Search results for: geometrical attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 998

Search results for: geometrical attack

908 Effect of Adverse Pressure Gradient on a Fluctuating Velocity over the Co-Flow Jet Airfoil

Authors: Morteza Mirhosseini, Amir B. Khoshnevis

Abstract:

The boundary layer separation and new active flow control of a NACA 0025 airfoil were studied experimentally. This new flow control is sometimes known as a co-flow jet (cfj) airfoil. This paper presents the fluctuating velocity in a wall jet over the co-flow jet airfoil subjected to an adverse pressure gradient and a curved surface. In these results, the fluctuating velocity at the inner part increasing by increased the angle of attack up to 12o and this has due to the jet energized, while the angle of attack 20o has different. The airfoil cord based Reynolds number has 105.

Keywords: adverse pressure gradient, fluctuating velocity, wall jet, co-flow jet airfoil

Procedia PDF Downloads 457
907 Advanced Model for Calculation of the Neutral Axis Shifting and the Wall Thickness Distribution in Rotary Draw Bending Processes

Authors: B. Engel, H. Hassan

Abstract:

Rotary draw bending is a method which is being used in tube forming. In the tube bending process, the neutral axis moves towards the inner arc and the wall thickness distribution changes for tube’s cross section. Thinning takes place in the outer arc of the tube (extrados) due to the stretching of the material, whereas thickening occurs in the inner arc of the tube (intrados) due to the comparison of the material. The calculations of the wall thickness distribution, neutral axis shifting, and strain distribution have not been accurate enough, so far. The previous model (the geometrical model) describes the neutral axis shifting and wall thickness distribution. The geometrical of the tube, bending radius and bending angle are considered in the geometrical model, while the influence of the material properties of the tube forming are ignored. The advanced model is a modification of the previous model using material properties that depends on the correction factor. The correction factor is a purely empirically determined factor. The advanced model was compared with the Finite element simulation (FE simulation) using a different bending factor (Bf=bending radius/ diameter of the tube), wall thickness (Wf=diameter of the tube/ wall thickness), and material properties (strain hardening exponent). Finite element model of rotary draw bending has been performed in PAM-TUBE program (version: 2012). Results from the advanced model resemble the FE simulation and the experimental test.

Keywords: rotary draw bending, material properties, neutral axis shifting, wall thickness distribution

Procedia PDF Downloads 370
906 An Efficient Clustering Technique for Copy-Paste Attack Detection

Authors: N. Chaitawittanun, M. Munlin

Abstract:

Due to rapid advancement of powerful image processing software, digital images are easy to manipulate and modify by ordinary people. Lots of digital images are edited for a specific purpose and more difficult to distinguish form their original ones. We propose a clustering method to detect a copy-move image forgery of JPEG, BMP, TIFF, and PNG. The process starts with reducing the color of the photos. Then, we use the clustering technique to divide information of measuring data by Hausdorff Distance. The result shows that the purposed methods is capable of inspecting the image file and correctly identify the forgery.

Keywords: image detection, forgery image, copy-paste, attack detection

Procedia PDF Downloads 305
905 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 566
904 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 251
903 The Influence of Variable Geometrical Modifications of the Trailing Edge of Supercritical Airfoil on the Characteristics of Aerodynamics

Authors: P. Lauk, K. E. Seegel, T. Tähemaa

Abstract:

The fuel consumption of modern, high wing loading, commercial aircraft in the first stage of flight is high because the usable flight level is lower and the weather conditions (jet stream) have great impact on aircraft performance. To reduce the fuel consumption, it is necessary to raise during first stage of flight the L/D ratio value within Cl 0.55-0.65. Different variable geometrical wing trailing edge modifications of SC(2)-410 airfoil were compared at M 0.78 using the CFD software STAR-CCM+ simulation based Reynolds-averaged Navier-Stokes (RANS) equations. The numerical results obtained show that by increasing the width of the airfoil by 4% and by modifying the trailing edge airfoil, it is possible to decrease airfoil drag at Cl 0.70 for up to 26.6% and at the same time to increase commercial aircraft L/D ratio for up to 5.0%. Fuel consumption can be reduced in proportion to the increase in L/D ratio.

