Search results for: cache timing attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 917

Search results for: cache timing attack

797 Optimal and Best Timing for Capturing Satellite Thermal Images of Concrete Object

Authors: Toufic Abd El-Latif Sadek

Abstract:

The concrete object represents the concrete areas, like buildings. The best, easy, and efficient extraction of the concrete object from satellite thermal images occurred at specific times during the days of the year, by preventing the gaps in times which give the close and same brightness from different objects. Thus, to achieve the best original data which is the aim of the study and then better extraction of the concrete object and then better analysis. The study was done using seven sample objects, asphalt, concrete, metal, rock, dry soil, vegetation, and water, located at one place carefully investigated in a way that all the objects achieve the homogeneous in acquired data at the same time and same weather conditions. The samples of the objects were on the roof of building at position taking by global positioning system (GPS) which its geographical coordinates is: Latitude= 33 degrees 37 minutes, Longitude= 35 degrees 28 minutes, Height= 600 m. It has been found that the first choice and the best time in February is at 2:00 pm, in March at 4 pm, in April and may at 12 pm, in August at 5:00 pm, in October at 11:00 am. The best time in June and November is at 2:00 pm.

Keywords: best timing, concrete areas, optimal, satellite thermal images

Procedia PDF Downloads 325
796 Biochemical Characterization of Meat Goat in Algeria

Authors: Hafid Nadia, Meziane Toufik

Abstract:

The aim of this study was the characterization of the goat meat by the determination of quantity and the quality in Batna region. The first part was the evaluation of production and consumption. The investigations show that the goat meat third after mutton and beef, it’s especially consumed by the indigenous population located in the Mountain and steep area. The second part of this review treats nutritional quality of this meat by the quantification of the chemical composition, including fat profile, and establishes a link between animal age and the values of these parameters. Moisture, fat contents, and cholesterol levels varied with age. Because of the decreasing level of cholesterol in the Chevon meat, it is more recommended for consumption to prevent or reduce the incidence of coronary disease and heart attack.

Keywords: biochemical composition, cholesterol, goat meat, heart attack

Procedia PDF Downloads 637
795 A Study on the Influence of Internal Sulfate on the Properties of Self-Compacting Concrete

Authors: Abbas S. Al-Ameeri Rawaa H. Issa

Abstract:

The internal sulfate attack is considered as a very important problem of concrete manufacture in Iraq and Middle East countries. Sulfate drastically influences the properties of concrete. This experimental study is aimed at investigating the effect of internal sulfates on fresh and some of the hardened properties of self compacting concrete (SCC) made from locally available materials. Tests were conducted on five mixes, with five SO3 levels (3.9, 5, 6, 7 and 8) (% by wt. of cement). The last four SO3 levels are outside the limits of the Iraqi specifications (IQS NO.45/1984). The results indicated that sulfate passively influenced the fresh properties such as decreased workability, and effect on hardened properties of the self compacting concrete. Also, the result indicated the optimum SO3 content which gives maximum strength and little tendency to expanding, which showed up at a content equal to 5% (by wt of cement), is more than acceptable limits of Iraqi specifications. Further increase in sulfates content in concrete after this optimum value showed a considerable reduction in mechanical properties of self-compacting concrete, and increment in expansion of concrete. The percentages of reduction in compressive strength, splitting tensile strength, flexural strength, static modulus of elasticity and ultrasonic pulse velocity at their later age were ranged between 10.89-36.14%, 12.90-33.33%, 7.98-36.35%, 16.36 -38.37% and 1.03-10.88% respectively.

Keywords: self-compacting concrete, sulfate attack, internal sulfate attack, fresh properties, harden properties, optimum SO3 content

Procedia PDF Downloads 242
794 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 385
793 A Failure Investigations of High-Temperature Hydrogen Attack at Plat Forming Unit Furnace Elbow

Authors: Altoumi Alndalusi

Abstract:

High-temperature hydrogen attack (HTHA) failure is the common phenomena at elevated temperature in hydrogen environment in oil and gas field. The failure occurred once after four years at the internal surface of Platforming elbow. Both visual and microscopic examinations revealed that the failure was initiated due to blistering forming followed by large cracking at the inner surface. Crack morphology showed that the crack depth was about 50% of material wall thickness and its behavior generally was intergranular. This study concluded that the main reason led to failure due to incorrect material selection comparing to the platforming conditions.

