Search results for: SQL injection attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1445

Search results for: SQL injection attacks

1325 An Experimental Investigation of Microscopic and Macroscopic Displacement Behaviors of Branched-Preformed Particle Gel in High Temperature Reservoirs

Authors: Weiyao Zhu, Bingbing Li, Yajing Liu, Zhiyong Song

Abstract:

Branched-preformed particle gel (B-PPG) is a newly developed profile control and oil displacement agent for enhanced oil recovery in major oilfields. To provide a better understanding of the performance of B-PPG in high temperature reservoirs, a comprehensive experimental investigation was conducted by utilizing glass micromodel and synthetic core. The microscopic experimental results show that the B-PPG can selectively flow and plug in large pores. In terms of enhanced oil recovery, the decrease of residual oil in the margin regions (24.6%) was higher than that in the main stream (13.7%), which indicates it enlarged the sweep area. In addition, the effects of B-PPG injection concentration and injection rate on enhanced oil recovery were implemented by core flooding. The macroscopic experimental results indicate that the enhanced oil recovery increased with the increasing of injection concentration. However, the injection rate had a peak value. It is significant to get insight into the behaviors of B-PPG in reservoirs.

Keywords: branched-preformed particle gel, enhanced oil recovery, micromodel, core flooding

Procedia PDF Downloads 167
1324 Effect of Temperature Condition in Extracting Carbon Fibers on Mechanical Properties of Injection Molded Polypropylene Reinforced by Recycled Carbon Fibers

Authors: Shota Nagata, Kazuya Okubo, Toru Fujii

Abstract:

The purpose of this study is to investigate the proper condition in extracting carbon fibers as the reinforcement of composite molded by injection method. Recycled carbon fibers were extracted from wasted CFRP by pyrolyzing epoxy matrix of CFRP under air atmosphere at different temperature conditions 400, 600 and 800°C in this study. Recycled carbon fiber reinforced polypropylene (RCF/PP) pellets were prepared using twin screw extruder. The RCF/PP specimens were molded into dumbbell shaped specimens using injection molding machine. The tensile strength of recycled carbon fiber was decreased with rising pyrolysis temperature from 400 to 800°C. However, superior mechanical properties of tensile strength, tensile modulus and fracture strain of RCF/PP specimen were obtained when the extracting temperature was 600°C. Almost fibers in RCF/PP specimens were aligned in the mold filling direction in this study when the extracting temperature was 600°C. To discuss the results, the failure mechanisms of RCF/PP specimens was shown schematically. Finally, it was concluded that the temperature condition at 600°C should be selected in extracting carbon fibers as the reinforcement of RCF/PP composite molded by injection method.

Keywords: CFRP, recycled carbon fiber, injection molding, mechanical properties, fiber orientation, failure mechanism

Procedia PDF Downloads 411
1323 The Mechanism of Calcium Carbonate Scale Deposition Affected by Carboxymethyl Chitosan

Authors: Genaro Bolívar, Manuel Mas, Maria Tortolero, Jorge Salazar

Abstract:

Due to the extensive use of water injection for oil displacement and pressure maintenance in oil fields, many reservoirs experience the problem of scale deposition when injection water starts to break through. In most cases the scaled-up wells are caused by the formation of sulfate and carbonate scales of calcium and strontium. Due to their relative hardness and low solubility, there are limited processes available for their removal and preventive measures such as the “squeeze” inhibitor treatment have to be taken. It is, therefore, important to gain a proper understanding of the kinetics of scale formation and its detrimental effects on formation damage under both inhibited and uninhibited conditions. Recently, the production of chitosan was started in our country and in the PDVSA-Intevep laboratories was synthesized and evaluated the properties of carboxymethyl chitosan (CMQ) as chelating agent of Ca2 + ions in water injection. In this regard, the characterization of the biopolymer by 13C - NMR, FTIR, TGA, and TM0374-2007 standard laboratory test has demonstrated the ability to remove up to 70% calcium ions in solution and shows a behavior that approaches that of commercial products.

