Search results for: internal attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2946

Search results for: internal attack

2796 Internal Displacement in Iraq due to ISIS Occupation and Its Effects on Human Security and Coexistence

Authors: Feisal Khudher Mahmood, Abdul Samad Rahman Sultan

Abstract:

Iraq had been a diverse society with races, cultures and religions that peacefully coexistence. The phenomenon of internal displacement occurred after April 2003, because of political instability as will as the deterioration of the political and security situation as a result of United States of America occupation. Biggest internal displacement have occurred (and keep happening) since 10th of June 2014 due to rise of Islamic State of Iraq and Syria (ISIS) and it’s occupation of one third of country territories. This crisis effected directly 3,275,000 people and reflected negatively on the social fabric of Iraq community and led to waves of sectorial violence that swept the country. Internal displaced communities are vulnerable, especially under non functional and weak government, that led to lose of essential human rights and dignity. Using Geographic Information System (GIS) and Geospatial Techniques, two types of internal displacement have been found; voluntary and forced. Both types of displacement are highly influenced by location, race and religion. The main challenge for Iraqi government and NGOs will be after defeating ISIS. Helping the displaced to resettle within their community and to re-establish the coexistence. By spatial-statical analysis hot spots of future conflicts among displaced community have been highlighted. This will help the government to tackle future conflicts before they occur. Also, it will be the base for social conflict early warning system.

Keywords: internal displacement, Iraq, ISIS, human security, human rights, GIS, spatial-statical analysis

Procedia PDF Downloads 494
2795 Internal Node Stabilization for Voltage Sense Amplifiers in Multi-Channel Systems

Authors: Sanghoon Park, Ki-Jin Kim, Kwang-Ho Ahn

Abstract:

This paper discusses the undesirable charge transfer by the parasitic capacitances of the input transistors in a voltage sense amplifier. Due to its intrinsic rail-to-rail voltage transition, the input sides are inevitably disturbed. It can possible disturb the stabilities of the reference voltage levels. Moreover, it becomes serious in multi-channel systems by altering them for other channels, and so degrades the linearity of the systems. In order to alleviate the internal node voltage transition, the internal node stabilization technique is proposed by utilizing an additional biasing circuit. It achieves 47% and 43% improvements for node stabilization and input referred disturbance, respectively.

Keywords: voltage sense amplifier, voltage transition, node stabilization, biasing circuits

Procedia PDF Downloads 451
2794 A Simulation for Behaviors of Preys to Avoid Pursuit of Predator

Authors: Jae Moon Lee

Abstract:

Generally the predator will continuously aim to attack the prey, while the prey will maintain a safe distance from the predator in order to avoid it . If the predator has enough energy to chase a certain amount of distance, it will begin to attack the prey. The prey needs to approach the predator for various reasons such as getting food. However, it will also try to keep a safe distance because of the threat of predators. The safe distance is dependent on the amount of the energy of predator, and the behaviors of prey is changed according to the size of the safe distance. This paper is to simulate the behaviors of preys to avoid the pursuit of predator based on the safe distance. The simulations will be executed experimentally under single predator and multiple preys. The results of the simulations show that the amount of energy of predator gives a great influence on the behavior of the prey.

Keywords: predator, prey, energy, safe distance, simulation

Procedia PDF Downloads 233
2793 Transformational Leadership and Departmental Performance: The Intervening Role of Internal Communication and Citizen/Customer Participation

Authors: Derrick Boakye Boadu, Zahra Fakhri

Abstract:

Transformational leaders are the catalyst of change and focus more importantly on members or followers. Involvement of transformational leadership style in organizational structures can provide interesting nuances to the implementation and enhancement of citizen and customer participation mechanisms in an organization regardless of the time consuming, cost, and delaying process of analyzing the feedback of workers and citizens/customers which stifles good outcome of organization’s department performance. It posits that transformational leadership has a positive direct effect on organization-departmental performance and the intervening role of citizen and customer participation and internal communication. Using the NASP-IV 2007 data, the article finds support for the five hypotheses in a structural equation model, and the findings show that transformational leadership does have a direct impact on organizational-departmental performance a partial mediation effect of the relationship through the role of internal communication and citizen and customer participation.  