Keywords: decarburization, failure, heat affected zone, morphology, partial pressure, plate form

Procedia PDF Downloads 128
792 Human Vibrotactile Discrimination Thresholds for Simultaneous and Sequential Stimuli

Authors: Joanna Maj

Abstract:

Body machine interfaces (BMIs) afford users a non-invasive way coordinate movement. Vibrotactile stimulation has been incorporated into BMIs to allow feedback in real-time and guide movement control to benefit patients with cognitive deficits, such as stroke survivors. To advance research in this area, we examined vibrational discrimination thresholds at four body locations to determine suitable application sites for future multi-channel BMIs using vibration cues to guide movement planning and control. Twelve healthy adults had a pair of small vibrators (tactors) affixed to the skin at each location: forearm, shoulders, torso, and knee. A "standard" stimulus (186 Hz; 750 ms) and "probe" stimuli (11 levels ranging from 100 Hz to 235 Hz; 750 ms) were delivered. Probe and test stimulus pairs could occur sequentially or simultaneously (timing). Participants verbally indicated which stimulus felt more intense. Stimulus order was counterbalanced across tactors and body locations. Probabilities that probe stimuli felt more intense than the standard stimulus were computed and fit with a cumulative Gaussian function; the discrimination threshold was defined as one standard deviation of the underlying distribution. Threshold magnitudes depended on stimulus timing and location. Discrimination thresholds were better for stimuli applied sequentially vs. simultaneously at the torso as well as the knee. Thresholds were small (better) and relatively insensitive to timing differences for vibrations applied at the shoulder. BMI applications requiring multiple channels of simultaneous vibrotactile stimulation should therefore consider the shoulder as a deployment site for a vibrotactile BMI interface.

Keywords: electromyography, electromyogram, neuromuscular disorders, biomedical instrumentation, controls engineering

Procedia PDF Downloads 36
791 Performance of a Sailing Vessel with a Solid Wing Sail Compared to a Traditional Sail

Authors: William Waddington, M. Jahir Rizvi

Abstract:

Sail used to propel a vessel functions in a similar way to an aircraft wing. Traditionally, cloth and ropes were used to produce sails. However, there is one major problem with traditional sail design, the increase in turbulence and flow separation when compared to that of an aircraft wing with the same camber. This has led to the development of the solid wing sail focusing mainly on the sail shape. Traditional cloth sails are manufactured as a single element whereas solid wing sail is made of two segments. To the authors’ best knowledge, the phenomena behind the performances of this type of sail at various angles of wind direction with respect to a sailing vessel’s direction (known as the angle of attack) is still an area of mystery. Hence, in this study, the thrusts of a sailing vessel produced by wing sails constructed with various angles (22°, 24°, 26° and 28°) between the two segments have been compared to that of a traditional cloth sail made of carbon-fiber material. The reason for using carbon-fiber material is to achieve the correct and the exact shape of a commercially available mainsail. NACA 0024 and NACA 0016 foils have been used to generate two-segment wing sail shape which incorporates a flap between the first and the second segments. Both the two-dimensional and the three-dimensional sail models designed in commercial CAD software Solidworks have been analyzed through Computational Fluid Dynamics (CFD) techniques using Ansys CFX considering an apparent wind speed of 20.55 knots with an apparent wind angle of 31°. The results indicate that the thrust from traditional sail increases from 8.18 N to 8.26 N when the angle of attack is increased from 5° to 7°. However, the thrust value decreases if the angle of attack is further increased. A solid wing sail which possesses 20° angle between its two segments, produces thrusts from 7.61 N to 7.74 N with an increase in the angle of attack from 7° to 8°. The thrust remains steady up to 9° angle of attack and drops dramatically beyond 9°. The highest thrust values that can be obtained for the solid wing sails with 22°, 24°, 26° and 28° angle respectively between the two segments are 8.75 N, 9.10 N, 9.29 N and 9.19 N respectively. The optimum angle of attack for each of the solid wing sails is identified as 7° at which these thrust values are obtained. Therefore, it can be concluded that all the thrust values predicted for the solid wing sails of angles between the two segments above 20° are higher compared to the thrust predicted for the traditional sail. However, the best performance from a solid wing sail is expected when the sail is created with an angle between the two segments above 20° but below or equal to 26°. In addition, 1/29th scale models in the wind tunnel have been tested to observe the flow behaviors around the sails. The experimental results support the numerical observations as the flow behaviors are exactly the same.

