Search results for: Angle of Attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 831

Search results for: Angle of Attack

711 Flow Characteristics Impeller Change of an Axial Turbo Fan

Authors: Young-Kyun Kim, Tae-Gu Lee, Jin-Huek Hur, Sung-Jae Moon, Jae-Heon Lee

Abstract:

In this paper, three dimensional flow characteristic was presented by a revision of an impeller of an axial turbo fan for improving the airflow rate and the static pressure. TO consider an incompressible steady three-dimensional flow, the RANS equations are used as the governing equations, and the standard k-ε turbulence model is chosen. The pitch angles of 44°, 54°, 59°, and 64° are implemented for the numerical model. The numerical results show that airflow rates of each pitch angle are 1,175 CMH, 1,270 CMH, 1,340 CMH, and 800 CMH, respectively. The difference of the static pressure at impeller inlet and outlet are 120 Pa, 214 Pa, 242 Pa, and 60 Pa according to respective pitch angles. It means that the 59° of the impeller pitch angle is optimal to improve the airflow rate and the static pressure.

Keywords: Axial turbo fan, Impeller, Blade, Pitch angle.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2648
710 Effects of Aggressive Ammonium Nitrate on Durability Properties of Concrete Using Sandstone and Granite Aggregates

Authors: L. Wong, H. Asrah, M.E. Rahman, M.A. Mannan

Abstract:

The storage of chemical fertilizers in concrete building often leads to durability problems due to chemical attack. The damage of concrete is mostly caused by certain ammonium salts. The main purpose of the research is to investigate the durability properties of concrete being exposed to ammonium nitrate solution. In this investigation, experiments are conducted on concrete type G50 and G60. The leaching process is achieved by the use of 20% concentration solution of ammonium nitrate. The durability properties investigated are water absorption, volume of permeable voids, and sorptivity. Compressive strength, pH value, and degradation depth are measured after a certain period of leaching. A decrease in compressive strength and an increase in porosity are found through the conducted experiments. Apart from that, the experimental data shows that pH value decreases with increased leaching time while the degradation depth of concrete increases with leaching time. By comparing concrete type G50 and G60, concrete type G60 is more resistant to ammonium nitrate attack.

Keywords: Normal weight concrete durability, Aggressive Ammonium Nitrate Solution, G50 & G60 concretes, Chemical attack.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6602
709 6D Posture Estimation of Road Vehicles from Color Images

Authors: Yoshimoto Kurihara, Tad Gonsalves

Abstract:

Currently, in the field of object posture estimation, there is research on estimating the position and angle of an object by storing a 3D model of the object to be estimated in advance in a computer and matching it with the model. However, in this research, we have succeeded in creating a module that is much simpler, smaller in scale, and faster in operation. Our 6D pose estimation model consists of two different networks – a classification network and a regression network. From a single RGB image, the trained model estimates the class of the object in the image, the coordinates of the object, and its rotation angle in 3D space. In addition, we compared the estimation accuracy of each camera position, i.e., the angle from which the object was captured. The highest accuracy was recorded when the camera position was 75°, the accuracy of the classification was about 87.3%, and that of regression was about 98.9%.

Keywords: AlexNet, Deep learning, image recognition, 6D posture estimation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 517
708 Fingerprint Identification Keyless Entry System

Authors: Chih-Neng Liang, Huang-Bin Huang, Bo-Chiuan Chen

Abstract:

Nowadays, keyless entry systems are widely adopted for vehicle immobilizer systems due to both advantages of security and convenience. Keyless entry systems could overcome brute-force key guessing attack, statistics attack and masquerade attack, however, they can't prevent from thieves stealing behavior. In this paper, we proposed a new architecture try to improve the existent flaws. The integration of the keyless entry system and the fingerprint identification technology is more suitable to implement on the portable transponder to achieve higher security needs. We also adopt and modify AES security protocol for life expectancy and security of the portable transponder. In addition, the identification of a driver's fingerprint makes the service of automatic reinstatement of a driver's preferences become possible. Our design can satisfy not only the three kinds of previous illegal attacks, but also the stealing situation. Furthermore, many practical factors, such as costs, life expectancy and performance, have been well considered in the design of portable transponder.

