Search results for: Coping mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1027

Search results for: Coping mechanism

607 An Edit-Distance Algorithm to Detect Correlated Attacks in Distributed Systems

Authors: Sule Simsek

Abstract:

Intrusion detection systems (IDS)are crucial components of the security mechanisms of today-s computer systems. Existing research on intrusion detection has focused on sequential intrusions. However, intrusions can also be formed by concurrent interactions of multiple processes. Some of the intrusions caused by these interactions cannot be detected using sequential intrusion detection methods. Therefore, there is a need for a mechanism that views the distributed system as a whole. L-BIDS (Lattice-Based Intrusion Detection System) is proposed to address this problem. In the L-BIDS framework, a library of intrusions and distributed traces are represented as lattices. Then these lattices are compared in order to detect intrusions in the distributed traces.

Keywords: Attack graph, distributed, edit-distance, misuse detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1388
606 Fuzzy PID based PSS Design Using Genetic Algorithm

Authors: Ermanu A. Hakim, Adi Soeprijanto, Mauridhi H.P

Abstract:

This paper presents PSS (Power system stabilizer) design based on optimal fuzzy PID (OFPID). OFPID based PSS design is considered for single-machine power systems. The main motivation for this design is to stabilize or to control low-frequency oscillation on power systems. Firstly, describing the linear PID control then to combine this PID control with fuzzy logic control mechanism. Finally, Fuzzy PID parameters (Kp. Kd, KI, Kupd, Kui) are tuned by Genetic Algorthm (GA) to reach optimal global stability. The effectiveness of the proposed PSS in increasing the damping of system electromechanical oscillation is demonstrated in a one-machine-infinite-bus system

Keywords: Fuzzy PID, Genetic Algorithm, power system stabilizer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1749
605 Computational Assistance of the Research, Using Dynamic Vector Logistics of Processes for Critical Infrastructure Subjects Continuity

Authors: J. Urbánek Jiří, Krahulec Josef, Johanidesová Jitka, F. Urbánek Jiří

Abstract:

This paper deals with using of prevailing operation system MS Office (SmartArt...) for mathematical models, using DYVELOP (Dynamic Vector Logistics of Processes) method. It serves for crisis situations investigation and modelling within the organizations of critical infrastructure. In first part of paper, it will be introduced entities, operators, and actors of DYVELOP method. It uses just three operators of Boolean algebra and four types of the entities: the Environments, the Process Systems, the Cases, and the Controlling. The Process Systems (PrS) have five “brothers”: Management PrS, Transformation PrS, Logistic PrS, Event PrS and Operation PrS. The Cases have three “sisters”: Process Cell Case, Use Case, and Activity Case. They all need for the controlling of their functions special Ctrl actors, except ENV – it can do without Ctrl. Model´s maps are named the Blazons and they are able mathematically - graphically express the relationships among entities, actors and processes. In second part of this paper, the rich blazons of DYVELOP method will be used for the discovering and modelling of the cycling cases and their phases. The blazons need live PowerPoint presentation for better comprehension of this paper mission. The crisis management of energetic crisis infrastructure organization is obliged to use the cycles for successful coping of crisis situations. Several times cycling of these cases is necessary condition for the encompassment for both emergency events and the mitigation of organization´s damages. Uninterrupted and continuous cycling process brings for crisis management fruitfulness and it is good indicator and controlling actor of organizational continuity and its sustainable development advanced possibilities. The research reliable rules are derived for the safety and reliable continuity of energetic critical infrastructure organization in the crisis situation.

Keywords: Blazons, computational assistance, DYVELOP method, critical infrastructure.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1634
604 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network

Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola

Abstract:

Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.

Keywords: Mobile ad-hoc network, selfish nodes, reputation-based techniques, acknowledgment-based techniques.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1376
603 Molecular Characteristics of Phosphoric Acid Treated Soils

Authors: Amin Eisazadeh, Khairul Anuar Kassim, Hadi Nur

Abstract:

The expansive nature of soils containing high amounts of clay minerals can be altered through chemical stabilization, resulting in a material suitable for construction purposes. The primary objective of this investigation was to study the changes induced in the molecular structure of phosphoric acid stabilized bentonite and lateritic soil using Nuclear Magnetic Resonance (NMR) and Fourier Transform Infrared (FTIR) spectroscopy. Based on the obtained data, it was found that a surface alteration mechanism was the main reason responsible for the improvement of treated soils. Furthermore, the results indicated that the Al present in the octahedral layer of clay minerals were more amenable to chemical attacks and also partly responsible for the formation of new products.