Keywords: CFD, drag, sailing vessel, thrust, traditional sail, wing sail

Procedia PDF Downloads 248
790 Investigation of the Technological Demonstrator 14x B in Different Angle of Attack in Hypersonic Velocity

Authors: Victor Alves Barros Galvão, Israel Da Silveira Rego, Antonio Carlos Oliveira, Paulo Gilberto De Paula Toro

Abstract:

The Brazilian hypersonic aerospace vehicle 14-X B, VHA 14-X B, is a vehicle integrated with the hypersonic airbreathing propulsion system based on supersonic combustion (scramjet), developing in Aerothermodynamics and hypersonic Prof. Henry T. Nagamatsu Laboratory, to conduct demonstration in atmospheric flight at the speed corresponding to Mach number 7 at an altitude of 30km. In the experimental procedure the hypersonic shock tunnel T3 was used, installed in that laboratory. This device simulates the flow over a model is fixed in the test section and can also simulate different atmospheric conditions. The scramjet technology offers substantial advantages to improve aerospace vehicle performance which flies at a hypersonic speed through the Earth's atmosphere by reducing fuel consumption on board. Basically, the scramjet is an aspirated aircraft engine fully integrated that uses oblique/conic shock waves generated during hypersonic flight, to promote the deceleration and compression of atmospheric air in scramjet inlet. During the hypersonic flight, the vehicle VHA 14-X will suffer atmospheric influences, promoting changes in the vehicle's angles of attack (angle that the mean line of vehicle makes with respect to the direction of the flow). Based on this information, a study is conducted to analyze the influences of changes in the vehicle's angle of attack during the atmospheric flight. Analytical theoretical analysis, simulation computational fluid dynamics and experimental investigation are the methodologies used to design a technological demonstrator prior to the flight in the atmosphere. This paper considers analysis of the thermodynamic properties (pressure, temperature, density, sound velocity) in lower surface of the VHA 14-X B. Also, it considers air as an ideal gas and chemical equilibrium, with and without boundary layer, considering changes in the vehicle's angle of attack (positive and negative in relation to the flow) and bi-dimensional expansion wave theory at the expansion section (Theory of Prandtl-Meyer).

Keywords: angle of attack, experimental hypersonic, hypersonic airbreathing propulsion, Scramjet

Procedia PDF Downloads 380
789 Trajectory Optimization of Re-Entry Vehicle Using Evolutionary Algorithm

Authors: Muhammad Umar Kiani, Muhammad Shahbaz

Abstract:

Performance of any vehicle can be predicted by its design/modeling and optimization. Design optimization leads to efficient performance. Followed by horizontal launch, the air launch re-entry vehicle undergoes a launch maneuver by introducing a carefully selected angle of attack profile. This angle of attack profile is the basic element to complete a specified mission. Flight program of said vehicle is optimized under the constraints of the maximum allowed angle of attack, lateral and axial loads and with the objective of reaching maximum altitude. The main focus of this study is the endo-atmospheric phase of the ascent trajectory. A three degrees of freedom trajectory model is simulated in MATLAB. The optimization process uses evolutionary algorithm, because of its robustness and efficient capacity to explore the design space in search of the global optimum. Evolutionary Algorithm based trajectory optimization also offers the added benefit of being a generalized method that may work with continuous, discontinuous, linear, and non-linear performance matrix. It also eliminates the requirement of a starting solution. Optimization is particularly beneficial to achieve maximum advantage without increasing the computational cost and affecting the output of the system. For the case of launch vehicles we are immensely anxious to achieve maximum performance and efficiency under different constraints. In a launch vehicle, flight program means the prescribed variation of vehicle pitching angle during the flight which has substantial influence reachable altitude and accuracy of orbit insertion and aerodynamic loading. Results reveal that the angle of attack profile significantly affects the performance of the vehicle.

