Search results for: angle of attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1902

Search results for: angle of attack

1872 Cryptographic Attack on Lucas Based Cryptosystems Using Chinese Remainder Theorem

Authors: Tze Jin Wong, Lee Feng Koo, Pang Hung Yiu

Abstract:

Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack.

Keywords: Lucas sequence, Dickson polynomial, faulty signature, corresponding signature, congruence

Procedia PDF Downloads 135
1871 Fluid–Structure Interaction Modeling of Wind Turbines

Authors: Andre F. A. Cyrino

Abstract:

Knowing that the technological advance is the focus on the efficient extraction of energy from wind, and therefore in the design of wind turbine structures, this work aims the study of the fluid-structure interaction of an idealized wind turbine. The blade was studied as a beam attached to a cylindrical Hub with rotation axis pointing the air flow that passes through the rotor. Using the calculus of variations and the finite difference method the blade will be simulated by a discrete number of nodes and the aerodynamic forces were evaluated. The study presented here was written on Matlab and performs a numeric simulation of a simplified model of windmill containing a Hub and three blades modeled as Euler-Bernoulli beams for small strains and under the constant and uniform wind. The mathematical approach is done by Hamilton’s Extended Principle with the aerodynamic loads applied on the nodes considering the local relative wind speed, angle of attack and aerodynamic lift and drag coefficients. Due to the wide range of angles of attack, a wind turbine blade operates, the airfoil used on the model was NREL SERI S809 which allowed obtaining equations for Cl and Cd as functions of the angle of attack, based on a NASA study. Tridimensional flow effects were no taken in part, as well as torsion of the beam, which only bends. The results showed the dynamic response of the system in terms of displacement and rotational speed as the turbine reached the final speed. Although the results were not compared to real windmills or more complete models, the resulting values were consistent with the size of the system and wind speed.

Keywords: blade aerodynamics, fluid–structure interaction, wind turbine aerodynamics, wind turbine blade

Procedia PDF Downloads 241
1870 Effect of Design Parameters on a Two Stage Launch Vehicle Performance

Authors: Assem Sallam, Aly Elzahaby, Ahmed Makled, Mohamed Khalil

Abstract:

Change in design parameters of launch vehicle affects its overall flight path trajectory. In this paper, several design parameters are introduced to study their effect. Selected parameters are the launch vehicle mass, which is presented in the form of payload mass, the maximum allowable angle of attack the launch vehicle can withstand, the flight path angle that is predefined for the launch vehicle second stage, the required inclination and its effect on the launch azimuth and finally by changing the launch pad coordinate. Selected design parameters are studied for their effect on the variation of altitude, ground range, absolute velocity and the flight path angle. The study gives a general mean of adjusting the design parameters to reach the required launch vehicle performance.

Keywords: launch vehicle azimuth, launch vehicle trajectory, launch vehicle payload, launch pad location

Procedia PDF Downloads 288
1869 Starting Torque Study of Darrieus Wind Turbine

Authors: M. Douak, Z. Aouachria

Abstract:

The aim of our study is to project an optimized wind turbine of Darrieus type. This type of wind turbine is characterized by a low starting torque in comparison with the Savonius rotor allowing them to operate for a period greater than wind speed. This led us to reconsider the Darrieus rotor to optimize a design which will increase its starting torque. The study of a system of monitoring and control of the angle of attack of blade profile, which allows an auto start to wind speeds as low as possible is presented for the straight blade of Darrieus turbine. The study continues to extend to other configurations namely those of parabolic type.

Keywords: Darrieus turbine, pitch angle, self stating, wind energy

Procedia PDF Downloads 323
1868 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 434
1867 11-Round Impossible Differential Attack on Midori64

Authors: Zhan Chen, Wenquan Bi

Abstract:

This paper focuses on examining the strength of Midori against impossible differential attack. The Midori family of light weight block cipher orienting to energy-efficiency is proposed in ASIACRYPT2015. Using a 6-round property, the authors implement an 11-round impossible differential attack on Midori64 by extending two rounds on the top and three rounds on the bottom. There is enough key space to consider pre-whitening keys in this attack. An impossible differential path that minimises the key bits involved is used to reduce computational complexity. Several additional observations such as partial abort technique are used to further reduce data and time complexities. This attack has data complexity of 2 ⁶⁹·² chosen plaintexts, requires 2 ¹⁴·⁵⁸ blocks of memory and 2 ⁹⁴·⁷ 11- round Midori64 encryptions.

Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori

Procedia PDF Downloads 257
1866 External Sulphate Attack: Advanced Testing and Performance Specifications

Authors: G. Massaad, E. Roziere, A. Loukili, L. Izoret

Abstract:

Based on the monitoring of mass, hydrostatic weighing, and the amount of leached OH- we deduced the nature of leached and precipitated minerals, the amount of lost aggregates and the evolution of porosity and cracking during the sulphate attack. Using these information, we are able to draw the volume / mass changes brought by mineralogical variations and cracking of the cement matrix. Then we defined a new performance indicator, the averaged density, capable to resume along the test of sulphate attack the occurred physicochemical variation occurred in the cementitious matrix and then highlight.

Keywords: monitoring strategy, performance indicator, sulphate attack, mechanism of degradation

Procedia PDF Downloads 293
1865 Performance Improvement of Photovoltaic Module at Different Tilt Angle in Kuwait

Authors: Hussain Bunyan, Wesam Ali

Abstract:

In this paper we will study the performance of a Silicon Photovoltaic (PV) system with different tilt angle arrangement in Kuwait (latitude 30˚ N). In this study the PV system is installed facing south, collecting maximum solar radiation at noon, and their angles are from 00 to 900 respectively, during full year at the Solstice and Equinox periods and aiming for a higher angle than 300 with competitive output power. The results show that the performance and the output power of the PV system with 50˚ tilt angle, is equivalent to the latitude tilt angle (30˚) during a full year.

Keywords: photovoltaic model, tilt angle, solar collector, PV system performance, State of Kuwait

Procedia PDF Downloads 490
1864 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 271
1863 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 287
1862 Induced Pulsation Attack Against Kalman Filter Driven Brushless DC Motor Control System

Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap

Abstract:

We use modeling and simulation tools, to introduce a novel bias injection attack, named the ’Induced Pulsation Attack’, which targets Cyber Physical Systems with closed-loop controlled Brushless DC (BLDC) motor and Kalman filter driver in the feedback loop. This attack involves engaging a linear function with a constant gradient to distort the coefficient of the injected bias, which falsifies the Kalman filter estimates of the rotor’s angular speed. As a result, this manipulation interaction inside the control system causes periodic pulsations in a form of asymmetric sine wave of both current and voltage in the circuit windings, with a high magnitude. It is shown that by varying the gradient of linear function, one can control both the frequency and structure of the induced pulsations. It is also demonstrated that terminating the attack at any point leads to additional compensating effort from the controller to restore the speed to its equilibrium value. This compensation effort produces an exponentially decaying wave, which we call the ’attack withdrawal syndrome’ wave. The conditions for maximizing or minimizing the impact of the attack withdrawal syndrome are determined. Linking the termination of the attack to the end of the full period of the induced pulsation wave has been shown to nullify the attack withdrawal syndrome wave, thereby improving the attack’s covertness.

Keywords: cyber-attack, induced pulsation, bias injection, Kalman filter, BLDC motor, control system, closed loop, P- controller, PID-controller, saw-function, cyber-physical system

Procedia PDF Downloads 48
1861 Aerodynamic Investigation of Rear Vehicle by Geometry Variations on the Backlight Angle

Authors: Saud Hassan

Abstract:

This paper shows simulation for the prediction of the flow around the backlight angle of the passenger vehicle. The CFD simulations are carried out on different car models. The Ahmed model “bluff body” used as the stander model to study aerodynamics of the backlight angle. This paper described the airflow over the different car models with different backlight angles and also on the Ahmed model to determine the trailing vortices with the varying backlight angle of a passenger vehicle body. The CFD simulation is carried out with the Ahmed body which has simplified car model mainly used in automotive industry to investigate the flow over the car body surface. The main goal of the simulation is to study the behavior of trailing vortices of these models. In this paper the air flow over the slant angle of 0,5o, 12.5o, 20o, 30o, 40o are considered. As investigating on the rear backlight angle two dimensional flows occurred at the rear slant, on the other hand when the slant angle is 30o the flow become three dimensional. Above this angle sudden drop occurred in drag.

