Search results for: malware propagation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 797

Search results for: malware propagation

767 Ray Tracing Modified 3D Image Method Simulation of Picocellular Propagation Channel Environment

Authors: Fathi Alwafie

Abstract:

In this paper we present the simulation of the propagation characteristics of the picocellular propagation channel environment. The first aim has been to find a correct description of the environment for received wave. The result of the first investigations is that the environment of the indoor wave significantly changes as we change the electric parameters of material constructions. A modified 3D ray tracing image method tool has been utilized for the coverage prediction. A detailed analysis of the dependence of the indoor wave on the wide-band characteristics of the channel: Root Mean Square (RMS) delay spread characteristics and mean excess delay, is also investigated.

Keywords: propagation, ray tracing, network, mobile computing

Procedia PDF Downloads 373
766 Optical Switching Based On Bragg Solitons in A Nonuniform Fiber Bragg Grating

Authors: Abdulatif Abdusalam, Mohamed Shaban

Abstract:

In this paper, we consider the nonlinear pulse propagation through a nonuniform birefringent fiber Bragg grating (FBG) whose index modulation depth varies along the propagation direction. Here, the pulse propagation is governed by the nonlinear birefringent coupled mode (NLBCM) equations. To form the Bragg soliton outside the photonic bandgap (PBG), the NLBCM equations are reduced to the well known NLS type equation by multiple scale analysis. As we consider the pulse propagation in a nonuniform FBG, the pulse propagation outside the PBG is governed by inhomogeneous NLS (INLS) rather than NLS. We, then, discuss the formation of soliton in the FBG known as Bragg soliton whose central frequency lies outside but close to the PBG of the grating structure. Further, we discuss Bragg soliton compression due to a delicate balance between the SPM and the varying grating induced dispersion. In addition, Bragg soliton collision, Bragg soliton switching and possible logic gates have also been discussed.

Keywords: Bragg grating, non uniform fiber, non linear pulse

Procedia PDF Downloads 287
765 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 359
764 Numerical Study on the Effect of Obstacle Structure on Two-Phase Detonation Initiation

Authors: Ding Yu, Ge Yang, Wang Hong-Tao

Abstract:

Aiming at the detonation performance and detonation wave propagation distance of liquid fuel detonation engine, the kerosene/oxygen-enriched air mixture is chosen as the research object; its detonation initiation and detonation wave propagation process by mild energy input are numerically studied by using Euler-Lagrange method in the present study. The effects of a semicircular obstacle, rectangular obstacle, and triangular obstacle on the detonation characteristic parameters in the detonation tube are compared and analyzed, and the effect of the angle between obstacle and flame propagation direction on flame propagation characteristics and detonation process when the blocking ratio is constant are studied. The results show that the flame propagation velocity decreases with the increase of the angle in the range of 0-90°, and when the angle is 0° which corresponds to the semicircle obstacle gets the highest detonation wave propagation velocity. With the increase of the angle in the range of 0-90°, DDT (Deflagration to detonation transition) distance decreases first and then increases.

Keywords: deflagration to detonation transition, numerical simulation, obstacle structure, turbulent flame

Procedia PDF Downloads 55
763 Temperature Effect on Sound Propagation in an Elastic Pipe with Viscoelastic Liquid

Authors: S. Levitsky, R. Bergman

Abstract:

Fluid rheology may have essential impact on sound propagation in a liquid-filled pipe, especially, in a low frequency range. Rheological parameters of liquid are temperature-sensitive, which ultimately results in a temperature dependence of the wave speed and attenuation in the waveguide. The study is devoted to modeling of this effect at sound propagation in an elastic pipe with polymeric liquid, described by generalized Maxwell model with non-zero high-frequency viscosity. It is assumed that relaxation spectrum is distributed according to the Spriggs law; temperature impact on the liquid rheology is described on the basis of the temperature-superposition principle and activation theory. The dispersion equation for the waveguide, considered as a thin-walled tube with polymeric solution, is obtained within a quasi-one-dimensional formulation. Results of the study illustrate the influence of temperature on sound propagation in the system.