Keywords: Bentonite, Laterite clay, Molecularcharacterization, Phosphoric acid, Stabilization

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2406
602 Optimal Classifying and Extracting Fuzzy Relationship from Query Using Text Mining Techniques

Authors: Faisal Alshuwaier, Ali Areshey

Abstract:

Text mining techniques are generally applied for classifying the text, finding fuzzy relations and structures in data sets. This research provides plenty text mining capabilities. One common application is text classification and event extraction, which encompass deducing specific knowledge concerning incidents referred to in texts. The main contribution of this paper is the clarification of a concept graph generation mechanism, which is based on a text classification and optimal fuzzy relationship extraction. Furthermore, the work presented in this paper explains the application of fuzzy relationship extraction and branch and bound (BB) method to simplify the texts.

Keywords: Extraction, Max-Prod, Fuzzy Relations, Text Mining, Memberships, Classification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2184
601 Prediction of Soil Liquefaction by Using UBC3D-PLM Model in PLAXIS

Authors: A. Daftari, W. Kudla

Abstract:

Liquefaction is a phenomenon in which the strength  and stiffness of a soil is reduced by earthquake shaking or other rapid  cyclic loading. Liquefaction and related phenomena have been  responsible for huge amounts of damage in historical earthquakes  around the world.  Modeling of soil behavior is the main step in soil liquefaction  prediction process. Nowadays, several constitutive models for sand  have been presented. Nevertheless, only some of them can satisfy this  mechanism. One of the most useful models in this term is  UBCSAND model. In this research, the capability of this model is  considered by using PLAXIS software. The real data of superstition  hills earthquake 1987 in the Imperial Valley was used. The results of  the simulation have shown resembling trend of the UBC3D-PLM  model. 

Keywords: Liquefaction, Plaxis, Pore-Water pressure, UBC3D-PLM.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7105
600 Seismic Resistant Mechanism of Two-by-four Wooden Frame with Vibration Control Device

Authors: Takumi Ito, Kurumi Kurokawa, Dong Hang Wu, Takashi Nagumo, Haruhiko Hirata

Abstract:

The structural system of wooden house by two-by-four method is widely adopted in any countries, and a various type of vibration control system for building structures has been developed on country with frequent earthquake. In this study, a vibration control device called “Scaling Frame” (SF) is suggested, and which is applied to wooden two-by-four method structures. This paper performs the experimental study to investigate the restoring force characteristics of two-by-four with SF device installed. The seismic resistant performance is estimated experimentally, and also the applicability and effectiveness are discussing.

Keywords: Two-by-four method, seismic vibration control, horizontally loading test, restoring force characteristics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1078
599 Green, Smooth and Easy Electrochemical Synthesis of N-Protected Indole Derivatives

Authors: Sarah Fahad Alajmi, Tamer Ezzat Youssef

Abstract:

Here, we report a simple method for the direct conversion of 6-Nitro-1H-indole into N-substituted indoles via electrochemical dehydrogenative reaction with halogenated reagents under strongly basic conditions through N–R bond formation. The N-protected indoles have been prepared under moderate and scalable electrolytic conditions. The conduct of the reactions was performed in a simple divided cell under constant current without oxidizing reagents or transition-metal catalysts. The synthesized products have been characterized via UV/Vis spectrophotometry, 1H-NMR, and FTIR spectroscopy. A possible reaction mechanism is discussed based on the N-protective products. This methodology could be applied to the synthesis of various biologically active N-substituted indole derivatives.

Keywords: Green chemistry, 1H-indole, NH-containing heteroaromatic, organic electrosynthesis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 932
598 A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR

Authors: E. Tomur, R. Deregozu, T. Genc

Abstract:

In this study, we propose a network architecture for providing secure access to information resources of enterprise network from remote locations in a wireless fashion. Our proposed architecture offers a very promising solution for organizations which are in need of a secure, flexible and cost-effective remote access methodology. Security of the proposed architecture is based on Virtual Private Network technology and a special role based access control mechanism with location and time constraints. The flexibility mainly comes from the use of Internet as the communication medium and cost-effectiveness is due to the possibility of in-house implementation of the proposed architecture.