Keywords: aerodynamics, Ahemd vehicle , backlight angle, finite element method

Procedia PDF Downloads 735
1860 Correlation between Flexible Flatfoot and Lumbosacral Angle

Authors: Moustafa Elwan, Sohier Shehata, Fatma Sedek, Manar Hussine

Abstract:

One of the most risky factors that lead to a foot injury during physical activities are both high and low arched feet. Normally the medial longitudinal arch of the foot develops in the first 10 years of life, so flexible flat foot has an inversely relationship with age in the first decade, all over the world, the prevalence of flat foot is increasing. In approximately 15% of foot deformities cases, the deformity does not disappear and remains throughout adulthood, 90% of the clinical cases are complaining from foot problems are due to flatfoot. Flatfoot creates subtalar over pronation, which creates tibial and femoral medial rotation, and that is accompanied with increases of pelvic tilting anteriorly, which may influence the lumbar vertebrae alignment by increasing muscle tension and rotation. Objective: To study the impact of the flexible flatfoot on lumbosacral angle (angle of Ferguson). Methods: This experiment included 40 volunteers (14 females &26 males) gathered from the Faculty of Physical Therapy, Modern University of Technology and Information, Cairo, Egypt, for each participant, four angles were measured in the foot( talar first metatarsal angle, lateral talocalcaneal angle, , Calcaneal first metatarsal angle, calcaneal inclination angle) and one angle in the lumbar region (lumbosacral angle). Measurement of these angles was conducted by using Surgimap Spine software (version 2.2.9.6). Results: The results demonstrated that there was no significant correlation betweenFerguson angle and lateral talocalcaneal (r=0.164, p=0.313). Also, there was no significant correlation between Ferguson angle and talo first metatarsal “Meary’s angle" (r=0.007, p=0.968). Moreover, there was no significant correlation between Ferguson angle and calcaneal-first metatarsal angle (r=0.083, p=0.612). Also, there was no significant correlation between Ferguson angle and calcaneal inclination angle (r= 0.032, p= 0.846). Conclusion: It can be concluded that there is no significant correlation between the flexible flat foot and lumbosacral angle So, more study should be conducted in large sample and different ages and conditions of foot problems.

Keywords: calcaneal first metatarsal, calcaneal inclination, flatfoot, ferguson’s angle, lateral talocalcaneal angle, lumbosacral angle, and talar first metatarsal angle

Procedia PDF Downloads 104
1859 Definition of Service Angle of Android’S Robot Hand by Method of Small Movements of Gripper’S Axis Synthesis by Speed Vector

Authors: Valeriy Nebritov

Abstract:

The paper presents a generalized method for determining the service solid angle based on the assigned gripper axis orientation with a stationary grip center. Motion synthesis in this work is carried out in the vector of velocities. As an example, a solid angle of the android robot arm is determined, this angle being formed by the longitudinal axis of a gripper. The nature of the method is based on the study of sets of configuration positions, defining the end point positions of the unit radius sphere sweep, which specifies the service solid angle. From this the spherical curve specifying the shape of the desired solid angle was determined. The results of the research can be used in the development of control systems of autonomous android robots.

Keywords: android robot, control systems, motion synthesis, service angle

Procedia PDF Downloads 171
1858 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 366
1857 Effect of Waste Foundry Slag and Alccofine on Durability Properties of High Strength Concrete

Authors: Devinder Sharma, Sanjay Sharma, Ajay Goyal, Ashish Kapoor

Abstract:

The present research paper discussed the durability properties of high strength concrete (HSC) using Foundry Slag(FD) as partial substitute for fine aggregates (FA) and Alccofine (AF) in addition to portland pozzolana (PPC) cement. Specimens of Concrete M100 grade with water/binder ratio 0.239, with Foundry Slag (FD) varying from 0 to 50% and with optimum quantity of AF(15%) were casted and tested for durability properties such as Water absorption, water permeability, resistance to sulphate attack, alkali attack and nitrate attack of HSC at the age of 7, 14, 28, 56 and 90 days. Substitution of fine aggregates (FA) with up to 45% of foundry slag(FD) content and cement with 15% substitution and addition of alccofine showed an excellent resistance against durability properties at all ages but showed a decrease in these properties with 50% of FD contents. Loss of weight in concrete samples due to sulphate attack, alkali attack and nitrate attack of HSC at the age of 365 days was compared with loss in compressive strength. Correlation between loss in weight and loss in compressive strength in all the tests was found to be excellent.