Keywords: elastic tube, sound propagation, temperature effect, viscoelastic liquid

Procedia PDF Downloads 392
762 Dynamic Transmission Modes of Network Public Opinion on Subevents Clusters of an Emergent Event

Authors: Yuan Xu, Xun Liang, Meina Zhang

Abstract:

The rise and attenuation of the public opinion broadcast of an emergent accident, in the social network, has a close relationship with the dynamic development of its subevents cluster. In this article, we take Tianjin Port explosion's subevents as an example to research the dynamic propagation discipline of Internet public opinion in a sudden accident, and analyze the overall structure of dynamic propagation to propose four different routes for subevents clusters propagation. We also generate network diagrams for the dynamic public opinion propagation, analyze each propagation type specifically. Based on this, suggestions on the supervision and guidance of Internet public opinion broadcast can be made.

Keywords: network dynamic transmission modes, emergent subevents clusters, Tianjin Port explosion, public opinion supervision

Procedia PDF Downloads 263
761 Models of Environmental, Crack Propagation of Some Aluminium Alloys (7xxx)

Authors: H. A. Jawan

Abstract:

This review describes the models of environmental-related crack propagation of aluminum alloys (7xxx) during the last few decades. Acknowledge on effects of different factors on the susceptibility to SCC permits to propose valuable mechanisms on crack advancement. The reliable mechanism of cracking give a possibility to propose the optimum chemical composition and thermal treatment conditions resulting in microstructure the most suitable for real environmental condition and stress state.

Keywords: microstructure, environmental, propagation, mechanism

Procedia PDF Downloads 390
760 Models of Environmental: Cracker Propagation of Some Aluminum Alloys (7xxx)

Authors: H. Jawan

Abstract:

This review describes the models of environmental-related crack propagation of aluminum alloys (7xxx) during the last few decades. Acknowledge on effects of different factors on the susceptibility to SCC permits to propose valuable mechanisms on crack advancement. The reliable mechanism of cracking give a possibility to propose the optimum chemical composition and thermal treatment conditions resulting in microstructure the most suitable for real environmental condition and stress state.

Keywords: microstructure, environmental, propagation, mechanism

Procedia PDF Downloads 369
759 Simulation of Wave Propagation in Multiphase Medium

Authors: Edip Kemal, Sheshov Vlatko, Bojadjieva Julijana, Bogdanovic ALeksandra, Gjorgjeska Irena

Abstract:

The wave propagation phenomenon in porous domains is of great importance in the field of geotechnical earthquake engineering. In these kinds of problems, the elastic waves propagate from the interior to the exterior domain and require special treatment at the computational level since apart from displacement in the solid-state there is a p-wave that takes place in the pore water phase. In this paper, a study on the implementation of multiphase finite elements is presented. The proposed algorithm is implemented in the ANSYS finite element software and tested on one-dimensional wave propagation considering both pore pressure wave propagation and displacement fields. In the simulation of porous media such as soils, the behavior is governed largely by the interaction of the solid skeleton with water and/or air in the pores. Therefore, coupled problems of fluid flow and deformation of the solid skeleton are considered in a detailed way.

Keywords: wave propagation, multiphase model, numerical methods, finite element method

Procedia PDF Downloads 139
758 Analysis of Nonlinear Pulse Propagation Characteristics in Semiconductor Optical Amplifier for Different Input Pulse Shapes

Authors: Suchi Barua, Narottam Das, Sven Nordholm, Mohammad Razaghi

Abstract:

This paper presents nonlinear pulse propagation characteristics for different input optical pulse shapes with various input pulse energy levels in semiconductor optical amplifiers. For simulation of nonlinear pulse propagation, finite-difference beam propagation method is used to solve the nonlinear Schrödinger equation. In this equation, gain spectrum dynamics, gain saturation are taken into account which depends on carrier depletion, carrier heating, spectral-hole burning, group velocity dispersion, self-phase modulation and two photon absorption. From this analysis, we obtained the output waveforms and spectra for different input pulse shapes as well as for different input energies. It shows clearly that the peak position of the output waveforms are shifted toward the leading edge which due to the gain saturation of the SOA for higher input pulse energies. We also analyzed and compared the normalized difference of full-width at half maximum for different input pulse shapes in the SOA.

Keywords: finite-difference beam propagation method, pulse shape, pulse propagation, semiconductor optical amplifier

Procedia PDF Downloads 577
757 Amplification of electromagnetic pulse by conducting cone

Authors: E. S. Manuylovich, V. A. Astapenko, P. A. Golovinsky

Abstract:

The dispersion relation binding the constant of propagation and frequency is calculated for silver cone. The evolution of the electric field of ultrashort pulse during its propagation in conical structure is considered. Increasing of electric field during pulse propagation to the top of the cone is observed. Reduction of the pulse duration at a certain distance is observed. The dependence of minimum pulse duration on initial chirp and cone angle is investigated.

