change material. Silver nanostructure have increased the thermal properties of the base PCM, eicosane. Different weight concentration (1, 2, 3.5, 5, 6.5, 8, 10%) of silver enhanced phase change material was considered. Both steady state and transient analysis was performed to compare the characteristics of nanoparticle enhanced phase material at different heat loads. Results showed that in steady state, the temperature near the front panel reduced and temperature on NePCM panel increased as the weight concentration increased. With the increase in thermal conductivity more heat was absorbed into the NePCM panel. In transient analysis, it was found that the effect of nanoparticle concentration on maximum temperature of the system was reduced as the melting point of the material reduced with increase in weight concentration. But for the heat load of maximum 20W, the model with NePCM did not attain the melting point temperature. Therefore it showed that the model with NePCM is capable of holding more heat load. In order to study the heat load capacity double the load is given, maximum of 40W was given as first half of the cycle and the other is given constant OW. Higher temperature was obtained comparing the other heat load. The panel maintained a constant temperature for a long duration according to the NePCM melting point. In both the analysis, the uniformity of temperature of the TESP was shown. Using Ag-NePCM it allows maintaining a constant peak temperature near the melting point. Therefore, by altering the weight concentration of the Ag-NePCM it is possible to create an optimum operating temperature required for the effective working of the electronics components.

Keywords: carbon-fiber-reinforced polymer, micro/nano-satellite, nanoparticle phase change material, thermal energy storage

Procedia PDF Downloads 189
657 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 146
656 Earth Tremors in Nigeria: A Precursor to Major Disaster?

Authors: Oluseyi Adunola Bamisaiye

Abstract:

The frequency of occurrence of earth tremor in Nigeria has increased tremendously in recent years. Slow earthquakes/ tremor have preceded some large earthquakes in some other regions of the world and the Nigerian case may not be an exception. Timely and careful investigation of these tremors may reveal their relation to large earthquakes and provides important clues to constrain the slip rates on tectonic faults. Thus making it imperative to keep under watch and also study carefully the tectonically active terrains within the country, in order to adequately forecast, prescribe mitigation measures and in order to avoid a major disaster. This report provides new evidence of a slow slip transient in a strongly locked seismogenic zone of the Okemesi fold belt. The aim of this research is to investigate the different methods of earth tremor monitoring using fault slip analysis and mapping of Okemesi hills, which has been the most recent epicenter to most of the recent tremors.

Keywords: earth tremor, fault slip, intraplate activities, plate tectonics

Procedia PDF Downloads 130
655 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 83
654 Corrosion Investigation of Superalloys, Molybdenum and TZM in Chloride Molten Salts

Authors: Craig Jantzen, Tim Abram, Dirk Engelberg, Hugues Lambert, Daniel Cooper

Abstract:

Molten salts are of high interest for use as coolants in nuclear reactors due to favourable high temperature and thermodynamic properties. The corrosive behaviour of molten salts however pose a materials integrity challenge. Three Ni / Ni-Fe based and two Mo based alloys have been exposed to molten eutectics (LiCl-KCl at 59.5:40.5 mol% and KCl-MgCl2 at 68:32 mol%) at 600°C and 800°C for durations up to 500hrs. Corrosion was observed to preferentially attack alloy constituents in order of their reactivity, with chromium the most vulnerable and depleted element. Alloy weight-loss per unit area was calculated to give linear corrosion rates, discounting any initial rapid corrosion of impurities. Further analysis was carried out using ICP-MS, SEM and EDX techniques to give a more detailed view of the corrosion mechanisms.

Keywords: molten salt, salt, corrosion, high temperature, licl, KCL, MgCl, molybdenum, nickel, superalloys

Procedia PDF Downloads 419
653 SPICE Modeling for Evaluation of Distribution System Reliability Indices

Authors: G. N. Srinivas, K. Raju

Abstract:

This paper presents Markov processes for determining the reliability indices of distribution system. The continuous Markov modeling is applied to a complex radial distribution system and electrical equivalent circuits are developed for the modeling. In general PSPICE is being used for electrical and electronic circuits and various applications of power system like fault analysis, transient analysis etc. In this paper, the SPICE modeling equivalent circuits which are developed are applied in a novel way to Distribution System reliability analysis. These circuits are simulated using PSPICE software to obtain the state probabilities, the basic and performance indices. Thus the basic indices and the performance indices obtained by this method are compared with those obtained by FMEA technique. The application of the concepts presented in this paper are illustrated and analyzed for IEEE-Roy Billinton Test System (RBTS).

