Search results for: SQL injection attack detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4687

Search results for: SQL injection attack detection

4597 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 121
4596 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 121
4595 Molding Properties of Cobalt-Chrome-Based Feedstocks Used in Low-Pressure Powder Injection Molding

Authors: Ehsan Gholami, Vincent Demers

Abstract:

Low-pressure powder injection molding is an emerging technology for cost-effectively producing complex shape metallic parts with the proper dimensional tolerances, either in high or in low production volumes. In this study, the molding properties of cobalt-chrome-based feedstocks were evaluated for use in a low-pressure powder injection molding process. The rheological properties of feedstock formulations were obtained by mixing metallic powder with a proprietary wax-based binder system. Rheological parameters such as reference viscosity, shear rate sensitivity index, and activation energy for viscous flow, were extracted from the viscosity profiles and introduced into the Weir model to calculate the moldability index. Feedstocks were experimentally injected into a spiral mold cavity to validate the injection performance calculated with the model.

Keywords: binder, feedstock, moldability, powder injection molding, viscosity

Procedia PDF Downloads 246
4594 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 233
4593 Radial Fuel Injection Computational Fluid Dynamics Model for a Compression Ignition Two-Stroke Opposed Piston Engine

Authors: Tytus Tulwin, Rafal Sochaczewski, Ksenia Siadkowska

Abstract:

Designing a new engine requires a large number of different cases to be considered. Especially different injector parameters and combustion chamber geometries. This is essential when developing an engine with unconventional build – compression ignition, two-stroke operating with direct side injection. Computational Fluid Dynamics modelling allows to test those different conditions and seek for the best conditions with correct combustion. This research presents the combustion results for different injector and combustion chamber cases. The shape of combustion chamber is different than for conventional engines as it requires side injection. This completely changes the optimal shape for the given condition compared to standard automotive heart shaped combustion chamber. Because the injection is not symmetrical there is a strong influence of cylinder swirl and piston motion on the injected fuel stream. The results present the fuel injection phenomena allowing to predict the right injection parameters for a maximum combustion efficiency and minimum piston heat loads. Acknowledgement: This work has been realized in the cooperation with The Construction Office of WSK "PZL-KALISZ" S.A." and is part of Grant Agreement No. POIR.01.02.00-00-0002/15 financed by the Polish National Centre for Research and Development.

Keywords: CFD, combustion, injection, opposed piston

Procedia PDF Downloads 240
4592 Deep Injection Wells for Flood Prevention and Groundwater Management

Authors: Mohammad R. Jafari, Francois G. Bernardeau

Abstract:

With its arid climate, Qatar experiences low annual rainfall, intense storms, and high evaporation rates. However, the fast-paced rate of infrastructure development in the capital city of Doha has led to recurring instances of surface water flooding as well as rising groundwater levels. Public Work Authority (PWA/ASHGHAL) has implemented an approach to collect and discharge the flood water into a) positive gravity systems; b) Emergency Flooding Area (EFA) – Evaporation, Infiltration or Storage off-site using tankers; and c) Discharge to deep injection wells. As part of the flood prevention scheme, 21 deep injection wells have been constructed to discharge the collected surface and groundwater table in Doha city. These injection wells function as an alternative in localities that do not possess either positive gravity systems or downstream networks that can accommodate additional loads. These injection wells are 400-m deep and are constructed in a complex karstic subsurface condition with large cavities. The injection well system will discharge collected groundwater and storm surface runoff into the permeable Umm Er Radhuma Formation, which is an aquifer present throughout the Persian Gulf Region. The Umm Er Radhuma formation contains saline water that is not being used for water supply. The injection zone is separated by an impervious gypsum formation which acts as a barrier between upper and lower aquifer. State of the art drilling, grouting, and geophysical techniques have been implemented in construction of the wells to assure that the shallow aquifer would not be contaminated and impacted by injected water. Injection and pumping tests were performed to evaluate injection well functionality (injectability). The results of these tests indicated that majority of the wells can accept injection rate of 200 to 300 m3 /h (56 to 83 l/s) under gravity with average value of 250 m3 /h (70 l/s) compared to design value of 50 l/s. This paper presents design and construction process and issues associated with these injection wells, performing injection/pumping tests to determine capacity and effectiveness of the injection wells, the detailed design of collection system and conveying system into the injection wells, and the operation and maintenance process. This system is completed now and is under operation, and therefore, construction of injection wells is an effective option for flood control.