Keywords: ultrashort pulses, surface plasmon polariton, dispersion, silver cone

Procedia PDF Downloads 409
756 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 18
755 Numerical Simulation of Laser ‎Propagation through Turbulent ‎Atmosphere Using Zernike ‎Polynomials

Authors: Mohammad Moradi ‎

Abstract:

In this article, propagation of a laser beam through turbulent ‎atmosphere is evaluated. At first the laser beam is simulated and then ‎turbulent atmosphere will be simulated by using Zernike polynomials. ‎Some parameter like intensity, PSF will be measured for four ‎wavelengths in different Cn2.

Keywords: laser beam propagation, phase screen, turbulent atmosphere, Zernike ‎polynomials

Procedia PDF Downloads 486
754 Evaluation of the Fire Propagation Characteristics of Thermoplastics

Authors: Ji-Hun Choi, Kyoung-Suk Cho, Seung-Un Chae

Abstract:

Consisting of organic compounds, plastic ignites easily and burns fast. In addition, a large amount of toxic gas is produced while it is burning. When plastic is heated, its volume decreases because its surface is melted. The decomposition of its molecular bond generates combustible liquid of low viscosity, which accelerates plastic combustion and spreads the flames. Radiant heat produced in the process propagates the fire to increase the risk of human and property damages. Accordingly, the purpose of this study was to identify chemical, thermal and combustion characteristics of thermoplastic plastics using the fire propagation apparatus based on experimental criteria of ISO 12136 and ASTM E 2058. By the experiment result, as the ignition time increased, the thermal response parameter (TRP) decreased and as the TRP increased, the slope decreased. In other words, the large the TRP was, the longer the time taken for heating and ignition of the material was. It was identified that the fire propagation speed dropped accordingly.

Keywords: fire propagation apparatus (FPA), ISO 12136, thermal response parameter (TRP), fire propagation index (FPI)

Procedia PDF Downloads 180
753 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 131
752 Characteristics of Cumulative Distribution Function of Grown Crack Size at Specified Fatigue Crack Propagation Life under Different Maximum Fatigue Loads in AZ31

Authors: Seon Soon Choi

Abstract:

Magnesium alloy has been widely used in structure such as an automobile. It is necessary to consider probabilistic characteristics of a structural material because a fatigue behavior of a structure has a randomness and uncertainty. The purpose of this study is to find the characteristics of the cumulative distribution function (CDF) of the grown crack size at a specified fatigue crack propagation life and to investigate a statistical crack propagation in magnesium alloys. The statistical fatigue data of the grown crack size are obtained through the fatigue crack propagation (FCP) tests under different maximum fatigue load conditions conducted on the replicated specimens of magnesium alloys. The 3-parameter Weibull distribution is used to find the CDF of grown crack size. The CDF of grown crack size in case of larger maximum fatigue load has longer tail in below 10 percent and above 90 percent. The fatigue failure occurs easily as the tail of CDF of grown crack size becomes long. The fatigue behavior under the larger maximum fatigue load condition shows more rapid propagation and failure mode.

Keywords: cumulative distribution function, fatigue crack propagation, grown crack size, magnesium alloys, maximum fatigue load

Procedia PDF Downloads 264
751 Equations of Pulse Propagation in Three-Layer Structure of As2S3 Chalcogenide Plasmonic Nano-Waveguides

Authors: Leila Motamed-Jahromi, Mohsen Hatami, Alireza Keshavarz

Abstract:

This research aims at obtaining the equations of pulse propagation in nonlinear plasmonic waveguides created with As2S3 chalcogenide materials. Via utilizing Helmholtz equation and first-order perturbation theory, two components of electric field are determined within frequency domain. Afterwards, the equations are formulated in time domain. The obtained equations include two coupled differential equations that considers nonlinear dispersion.