Keywords: endo-atmospheric, evolutionary algorithm, efficient performance, optimization process

Procedia PDF Downloads 383
788 Aerodynamic Investigation of Baseline-IV Bird-Inspired BWB Aircraft Design: Improvements over Baseline-III BWB

Authors: C. M. Nur Syazwani, M. K. Ahmad Imran, Rizal E. M. Nasir

Abstract:

The study on BWB UV begins in UiTM since 2005 and three designs have been studied and published. The latest designs are Baseline-III and inspired by birds that have features and aerodynamics behaviour of cruising birds without flapping capability. The aircraft featuring planform and configuration are similar to the bird. Baseline-III has major flaws particularly in its low lift-to-drag ratio, stability and issues regarding limited controllability. New design known as Baseline-IV replaces straight, swept wing to delta wing and have a broader tail compares to the Baseline-III’s. The objective of the study is to investigate aerodynamics of Baseline-IV bird-inspired BWB aircraft. This will be achieved by theoretical calculation and wind tunnel experiments. The result shows that both theoretical and wind tunnel experiments of Baseline-IV graph of CL and CD versus alpha are quite similar to each other in term of pattern of graph slopes and values. Baseline-IV has higher lift coefficient values at wide range of angle of attack compares to Baseline-III. Baseline-IV also has higher maximum lift coefficient, higher maximum lift-to-drag and lower parasite drag. It has stable pitch moment versus lift slope but negative moment at zero lift for zero angle-of-attack tail setting. At high angle of attack, Baseline-IV does not have stability reversal as shown in Baseline-III. Baseline-IV is proven to have improvements over Baseline-III in terms of lift, lift-to-drag ratio and pitch moment stability at high angle-of-attack.

Keywords: blended wing-body, bird-inspired blended wing-body, aerodynamic, stability

Procedia PDF Downloads 482
787 The Mechanical Strength and Durability of High Performance Concrete Using Local Materials

Authors: I. Guemidi, Y. Abdelaziz, T. Rikioui

Abstract:

In this work, an experimental investigation was carried out to evaluate the mechanical and durability properties of high performance concretes (HPC) containing local southwest Algerian materials. The mechanical properties were assessed from the compressive strength and the flexural strength, whilst the durability characteristics were investigated in terms of sulphate attack. The results obtained allow us to conclude that it is possible to make a high performance concrete (HPC) based on existing materials in the local market, if these are carefully selected and properly mixed in such away to optimize grain size distribution.

Keywords: durability, high performance concrete, high strength, local materials, Southwest Algerian, sulphate attack

Procedia PDF Downloads 356
786 Detect QOS Attacks Using Machine Learning Algorithm

Authors: Christodoulou Christos, Politis Anastasios

Abstract:

A large majority of users favoured to wireless LAN connection since it was so simple to use. A wireless network can be the target of numerous attacks. Class hijacking is a well-known attack that is fairly simple to execute and has significant repercussions on users. The statistical flow analysis based on machine learning (ML) techniques is a promising categorization methodology. In a given dataset, which in the context of this paper is a collection of components representing frames belonging to various flows, machine learning (ML) can offer a technique for identifying and characterizing structural patterns. It is possible to classify individual packets using these patterns. It is possible to identify fraudulent conduct, such as class hijacking, and take necessary action as a result. In this study, we explore a way to use machine learning approaches to thwart this attack.

Keywords: wireless lan, quality of service, machine learning, class hijacking, EDCA remapping

Procedia PDF Downloads 24
785 Investigation on Corrosion Behavior of Copper Brazed Joints

Authors: A. M. Aminazad, A. M. Hadian, F. Ghasimakbari

Abstract:

DHP (Deoxidized High Phosphorus )copper is widely used in various heat transfer units such as, air conditioners refrigerators, evaporators and condensers. Copper sheets and tubes (ISODHP) were brazed with four different brazing alloys. Corrosion resistances of the joints were examined by polarization and salt spray tests. The selected fillers consisted of three silver-based brazing alloys (hard solder); AWS-BCu5 BAg8, DINLAg30, and a copper-based filler AWS BCuP2. All the joints were brazed utilizing four different brazing processes including furnace brazing under argon, vacuum, air atmosphere and torch brazing. All of the fillers were used with and without flux. The microstructure of the brazed sheets was examined using both optical and scanning electron microscope (SEM). Hardness and leak tests were carried out on all the brazed tubes. In all three silver brazing alloys selective and galvanic corrosion were observed in filler metals, but in copper phosphor alloys the copper adjacent to the joints were noticeably corroded by pitting method. Microstructure of damaged area showed selective attack of copper lamellae as well. Interfacial attack was observed along boundaries as well as copper attack within the filler metal itself. It was found that the samples brazed with BAg5 filler metal using vacuum furnace show a higher resistance to corrosion. They also have a good ductility in the brazed zone.

