Search results for: code reuse attack.
486 Code-Aided Turbo Channel Estimation for OFDM Systems with NB-LDPC Codes
Authors: Ł. Januszkiewicz, G. Bacci, H. Gierszal, M. Luise
Abstract:
In this paper channel estimation techniques are considered as the support methods for OFDM transmission systems based on Non Binary LDPC (Low Density Parity Check) codes. Standard frequency domain pilot aided LS (Least Squares) and LMMSE (Linear Minimum Mean Square Error) estimators are investigated. Furthermore, an iterative algorithm is proposed as a solution exploiting the NB-LDPC channel decoder to improve the performance of the LMMSE estimator. Simulation results of signals transmitted through fading mobile channels are presented to compare the performance of the proposed channel estimators.Keywords: LDPC codes, LMMSE, OFDM, turbo channelestimation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1659485 Analysis of Sulphur-Oxidizing Bacteria Attack on Concrete Based On Waste Materials
Authors: A. Eštoková, M. Kovalčíková, A. Luptáková, A. Sičáková, M. Ondová
Abstract:
Concrete durability as an important engineering property of concrete, determining the service life of concrete structures very significantly, can be threatened and even lost due to the interactions of concrete with external environment. Bio-corrosion process caused by presence and activities of microorganisms producing sulphuric acid is a special type of sulphate deterioration of concrete materials. The effects of sulphur-oxidizing bacteria Acidithiobacillus thiooxidans on various concrete samples, based on silica fume and zeolite, were investigated in laboratory during 180 days. A laboratory study was conducted to compare the performance of concrete samples in terms of the concrete deterioration influenced by the leaching of calcium and silicon compounds from the cement matrix. The changes in the elemental concentrations of calcium and silicon in both solid samples and liquid leachates were measured by using X – ray fluorescence method. Experimental studies confirmed the silica fume based concrete samples were found out to have the best performance in terms of both silicon and calcium ions leaching.
Keywords: Bio-corrosion, concrete, leaching, bacteria.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2664484 The Mechanistic and Oxidative Study of Methomyl and Parathion Degradation by Fenton Process
Authors: Chihhao Fan, Ming-Chu Liao
Abstract:
The purpose of this study is to investigate the chemical degradation of the organophosphorus pesticide of parathion and carbamate insecticide of methomyl in the aqueous phase through Fenton process. With the employment of batch Fenton process, the degradation of the two selected pesticides at different pH, initial concentration, humic acid concentration, and Fenton reagent dosages was explored. The Fenton process was found effective to degrade parathion and methomyl. The optimal dosage of Fenton reagents (i.e., molar concentration ratio of H2O2 to Fe2+) at pH 7 for parathion degradation was equal to 3, which resulted in 50% removal of parathion. Similarly, the optimal dosage for methomyl degradation was 1, resulting in 80% removal of methomyl. This study also found that the presence of humic substances has enhanced pesticide degradation by Fenton process significantly. The mass spectroscopy results showed that the hydroxyl free radical may attack the single bonds with least energy of investigated pesticides to form smaller molecules which is more easily to degrade either through physio-chemical or bilolgical processes.Keywords: Fenton Process, humic acid, methomyl, parathion, pesticides
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1630483 A Framework for SQL Learning: Linking Learning Taxonomy, Cognitive Model and Cross Cutting Factors
Authors: Huda Al Shuaily, Karen Renaud
Abstract:
Databases comprise the foundation of most software systems. System developers inevitably write code to query these databases. The de facto language for querying is SQL and this, consequently, is the default language taught by higher education institutions. There is evidence that learners find it hard to master SQL, harder than mastering other programming languages such as Java. Educators do not agree about explanations for this seeming anomaly. Further investigation may well reveal the reasons. In this paper, we report on our investigations into how novices learn SQL, the actual problems they experience when writing SQL, as well as the differences between expert and novice SQL query writers. We conclude by presenting a model of SQL learning that should inform the instructional material design process better to support the SQL learning process.