Keywords: carboxymethyl chitosan, scale, calcium carbonate scale deposition, water injection

Procedia PDF Downloads 410
1322 Oil Reservoir Asphalting Precipitation Estimating during CO2 Injection

Authors: I. Alhajri, G. Zahedi, R. Alazmi, A. Akbari

Abstract:

In this paper, an Artificial Neural Network (ANN) was developed to predict Asphaltene Precipitation (AP) during the injection of carbon dioxide into crude oil reservoirs. In this study, the experimental data from six different oil fields were collected. Seventy percent of the data was used to develop the ANN model, and different ANN architectures were examined. A network with the Trainlm training algorithm was found to be the best network to estimate the AP. To check the validity of the proposed model, the model was used to predict the AP for the thirty percent of the data that was unevaluated. The Mean Square Error (MSE) of the prediction was 0.0018, which confirms the excellent prediction capability of the proposed model. In the second part of this study, the ANN model predictions were compared with modified Hirschberg model predictions. The ANN was found to provide more accurate estimates compared to the modified Hirschberg model. Finally, the proposed model was employed to examine the effect of different operating parameters during gas injection on the AP. It was found that the AP is mostly sensitive to the reservoir temperature. Furthermore, the carbon dioxide concentration in liquid phase increases the AP.

Keywords: artificial neural network, asphaltene, CO2 injection, Hirschberg model, oil reservoirs

Procedia PDF Downloads 344
1321 Performance of CO₂/N₂ Foam in Enhanced Oil Recovery

Authors: Mohamed Hassan, Rahul Gajbhiye

Abstract:

The high mobility and gravity override of CO₂ gas can be minimized by generating the CO₂ foam with the aid of surfactant. However, CO₂ is unable to generate the foam/stable foam above its supercritical point (1100 psi, 31°C). These difficulties with CO₂ foam is overcome by adding N₂ in small fraction to enhance the foam generation of CO₂ at supercritical conditions. This study shows how the addition of small quantity of N₂ helps in generating the CO₂ foam and performance of the CO₂/N₂ mixture foam in enhanced oil recovery. To investigate the performance of CO₂/N₂ foam, core-flooding experiments were conducted at elevated pressure and temperature condition (higher than supercritical CO₂ - 50°C and 1500 psi) in sandstone cores. Fluorosurfactant (FS-51) was used as a foaming agent, and n-decane was used as model oil in all the experiments. The selection of foam quality and N₂ fraction was optimized based on foam generation and stability tests. Every gas or foam flooding was preceded by seawater injection to simulate the behavior in the reservoir. The results from the core-flood experiments showed that the CO₂ and CO₂/N₂ foam flooding recovered an additional 34-40% of Original Initial Oil in Place (OIIP) indicating that foam flooding succeeded in producing more oil than pure CO₂ gas injection processes. Additionally, the performance CO₂/N₂ foam injection was better than CO₂ foam injection.

Keywords: CO₂/N₂ foam, enhanced oil recovery (EOR), supercritical CO₂, sweep efficiency

Procedia PDF Downloads 254
1320 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 506
1319 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 139
1318 Optimization of Plastic Injection Molding Parameters by Altering Gate and Runner of Feeding System

Authors: Ali Ramezani

Abstract:

Balancing feeding system of plastic injection molding has overriding importance as it minimizes the process’s product defects such as weld line, shrinkage, sink marks and warpage. This article presents the difference between optimization of feeding system in identical multi-cavity molding and family molding using Moldflow Plastic Insight software. In this work, the effect of dimension, shape, position and type of gates and runners on the products quality was studied. The optimization was carried out by analyzing plastic injection molding process parameters, including melt temperature, mold temperature, cooling time, cooling temperature packing time and packing pressure. It was found that symmetrical feeding system is the most efficient shape for diminishing defects in identical multi-cavity molding. However, the same results were not concluded for family molding due to the differences between volume, mass, thickness and shape of cavities.

Keywords: balancing feeding system, family molding, multi-cavity, Moldflow, plastic injection

Procedia PDF Downloads 102
1317 Developing a Modified Version of KIVA-3V, Enabling Gaseous Injections

Authors: Hossein Keshtkar, Ali Nasiri Toosi

Abstract:

With the growing concerns about gasoline environmental pollution and also the need for a more widely available fuel source, natural gas is finding its way to the automotive engines. But before this could happen industrially, simulations of natural gas direct injection need to take place to maximize and optimize power output. KIVA is one of the most powerful tools when it comes to engine simulation. Widely accepted by both researchers and the industry, KIVA an open-source code, offers great in-depth simulation and analyzation. KIVA can compute complex phenomena’s which can occur inside the chamber before, whilst and after ignition. One downside to KIVA, is its in-capability of simulating gaseous injections, making it useful for only liquidized fuel. In this study, we developed a numerical code, to enable the simulation of gaseous injection within the KIVA code. By introducing our code as a subroutine, we modified the original KIVA program. To ensure the correct application of gaseous fuel injection using our modified KIVA code, we simulated two different cases and compared them with their experimental data. We concluded our modified version of KIVA’s simulation results came in very close to those measured experimentally.