Keywords: Remote access, wireless networks, security, virtualprivate networks, RBAC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1698
597 Stability of a Self-Excited Machine Due to the Mechanical Coupling

Authors: M. Soltan Rezaee, M. R. Ghazavi, A. Najafi, W.-H. Liao

Abstract:

Generally, different rods in shaft systems can be misaligned based on the mechanical system usages. These rods can be linked together via U-coupling easily. The system is self-stimulated and may cause instabilities due to the inherent behavior of the coupling. In this study, each rod includes an elastic shaft with an angular stiffness and structural damping. Moreover, the mass of shafts is considered via attached solid disks. The impact of the system architecture and shaft mass on the instability of such mechanism are studied. Stability charts are plotted via a method based on Floquet theory. Eventually, the unstable points have been found and analyzed in detail. The results show that stabilizing the driveline is feasible by changing the system characteristics which include shaft mass and architecture.

Keywords: Coupling, mechanical systems, oscillations, rotating shafts.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 762
596 Motion Planning and Posture Control of the General 3-Trailer System

Authors: K. Raghuwaiya, B. Sharma, J. Vanualailai

Abstract:

This paper presents a set of artificial potential field functions that improves upon, in general, the motion planning and posture control, with theoretically guaranteed point and posture stabilities, convergence and collision avoidance properties of the general3-trailer system in a priori known environment. We basically design and inject two new concepts; ghost walls and the distance optimization technique (DOT) to strengthen point and posture stabilities, in the sense of Lyapunov, of our dynamical model. This new combination of techniques emerges as a convenient mechanism for obtaining feasible orientations at the target positions with an overall reduction in the complexity of the navigation laws. Simulations are provided to demonstrate the effectiveness of the controls laws.

Keywords: Artificial potential fields, 3-trailer systems, motion planning, posture.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2151
595 Investigation of the Synthesis of Alcohols Byproducts in Fischer-Tropsch Synthesis on Modified Fe-Cu Catalyst: Reactivity and Mechanism

Authors: Wanyu Mao, Qiwen Sun, Weiyong Ying, Dingye Fang

Abstract:

The influence of copper promoters and reaction conditions on the formation of alcohols byproducts of a common Fischer-Tropsch synthesis used iron-based catalysts were investigated. A good compromise of 28%Cu/FeKLaSiO2 can lead to the optimization of an improved Fischer-Tropsch catalyst. The product distribution shifts towards hydrocarbons with increasing the reaction temperature, while pressure promotes the formation of alcohols. It was found that the production of either alcohols or hydrocarbons followed A-S-F distributions, and their α parameters were essentially different which indicated a competition in the growing chain between the two species. TPD after acetaldehyde adsorption gave strong evidence of the insertion of a C1 oxygen-containing species into an alkyl chain.

Keywords: Fischer-Tropsch synthesis, Fe-Cu catalyst, alcohols byproducts, reaction pathways

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1634
594 Designing a Robust Controller for a 6 Linkage Robot

Authors: G. Khamooshian

Abstract:

One of the main points of application of the mechanisms of the series and parallel is the subject of managing them. The control of this mechanism and similar mechanisms is one that has always been the intention of the scholars. On the other hand, modeling the behavior of the system is difficult due to the large number of its parameters, and it leads to complex equations that are difficult to solve and eventually difficult to control. In this paper, a six-linkage robot has been presented that could be used in different areas such as medical robots. Using these robots needs a robust control. In this paper, the system equations are first found, and then the system conversion function is written. A new controller has been designed for this robot which could be used in other parallel robots and could be very useful. Parallel robots are so important in robotics because of their stability, so methods for control of them are important and the robust controller, especially in parallel robots, makes a sense.

Keywords: 3-RRS, 6 linkage, parallel robot, control.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 669
593 Software Model for a Computer Based Training for an HVDC Control Desk Simulator

Authors: José R. G. Braga, Joice B. Mendes, Guilherme H. Caponetto, Alexandre C. B. Ramos

Abstract:

With major technological advances and to reduce the cost of training apprentices for real-time critical systems, it was necessary the development of Intelligent Tutoring Systems for training apprentices in these systems. These systems, in general, have interactive features so that the learning is actually more efficient, making the learner more familiar with the mechanism in question. In the home stage of learning, tests are performed to obtain the student's income, a measure on their use. The aim of this paper is to present a framework to model an Intelligent Tutoring Systems using the UML language. The various steps of the analysis are considered the diagrams required to build a general model, whose purpose is to present the different perspectives of its development.