Keywords: nonlinear optics, plasmonic waveguide, chalcogenide, propagation equation

Procedia PDF Downloads 378
750 Electromagnetic Wave Propagation Equations in 2D by Finite Difference Method

Authors: N. Fusun Oyman Serteller

Abstract:

In this paper, the techniques to solve time dependent electromagnetic wave propagation equations based on the Finite Difference Method (FDM) are proposed by comparing the results with Finite Element Method (FEM) in 2D while discussing some special simulation examples.  Here, 2D dynamical wave equations for lossy media, even with a constant source, are discussed for establishing symbolic manipulation of wave propagation problems. The main objective of this contribution is to introduce a comparative study of two suitable numerical methods and to show that both methods can be applied effectively and efficiently to all types of wave propagation problems, both linear and nonlinear cases, by using symbolic computation. However, the results show that the FDM is more appropriate for solving the nonlinear cases in the symbolic solution. Furthermore, some specific complex domain examples of the comparison of electromagnetic waves equations are considered. Calculations are performed through Mathematica software by making some useful contribution to the programme and leveraging symbolic evaluations of FEM and FDM.

Keywords: finite difference method, finite element method, linear-nonlinear PDEs, symbolic computation, wave propagation equations

Procedia PDF Downloads 118
749 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 247
748 The Crack Propagation on Glass in Laser Thermal Cleavage

Authors: Jehnming Lin

Abstract:

In the laser cleavage of glass, the laser is mostly adopted as a heat source to generate a thermal stress state on the substrates. The crack propagation of the soda-lime glass in the laser thermal cleavage with the straight-turning paths was investigated in this study experimentally and numerically. The crack propagation was visualized by a high speed camera with the off-line examination on the micro-crack propagation. The temperature and stress distributions induced by the laser heat source were calculated by ANSYS software based on the finite element method (FEM). With the cutting paths in various turning directions, the experimental and numerical results were in comparison and verified. The fracture modes due to the normal and shear stresses were verified at the turning point of the laser cleavage path. It shows a significant variation of the stress profiles along the straight-turning paths and causes a change on the fracture modes.

Keywords: laser cleavage, glass, fracture, stress analysis

Procedia PDF Downloads 208
747 Modeling of Dam Break Flood Wave Propagation Using HEC-RAS 2D and GIS: A Case Study of Taksebt Dam in Algeria

Authors: Abdelghani Leghouchi

Abstract:

This study aims to predict the consequences associated with the propagation of the flood wave that may occur after the failure of the Taksebt dam and suggest an efficient emergency action plan (EAP) for mitigation purposes. To achieve the objectives of this study, the hydrodynamic model HEC-RAS 2D was used for the flood routing of the dam break wave, which gave an estimate of the hydraulic characteristics downstream the Taksebt dam. Geospatial analysis of the simulation results conducted in a Geographic information system (GIS) environment showed that many residential areas are considered to be in danger in case of the Taksebt dam break event. Based on the obtained results, an emergency actions plan was suggested to moderate the causalities in the downstream area at risk. Overall, the present study showed that the integration of 2D hydraulic modeling and GIS provides great capabilities in providing realistic view of the dam break wave propagation that enhances assessing the associated risks and proposing appropriate mitigation measures.

Keywords: taksebt dam, dam break, wave propagation time, HEC-RAS 2D

Procedia PDF Downloads 75
746 Methodologies for Crack Initiation in Welded Joints Applied to Inspection Planning

Authors: Guang Zou, Kian Banisoleiman, Arturo González

Abstract:

Crack initiation and propagation threatens structural integrity of welded joints and normally inspections are assigned based on crack propagation models. However, the approach based on crack propagation models may not be applicable for some high-quality welded joints, because the initial flaws in them may be so small that it may take long time for the flaws to develop into a detectable size. This raises a concern regarding the inspection planning of high-quality welded joins, as there is no generally acceptable approach for modeling the whole fatigue process that includes the crack initiation period. In order to address the issue, this paper reviews treatment methods for crack initiation period and initial crack size in crack propagation models applied to inspection planning. Generally, there are four approaches, by: 1) Neglecting the crack initiation period and fitting a probabilistic distribution for initial crack size based on statistical data; 2) Extrapolating the crack propagation stage to a very small fictitious initial crack size, so that the whole fatigue process can be modeled by crack propagation models; 3) Assuming a fixed detectable initial crack size and fitting a probabilistic distribution for crack initiation time based on specimen tests; and, 4) Modeling the crack initiation and propagation stage separately using small crack growth theories and Paris law or similar models. The conclusion is that in view of trade-off between accuracy and computation efforts, calibration of a small fictitious initial crack size to S-N curves is the most efficient approach.

