519 research outputs found

    Experimental and theoretical investigation of three-dimensional turbulent boundary layers and turbulence characteristics inside an axial flow inducer passage

    Get PDF
    Analytical and experimental investigations of the characteristics of three dimensional turbulent boundary layers in a rotating helical passage of an inducer rotor are reported. Expressions are developed for the velocity profiles in the inner layer, where the viscous effects dominate, in the outer layer, where the viscous effects are small, and in the interference layer, where the end walls influence the flow. The prediction of boundary layer growth is based on the momentum integral technique. The equations derived are general enough to be valid for all turbomachinery rotors with arbitrary pressure gradients. The experimental investigations are carried out in a flat plate inducer 3 feet in diameter. The mean velocity profiles, turbulence intensities and shear stresses, wall shear stress, and limiting streamline angles are measured at various radial and chordwise locations by using rotating probes. The measurements are in general agreement with the predictions. The radial flows are well represented by an expression which includes the effect of stagger angle and radial pressure gradient. The radial flows in the rotor channel are higher than those on a single blade. The collateral region exists only very near the blade surface. The radial component of turbulence intensity is higher than the streamwise component because of the effect of rotation

    Towards Auto Contract Generation and Ensemble-based Smart Contract Vulnerability Detection

    Get PDF
    Smart contracts (SC) are computer programs that are major components of Blockchain. The "intelligent contract" is made up of the rules accepted by the parties concerned. When the transactions started by the parties obey these established rules, then only their transactions will be completed without the involvement of a third party. Because of the simplicity and succinct nature of the solidity language, most smart contracts are written in this language. Smart contracts have two limitations, which are vulnerabilities in SC and that smart contracts can\u27t be understood by all stakeholders, especially non-technical people who are involved in the business, since they are written in a programming language. Hence, the proposed paper used the XGBoost model and BPMN (Business Process Modeling Notation) tool to solve the first and second limitations of the SC respectively. Attackers are drawn to attention because of the popularity and fragility of the Solidity language. Once smart contracts have been launched, they can’t be changed. If that smart contract is vulnerable, attackers may then cash it. BPMN is used to represent business rules or contracts in graphical notation, so everyone involved in the business can understand the business rules. This BPMN diagram can be converted into a smart contract template through the BPMN-SOL tool. A few publications and existing tools exist on smart contract vulnerability detection, but they require more time to forecast and interpretation of vulnerability causes is also difficult. Thus, the proposed model experimented with several deep learning approaches and improved F1 score results by an average of 2% using the XGBoost model based on the ensemble technique to detect vulnerabilities of SCs, which are: Denial of Service (DOS), Unchecked external call, Re-entrancy, and Origin of Transaction. This paper also combined two important features to construct a data set, which are code snippets and n-grams

    End wall flows in rotors and stators of a single stage compressor

    Get PDF
    A computer code for solving the parabolized Navier-Stokes equations for internal flows was developed. Oscillations that develop in the calculation procedure are discussed. The measurements made in the hub and annulus wall boundary layers are summarized. The flow in the hub wall boundary layer, starting ahead of the inlet guide vanes to the inlet of the rotor is traced

    Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

    Full text link
    This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the state estimation error of the system. The results provide basic understanding about the limit of the attack impact. The design of the optimal attack is based on a Markov decision process (MDP) formulation, which is solved efficiently using the value iteration method. Using the proposed framework, we quantify the effect of false positives and mis-detections on the system performance, which can help the joint design of the attack detection and mitigation. To demonstrate the use of the proposed framework in a real-world CPCS, we consider the voltage control system of power grids, and run extensive simulations using PowerWorld, a high-fidelity power system simulator, to validate our analysis. The results show that by carefully designing the attack sequence using our proposed approach, the attacker can cause a large deviation of the bus voltages from the desired setpoint. Further, the results verify the optimality of the derived attack sequence and show that, to cause maximum impact, the attacker must carefully craft his attack to strike a balance between the attack magnitude and stealthiness, due to the simultaneous presence of attack detection and mitigation

    Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems

    Get PDF
    Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways' traction power systems (TPSes). Specifically, we analyze two types of FDI attacks on the train-borne voltage, current, and position sensor measurements - which we call efficiency attack and safety attack -- that (i) maximize the system's total power consumption and (ii) mislead trains' local voltages to exceed given safety-critical thresholds, respectively. To counteract, we develop a global attack detection (GAD) system that serializes a bad data detector and a novel secondary attack detector designed based on unique TPS characteristics. With intact position data of trains, our detection system can effectively detect the FDI attacks on trains' voltage and current measurements even if the attacker has full and accurate knowledge of the TPS, attack detection, and real-time system state. In particular, the GAD system features an adaptive mechanism that ensures low false positive and negative rates in detecting the attacks under noisy system measurements. Extensive simulations driven by realistic running profiles of trains verify that a TPS setup is vulnerable to the FDI attacks, but these attacks can be detected effectively by the proposed GAD while ensuring a low false positive rate.Comment: IEEE/IFIP DSN-2016 and ACM Trans. on Cyber-Physical System