Keywords: distribution system, Markov Model, reliability indices, spice simulation

Procedia PDF Downloads 517
652 Time-Frequency Modelling and Analysis of Faulty Rotor

Authors: B. X. Tchomeni, A. A. Alugongo, T. B. Tengen

Abstract:

In this paper, de Laval rotor system has been characterized by a hinge model and its transient response numerically treated for a dynamic solution. The effect of the ensuing non-linear disturbances namely rub and breathing crack is numerically simulated. Subsequently, three analysis methods: Orbit Analysis, Fast Fourier Transform (FFT) and Wavelet Transform (WT) are employed to extract features of the vibration signal of the faulty system. An analysis of the system response orbits clearly indicates the perturbations due to the rotor-to-stator contact. The sensitivities of WT to the variation in system speed have been investigated by Continuous Wavelet Transform (CWT). The analysis reveals that features of crack, rubs and unbalance in vibration response can be useful for condition monitoring. WT reveals its ability to detect non-linear signal, and obtained results provide a useful tool method for detecting machinery faults.

Keywords: Continuous wavelet, crack, discrete wavelet, high acceleration, low acceleration, nonlinear, rotor-stator, rub

Procedia PDF Downloads 330
651 Black-Box-Base Generic Perturbation Generation Method under Salient Graphs

Authors: Dingyang Hu, Dan Liu

Abstract:

DNN (Deep Neural Network) deep learning models are widely used in classification, prediction, and other task scenarios. To address the difficulties of generic adversarial perturbation generation for deep learning models under black-box conditions, a generic adversarial ingestion generation method based on a saliency map (CJsp) is proposed to obtain salient image regions by counting the factors that influence the input features of an image on the output results. This method can be understood as a saliency map attack algorithm to obtain false classification results by reducing the weights of salient feature points. Experiments also demonstrate that this method can obtain a high success rate of migration attacks and is a batch adversarial sample generation method.

Keywords: adversarial sample, gradient, probability, black box

Procedia PDF Downloads 70
650 Simulation of Heat Exchanger Behavior during LOCA Accident in THTL Test Loop

Authors: R. Mahmoodi, A. R. Zolfaghari

Abstract:

In nuclear power plants, loss of coolant from the primary system is the type of reduced removed capacity that is given most attention; such an accident is referred as Loss of Coolant Accident (LOCA). In the current study, investigation of shell and tube THTL heat exchanger behavior during LOCA is implemented by ANSYS CFX simulation software in both steady state and transient mode of turbulent fluid flow according to experimental conditions. Numerical results obtained from ANSYS CFX simulation show good agreement with experimental data of THTL heat exchanger. The results illustrate that in large break LOCA as short term accident, heat exchanger could not fast response to temperature variables but in the long term, the temperature of shell side of heat exchanger will be increase.

Keywords: shell-and-tube heat exchanger, shell-side, CFD, flow and heat transfer, LOCA

Procedia PDF Downloads 417
649 Novel Oral Anticoagulants (NOACS) Adherence and Bleeding Events in Atrial Fibrillation Patients: A Systematic Review and Meta-Analysis

Authors: Tadesse Melaku Abegaz, Akshaya Srikanth Bahagavathula, Abdulla Shehab Sheab, Asim Hassen

Abstract:

Objectives: Non-adherence and discontinuation of anticoagulant therapy lead to increased ischemic stroke risk and contributes to suboptimal outcomes of the anticoagulant treatment. This systematic review and meta-analysis were aimed to investigate the adherence to NOACs and adverse events in patients with AF. Methods: Original research articles conducted on patients with AF and using any NOACs (dabigatran, rivoraxaban and apixaban) reporting adherence for at least 35 days were included. Scientific databases including PubMed, Web of Science, and Google Scholar were searched using MeSH keywords to obtaining literature researched between 2008 to till June, 2016. Study characteristics, patient’s sociodemographic and clinical characteristics, medication adherence levels and bleeding events reported were recorded. Results: The overall sample size of the six studies is 1,640,157, with CHADS2 scores < 2 in 551 patients, CHADS2-VASc ≥ 2 in 62,232 AF patients. Three-forth [75.6% (95%CI= 66.5-84.8), p < 0.001] are adherent to NOACs. However, a higher rate [72.7% (62.5-82.9), p < 0.001] of adherence was observed with Dabigatran than Apixaban [59.9% (3.2-123.1), p=0.063] and Rivaroxaban [59.3% (38.7-80.0), p<0.001]. Sub-group analysis revealed that nearly 57% of the AF patients on NOACs have CHADS2 scores < 2 and 20% of these patients were non-adherent to NOACs. Overall bleeding events rate associated with NOACs non-adherent AF patients was found to be 7.5% (0.2-14.8), p=0.045. However, nearly 11.2% of AF patients experienced bleeding events were non-adherent to NOAC medications. A higher proportion of bleeding events were noticed with Dabigatran (14.7%). Conclusions: Adherence rates, while uniformly suboptimal, nevertheless varied considerably, lowest at 59.3% for rivaroxaban and 59.9% for apixaban, followed by dabigatran (75.6%). Overall bleeding events associated with NOACs rates were 7.5%. However, lower adherence to NOACs was associated with worse outcomes among patients with greater stroke risk.