Keywords: Keyless entry-system, fingerprint identification, AES security protocol, vehicle immobilizer system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2702
707 Dynamic Window Secured Implicit Geographic Forwarding Routing for Wireless Sensor Network

Authors: Z.M. Hanapi, M. Ismail, K. Jumari, M. Mahdavi

Abstract:

Routing security is a major concerned in Wireless Sensor Network since a large scale of unattended nodes is deployed in ad hoc fashion with no possibility of a global addressing due to a limitation of node-s memory and the node have to be self organizing when the systems require a connection with the other nodes. It becomes more challenging when the nodes have to act as the router and tightly constrained on energy and computational capabilities where any existing security mechanisms are not allowed to be fitted directly. These reasons thus increasing vulnerabilities to the network layer particularly and to the whole network, generally. In this paper, a Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing is presented where a dynamic time is used for collection window to collect Clear to Send (CTS) control packet in order to find an appropriate hoping node. The DWIGF is expected to minimize a chance to select an attacker as the hoping node that caused by a blackhole attack that happen because of the CTS rushing attack, which promise a good network performance with high packet delivery ratios.

Keywords: sensor, security, routing, attack, random.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1360
706 Development of Admire Longitudinal Quasi-Linear Model by using State Transformation Approach

Authors: Jianqiao. Yu, Jianbo. Wang, Xinzhen. He

Abstract:

This paper presents a longitudinal quasi-linear model for the ADMIRE model. The ADMIRE model is a nonlinear model of aircraft flying in the condition of high angle of attack. So it can-t be considered to be a linear system approximately. In this paper, for getting the longitudinal quasi-linear model of the ADMIRE, a state transformation based on differentiable functions of the nonscheduling states and control inputs is performed, with the goal of removing any nonlinear terms not dependent on the scheduling parameter. Since it needn-t linear approximation and can obtain the exact transformations of the nonlinear states, the above-mentioned approach is thought to be appropriate to establish the mathematical model of ADMIRE. To verify this conclusion, simulation experiments are done. And the result shows that this quasi-linear model is accurate enough.

Keywords: quasi-linear model, simulation, state transformation approach, the ADMIRE model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1461
705 Implementation and Modeling of a Quadrotor

Authors: Ersan Aktas, Eren Turanoğuz

Abstract:

In this study, the quad-electrical rotor driven unmanned aerial vehicle system is designed and modeled using fundamental dynamic equations. After that, mechanical, electronical and control system of the air vehicle are designed and implemented. Brushless motor speeds are altered via electronic speed controllers in order to achieve desired controllability. The vehicle's fundamental Euler angles (i.e., roll angle, pitch angle, and yaw angle) are obtained via AHRS sensor. These angles are provided as an input to the control algorithm that run on soft the processor on the electronic card. The vehicle control algorithm is implemented in the electronic card. Controller is designed and improved for each Euler angles. Finally, flight tests have been performed to observe and improve the flight characteristics.

Keywords: Quadrotor, UAS applications, control architectures, PID.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1551
704 Analysis of Take-off Phase of Somersaults with Twisting along the Longitudinal Body Axis

Authors: P. Hedbávný, M. Kalichová

Abstract:

The contribution deals with problem of take-off phase of back somersault with twisting with various numbers of twists along longitudinal body axis. The aim was to evaluate the changes in angles during transition phase from back handspring to back somersault using 3D kinematic analysis of the somersaults. We used Simi Motion System for the 3D kinematic analysis of the observed gymnastic element performed by Czech Republic female representative and 2008 Summer Olympic Games participant. The results showed that the higher the number of twists, the smaller the touchdown angle in which the gymnasts lands on the pad in the beginning of take-off phase. In back somersault with one twist (180°) the average angle is 54°, in 1080° back somersault the average angle is 45.9°. These results may help to improve technical training of sports gymnasts.

Keywords: back somersault with twisting, biomechanicalanalysis, take-off

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2474
703 Dynamic Modeling of Wind Farms in the Jeju Power System

Authors: Dae-Hee Son, Sang-Hee Kang, Soon-Ryul Nam

Abstract:

In this paper, we develop a dynamic modeling of wind farms in the Jeju power system. The dynamic model of wind farms is developed to study their dynamic effects on the Jeju power system. PSS/E is used to develop the dynamic model of a wind farm composed of 1.5-MW doubly fed induction generators. The output of a wind farm is regulated based on pitch angle control, in which the two controllable parameters are speed and power references. The simulation results confirm that the pitch angle is successfully controlled, regardless of the variation in wind speed and output regulation.

