1,311 research outputs found

    A probabilistic model to predict the formation and propagation of crack networks in thermal fatigue

    Get PDF
    International audienceA probabilistic model is presented to predict the formation and propagation of crack networks in thermal fatigue. It is based on a random distribution of sites where cracks initiate and on the shielding phenomenon corresponding to the relaxed stress field created around cracks. Currently, the model considers only heterogeneous uniaxial stress loading even if thermal fatigue is multiaxial. However, the first simulations on a uniaxial mechanical loading representative of the stress gradient that appears in thermal fatigue shocks are in qualitative agreement with experimental results. The larger the stress amplitude, the denser the crack network and the smaller the crack sizes

    Electric-field control of the magnetic anisotropy in an ultrathin (Ga,Mn)As/(Ga,Mn)(As,P) bilayer

    Full text link
    We report on the electric control of the magnetic anisotropy in an ultrathin ferromagnetic (Ga,Mn)As/(Ga,Mn)(As,P) bilayer with competing in-plane and out-of-plane anisotropies. The carrier distribution and therefore the strength of the effective anisotropy is controlled by the gate voltage of a field effect device. Anomalous Hall Effect measurements confirm that a depletion of carriers in the upper (Ga,Mn)As layer results in the decrease of the in-plane anisotropy. The uniaxial anisotropy field is found to decrease by a factor ~ 4 over the explored gate-voltage range, so that the transition to an out-of-plane easy-axis configuration is almost reached

    ICMP: an Attack Vector against IPsec Gateways

    Get PDF
    In this work we show that the Internet Control Message Protocol (ICMP) can be used as an attack vector against IPsec gateways. The main contribution of this work is to demonstrate that an attacker having eavesdropping and traffic injection capabilities in the black untrusted network (he only sees ciphered packets), can force a gateway to reduce the Path MTU of an IPsec tunnel to a minimum, which in turn creates serious issues for devices on the trusted network behind this gateway: depending on the Path MTU discovery algorithm, it either prevents any new TCP connection (Denial of Service), or it creates major performance penalties (more than 6 seconds of delay in TCP connection establishment and ridiculously small TCP segment sizes). After detailing the attack and the behavior of the various nodes, we discuss some counter measures, with the goal to find a balance between ICMP benefits and the associated risks

    Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways

    Get PDF
    International audienceThis work introduces the "Packet Too Big"-"Packet Too Small" ICMP based attack against IPsec gateways. We explain how an attacker having eavesdropping and packet injection capabilities, from the insecure network where he only sees encrypted packets, can force a gateway to reduce the Path MTU of an IPsec tunnel to the minimum, which triggers severe issues for the hosts behind this gateway: depending on the Path MTU discovery algorithm in use, the attack either creates a Denial of Service or major performance penalties. This attack highlights two fundamental problems that we discuss, along with potential counter-measures to mitigate the attack while keeping ICMP benefits

    ICMP: an Attack Vector against IPsec Gateways

    No full text
    In this work we show that the Internet Control Message Protocol (ICMP) can be used as an attack vector against IPsec gateways. The main contribution of this work is to demonstrate that an attacker having eavesdropping and traffic injection capabilities in the black untrusted network (he only sees ciphered packets), can force a gateway to reduce the Path MTU of an IPsec tunnel to a minimum, which in turn creates serious issues for devices on the trusted network behind this gateway: depending on the Path MTU discovery algorithm, it either prevents any new TCP connection (Denial of Service), or it creates major performance penalties (more than 6 seconds of delay in TCP connection establishment and ridiculously small TCP segment sizes). After detailing the attack and the behavior of the various nodes, we discuss some counter measures, with the goal to find a balance between ICMP benefits and the associated risks

    Proposal for a process oriented knowledge management system (PKMS)

    Get PDF
    International audienceIn an increasingly competitive environment, manufacturing companies are more frequently looking to handle the knowledge referentials relating to their redesign processes. They are then able to implement this with less effort and balance out their work capacity for innovation activities, contributing to more significant improvements in their product offering. In this article we propose a conceptual model for the implementation of a process-oriented knowledge tool dedicated to the formalisation of this type of knowledge referential. The implementable nature of this model has been validated by a demonstrator tested on an application case provided by our industrial partner, Renault Powertrain Technology Department

    Locating a weak change using diffuse waves (LOCADIFF) : theoretical approach and inversion procedure

    Get PDF
    We describe a time-resolved monitoring technique for heterogeneous media. Our approach is based on the spatial variations of the cross-coherence of coda waveforms acquired at fixed positions but at different dates. To locate and characterize a weak change that occurred between successive acquisitions, we use a maximum likelihood approach combined with a diffusive propagation model. We illustrate this technique, called LOCADIFF, with numerical simulations. In several illustrative examples, we show that the change can be located with a precision of a few wavelengths and its effective scattering cross-section can be retrieved. The precision of the method depending on the number of source receiver pairs, time window in the coda, and errors in the propagation model is investigated. Limits of applications of the technique to real-world experiments are discussed.Comment: 11 pages, 14 figures, 1 tabl

    Fatigue microcrack detection with digital image correlation

    Get PDF
    International audienceA digital image correlation method is proposed to detect and quantify automatically microcracks on the surface of a specimen during a fatigue test. The proposed procedure allows for a fast scanning of the entire surface with all possible (pixel-wise) locations of microcrack centers and the detection of cracks having a sub-pixel opening. An experimental test case is presented as an illustration of the method and a comparison with a replica technique is performed

    Thermo-economic optimization during preliminary design phase of organic Rankine cycle systems for waste heat recovery from exhaust and recirculated gases of heavy duty trucks

    Full text link
    peer reviewedWaste heat recovery (WHR) Organic Rankine Cycle (ORC) system is a very promising technology for reducing fuel consumption and consequently the CO2 emissions of future heavy-duty trucks (HDT). Nonetheless, the adoption of this technology in the automotive domain requires specific R&D activities going from the system definition to the on-board integration. This study focuses on the preliminary design phase of ORC systems recovering the heat wasted from two of the sources available on a HDT: the exhaust and recirculated gases. From these heat sources and their combinations, 6 possible architectures are identified. On the other hand, 4 volumetric expansion machine technologies are considered (scroll, screw, piston and vane Expanders). At the end, 24 topologies are therefore modelled considering the main components (Pump, Heat exchangers, Expansion machines). A three-step optimization method is proposed to identify the most promising system. First, the most suitable conditions are identified for the design of the ORC systems using a simple model of volumetric expansion machine. In a second step, the design phase, using more detailed models for the expansion machines, a thermos-economic optimization is performed. Finally, in a third step, the output power of the latter system models is maximized in off-design conditions, optimizing the evaporating pressure and the overheating degree
    • …
    corecore