Keywords: gaseous injections, KIVA, natural gas direct injection, numerical code, simulation

Procedia PDF Downloads 249
1316 The Analysis of TRACE/PARCS in the Simulation of Ultimate Response Guideline for Lungmen ABWR

Authors: J. R. Wang, W. Y. Li, H. T. Lin, B. H. Lee, C. Shih, S. W. Chen

Abstract:

In this research, the TRACE/PARCS model of Lungmen ABWR has been developed for verification of ultimate response guideline (URG) efficiency. This ultimate measure was named as DIVing plan, abbreviated from system depressurization, water injection and containment venting. The simulation initial condition is 100% rated power/100% rated core flow. This research focuses on the estimation of the time when the fuel might be damaged with no water injection by using TRACE/PARCS first. Then, the effect of the reactor core isolation system (RCIC), control depressurization and ac-independent water addition system (ACIWA), which can provide the injection with 950 gpm are also estimated for the station blackout (SBO) transient.

Keywords: ABWR, TRACE, safety analysis, PARCS

Procedia PDF Downloads 434
1315 Efficacy of Ivermectin Agaist Sarcoptes Scabiei Var. Cameli in Libya

Authors: Ahmed Rashed

Abstract:

Sarcoptic mange is generally recognized as one of the most serious diseases in camels in Libya. It is an extremely pruritic and contagious skin condition caused by Sarcoptes scabiei var cameli. Thirteen camels (camelis dromedaries), showing progressive infection with S.scabiei mites in skin scrapings, were chosen randomly from different affected herds at AL-Assa camel project. Ten camels were treated with ivermectin (22,23-dihydroavermectin B1, Ivomec, Merck) at a dose rate of 0.2 mg./kg.body weight. Scratching and rubbing had completely disappeared in the treated camels one week after the second injection. Two weeks after the second injection motile mites were found on only one camel, and three weeks after the second injection, no motile mites were detected. Motile mites were observed in the three untreated camels up to the end of the trial.

Keywords: ivermecti, Sarcoptes scabiei, camels, scrapings

Procedia PDF Downloads 482
1314 Numerical Modeling the Cavitating Flow in Injection Nozzle Holes

Authors: Ridha Zgolli, Hatem Kanfoudi

Abstract:

Cavitating flows inside a diesel injection nozzle hole were simulated using a mixture model. A 2D numerical model is proposed in this paper to simulate steady cavitating flows. The Reynolds-averaged Navier-Stokes equations are solved for the liquid and vapor mixture, which is considered as a single fluid with variable density which is expressed as function of the vapor volume fraction. The closure of this variable is provided by the transport equation with a source term TEM. The processes of evaporation and condensation are governed by changes in pressure within the flow. The source term is implanted in the CFD code ANSYS CFX. The influence of numerical and physical parameters is presented in details. The numerical simulations are in good agreement with the experimental data for steady flow.

Keywords: cavitation, injection nozzle, numerical simulation, k–ω

Procedia PDF Downloads 367
1313 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 430
1312 Effect of Injection Pressure and Fuel Injection Timing on Emission and Performance Characteristics of Karanja Biodiesel and its Blends in CI Engine

Authors: Mohan H., C. Elajchet Senni

Abstract:

In the present of high energy consumption in every sphere of life, renewable energy sources are emerging as alternative to conventional fuels for energy security, mitigating green house gas emission and climate change. There has been a world wide interest in searching for alternatives to petroleum derived fuels due to their depletion as well as due to the concern for the environment. Vegetable oils have capability to solve this problem because they are renewable and lead to reduction in environmental pollution. But high smoke emission and lower thermal efficiency are the main problems associated with the use of neat vegetable oils in diesel engines. In the present work, performance, combustion and emission characteristics of CI engine fuelled with 20% by vol. methyl esters mixed with Karanja seed Oil, and Fuel injection pressures of 200 bar and 240 bar, injection timings (21°,23° and 25° BTDC) and Proportion B20 diesel respectively. Vegetable oils have capability to solve this problem because they are renewable and lead to reduction in environmental pollution. But, high smoke emission and lower thermal efficiency are the main problems associated with the use of neat vegetable oils in diesel engines. In the present work, performance, combustion and emission characteristics of CI engine fuelled with 20% by vol. methyl esters mixed with Karanja seed Oil, and Fuel injection pressures of 200 bar and 240 bar ,Injection timings (21°,23° and 25° BTDC) and Proportion B20 diesel respectively. Various performance, combustion and emission characteristics such as thermal efficiency, and brake specific fuel consumption, maximum cylinder pressure, instantaneous heat release, cumulative heat release with respect to crank angle, ignition lag, combustion duration, HC, NOx, CO, exhaust temperature and smoke intensity were measured.

