Search results for: code reuse attack
1495 Use of Fine Recycled Aggregates in Normal Concrete Production
Authors: Vignesh Pechiappan Ayyathurai, Mukesh Limbachiya, Hsein Kew
Abstract:
There is a growing interest in using recycled, secondary use and industrial by product materials in high value commercial applications. Potential high volume applications include use of fine aggregate in flowable fill or as a component in manufactured aggregates. However, there is much scientific, as well as applied research needed in this area due to lack to availability of data on the mechanical and environmental properties of elements or products produced using fine recycled aggregates. The principle objectives of this research are to synthesize existing data on the beneficial reuse of fine recycled materials and to develop extensive testing programme for assessing and establishing engineering and long term durability properties of concrete and other construction products produced using such material for use in practical application widely. This paper is a research proposal for PhD admission. The proposed research aims to supply the necessary technical, as well as practical information on fine recycled aggregate concrete to the construction industry for promoting its wider use within the construction industry. Furthermore, to disseminate research outcomes to the local authorities for consideration of use of fine recycled aggregate concrete in various applications.Keywords: FRA, fine aggregate, recycling, concrete
Procedia PDF Downloads 3211494 Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce
Authors: Wenjie Qin, Kewei Lv
Abstract:
In 1996, Boneh and Venkatesan proposed the Hidden Number Problem (HNP) and proved the most significant bits (MSB) of computational Diffie-Hellman key exchange scheme and related schemes are unpredictable bits. They also gave a method which is a lattice rounding technique to solve HNP in non-uniform model. In this paper, we put forward a new concept that is Schnorr-MSB-HNP. We also reduce the problem of solving Schnorr signature private key with a few consecutive most significant bits of random nonce (used at each signature generation) to Schnorr-MSB-HNP, then we use the rounding technique to solve the Schnorr-MSB-HNP. We have come to the conclusion that if there is a ‘miraculous box’ which inputs the random nonce and outputs 2loglogq (q is a prime number) most significant bits of nonce, the signature private key will be obtained by choosing 2logq signature messages randomly. Thus we get an attack on the Schnorr signature private key.Keywords: rounding technique, most significant bits, Schnorr signature algorithm, nonce, Schnorr-MSB-HNP
Procedia PDF Downloads 2301493 A Simple Chemical Approach to Regenerating Strength of Thermally Recycled Glass Fibre
Authors: Sairah Bashir, Liu Yang, John Liggat, James Thomason
Abstract:
Glass fibre is currently used as reinforcement in over 90% of all fibre-reinforced composites produced. The high rigidity and chemical resistance of these composites are required for optimum performance but unfortunately results in poor recyclability; when such materials are no longer fit for purpose, they are frequently deposited in landfill sites. Recycling technologies, for example, thermal treatment, can be employed to address this issue; temperatures typically between 450 and 600 °C are required to allow degradation of the rigid polymeric matrix and subsequent extraction of fibrous reinforcement. However, due to the severe thermal conditions utilised in the recycling procedure, glass fibres become too weak for reprocessing in second-life composite materials. In addition, more stringent legislation is being put in place regarding disposal of composite waste, and so it is becoming increasingly important to develop long-term recycling solutions for such materials. In particular, the development of a cost-effective method to regenerate strength of thermally recycled glass fibres will have a positive environmental effect as a reduced volume of composite material will be destined for landfill. This research study has demonstrated the positive impact of sodium hydroxide (NaOH) and potassium hydroxide (KOH) solution, prepared at relatively mild temperatures and at concentrations of 1.5 M and above, on the strength of heat-treated glass fibres. As a result, alkaline treatments can potentially be implemented to glass fibres that are recycled from composite waste to allow their reuse in second-life materials. The optimisation of the strength recovery process is being conducted by varying certain reaction parameters such as molarity of alkaline solution and treatment time. It is believed that deep V-shaped surface flaws exist commonly on severely damaged fibre surfaces and are effectively removed to form smooth, U-shaped structures following alkaline treatment. Although these surface flaws are believed to be present on glass fibres they have not in fact been observed, however, they have recently been discovered in this research investigation through analytical techniques such as AFM (atomic force microscopy) and SEM (scanning electron