Keywords: copper, brazing, corrosion, filler metal

Procedia PDF Downloads 436
784 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 228
783 A CFD Study of the Performance Characteristics of Vented Cylinders as Vortex Generators

Authors: R. Kishan, R. M. Sumant, S. Suhas, Arun Mahalingam

Abstract:

This paper mainly researched on influence of vortex generator on lift coefficient and drag coefficient, when vortex generator is mounted on a flat plate. Vented cylinders were used as vortex generators which intensify vortex shedding in the wake of the vented cylinder as compared to base line circular cylinder which ensures more attached flow and increases lift force of the system. Firstly vented cylinders were analyzed in commercial CFD software which is compared with baseline cylinders for different angles of attack and further variation of lift and drag forces were studied by varying Reynolds number to account for influence of turbulence and boundary layer in the flow. Later vented cylinders were mounted on a flat plate and variation of lift and drag coefficients was studied by varying angles of attack and studying the dependence of Reynolds number and dimensions of vortex generator on the coefficients. Mesh grid sensitivity is studied to check the convergence of the results obtained It was found that usage of vented cylinders as vortex generators increased lift forces with small variation in drag forces by varying angle of attack.

Keywords: CFD analysis, drag coefficient, FVM, lift coefficient, modeling, Reynolds number, simulation, vortex generators, vortex shedding

Procedia PDF Downloads 406
782 A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid

Authors: Yatin Wadhawan, Clifford Neuman, Anas Al Majali

Abstract:

In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks.

Keywords: smart grid, gas pipeline, cyber- physical attack, security, resilience

Procedia PDF Downloads 283
781 A Simulation for Behaviors of Preys to Avoid Pursuit of Predator

Authors: Jae Moon Lee

Abstract:

Generally the predator will continuously aim to attack the prey, while the prey will maintain a safe distance from the predator in order to avoid it . If the predator has enough energy to chase a certain amount of distance, it will begin to attack the prey. The prey needs to approach the predator for various reasons such as getting food. However, it will also try to keep a safe distance because of the threat of predators. The safe distance is dependent on the amount of the energy of predator, and the behaviors of prey is changed according to the size of the safe distance. This paper is to simulate the behaviors of preys to avoid the pursuit of predator based on the safe distance. The simulations will be executed experimentally under single predator and multiple preys. The results of the simulations show that the amount of energy of predator gives a great influence on the behavior of the prey.

Keywords: predator, prey, energy, safe distance, simulation

Procedia PDF Downloads 234
780 Smart Beta Portfolio Optimization

Authors: Saud Al Mahdi

Abstract:

Traditionally,portfolio managers have been discouraged from timing the market. This means, for example, that equity managers have been forced to adhere strictly to a benchmark with static or relatively stable components, such as the SP 500 or the Russell 3000. This means that the portfolio’s exposures to all risk factors should mimic as closely as possible the corresponding exposures of the benchmark. The main risk factor, of course, is the market itself. Effectively, a long-only portfolio would be constrained to have a beta 1. More recently, however, managers have been given greater discretion to adjust their portfolio’s risk exposures (in particular, the beta of their portfolio) dynamically to match the manager’s beliefs about future performance of the risk factors themselves. This freedom translates into the manager’s ability to adjust the portfolio’s beta dynamically. These strategies have come to be known as smart beta strategies. Adjusting beta dynamically amounts to attempting to "time" the market; that is, to increase exposure when one anticipates that the market will rise, and to decrease it when one anticipates that the market will fall. Traditionally, market timing has been believed to be impossible to perform effectively and consistently. Moreover, if a majority of market participants do it, their combined actions could destabilize the market. The aim of this project is to investigate so-called smart beta strategies to determine if they really can add value, or if they are merely marketing gimmicks used to sell dubious investment strategies.

Keywords: beta, alpha, active portfolio management, trading strategies

Procedia PDF Downloads 330
779 Choking among Infants and Young Children

Authors: Emad M.Abdullat, Hasan A. Ader-Rahman, Rayyan Al Ali, Arwa.A.Hudaib

Abstract:

This retrospective study aims to determine the epidemiological features of such deaths in one of the general teaching hospitals in Jordan with a focus on weaning practices and its relation to sucking as major factors underlying the mechanism of choking in infants and young children. The study utilized a retrospective design to review the records of forensic cases due to foreign body aspiration examined at the forensic department at the Jordan University Hospital. A total of 27 cases of choking in the pediatric age group were retrieved from the reports of the autopsy cases dissected. All cases of children who died due to chocking by foreign bodies were under 11 years old. Choking by food materials constituted (44.4%) of cases under 3 years of age while choking by non-food material were less prevalent under 3 years of age and comprising 18.5% of the cases. Health care personnel and parents need to be aware that introduction of solid food, unlike exclusive breast or formula-milk feeding, can have serious consequences if occurring in inappropriate timing or consistency during early childhood physical and functional development. Parents need to be educated regarding the appropriate timing and process of weaning.