Keywords: crack initiation, fatigue reliability, inspection planning, welded joints

Procedia PDF Downloads 332
745 Improving Search Engine Performance by Removing Indexes to Malicious URLs

Authors: Durga Toshniwal, Lokesh Agrawal

Abstract:

As the web continues to play an increasing role in information exchange, and conducting daily activities, computer users have become the target of miscreants which infects hosts with malware or adware for financial gains. Unfortunately, even a single visit to compromised web site enables the attacker to detect vulnerabilities in the user’s applications and force the downloading of multitude of malware binaries. We provide an approach to effectively scan the so-called drive-by downloads on the Internet. Drive-by downloads are result of URLs that attempt to exploit their visitors and cause malware to be installed and run automatically. To scan the web for malicious pages, the first step is to use a crawler to collect URLs that live on the Internet, and then to apply fast prefiltering techniques to reduce the amount of pages that are needed to be examined by precise, but slower, analysis tools (such as honey clients or antivirus programs). Although the technique is effective, it requires a substantial amount of resources. A main reason is that the crawler encounters many pages on the web that are legitimate and needs to be filtered. In this paper, to characterize the nature of this rising threat, we present implementation of a web crawler on Python, an approach to search the web more efficiently for pages that are likely to be malicious, filtering benign pages and passing remaining pages to antivirus program for detection of malwares. Our approaches starts from an initial seed of known, malicious web pages. Using these seeds, our system generates search engines queries to identify other malicious pages that are similar to the ones in the initial seed. By doing so, it leverages the crawling infrastructure of search engines to retrieve URLs that are much more likely to be malicious than a random page on the web. The results shows that this guided approach is able to identify malicious web pages more efficiently when compared to random crawling-based approaches.

Keywords: web crawler, malwares, seeds, drive-by-downloads, security

Procedia PDF Downloads 213
744 Investigated Optimization of Davidson Path Loss Model for Digital Terrestrial Television (DTTV) Propagation in Urban Area

Authors: Pitak Keawbunsong, Sathaporn Promwong

Abstract:

This paper presents an investigation on the efficiency of the optimized Davison path loss model in order to look for a suitable path loss model to design and planning DTTV propagation for small and medium urban areas in southern Thailand. Hadyai City in Songkla Province is chosen as the case study to collect the analytical data on the electric field strength. The optimization is conducted through the least square method while the efficiency index is through the statistical value of relative error (RE). The result of the least square method is the offset and slop of the frequency to be used in the optimized process. The statistical result shows that RE of the old Davidson model is at the least when being compared with the optimized Davison and the Hata models. Thus, the old Davison path loss model is the most accurate that further becomes the most optimized for the plan on the propagation network design.

Keywords: DTTV propagation, path loss model, Davidson model, least square method

Procedia PDF Downloads 318
743 Reliable Line-of-Sight and Non-Line-of-Sight Propagation Channel Identification in Ultra-Wideband Wireless Networks

Authors: Mohamed Adnan Landolsi, Ali F. Almutairi

Abstract:

The paper addresses the problem of line-of-sight (LOS) vs. non-line-of-sight (NLOS) propagation link identification in ultra-wideband (UWB) wireless networks, which is necessary for improving the accuracy of radiolocation and positioning applications. A LOS/NLOS likelihood hypothesis testing approach is applied based on exploiting distinctive statistical features of the channel impulse response (CIR) using parameters related to the “skewness” of the CIR and its root mean square (RMS) delay spread. A log-normal fit is presented for the probability densities of the CIR parameters. Simulation results show that different environments (residential, office, outdoor, etc.) have measurable differences in their CIR parameters’ statistics, which is then exploited in determining the nature of the propagation channels. Correct LOS/NLOS channel identification rates exceeding 90% are shown to be achievable for most types of environments. Additional improvement is also obtained by combining both CIR skewness and RMS delay statistics.

Keywords: UWB, propagation, LOS, NLOS, identification

Procedia PDF Downloads 216
742 Lamb Waves in Plates Subjected to Uniaxial Stresses

Authors: Munawwar Mohabuth, Andrei Kotousov, Ching-Tai Ng

Abstract:

On the basis of the finite deformation theory, the effect of homogeneous stress on the propagation of Lamb waves in an initially isotropic hyperelastic plate is analysed. The equations governing the propagation of small amplitude waves in the prestressed plate are derived using the theory of small deformations superimposed on large deformations. By enforcing traction free boundary conditions at the upper and lower surfaces of the plate, acoustoelastic dispersion equations for Lamb wave propagation are obtained, which are solved numerically. Results are given for an aluminum plate subjected to a range of applied stresses.