microscopy). Reaction conditions such as molarity of alkaline solution affect the degree of etching of the glass fibre surface, and therefore the extent to which fibre strength is recovered. A novel method in determining the etching rate of glass fibres after alkaline treatment has been developed, and the data acquired can be correlated with strength. By varying reaction conditions such as alkaline solution temperature and molarity, the activation energy of the glass etching process and the reaction order can be calculated respectively. The promising results obtained from NaOH and KOH treatments have opened an exciting route to strength regeneration of thermally recycled glass fibres, and the optimisation of the alkaline treatment process is being continued in order to produce recycled fibres with properties that match original glass fibre products. The reuse of such glass filaments indicates that closed-loop recycling of glass fibre reinforced composite (GFRC) waste can be achieved. In fact, the development of a closed-loop recycling process for GFRC waste is already underway in this research study.Keywords: glass fibers, glass strengthening, glass structure and properties, surface reactions and corrosion
Procedia PDF Downloads 2541492 Visco-Hyperelastic Finite Element Analysis for Diagnosis of Knee Joint Injury Caused by Meniscal Tearing
Authors: Eiji Nakamachi, Tsuyoshi Eguchi, Sayo Yamamoto, Yusuke Morita, H. Sakamoto
Abstract:
In this study, we aim to reveal the relationship between the meniscal tearing and the articular cartilage injury of knee joint by using the dynamic explicit finite element (FE) method. Meniscal injuries reduce its functional ability and consequently increase the load on the articular cartilage of knee joint. In order to prevent the induction of osteoarthritis (OA) caused by meniscal injuries, many medical treatment techniques, such as artificial meniscus replacement and meniscal regeneration, have been developed. However, it is reported that these treatments are not the comprehensive methods. In order to reveal the fundamental mechanism of OA induction, the mechanical characterization of meniscus under the condition of normal and injured states is carried out by using FE analyses. At first, a FE model of the human knee joint in the case of normal state – ‘intact’ - was constructed by using the magnetron resonance (MR) tomography images and the image construction code, Materialize Mimics. Next, two types of meniscal injury models with the radial tears of medial and lateral menisci were constructed. In FE analyses, the linear elastic constitutive law was adopted for the femur and tibia bones, the visco-hyperelastic constitutive law for the articular cartilage, and the visco-anisotropic hyperelastic constitutive law for the meniscus, respectively. Material properties of articular cartilage and meniscus were identified using the stress-strain curves obtained by our compressive and the tensile tests. The numerical results under the normal walking condition revealed how and where the maximum compressive stress occurred on the articular cartilage. The maximum compressive stress and its occurrence point were varied in the intact and two meniscal tear models. These compressive stress values can be used to establish the threshold value to cause the pathological change for the diagnosis. In this study, FE analyses of knee joint were carried out to reveal the influence of meniscal injuries on the cartilage injury. The following conclusions are obtained. 1. 3D FE model, which consists femur, tibia, articular cartilage and meniscus was constructed based on MR images of human knee joint. The image processing code, Materialize Mimics was used by using the tetrahedral FE elements. 2. Visco-anisotropic hyperelastic constitutive equation was formulated by adopting the generalized Kelvin model. The material properties of meniscus and articular cartilage were determined by curve fitting with experimental results. 3. Stresses on the articular cartilage and menisci were obtained in cases of the intact and two radial tears of medial and lateral menisci. Through comparison with the case of intact knee joint, two tear models show almost same stress value and higher value than the intact one. It was shown that both meniscal tears induce the stress localization in both medial and lateral regions. It is confirmed that our newly developed FE analysis code has a potential to be a new diagnostic system to evaluate the meniscal damage on the articular cartilage through the mechanical functional assessment.Keywords: finite element analysis, hyperelastic constitutive law, knee joint injury, meniscal tear, stress concentration
Procedia PDF Downloads 2431491 Study of Electrocoagulation on the Elimination of Chromium in Waste Water From an Electroplating Bath Using Aluminium Electrodes
Authors: Salim Ahmed
Abstract:
Electrocoagulation has proven its effectiveness in industrial effluent treatment by eliminating pollutants, particularly metallic ones. The electrochemical processes that occur at aluminium electrodes give excellent performance. In this work, electrocoagulation tests were carried out on an industrial effluent from an electroplating bath located in Casablanca (Morocco). The aim was to remove chromium and reuse the purified water for other purposes within the company. To this end, we have optimised the operating parameters that affect the efficiency of electrocoagulation, such as electrical voltage, electrode material, stirring speed and distance between electrodes. We also evaluated these parameters. The effect on pH, conductivity, turbidity and chromium concentration. The tests were carried out in a perfectly stirred reactor on an industrial solution rich in chromium. The effluent concentration was 1000 mg/L of Cr6+. Chromium removal efficiency was determined for the following operating conditions: aluminium electrodes, regulated voltage of 6 volts and 12 volts, optimum stirring speed of 600 rpm and distance between electrodes of 2 cm. The sludge produced by electrocoagulation was characterised by X-ray diffractometry, infrared spectroscopy (IR) and scanning electron microscopy (SEM).Keywords: wastewater, chromium, electrocoagulation, aluminium, aluminium hydroxide
Procedia PDF Downloads 901490 Antibacterial Activity of Noble Metal Functionalized Magnetic Core-Zeolitic Shell Nanostructures
Authors: Mohsen Padervand
Abstract:
Functionalized magnetic core-zeolitic shell nanostructures were prepared by the hydrothermal and coprecipitation methods. The products were characterized by Vibrating Sample Magnetometer (VSM), X-ray powder diffraction (XRD), Fourier Transform Infrared spectra (FTIR), nitrogen adsorption-desorption isotherms (BET) and Transmission Electron Microscopy (TEM). The growth of mordenite nanoparticles on the surface of silica coated nickel ferrite nanoparticles at the presence of organic templates was well approved. The antibacterial activity of prepared samples was investigated by the inactivation of E.coli as a gram negative bacterium. A new mechanism was proposed to inactivate the bacterium over the prepared samples. Minimum Inhibitory Concentration (MIC) and reuse ability were studied too. TEM images of the destroyed microorganism after the treatment time were applied to illustrate the inactivation mechanism. The interaction of the noble metals with organic components on the surface of nanostructures studied theoretically and the results were used to interpret the experimental results.Keywords: nickel ferrite nanoparticles, magnetic core-zeolitic shell, antibacterial activity, E. coli
Procedia PDF Downloads 3291489 Monte Carlo Simulations of LSO/YSO for Dose Evaluation in Photon Beam Radiotherapy
Authors: H. Donya
Abstract:
Monte Carlo (MC) techniques play a fundamental role in radiotherapy. A two non-water-equivalent of different media were used to evaluate the dose in water. For such purpose, Lu2SiO5 (LSO) and Y2SiO5 (YSO) orthosilicates scintillators are chosen for MC simulation using Penelope code. To get higher efficiency in dose calculation, variance reduction techniques are discussed. Overall results of this investigation ensured that the LSO/YSO bi-media a good combination to tackle over-response issue in dynamic photon radiotherapy.Keywords: Lu2SiO5 (LSO) and Y2SiO5 (YSO) orthosilicates, Monte Carlo, correlated sampling, radiotherapy
Procedia PDF Downloads 4051488 Heat Transfer and Friction Factor Study for Triangular Duct Solar Air Heater Having Discrete V-Shaped Ribs
Authors: Varun Goel
Abstract:
Solar energy is a good option among renewable energy resources due to its easy availability and abundance. The simplest and most efficient way to utilize solar energy is to convert it into thermal energy and this can be done with the help of solar collectors. The thermal performance of such collectors is poor due to less heat transfer from the collector surface to air. In this work, experimental investigations of single pass solar air heater having triangular duct and provided with roughness element on the underside of the absorber plate. V-shaped ribs are used for investigation having three different values of relative roughness pitch (p/e) ranges from 4-16 for a fixed value of angle of attack (α), relative roughness height (e/Dh) and a relative gap distance (d/x) values are 60°, 0.044 and 0.60 respectively. Result shows that considerable augmentation in heat transfer has been obtained by providing roughness.Keywords: artificial roughness, solar air heater, triangular duct, V-shaped ribs
Procedia PDF Downloads 4511487 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation
Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal
Abstract:
We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).Keywords: authentication, edge computing, industrial IoT, post-quantum resistance
Procedia PDF Downloads 1951486 A Goal-Driven Crime Scripting Framework
Authors: Hashem Dehghanniri
Abstract:
Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.Keywords: attack modelling, crime commission process, crime script, situational crime prevention
Procedia PDF Downloads 1251485 Aerodynamics of Nature Inspired Turbine Blade Using Computational Simulation
Authors: Seung Ki Lee, Richard Kyung
Abstract:
In the airfoil analysis, as the camber is greater, the minimal angle of attack causing the stall and maximum lift force increases. The shape of the turbine blades is similar to the shape of the wings of planes. After major wars, many remarkable blade shapes are made through researches about optimal blade shape. The blade shapes developed by National Advisory Committee for Aeronautics, NACA, is well known. In this paper, using computational and numerical analysis, the NACA airfoils are analyzed. This research shows that the blades vary with their thickness, which thinner blades are expected to be better. There is no significant difference of coefficient of lift due to the difference in thickness, but the coefficient of drag increases as the thickness increases.Keywords: blades, drag force, national advisory committee for aeronautics airfoils, turbine
Procedia PDF Downloads 2241484 Experimental and Numerical Modeling of Dynamic Axial Crushing of a Composite Glass/PEHD
Authors: Mahmoudi Noureddine, Kaou Abdellah
Abstract:
Energy absorption is a major requirement for automotive structures. Although crashworthy structures of composite based glass fiber have exhibited energy absorption greater than similar at other composites structures, the crush process in many cases is accompanied by fracture, rather than by plastic deformation. The crash experiments show that the tubes are crushed in progressive manner start from one end of the tubes and delamination takes place between the layers. To better understand details of the crash process, ABAQUS finite element code is used.Keywords: Energy absorption, crash, PEHD
Procedia PDF Downloads 4961483 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys
Authors: Chalee Thammarat
Abstract:
Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security
Procedia PDF Downloads 4281482 Impact of Brexit on the Structure of the European Insurance Market: A Solvency and Financial Condition Report Content Analysis of UK Insurance Companies
Authors: Antonia Müller, Svend Reuse
Abstract:
The Brexit referendum in June 2016 led to different publications analysing potential consequences for European and British insurance companies under the European Passport. This study addresses a research gap, regarding the measures taken by insurance companies based in the United Kingdom and thus on structural changes to the European insurance market by an innovative structured Solvency and Financial Condition Report content analysis. In scope are all insurance companies based in the United Kingdom, that fall under the Solvency II supervisory regime. The results show that the majority of British Solvency II insurance companies in scope, conducting cross-border business to the European Union, have applied and reported measures to be able to continue operating this cross-border business after Brexit. In addition, the study shows that 34 new insurance companies based in the European Union were established as a result of Brexit, indicating structural changes to the European insurance market.Keywords: brexit, europe, insurance market, solvency and financial condition repot, structural changes
Procedia PDF Downloads 2041481 Recovery of Dredged Sediments With Lime or Cement as Platform Materials for Use in a Roadway
Authors: Abriak Yassine, Zri Abdeljalil, Benzerzour Mahfoud., Hadj Sadok Rachid, Abriak Nor-Edine
Abstract:
In this study, firstly, the study of the capacity reuse of dredged sediments and treated sediments with lime or cement were used in an establishment layer and the base layer of the roadway. Also, the analysis of mineral changes caused by the addition of lime or cement on the way as described in the mechanical results of stabilised sediments. After determining the quantity of lime and cement required to stabilise the sediment, the compaction characteristics were studied using the modified Proctor method. Then the evolution of the three parameters, that is, ideal water content and maximum dry density had been determined. Mechanical exhibitions can be assessed across the resistance to compression, flexibility modulus and the resistance under traction. The resistance of the formulation treated with cement addition (ROLAC®645) increase with the quantity of ROLAC®645. Traction resistances and the elastic modulus were utilized to assess the potential of the formulation as road construction materials utilizing classification diagram. The results show the various formulations with ROLAC® 645may be employed in subgrades and foundation layers for roads.Keywords: cement, dredged, sediment, foundation layer, resistance
Procedia PDF Downloads 971480 A Retrospective Cohort Study on an Outbreak of Gastroenteritis Linked to a Buffet Lunch Served during a Conference in Accra
Authors: Benjamin Osei Tutu, Sharon Annison
Abstract:
On 21st November, 2016, an outbreak of foodborne illness occurred after a buffet lunch served during a stakeholders’ consultation meeting held in Accra. An investigation was conducted to characterise the affected people, determine the etiologic food, the source of contamination and the etiologic agent and to implement appropriate public health measures to prevent future occurrences. A retrospective cohort study was conducted via telephone interviews, using a structured questionnaire developed from the buffet menu. A case was defined as any person suffering from symptoms of foodborne illness e.g. diarrhoea and/or abdominal cramps after eating food served during the stakeholder consultation meeting in Accra on 21st November, 2016. The exposure status of all the members of the cohort was assessed by taking the food history of each respondent during the telephone interview. The data obtained was analysed using Epi Info 7. An environmental risk assessment was conducted to ascertain the source of the food contamination. Risks of foodborne infection from the foods eaten were determined using attack rates and odds ratios. Data was obtained from 54 people who consumed food served during the stakeholders’ meeting. Out of this population, 44 people reported with symptoms of food poisoning representing 81.45% (overall attack rate). The peak incubation period was seven hours with a minimum and maximum incubation periods of four and 17 hours, respectively. The commonly reported symptoms were diarrhoea (97.73%, 43/44), vomiting (84.09%, 37/44) and abdominal cramps (75.00%, 33/44). From the incubation period, duration of illness and the symptoms, toxin-mediated food poisoning was suspected. The environmental risk assessment of the implicated catering facility indicated a lack of time/temperature control, inadequate knowledge on food safety among workers and sanitation issues. Limited number of food samples was received for microbiological analysis. Multivariate analysis indicated that illness was significantly associated with the consumption of the snacks served (OR 14.78, P < 0.001). No stool and blood or samples of etiologic food were available for organism isolation; however, the suspected etiologic agent was Staphylococcus aureus or Clostridium perfringens. The outbreak could probably be due to the consumption of unwholesome snack (tuna sandwich or chicken. The contamination and/or growth of the etiologic agent in the snack may be due to the breakdown in cleanliness, time/temperature control and good food handling practices. Training of food handlers in basic food hygiene and safety is recommended.Keywords: Accra, buffet, conference, C. perfringens, cohort study, food poisoning, gastroenteritis, office workers, Staphylococcus aureus
Procedia PDF Downloads 2291479 Effect of Compaction Energy on the Compaction of Soils with Low Water Content in the Semi-arid Region of Chlef
Authors: Obeida Aiche, Mohamed Khiatine, Medjnoun Amal, Ramdane Bahar
Abstract:
Soil compaction is one of the most challenging tasks in the construction of road embankments, railway platforms, and earth dams. Stability and durability are mainly related to the nature of the materials used and the type of soil in place. However, nature does not always offer the engineer materials with the right water content, especially in arid and semi-arid regions where obtaining the optimum Proctor water content requires the addition of considerable quantities of water. The current environmental context does not allow for the rational use of water, especially in arid and semi-arid regions, where it is preferable to preserve water resources for the benefit of the local population. Low water compaction can be an interesting approach as it promotes the reuse of earthworks materials in their dry or very dry state. Thanks to techniques in the field of soil compaction, such as vibratory compactors, which have made it possible to increase the compaction energy considerably, it is possible for some materials to obtain a satisfactory quality by compacting at low water contents or at least lower than the optimum determined by the Proctor test. This communication deals with the low water content compaction of soils in the semi-arid zone of the Chlef region in Algeria by increasing the compaction energy.Keywords: compaction, soil, low water content, compaction energy
Procedia PDF Downloads 1071478 Overview About Sludge Produced From Treatment Plant of Bahr El-Baqar Drain and Reusing It With Cement in Outdoor Paving
Authors: Khaled M.Naguib, Ahmed M.Noureldin
Abstract:
This paper aims to achieve many goals such as knowing (quantities produced- main properties- characteristics) of sludge produced from Bahr EL-Baqar drains treatment plant. This prediction or projection was made by laboratory analysis and modelling of Model samples from sludge depending on many studies that have previously done, second check the feasibility and do a risk analysis to know the best alternatives for reuse in producing secondary products that add value to sludge. Also, to know alternatives that have no value to add. All recovery methods are relatively very expensive and challenging to be done in this mega plant, so the recommendation from this study is to use the sludge as a coagulant to reduce some compounds or in secondary products. The study utilized sludge-cement replacement percentages of 10%, 20%, 30%, 40% and 50%. Produced tiles were tested for water absorption and breaking (bending) strength. The study showed that all produced tiles exhibited a water absorption ratio of around 10%. The study concluded that produced tiles, except for 50% sludge-cement replacement, comply with the breaking strength requirements of 2.8 MPa for tiles for external use.Keywords: cement, tiles, water treatment sludge, breaking strength, absorption, heavy metals, risk analysis