    Three dimensional flow field inside compressor rotor, including blade boundary layers

    Get PDF
    The flow in a turbomachinery blade passage has a predominant flow direction. The viscous diffusion in the streamwise direction is usually small and the elliptic influence is transmitted upstream through the pressure field. Starting with a guessed pressure field, it is possible to converge on the full elliptic solution by iterating between a parabolic solution and an iteration of the pressure field. The main steps of the calculation are given. The blade boundary layers which are three dimensional with laminar, transitional, turbulent, and separation zones are investigated. The kinetic energy is analyzed, and the dissipation equation is presented. Measurements were made of the three dimensional flow inside an axial flow compressor passage

    Cost-Benefit Analysis of Moving-Target Defense in Power Grids

    Get PDF
    We study moving-target defense (MTD) that actively perturbs transmission line reactances to thwart stealthy false data injection (FDI) attacks against state estimation in a power grid. Prior work on this topic has proposed MTD based on randomly selected reactance perturbations, but these perturbations cannot guarantee effective attack detection. To address the issue, we present formal design criteria to select MTD reactance perturbations that are truly effective. However, based on a key optimal power flow (OPF) formulation, we find that the effective MTD may incur a non-trivial operational cost that has not hitherto received attention. Accordingly, we characterize important tradeoffs between the MTD's detection capability and its associated required cost. Extensive simulations, using the MATPOWER simulator and benchmark IEEE bus systems, verify and illustrate the proposed design approach that for the first time addresses both key aspects of cost and effectiveness of the MTD.Comment: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) - 201

    A study of anti-inflammatory activity of the benzofuran compound (3,4-dihydro 4-oxo-benzofuro [3,2-d] pyrimidine-2-propionic acid) in chronic model of inflammation

    Get PDF
    Background: Benzofuran compounds are shown to have pharmacological properties such as antiarrhythmic, antidepressant, antifungal, and antibacterial activity. Some studies conducted on them have revealed that they are having anti-inflammatory property also. Hence, we carried out this study to know whether the benzofuran compound 3, 4-dihydro 4-oxo-benzofuro (3, 2-d) pyrimidine-2-propionic acid has got anti-inflammatory activity against chronic inflammation.Methods: Wistar albino rats were treated with benzofuran compound under study and phenylbutazone in the dose of 100 mg\kg, orally with 2% gum acacia as suspending agent and the effects were observed in chronic experimental model of inflammation namely, cotton pellet induced granuloma model.Results: In the present study, it was shown that the benzofuran compound under study has got significant anti-inflammatory activity against the chronic model of inflammation.Conclusion: Our experiment shows that the benzofuran compound under study has got significant anti-inflammatory activity and may, as well become an additional anti-inflammatory drug if further studies are conducted in this direction involving human beings

    Screening of benzofuran compound 3-acetamido-2-p-anisoyl benzofuran for anti-inflammatory activity in acute models of inflammation

    Get PDF
    Background: Benzofurans are colourless solid compounds which are derived from coal tar. They have been shown to have many properties which are relevant to the field of pharmacology. For example they have significant antibacterial, antifungal, antidepressant and anti-arrhythmic properties. In some of the studies carried out on them they have shown to have anti-inflammatory activity also. So this study was conducted to know if the compound 3-acetamido-2-p-anisoyl benzofuran has anti-inflammatory activity in acute inflammation.Methods: The benzofuran compound understudy and phenylbutazone were administered orally to wistar albino rats in the dose of 100 mg/kg body weight, with 2% gum acacia as suspending agent and the effects were observed in acute models of inflammation viz, carrageenin induced rat paw edema, and turpentine induced peritonitis.Results: The results of our study showed that the benzofuran compound under study has significant anti-inflammatory activity in both the experimental models of acute inflammation.Conclusions: Results from our study show that the compound under study has significant anti-inflammatory activity and further detailed works with this compound in different doses are needed

    N-ACETYLCYSTEINE REVERSES LATE GESTATIONAL STRESS INDUCED MATERNAL OXIDATIVE DAMAGE

    Get PDF
    Objective: This study was intended to investigate the effect of early and late gestational stress, on the levels of antioxidants and antioxidant enzymes in maternal serum that reflects oxidative damage. We also aimed at evaluating the protective role of N-acetylcysteine (NAC) against this oxidative stress. This study was carried out with speculation in mind that maternal oxidative damage could be the cause for developmental defects in off spring.Methods: Pregnant rats were exposed to restrain stress thrice daily, either during the first half or during the second half of gestation. Other groups were treated with N-acetylcysteine throughout pregnancy, along with exposure to either early gestational stress or late gestational stress. Control group was kept undisturbed throughout pregnancy. Immediately after delivery, blood was drawn to estimate the serum antioxidant levels.Results: Pregnant rats exposed to stress during the late gestational period showed significant variation in the level of serum MDA, Glutathione Reductase, reduced glutathione, SOD and total antioxidant capacity although, administration of NAC brought about improvement in the antioxidant status.Conclusion: NAC is an effective antioxidant that can bring down the oxidative damage caused by late gestational stress in rats.Â
    corecore