Keywords: transformational leaders, departmental performance, internal communication, citizen/customer participation

Procedia PDF Downloads 82
2792 Experimental Study on Strength and Durability Properties of Bio-Self-Cured Fly Ash Based Concrete under Aggressive Environments

Authors: R. Malathy

Abstract:

High performance concrete is not only characterized by its high strength, workability, and durability but also by its smartness in performance without human care since the first day. If the concrete can cure on its own without external curing without compromising its strength and durability, then it is said to be high performance self-curing concrete. In this paper, an attempt is made on the performance study of internally cured concrete using biomaterials, namely Spinacea pleracea and Calatropis gigantea as self-curing agents, and it is compared with the performance of concrete with existing self-cure chemical, namely polyethylene glycol. The present paper focuses on workability, strength, and durability study on M20, M30, and M40 grade concretes replacing 30% of fly ash for cement. The optimum dosage of Spinacea pleracea, Calatropis gigantea, and polyethylene glycol was taken as 0.6%, 0.24%, and 0.3% by weight of cement from the earlier research studies. From the slump tests performed, it was found that there is a minimum variation between conventional concrete and self-cured concrete. The strength activity index is determined by keeping compressive strength of conventionally cured concrete for 28 days as unity and observed that, for self-cured concrete, it is more than 1 after 28 days and more than 1.15 after 56 days because of secondary reaction of fly ash. The performance study of concretes in aggressive environment like acid attack, sea water attack, and chloride attack was made, and the results are positive and encouraging in bio-self-cured concretes which are ecofriendly, cost effective, and high performance materials.

Keywords: bio materials, Calatropis gigantea, self curing concrete, Spinacea oleracea

Procedia PDF Downloads 322
2791 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 304
2790 Analysis of Stall Angle Delay in Airfoil Coupled with Spinning Cylinder

Authors: N. Kiran, S. A. Vikas, Yatish Chandra, S. Srinivasan

Abstract:

Several Centuries ago, the aerodynamic studies on rotating cylinders and spheres have started. From the observation, the rotation of a cylinder has a remarkable effect on the aerodynamic characteristics is noticed. In case of airfoils as the angle of attack increases, the drag increases with reduction in lift i.e at the critical angle of attack. If at this point a strong impulse is imparted to the boundary layer by means of a spinning cylinder, the re-energisation of boundary layer is achieved and hence delaying the boundary layer separation and stalling characteristics. Analysis of aerodynamic effects spinning cylinder either at leading edge or at trailing edge of the airfoil is carried in the past, the positioning of cylinder close to trailing edge and its effects in delaying the stall are yet to be analyzed in depth. This paper aim is to understand the combined aerodynamic effects of coupling the spinning cylinder with the airfoil closer to the Trailing edge, by considering different spin ratio of the cylinder, its location and geometrical parameters in relation to the chord of the airfoil. From the analysis, it was observed that the spinning cylinder speed of rotation and location had a impact on stalling characteristics for a prescribed free stream condition. The results predicted through CFD analysis and experimental analysis showed a raise in aerodynamic efficiency and as the spin ratio increases, increase in stalling angle of attack is noticed when compared to the airfoil without spinning cylinder.

Keywords: aerodynamics, airfoil, spinning cylinder, stalling

Procedia PDF Downloads 409
2789 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks

Authors: Huseyin Gokberk, Shian Gao

Abstract:

CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.