Procedia PDF Downloads 1051477 Two-Dimensional Dynamics Motion Simulations of F1 Rare Wing-Flap
Authors: Chaitanya H. Acharya, Pavan Kumar P., Gopalakrishna Narayana
Abstract:
In the realm of aerodynamics, numerous vehicles incorporate moving components to enhance their performance. For instance, airliners deploy hydraulically operated flaps and ailerons during take-off and landing, while Formula 1 racing cars utilize hydraulic tubes and actuators for various components, including the Drag Reduction System (DRS). The DRS, consisting of a rear wing and adjustable flaps, plays a crucial role in overtaking manoeuvres. The DRS has two positions: the default position with the flaps down, providing high downforce, and the lifted position, which reduces drag, allowing for increased speed and aiding in overtaking. Swift deployment of the DRS during races is essential for overtaking competitors. The fluid flow over the rear wing flap becomes intricate during deployment, involving flow reversal and operational changes, leading to unsteady flow physics that significantly influence aerodynamic characteristics. Understanding the drag and downforce during DRS deployment is crucial for determining race outcomes. While experiments can yield accurate aerodynamic data, they can be expensive and challenging to conduct across varying speeds. Computational Fluid Dynamics (CFD) emerges as a cost-effective solution to predict drag and downforce across a range of speeds, especially with the rapid deployment of the DRS. This study employs the finite volume-based solver Ansys Fluent, incorporating dynamic mesh motions and a turbulent model to capture the complex flow phenomena associated with the moving rear wing flap. A dedicated section for the rare wing-flap is considered in the present simulations, and the aerodynamics of these sections closely resemble S1223 aerofoils. Before delving into the simulations of the rare wing-flap aerofoil, numerical results undergo validation using experimental data from an NLR flap aerofoil case, encompassing different flap angles at two distinct angles of attack was carried out. The increase in flap angle as increase in lift and drag is observed for a given angle of attack. The simulation methodology for the rare-wing-flap aerofoil case involves specific time durations before lifting the flap. During this period, drag and downforce values are determined as 330 N and 1800N, respectively. Following the flap lift, a noteworthy reduction in drag to 55 % and a decrease in downforce to 17 % are observed. This understanding is critical for making instantaneous decisions regarding the deployment of the Drag Reduction System (DRS) at specific speeds, thereby influencing the overall performance of the Formula 1 racing car. Hence, this work emphasizes the utilization of dynamic mesh motion methodology to predict the aerodynamic characteristics during the deployment of the DRS in a Formula 1 racing car.Keywords: DRS, CFD, drag, downforce, dynamics mesh motion
Procedia PDF Downloads 931476 Applying an Application-Based Knowledge Capturing and Reusing for Construction Consultant Organizations Applying
Authors: Phan Nghiem Vu, Le Tuan Vu, Ta Quang Tai
Abstract:
Knowledge Management effectively is critical to the survival and advance of a company, especially in company-based industries such as construction. Knowledge management practice is crucial to the survival and progress of a company, especially company-based knowledge such as construction consultancy. Effective knowledge management practices are very significant to the competitive and development of a consulting organization. Hence, the success of knowledge management implementation depends on knowledge capturing and reusing effectively. In this paper, a survey was carried out of engineers and managers with experience in seven construction consulting organizations that provide services on the north-central coast of Vietnam. The main objectives of the survey to finding out how these organizations capture and reuse knowledge and significant barriers to the implementation of knowledge management. A conceptual framework based-on Trello application is proposed to formalize the knowledge-capturing and reusing process within construction consulting companies. It is showed that the conceptual framework could be used to manage both implicit and explicit knowledge effectively in construction consultant organizations.Keywords: knowledge management, construction consultant organization, knowledge capturing, reusing knowledge, application-based technology
Procedia PDF Downloads 1281475 Countering Terrorism through Social Media: Case Study in Indonesia
Authors: Mauly Budiyanti, Aisyah M. Anggiana
Abstract:
Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.Keywords: Indonesia, national security, social media, terrorism.