Keywords: karanja oil, injection pressure, injection timing, karanja oil methyl ester

Procedia PDF Downloads 261
1311 Thrust Vectoring Control of Supersonic Flow through an Orifice Injector

Authors: I. Mnafeg, A. Abichou, L. Beji

Abstract:

Traditional mechanical control systems in thrust vectoring are efficient in rocket thrust guidance but their costs and their weights are excessive. The fluidic injection in the nozzle divergent constitutes an alternative procedure to achieve the goal. In this paper, we present a 3D analytical model for fluidic injection in a supersonic nozzle integrating an orifice. The fluidic vectoring uses a sonic secondary injection in the divergent. As a result, the flow and interaction between the main and secondary jet has built in order to express the pressure fields from which the forces and thrust vectoring are deduced. Under various separation criteria, the present analytical model results are compared with the existing numerical and experimental data from the literature.

Keywords: flow separation, fluidic thrust vectoring, nozzle, secondary jet, shock wave

Procedia PDF Downloads 273
1310 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 363
1309 Six Sigma-Based Optimization of Shrinkage Accuracy in Injection Molding Processes

Authors: Sky Chou, Joseph C. Chen

Abstract:

This paper focuses on using six sigma methodologies to reach the desired shrinkage of a manufactured high-density polyurethane (HDPE) part produced by the injection molding machine. It presents a case study where the correct shrinkage is required to reduce or eliminate defects and to improve the process capability index Cp and Cpk for an injection molding process. To improve this process and keep the product within specifications, the six sigma methodology, design, measure, analyze, improve, and control (DMAIC) approach, was implemented in this study. The six sigma approach was paired with the Taguchi methodology to identify the optimized processing parameters that keep the shrinkage rate within the specifications by our customer. An L9 orthogonal array was applied in the Taguchi experimental design, with four controllable factors and one non-controllable/noise factor. The four controllable factors identified consist of the cooling time, melt temperature, holding time, and metering stroke. The noise factor is the difference between material brand 1 and material brand 2. After the confirmation run was completed, measurements verify that the new parameter settings are optimal. With the new settings, the process capability index has improved dramatically. The purpose of this study is to show that the six sigma and Taguchi methodology can be efficiently used to determine important factors that will improve the process capability index of the injection molding process.

Keywords: injection molding, shrinkage, six sigma, Taguchi parameter design

Procedia PDF Downloads 138
1308 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 112
1307 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 335
1306 Automatic Slider Design in Injection Moldings

Authors: Alan C. Lin, Tran Anh Son

Abstract:

This study proposes an approach to determine the undercut regions and their releasing directions for slider design of complex parts represented by the file format of STL (STereoLithography). In order to delineate the border of undercut regions, orthogonal cutting planes are firstly employed to automatically find the inner loops of a part model. To discover the facets belonging to undercut regions, attributes are then assigned to the facets of the part model based on the topological relationship of adjacent facets of each inner loop. After that, the undercut regions are separated from other facets in the model. Through the recognized facets of the undercut regions, the concept of 'visibility map (V-map)' is further applied to determine feasible releasing directions for each of the undercut regions. The undercut regions having the same releasing direction are finally grouped to form a slider in the injection mold.