Keywords: Pattern, SQL, learning, model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1341482 Effect of Na2O Content on Durability of Geopolymer Mortars in Sulphuric Acid
Authors: Suresh Thokchom, Partha Ghosh, Somnath Ghosh
Abstract:
This paper presents the findings of an experimental investigation to study the effect of alkali content in geopolymer mortar specimens exposed to sulphuric acid. Geopolymer mortar specimens were manufactured from Class F fly ash by activation with a mixture of sodium hydroxide and sodium silicate solution containing 5% to 8% Na2O. Durability of specimens were assessed by immersing them in 10% sulphuric acid solution and periodically monitoring surface deterioration and depth of dealkalization, changes in weight and residual compressive strength over a period of 24 weeks. Microstructural changes in the specimens were studied with Scanning electron microscopy (SEM) and EDAX. Alkali content in the activator solution significantly affects the durability of fly ash based geopolymer mortars in sulphuric acid. Specimens manufactured with higher alkali content performed better than those manufactured with lower alkali content. After 24 weeks in sulphuric acid, specimen with 8% alkali still recorded a residual strength as high as 55%.Keywords: Alkali content, acid attack, compressive strength, geopolymer
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2636481 Investigation of Main Operating Parameters Affecting Gas Turbine Efficiency and Gas Releases
Authors: Farhat Hajer, Khir Tahar, Ammar Ben Brahim
Abstract:
This work presents a study on the influence of the main operating variables on the gas turbine cycle. A numerical simulation of a gas turbine cycle is performed for a real net power of 100 MW. A calculation code is developed using EES software. The operating variables are taken in conformity with the local environmental conditions adopted by the Tunisian Society of Electricity and Gas. Results show that the increase of ambient temperature leads to an increase of Tpz and NOx emissions rate and a decrease of cycle efficiency and UHC emissions. The CO emissions decrease with the raise of residence time, while NOx emissions rate increases and UHC emissions rate decreases. Furthermore, both of cycle efficiency and NOx emissions increase with the increase of the pressure ratio.
Keywords: CO, efficiency, gas turbine, NOx, UHC.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1227480 Performance Analysis of Selective Adaptive Multiple Access Interference Cancellation for Multicarrier DS-CDMA Systems
Authors: Maged Ahmed, Ahmed El-Mahdy
Abstract:
In this paper, Selective Adaptive Parallel Interference Cancellation (SA-PIC) technique is presented for Multicarrier Direct Sequence Code Division Multiple Access (MC DS-CDMA) scheme. The motivation of using SA-PIC is that it gives high performance and at the same time, reduces the computational complexity required to perform interference cancellation. An upper bound expression of the bit error rate (BER) for the SA-PIC under Rayleigh fading channel condition is derived. Moreover, the implementation complexities for SA-PIC and Adaptive Parallel Interference Cancellation (APIC) are discussed and compared. The performance of SA-PIC is investigated analytically and validated via computer simulations.
Keywords: Adaptive interference cancellation, communicationsystems, multicarrier signal processing, spread spectrum
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1852479 New Multipath Node-Disjoint Routing Based on AODV Protocol
Authors: V. Zangeneh, S. Mohammadi
Abstract:
Today, node-disjoint routing becomes inessential technique in communication of packets among various nodes in networks. Meanwhile AODV (Ad Hoc On-demand Multipath Distance Vector) creates single-path route between a pair of source and destination nodes. Some researches has done so far to make multipath node-disjoint routing based on AODV protocol. But however their overhead and end-to-end delay are relatively high, while the detail of their code is not available too. This paper proposes a new approach of multipath node-disjoint routing based on AODV protocol. Then the algorithm of analytical model is presented. The extensive results of this algorithm will be presented in the next paper.Keywords: AODV; MANET; Multipath Routing; Node-disjoint;transmission delay.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3074478 Trust and Reputation Mechanism with Path Optimization in Multipath Routing
Authors: Ramya Dorai, M. Rajaram
Abstract:
A Mobile Adhoc Network (MANET) is a collection of mobile nodes that communicate with each other with wireless links and without pre-existing communication infrastructure. Routing is an important issue which impacts network performance. As MANETs lack central administration and prior organization, their security concerns are different from those of conventional networks. Wireless links make MANETs susceptible to attacks. This study proposes a new trust mechanism to mitigate wormhole attack in MANETs. Different optimization techniques find available optimal path from source to destination. This study extends trust and reputation to an improved link quality and channel utilization based Adhoc Ondemand Multipath Distance Vector (AOMDV). Differential Evolution (DE) is used for optimization.