Keywords: alccofine, alkali attack, foundry slag, high strength concrete, nitrate attack, water absorption, water permeability

Procedia PDF Downloads 304
1856 Experimental Studies on the Corrosion Effects of the Concrete Made with Tannery Effluent

Authors: K. Nirmalkumar

Abstract:

An acute water scarcity is prevailing in the dry season in and around Perundurai (Erode district, Tamil Nadu, India) where there are more number of tannery units. Hence an attempt was made to use the effluent from the tannery industry for construction purpose. The mechanical properties such as compressive strength, tensile strength, flexural strength and the special properties such as chloride attack, sulphate attack and chemical attack were studied by casting various concrete specimens in form of cube, cylinders and beams, etc. It was observed that the concrete had some reduction in strength while subjected to chloride attack, sulphate attack and chemical attack. So admixtures were selected and optimized in suitable proportion to counter act the adverse effects and the results were found to be satisfactory. In this research study the corrosion results of specimens prepared by using treated and untreated tannery effluent were compared with the concrete specimens prepared by using potable water. It was observed that by the addition of admixtures, the adverse effects due to the usage of the treated and untreated tannery effluent are counteracted.

Keywords: corrosion, calcium nitrite, concrete, fly ash

Procedia PDF Downloads 245
1855 Power Performance Improvement of 500W Vertical Axis Wind Turbine with Salient Design Parameters

Authors: Young-Tae Lee, Hee-Chang Lim

Abstract:

This paper presents the performance characteristics of Darrieus-type vertical axis wind turbine (VAWT) with NACA airfoil blades. The performance of Darrieus-type VAWT can be characterized by torque and power. There are various parameters affecting the performance such as chord length, helical angle, pitch angle and rotor diameter. To estimate the optimum shape of Darrieustype wind turbine in accordance with various design parameters, we examined aerodynamic characteristics and separated flow occurring in the vicinity of blade, interaction between flow and blade, and torque and power characteristics derived from it. For flow analysis, flow variations were investigated based on the unsteady RANS (Reynolds-averaged Navier-Stokes) equation. Sliding mesh algorithm was employed in order to consider rotational effect of blade. To obtain more realistic results we conducted experiment and numerical analysis at the same time for three-dimensional shape. In addition, several parameters (chord length, rotor diameter, pitch angle, and helical angle) were considered to find out optimum shape design and characteristics of interaction with ambient flow. Since the NACA airfoil used in this study showed significant changes in magnitude of lift and drag depending on an angle of attack, the rotor with low drag, long cord length and short diameter shows high power coefficient in low tip speed ratio (TSR) range. On the contrary, in high TSR range, drag becomes high. Hence, the short-chord and long-diameter rotor produces high power coefficient. When a pitch angle at which airfoil directs toward inside equals to -2° and helical angle equals to 0°, Darrieus-type VAWT generates maximum power.

Keywords: darrieus wind turbine, VAWT, NACA airfoil, performance

Procedia PDF Downloads 346
1854 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 373
1853 A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Authors: Naghmeh Moradpoor Sheykhkanloo

Abstract:

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach.

Keywords: neural networks, pattern recognition, SQL injection attacks, SQL injection attack classification, SQL injection attack detection

Procedia PDF Downloads 437
1852 Performance of Photovoltaic Module at Different Tilt Angles

Authors: Hussain Bunyan, Wesam Ali

Abstract:

In this paper we will study the performance of a Silicon Photovoltaic (PV) system with different tilt angle arrangement in Kuwait (latitude 30˚ N). In the study the PV system is installed facing South, collecting maximum solar radiation at noon, and their angles are from 00 to 900 respectively, during full year at the Solstice and Equinox periods, aiming for a higher angle than 300 with competitive output power. The results show that the performance and the output power of the PV system with 50˚ tilt angle, is equivalent to the latitude tilt angle (30˚) during a full year.