Keywords: deep injection well, flood prevention scheme, geophysical tests, pumping and injection tests, wellhead assembly

Procedia PDF Downloads 92
4591 Uniqueness and Repeatability Analysis for Slim Tube Determined Minimum Miscibility Pressure

Authors: Waqar Ahmad Butt, Gholamreza Vakili Nezhaad, Ali Soud Al Bemani, Yahya Al Wahaibi

Abstract:

Miscible gas injection processes as secondary recovery methods can be applied to a huge number of mature reservoirs to improve the trapped oil displacement. Successful miscible gas injection processes require an accurate estimation of the minimum miscibility pressure (MMP) to make injection process feasible, economical, and effective. There are several methods of MMP determination like slim tube approach, vanishing interfacial tension and rising bubble apparatus but slim tube is the deployed experimental technique in this study. Slim tube method is assumed to be non-standardized for MMP determination with respect to both operating procedure and design. Therefore, 25 slim tube runs were being conducted with three different coil lengths (12, 18 and 24 m) of constant diameter using three different injection rates (0.08, 0.1 and 0.15 cc/min) to evaluate uniqueness and repeatability of determined MMP. A trend of decrease in MMP with increase in coil length was found. No unique trend was found between MMP and injection rate. Lowest MMP and highest recovery were observed with highest coil length and lowest injection rate. It shows that slim tube measured MMP does not depend solely on interacting fluids characteristics but also affected by used coil selection and injection rate choice. Therefore, both slim tube design and procedure need to be standardized. It is recommended to use lowest possible injection rate and estimated coil length depending upon the distance between injections and producing wells for accurate and reliable MMP determination.

Keywords: coil length, injection rate, minimum miscibility pressure, multiple contacts miscibility

Procedia PDF Downloads 223
4590 Design and Finite Element Analysis of Clamp Cylinder for Capacity Augmentation of Injection Moulding Machine

Authors: Vimal Jasoliya, Purnank Bhatt, Mit Shah

Abstract:

The Injection Moulding is one of the principle methods of conversions of plastics into various end products using a very wide range of plastics materials from commodity plastics to specialty engineering plastics. Injection Moulding Machines are rated as per the tonnage force applied. The work present includes Design & Finite Element Analysis of a structure component of injection moulding machine i.e. clamp cylinder. The work of the project is to upgrade the 1300T clamp cylinder to 1500T clamp cylinder for injection moulding machine. The design of existing clamp cylinder of 1300T is checked. Finite Element analysis is carried out for 1300T clamp cylinder in ANSYS Workbench, and the stress values are compared with acceptance criteria and theoretical calculation. The relation between the clamp cylinder diameter and the tonnage capacity has been derived and verified for 1300T clamp cylinder. The same correlation is used to find out the thickness for 1500T clamp cylinder. The detailed design of 1500T cylinder is carried out based on calculated thickness.

Keywords: clamp cylinder, fatigue analysis, finite element analysis, injection moulding machines

Procedia PDF Downloads 309
4589 Thermodynamic Modeling of Methane Injection in Gas-Condensate Reservoir Core: A Case Study

Authors: F. S. Alavi, D. Mowla, F. Esmaeilzadeh

Abstract:

In this paper, the core of Sarkhoon Gas Condensate Reservoir located in the south of Iran was thermodynamically modeled in order to study the natural depletion process and methane injection phenomena for enhanced gas-condensate recovery using the Eclipse 300 compositional simulator. Modeling was performed for three different core lengths with different production and injection flow rates in both vertical and horizontal cases. According to the results, the final condensate in place value in the natural depletion process is approximately independent of the production rate for a given pressure drop. The final condensate in place value is lower in vertical cases compared to horizontal cases. An increase in the injection flow rate leads to a decrease in the percentage of gascondensate recovery. In cores of equal length, gas condensate recovery percent is higher in vertical cases in comparison to horizontal cases. For a constant injection rate, decreasing the core length leads to a decrease in gas condensate recovery.