Keywords: atrial fibrillation, bleeding events, meta-analysis, novel oral anticoagulants

Procedia PDF Downloads 318
648 Human Intraocular Thermal Field in Action with Different Boundary Conditions Considering Aqueous Humor and Vitreous Humor Fluid Flow

Authors: Dara Singh, Keikhosrow Firouzbakhsh, Mohammad Taghi Ahmadian

Abstract:

In this study, a validated 3D finite volume model of human eye is developed to study the fluid flow and heat transfer in the human eye at steady state conditions. For this purpose, discretized bio-heat transfer equation coupled with Boussinesq equation is analyzed with different anatomical, environmental, and physiological conditions. It is demonstrated that the fluid circulation is formed as a result of thermal gradients in various regions of eye. It is also shown that posterior region of the human eye is less affected by the ambient conditions compared to the anterior segment which is sensitive to the ambient conditions and also to the way the gravitational field is defined compared to the geometry of the eye making the circulations and the thermal field complicated in transient states. The effect of variation in material and boundary conditions guides us to the conclusion that thermal field of a healthy and non-healthy eye can be distinguished via computer simulations.

Keywords: bio-heat, boussinesq, conduction, convection, eye

Procedia PDF Downloads 318
647 Analysis the Trajectory of the Spacecraft during the Transition to the Planet's Orbit Using Aerobraking in the Atmosphere of the Planet

Authors: Zaw Min Tun

Abstract:

The paper focuses on the spacecraft’s trajectory transition from interplanetary hyperbolic orbit to the planet’s orbit using the aerobraking in the atmosphere of the planet. A considerable mass of fuel is consumed during the spacecraft transition from the planet’s gravitation assist trajectory into the planet’s satellite orbit. To reduce the fuel consumption in this transition need to slow down the spacecraft’s velocity in the planet’s atmosphere and reduce its orbital transition time. The paper is devoted to the use of the planet’s atmosphere for slowing down the spacecraft during its transition into the satellite orbit with uncertain atmospheric parameters. To reduce the orbital transition time of the spacecraft is controlled by the change of attack angles’ values at the aerodynamic deceleration path and adjusting the minimum flight altitude of the spacecraft at the pericenter of the planet’s upper atmosphere.

Keywords: aerobraking, atmosphere of the planet, orbital transition time, Spacecraft’s trajectory

Procedia PDF Downloads 283
646 Flow Dynamics of Nanofluids in a Horizontal Cylindrical Annulus Using Nonhomogeneous Dynamic Model

Authors: M. J. Uddin, M. M. Rahman

Abstract:

Transient natural convective flow dynamics of nanofluids in a horizontal homocentric annulus using nonhomogeneous dynamic model has been experimented numerically. The simulation is carried out for four different shapes of the inner wall, which is either cylindrical, elliptical, square or triangular. The outer surface of the annulus is maintained at constant low temperature while the inner wall is maintained at a uniform temperature; higher than the outer one. The enclosure is permeated by a uniform magnetic field having variable orientation. The Brownian motion and thermophoretic deposition phenomena of the nanoparticles are taken into account in model construction. The governing nonlinear momentum, energy, and concentration equations are solved numerically using Galerkin weighted residual finite element method. To find the best performer, the local Nusselt number is demonstrated for different shapes of the inner wall. The heat transfer enhancement for different nanofluids for four different shapes of the inner wall is exhibited.