Keywords: L/D ratio, miniflaps, mini-TED, supercritical airfoil

Procedia PDF Downloads 174
902 The Impact of Undisturbed Flow Speed on the Correlation of Aerodynamic Coefficients as a Function of the Angle of Attack for the Gyroplane Body

Authors: Zbigniew Czyz, Krzysztof Skiba, Miroslaw Wendeker

Abstract:

This paper discusses the results of aerodynamic investigation of the Tajfun gyroplane body designed by a Polish company, Aviation Artur Trendak. This gyroplane has been studied as a 1:8 scale model. Scaling objects for aerodynamic investigation is an inherent procedure in any kind of designing. If scaling, the criteria of similarity need to be satisfied. The basic criteria of similarity are geometric, kinematic and dynamic. Despite the results of aerodynamic research are often reduced to aerodynamic coefficients, one should pay attention to how values of coefficients behave if certain criteria are to be satisfied. To satisfy the dynamic criterion, for example, the Reynolds number should be focused on. This is the correlation of inertial to viscous forces. With the multiplied flow speed by the specific dimension as a numerator (with a constant kinematic viscosity coefficient), flow speed in a wind tunnel research should be increased as many times as an object is decreased. The aerodynamic coefficients specified in this research depend on the real forces that act on an object, its specific dimension, medium speed and variations in its density. Rapid prototyping with a 3D printer was applied to create the research object. The research was performed with a T-1 low-speed wind tunnel (its diameter of the measurement volume is 1.5 m) and a six-element aerodynamic internal scales, WDP1, at the Institute of Aviation in Warsaw. This T-1 wind tunnel is low-speed continuous operation with open space measurement. The research covered a number of the selected speeds of undisturbed flow, i.e. V = 20, 30 and 40 m/s, corresponding to the Reynolds numbers (as referred to 1 m) Re = 1.31∙106, 1.96∙106, 2.62∙106 for the angles of attack ranging -15° ≤ α ≤ 20°. Our research resulted in basic aerodynamic characteristics and observing the impact of undisturbed flow speed on the correlation of aerodynamic coefficients as a function of the angle of attack of the gyroplane body. If the speed of undisturbed flow in the wind tunnel changes, the aerodynamic coefficients are significantly impacted. At speed from 20 m/s to 30 m/s, drag coefficient, Cx, changes by 2.4% up to 9.9%, whereas lift coefficient, Cz, changes by -25.5% up to 15.7% if the angle of attack of 0° excluded or by -25.5% up to 236.9% if the angle of attack of 0° included. Within the same speed range, the coefficient of a pitching moment, Cmy, changes by -21.1% up to 7.3% if the angles of attack -15° and -10° excluded or by -142.8% up to 618.4% if the angle of attack -15° and -10° included. These discrepancies in the coefficients of aerodynamic forces definitely need to consider while designing the aircraft. For example, if load of certain aircraft surfaces is calculated, additional correction factors definitely need to be applied. This study allows us to estimate the discrepancies in the aerodynamic forces while scaling the aircraft. This work has been financed by the Polish Ministry of Science and Higher Education.

Keywords: aerodynamics, criteria of similarity, gyroplane, research tunnel

Procedia PDF Downloads 366
901 Intelligent Prediction System for Diagnosis of Heart Attack

Authors: Oluwaponmile David Alao

Abstract:

Due to an increase in the death rate as a result of heart attack. There is need to develop a system that can be useful in the diagnosis of the disease at the medical centre. This system will help in preventing misdiagnosis that may occur from the medical practitioner or the physicians. In this research work, heart disease dataset obtained from UCI repository has been used to develop an intelligent prediction diagnosis system. The system is modeled on a feedforwad neural network and trained with back propagation neural network. A recognition rate of 86% is obtained from the testing of the network.