Keywords: CFD, turbulence modelling, aerofoil, angle of attack

Procedia PDF Downloads 169
2788 Enhancement of Aircraft Longitudinal Stability Using Tubercles

Authors: Muhammad Umer, Aishwariya Giri, Umaiyma Rakha

Abstract:

Mimicked from the humpback whale flippers, the application of tubercle technology is seen to be particularly advantageous at high angles of attack. This particular advantage is of paramount importance when it comes to structures producing lift at high angles of attack. This characteristic of the technology makes it ideal for horizontal stabilizers and selecting the same as the subject of study to identify and exploit the advantage highlighted by researchers on airfoils, this project aims in establishing a foundation for the application of the bio-mimicked technology on an existing aircraft. Using a baseline and 2 tubercle configuration integrated models, the project targets to achieve the twin aim of highlighting the possibility and merits over the base model and also choosing the right configuration in providing the best characteristic suitable for high angles of attack. To facilitate this study, the required models are generated using Solidworks followed by trials in a virtual aerodynamic environment using Fluent in Ansys for resolving the project objectives. Following a structured plan, the aim is to initially identify the advantages mathematically and then selecting the optimal configuration, simulate the end configuration at angles mimicking the actual operation envelope for the particular structure. Upon simulating the baseline configuration at various angles of attack, the stall angle was determined to be 22 degrees. Thus, the tubercle configurations will be simulated and compared at 4 different angles of attacks: 0, 10, 20, and 24. Further, after providing the optimum configuration of horizontal stabilizers, this study aims at the integration of aircraft structure so that the results better imply the end deliverables of real life application. This draws the project scope closer at this point into longitudinal static stability considerations and improvements in the manoeuvrability characteristics. The objective of the study is to achieve a complete overview ready for real life application with marked benefits obtainable from bio morphing of the tubercle technology.

Keywords: flow simulation, horizontal stabilizer, stability enhancement, tubercle

Procedia PDF Downloads 297
2787 Internal Factors that Prevent Using Assessment for Learning Strategies: A Case Study of Saudi Arabia

Authors: Khalid A. Alotaibi

Abstract:

To assess the students, there are different strategies adopted by teachers and all are important while taking their scope into consideration. Teachers may face some obstacles that prevent them using the assessment for learning. These obstacles can be internal or external. The present study has been collected from two regions (Riyadh and Hotat Bani Tamim) of Saudi Arabia, with sample size of 174 teachers. The results of the study have shown that the significant factors that can prevent teachers using assessment for learning are; the way of introducing the new form of assessment, lack of teachers' training, clarity of the regulations and size of students in the class. Additionally, other elements have also shown in this paper.

Keywords: teachers, assessment, assessment for learning, internal factors and external factors

Procedia PDF Downloads 422
2786 Intellectual Property Risk Assessment in Planning Market Entry to China

Authors: Qing Cao

Abstract:

Generally speaking, China has a relatively high level of intellectual property (IP) infringement. Risk assessment is indispensable in the strategic planning process. To complement the current literature in international business, the paper sheds the light on how to assess IP risk for foreign companies in planning market entry to China. Evaluating internal and external IP environment, proposed in the paper, consists of external analysis, internal analysis and further internal analysis. Through position the company’s IP environment, the risk assessment approach enables the foreign companies to either build the corresponding IP strategies or abort the entry plan beforehand to minimize the IP risks.

Keywords: intellectual property, IP environment, risk assessment

Procedia PDF Downloads 526
2785 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 419
2784 Comparison of Entropy Coefficient and Internal Resistance of Two (Used and Fresh) Cylindrical Commercial Lithium-Ion Battery (NCR18650) with Different Capacities

Authors: Sara Kamalisiahroudi, Zhang Jianbo, Bin Wu, Jun Huang, Laisuo Su

Abstract:

The temperature rising within a battery cell depends on the level of heat generation, the thermal properties and the heat transfer around the cell. The rising of temperature is a serious problem of Lithium-Ion batteries and the internal resistance of battery is the main reason for this heating up, so the heat generation rate of the batteries is an important investigating factor in battery pack design. The delivered power of a battery is directly related to its capacity, decreases in the battery capacity means the growth of the Solid Electrolyte Interface (SEI) layer which is because of the deposits of lithium from the electrolyte to form SEI layer that increases the internal resistance of the battery. In this study two identical cylindrical Lithium-Ion (NCR18650)batteries from the same company with noticeable different in capacity (a fresh and a used battery) were compared for more focusing on their heat generation parameters (entropy coefficient and internal resistance) according to Brandi model, by utilizing potentiometric method for entropy coefficient and EIS method for internal resistance measurement. The results clarify the effect of capacity difference on cell electrical (R) and thermal (dU/dT) parameters. It can be very noticeable in battery pack design for its Safety.