Keywords: solid model, STL data, injection mold design, visibility map

Procedia PDF Downloads 369
1305 Visualization of Flow Behaviour in Micro-Cavities during Micro Injection Moulding

Authors: Reza Gheisari, Paulo J. Bartolo, Nicholas Goddard

Abstract:

Polymeric micro-cantilevers (Cs) are rapidly becoming popular for MEMS applications such as chemo- and bio-sensing as well as purely electromechanical applications such as microrelays. Polymer materials present suitable physical and chemical properties combined with low-cost mass production. Hence, micro-cantilevers made of polymers indicate much more biocompatibility and adaptability of rapid prototyping along with mechanical properties. This research studies the effects of three process and one size factors on the filling behaviour in micro cavity, and the role of each in the replication of micro parts using different polymer materials i.e. polypropylene (PP) SABIC 56M10 and acrylonitrile butadiene styrene (ABS) Magnum 8434. In particular, the following factors are considered: barrel temperature, mould temperature, injection speed and the thickness of micro features. The study revealed that the barrel temperature and the injection speed are the key factors affecting the flow length of micro features replicated in PP and ABS. For both materials, an increase of feature sizes improves the melt flow. However, the melt fill of micro features does not increase linearly with the increase of their thickness.

Keywords: flow length, micro cantilevers, micro injection moulding, microfabrication

Procedia PDF Downloads 361
1304 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 183
1303 Part Performance Improvement through Design Optimisation of Cooling Channels in the Injection Moulding Process

Authors: M. A. Alhubail, A. I. Alateyah, D. Alenezi, B. Aldousiri

Abstract:

In this study conformal cooling channel (CCC) was employed to dissipate heat of, Polypropylene (PP) parts injected into the Stereolithography (SLA) insert to form tensile and flexural test specimens. The direct metal laser sintering (DMLS) process was used to fabricate a mould with optimised CCC, while optimum parameters of injection moulding were obtained using Optimal-D. The obtained results show that optimisation of the cooling channel layout using a DMLS mould has significantly shortened cycle time without sacrificing the part’s mechanical properties. By applying conformal cooling channels, the cooling time phase was reduced by 20 seconds, and also defected parts were eliminated.

Keywords: optimum parameters, injection moulding, conformal cooling channels, cycle time

Procedia PDF Downloads 199
1302 Pressure Regulator Optimization in LPG Fuel Injection Systems

Authors: M. Akif Ceviz, Alirıza Kaleli, Erdoğan Güner

Abstract:

LPG pressure regulator is a device which is used to change the phase of LPG from liquid to gas by decreasing the pressure. During the phase change, it is necessary to supply the latent heat of LPG to prevent excessive low temperature. Engine coolant is circulated in the pressure regulator for this purpose. Therefore, pressure regulator is a type of heat exchanger that should be designed for different engine operating conditions. The design of the regulator should ensure that the flow of LPG is in gaseous phase to the injectors during the engine steady state and transient operating conditions. The pressure regulators in the LPG gaseous injection systems currently used can easily change the phase of LPG, however, there is no any control on the LPG temperature in conventional LPG injection systems. It is possible to increase temperature excessively. In this study, a control unit has been tested to keep the LPG temperature in a band. Result of the study showed that the engine performance characteristics can be increased by using the system.

Keywords: temperature, pressure regulator, LPG, PID

Procedia PDF Downloads 487
1301 Analysis of Brain Signals Using Neural Networks Optimized by Co-Evolution Algorithms

Authors: Zahra Abdolkarimi, Naser Zourikalatehsamad,

Abstract:

Up to 40 years ago, after recognition of epilepsy, it was generally believed that these attacks occurred randomly and suddenly. However, thanks to the advance of mathematics and engineering, such attacks can be predicted within a few minutes or hours. In this way, various algorithms for long-term prediction of the time and frequency of the first attack are presented. In this paper, by considering the nonlinear nature of brain signals and dynamic recorded brain signals, ANFIS model is presented to predict the brain signals, since according to physiologic structure of the onset of attacks, more complex neural structures can better model the signal during attacks. Contribution of this work is the co-evolution algorithm for optimization of ANFIS network parameters. Our objective is to predict brain signals based on time series obtained from brain signals of the people suffering from epilepsy using ANFIS. Results reveal that compared to other methods, this method has less sensitivity to uncertainties such as presence of noise and interruption in recorded signals of the brain as well as more accuracy. Long-term prediction capacity of the model illustrates the usage of planted systems for warning medication and preventing brain signals.

Keywords: co-evolution algorithms, brain signals, time series, neural networks, ANFIS model, physiologic structure, time prediction, epilepsy suffering, illustrates model

Procedia PDF Downloads 246
1300 Study on Inverse Solution from Remote Displacements to Reservoir Process during Flow Injection

Authors: Sumei Cai, Hong Li

Abstract:

Either during water or gas injection into reservoir, in order to understand the areal flow pressure distribution underground, associated bounding deformation is prevalently monitored by ground or downhole tiltmeters. In this paper, an inverse solution to elastic response of far field displacements induced by reservoir pressure change due to flow injection was studied. Furthermore, the fundamental theory on inverse solution to elastic problem as well as its spatial smoothing approach is presented. Taking advantage of source code development based on Boundary Element Method, numerical analysis on the monitoring data of ground surface displacements to further understand the behavior of reservoir process was developed. Numerical examples were also conducted to verify the effectiveness.