Keywords: heart disease, artificial neural network, diagnosis, prediction system

Procedia PDF Downloads 420
900 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 428
899 Thermal Postbuckling of First Order Shear Deformable Functionally Graded Plates

Authors: Merbouha Barka, K. H. Benrahou, A. Fakrar, A. Tounsi, E. A. Adda Bedia

Abstract:

This paper presents an analytical investigation on the buckling and postbuckling behaviors of thick functionally graded plates subjected to thermal load .Material properties are assumed to be temperature dependent, and graded in the thickness direction according to a simple power law distribution in terms of the volume fractions of constituents. The formulations are based on first order shear deformation plate theory taking into account Von Karman nonlinearity and initial geometrical imperfection. By applying Galerkin method, closed-form relations of postbuckling equilibrium paths for simply supported plates are determined. Analysis is carried out to show the effects of material and geometrical properties, in-plane boundary restraint, and imperfection on the buckling and postbuckling loading capacity of the plates.

Keywords: functionally graded materials, postbuckling, first order shear deformation theory, imperfection

Procedia PDF Downloads 283
898 Biochemical Characterization of Meat Goat in Algeria

Authors: Hafid Nadia, Meziane Toufik

Abstract:

The aim of this study was the characterization of the goat meat by the determination of quantity and the quality in Batna region. The first part was the evaluation of production and consumption. The investigations show that the goat meat third after mutton and beef, it’s especially consumed by the indigenous population located in the Mountain and steep area. The second part of this review treats nutritional quality of this meat by the quantification of the chemical composition, including fat profile, and establishes a link between animal age and the values of these parameters. Moisture, fat contents, and cholesterol levels varied with age. Because of the decreasing level of cholesterol in the Chevon meat, it is more recommended for consumption to prevent or reduce the incidence of coronary disease and heart attack.

Keywords: biochemical composition, cholesterol, goat meat, heart attack

Procedia PDF Downloads 636
897 A Study on the Influence of Internal Sulfate on the Properties of Self-Compacting Concrete

Authors: Abbas S. Al-Ameeri Rawaa H. Issa

Abstract:

The internal sulfate attack is considered as a very important problem of concrete manufacture in Iraq and Middle East countries. Sulfate drastically influences the properties of concrete. This experimental study is aimed at investigating the effect of internal sulfates on fresh and some of the hardened properties of self compacting concrete (SCC) made from locally available materials. Tests were conducted on five mixes, with five SO3 levels (3.9, 5, 6, 7 and 8) (% by wt. of cement). The last four SO3 levels are outside the limits of the Iraqi specifications (IQS NO.45/1984). The results indicated that sulfate passively influenced the fresh properties such as decreased workability, and effect on hardened properties of the self compacting concrete. Also, the result indicated the optimum SO3 content which gives maximum strength and little tendency to expanding, which showed up at a content equal to 5% (by wt of cement), is more than acceptable limits of Iraqi specifications. Further increase in sulfates content in concrete after this optimum value showed a considerable reduction in mechanical properties of self-compacting concrete, and increment in expansion of concrete. The percentages of reduction in compressive strength, splitting tensile strength, flexural strength, static modulus of elasticity and ultrasonic pulse velocity at their later age were ranged between 10.89-36.14%, 12.90-33.33%, 7.98-36.35%, 16.36 -38.37% and 1.03-10.88% respectively.

Keywords: self-compacting concrete, sulfate attack, internal sulfate attack, fresh properties, harden properties, optimum SO3 content

Procedia PDF Downloads 240
896 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 384
895 A Failure Investigations of High-Temperature Hydrogen Attack at Plat Forming Unit Furnace Elbow

Authors: Altoumi Alndalusi

Abstract:

High-temperature hydrogen attack (HTHA) failure is the common phenomena at elevated temperature in hydrogen environment in oil and gas field. The failure occurred once after four years at the internal surface of Platforming elbow. Both visual and microscopic examinations revealed that the failure was initiated due to blistering forming followed by large cracking at the inner surface. Crack morphology showed that the crack depth was about 50% of material wall thickness and its behavior generally was intergranular. This study concluded that the main reason led to failure due to incorrect material selection comparing to the platforming conditions.