Keywords: heat generation, Solid Electrolyte Interface (SEI), potentiometric method, entropy coefficient

Procedia PDF Downloads 436
2783 Performance Study of Geopolymer Concrete by Partial Replacement of Fly Ash with Cement and Full Replacement of River Sand by Crushed Sand

Authors: Asis Kumar Khan, Rajeev Kumar Goel

Abstract:

Recent infrastructure growth all around the world lead to increase in demand for concrete day by day. Cement being binding material for concrete the usage of cement also gone up significantly. Cement manufacturing utilizes abundant natural resources and causes environment pollution by releasing a huge quantity of CO₂ into the atmosphere. So, it is high time to look for alternates to reduce the cement consumption in concrete. Geopolymer concrete is one such material which utilizes the industrial waste such as fly ash, ground granulated blast furnace slag and low-cost alkaline liquids such as sodium hydroxide and sodium silicate to produce the concrete. On the other side, river sand is becoming very expensive due to its large-scale depletion at source and the high cost of transportation. In this view, river sand is replaced by crushed sand in this study. In this work, an attempt has been made to understand the durability parameters of geopolymer concrete by partially replacing fly ash with cement. Fly ash is replaced by cement at various levels e.g., from 0 to 50%. Concrete cubes of 100x100x100mm were used for investigating different durability parameters. The various parameters studied includes compressive strength, split tensile strength, drying shrinkage, sodium sulphate attack resistance, sulphuric acid attack resistance and chloride permeability. Highest compressive strength & highest split tensile strength is observed in 30% replacement level. Least drying is observed with 30% replacement level. Very good resistance for sulphuric acid & sodium sulphate is found with 30% replacement. However, it was not possible to find out the chloride permeability due to the high conductivity of geopolymer samples of all replacement levels.

Keywords: crushed sand, compressive strength, drying shrinkage, geopolymer concrete, split tensile strength, sodium sulphate attack resistance, sulphuric acid attack resistance

Procedia PDF Downloads 269
2782 VDGMSISS: A Verifiable and Detectable Multi-Secret Images Sharing Scheme with General Access Structure

Authors: Justie Su-Tzu Juan, Ming-Jheng Li, Ching-Fen Lee, Ruei-Yu Wu

Abstract:

A secret image sharing scheme is a way to protect images. The main idea is dispersing the secret image into numerous shadow images. A secret image sharing scheme can withstand the impersonal attack and achieve the highly practical property of multiuse  is more practical. Therefore, this paper proposes a verifiable and detectable secret image-sharing scheme called VDGMSISS to solve the impersonal attack and to achieve some properties such as encrypting multi-secret images at one time and multi-use. Moreover, our scheme can also be used for any genera access structure.

Keywords: multi-secret image sharing scheme, verifiable, de-tectable, general access structure

Procedia PDF Downloads 100
2781 Modeling and Numerical Simulation of Heat Transfer and Internal Loads at Insulating Glass Units

Authors: Nina Penkova, Kalin Krumov, Liliana Zashcova, Ivan Kassabov

Abstract:

The insulating glass units (IGU) are widely used in the advanced and renovated buildings in order to reduce the energy for heating and cooling. Rules for the choice of IGU to ensure energy efficiency and thermal comfort in the indoor space are well known. The existing of internal loads - gage or vacuum pressure in the hermetized gas space, requires additional attention at the design of the facades. The internal loads appear at variations of the altitude, meteorological pressure and gas temperature according to the same at the process of sealing. The gas temperature depends on the presence of coatings, coating position in the transparent multi-layer system, IGU geometry and space orientation, its fixing on the facades and varies with the climate conditions. An algorithm for modeling and numerical simulation of thermal fields and internal pressure in the gas cavity at insulating glass units as function of the meteorological conditions is developed. It includes models of the radiation heat transfer in solar and infrared wave length, indoor and outdoor convection heat transfer and free convection in the hermetized gas space, assuming the gas as compressible. The algorithm allows prediction of temperature and pressure stratification in the gas domain of the IGU at different fixing system. The models are validated by comparison of the numerical results with experimental data obtained by Hot-box testing. Numerical calculations and estimation of 3D temperature, fluid flow fields, thermal performances and internal loads at IGU in window system are implemented.