Keywords: Mobile Adhoc Network (MANET), Adhoc Ondemand Multi-Path Distance Vector (AOMDV), Trust and Reputation, Differential Evolution (DE), Link Quality, Channel Utilization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1659477 Experimental and Computational Analysis of Hygrothermal Performance of an Interior Thermal Insulation System
Authors: Z. Pavlík, J. Kočí, M. Pavlíková, R. Černý
Abstract:
Combined experimental and computational analysis of hygrothermal performance of an interior thermal insulation system applied on a brick wall is presented in the paper. In the experimental part, the functionality of the insulation system is tested at simulated difference climate conditions using a semi-scale device. The measured temperature and relative humidity profiles are used for the calibration of computer code HEMOT that is finally applied for a long-term hygrothermal analysis of the investigated structure.Keywords: Additional thermal insulation, hygrothermal analysis, semi-scale testing, long-term computational analysis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1736476 The Use of Electronic Shelf Labels in the Retail Food Sector
Authors: Brent McKenzie, Victoria Taylor
Abstract:
The use of QR (Quick Response Codes) codes for customer scanning with mobile phones is a rapidly growing trend. The QR code can provide the consumer with product information, user guides, product use, competitive pricing, etc. One sector for QR use has been in retail, through the use of Electronic Shelf Labeling (henceforth, ESL). In Europe, the use of ESL for pricing has been in practice for a number of years but continues to lag in acceptance in North America. Stated concerns include costs as a key constraint, but there is also evidence that consumer acceptance represents a limitation as well. The purpose of this study is to present the findings of a consumer based study to gage the impact on their use in the retail food sector.Keywords: Electronic shelf labels (ESL), consumer insights, retail food sector.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3308475 Impact of Harmonic Resonance and V-THD in Sohar Industrial Port–C Substation
Authors: R. S. Al Abri, M. H. Albadi, M. H. Al Abri, U. K. Al Rasbi, M. H. Al Hasni, S. M. Al Shidi
Abstract:
This paper presents an analysis study on the impacts of the changes of the capacitor banks, the loss of a transformer, and the installation of distributed generation on the voltage total harmonic distortion and harmonic resonance. The study is applied in a real system in Oman, Sohar Industrial Port–C Substation Network. Frequency scan method and Fourier series analysis method are used with the help of EDSA software. Moreover, the results are compared with limits specified by national Oman distribution code.Keywords: Power quality, capacitor bank, voltage total harmonics distortion, harmonic resonance, frequency scan.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2069474 RP-ADAS: Relative Position-Advanced Drive Assistant System based on VANET (GNSS)
Authors: Hun-Jung Lim, Tai-Myoung Chung
Abstract:
Few decades ago, electronic and sensor technologies are merged into vehicles as the Advanced Driver Assistance System(ADAS). However, sensor-based ADASs have limitations about weather interference and a line-of-sight nature problem. In our project, we investigate a Relative Position based ADAS(RP-ADAS). We divide the RP-ADAS into four main research areas: GNSS, VANET, Security/Privacy, and Application. In this paper, we research the GNSS technologies and determine the most appropriate one. With the performance evaluation, we figure out that the C/A code based GPS technologies are inappropriate for 'which lane-level' application. However, they can be used as a 'which road-level' application.Keywords: Relative Positioning, VANET, GNSS, ADAS
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2391473 Attack Detection through Image Adaptive Self Embedding Watermarking
Authors: S. Shefali, S. M. Deshpande, S. G. Tamhankar
Abstract:
Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.