Keywords: Dynamic model, Jeju power system, pitch angle control, PSS/E, wind farm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1727
702 Automat Control of the Aircrafts- Lateral Movement using the Dynamic Inversion

Authors: Mihai Lungu, Romulus Lungu, Lucian Grigorie

Abstract:

The paper presents a new system for the automat control of the aircrafts- flight in lateral plane using the cinematic model and the dynamic inversion. Starting from the equations of the aircrafts- lateral movement, the authors use two axes systems and obtained a control law that cancels the lateral deviation of the flying objects from the runway line. This system makes the aircrafts- direction angle to follow the direction angle of the runway line. Simulations in Matlab/Simulink have been done for different aircraft-s initial points and direction angles. The inconvenience of this system is the long duration of the “transient regime". That is why this system can be used independently, but the results are not very good; thus, it can be a part (subsystem) of other systems. The main system that cancels the lateral deviation from the runway line is based on dynamic inversion and uses, as subsystem, the control system for the lateral movement using the cinematic model. Using complex Matlab/Simulink models, the authors obtained the time evolution of the direction angle and the time evolution of the aircraft lateral deviation with respect to the runway line, for different values of the initial direction angle and for different wind types. The system has a very good behavior for all initial direction angles and wind types.

Keywords: Direction angle, Dynamic inversion, Lateraldeviation, Lateral movement

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1893
701 Simulation of Natural Convection Flow in an Inclined open Cavity using Lattice Boltzmann Method

Authors: H. Sajjadi, M. Gorji, GH.R. Kefayati, D. D. Ganji, M. Shayan nia

Abstract:

In this paper effects of inclination angle on natural convection flow in an open cavity has been analyzed with Lattice Boltzmann Method (LBM).The angle of inclination varied from θ= - 45° to 45° with 15° intervals. Study has been conducted for Rayleigh numbers (Ra) 104 to 106. The comparisons show that the average Nusselt number increases with growth of Rayleigh number and the average Nusselt number increase as inclination angles increases at Ra=104.At Ra=105 and Ra=106 the average Nusselt number enhance as inclination angels varied from θ= -45° to θ= 0° and decrease as inclination angels increase in θ= 0° to θ= 45°.

Keywords: Lattice Boltzmann Method, Inclination angle, Opencavity, Natural convection

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1963
700 The Comparison of Form Drag and Profile Dragof a Wind Turbine Blade Section in Pitching Oscillation

Authors: M. R. Soltani, M. Seddighi, M. Mahmoudi

Abstract:

Extensive wind tunnel tests have been conducted to investigate the unsteady flow field over and behind a 2D model of a 660 kW wind turbine blade section in pitching motion. The surface pressure and wake dynamic pressure variation at a distance of 1.5 chord length from trailing edge were measured by pressure transducers during several oscillating cycles at 3 reduced frequencies and oscillating amplitudes. Moreover, form drag and linear momentum deficit are extracted and compared at various conditions. The results show that the wake velocity field and surface pressure of the model have similar behavior before and after the airfoil beyond the static stall angle of attack. In addition, the effects of reduced frequency and oscillation amplitudes are discussed.

Keywords: Pitching motion, form drag, Profile drag, windturbine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1930
699 Heat Transfer and Friction Factor Study for Triangular Duct Solar Air Heater Having Discrete V-Shaped Ribs

Authors: Varun

Abstract:

Solar energy is a good option among renewable energy resources due to its easy availability and abundance. The simplest and most efficient way to utilize solar energy is to convert it into thermal energy and this can be done with the help of solar collectors. The thermal performance of such collectors is poor due to less heat transfer from the collector surface to air. In this work, experimental investigations of single pass solar air heater having triangular duct and provided with roughness element on the underside of the absorber plate. V-shaped ribs are used for investigation having three different values of relative roughness pitch (p/e) ranges from 4- 16 for a fixed value of angle of attack (α), relative roughness height (e/Dh) and a relative gap distance (d/x) values are 60°, 0.044 and 0.60 respectively. Result shows that considerable augmentation in heat transfer has been obtained by providing roughness.