Keywords: insulating glass units, thermal loads, internal pressure, CFD analysis

Procedia PDF Downloads 231
2780 Study of Temperature Difference and Current Distribution in Parallel-Connected Cells at Low Temperature

Authors: Sara Kamalisiahroudi, Jun Huang, Zhe Li, Jianbo Zhang

Abstract:

Two types of commercial cylindrical lithium ion batteries (Panasonic 3.4 Ah NCR-18650B and Samsung 2.9 Ah INR-18650), were investigated experimentally. The capacities of these samples were individually measured using constant current-constant voltage (CC-CV) method at different ambient temperatures (-10 ℃, 0 ℃, 25 ℃). Their internal resistance was determined by electrochemical impedance spectroscopy (EIS) and pulse discharge methods. The cells with different configurations of parallel connection NCR-NCR, INR-INR and NCR-INR were charged/discharged at the aforementioned ambient temperatures. The results showed that the difference of internal resistance between cells much more evident at low temperatures. Furthermore, the parallel connection of NCR-NCR exhibits the most uniform temperature distribution in cells at -10 ℃, this feature is quite favorable for the safety of the battery pack.

Keywords: batteries in parallel connection, internal resistance, low temperature, temperature difference, current distribution

Procedia PDF Downloads 447
2779 The Origin Variability of the Obturator Artery

Authors: Halimah Al Hifzi, Waseem Al-Talalwah, Shorok Al Dorazi, Hassan Al Mousa, Zainab Al-Hashim, Roger Soames

Abstract:

The obturator artery is one branches of anterior division of the internal iliac artery. It passes on the lateral wall of pelvis to escape into thigh region via obturator foremen. Based on previous research studies, it found to be extremely variable in origin and course. It may arise from internal or external iliac artery. The current study includes 82 dissected specimens to investigate the origin of the obturator artery and explain the clinical importance. The obturator artery arises from the internal iliac artery in 75% either from its anterior or posterior division in 46.9% or 25% respectively. Further, it arises neither from the anterior nor posterior division of the internal iliac artery but it arises between them in 3.1%. In 25%, the obturator artery arises from the external iliac artery. In case of aneurysmectomy of posterior division, carries a high risk of insufficient of vascular supply for demand structures such as proximal adductors attachment and hip joint. Therefore, vascular surgeons have to pay attention to the posterior division being an origin of the obturator artery beside its usual three classical branches: superior gluteal, iliolumbar and lateral sacral arteries. Further, the obturator artery arising from the external iliac system is in great dangerous of laceration in case of anterior pelvic fracture. Therefore, it may lead to haemorrhagic shock threatening life.

Keywords: obturator artery, external iliac, internal iliac artery, anterior division, posterior division, superior gluteal, iliolumbar and lateral sacral, pubic fracture, aneurysm, shock

Procedia PDF Downloads 318
2778 Internal Leakage Analysis from Pd to Pc Port Direction in ECV Body Used in External Variable Type A/C Compressor

Authors: M. Iqbal Mahmud, Haeng Muk Cho, Seo Hyun Sang, Wang Wen Hai, Chang Heon Yi, Man Ik Hwang, Dae Hoon Kang

Abstract:

Solenoid operated electromagnetic control valve (ECV) playing an important role for car’s air conditioning control system. ECV is used in external variable displacement swash plate type compressor and controls the entire air conditioning system by means of a pulse width modulation (PWM) input signal supplying from an external source (controller). Complete form of ECV contains number of internal features like valve body, core, valve guide, plunger, guide pin, plunger spring, bellows etc. While designing the ECV; dimensions of different internal items must meet the standard requirements as it is quite challenging. In this research paper, especially the dimensioning of ECV body and its three pressure ports through which the air/refrigerant passes are considered. Here internal leakage test analysis of ECV body is being carried out from its discharge port (Pd) to crankcase port (Pc) when the guide valve is placed inside it. The experiments have made both in ordinary and digital system using different assumptions and thereafter compare the results.