Keywords: remote displacement, inverse problem, boundary element method, BEM, reservoir process

Procedia PDF Downloads 92
1299 Study of the Late Phase of Core Degradation during Reflooding by Safety Injection System for VVER1000 with ASTECv2 Computer Code

Authors: Antoaneta Stefanova, Rositsa Gencheva, Pavlin Groudev

Abstract:

This paper presents the modeling approach in SBO sequence for VVER 1000 reactors and describes the reactor core behavior at late in-vessel phase in case of late reflooding by HPIS and gives preliminary results for the ASTECv2 validation. The work is focused on investigation of plant behavior during total loss of power and the operator actions. The main goal of these analyses is to assess the phenomena arising during the Station blackout (SBO) followed by primary side high pressure injection system (HPIS) reflooding of already damaged reactor core at very late ‘in-vessel’ phase. The purpose of the analysis is to define how the later HPIS switching on can delay the time of vessel failure or possibly avoid vessel failure. For this purpose has been simulated an SBO scenario with injection of cold water by a high pressure pump (HPP) in cold leg at different stages of core degradation. The times for HPP injection were chosen based on previously performed investigations.

Keywords: VVER, operator action validation, reflooding of overheated reactor core, ASTEC computer code

Procedia PDF Downloads 391
1298 Gas Injection Transport Mechanism for Shale Oil Recovery

Authors: Chinedu Ejike

Abstract:

The United States is now energy self-sufficient due to the production of shale oil reserves. With more than half of it being tapped daily in the United States, these unconventional reserves are massive and provide immense potential for future energy demands. Drilling horizontal wells and fracking are the primary methods for developing these reserves. Regrettably, recovery efficiency is rarely greater than 10%. As a result, optimizing recuperation offers a significant benefit. Huff and puff gas flooding and cyclic gas injection have all been demonstrated to be more successful than tapping the remaining oil in place. Methane, nitrogen, and carbon (IV) oxide, among other high-pressure gases, can be injected. Operators use Darcy's law to assess a reservoir's productive capacity, but they are unaware that the law may not apply to shale oil reserves. This is due to the fact that, unlike pressure differences alone, diffusion, concentration, and gas selection all play a role in the flow of gas injected into the wellbore. The reservoir drainage and oil sweep efficiency rates are determined by the transport method. This research assesses the parameters that influence the gas injection transport mechanism. Understanding the process causing these factors could accelerate recovery by two to three times, according to peer-reviewed studies and effective field testing.

Keywords: enhanced oil recovery, gas injection, shale oil, transport mechanism, unconventional reserve

Procedia PDF Downloads 147
1297 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 169
1296 Gas Lift Optimization Using Smart Gas Lift Valve

Authors: Mohamed A. G. H. Abdalsadig, Amir Nourian, G. G. Nasr, M. Babaie

Abstract:

Gas lift is one of the most common forms of artificial lift, particularly for offshore wells because of its relative down hole simplicity, flexibility, reliability, and ability to operate over a large range of rates and occupy very little space at the well head. Presently, petroleum industry is investing in exploration and development fields in offshore locations where oil and gas wells are being drilled thousands of feet below the ocean in high pressure and temperature conditions. Therefore, gas-lifted oil wells are capable of failure through gas lift valves which are considered as the heart of the gas lift system for controlling the amount of the gas inside the tubing string. The gas injection rate through gas lift valve must be controlled to be sufficient to obtain and maintain critical flow, also, gas lift valves must be designed not only to allow gas passage through it and prevent oil passage, but also for gas injection into wells to be started and stopped when needed. In this paper, smart gas lift valve has been used to investigate the effect of the valve port size, depth of injection and vertical lift performance on well productivity; all these aspects have been investigated using PROSPER simulator program coupled with experimental data. The results show that by using smart gas lift valve, the gas injection rate can be controlled which leads to improved flow performance.

Keywords: Effect of gas lift valve port size, effect water cut, vertical flow performance

Procedia PDF Downloads 261