Keywords: acoustoelasticity, dispersion, finite deformation, lamb waves

Procedia PDF Downloads 447
741 Study of the S-Bend Intake Hammershock Based on Improved Delayed Detached Eddy Simulation

Authors: Qun-Feng Zhang, Pan-Pan Yan, Jun Li, Jun-Qing Lei

Abstract:

Numerical investigation of hammershock propagation in the S-bend intake caused by engine surge has been conducted by using Improved Delayed Detach-Eddy Simulation (IDDES). The effects of surge signatures on hammershock characteristics are obtained. It was shown that once the hammershock is produced, it moves upward to the intake entrance quickly with constant speed, however, the strength of hammershock keeps increasing. Meanwhile, being influenced by the centrifugal force, the hammershock strength on the larger radius side is much larger. Hammershock propagation speed and strength are sensitive to the ramp upgradient of surge signature. A larger ramp up gradient results in higher propagation speed and greater strength. Nevertheless, ramp down profile of surge signature have no obvious effect on the propagation speed and strength of hammershock. Increasing the maximum value of surge signature leads to enhance in the intensity of hammershock, they approximately match quadratic function distribution law.

Keywords: hammershock, IDDES, S-bend, surge signature

Procedia PDF Downloads 270
740 Analysis of 3 dB Directional Coupler Based On Silicon-On-Insulator (SOI) Large Cross-Section Rib Waveguide

Authors: Nurdiani Zamhari, Abang Annuar Ehsan

Abstract:

The 3 dB directional coupler is designed by using silicon-on-insulator (SOI) large cross-section and simulate by Beam Propagation Method at the communication wavelength of 1.55 µm and 1.48 µm. The geometry is shaped with rib height (H) of 6 µm and varied in step factor (r) which is 0.5, 0.6, 0.7 and 0.8. The wave guide spacing is also fixed to 5 µm and the slab width is symmetrical. In general, the 3 dB coupling lengths for four different cross-sections are several millimetre long. The 1.48 of wavelength give the longer coupling length if compare to 1.55 at the same step factor (r). Besides, the low loss propagation is achieved with less than 2 % of propagation loss.

Keywords: 3 dB directional couplers, silicon-on-insulator, symmetrical rib waveguide, OptiBPM 9

Procedia PDF Downloads 490
739 Mechanism of Failure of Pipeline Steels in Sour Environment

Authors: Abhishek Kumar

Abstract:

X70 pipeline steel was electrochemically charged with hydrogen for different durations in order to find crack nucleation and propagation sites. After 3 hours charging, suitable regions for crack initiation and propagation were found. These regions were studied by OM, SEM, EDS and later Vicker hardness test was done. The results brought out that HIC cracks nucleated from regions rich of inclusions and further propagated through the segregation area of some elements, such as manganese, carbon, silicon and sulfur. It is worth-mentioning that all these potential sites for crack nucleation and propagation appeared at the centre of cross section of the specimens. Additionally, cracked area has harder phase than the non-cracked area which was confirmed by hardness test.

Keywords: X70 steel, morphology of inclusions, SEM/EDS/OM, simulation, statistical data

Procedia PDF Downloads 292
738 Macro-Somatic Clonal Propagation of Tree-Borne Oil Seed Species (Calophyllum inophyllum Linn. and Pongamia pinnata Mer.)

Authors: Amelyn M. Ambal, Jose Hermis Patricio

Abstract:

A macro-somatic clonal propagation study was undertaken to determine the effects of method of propagation, rooting hormone, and level of rooting hormone concentration of TBOS (Calophyllum inophyllum Mer. and Pongamia pinnata L.). A factorial experiment in SSSPD with three replications was used in the study and analyzed using ANOVA and LSD. Open mist propagation is effective for rooting Calophyllum inophyllum and Pongamia pinnata cuttings as it gave statistically higher number of adventitious roots, longer length of roots, and higher rooting percentage. C. inophyllum cuttings exhibit statistically higher rooting percentage compared to P. pinnata cuttings when subjected to open mist method and treated with 600 ppm of NAA. NAA is more effective than IBA in terms of number and length of roots, and rooting percentage produced. However, levels of hormone concentration were not generally effective on the rooting performance and shoot production of both species.

Keywords: adventitious roots, Calophyllum, close-mist, macro-somatic clonal propagation, Pongamia, open-mist

Procedia PDF Downloads 436