Keywords: electromagnetic control valve (ECV), leakage, pressure port, valve body, valve guide

Procedia PDF Downloads 373
2777 Formal Institutions and Women's Electoral Participation in Four European Countries

Authors: Sophia Francesca D. Lu

Abstract:

This research tried to produce evidence that formal institutions, such as electoral and internal party quotas, can advance women’s active roles in the public sphere using the cases of four European countries: Belgium, Germany, Italy, and the Netherlands. The quantitative dataset was provided by the University of Chicago and the Inter-University Consortium of Political and Social Research based on a two-year study (2008-2010) of political parties. Belgium engages in constitutionally mandated electoral quotas. Germany, Italy and the Netherlands, on the other hand, have internal party quotas, which are voluntarily adopted by political parties. In analyzing each country’s chi-square and Pearson’s r correlation, Belgium, having an electoral quota, is the only country that was analyzed for electoral quotas. Germany, Italy and the Netherlands’ internal voluntary party quotas were correlated with women’s descriptive representations. Using chi-square analysis, this study showed that the presence of electoral quotas is correlated with an increase in the percentage of women in decision-making bodies as well as with an increase in the percentage of women in decision-making bodies. Likewise, using correlational analysis, a higher number of political parties employing internal party voluntary quotas is correlated with an increase in the percentage of women occupying seats in parliament as well as an increase in the percentage of women nominees in electoral lists of political parties. In conclusion, gender quotas, such as electoral quotas or internal party quotas, are an effective policy tool for greater women’s representation in political bodies. Political parties and governments should opt to have gender quotas, whether electoral or internal party quotas, to address the underrepresentation of women in parliament, decision-making bodies, and policy-formulation.

Keywords: electoral quota, Europe, formal institutions, institutional feminism, internal party quota, women’s electoral participation

Procedia PDF Downloads 393
2776 Effects of Viscous Dissipation and Concentration Based Internal Heat Source on Convective Instability in A Porous Medium with Throughflow

Authors: N. Deepika, P. A. L. Narayana

Abstract:

Linear stability analysis of double diffusive convection in a horizontal porous layer saturated with fluid is examined by considering the effects of viscous dissipation, concentration based internal heat source and vertical throughflow. The basic steady state solution for Governing equations is computed. Linear stability analysis has been implemented numerically by using Runge-kutta method. Critical thermal Rayleigh number Rac is obtained for various values of solutal Rayleigh number Sa, vertical Peclet number Pe, Gebhart number Ge, Lewis number Le and measure of concentration based internal heat source $\gamma$. It is observed that Ge has destabilizing effect for upward throughflow and stabilizing effect for downward throughflow. For sufficient value of Pe, $\gamma$ has considerable destabilizing effect for upward throughflow, insignificant destabilizing effect for downward throughflow.

Keywords: porous medium, concentration based internal heat source, vertical throughflow, viscous dissipation

Procedia PDF Downloads 433
2775 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 278
2774 Investigation of Internal Gettering at Low Temperatures of Metallic Elements in HEM Wafers mc-Si for Photovoltaic Solar Cells

Authors: Abdelghani Boucheham, Djoudi Bouhafs, Nabil Khelifati, Baya Palahouane

Abstract:

The main aim of this study is to investigate the low temperature internal gettering of manganese and chromium transition metals content in p-type multicrystalline silicon grown by Heat Exchanger Method (HEM). The minority carrier lifetime variation, the transition metal elements behavior, the sheet resistivity and the interstitial oxygen concentration after different temperatures annealing under N2 ambient were investigated using quasi-steady state photoconductance technique (QSSPC), secondary ion mass spectroscopy (SIMS), four-probe measurement and Fourier transform infrared spectrometer (FTIR), respectively. The obtained results indicate in the temperature range of 300°C to 700°C that the effective lifetime increases and reaches its maximum values of 28 μs at 500 °C and decreasing to 6 μs at 700 °C. This amelioration is due probably to metallic impurities internal gettering in the extended defects and in the oxygen precipitates as observed on SIMS profiles and the FTIR spectra. From 300 °C to 500 °C the sheet resistivity values rest unchanged at 30 Ohm/sq and rises significantly to reach 45 Ohm/sq for T> 500 °C.