Keywords: reservoir simulation, methane injection, enhanced condensate recovery, reservoir core, modeling

Procedia PDF Downloads 67
4588 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 326
4587 The Effect of Education on Nurses' Knowledge Level for Ventrogluteal Site Injection: Pilot Study

Authors: Emel Bayraktar, Gulengun Turk

Abstract:

Introduction and Objective: Safe administration of medicines is one of the main responsibilities of nurses. Intramuscular drug administration is among the most common methods used by nurses among all drug applications. This study was carried out in order to determine determine the effect of education given on injection in ventrogluteal area on the level of knowledge of nurses on this subject. Methods: The sample of the study consisted of 20 nurses who agreed to participate in the study between 01 October and 31 December 2019. The research is a pretest-posttest comparative, quasi-experimental type pilot study. The nurses were given a 4-hour training prepared on injection into the ventrogluteal area. The training consisted of two hours of theoretical and two hours of laboratory practice. Before the training and 4 weeks after the training, a questionnaire form containing questions about their knowledge and practices regarding the injection of the ventrogluteal region was applied to the nurses. Results: The average age of the nurses is 26.55 ± 7.60, 35% (n = 7) of them are undergraduate and 30% (n = 6) of them work in intensive care units. Before the training, 35% (n = 7) of the nurses stated that the most frequently used intramuscular injection site was the ventrogluteal area, and 75% (n = 15) stated that the safest area was the rectus femoris muscle. After the training, 55% (n = 11) of the nurses stated that they most frequently used the ventrogluteal area and 100% (n = 20) of them stated that the ventrogluteal area was the safest area. The average score the nurses got from the premises before the training is 14.15 ± 6.63 (min = 0, max = 20), the total score is 184. The average score obtained after the training was determined as 18.69 ± 2.35 (min = 12, max = 20), and the total score was 243. Conclusion: As a result of the research, it was determined that the training given on the injection of ventrogluteal area increased the knowledge level of the nurses. It is recommended to organize in-service trainings for all nurses on the injection of ventrogluteal area.

Keywords: safe injection, knowledge level, nurse, intramuscular injection, ventrogluteal area

Procedia PDF Downloads 182
4586 Effect of Synchronization Protocols on Serum Concentrations of Estrogen and Progesterone in Holstein Dairy Heifers

Authors: K. Shafiei, A. Pirestani, G. Ghalamkari, S. Safavipour

Abstract:

Use of GnRH or its agonists to increase conception rates should be based on an understanding of GnRH-induced biological effects on the reproductive-endocrine system. This effect may occur through GnRH-stimulated LH surge stimulating production of progesterone by corpus luteum.the aim of this study was to compare the effects on reproductive efficiency of a luteolytic dose of a synthetic prostaglandin Cloprostenol Sodium versus ainjectable progesterone and Luliberin- A on Follicle estrogen and progesterone levels.In this study, we used45 head of holstein dairy heifersin the three treatments, with 15 replicates per treatment were performed in random groups. all the heifers before the projects is began in two steps injection 3 mL CloprostenolSodium with an interval of 11 days been synchronized and 10 days later, second injection of prostaglandin was conducted after that we started below protocol:Control group (daily sodium chloride serum injection 1 cc), Group B: Day Zero, intramuscular injection of 15 mg Luliberin- A + every other day injection of 3 cc progesterone + day 7, injection of Cloprostenol Sodium+ day 9, injection of 15 mg Luliberin- A.Group C: similar to Grop B + daily injection of progesterone after that blood samples was collected and centrifuged.plasma were analysed by ELISA.the analysis of this study uses SPSS data software package and compared between the mean and LS Means LSD test at 5% significance level was used.The results of this study shows that maximum of progesterone plasma levels were in the control gruop (P ≥ 0.05).Therefore, daily injection of progesterone inhibit the growth CL. the most estrogen levels in plasma were in Group C (P ≥ 0.05) thus it can be concluded, rise in endogenous estrogen concentrations normally stimulates the preovulatory LH release in heifers.