Keywords: nanofluids, annulus, nonhomogeneous dynamic model, heat transfer

Procedia PDF Downloads 146
645 Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce

Authors: Wenjie Qin, Kewei Lv

Abstract:

In 1996, Boneh and Venkatesan proposed the Hidden Number Problem (HNP) and proved the most significant bits (MSB) of computational Diffie-Hellman key exchange scheme and related schemes are unpredictable bits. They also gave a method which is a lattice rounding technique to solve HNP in non-uniform model. In this paper, we put forward a new concept that is Schnorr-MSB-HNP. We also reduce the problem of solving Schnorr signature private key with a few consecutive most significant bits of random nonce (used at each signature generation) to Schnorr-MSB-HNP, then we use the rounding technique to solve the Schnorr-MSB-HNP. We have come to the conclusion that if there is a ‘miraculous box’ which inputs the random nonce and outputs 2loglogq (q is a prime number) most significant bits of nonce, the signature private key will be obtained by choosing 2logq signature messages randomly. Thus we get an attack on the Schnorr signature private key.

Keywords: rounding technique, most significant bits, Schnorr signature algorithm, nonce, Schnorr-MSB-HNP

Procedia PDF Downloads 208
644 3D Simulation for Design and Predicting Performance of a Thermal Heat Storage Facility using Sand

Authors: Nadjiba Mahfoudi, Abdelhafid Moummi , Mohammed El Ganaoui

Abstract:

Thermal applications are drawing increasing attention in the solar energy research field, due to their high performance in energy storage density and energy conversion efficiency. In these applications, solar collectors and thermal energy storage systems are the two core components. This paper presents a thermal analysis of the transient behavior and storage capability of a sensible heat storage device in which sand is used as a storage media. The TES unit with embedded charging tubes is connected to a solar air collector. To investigate it storage characteristics a 3D-model using no linear coupled partial differential equations for both temperature of storage medium and heat transfer fluid (HTF), has been developed. Performances of thermal storage bed of capacity of 17 MJ (including bed temperature, charging time, energy storage rate, charging energy efficiency) have been evaluated. The effect of the number of charging tubes (3 configurations) is presented.

Keywords: design, thermal modeling, heat transfer enhancement, sand, sensible heat storage

Procedia PDF Downloads 536
643 Hybrid GA-PSO Based Pitch Controller Design for Aircraft Control System

Authors: Vaibhav Singh Rajput, Ravi Kumar Jatoth, Nagu Bhookya, Bhasker Boda

Abstract:

In this paper proportional, integral, derivative (PID) controller is used to control the pitch angle of the aircraft when the elevation angle is changed or modified. The pitch angle is dependent on elevation angle; a change in one corresponds to a change in the other. The PID controller helps in restricted change of pitch rate in response to the elevation angle. The PID controller is dependent on different parameters like Kp, Ki, Kd which change the pitch rate as they change. Various methodologies are used for changing those parameters for getting a perfect time response pitch angle, as desired or wished by a concerned person. While reckoning the values of those parameters, trial and guessing may prove to be futile in order to provide comfort to passengers. So, using some metaheuristic techniques can be useful in handling these errors. Hybrid GA-PSO is one such powerful algorithm which can improve transient and steady state response and can give us more reliable results for PID gain scheduling problem.

Keywords: pitch rate, elevation angle, PID controller, genetic algorithm, particle swarm optimization, phugoid

Procedia PDF Downloads 300
642 Simulations of Laminar Liquid Flows through Superhydrophobic Micro-Pipes

Authors: Mohamed E. Eleshaky

Abstract:

This paper investigates the dynamic behavior of laminar water flows inside superhydrophobic micro-pipes patterned with square micro-posts features under different operating conditions. It also investigates the effects of air fraction and Reynolds number on the frictional performance of these pipes. Rather than modeling the air-water interfaces of superhydrophobic as a flat inflexible surface, a transient, incompressible, three-dimensional, volume-of-fluid (VOF) methodology has been employed to continuously track the air–water interface shape inside micro-pipes. Also, the entrance effects on the flow field have been taken into consideration. The results revealed the strong dependency of the frictional performance on the air fractions and Reynolds number. The frictional resistance reduction becomes increasingly more significant at large air fractions and low Reynolds numbers. Increasing Reynolds number has an adverse effect on the frictional resistance reduction.