Keywords: Cryptography, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Watermarking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2042472 Effect of Mean Stress on Fatigue Crack Growth Behavior of Stainless Steel 304L
Authors: M. Benachour, N. Benachour
Abstract:
Stainless steel has been employed in many engineering applications ranging from pharmaceutical equipment to piping in the nuclear reactors and storage to chemical products. In this attempt, simulation of fatigue crack growth based on experimental results of austenitic stainless steel 304L was presented using AFGROW code when NASGRO mode laws adopted. Double through crack at hole specimen is used in this investigation under constant amplitude loading. Effect of mean stress is highlighted. Results show that fatigue crack growth rate (FCGR) and fatigue life were affected by maximum applied load and dimension of hole. An equivalent of Paris law for this material was estimated.Keywords: Fatigue crack, stainless steel, mean stress, amplitudeloading.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3156471 Transverse Vibration of Non-Homogeneous Rectangular Plates of Variable Thickness Using GDQ
Abstract:
The effect of non-homogeneity on the free transverse vibration of thin rectangular plates of bilinearly varying thickness has been analyzed using generalized differential quadrature (GDQ) method. The non-homogeneity of the plate material is assumed to arise due to linear variations in Young’s modulus and density of the plate material with the in-plane coordinates x and y. Numerical results have been computed for fully clamped and fully simply supported boundary conditions. The solution procedure by means of GDQ method has been implemented in a MATLAB code. The effect of various plate parameters has been investigated for the first three modes of vibration. A comparison of results with those available in literature has been presented.
Keywords: Bilinear thickness, generalized differential quadrature (GDQ), non-homogeneous, Rectangular.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2471470 Security of Mobile Agent in Ad hoc Network using Threshold Cryptography
Authors: S.M. Sarwarul Islam Rizvi, Zinat Sultana, Bo Sun, Md. Washiqul Islam
Abstract:
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security. Security services should be guaranteed both for Mobile Agent and for Agent Server. In this paper to protect the Mobile Agent and Agent Server in an ad hoc network we have proposed a solution which is based on Threshold Cryptography, a new vibe in the cryptographic world where trust is distributed among multiple nodes in the network.
Keywords: Ad hoc network, Mobile Agent, Security, Threats, Threshold Cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1967469 A Cooperative Transmission Scheme Using Two Sources Based On OFDM System
Authors: Bit-Na Kwon, Dong-Hyun Ha, Hyoung-Kyu Song
Abstract:
In wireless communication, space-time block code (STBC), cyclic delay diversity (CDD) and space-time cyclic delay diversity (STCDD)are used as the spatial diversity schemes and have been widely studied for the reliablecommunication. If these schemes are used, the communication system can obtain the improved performance. However,the quality of the system is degraded when the distance between a source and a destination is distant in wireless communication system. In this paper, the cooperative transmission scheme using two sources is proposed and improves the performance of the wireless communication system.
Keywords: OFDM, Cooperative communication, CDD, STBC, STCDD.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2122468 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-Time
Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl
Abstract:
In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method as a Web-App is developed for auto-generated data replication to provide a twin of the targeted data structure. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi", has been developed. A special login form has been developed with a special instance of the data validation; this verification process secures the web application from its early stages. The system has been tested and validated, and up to 99% of SQLi attacks have been prevented.
Keywords: SQL injection, attacks, web application, accuracy, database, WebAppShield.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 443467 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine
Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour
Abstract:
Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.
Keywords: Intrusion detection system, decision tree, support vector machine, feature selection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1239466 Energy and Exergy Performance Optimization on a Real Gas Turbine Power Plant
Authors: Farhat Hajer, Khir Tahar, Cherni Rafik, Dakhli Radhouen, Ammar Ben Brahim
Abstract:
This paper presents the energy and exergy optimization of a real gas turbine power plant performance of 100 MW of power, installed in the South East of Tunisia. A simulation code is established using the EES (Engineering Equation Solver) software. The parameters considered are those of the actual operating conditions of the gas turbine thermal power station under study. The results show that thermal and exergetic efficiency decreases with the increase of the ambient temperature. Air excess has an important effect on the thermal efficiency. The emission of NOx rises in the summer and decreases in the winter. The obtained rates of NOx are compared with measurements results.