Keywords: Artificial roughness, Solar Air heater, Triangular duct, V-Shaped Ribs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2855
698 CFD of Oscillating Airfoil Pitch Cycle by using PISO Algorithm

Authors: Muhammad Amjad Sohail, Rizwan Ullah

Abstract:

This research paper presents the CFD analysis of oscillating airfoil during pitch cycle. Unsteady subsonic flow is simulated for pitching airfoil at Mach number 0.283 and Reynolds number 3.45 millions. Turbulent effects are also considered for this study by using K-ω SST turbulent model. Two-dimensional unsteady compressible Navier-Stokes code including two-equation turbulence model and PISO pressure velocity coupling is used. Pressure based implicit solver with first order implicit unsteady formulation is used. The simulated pitch cycle results are compared with the available experimental data. The results have a good agreement with the experimental data. Aerodynamic characteristics during pitch cycles have been studied and validated.

Keywords: Angle of attack, Centre of pressure, subsonic flow, pitching moment coefficient, turbulence mode

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2347
697 Effect of Silt Presence on Shear Strength Parameters of Unsaturated Sandy Soils

Authors: R. Ziaie Moayed, E. Khavaninzadeh, M. Ghorbani Tochaee

Abstract:

Direct shear test is widely used in soil mechanics experiment to determine the shear strength parameters of granular soils. For analysis of soil stability problems such as bearing capacity, slope stability and lateral pressure on soil retaining structures, the shear strength parameters must be known well. In the present study, shear strength parameters are determined in silty-sand mixtures. Direct shear tests are performed on 161 Firoozkooh sand with different silt content at a relative density of 70% in three vertical stress of 100, 150, and 200 kPa. Wet tamping method is used for soil sample preparation, and the results include diagrams of shear stress versus shear deformation and sample height changes against shear deformation. Accordingly, in different silt percent, the shear strength parameters of the soil such as internal friction angle and dilation angle are calculated and compared. According to the results, when the sample contains up to 10% silt, peak shear strength and internal friction angle have an upward trend. However, if the sample contains 10% to 50% of silt a downward trend is seen in peak shear strength and internal friction angle.

Keywords: Shear strength parameters, direct shear test, silty sand, shear stress, shear deformation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 706
696 Support Vector Machine based Intelligent Watermark Decoding for Anticipated Attack

Authors: Syed Fahad Tahir, Asifullah Khan, Abdul Majid, Anwar M. Mirza

Abstract:

In this paper, we present an innovative scheme of blindly extracting message bits from an image distorted by an attack. Support Vector Machine (SVM) is used to nonlinearly classify the bits of the embedded message. Traditionally, a hard decoder is used with the assumption that the underlying modeling of the Discrete Cosine Transform (DCT) coefficients does not appreciably change. In case of an attack, the distribution of the image coefficients is heavily altered. The distribution of the sufficient statistics at the receiving end corresponding to the antipodal signals overlap and a simple hard decoder fails to classify them properly. We are considering message retrieval of antipodal signal as a binary classification problem. Machine learning techniques like SVM is used to retrieve the message, when certain specific class of attacks is most probable. In order to validate SVM based decoding scheme, we have taken Gaussian noise as a test case. We generate a data set using 125 images and 25 different keys. Polynomial kernel of SVM has achieved 100 percent accuracy on test data.

Keywords: Bit Correct Ratio (BCR), Grid Search, Intelligent Decoding, Jackknife Technique, Support Vector Machine (SVM), Watermarking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1622
695 Effect of Runup over a Vertical Pile Supported Caisson Breakwater and Quarter Circle Pile Supported Caisson Breakwater

Authors: T. J. Jemi Jeya, V. Sriram

Abstract:

Pile Supported Caisson breakwater is an ecofriendly breakwater very useful in coastal zone protection. The model is developed by considering the advantages of both caisson breakwater and pile supported breakwater, where the top portion is a vertical or quarter circle caisson and the bottom portion consists of a pile supported breakwater defined as Vertical Pile Supported Breakwater (VPSCB) and Quarter-circle Pile Supported Breakwater (QPSCB). The study mainly focuses on comparison of run up over VPSCB and QPSCB under oblique waves. The experiments are carried out in a shallow wave basin under different water depths (d = 0.5 m & 0.55 m) and under different oblique regular waves (00, 150, 300). The run up over the surface is measured by placing two run up probes over the surface at 0.3 m on both sides from the centre of the model. The results show that the non-dimensional shoreward run up shows slight decrease with respect to increase in angle of wave attack.

