209 research outputs found

    Experimental and CFD investigation of re-agent mixing in an SCR system

    Get PDF
    2007 Fall.Includes bibliographical references.Nitrogen oxides (NOx) cause a gamut of problems such as harmful particulate matter, ground level ozone (smog) and acid rain. Currently, a significant capital is being invested researching new techniques to control NOx emissions. One of the best ways to breakdown NOx is the Selective Catalytic Reduction (SCR) after-treatment method. A reducing agent (re-agent) is injected into exhaust gases and passed through a catalyst that facilitates NOx breakdown into Nitrogen and Water. To ensure effective NOx conversion, there must be uniform mixing between re-agent and exhaust gas upstream of the catalyst blocks. The current thesis focuses on investigating the mixing quality for an SCR test system employed for a 2-stroke lean-bum natural gas engine. CFD investigations were conducted to simulate the physical flow process. The mixing quality for different injector locations and the effect of utilizing a downstream in-line mixer was investigated. The CFD simulations were compared to experimental results. To measure ammonia concentrations experimentally, a traversing probe was designed and built. Re-agent concentrations were measured at various locations on a plane slightly upstream of the catalyst substrate. Detailed discussion is presented on different cases of CFD analysis. Experiments were conducted for the best and worst case of mixing based on CFD computation. Results suggest that a mixer plays a vita1 role in improving the mixing

    Effects Of Information Seeking Modes On Users’ Online Social Engineering Vulnerabilities

    Get PDF
    Hackers are increasingly exploiting the social movement on the Internet, which is responsible for domestication of the web and its associated technologies, by using novel methods of online social engineering (OSE) . While most research to date in this field has focused on one type of OSE vector-phishing, there is a need to understand user vulnerabilities to other types of OSE attack vectors. This research in progress proposal first extends prior published classifications and presents a new typology of OSE attack vectors that manifest during the various information seeking contexts that users engage while online. This provides a conceptual starting point to build our empirical model that we propose will be useful in testing variance in human vulnerability to the different OSE attack vectors. The results of this research should be of interest to academic researchers, practitioners, consumer protection agencies and government regulatory authorities

    A Typology Of Social Engineering Attacks – An Information Science Perspective

    Get PDF
    Hackers are increasingly exploiting the social movement on the Internet, which is responsible for domestication of the web and its associated technologies, by using novel methods of online social engineering. However, there is not enough support in the form of published research that can help us gain a holistic understanding of human vulnerabilities that are central to online social engineering attacks. This paper extends prior published classifications and presents a new typology of online social engineering methods that manifest during the various information seeking contexts that users engage while online. Concepts borrowed from the field of information science hel p us to build this typology that groups attack vectors with different human information seeking modes. The typology can be readily used as educational material to improve end user awareness about online social engineering. In addition, the typology can be used as a conceptual starting point for future empirical research on human vulnerabilities in different information seeking contexts which in turn can informsystems designers to design more effective solutions that can help mitigate the effects of such attacks

    Evaluation of safety of trauma patients during transport

    Full text link
    BACKGROUND: Transport of patients is sometimes necessary and unavoidable. However, there are many risks related to it. For this reason, safety of intra-hospital transport has been thoroughly studied in critical care patients; however there is no literature on adverse events during transport of trauma patients. Due to the acute nature of injury, trauma patients are fundamentally different than other populations of patients and require special consideration during transport. Lack of data makes initiating new protocols for transport conditions difficult. METHODS/RESULTS: Data from all activated trauma response patients who required transport to and from the CT scanner from the period of January 01, 2010 to December 31st, 2013 (total of 1103 patients) were collected. From these patients, 17 adverse events were identified (2.0% excluding missing documentation). Vomiting was the most common adverse event followed by peripheral IV line dislodgment. There were no cardiac arrests or deaths resulting from transport related events. CONCLUSION: Defining adverse events is a key part of evaluating safety during transport. Fluctuations in vital signs and other objective measures may reflect patient disease rather than transport. Our study provides clear definitions of what an adverse event is using outcomes and objectively identifies measures necessary for safe transport as well as areas of improvement

    A Taxonomy for Social Engineering attacks

    Get PDF
    As the technology to secure information improves, hackers will employ less technical means to get access to unauthorized data. The use of Social Engineering as a non tech method of hacking has been increasingly used during the past few years. There are different types of social engineering methods reported but what is lacking is a unifying effort to understand these methods in the aggregate. This paper aims to classify these methods through taxonomy so that organizations can gain a better understanding of these attack methods and accordingly be vigilant against them

    Effect of Frame of Mind on Users’ Deception Detection Attitudes and Behaviours

    Get PDF
    As the World Wide Web grows, the number and variety of deceptive attacks targeting online consumers likewise increases. Extant research has examined online deception from an information processing perspective, that is, how users process information when they encounter deceptive attacks. However, users’ ability to process information is based on what the users are thinking or their frame of mind while engaged with that information. Frame of mind has not been well studied in the security domain. This study proposes the effect of users’ frame of mind on their attitude towards online deception and their actual deception detection behaviour. Specifically, we propose that human information needs and the framing (positive or negative) of important information such as warnings are significant components of users’ frames of mind that impact their vulnerability to online attacks. We conclude the paper by discussing in detail the experimental setup and expected contributions from the analysis

    A Mindfulness Program Addressing Sleep Quality and Stress: Transition to a Telehealth Format for Higher Education Students During COVID-19