Keywords: drag reduction, laminar flow in micropipes, numerical simulation, superhyrophobic surfaces, microposts

Procedia PDF Downloads 305
641 Numerical Study of Homogeneous Nanodroplet Growth

Authors: S. B. Q. Tran

Abstract:

Drop condensation is the phenomenon that the tiny drops form when the oversaturated vapour present in the environment condenses on a substrate and makes the droplet growth. Recently, this subject has received much attention due to its applications in many fields such as thin film growth, heat transfer, recovery of atmospheric water and polymer templating. In literature, many papers investigated theoretically and experimentally in macro droplet growth with the size of millimeter scale of radius. However few papers about nanodroplet condensation are found in the literature especially theoretical work. In order to understand the droplet growth in nanoscale, we perform the numerical simulation work to study nanodroplet growth. We investigate and discuss the role of the droplet shape and monomer diffusion on drop growth and their effect on growth law. The effect of droplet shape is studied by doing parametric studies of contact angle and disjoining pressure magnitude. Besides, the effect of pinning and de-pinning behaviours is also studied. We investigate the axisymmetric homogeneous growth of 10–100 nm single water nanodroplet on a substrate surface. The main mechanism of droplet growth is attributed to the accumulation of laterally diffusing water monomers, formed by the absorption of water vapour in the environment onto the substrate. Under assumptions of quasi-steady thermodynamic equilibrium, the nanodroplet evolves according to the augmented Young–Laplace equation. Using continuum theory, we model the dynamics of nanodroplet growth including the coupled effects of disjoining pressure, contact angle and monomer diffusion with the assumption of constant flux of water monomers at the far field. The simulation result is validated by comparing with the published experimental result. For the case of nanodroplet growth with constant contact angle, our numerical results show that the initial droplet growth is transient by monomer diffusion. When the flux at the far field is small, at the beginning, the droplet grows by the diffusion of initially available water monomers on the substrate and after that by the flux at the far field. In the steady late growth rate of droplet radius and droplet height follow a power law of 1/3, which is unaffected by the substrate disjoining pressure and contact angle. However, it is found that the droplet grows faster in radial direction than high direction when disjoining pressure and contact angle increase. The simulation also shows the information of computational domain effect in the transient growth period. When the computational domain size is larger, the mass coming in the free substrate domain is higher. So the mass coming in the droplet is also higher. The droplet grows and reaches the steady state faster. For the case of pinning and de-pinning droplet growth, the simulation shows that the disjoining pressure does not affect the droplet radius growth law 1/3 in steady state. However the disjoining pressure modifies the growth rate of the droplet height, which then follows a power law of 1/4. We demonstrate how spatial depletion of monomers could lead to a growth arrest of the nanodroplet, as observed experimentally.

Keywords: augmented young-laplace equation, contact angle, disjoining pressure, nanodroplet growth

Procedia PDF Downloads 248
640 Heat Transfer and Friction Factor Study for Triangular Duct Solar Air Heater Having Discrete V-Shaped Ribs

Authors: Varun Goel

Abstract:

Solar energy is a good option among renewable energy resources due to its easy availability and abundance. The simplest and most efficient way to utilize solar energy is to convert it into thermal energy and this can be done with the help of solar collectors. The thermal performance of such collectors is poor due to less heat transfer from the collector surface to air. In this work, experimental investigations of single pass solar air heater having triangular duct and provided with roughness element on the underside of the absorber plate. V-shaped ribs are used for investigation having three different values of relative roughness pitch (p/e) ranges from 4-16 for a fixed value of angle of attack (α), relative roughness height (e/Dh) and a relative gap distance (d/x) values are 60°, 0.044 and 0.60 respectively. Result shows that considerable augmentation in heat transfer has been obtained by providing roughness.

Keywords: artificial roughness, solar air heater, triangular duct, V-shaped ribs

Procedia PDF Downloads 432
639 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation

Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal

Abstract:

We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).

Keywords: authentication, edge computing, industrial IoT, post-quantum resistance

Procedia PDF Downloads 176
638 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: attack modelling, crime commission process, crime script, situational crime prevention

Procedia PDF Downloads 111
637 Aerodynamics of Nature Inspired Turbine Blade Using Computational Simulation

Authors: Seung Ki Lee, Richard Kyung

Abstract:

In the airfoil analysis, as the camber is greater, the minimal angle of attack causing the stall and maximum lift force increases. The shape of the turbine blades is similar to the shape of the wings of planes. After major wars, many remarkable blade shapes are made through researches about optimal blade shape. The blade shapes developed by National Advisory Committee for Aeronautics, NACA, is well known. In this paper, using computational and numerical analysis, the NACA airfoils are analyzed. This research shows that the blades vary with their thickness, which thinner blades are expected to be better. There is no significant difference of coefficient of lift due to the difference in thickness, but the coefficient of drag increases as the thickness increases.

Keywords: blades, drag force, national advisory committee for aeronautics airfoils, turbine

Procedia PDF Downloads 207