Keywords: photovoltaic model, tilt angle, solar collector, PV system performance, State of Kuwait

Procedia PDF Downloads 465
1851 Service Life Modelling of Concrete Deterioration Due to Biogenic Sulphuric Acid (BSA) Attack-State-of-an-Art-Review

Authors: Ankur Bansal, Shashank Bishnoi

Abstract:

Degradation of Sewage pipes, sewage pumping station and Sewage treatment plants(STP) is of major concern due to difficulty in their maintenance and the high cost of replacement. Most of these systems undergo degradation due to Biogenic sulphuric acid (BSA) attack. Since most of Waste water treatment system are underground, detection of this deterioration remains hidden. This paper presents a literature review, outlining the mechanism of this attack focusing on critical parameters of BSA attack, along with available models and software to predict the deterioration due to this attack. This paper critically examines the various steps and equation in various Models of BSA degradation, detail on assumptions and working of different softwares are also highlighted in this paper. The paper also focuses on the service life design technique available through various codes and method to integrate the servile life design with BSA degradation on concrete. In the end, various methods enhancing the resistance of concrete against Biogenic sulphuric acid attack are highlighted. It may be concluded that the effective modelling for degradation phenomena may bring positive economical and environmental impacts. With current computing capabilities integrated degradation models combining the various durability aspects can bring positive change for sustainable society.

Keywords: concrete degradation, modelling, service life, sulphuric acid attack

Procedia PDF Downloads 286
1850 Optimization of Tilt Angle for Solar Collectors: A Case Study for Bursa, Turkey

Authors: N. Arslanoglu

Abstract:

This paper deals with the optimum tilt angle for the solar collector in order to collect the maximum solar radiation. The optimum angle for tilted surfaces varying from 0 to 90 in steps of 1was computed. In present study, a theoretical model is used to predict the global solar radiation on a tilted surface and to obtain the optimum tilt angle for a solar collector in Bursa, Turkey. Global solar energy radiation on the solar collector surface with an optimum tilt angle is calculated for specific periods. It is determined that the optimum slope angle varies between 0 (June) and 59 (December) throughout the year. In winter (December, January, and February) the tilt should be 55, in spring (March, April, and May) 19.6, in summer (June, July, and August) 5.6, and in autumn (September, October, and November) 44.3. The yearly average of this value was obtained to be 31.1 and this would be the optimum fixed slope throughout the year.

Keywords: Bursa, global solar radiation, optimum tilt angle, tilted surface

Procedia PDF Downloads 231
1849 A CFD Study of the Performance Characteristics of Vented Cylinders as Vortex Generators

Authors: R. Kishan, R. M. Sumant, S. Suhas, Arun Mahalingam

Abstract:

This paper mainly researched on influence of vortex generator on lift coefficient and drag coefficient, when vortex generator is mounted on a flat plate. Vented cylinders were used as vortex generators which intensify vortex shedding in the wake of the vented cylinder as compared to base line circular cylinder which ensures more attached flow and increases lift force of the system. Firstly vented cylinders were analyzed in commercial CFD software which is compared with baseline cylinders for different angles of attack and further variation of lift and drag forces were studied by varying Reynolds number to account for influence of turbulence and boundary layer in the flow. Later vented cylinders were mounted on a flat plate and variation of lift and drag coefficients was studied by varying angles of attack and studying the dependence of Reynolds number and dimensions of vortex generator on the coefficients. Mesh grid sensitivity is studied to check the convergence of the results obtained It was found that usage of vented cylinders as vortex generators increased lift forces with small variation in drag forces by varying angle of attack.

Keywords: CFD analysis, drag coefficient, FVM, lift coefficient, modeling, Reynolds number, simulation, vortex generators, vortex shedding

Procedia PDF Downloads 411
1848 Measurement of the Quadriceps Angle with Respect to Various Body Parameters in Arab Countries

Authors: Ramada R. Khasawneh, Mohammed Z. Allouh, Ejlal Abu-El Rub

Abstract:

The quadriceps angle (Q angle), formed between the quadriceps muscles and the patella tendon, is considered clinically as a very important parameter which displays the biomechanical effect of the quadriceps muscle on the knee, and it is also regarded as a crucial factor for the proper posture and movement of the knee patella. This study had been conducted to measure the normal Q angle values range in the Arab nationalities and determine the correlation between Q angle values and several body parameters, including gender, height, weight, dominant side, and the condylar distance of the femur. The study includes 500 healthy Arab students from Yarmouk University and Jordan University of Science and Technology. The Q angle of those volunteers was measured using a universal manual Goniometer with the subjects in the upright weight-bearing position. It was found that the Q angle was greater in women than in men. The analysis of the data revealed an insignificant increase in the dominant side of the Q angle. In addition, the Q was significantly higher in the taller people of both sexes. However, the Q angle did not present any considerable correlation with weight in the study population; conversely, it was observed that there was a link with the condylar distance of the femur in both sexes. It was also noticed that the Q angle increased remarkably when there was an increase in the condylar distance. Consequently, it turned out that the gender, height, and the condylar distance were momentous factors that had an impact on the Q angle in our study samples. However, weight and dominance factors did not show to have any influence on the values in our study.

Keywords: Q angle, Jordanian, anatomy, condylar distance

Procedia PDF Downloads 119
1847 Hybrid GA-PSO Based Pitch Controller Design for Aircraft Control System

Authors: Vaibhav Singh Rajput, Ravi Kumar Jatoth, Nagu Bhookya, Bhasker Boda

Abstract:

In this paper proportional, integral, derivative (PID) controller is used to control the pitch angle of the aircraft when the elevation angle is changed or modified. The pitch angle is dependent on elevation angle; a change in one corresponds to a change in the other. The PID controller helps in restricted change of pitch rate in response to the elevation angle. The PID controller is dependent on different parameters like Kp, Ki, Kd which change the pitch rate as they change. Various methodologies are used for changing those parameters for getting a perfect time response pitch angle, as desired or wished by a concerned person. While reckoning the values of those parameters, trial and guessing may prove to be futile in order to provide comfort to passengers. So, using some metaheuristic techniques can be useful in handling these errors. Hybrid GA-PSO is one such powerful algorithm which can improve transient and steady state response and can give us more reliable results for PID gain scheduling problem.

Keywords: pitch rate, elevation angle, PID controller, genetic algorithm, particle swarm optimization, phugoid

Procedia PDF Downloads 290
1846 The Correlation between Head of Bed Angle and IntraAbdominal Pressure of Intubated Patients; a Pre-Post Clinical Trial

Authors: Sedigheh Samimian, Sadra Ashrafi, Tahereh Khaleghdoost Mohammadi, Mohammad Reza Yeganeh, Ali Ashraf, Hamideh Hakimi, Maryam Dehghani

Abstract:

Introduction: The recommended position for measuring Intra-Abdominal Pressure (IAP) is the supine position. However, patients put in this position are prone to Ventilator-associated pneumonia. This study was done to evaluate the relationship between bed head angle and IAP measurements of intubated patients in the intensive care unit. Methods: In this clinical trial, seventy-six critically ill patients under mechanical ventilation were enrolled. IAP measurement was performed every 8 hours for 24 hours using the KORN method in three different degrees of the head of bed (HOB) elevation (0°, 15°, and 30°). Bland-Altman analysis was performed to identify the bias and limits of agreement among the three HOBs. According to World Society of the Abdominal Compartment Syndrome (WSACS), we can consider two IAP techniques equivalent if a bias of <1 mmHg and limits of agreement of - 4 to +4 were found between them. Data were analyzed using SPSS statistical software (v. 19), and the significance level was considered as 0.05. Results: The prevalence of intra-abdominal hypertension was 18.42%. Mean ± standard deviation (SD) of IAP were 8.44 ± 4.02 mmHg for HOB angle 0°, 9.58 ± 4.52 for HOB angle 15°, and 11.10 ± 4.73 for HOB angle 30o (p = 0.0001). The IAP measurement bias between HOB angle 0◦ and HOB angle 15° was 1.13 mmHg. This bias was 2.66 mmHg between HOB angle 0° and HOB angle 30°. Conclusion: Elevation of HOB angle from 0 to 30 degree significantly increases IAP. It seems that the measurement of IAP at HOB angle 15° was more reliable than 30°.

Keywords: pressure, intra-abdominal hypertension, head of bed, critical care, compartment syndrome, supine position

Procedia PDF Downloads 34
1845 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 125
1844 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles

Authors: Anthony Overmars, Sitalakshmi Venkatraman

Abstract:

This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.

Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography

Procedia PDF Downloads 201
1843 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.

Keywords: Linux system calls, web attack detection, interception, SQL

Procedia PDF Downloads 326