Keywords: Luliberin- A, Cloprostenol Sodium, estrogen, progesterone, dairy heifers

Procedia PDF Downloads 509
4585 Optical Heterodyning of Injection-Locked Laser Sources: A Novel Technique for Millimeter-Wave Signal Generation

Authors: Subal Kar, Madhuja Ghosh, Soumik Das, Antara Saha

Abstract:

A novel technique has been developed to generate ultra-stable millimeter-wave signal by optical heterodyning of the output from two slave laser (SL) sources injection-locked to the sidebands of a frequency modulated (FM) master laser (ML). Precise thermal tuning of the SL sources is required to lock the particular slave laser frequency to the desired FM sidebands of the ML. The output signals from the injection-locked SL when coherently heterodyned in a fast response photo detector like high electron mobility transistor (HEMT), extremely stable millimeter-wave signal having very narrow line width can be generated. The scheme may also be used to generate ultra-stable sub-millimeter-wave/terahertz signal.

Keywords: FM sideband injection locking, master-slave injection locking, millimetre-wave signal generation, optical heterodyning

Procedia PDF Downloads 364
4584 Air Flow Characteristics and Pressure Distributions for Staggered Wing Shaped Tubes Bundle

Authors: Sayed A. Elsayed, Emad Z. Ibrahim, Osama M. Mesalhy, Mohamed A. Abdelatief

Abstract:

An experimental and numerical study has been conducted to clarify fluid flow characteristics and pressure drop distributions of a cross-flow heat exchanger employing staggered wing-shaped tubes at different angels of attack. The water-side Rew and the air-side Rea were at 5 x 102 and at from 1.8 x 103 to 9.7 x 103, respectively. Three cases of the tubes arrangements with various angles of attack, row angles of attack and 90° cone angles were employed at the considered Rea range. Correlation of pressure drop coefficient Pdc in terms of Rea, design parameters for the studied cases were presented. The flow pattern around the staggered wing-shaped tubes bundle were predicted by using commercial CFD FLUENT 6.3.26 software package. Results indicated that the values of Pdc were increased by increasing the angle of attack from 0° to 45°, while the opposite was true for angles of attack from 135° to 180°. Comparisons between the experimental and numerical results of the present study and those, previously, obtained for similar available studies showed good agreements.

Keywords: wing-shaped tubes, cross-flow cooling, staggered arrangement, CFD

Procedia PDF Downloads 334
4583 Efficient Signal Detection Using QRD-M Based on Channel Condition in MIMO-OFDM System

Authors: Jae-Jeong Kim, Ki-Ro Kim, Hyoung-Kyu Song

Abstract:

In this paper, we propose an efficient signal detector that switches M parameter of QRD-M detection scheme is proposed for MIMO-OFDM system. The proposed detection scheme calculates the threshold by 1-norm condition number and then switches M parameter of QRD-M detection scheme according to channel information. If channel condition is bad, the parameter M is set to high value to increase the accuracy of detection. If channel condition is good, the parameter M is set to low value to reduce complexity of detection. Therefore, the proposed detection scheme has better trade off between BER performance and complexity than the conventional detection scheme. The simulation result shows that the complexity of proposed detection scheme is lower than QRD-M detection scheme with similar BER performance.

Keywords: MIMO-OFDM, QRD-M, channel condition, BER

Procedia PDF Downloads 333
4582 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 346
4581 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 129
4580 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks

Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev

Abstract:

One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.