Procedia PDF Downloads 2181474 Technology Impact on the Challenge between Human Rights and Cyber Terrorism
Authors: Abanoub Zare Zakaria Herzalla
Abstract:
The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 461473 Further Investigation of Core Degradation Using Quench Test Facility Results
Authors: Antoaneta Stefanova, Rositsa Gencheva, Pavlin Groudev
Abstract:
This paper presents an application of the ASTEC V2r3p3 computer code for simulation of QUENCH-12 experiment. The test has been performed to investigate the behavior of VVER type of fuel assemblies during severe accident conditions. In the performed analyses it has been assessed the mass of generated hydrogen during the experiment flooding of overheated core. The comparison of ASTECv2r3p3 calculated results with measured test data shows good agreement.Keywords: hydrogen production, VVER, QUENCH facility, severe accident, reactor core
Procedia PDF Downloads 2291472 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia
Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana
Abstract:
Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom
Procedia PDF Downloads 4511471 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution
Authors: Shenouda Farag Aziz Ibrahim
Abstract:
The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 371470 Study of Nitrogen Species Fate and Transport in Subsurface: To Assess the Impact of Wastewater Irrigation
Authors: C. Mekala, Indumathi M. Nambi
Abstract:
Nitrogen pollution in groundwater arising from wastewater and fertilizer application through vadose zone is a major problem and it causes a prime risk to groundwater based drinking water supplies. Nitrogenous compounds namely ammonium, nitrate and nitrite fate and transport in soil subsurface were studied experimentally. The major process like sorption, leaching, biotransformation involving microbial growth kinetics, and biological clogging due to biomass growth were assessed and modeled with advection-dispersion reaction equations for ammonium, nitrate and acetate in a saturated, heterogeneous soil medium. The transport process was coupled with freundlich sorption and monod inhibition kinetics for immobile bacteria and permeability reduction due to biomass growth will be verified and validated with the numerical model. This proposed mathematical model will be very helpful in the development of a management model for a sustainable and safe wastewater reuse strategies such as irrigation and groundwater recharge.Keywords: nitrogen species transport, transformation, biological clogging, biokinetic parameters, contaminant transport model, saturated soil
Procedia PDF Downloads 3981469 Relevance of Copyright and Trademark in the Gaming Industry
Authors: Deeksha Karunakar
Abstract:
The gaming industry is one of the biggest industries in the world. Video games are interactive works of authorship that require the execution of a computer programme on specialized hardware but which also incorporate a wide variety of other artistic mediums, such as music, scripts, stories, video, paintings, and characters, into which the player takes an active role. Therefore, video games are not made as singular, simple works but rather as a collection of elements that, if they reach a certain level of originality and creativity, can each be copyrighted on their own. A video game is made up of a wide variety of parts, all of which combine to form the overall sensation that we, the players, have while playing. The entirety of the components is implemented in the form of software code, which is then translated into the game's user interface. Even while copyright protection is already in place for the coding of software, the work that is produced because of that coding can also be protected by copyright. This includes the game's storyline or narrative, its characters, and even elements of the code on their own. In each sector, there is a potential legal framework required, and the gaming industry also requires legal frameworks. This represents the importance of intellectual property laws in each sector. This paper will explore the beginnings of video games, the various aspects of game copyrights, and the approach of the courts, including examples of a few different instances. Although the creative arts have always been known to draw inspiration from and build upon the works of others, it has not always been simple to evaluate whether