Keywords: Caisson breakwater, pile supported breakwater, quarter circle breakwater, vertical breakwater.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 624
694 Analysis of the Strip Shape and Microstructure with Consideration of Roll Crossing and Shifting

Authors: Z. Y. Jiang, H. B. Tibar, A. Aljabri

Abstract:

Optimisation of the physical and mechanical properties of cold rolled thin strips is achieved by controlling the rolling parameters. In this paper, the factors affecting the asymmetrical cold rolling of thin low carbon steel strip have been studied at a speed ratio of 1.1 without lubricant applied. The effect of rolling parameters on the resulting microstructure was also investigated. It was found that under dry condition, work roll shifting and work roll cross angle can improve the strip profile, and the result is more significant with an increase of work roll cross angle rather than that of work roll shifting. However, there was no obvious change in microstructure. In addition, effects of rolling parameters on strip profile and microstructure have also been discussed.

Keywords: Reduction ratio, rolling speed ratio, strip shape, work rolls cross angle, work roll shifting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1300
693 Analytical Modelling of Surface Roughness during Compacted Graphite Iron Milling Using Ceramic Inserts

Authors: S. Karabulut, A. Güllü, A. Güldas, R. Gürbüz

Abstract:

This study investigates the effects of the lead angle and chip thickness variation on surface roughness during the machining of compacted graphite iron using ceramic cutting tools under dry cutting conditions. Analytical models were developed for predicting the surface roughness values of the specimens after the face milling process. Experimental data was collected and imported to the artificial neural network model. A multilayer perceptron model was used with the back propagation algorithm employing the input parameters of lead angle, cutting speed and feed rate in connection with chip thickness. Furthermore, analysis of variance was employed to determine the effects of the cutting parameters on surface roughness. Artificial neural network and regression analysis were used to predict surface roughness. The values thus predicted were compared with the collected experimental data, and the corresponding percentage error was computed. Analysis results revealed that the lead angle is the dominant factor affecting surface roughness. Experimental results indicated an improvement in the surface roughness value with decreasing lead angle value from 88° to 45°.

Keywords: CGI, milling, surface roughness, ANN, regression, modeling, analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1921
692 3G WCDMA Mobile Network DoS Attack and Detection Technology

Authors: JooHyung Oh, Dongwan Kang, Sekwon Kim, ChaeTae Im

Abstract:

Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management. And mobile network security for various abnormal and malicious traffic technologies was not ready. So Malicious or potentially malicious traffic originating from mobile malware infected smart devices can cause serious problems to the 3G mobile networks, such as DoS and scanning attack in wired networks. This paper describes the DoS security threat in the 3G mobile network and proposes a detection technology.

Keywords: 3G, WCDMA, DoS, Security Threat

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3225
691 Intrusion Detection System Based On The Integrity of TCP Packet

Authors: Moad Alhamaty , Ali Yazdian , Fathi Al-qadasi

Abstract:

A common way to elude the signature-based Network Intrusion Detection System is based upon changing a recognizable attack to an unrecognizable one via the IDS. For example, in order to evade sign accommodation with intrusion detection system markers, a hacker spilt the payload packet into many small pieces or hides them within messages. In this paper we try to model the main fragmentation attack and create a new module in the intrusion detection architecture system which recognizes the main fragmentation attacks through verification of integrity checking of TCP packet in order to prevent elusion of the system and also to announce the necessary alert to the system administrator.

Keywords: Intrusion detection system, Evasion techniques, Fragmentation attacks, TCP Packet integrity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1799
690 Sensitivity of Small Disturbance Angle Stability to the System Parameters of Future Power Networks

Authors: Nima Farkhondeh Jahromi, George Papaefthymiou, Lou van der Sluis

Abstract:

The incorporation of renewable energy sources for the sustainable electricity production is undertaking a more prominent role in electric power systems. Thus, it will be an indispensable incident that the characteristics of future power networks, their prospective stability for instance, get influenced by the imposed features of sustainable energy sources. One of the distinctive attributes of the sustainable energy sources is exhibiting the stochastic behavior. This paper investigates the impacts of this stochastic behavior on the small disturbance rotor angle stability in the upcoming electric power networks. Considering the various types of renewable energy sources and the vast variety of system configurations, the sensitivity analysis can be an efficient breakthrough towards generalizing the effects of new energy sources on the concept of stability. In this paper, the definition of small disturbance angle stability for future power systems and the iterative-stochastic way of its analysis are presented. Also, the effects of system parameters on this type of stability are described by performing a sensitivity analysis for an electric power test system.