Keywords: channel estimation, inter-cell interference, pilot contamination attacks, wireless communications

Procedia PDF Downloads 189
4579 Study on the Thermal Mixing of Steam and Coolant in the Hybrid Safety Injection Tank

Authors: Sung Uk Ryu, Byoung Gook Jeon, Sung-Jae Yi, Dong-Jin Euh

Abstract:

In such passive safety injection systems in the nuclear power plant as Core Makeup Tank (CMT) and Hybrid Safety Injection Tank, various thermal-hydraulic phenomena including the direct contact condensation of steam and the thermal stratification of coolant occur. These phenomena are also closely related to the performance of the system. Depending on the condensation rate of the steam injected to the tank, the injection of the coolant and pressure equalizing timings of the tank are decided. The steam injected to the tank from the upper nozzle penetrates the coolant and induces a direct contact condensation. In the present study, the direct contact condensation of steam and the thermal mixing between the steam and coolant were examined by using the Particle Image Velocimetry (PIV) technique. Especially, by altering the size of the nozzle from which the steam is injected, the influence of steam injection velocity on the thermal mixing with coolant and condensation shall be comprehended, while also investigating the influence of condensation on the pressure variation inside the tank. Even though the amounts of steam inserted were the same in three different nozzle size conditions, it was found that the velocity of pressure rise becomes lower as the steam injection area decreases. Also, as the steam injection area increases, the thickness of the zone within which the coolant’s temperature decreases. Thereby, the amount of steam condensed by the direct contact condensation also decreases. The results derived from the present study can be utilized for the detailed design of a passive safety injection system, as well as for modeling the direct contact condensation triggered by the steam jet’s penetration into the coolant.

Keywords: passive safety injection systems, steam penetration, direct contact condensation, particle image velocimetry

Procedia PDF Downloads 367
4578 Managing Subretinal Bleeds with Intravitreal Aflibercept

Authors: Prachi Abhishek Dave, Abhishek Dave

Abstract:

Purpose: The purpose of this study is to elucidate the role of intravitreal injection Aflibercept in managing complex cases of Wet Age Related Macular Degeneration (ARMD) and the gratifying visual recovery experienced with a minimally invasive procedure. Methods: A 73-year-old gentleman presented with a drop in vision in the left eye for 25 days. On examination, his best corrected visual acuity (BCVA) in the Right eye (OD) was 6/60, and finger counting close to face in the Left eye (OS). On multimodal imaging, he was diagnosed to have a scarred Wet ARMD in OD and an active Wet ARMD with a large subretinal bleed secondary to Wet ARMD in OS. Treatment management options included monotherapy with an Injection Aflibercept or an intravitreal gas injection with tPA followed by Injection Aflibercept. Considering his one-eyed status, the patient decided to go for Aflibercept monotherapy. Results: After 3 monthly injections of injection Aflibercept, the subretinal bleed reduced, the subretinal fluid resolved, and his vision in OS improved to 6/9. He is on a regular follow-up and has not needed any further injections in OS and he maintains 6/9 vision. Conclusions: Conventional treatment guidelines for a large subretinal bleed dictate the use of gas followed by intravitreal Injection Aflibercept. However, gas has its own limitations of causing a rise in intraocular pressure and a transient loss of vision, which is particularly troublesome in one-eyed patients. Injection Aflibercept offers a much safer, less invasive, and elegant treatment option for such patients with equally good or even better visual outcomes.

Keywords: wet ARMD, subretinal bleed, intravitreal injections, aflibercept, EYELEA, intravitreal gas

Procedia PDF Downloads 5
4577 An Open-Label Phase I Clinical Study: Safety, Tolerability and Pharmacodynamics of Mutant Collagenase Injection in Adults for Localized Fat Reduction

Authors: Yong Cang

Abstract:

RJV001 is a subcutaneous injection containing mutated recombinant Collagenase H (ColH), leading to disruption of collagen matrix in adipose tissue and programmed cell death of adipocytes. Here we reported our clinical investigation of the safety, tolerance and pharmacodynamics of localized RJV001 injection into healthy human abdominal fat tissues (NCT04821648, Arizona Research Center). Investigate the safety, tolerance and clinical pharmacodynamics of subcutaneous RJV001 in humans. In the dose-escalating study, 18 subjects completed the study, 100% female, 78% white, with a mean age of 42[±9.9]. All three tested dose (0.05, 0.075 and 0.15 mg/injection), up to 30 injections, were safe and well-tolerated. Bruising and tenderness to palpation, mild to moderate, were the most frequent local skin reactions but nearly all resolved within 30 days. Additionally, physician-monitored ultrasound measurement showed that a reduction in abdominal fat tissue thickness was consistently observed in Cohort C (0.075, 0.15 mg/injection, 30injections), with a mean reduction of 7.37 [± 2.020] mm. Based on this clinical study, RJV001 has been advanced to phase II clinical studies. In the dose-escalating study, subcutaneously administered RJV001 was safe and well-tolerated in healthy adults up to 0.15 mg/injection, 30 injections. Fat reduction and adipocytolysis were observed by ultrasound measurements and histological analysis for exploratory purposes.