a game has been cloned. The video game business is experiencing growth as it has never seen before today. The majority of today's video games are both pieces of software and works of audio-visual art. Even though the existing legal framework does not have a clause specifically addressing video games, it is clear that there is a great many alternative means by which this protection can be granted. This paper will represent the importance of copyright and trademark laws in the gaming industry and its regulations with the help of relevant case laws via utilizing doctrinal methodology to support its findings. The aim of the paper is to make aware of the applicability of intellectual property laws in the gaming industry and how the justice system is evolving to adapt to such new industries. Furthermore, it will provide in-depth knowledge of their relationship with each other.Keywords: copyright, DMCA, gaming industry, trademark, WIPO
Procedia PDF Downloads 641468 Monitoring and Evaluation of the Reverse Osmosis Reject Wastewater from the Sulaibiya Wastewater Treatment Plant in Kuwait
Authors: Mishari Khajah, Mohd. Elmuntasir Ahmed, Abdullah Al-Matouq, Farah Al-Ajeel, Fatemah Dashti, Ahmed Shishter
Abstract:
The overall aim of this study was to monitor and evaluate the effluent quality of a reverse osmosis (RO) reject wastewater from the biggest wastewater treatment plant in the world that is using RO and ultrafiltration membranes in their processes to reclaim water for indirect potable water reuse from municipal wastewaters. The RO reject wastewater or brine included various contaminants that could harm the human health and the environment such as trace organics, organic matters, heavy metals, nutrients and pathogens. Unfortunately, there are no legally binding regulatory guidelines for brine management in Kuwait as many countries around the world. This study monitors and evaluate the RO reject wastewater (brine) generated from the Sulaibiya Wastewater Treatment Plant. Samples were collected and analyzed about 37 parameters for one-year period, twice a month, and compare it to Kuwait Environment Public Authority, KEPA. Results showed that the heavy metals parameters were above KEPA standards, which needs to be treated.Keywords: domestic wastewater, management, potable water, RO reject wastewater, Sulaibiya wastewater treatment plant
Procedia PDF Downloads 881467 Droplet Entrainment and Deposition in Horizontal Stratified Two-Phase Flow
Authors: Joshua Kim Schimpf, Kyun Doo Kim, Jaseok Heo
Abstract:
In this study, the droplet behavior of under horizontal stratified flow regime for air and water flow in horizontal pipe experiments from a 0.24 m, 0.095 m, and 0.0486 m size diameter pipe are examined. The effects of gravity, pipe diameter, and turbulent diffusion on droplet deposition are considered. Models for droplet entrainment and deposition are proposed that considers developing length. Validation for experimental data dedicated from the REGARD, CEA and Williams, University of Illinois, experiment were performed using SPACE (Safety and Performance Analysis Code for Nuclear Power Plants).Keywords: droplet, entrainment, deposition, horizontal
Procedia PDF Downloads 3751466 A POX Controller Module to Prepare a List of Flow Header Information Extracted from SDN Traffic
Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin
Abstract:
Software Defined Networking (SDN) is a paradigm designed to facilitate the way of controlling the network dynamically and with more agility. Network traffic is a set of flows, each of which contains a set of packets. In SDN, a matching process is performed on every packet coming to the network in the SDN switch. Only the headers of the new packets will be forwarded to the SDN controller. In terminology, the flow header fields are called tuples. Basically, these tuples are 5-tuple: the source and destination IP addresses, source and destination ports, and protocol number. This flow information is used to provide an overview of the network traffic. Our module is meant to extract this 5-tuple with the packets and flows numbers and show them as a list. Therefore, this list can be used as a first step in the way of detecting the DDoS attack. Thus, this module can be considered as the beginning stage of any flow-based DDoS detection method.Keywords: matching, OpenFlow tables, POX controller, SDN, table-miss
Procedia PDF Downloads 197