Keywords: decarburization, failure, heat affected zone, morphology, partial pressure, plate form

Procedia PDF Downloads 124
894 Performance of a Sailing Vessel with a Solid Wing Sail Compared to a Traditional Sail

Authors: William Waddington, M. Jahir Rizvi

Abstract:

Sail used to propel a vessel functions in a similar way to an aircraft wing. Traditionally, cloth and ropes were used to produce sails. However, there is one major problem with traditional sail design, the increase in turbulence and flow separation when compared to that of an aircraft wing with the same camber. This has led to the development of the solid wing sail focusing mainly on the sail shape. Traditional cloth sails are manufactured as a single element whereas solid wing sail is made of two segments. To the authors’ best knowledge, the phenomena behind the performances of this type of sail at various angles of wind direction with respect to a sailing vessel’s direction (known as the angle of attack) is still an area of mystery. Hence, in this study, the thrusts of a sailing vessel produced by wing sails constructed with various angles (22°, 24°, 26° and 28°) between the two segments have been compared to that of a traditional cloth sail made of carbon-fiber material. The reason for using carbon-fiber material is to achieve the correct and the exact shape of a commercially available mainsail. NACA 0024 and NACA 0016 foils have been used to generate two-segment wing sail shape which incorporates a flap between the first and the second segments. Both the two-dimensional and the three-dimensional sail models designed in commercial CAD software Solidworks have been analyzed through Computational Fluid Dynamics (CFD) techniques using Ansys CFX considering an apparent wind speed of 20.55 knots with an apparent wind angle of 31°. The results indicate that the thrust from traditional sail increases from 8.18 N to 8.26 N when the angle of attack is increased from 5° to 7°. However, the thrust value decreases if the angle of attack is further increased. A solid wing sail which possesses 20° angle between its two segments, produces thrusts from 7.61 N to 7.74 N with an increase in the angle of attack from 7° to 8°. The thrust remains steady up to 9° angle of attack and drops dramatically beyond 9°. The highest thrust values that can be obtained for the solid wing sails with 22°, 24°, 26° and 28° angle respectively between the two segments are 8.75 N, 9.10 N, 9.29 N and 9.19 N respectively. The optimum angle of attack for each of the solid wing sails is identified as 7° at which these thrust values are obtained. Therefore, it can be concluded that all the thrust values predicted for the solid wing sails of angles between the two segments above 20° are higher compared to the thrust predicted for the traditional sail. However, the best performance from a solid wing sail is expected when the sail is created with an angle between the two segments above 20° but below or equal to 26°. In addition, 1/29th scale models in the wind tunnel have been tested to observe the flow behaviors around the sails. The experimental results support the numerical observations as the flow behaviors are exactly the same.

Keywords: CFD, drag, sailing vessel, thrust, traditional sail, wing sail

Procedia PDF Downloads 246
893 Damping and Stability Evaluation for the Dynamical Hunting Motion of the Bullet Train Wheel Axle Equipped with Cylindrical Wheel Treads

Authors: Barenten Suciu

Abstract:

Classical matrix calculus and Routh-Hurwitz stability conditions, applied to the snake-like motion of the conical wheel axle, lead to the conclusion that the hunting mode is inherently unstable, and its natural frequency is a complex number. In order to analytically solve such a complicated vibration model, either the inertia terms were neglected, in the model designated as geometrical, or restrictions on the creep coefficients and yawing diameter were imposed, in the so-called dynamical model. Here, an alternative solution is proposed to solve the hunting mode, based on the observation that the bullet train wheel axle is equipped with cylindrical wheels. One argues that for such wheel treads, the geometrical hunting is irrelevant, since its natural frequency becomes nil, but the dynamical hunting is significant since its natural frequency reduces to a real number. Moreover, one illustrates that the geometrical simplification of the wheel causes the stabilization of the hunting mode, since the characteristic quartic equation, derived for conical wheels, reduces to a quadratic equation of positive coefficients, for cylindrical wheels. Quite simple analytical expressions for the damping ratio and natural frequency are obtained, without applying restrictions into the model of contact. Graphs of the time-depending hunting lateral perturbation, including the maximal and inflexion points, are presented both for the critically-damped and the over-damped wheel axles.