Keywords: fat reduction, mutant collagenase, clinical trial, subcutaneous injection

Procedia PDF Downloads 80
4576 Effect of Wettability Alteration in Low Salt Water Injection Modeling

Authors: H. Vahdani

Abstract:

By the adsorption of polar compounds and/or the deposition of organic material, the wettability of originally water-wet reservoir rock can be altered. The degree of alteration is determined by the interaction of the oil constituents, the mineral surface, and the brine chemistry. Recently improving oil recovery by tuning wettability alteration is believed as a new recovery method. Various researchers have demonstrated that low salt water injection has a significant impact on oil recovery. It has been shown, for instance, that additional oil can be produced from reservoir rock by managing the injection water. Large wettability sensitivity has been observed, indicating that the oil/water capillary pressure profiles play a major role during low saline water injection simulation. Although the exact physics on how this alteration occurs is still a research topic; however, it has been reported that some of its effect can be captured by a relative permeability shift from an oil-wet system to a water-wet system. Modeling of low salt water injection mainly is based on the theory of wettability alteration and is hence strongly dependent on the wettability of the reservoir. In this article, combination of different wettabilities has been simulated and it is observed that the highest recoveries were from the cases were the reservoir initially was water-wet, and the lowest recoveries was from the cases were the reservoir initially was considered oil-wet. However for the cases where the reservoir initially was oil-wet, the effect of low-salinity waterflooding was the largest.

Keywords: low salt water injection, wettability alteration, modelling, relative permeability

Procedia PDF Downloads 464
4575 Enhancement Method of Network Traffic Anomaly Detection Model Based on Adversarial Training With Category Tags

Authors: Zhang Shuqi, Liu Dan

Abstract:

For the problems in intelligent network anomaly traffic detection models, such as low detection accuracy caused by the lack of training samples, poor effect with small sample attack detection, a classification model enhancement method, F-ACGAN(Flow Auxiliary Classifier Generative Adversarial Network) which introduces generative adversarial network and adversarial training, is proposed to solve these problems. Generating adversarial data with category labels could enhance the training effect and improve classification accuracy and model robustness. FACGAN consists of three steps: feature preprocess, which includes data type conversion, dimensionality reduction and normalization, etc.; A generative adversarial network model with feature learning ability is designed, and the sample generation effect of the model is improved through adversarial iterations between generator and discriminator. The adversarial disturbance factor of the gradient direction of the classification model is added to improve the diversity and antagonism of generated data and to promote the model to learn from adversarial classification features. The experiment of constructing a classification model with the UNSW-NB15 dataset shows that with the enhancement of FACGAN on the basic model, the classification accuracy has improved by 8.09%, and the score of F1 has improved by 6.94%.

Keywords: data imbalance, GAN, ACGAN, anomaly detection, adversarial training, data augmentation

Procedia PDF Downloads 75
4574 Reduced Complexity of ML Detection Combined with DFE

Authors: Jae-Hyun Ro, Yong-Jun Kim, Chang-Bin Ha, Hyoung-Kyu Song

Abstract:

In multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) systems, many detection schemes have been developed to improve the error performance and to reduce the complexity. Maximum likelihood (ML) detection has optimal error performance but it has very high complexity. Thus, this paper proposes reduced complexity of ML detection combined with decision feedback equalizer (DFE). The error performance of the proposed detection scheme is higher than the conventional DFE. But the complexity of the proposed scheme is lower than the conventional ML detection.