Keywords: Computer based training, Hypermedia, Software modeling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1607
592 Building Design to Save Lives when Earthquake May Strike the City

Authors: Tejinder Singh

Abstract:

When earthquakes strike the city it results in great loss of lives. The present paper talks about a new innovative design system (MegEifel) for buildings which has a mechanism to mitigate deaths in case any earthquake strikes the city. If buildings will be designed according to MegEifel design then the occupants of the building will be safe even when they are in sleep or are doing day wise activities during the time earthquake strikes. The core structure is suggested to be designed on the principle that more deep the foundations are, the harder it is to uproot the structure. The buildings will have an Eifel rod dug deep into earth which will help save lives in tall buildings when earthquake strikes. This design takes a leverage of protective shells to save lives.

Keywords: Structure, MegEifel, Save, Life, Earthquake, Design

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1580
591 A Metametadata Architecture forPedagogic Data Description

Authors: A. Ismail, M. S. Joy, J. E. Sinclair, M. I. Hamzah

Abstract:

This paper focuses on a novel method for semantic searching and retrieval of information about learning materials. Metametadata encapsulate metadata instances by using the properties and attributes provided by ontologies rather than describing learning objects. A novel metametadata taxonomy has been developed which provides the basis for a semantic search engine to extract, match and map queries to retrieve relevant results. The use of ontological views is a foundation for viewing the pedagogical content of metadata extracted from learning objects by using the pedagogical attributes from the metametadata taxonomy. Using the ontological approach and metametadata (based on the metametadata taxonomy) we present a novel semantic searching mechanism.These three strands – the taxonomy, the ontological views, and the search algorithm – are incorporated into a novel architecture (OMESCOD) which has been implemented.

Keywords: Metadata, metametadata, semantic, ontologies.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1514
590 Considerations of Public Key Infrastructure (PKI), Functioning as a Chain of Trust in Electronic Payments Systems

Authors: Theodosios Tsiakis, George Stephanides, George Pekos

Abstract:

The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital – electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent level of security served in conventional paper-based payment transactions. PKI, which is functioning as a chain of trust in security architecture, can enable security services of cryptography to epayments, in order to take advantage of the wider base either of customer or of trading partners and the reduction of cost transaction achieved by the use of Internet channels. The paper addresses the possibilities and the implementation suggestions of PKI in relevance to electronic payments by suggesting a framework that should be followed.

Keywords: Electronic Payment, Security, Trust

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1423
589 Survey on Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

Authors: Swapnil Singh, Sanjoy Das

Abstract:

Mobile Ad-Hoc Network (MANET) is a network without infrastructure dynamically formed by autonomous system of mobile nodes that are connected via wireless links. Mobile nodes communicate with each other on the fly. In this network each node also acts as a router. The battery power and the bandwidth are very scarce resources in this network. The network lifetime and connectivity of nodes depend on battery power. Therefore, energy is a valuable constraint which should be efficiently used. In this paper we survey various energy efficient routing protocols. The energy efficient routing protocols are classified on the basis of approaches they use to minimize the energy consumption. The purpose of this paper is to facilitate the research work and combine the existing solution and to develop a more energy efficient routing mechanism.

Keywords: Delaunay Triangulation, deployment, energy efficiency, MANET.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3038
588 Crisis In/Out, Emergent, and Adaptive Urban Organisms

Authors: Y. Hadjichristou, A. Swiny, M. Georgiou

Abstract:

This paper focuses on the questions raised through the work of Unit 5: ‘In/Out Crisis, emergent and adaptive’; an architectural research-based studio at [ARC] University of Nicosia. Students were asked to delve into state of Art Technologies in order to propose sustainable Emergent and Adaptive Architectures and Urbanities, the resulting unprecedented spatial conditions and atmospheres of the emergent new ways of living are deemed to be the ultimate aim of the investigation. Students explored a variety of sites and crisis conditions seen through their primary ingredient identified as soil, water and air and their paired combination. Within this methodology, crisis is seen as a mechanism for allowing an emergence of new and fascinating ultimate sustainable future cultures and cities by taking advantage of the primary materiality of the sites.