Keywords: Efficiency, exergy, gas turbine, temperature.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 596465 JREM: An Approach for Formalising Models in the Requirements Phase with JSON and NoSQL Databases
Authors: Aitana Alonso-Nogueira, Helia Estévez-Fernández, Isaías García
Abstract:
This paper presents an approach to reduce some of its current flaws in the requirements phase inside the software development process. It takes the software requirements of an application, makes a conceptual modeling about it and formalizes it within JSON documents. This formal model is lodged in a NoSQL database which is document-oriented, that is, MongoDB, because of its advantages in flexibility and efficiency. In addition, this paper underlines the contributions of the detailed approach and shows some applications and benefits for the future work in the field of automatic code generation using model-driven engineering tools.
Keywords: Conceptual modeling, JSON, NoSQL databases, requirements engineering, software development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1082464 High Level Synthesis of Kahn Process Networks(KPN) for Streaming Applications
Authors: Attiya Mahmood, Syed Ali Abbas, Shoab A. Khan
Abstract:
Streaming Applications usually run in parallel or in series that incrementally transform a stream of input data. It poses a design challenge to break such an application into distinguishable blocks and then to map them into independent hardware processing elements. For this, there is required a generic controller that automatically maps such a stream of data into independent processing elements without any dependencies and manual considerations. In this paper, Kahn Process Networks (KPN) for such streaming applications is designed and developed that will be mapped on MPSoC. This is designed in such a way that there is a generic Cbased compiler that will take the mapping specifications as an input from the user and then it will automate these design constraints and automatically generate the synthesized RTL optimized code for specified application. Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1823463 Finite Difference Method of the Seismic Analysis of Earth Dam
Authors: Alaoua Bouaicha, Fahim Kahlouche, Abdelhamid Benouali
Abstract:
Many embankment dams have suffered failures during earthquakes due to the increase of pore water pressure under seismic loading. After analyzing of the behavior of embankment dams under severe earthquakes, major advances have been attained in the understanding of the seismic action on dams. The present study concerns numerical analysis of the seismic response of earth dams. The procedure uses a nonlinear stress-strain relation incorporated into the code FLAC2D based on the finite difference method. This analysis provides the variation of the pore water pressure and horizontal displacement.Keywords: Earthquake, numerical analysis, FLAC2D, displacement, Embankment Dam, pore water pressure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2451462 A Semi-Fragile Signature based Scheme for Ownership Identification and Color Image Authentication
Authors: M. Hamad Hassan, S.A.M. Gilani
Abstract:
In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies. The former is used to compute the contents based hash and the latter to embed the watermark. The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications. Geometrically YS ÔèÑ T and T channel corresponds to the chrominance component of color image, therefore suitable for embedding the watermark. The T channel is divided into 4×4 nonoverlapping blocks. The size of block is important for enhanced localization, security and low computation. Each block along with ownership information is then deployed by SHA160, a one way hash function to compute the content based hash, which is always unique and resistant against birthday attack instead of using MD5 that may raise the condition i.e. H(m)=H(m'). The watermark payload varies from block to block and computed by the variance factorα . The quality of watermarked images is quite high both subjectively and objectively. Our scheme is blind, computationally fast and exactly locates the tampered region.
Keywords: Hash Collision, LSB, MD5, PSNR, SHA160.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1563461 Impact Analysis Based on Change Requirement Traceability in Object Oriented Software Systems
Authors: Sunil Tumkur Dakshinamurthy, Mamootil Zachariah Kurian
Abstract:
Change requirement traceability in object oriented software systems is one of the challenging areas in research. We know that the traces between links of different artifacts are to be automated or semi-automated in the software development life cycle (SDLC). The aim of this paper is discussing and implementing aspects of dynamically linking the artifacts such as requirements, high level design, code and test cases through the Extensible Markup Language (XML) or by dynamically generating Object Oriented (OO) metrics. Also, non-functional requirements (NFR) aspects such as stability, completeness, clarity, validity, feasibility and precision are discussed. We discuss this as a Fifth Taxonomy, which is a system vulnerability concern.