Keywords: chocking, infants, weaning practices, young children

Procedia PDF Downloads 466
778 Experimental Study on Strength and Durability Properties of Bio-Self-Cured Fly Ash Based Concrete under Aggressive Environments

Authors: R. Malathy

Abstract:

High performance concrete is not only characterized by its high strength, workability, and durability but also by its smartness in performance without human care since the first day. If the concrete can cure on its own without external curing without compromising its strength and durability, then it is said to be high performance self-curing concrete. In this paper, an attempt is made on the performance study of internally cured concrete using biomaterials, namely Spinacea pleracea and Calatropis gigantea as self-curing agents, and it is compared with the performance of concrete with existing self-cure chemical, namely polyethylene glycol. The present paper focuses on workability, strength, and durability study on M20, M30, and M40 grade concretes replacing 30% of fly ash for cement. The optimum dosage of Spinacea pleracea, Calatropis gigantea, and polyethylene glycol was taken as 0.6%, 0.24%, and 0.3% by weight of cement from the earlier research studies. From the slump tests performed, it was found that there is a minimum variation between conventional concrete and self-cured concrete. The strength activity index is determined by keeping compressive strength of conventionally cured concrete for 28 days as unity and observed that, for self-cured concrete, it is more than 1 after 28 days and more than 1.15 after 56 days because of secondary reaction of fly ash. The performance study of concretes in aggressive environment like acid attack, sea water attack, and chloride attack was made, and the results are positive and encouraging in bio-self-cured concretes which are ecofriendly, cost effective, and high performance materials.

Keywords: bio materials, Calatropis gigantea, self curing concrete, Spinacea oleracea

Procedia PDF Downloads 323
777 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 305
776 Analysis of Stall Angle Delay in Airfoil Coupled with Spinning Cylinder

Authors: N. Kiran, S. A. Vikas, Yatish Chandra, S. Srinivasan

Abstract:

Several Centuries ago, the aerodynamic studies on rotating cylinders and spheres have started. From the observation, the rotation of a cylinder has a remarkable effect on the aerodynamic characteristics is noticed. In case of airfoils as the angle of attack increases, the drag increases with reduction in lift i.e at the critical angle of attack. If at this point a strong impulse is imparted to the boundary layer by means of a spinning cylinder, the re-energisation of boundary layer is achieved and hence delaying the boundary layer separation and stalling characteristics. Analysis of aerodynamic effects spinning cylinder either at leading edge or at trailing edge of the airfoil is carried in the past, the positioning of cylinder close to trailing edge and its effects in delaying the stall are yet to be analyzed in depth. This paper aim is to understand the combined aerodynamic effects of coupling the spinning cylinder with the airfoil closer to the Trailing edge, by considering different spin ratio of the cylinder, its location and geometrical parameters in relation to the chord of the airfoil. From the analysis, it was observed that the spinning cylinder speed of rotation and location had a impact on stalling characteristics for a prescribed free stream condition. The results predicted through CFD analysis and experimental analysis showed a raise in aerodynamic efficiency and as the spin ratio increases, increase in stalling angle of attack is noticed when compared to the airfoil without spinning cylinder.

Keywords: aerodynamics, airfoil, spinning cylinder, stalling

Procedia PDF Downloads 409
775 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks

Authors: Huseyin Gokberk, Shian Gao

Abstract:

CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.