Keywords: mc-Si, low temperature annealing, internal gettering, minority carrier lifetime, interstitial oxygen, resistivity

Procedia PDF Downloads 286
2773 Assessing the Risk of Condensation and Moisture Accumulation in Solid Walls: Comparing Different Internal Wall Insulation Options

Authors: David Glew, Felix Thomas, Matthew Brooke-Peat

Abstract:

Improving the thermal performance of homes is seen as an essential step in achieving climate change, fuel security, fuel poverty targets. One of the most effective thermal retrofits is to insulate solid walls. However, it has been observed that applying insulation to the internal face of solid walls reduces the surface temperature of the inner wall leaf, which may introduce condensation risk and may interrupt seasonal moisture accumulation and dissipation. This research quantifies the extent to which the risk of condensation and moisture accumulation in the wall increases (which can increase the risk of timber rot) following the installation of six different types of internal wall insulation. In so doing, it compares how risk is affected by both the thermal resistance, thickness, and breathability of the insulation. Thermal bridging, surface temperatures, condensation risk, and moisture accumulation are evaluated using hygrothermal simulation software before and after the thermal upgrades. The research finds that installing internal wall insulation will always introduce some risk of condensation and moisture. However, it identifies that risks were present prior to insulation and that breathable materials and insulation with lower resistance have lower risks than alternative insulation options. The implications of this may be that building standards that encourage the enhanced thermal performance of solid walls may be introducing moisture risks into homes.

Keywords: condensation risk, hygrothermal simulation, internal wall insulation, thermal bridging

Procedia PDF Downloads 129
2772 Release Response of Black Spruce and White Spruce Following Overstory Lodgepole Pine Mortality Due to Mountain Pine Beetle Attack

Authors: F. O. Oboite, P. G. Comeau

Abstract:

Advance regeneration is present in many lodgepole pine stands in Alberta. When the overstory pine canopy is killed by Mountain Pine Beetle (MPB) the growth of this advance is likely to increase. Understanding the growth response of these understory tree species is needed to improve mid-term timber supply projections and management decisions. To quantify the growth (diameter, height, height/diameter ratio) responses of black spruce and white spruce to lodgepole pine mortality, sample trees of black and white spruce advance regeneration were selected from 7 lodgepole pine dominated stands (5 attacked; 2 control) in the Foothills Region of western Alberta. Measurements were collected 7-8 years after MPB attack across a wide range of spruce height and stand densities. Analysis was done using mixed model linear regression. Result indicates that there was an increase in both diameter and height growth after MPB attack; however, this increase in growth was delayed for about four years. Both spruce species had similar height response and their height/diameter ratio decreased after release, partly as a result of increased understory light associated with loss of needles in the pine canopy. In addition, the diameter and height growth responses of both spruce species were strongly related to density, prerelease growth and initial size.

Keywords: mountain pine beetle, forest regeneration, lodgepole pine, growth response

Procedia PDF Downloads 340
2771 Internal Audit Function Contributions to the External Audit

Authors: Douglas F. Prawitt, Nathan Y. Sharp, David A. Wood

Abstract:

Consistent with prior experimental and survey studies, we find that IAFs that spend more time directly assisting the external auditor is associated with lower external audit fees. Interestingly, we do not find evidence that external auditors reduce fees based on work previously performed by the IAF. We also find that the time spent assisting the external auditor has a greater negative effect on external audit fees than the time spent performing tasks upon which the auditor may rely but that are not performed as direct assistance to the external audit. Our results also show that previous proxies used to measure this relation is either not associated with or are negatively associated with our direct measures of how the IAF can contribute to the external audit and are highly positively associated with the size and the complexity of the organization. Thus, we conclude the disparate experimental and archival results may be attributable to issues surrounding the construct validity of measures used in previous archival studies and that when measures similar to those used in experimental studies are employed in archival tests, the archival results are consistent with experimental findings. Our research makes four primary contributions to the literature. First, we provide evidence that internal auditing contributes to a reduction in external audit fees. Second, we replicate and provide an explanation for why previous archival studies find that internal auditing has either no association with external audit fees or is associated with an increase in those fees: prior studies generally use proxies of internal audit contribution that do not adequately capture the intended construct. Third, our research expands on survey-based research (e.g., Oil Libya sh.co.) by separately examining the impact on the audit fee of the internal auditors’ work, indirectly assisting external auditors and internal auditors’ prior work upon which external auditors can rely. Finally, we extend prior research by using a new, independent data source to validate and extend prior studies. This data set also allows for a sample of examining the impact of internal auditing on the external audit fee and the use of a more comprehensive external audit fee model that better controls for determinants of the external audit fee.

Keywords: internal audit, contribution, external audit, function

Procedia PDF Downloads 93
2770 Numerical Analysis of Internal Cooled Turbine Blade Using Conjugate Heat Transfer

Authors: Bhavesh N. Bhatt, Zozimus D. Labana

Abstract:

This work is mainly focused on the analysis of heat transfer of blade by using internal cooling method. By using conjugate heat transfer technology we can effectively compute the cooling and heat transfer analysis of blade. Here blade temperature is limited by materials melting temperature. By using CFD code, we will analyze the blade cooling with the help of CHT method. There are two types of CHT methods. In the first method, we apply coupled CHT method in which all three domains modeled at once, and in the second method, we will first model external domain and then, internal domain of cooling channel. Ten circular cooling channels are used as a cooling method with different mass flow rate and temperature value. This numerical simulation is applied on NASA C3X turbine blade, and results are computed. Here results are showing good agreement with experimental results. Temperature and pressure are high at the leading edge of the blade on stagnation point due to its first faces the flow. On pressure side, shock wave is formed which also make a sudden change in HTC and other parameters. After applying internal cooling, we are succeeded in reducing the metal temperature of blade by some extends.

Keywords: gas turbine, conjugate heat transfer, NASA C3X Blade, circular film cooling channel

Procedia PDF Downloads 297
2769 Technology Planning with Internal and External Resource for Open Innovation

Authors: Jeonghwan Jeon

Abstract:

Technology planning with both internal capacity and external resource is necessary for successful open innovation. Until now, many types of research have been conducted for this issue. However, technology planning for open innovation at the national level has not been researched sufficiently. This study proposes Open roadmap for open innovation at the national level. The proposed open roadmap can manage the inflow & outflow open innovation systematically. Six types of open roadmap are classified with respect to the innovation direction and characteristics. The proposed open roadmap is applied to the open innovation cases of the Roman period. The proposed open roadmap is expected to be helpful tool for technology policy planning at the national level.

Keywords: technology planning, open innovation, internal resource, external resource, technology management

Procedia PDF Downloads 456
2768 Comparison of Numerical Results of Lambda Wing under Different Turbulence Models and Wall Y+

Authors: Hsien Hao Teng

Abstract:

This study uses numerical simulation to analyze the aerodynamic characteristics of the 53-degree Lambda wing with a sweep angle and mainly discusses the numerical simulation results and physical characteristics of the wall y+. Use the commercial software Fluent to execute Mach number 0.15; when the angle of attack attitude is between 0 degrees and 27 degrees, the physical characteristics of the overall aerodynamic force are analyzed, especially when the fluid separation and vortex structure changes are discussed under the condition of high angle of attack, it will affect The instability of pitching moment. In the numerical calculation, the use of wall y+ and turbulence model will affect the prediction of vortex generation and the difference in structure. The analysis results are compared with experimental data to discuss the trend of the aerodynamic characteristics of the Lambda wing.

Keywords: lambda wing, wall function, turbulence model, computational fluid dynamics

Procedia PDF Downloads 212
2767 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 38