Keywords: bullet train, creep, cylindrical wheels, damping, dynamical hunting, stability, vibration analysis

Procedia PDF Downloads 120
892 Advancements in Laser Welding Process: A Comprehensive Model for Predictive Geometrical, Metallurgical, and Mechanical Characteristics

Authors: Seyedeh Fatemeh Nabavi, Hamid Dalir, Anooshiravan Farshidianfar

Abstract:

Laser welding is pivotal in modern manufacturing, offering unmatched precision, speed, and efficiency. Its versatility in minimizing heat-affected zones, seamlessly joining dissimilar materials, and working with various metals makes it indispensable for crafting intricate automotive components. Integration into automated systems ensures consistent delivery of high-quality welds, thereby enhancing overall production efficiency. Noteworthy are the safety benefits of laser welding, including reduced fumes and consumable materials, which align with industry standards and environmental sustainability goals. As the automotive sector increasingly demands advanced materials and stringent safety and quality standards, laser welding emerges as a cornerstone technology. A comprehensive model encompassing thermal dynamic and characteristics models accurately predicts geometrical, metallurgical, and mechanical aspects of the laser beam welding process. Notably, Model 2 showcases exceptional accuracy, achieving remarkably low error rates in predicting primary and secondary dendrite arm spacing (PDAS and SDAS). These findings underscore the model's reliability and effectiveness, providing invaluable insights and predictive capabilities crucial for optimizing welding processes and ensuring superior productivity, efficiency, and quality in the automotive industry.

Keywords: laser welding process, geometrical characteristics, mechanical characteristics, metallurgical characteristics, comprehensive model, thermal dynamic

Procedia PDF Downloads 17
891 Investigation of the Technological Demonstrator 14x B in Different Angle of Attack in Hypersonic Velocity

Authors: Victor Alves Barros Galvão, Israel Da Silveira Rego, Antonio Carlos Oliveira, Paulo Gilberto De Paula Toro

Abstract:

The Brazilian hypersonic aerospace vehicle 14-X B, VHA 14-X B, is a vehicle integrated with the hypersonic airbreathing propulsion system based on supersonic combustion (scramjet), developing in Aerothermodynamics and hypersonic Prof. Henry T. Nagamatsu Laboratory, to conduct demonstration in atmospheric flight at the speed corresponding to Mach number 7 at an altitude of 30km. In the experimental procedure the hypersonic shock tunnel T3 was used, installed in that laboratory. This device simulates the flow over a model is fixed in the test section and can also simulate different atmospheric conditions. The scramjet technology offers substantial advantages to improve aerospace vehicle performance which flies at a hypersonic speed through the Earth's atmosphere by reducing fuel consumption on board. Basically, the scramjet is an aspirated aircraft engine fully integrated that uses oblique/conic shock waves generated during hypersonic flight, to promote the deceleration and compression of atmospheric air in scramjet inlet. During the hypersonic flight, the vehicle VHA 14-X will suffer atmospheric influences, promoting changes in the vehicle's angles of attack (angle that the mean line of vehicle makes with respect to the direction of the flow). Based on this information, a study is conducted to analyze the influences of changes in the vehicle's angle of attack during the atmospheric flight. Analytical theoretical analysis, simulation computational fluid dynamics and experimental investigation are the methodologies used to design a technological demonstrator prior to the flight in the atmosphere. This paper considers analysis of the thermodynamic properties (pressure, temperature, density, sound velocity) in lower surface of the VHA 14-X B. Also, it considers air as an ideal gas and chemical equilibrium, with and without boundary layer, considering changes in the vehicle's angle of attack (positive and negative in relation to the flow) and bi-dimensional expansion wave theory at the expansion section (Theory of Prandtl-Meyer).

Keywords: angle of attack, experimental hypersonic, hypersonic airbreathing propulsion, Scramjet

Procedia PDF Downloads 379
890 Trajectory Optimization of Re-Entry Vehicle Using Evolutionary Algorithm

Authors: Muhammad Umar Kiani, Muhammad Shahbaz

Abstract:

Performance of any vehicle can be predicted by its design/modeling and optimization. Design optimization leads to efficient performance. Followed by horizontal launch, the air launch re-entry vehicle undergoes a launch maneuver by introducing a carefully selected angle of attack profile. This angle of attack profile is the basic element to complete a specified mission. Flight program of said vehicle is optimized under the constraints of the maximum allowed angle of attack, lateral and axial loads and with the objective of reaching maximum altitude. The main focus of this study is the endo-atmospheric phase of the ascent trajectory. A three degrees of freedom trajectory model is simulated in MATLAB. The optimization process uses evolutionary algorithm, because of its robustness and efficient capacity to explore the design space in search of the global optimum. Evolutionary Algorithm based trajectory optimization also offers the added benefit of being a generalized method that may work with continuous, discontinuous, linear, and non-linear performance matrix. It also eliminates the requirement of a starting solution. Optimization is particularly beneficial to achieve maximum advantage without increasing the computational cost and affecting the output of the system. For the case of launch vehicles we are immensely anxious to achieve maximum performance and efficiency under different constraints. In a launch vehicle, flight program means the prescribed variation of vehicle pitching angle during the flight which has substantial influence reachable altitude and accuracy of orbit insertion and aerodynamic loading. Results reveal that the angle of attack profile significantly affects the performance of the vehicle.

Keywords: endo-atmospheric, evolutionary algorithm, efficient performance, optimization process

Procedia PDF Downloads 379
889 Aerodynamic Investigation of Baseline-IV Bird-Inspired BWB Aircraft Design: Improvements over Baseline-III BWB

Authors: C. M. Nur Syazwani, M. K. Ahmad Imran, Rizal E. M. Nasir

Abstract:

The study on BWB UV begins in UiTM since 2005 and three designs have been studied and published. The latest designs are Baseline-III and inspired by birds that have features and aerodynamics behaviour of cruising birds without flapping capability. The aircraft featuring planform and configuration are similar to the bird. Baseline-III has major flaws particularly in its low lift-to-drag ratio, stability and issues regarding limited controllability. New design known as Baseline-IV replaces straight, swept wing to delta wing and have a broader tail compares to the Baseline-III’s. The objective of the study is to investigate aerodynamics of Baseline-IV bird-inspired BWB aircraft. This will be achieved by theoretical calculation and wind tunnel experiments. The result shows that both theoretical and wind tunnel experiments of Baseline-IV graph of CL and CD versus alpha are quite similar to each other in term of pattern of graph slopes and values. Baseline-IV has higher lift coefficient values at wide range of angle of attack compares to Baseline-III. Baseline-IV also has higher maximum lift coefficient, higher maximum lift-to-drag and lower parasite drag. It has stable pitch moment versus lift slope but negative moment at zero lift for zero angle-of-attack tail setting. At high angle of attack, Baseline-IV does not have stability reversal as shown in Baseline-III. Baseline-IV is proven to have improvements over Baseline-III in terms of lift, lift-to-drag ratio and pitch moment stability at high angle-of-attack.

Keywords: blended wing-body, bird-inspired blended wing-body, aerodynamic, stability

Procedia PDF Downloads 479
888 The Mechanical Strength and Durability of High Performance Concrete Using Local Materials

Authors: I. Guemidi, Y. Abdelaziz, T. Rikioui

Abstract:

In this work, an experimental investigation was carried out to evaluate the mechanical and durability properties of high performance concretes (HPC) containing local southwest Algerian materials. The mechanical properties were assessed from the compressive strength and the flexural strength, whilst the durability characteristics were investigated in terms of sulphate attack. The results obtained allow us to conclude that it is possible to make a high performance concrete (HPC) based on existing materials in the local market, if these are carefully selected and properly mixed in such away to optimize grain size distribution.

Keywords: durability, high performance concrete, high strength, local materials, Southwest Algerian, sulphate attack

Procedia PDF Downloads 354
887 Nonlinear Analysis of Reinforced Concrete Arched Structures Considering Soil-Structure Interaction

Authors: Mohamed M. El Gendy, Ibrahim A. El Arabi, Rafeek W. Abdel-Missih, Omar A. Kandil

Abstract:

Nonlinear analysis is one of the most important design and safety tools in structural engineering. Based on the finite-element method, a geometrical and material nonlinear analysis of large span reinforced concrete arches is carried out considering soil-structure interaction. The concrete section details and reinforcement distribution are taken into account. The behavior of soil is considered via Winkler's and continuum models. A computer program (NARC II) is specially developed in order to follow the structural behavior of large span reinforced concrete arches up to failure. The results obtained by the proposed model are compared with available literature for verification. This work confirmed that the geometrical and material nonlinearities, as well as soil structure interaction, have considerable influence on the structural response of reinforced concrete arches.