Keywords: Power systems stability, Renewable energy sources, Stochastic behavior, Small disturbance rotor angle stability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2024
689 Predicting Application Layer DDoS Attacks Using Machine Learning Algorithms

Authors: S. Umarani, D. Sharmila

Abstract:

A Distributed Denial of Service (DDoS) attack is a major threat to cyber security. It originates from the network layer or the application layer of compromised/attacker systems which are connected to the network. The impact of this attack ranges from the simple inconvenience to use a particular service to causing major failures at the targeted server. When there is heavy traffic flow to a target server, it is necessary to classify the legitimate access and attacks. In this paper, a novel method is proposed to detect DDoS attacks from the traces of traffic flow. An access matrix is created from the traces. As the access matrix is multi dimensional, Principle Component Analysis (PCA) is used to reduce the attributes used for detection. Two classifiers Naive Bayes and K-Nearest neighborhood are used to classify the traffic as normal or abnormal. The performance of the classifier with PCA selected attributes and actual attributes of access matrix is compared by the detection rate and False Positive Rate (FPR).

Keywords: Distributed Denial of Service (DDoS) attack, Application layer DDoS, DDoS Detection, K- Nearest neighborhood classifier, Naive Bayes Classifier, Principle Component Analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5218
688 Comparative Evaluation of Ice Adhesion Behavior

Authors: T. Strobl, D. Raps, M. Hornung

Abstract:

In this study, the adhesion of ice to solid substrates with different surface properties is compared. Clear ice, similar to atmospheric in-flight icing encounters, is accreted on the different substrates under controlled conditions. The ice adhesion behavior is investigated by means of a dynamic vibration testing technique with an electromagnetic shaker initiating ice de-bonding in the interface between the substrate and the ice. The results of the experiments reveal that the affinity for ice accretion is significantly influenced by the water contact angle of the respective sample.

Keywords: Contact angle, dynamic vibration measurement, ice adhesion, interfacial shear stress.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2295
687 Remote-Sensing Sunspot Images to Obtain the Sunspot Roads

Authors: Hossein Mirzaee, Farhad Besharati

Abstract:

A combination of image fusion and quad tree decomposition method is used for detecting the sunspot trajectories in each month and computation of the latitudes of these trajectories in each solar hemisphere. Daily solar images taken with SOHO satellite are fused for each month and the result of fused image is decomposed with Quad Tree decomposition method in order to classifying the sunspot trajectories and then to achieve the precise information about latitudes of sunspot trajectories. Also with fusion we deduce some physical remarkable conclusions about sun magnetic fields behavior. Using quad tree decomposition we give information about the region on sun surface and the space angle that tremendous flares and hot plasma gases permeate interplanetary space and attack to satellites and human technical systems. Here sunspot images in June, July and August 2001 are used for studying and give a method to compute the latitude of sunspot trajectories in each month with sunspot images.

Keywords: Quad Tree Decomposition, Sunspot.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1165
686 Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment

Authors: Zulkiflee M., Robiah Y., Nur Azman Abu, Shahrin S.

Abstract:

Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.

Keywords: Dual-Stack, Malware, Worm, IPv6;IDS

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1956
685 Surface Characteristics of Bacillus megaterium and Its Adsorption Behavior onto Dolomite

Authors: Mohsen Farahat, Tsuyoshi Hirajima

Abstract:

Surface characteristics of Bacillus megaterium strain were investigated; zeta potential, FTIR and contact angle were measured. Surface energy components including Lifshitz-van der Waals, Hamaker constant, and acid/base components (Lewis acid/Lewis base) were calculated from the contact angle data. The results showed that the microbial cells were negatively charged over all pH regions with high values at alkaline region. A hydrophilic nature for the strain was confirmed by contact angle and free energy of adhesion between microbial cells. Adsorption affinity of the strain toward dolomite was studied at different pH values. The results showed that the cells had a high affinity to dolomite at acid pH comparing to neutral and alkaline pH. Extended DLVO theory was applied to calculate interaction energy between B. megaterium cells and dolomite particles. The adsorption results were in agreement with the results of Extended DLVO approach. Surface changes occurred on dolomite surface after the bio-treatment were monitored; contact angle decreased from 69° to 38° and the mineral’s floatability decreased from 95% to 25% after the treatment.