Keywords: Artifacts, NFRs, OO metrics, SDLC, XML.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1156460 Safety Practices among Bus Operators during Wee Hour Operations
Authors: M.R. Osman, F. Abas, M.S. Noh, A. Mohamad Suffian, O. Ilhamah, H.Z. Zarir, A.B. Wahida, P. Noor Faradila, M.F. Siti Atiqah
Abstract:
Safety Health and Environment Code of Practice (SHE COP) was developed to help road transportation operators to manage its operation in a systematic and safe manner. A study was conducted to determine the effectiveness of SHE COP implementation during non-OPS period. The objective of the study is to evaluate the implementations of SHE COP among bus operators during wee hour operations. The data was collected by completing a set of checklist after observing the activities during pre departure, during the trip, and upon arrival. The results show that there are seven widely practiced SHE COP elements. 22% of the buses have average speed exceeding the maximum permissible speed on the highways (90 km/h), with 13% of the buses were travelling at the speed of more than 100 km/h. The statistical analysis shows that there is only one significant association which relates speeding with prior presence of enforcement officers.Keywords: Safety practices, speeding, wee hour.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1563459 Numerical Analysis of Laminar Flow around Square Cylinders with EHD Phenomenon
Authors: M. Salmanpour, O. Nourani Zonouz
Abstract:
In this research, a numerical simulation of an Electrohydrodynamic (EHD) actuator’s effects on the flow around a square cylinder by using a finite volume method has been investigated. This is one of the newest ways for controlling the fluid flows. Two plate electrodes are flush-mounted on the surface of the cylinder and one wire electrode is placed on the line with zero angle of attack relative to the stagnation point and excited with DC power supply. The discharge produces an electric force and changes the local momentum behaviors in the fluid layers. For this purpose, after selecting proper domain and boundary conditions, the electric field relating to the problem has been analyzed and then the results in the form of electrical body force have been entered in the governing equations of fluid field (Navier-Stokes equations). The effect of ionic wind resulted from the Electrohydrodynamic actuator, on the velocity, pressure and the wake behind cylinder has been considered. According to the results, it is observed that the fluid flow accelerates in the nearest wall of the frontal half of the cylinder and the pressure difference between frontal and hinder cylinder is increased.
Keywords: CFD, corona discharge, electro hydrodynamics, flow around square cylinders.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 878458 Anisotropic Constitutive Model and its Application in Simulation of Thermal Shock Wave Propagation for Cylinder Shell Composite
Authors: Xia Huang, Wenhui Tang, Banghai Jiang, Xianwen Ran
Abstract:
In this paper, a plane-strain orthotropic elasto-plastic dynamic constitutive model is established, and with this constitutive model, the thermal shock wave induced by intense pulsed X-ray radiation in cylinder shell composite is simulated by the finite element code, then the properties of thermal shock wave propagation are discussed. The results show that the thermal shock wave exhibit different shapes under the radiation of soft and hard X-ray, and while the composite is radiated along different principal axes, great differences exist in some aspects, such as attenuation of the peak stress value, spallation and so on.Keywords: anisotropic constitutive model, thermal shock wave, X-ray, cylinder shell composite.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1756457 Molecular Dynamic Simulation and Receptor-based Pharmacophore Modeling on Human Renin for Discovery of Novel Inhibitors
Authors: Chanin Park, Sundarapandian Thangapandian, Yuno Lee, Minky Son, Shalini John, Young-sik Sohn, Keun Woo Lee
Abstract:
Hypertension is characterized with stress on the heart and blood vessels thus increasing the risk of heart attack and renal diseases. The Renin angiotensin system (RAS) plays a major role in blood pressure control. Renin is the enzyme that controls the RAS at the rate-limiting step. Our aim is to develop new drug-like leads which can inhibit renin and thereby emerge as therapeutics for hypertension. To achieve this, molecular dynamics (MD) simulation and receptor-based pharmacophore modeling were implemented, and three rennin-inhibitor complex structures were selected based on IC50 value and scaffolds of inhibitors. Three pharmacophore models were generated considering conformations induced by inhibitor. The compounds mapped to these models were selected and subjected to drug-like screening. The identified hits were docked into the active site of renin. Finally, hit1 satisfying the binding mode and interaction energy was selected as possible lead candidate to be used in novel renin inhibitors.
Keywords: Renin inhibitor, Molecular dynamics simulation, Structure-based pharmacophore modeling
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1968