Keywords: nonlinear analysis, reinforced concrete arched structure, soil-structure interaction, geotechnical engineering

Procedia PDF Downloads 411
886 Detect QOS Attacks Using Machine Learning Algorithm

Authors: Christodoulou Christos, Politis Anastasios

Abstract:

A large majority of users favoured to wireless LAN connection since it was so simple to use. A wireless network can be the target of numerous attacks. Class hijacking is a well-known attack that is fairly simple to execute and has significant repercussions on users. The statistical flow analysis based on machine learning (ML) techniques is a promising categorization methodology. In a given dataset, which in the context of this paper is a collection of components representing frames belonging to various flows, machine learning (ML) can offer a technique for identifying and characterizing structural patterns. It is possible to classify individual packets using these patterns. It is possible to identify fraudulent conduct, such as class hijacking, and take necessary action as a result. In this study, we explore a way to use machine learning approaches to thwart this attack.

Keywords: wireless lan, quality of service, machine learning, class hijacking, EDCA remapping

Procedia PDF Downloads 17
885 Reliability Analysis of Steel Columns under Buckling Load in Second-Order Theory

Authors: Hamed Abshari, M. Reza Emami Azadi, Madjid Sadegh Azar

Abstract:

For studying the overall instability of members of steel structures, there are several methods in which overall buckling and geometrical imperfection effects are considered in analysis. In first section, these methods are compared and ability of software to apply these methods is studied. Buckling loads determined from theoretical methods and software is compared for 2D one bay, one and two stories steel frames. To consider actual condition, buckling loads of three steel frames that have various dimensions are calculated and compared. Also, uncertainties that exist in loading and modeling of structures such as geometrical imperfection, yield stress, and modulus of elasticity in buckling load of 2D framed steel structures have been studied. By performing these uncertainties to each reliability analysis procedures (first-order, second-order, and simulation methods of reliability), one index of reliability from each procedure is determined. These values are studied and compared.

Keywords: buckling, second-order theory, reliability index, steel columns

Procedia PDF Downloads 463
884 Wicking and Evaporation of Liquids in Knitted Fabrics: Analytic Solution of Capillary Rise Restrained by Gravity and Evaporation

Authors: N. S. Achour, M. Hamdaoui, S. Ben Nasrallah

Abstract:

Wicking and evaporation of water in porous knitted fabrics is investigated by combining experimental and analytical approaches: The standard wicking model from Lucas and Washburn is enhanced to account for evaporation and gravity effects. The goal is to model the effect of gravity and evaporation on wicking using simple analytical expressions and investigate the influence of fabrics geometrical parameters, such as porosity and thickness on evaporation impact on maximum reachable height values. The results show that fabric properties have a significant influence on evaporation effect. In this paper, an experimental study of determining water kinetics from different knitted fabrics were gravimetrically investigated permitting the measure of the mass and the height of liquid rising in fabrics in various atmospheric conditions. From these measurements, characteristic pore parameters (capillary radius and permeability) can be determined.

Keywords: evaporation, experimental study, geometrical parameters, model, porous knitted fabrics, wicking

Procedia PDF Downloads 554
883 Investigation on Corrosion Behavior of Copper Brazed Joints

Authors: A. M. Aminazad, A. M. Hadian, F. Ghasimakbari

Abstract:

DHP (Deoxidized High Phosphorus )copper is widely used in various heat transfer units such as, air conditioners refrigerators, evaporators and condensers. Copper sheets and tubes (ISODHP) were brazed with four different brazing alloys. Corrosion resistances of the joints were examined by polarization and salt spray tests. The selected fillers consisted of three silver-based brazing alloys (hard solder); AWS-BCu5 BAg8, DINLAg30, and a copper-based filler AWS BCuP2. All the joints were brazed utilizing four different brazing processes including furnace brazing under argon, vacuum, air atmosphere and torch brazing. All of the fillers were used with and without flux. The microstructure of the brazed sheets was examined using both optical and scanning electron microscope (SEM). Hardness and leak tests were carried out on all the brazed tubes. In all three silver brazing alloys selective and galvanic corrosion were observed in filler metals, but in copper phosphor alloys the copper adjacent to the joints were noticeably corroded by pitting method. Microstructure of damaged area showed selective attack of copper lamellae as well. Interfacial attack was observed along boundaries as well as copper attack within the filler metal itself. It was found that the samples brazed with BAg5 filler metal using vacuum furnace show a higher resistance to corrosion. They also have a good ductility in the brazed zone.