Keywords: Adaptive built environments, crisis as opportunity, emergent urbanities, forces for inventions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1794
587 Correlated Neural Activity in Cortex and Thalamus Following Brain Injury

Authors: Young-Seok Choi

Abstract:

It has been known that a characteristic Burst-Suppression (BS) pattern appears in EEG during the early recovery period following Cardiac Arrest (CA). Here, to explore the relationship between cortical and subcortical neural activities underlying BS, extracellular activity in the parietal cortex and the centromedian nucleus of the thalamus and extradural EEG were recorded in a rodent CA model. During the BS, the cortical firing rate is extraordinarily high, and that bursts in EEG correlate to dense spikes in cortical neurons. Newly observed phenomena are that 1) thalamic activity reemerges earlier than cortical activity following CA, and 2) the correlation coefficient of cortical and thalamic activities rises during BS period. These results would help elucidate the underlying mechanism of brain recovery after CA injury.

Keywords: Cortex, thalamus, cardiac arrest, burst-suppression.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1928
586 Position Awareness Mechanisms for Wireless Sensor Networks

Authors: Seyed Mostafa Torabi

Abstract:

A Wireless sensor network (WSN) consists of a set of battery-powered nodes, which collaborate to perform sensing tasks in a given environment. Each node in WSN should be capable to act for long periods of time with scrimpy or no external management. One requirement for this independent is: in the presence of adverse positions, the sensor nodes must be capable to configure themselves. Hence, the nodes for determine the existence of unusual events in their surroundings should make use of position awareness mechanisms. This work approaches the problem by considering the possible unusual events as diseases, thus making it possible to diagnose them through their symptoms, namely, their side effects. Considering these awareness mechanisms as a foundation for highlevel monitoring services, this paper also shows how these mechanisms are included in the primal plan of an intrusion detection system.

Keywords: Awareness Mechanism, Intrusion Detection, Independent, Wireless Sensor Network

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1452
585 An efficient Activity Network Reduction Algorithm based on the Label Correcting Tracing Algorithm

Authors: Weng Ming Chu

Abstract:

When faced with stochastic networks with an uncertain duration for their activities, the securing of network completion time becomes problematical, not only because of the non-identical pdf of duration for each node, but also because of the interdependence of network paths. As evidenced by Adlakha & Kulkarni [1], many methods and algorithms have been put forward in attempt to resolve this issue, but most have encountered this same large-size network problem. Therefore, in this research, we focus on network reduction through a Series/Parallel combined mechanism. Our suggested algorithm, named the Activity Network Reduction Algorithm (ANRA), can efficiently transfer a large-size network into an S/P Irreducible Network (SPIN). SPIN can enhance stochastic network analysis, as well as serve as the judgment of symmetry for the Graph Theory.

Keywords: Series/Parallel network, Stochastic network, Network reduction, Interdictive Graph, Complexity Index.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1379
584 Gaussian Density and HOG with Content Based Image Retrieval System – A New Approach

Authors: N. Shanmugapriya, R. Nallusamy

Abstract:

Content-based image retrieval (CBIR) uses the contents of images to characterize and contact the images. This paper focus on retrieving the image by separating images into its three color mechanism R, G and B and for that Discrete Wavelet Transformation is applied. Then Wavelet based Generalized Gaussian Density (GGD) is practical which is used for modeling the coefficients from the wavelet transforms. After that it is agreed to Histogram of Oriented Gradient (HOG) for extracting its characteristic vectors with Relevant Feedback technique is used. The performance of this approach is calculated by exactness and it confirms that this method is wellorganized for image retrieval.