Keywords: Bacillus megaterium, surface modification, flotation, dolomite, adhesion energy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1952
684 A Trends Analysis of Dinghy Yacht Simulator

Authors: Jae-Neung Lee, Sung-Bum Pan, Keun-Chang Kwak

Abstract:

This paper describes an analysis of Yacht Simulator international trends and also explains about Yacht. The results are summarized as follows. Attached to the cockpit are sensors that feed -back information on rudder angle, boat heel angle and mainsheet tension to the computer. Energy expenditure of the sailor measure indirectly using expired gas analysis for the measurement of VO2 and VCO2. At sea course configurations and wind conditions can be preset to suit any level of sailor from complete beginner to advanced sailor.

Keywords: Trends Analysis, Yacht Simulator, Sailing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2188
683 Numerical Investigation of Dynamic Stall over a Wind Turbine Pitching Airfoil by Using OpenFOAM

Authors: Mahbod Seyednia, Shidvash Vakilipour, Mehran Masdari

Abstract:

Computations for two-dimensional flow past a stationary and harmonically pitching wind turbine airfoil at a moderate value of Reynolds number (400000) are carried out by progressively increasing the angle of attack for stationary airfoil and at fixed pitching frequencies for rotary one. The incompressible Navier-Stokes equations in conjunction with Unsteady Reynolds Average Navier-Stokes (URANS) equations for turbulence modeling are solved by OpenFOAM package to investigate the aerodynamic phenomena occurred at stationary and pitching conditions on a NACA 6-series wind turbine airfoil. The aim of this study is to enhance the accuracy of numerical simulation in predicting the aerodynamic behavior of an oscillating airfoil in OpenFOAM. Hence, for turbulence modelling, k-ω-SST with low-Reynolds correction is employed to capture the unsteady phenomena occurred in stationary and oscillating motion of the airfoil. Using aerodynamic and pressure coefficients along with flow patterns, the unsteady aerodynamics at pre-, near-, and post-static stall regions are analyzed in harmonically pitching airfoil, and the results are validated with the corresponding experimental data possessed by the authors. The results indicate that implementing the mentioned turbulence model leads to accurate prediction of the angle of static stall for stationary airfoil and flow separation, dynamic stall phenomenon, and reattachment of the flow on the surface of airfoil for pitching one. Due to the geometry of the studied 6-series airfoil, the vortex on the upper surface of the airfoil during upstrokes is formed at the trailing edge. Therefore, the pattern flow obtained by our numerical simulations represents the formation and change of the trailing-edge vortex at near- and post-stall regions where this process determines the dynamic stall phenomenon.

Keywords: CFD, Moderate Reynolds number, OpenFOAM, pitching oscillation, unsteady aerodynamics, wind turbine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1482
682 Effect of Scarp Topography on Seismic Ground Motion

Authors: Haiping Ding, Rongchu Zhu, Zhenxia Song

Abstract:

Local irregular topography has a great impact on earthquake ground motion. For scarp topography, using numerical simulation method, the influence extent and scope of the scarp terrain on scarp's upside and downside ground motion are discussed in case of different vertical incident SV waves. The results show that: (1) The amplification factor of scarp's upside region is greater than that of the free surface, while the amplification factor of scarp's downside part is less than that of the free surface; (2) When the slope angle increases, for x component, amplification factors of the scarp upside also increase, while the downside part decrease with it. For z component, both of the upside and downside amplification factors will increase; (3) When the slope angle changes, the influence scope of scarp's downside part is almost unchanged, but for the upside part, it slightly becomes greater with the increase of slope angle; (4) Due to the existence of the scarp, the z component ground motion appears at the surface. Its amplification factor increases for larger slope angle, and the peaks of the surface responses are related with incident waves. However, the input wave has little effects on the x component amplification factors.

Keywords: Scarp topography, ground motion, amplification factor, vertical incident wave.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 749