    Get PDF
    Many higher education students report sleep problems, further exemplified along with stress at the onset of the COVID-19 pandemic. Promising evidence supports the use of mindfulness programming, although synchronous telehealth sessions have not been adequately examined. This exploratory eight-session telehealth mindfulness program utilized a pretest-posttest quantitative design to examine changes in sleep quality and perceived stress for 16 higher education students enrolled at a health professions-focused university. Sleep quality changes were measured using the Pittsburgh Sleep Quality Index (Z=-3.234, p=0.0012, d=-0.808) and perceived stress with the Perceived Stress Scale (Z=-3.102, p=0.0019, d=-0.776), both of which were significant. The results suggest that synchronous mindfulness programming delivered via telehealth has the potential to improve sleep quality and perceived stress in students, however, future studies should consider the use of objective measurements of sleep duration and quality, and a control group

    Screen-Printed Stretchable Supercapacitors Based on Tin Sulfide-Decorated Face-Mask-Derived Activated Carbon Electrodes with High Areal Energy Density

    Get PDF
    \ua9 2024 The Authors. Published by American Chemical Society.In this work, tin sulfide nanosheets decorated on face-mask-derived activated carbon have been explored as electrode material for electrochemical supercapacitors. A hydrothermal route was employed to grow tin sulfide on the surface and inside of high-surface-area face-mask-derived activated carbon, activated at 850 \ub0C, to produce a hierarchical interconnected porous composite (ACFM-850/TS) structure. The presence of tin sulfide in the porous carbon framework exposed the surface active sites for rapid adsorption/desorption of electrolyte ions and ensured high utilization of the porous carbon surface. Furthermore, the porous ACFM-850 framework prevented the stacking/agglomeration of tin sulfide sheets, thereby enhancing the charge-transport kinetics in the composite electrodes. Benefiting from the synergistic effect of tin sulfide and ACFM-850, the resulting ACFM-850/TS composite exhibited an attractive specific capacitance of 423 F g-1 at a 0.5 A g-1 current density and superior rate capability (71.3% at a 30 A g-1 current density) in a 1.0 M Na2SO4 electrolyte. In addition, we fabricated a planar symmetric interdigitated supercapacitor on a stretchable Spandex fabric using an ACFM-850/TS composite electrode and carboxymethyl cellulose/NaClO4 as a solid-state gel electrolyte employing a scalable screen-printing process. The as-prepared stretchable supercapacitors displayed an ultrahigh energy density of 9.2 ÎĽWh cm-2 at a power density of 0.13 mW cm-2. In addition, they exhibited an excellent cyclic stability of 64% even after 10,000 charge-discharge cycles and 42% after 1000 continuous stretch (at 25% stretching)/release cycles. Such screen-printed interdigitated planar supercapacitors with activated carbon composite electrodes and a solid-state gel electrolyte act as promising low-cost energy-storage devices for wearable and flexible integrated electronic devices

    DEVELOPMENT AND VALIDATION OF A STABILITY INDICATING HPLC METHOD FOR THE DETERMINATION OF NILOTINIB HYDROCHLORIDE IN BULK AND PHARMACEUTICAL DOSAGE FORM

    Get PDF
    Objective: To develop a rapid, accurate, linear, sensitive and stability indicating RP-HPLC method for the determination of nilotinib in bulk and pharmaceutical dosage forms in the presence of its four related substances.Methods: The RP-HPLC method was developed for the chromatographic separation of nilotinib and its impurities by using waters Xterra RP-18 (150*4.6 mm, 3.5 µm) column with a mobile phase combination of 10 mM ammonium formate with pH-3.5 and acetonitrile in gradient mode. An injection volume of 20 µl. Flow rate was 1.0 ml/min and detection was carried a wavelength of 250 nm. The method was validated as per ICH guidelines.Results: The retention time for nilotinib and its four impurities were found to be 4.37, 7.40, 8.96, 10.21 and 10.87 min respectively. The linear regression analysis data for the calibration plots showed the good linear relationship in the concentration range of 0.04-3.0 ppm for the nilotinib impurities. The % recovery of nilotinib impurities was found to be 96.8-99.4% in the linearity range. The detection limit (LOD) values were about 0.014, 0.016, 0.005 and 0.03 ppm respectively and the quantification limit (LOQ) values were 0.042, 0.048, 0.014 and 0.09 ppm respectively. The % degradation at various stress conditions like acid, alkaline, oxidative, thermal and photolytic stress was found to be 8.92, 18.35,5.63, 0.88 and 3.89 respectively.Conclusion: The RP-HPLC method compatible with LC-MS was developed for the analysis of nilotinib and its four impurities. It was validated as per the ICH guidelines and found to be linear, robust, precise, accurate, sensitive, stability indicating and can be used for routine as well as stability analysis of capsule dosage forms as well as for drug substance

    Framing Group Norms in Virtual Communities

    Get PDF
    Organizations have started to realize the economic value of virtual communities. Unfortunately, traditional management methods of control do not work on virtual communities. Often, group norms are the principal method of virtual community governance. However, it is not clear how group norms are formed in virtual communities, and how managers can shape norm evolution. This research in progress paper presents our initial analysis of norm formation in virtual communities. We use framing analysis on two virtual communities focused on recreational drug use to explain how managers of virtual communities construct, and community members interpret frames to develop group norms
    • …
    corecore