Keywords: Content-Based Image Retrieval (CBIR), Relevant Feedback, Histogram of Oriented Gradient (HOG), Generalized Gaussian Density (GGD).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2040
583 Engine Power Effects on Support Interference

Authors: B.J.C. Horsten, L.L.M. Veldhuis

Abstract:

Renewed interest in propeller propulsion on aircraft configurations combined with higher propeller loads lead to the question how the effects of the propulsion on model support disturbances should be accounted for. In this paper, the determination of engine power effects on support interference of sting-mounted models is demonstrated by a measurement on a four-engine turboprop aircraft. CFD results on a more generic model are presented in order to clarify the possible mechanism behind engine power effects on support interference. The engine slipstream induces a local change in angle of sideslip at the model sting thereby influencing the sting near-field and far-field effects. Whether or not the net result of these changes in the disturbance pattern leads to a significant engine power effect depends on the configuration of the wind tunnel model and the test setup.

Keywords: CFD, engine power effects, measurements, support interference.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1481
582 Metadata Update Mechanism Improvements in Data Grid

Authors: S. Farokhzad, M. Reza Salehnamadi

Abstract:

Grid environments include aggregation of geographical distributed resources. Grid is put forward in three types of computational, data and storage. This paper presents a research on data grid. Data grid is used for covering and securing accessibility to data from among many heterogeneous sources. Users are not worry on the place where data is located in it, provided that, they should get access to the data. Metadata is used for getting access to data in data grid. Presently, application metadata catalogue and SRB middle-ware package are used in data grids for management of metadata. At this paper, possibility of updating, streamlining and searching is provided simultaneously and rapidly through classified table of preserving metadata and conversion of each table to numerous tables. Meanwhile, with regard to the specific application, the most appropriate and best division is set and determined. Concurrency of implementation of some of requests and execution of pipeline is adaptability as a result of this technique.

Keywords: Grids, data grid, metadata, update.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1699
581 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: Cloud security, memory isolation, Xen, virtual machine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1330
580 Dynamic Response of a Water Tower Composed of Interlocked Panels

Authors: F. Gurkalo, K. Poutos

Abstract:

Earthquakes produce some of the most violent loading situations that a structure can be subjected to and if a structure fails under these loads then inevitably human life is put at risk. One of the most common methods by which a structure fails under seismic loading is at the connection of structural elements. The research presented in this paper investigates the interlock systems as a novel method for building structures. The main objective of this experimental study wasto determine the dynamic characteristics and the seismic behaviour of the proposed structures compared to conventional structural systemsduring seismic motions. Results of this study indicate that the interlock mechanism of the panels influences the behaviour of lateral load-resisting systems of the structures during earthquakes, contributing to better structural flexibility and easier maintenance.

Keywords: Watertower, earthquake, seismic, interlocked panels

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2046
579 The Roles of Natural and Anthropogenic Factors of Ecological State in the Lake Peipsi

Authors: Galya Kapanen, Jaan–Mati Punning, Irina Blinova, Külli Kangur

Abstract:

In this paper we discuss the problems of the long-term management policy of Lake Peipsi and the roles of natural and anthropogenic factors in the ecological state of the lake. The reduction of the pollution during the last 15 years could not give significant changes of the chemical composition of the water, what implicates the essential role that natural factors have on the ecological state of lake. One of the most important factors having impact on the hydrochemical cycles and ecological state is the hydrological regime which is clearly expressed in L. Peipsi. The absence on clear interrelations of climate cycles and nutrients suggest that complex abiotic and biotic interactions, which take place in the lake ecosystem, plays a significant role in the matter circulation mechanism within lake.

Keywords: Lake Peipsi, ecosystem, eutrophication, waterfluctuation, NAO.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1647
578 Research and Design on a Portable Intravehicular Ultrasonic Leak Detector for Manned Spacecraft

Authors: Yan Rongxin, Sun Wei, Li Weidan

Abstract:

Based on the acoustics cascade sound theory, the mechanism of air leak sound producing, transmitting and signal detecting has been analyzed. A formula of the sound power, leak size and air pressure in the spacecraft has been built, and the relationship between leak sound pressure and receiving direction and distance has been studied. The center frequency in millimeter diameter leak is more than 20 kHz. The situation of air leaking from spacecraft to space has been simulated and an experiment of different leak size and testing distance and direction has been done. The sound pressure is in direct proportion to the cosine of the angle of leak to sensor. The portable ultrasonic leak detector has been developed, whose minimal leak rate is 10-1 Pa·m3/s, the testing radius is longer than 20 mm, the mass is less than 1.0 kg, and the electric power is less than 2.2 W.

Keywords: Leak detection, manned spacecraft, ultrasonic, sound transmitting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 964