Keywords: detection, DFE, MIMO-OFDM, ML

Procedia PDF Downloads 577
4573 The Effect of Intrathecal Adenosine in Control of Neuropathic Pain after Lumbar Discectomy in One Level

Authors: Dawood Aghamohammadi, Mahmoud Eidi, Alireza Pishgahi, Azam Esmaeilnejad

Abstract:

Adenosine has an analgesic and anti-inflammatory role and its injections are used for peri-operative pain management. We want to study efficacy of intrathecal injection of adenosine for post operative radicular pain after lumbar discectomy. 40 patients with unilevel lumbar discectomy who had radicular lower limb pain were treated by 1000 micrograms of intrathecal injection of adenosine. Pain severity, pain killer consumption per day and sleep quality were assessed during a 3 months follow up period. Radicular pain severity was significantly reduced in 3 month follow-up period in comparison to the baseline (F=19760, DF=2.53, p-value<0.001). Further painkiller medication consumption rate in average during 3 month follow-up period after injection was significantly lower in comparison to baseline (F= 19.244, df= 1.98, p-value<0.001). This study suggests that intrathecal injection of adenosine is a safe method in order to reduce postoperative pain after lumbar discectomy.

Keywords: adenosine, intrathecal injection, discectomy, neuropathic pain

Procedia PDF Downloads 230
4572 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 337
4571 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 55
4570 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis

Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng

Abstract:

Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.

Keywords: attribution trace, probabilistic relevance, network attack, attacker identification

Procedia PDF Downloads 329
4569 Numerical Simulation of Different Enhanced Oil Recovery (EOR) Scenarios on a Volatile Oil Reservoir

Authors: Soheil Tavakolpour

Abstract:

Enhance Oil Recovery (EOR) can be considered as an undeniable action in reservoirs life period. Different kind of EOR methods are available, but suitable EOR method depends on reservoir properties, like rock and fluid properties. In this paper, we nominated fifth SPE’s Comparative Solution Projects (CSP) for testing different scenarios. We used seven EOR scenarios for this reservoir and we simulated it for 10 years after 2 years production without any injection. The first scenario is waterflooding for whole of the 10 years period. The second scenario is gas injection for ten years. The third scenario is Water-Alternation-Gas (WAG). In the next scenario, water injected for 4 years before starting WAG injection for the next 6 years. In the fifth scenario, water injected after 6 years WAG injection for 4 years. For sixth and last scenarios, all the things are similar to fourth and fifth scenarios, but gas injected instead of water. Results show that fourth scenario was the most efficient method for 10 years EOR, but it resulted very high water production. Fifth scenario was efficient too, with little water production in comparison to the fourth scenario. Gas injection was not economically attractive. In addition to high gas production, it produced less oil in comparison to other scenarios.

Keywords: WAG, SPE’s comparative solution projects, numerical simulation, EOR scenarios

Procedia PDF Downloads 400
4568 Prospective Study of the Evaluation of Autologous Blood Injection in the Treatment of Lateral Epicondylitis

Authors: Bheeshma B., Mathivanan N., Manoj Deepak M., Prabhu Thangaraju, K. Venkatachalam

Abstract:

This study involves the effect of autologous blood injection for patients who had degeneration of the origin of extensor carpi radialis brevis which was confirmed radio logically and by ultrasound examination and failed cortisone injections to the lateral epicondylitis. In this prospective longitudinal series involves pre-injection assessment of grip strength, pain, and function, using the patient-rated tennis elbow evaluation. In this study, blood from the contralateral limb is taken and injected into the affected limb with the help of ultrasound guidance and then the patient wore a customized wrist support for five days, after which they were commenced with stretching, strengthening, and massage programme with an occupational therapist. In these patients assessment was done after six months and then finally at 12 months after injection, using the patient-rated tennis elbow evaluation. 50 patients completed the study, showing significant improvement in pain; the worst pain decreased by two to five points out of a 10-point visual analogue for pain. Self-perceived function improved by 11–25 points out of 100. Women showed significant increase in grip, but men did not. Our study thus concludes that autologous blood injection show significant improvement in pain and function in patients with chronic lateral epicondylitis, who did not have relief with cortisone injection.

Keywords: lateral epicondylitis, autologous blood injection, conservative treatment, plasma-rich proteins (PRPs)

Procedia PDF Downloads 408