Keywords: CFD, turbulence modelling, aerofoil, angle of attack

Procedia PDF Downloads 170
774 Enhancement of Aircraft Longitudinal Stability Using Tubercles

Authors: Muhammad Umer, Aishwariya Giri, Umaiyma Rakha

Abstract:

Mimicked from the humpback whale flippers, the application of tubercle technology is seen to be particularly advantageous at high angles of attack. This particular advantage is of paramount importance when it comes to structures producing lift at high angles of attack. This characteristic of the technology makes it ideal for horizontal stabilizers and selecting the same as the subject of study to identify and exploit the advantage highlighted by researchers on airfoils, this project aims in establishing a foundation for the application of the bio-mimicked technology on an existing aircraft. Using a baseline and 2 tubercle configuration integrated models, the project targets to achieve the twin aim of highlighting the possibility and merits over the base model and also choosing the right configuration in providing the best characteristic suitable for high angles of attack. To facilitate this study, the required models are generated using Solidworks followed by trials in a virtual aerodynamic environment using Fluent in Ansys for resolving the project objectives. Following a structured plan, the aim is to initially identify the advantages mathematically and then selecting the optimal configuration, simulate the end configuration at angles mimicking the actual operation envelope for the particular structure. Upon simulating the baseline configuration at various angles of attack, the stall angle was determined to be 22 degrees. Thus, the tubercle configurations will be simulated and compared at 4 different angles of attacks: 0, 10, 20, and 24. Further, after providing the optimum configuration of horizontal stabilizers, this study aims at the integration of aircraft structure so that the results better imply the end deliverables of real life application. This draws the project scope closer at this point into longitudinal static stability considerations and improvements in the manoeuvrability characteristics. The objective of the study is to achieve a complete overview ready for real life application with marked benefits obtainable from bio morphing of the tubercle technology.

Keywords: flow simulation, horizontal stabilizer, stability enhancement, tubercle

Procedia PDF Downloads 298
773 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 421
772 Performance Study of Geopolymer Concrete by Partial Replacement of Fly Ash with Cement and Full Replacement of River Sand by Crushed Sand

Authors: Asis Kumar Khan, Rajeev Kumar Goel

Abstract:

Recent infrastructure growth all around the world lead to increase in demand for concrete day by day. Cement being binding material for concrete the usage of cement also gone up significantly. Cement manufacturing utilizes abundant natural resources and causes environment pollution by releasing a huge quantity of CO₂ into the atmosphere. So, it is high time to look for alternates to reduce the cement consumption in concrete. Geopolymer concrete is one such material which utilizes the industrial waste such as fly ash, ground granulated blast furnace slag and low-cost alkaline liquids such as sodium hydroxide and sodium silicate to produce the concrete. On the other side, river sand is becoming very expensive due to its large-scale depletion at source and the high cost of transportation. In this view, river sand is replaced by crushed sand in this study. In this work, an attempt has been made to understand the durability parameters of geopolymer concrete by partially replacing fly ash with cement. Fly ash is replaced by cement at various levels e.g., from 0 to 50%. Concrete cubes of 100x100x100mm were used for investigating different durability parameters. The various parameters studied includes compressive strength, split tensile strength, drying shrinkage, sodium sulphate attack resistance, sulphuric acid attack resistance and chloride permeability. Highest compressive strength & highest split tensile strength is observed in 30% replacement level. Least drying is observed with 30% replacement level. Very good resistance for sulphuric acid & sodium sulphate is found with 30% replacement. However, it was not possible to find out the chloride permeability due to the high conductivity of geopolymer samples of all replacement levels.

Keywords: crushed sand, compressive strength, drying shrinkage, geopolymer concrete, split tensile strength, sodium sulphate attack resistance, sulphuric acid attack resistance

Procedia PDF Downloads 269
771 Cognitive Performance Post Stroke Is Affected by the Timing of Evaluation

Authors: Ayelet Hersch, Corrine Serfaty, Sigal Portnoy

Abstract:

Stroke survivors commonly report persistent fatigue and sleep disruptions during rehabilitation and post-recovery. While limited research has explored the impact of stroke on a patient's chronotype, there is a gap in understanding the differences in cognitive performance based on treatment timing. Study objectives: (a) To characterize the sleep chronotype in sub-acute post-stroke individuals. (b) Explore cognitive task performance differences during preferred and non-preferred hours. (c) Examine the relationships between sleep quality and cognitive performance. For this intra-subject study, twenty participants (mean age 60.2±8.6) post-first stroke (6-12 weeks post stroke) underwent assessments at preferred and non-preferred chronotypic times. The assessment included demographic surveys, the Munich Chronotype Questionnaire, Montreal Cognitive Assessment (MoCA), Rivermead Behavioral Memory Test (RBMT), a fatigue questionnaire, and 4-5 days of actigraphy (wrist-worn wGT3X-BT, ActiGraph) to record sleep characteristics. Four sleep quality indices were extracted from actigraphy wristwatch recordings: The average of total sleep time per day (minutes), the average number of awakenings during the sleep period per day, the efficiency of sleep (total hours of sleep per day divided by hours spent in bed per day, averaged across the days and presented as percentage), and the Wake after Sleep Onset (WASO) index, indicating the average number of minutes elapsed from the onset of sleep to the first awakening. Stroke survivors exhibited an earlier sleep chronotype post-injury compared to pre-injury. Enhanced attention, as indicated by higher RBMT scores, occurred during preferred hours. Specifically, 30% of the study participants demonstrated an elevation in their final scores during their preferred hours, transitioning from the category of "mild memory impairment" to "normal memory." However, no significant differences emerged in executive functions, attention tasks, and MoCA scores between preferred and non-preferred hours. The Wake After Sleep Onset (WASO) index correlated with MoCA/RBMT scores during preferred hours (r=0.53/0.51, p=0.021/0.027, respectively). The number of awakenings correlated with MoCA letter task performance during non-preferred hours (r=0.45, p=0.044). Enhanced attention during preferred hours suggests a potential relationship between chronotype and cognitive performance, highlighting the importance of personalized rehabilitation strategies in stroke care. Further exploration of these relationships could contribute to optimizing the timing of cognitive interventions for stroke survivors.

Keywords: sleep chronotype, chronobiology, circadian rhythm, rehabilitation timing

Procedia PDF Downloads 28
770 Electromyography Analysis during Walking and Seated Stepping in the Elderly

Authors: P. Y. Chiang, Y. H. Chen, Y. J. Lin, C. C. Chang, W. C. Hsu

Abstract:

The number of the elderly in the world population and the rate of falls in this increasing numbers of older people are increasing. Decreasing muscle strength and an increasing risk of falling are associated with the ageing process. Because the effects of seated stepping training on the walking performance in the elderly remain unclear, the main purpose of the proposed study is to perform electromyography analysis during walking and seated stepping in the elderly. Four surface EMG electrodes were sticked on the surface of lower limbs muscles, including vastus lateralis (VL), and gastrocnemius (GT) of both sides. Before test, maximal voluntary contraction (MVC) of the respective muscle was obtained using manual muscle testing. The analog raw data of EMG signals were digitized with a sampling frequency of 2000 Hz. The signals were fully rectified and the linear envelope were calculated. Stepping motion cycle was separated into two phases by stepping timing (ST) and pedal return timing (PRT). ST refer to the time when the pedal marker reached the highest height, representing the contra-lateral leg was going to release the pedal. PRT refer to the time when the pedal marker reached the lowest height, representing the contra-lateral leg was going to step the pedal. We assumed that ST acted the same role in initial contact during walking, and PRT for toe-off. The period from ST to next PRT was called pushing phase (PP), during which the leg would start to step with resistance, and we compare this phase with the stance phase in level walking. The period from PRT to next ST was called returning phase (RP), during which leg would not have any resistance in this phase, and we compare this phase with the swing phase in level walking. VL and Gastro muscular activation had similar patterns in both side. The ability may transfer to those needed during loading response, mid-stance and terminal swing phase. User needed to make more effort in stepping compared with walking with similar timing; thus the strengthening of the VL and Gastro may be helpful to improve the walking endurance and efficiency for the elderly.

Keywords: elderly, electromyography, seated stepping, walking

Procedia PDF Downloads 194
769 VDGMSISS: A Verifiable and Detectable Multi-Secret Images Sharing Scheme with General Access Structure

Authors: Justie Su-Tzu Juan, Ming-Jheng Li, Ching-Fen Lee, Ruei-Yu Wu

Abstract:

A secret image sharing scheme is a way to protect images. The main idea is dispersing the secret image into numerous shadow images. A secret image sharing scheme can withstand the impersonal attack and achieve the highly practical property of multiuse  is more practical. Therefore, this paper proposes a verifiable and detectable secret image-sharing scheme called VDGMSISS to solve the impersonal attack and to achieve some properties such as encrypting multi-secret images at one time and multi-use. Moreover, our scheme can also be used for any genera access structure.

Keywords: multi-secret image sharing scheme, verifiable, de-tectable, general access structure

Procedia PDF Downloads 100
768 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 278