Keywords: copper, brazing, corrosion, filler metal

Procedia PDF Downloads 431
882 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 225
881 A CFD Study of the Performance Characteristics of Vented Cylinders as Vortex Generators

Authors: R. Kishan, R. M. Sumant, S. Suhas, Arun Mahalingam

Abstract:

This paper mainly researched on influence of vortex generator on lift coefficient and drag coefficient, when vortex generator is mounted on a flat plate. Vented cylinders were used as vortex generators which intensify vortex shedding in the wake of the vented cylinder as compared to base line circular cylinder which ensures more attached flow and increases lift force of the system. Firstly vented cylinders were analyzed in commercial CFD software which is compared with baseline cylinders for different angles of attack and further variation of lift and drag forces were studied by varying Reynolds number to account for influence of turbulence and boundary layer in the flow. Later vented cylinders were mounted on a flat plate and variation of lift and drag coefficients was studied by varying angles of attack and studying the dependence of Reynolds number and dimensions of vortex generator on the coefficients. Mesh grid sensitivity is studied to check the convergence of the results obtained It was found that usage of vented cylinders as vortex generators increased lift forces with small variation in drag forces by varying angle of attack.

Keywords: CFD analysis, drag coefficient, FVM, lift coefficient, modeling, Reynolds number, simulation, vortex generators, vortex shedding

Procedia PDF Downloads 402
880 Optimal Design of Concrete Shells by Modified Particle Community Algorithm Using Spinless Curves

Authors: Reza Abbasi, Ahmad Hamidi Benam

Abstract:

Shell structures have many geometrical variables that modify some of these parameters to improve the mechanical behavior of the shell. On the other hand, the behavior of such structures depends on their geometry rather than on mass. Optimization techniques are useful in finding the geometrical shape of shell structures to improve mechanical behavior, especially to prevent or reduce bending anchors. The overall objective of this research is to optimize the shape of concrete shells using the thickness and height parameters along the reference curve and the overall shape of this curve. To implement the proposed scheme, the geometry of the structure was formulated using nonlinear curves. Shell optimization was performed under equivalent static loading conditions using the modified bird community algorithm. The results of this optimization show that without disrupting the initial design and with slight changes in the shell geometry, the structural behavior is significantly improved.

Keywords: concrete shells, shape optimization, spinless curves, modified particle community algorithm

Procedia PDF Downloads 196
879 Geometrical Analysis of an Atheroma Plaque in Left Anterior Descending Coronary Artery

Authors: Sohrab Jafarpour, Hamed Farokhi, Mohammad Rahmati, Alireza Gholipour

Abstract:

In the current study, a nonlinear fluid-structure interaction (FSI) biomechanical model of atherosclerosis in the left anterior descending (LAD) coronary artery is developed to perform a detailed sensitivity analysis of the geometrical features of an atheroma plaque. In the development of the numerical model, first, a 3D geometry of the diseased artery is developed based on patient-specific dimensions obtained from the experimental studies. The geometry includes four influential geometric characteristics: stenosis ratio, plaque shoulder-length, fibrous cap thickness, and eccentricity intensity. Then, a suitable strain energy density function (SEDF) is proposed based on the detailed material stability analysis to accurately model the hyperelasticity of the arterial walls. The time-varying inlet velocity and outlet pressure profiles are adopted from experimental measurements to incorporate the pulsatile nature of the blood flow. In addition, a computationally efficient type of structural boundary condition is imposed on the arterial walls. Finally, a non-Newtonian viscosity model is implemented to model the shear-thinning behaviour of the blood flow. According to the results, the structural responses in terms of the maximum principal stress (MPS) are affected more compared to the fluid responses in terms of wall shear stress (WSS) as the geometrical characteristics are varying. The extent of these changes is critical in the vulnerability assessment of an atheroma plaque.

Keywords: atherosclerosis, fluid-Structure interaction modeling, material stability analysis, and nonlinear biomechanics

Procedia PDF Downloads 59